From ffe3ab541c8e49f4b26a8625fb7b9f7e3e4fd643 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Tue, 18 Mar 2025 17:03:48 +0000 Subject: [PATCH] Auto-Update: 2025-03-18T17:00:20.156090+00:00 --- CVE-2012/CVE-2012-58xx/CVE-2012-5853.json | 10 +- CVE-2018/CVE-2018-93xx/CVE-2018-9383.json | 39 +- CVE-2021/CVE-2021-224xx/CVE-2021-22484.json | 56 ++- CVE-2021/CVE-2021-263xx/CVE-2021-26344.json | 14 +- CVE-2021/CVE-2021-370xx/CVE-2021-37000.json | 56 ++- CVE-2022/CVE-2022-232xx/CVE-2022-23240.json | 32 +- CVE-2022/CVE-2022-259xx/CVE-2022-25978.json | 12 +- CVE-2022/CVE-2022-329xx/CVE-2022-32933.json | 32 +- CVE-2022/CVE-2022-382xx/CVE-2022-38220.json | 32 +- CVE-2022/CVE-2022-400xx/CVE-2022-40032.json | 32 +- CVE-2022/CVE-2022-403xx/CVE-2022-40347.json | 32 +- CVE-2022/CVE-2022-442xx/CVE-2022-44216.json | 32 +- CVE-2022/CVE-2022-455xx/CVE-2022-45551.json | 32 +- CVE-2022/CVE-2022-457xx/CVE-2022-45701.json | 32 +- CVE-2022/CVE-2022-45xx/CVE-2022-4550.json | 22 +- CVE-2022/CVE-2022-46xx/CVE-2022-4679.json | 22 +- CVE-2022/CVE-2022-470xx/CVE-2022-47075.json | 22 +- CVE-2022/CVE-2022-470xx/CVE-2022-47076.json | 22 +- CVE-2022/CVE-2022-481xx/CVE-2022-48115.json | 32 +- CVE-2022/CVE-2022-483xx/CVE-2022-48329.json | 32 +- CVE-2022/CVE-2022-483xx/CVE-2022-48337.json | 32 +- CVE-2022/CVE-2022-483xx/CVE-2022-48338.json | 32 +- CVE-2022/CVE-2022-483xx/CVE-2022-48339.json | 32 +- CVE-2023/CVE-2023-01xx/CVE-2023-0168.json | 22 +- CVE-2023/CVE-2023-03xx/CVE-2023-0381.json | 22 +- CVE-2023/CVE-2023-04xx/CVE-2023-0482.json | 38 +- CVE-2023/CVE-2023-05xx/CVE-2023-0552.json | 22 +- CVE-2023/CVE-2023-10xx/CVE-2023-1095.json | 22 +- CVE-2023/CVE-2023-14xx/CVE-2023-1420.json | 10 +- CVE-2023/CVE-2023-14xx/CVE-2023-1435.json | 6 +- CVE-2023/CVE-2023-209xx/CVE-2023-20948.json | 32 +- CVE-2023/CVE-2023-230xx/CVE-2023-23007.json | 32 +- CVE-2023/CVE-2023-234xx/CVE-2023-23452.json | 32 +- CVE-2023/CVE-2023-234xx/CVE-2023-23453.json | 32 +- CVE-2023/CVE-2023-235xx/CVE-2023-23524.json | 32 +- CVE-2023/CVE-2023-235xx/CVE-2023-23530.json | 22 +- CVE-2023/CVE-2023-241xx/CVE-2023-24104.json | 22 +- CVE-2023/CVE-2023-241xx/CVE-2023-24114.json | 32 +- CVE-2023/CVE-2023-241xx/CVE-2023-24122.json | 32 +- CVE-2023/CVE-2023-241xx/CVE-2023-24123.json | 32 +- CVE-2023/CVE-2023-241xx/CVE-2023-24124.json | 32 +- CVE-2023/CVE-2023-243xx/CVE-2023-24320.json | 36 +- CVE-2023/CVE-2023-243xx/CVE-2023-24369.json | 32 +- CVE-2023/CVE-2023-247xx/CVE-2023-24769.json | 32 +- CVE-2023/CVE-2023-247xx/CVE-2023-24785.json | 32 +- CVE-2023/CVE-2023-252xx/CVE-2023-25264.json | 32 +- CVE-2023/CVE-2023-252xx/CVE-2023-25265.json | 32 +- CVE-2023/CVE-2023-252xx/CVE-2023-25266.json | 22 +- CVE-2023/CVE-2023-254xx/CVE-2023-25431.json | 32 +- CVE-2023/CVE-2023-256xx/CVE-2023-25621.json | 22 +- CVE-2023/CVE-2023-260xx/CVE-2023-26081.json | 32 +- CVE-2023/CVE-2023-262xx/CVE-2023-26255.json | 32 +- CVE-2023/CVE-2023-344xx/CVE-2023-34401.json | 39 +- CVE-2023/CVE-2023-366xx/CVE-2023-36681.json | 47 ++- CVE-2023/CVE-2023-401xx/CVE-2023-40108.json | 39 +- CVE-2023/CVE-2023-517xx/CVE-2023-51787.json | 14 +- CVE-2023/CVE-2023-61xx/CVE-2023-6123.json | 14 +- CVE-2024/CVE-2024-07xx/CVE-2024-0709.json | 8 +- CVE-2024/CVE-2024-114xx/CVE-2024-11482.json | 6 +- CVE-2024/CVE-2024-209xx/CVE-2024-20927.json | 16 +- CVE-2024/CVE-2024-210xx/CVE-2024-21006.json | 16 +- CVE-2024/CVE-2024-210xx/CVE-2024-21055.json | 16 +- CVE-2024/CVE-2024-211xx/CVE-2024-21142.json | 14 +- CVE-2024/CVE-2024-211xx/CVE-2024-21185.json | 14 +- CVE-2024/CVE-2024-225xx/CVE-2024-22525.json | 32 +- CVE-2024/CVE-2024-237xx/CVE-2024-23737.json | 32 +- CVE-2024/CVE-2024-257xx/CVE-2024-25734.json | 39 +- CVE-2024/CVE-2024-267xx/CVE-2024-26746.json | 127 +++++- CVE-2024/CVE-2024-267xx/CVE-2024-26750.json | 110 ++++- CVE-2024/CVE-2024-267xx/CVE-2024-26762.json | 105 ++++- CVE-2024/CVE-2024-267xx/CVE-2024-26763.json | 231 ++++++++++- CVE-2024/CVE-2024-267xx/CVE-2024-26764.json | 231 ++++++++++- CVE-2024/CVE-2024-267xx/CVE-2024-26765.json | 138 ++++++- CVE-2024/CVE-2024-267xx/CVE-2024-26773.json | 216 +++++++++- CVE-2024/CVE-2024-267xx/CVE-2024-26780.json | 124 +++++- CVE-2024/CVE-2024-267xx/CVE-2024-26783.json | 127 +++++- CVE-2024/CVE-2024-273xx/CVE-2024-27382.json | 12 +- CVE-2024/CVE-2024-279xx/CVE-2024-27953.json | 52 ++- CVE-2024/CVE-2024-28xx/CVE-2024-2885.json | 22 +- CVE-2024/CVE-2024-297xx/CVE-2024-29785.json | 32 +- CVE-2024/CVE-2024-298xx/CVE-2024-29831.json | 63 ++- CVE-2024/CVE-2024-318xx/CVE-2024-31805.json | 45 +- CVE-2024/CVE-2024-318xx/CVE-2024-31806.json | 43 +- CVE-2024/CVE-2024-318xx/CVE-2024-31807.json | 45 +- CVE-2024/CVE-2024-318xx/CVE-2024-31808.json | 45 +- CVE-2024/CVE-2024-318xx/CVE-2024-31809.json | 45 +- CVE-2024/CVE-2024-318xx/CVE-2024-31811.json | 45 +- CVE-2024/CVE-2024-318xx/CVE-2024-31812.json | 43 +- CVE-2024/CVE-2024-318xx/CVE-2024-31813.json | 43 +- CVE-2024/CVE-2024-318xx/CVE-2024-31814.json | 45 +- CVE-2024/CVE-2024-318xx/CVE-2024-31816.json | 43 +- CVE-2024/CVE-2024-340xx/CVE-2024-34092.json | 84 +++- CVE-2024/CVE-2024-340xx/CVE-2024-34093.json | 62 ++- CVE-2024/CVE-2024-354xx/CVE-2024-35426.json | 14 +- CVE-2024/CVE-2024-35xx/CVE-2024-3596.json | 46 ++- CVE-2024/CVE-2024-363xx/CVE-2024-36359.json | 12 +- CVE-2024/CVE-2024-374xx/CVE-2024-37479.json | 14 +- CVE-2024/CVE-2024-376xx/CVE-2024-37675.json | 32 +- CVE-2024/CVE-2024-388xx/CVE-2024-38816.json | 14 +- CVE-2024/CVE-2024-392xx/CVE-2024-39248.json | 32 +- CVE-2024/CVE-2024-399xx/CVE-2024-39929.json | 14 +- CVE-2024/CVE-2024-403xx/CVE-2024-40347.json | 32 +- CVE-2024/CVE-2024-405xx/CVE-2024-40596.json | 32 +- CVE-2024/CVE-2024-408xx/CVE-2024-40831.json | 34 +- CVE-2024/CVE-2024-408xx/CVE-2024-40835.json | 22 +- CVE-2024/CVE-2024-415xx/CVE-2024-41587.json | 34 +- CVE-2024/CVE-2024-417xx/CVE-2024-41707.json | 12 +- CVE-2024/CVE-2024-428xx/CVE-2024-42861.json | 24 +- CVE-2024/CVE-2024-429xx/CVE-2024-42952.json | 34 +- CVE-2024/CVE-2024-432xx/CVE-2024-43202.json | 70 +++- CVE-2024/CVE-2024-433xx/CVE-2024-43304.json | 47 ++- CVE-2024/CVE-2024-437xx/CVE-2024-43770.json | 39 +- CVE-2024/CVE-2024-441xx/CVE-2024-44122.json | 34 +- CVE-2024/CVE-2024-441xx/CVE-2024-44142.json | 66 ++- CVE-2024/CVE-2024-443xx/CVE-2024-44313.json | 25 ++ CVE-2024/CVE-2024-443xx/CVE-2024-44314.json | 25 ++ CVE-2024/CVE-2024-44xx/CVE-2024-4469.json | 27 +- CVE-2024/CVE-2024-462xx/CVE-2024-46263.json | 34 +- CVE-2024/CVE-2024-462xx/CVE-2024-46267.json | 34 +- CVE-2024/CVE-2024-462xx/CVE-2024-46274.json | 34 +- CVE-2024/CVE-2024-465xx/CVE-2024-46535.json | 14 +- CVE-2024/CVE-2024-465xx/CVE-2024-46555.json | 34 +- CVE-2024/CVE-2024-465xx/CVE-2024-46556.json | 34 +- CVE-2024/CVE-2024-465xx/CVE-2024-46567.json | 34 +- CVE-2024/CVE-2024-465xx/CVE-2024-46583.json | 34 +- CVE-2024/CVE-2024-465xx/CVE-2024-46590.json | 34 +- CVE-2024/CVE-2024-465xx/CVE-2024-46598.json | 34 +- CVE-2024/CVE-2024-481xx/CVE-2024-48125.json | 39 +- CVE-2024/CVE-2024-497xx/CVE-2024-49737.json | 39 +- CVE-2024/CVE-2024-497xx/CVE-2024-49747.json | 39 +- CVE-2024/CVE-2024-498xx/CVE-2024-49822.json | 56 +++ CVE-2024/CVE-2024-49xx/CVE-2024-4970.json | 22 +- CVE-2024/CVE-2024-539xx/CVE-2024-53942.json | 39 +- CVE-2024/CVE-2024-545xx/CVE-2024-54537.json | 24 +- CVE-2024/CVE-2024-545xx/CVE-2024-54541.json | 34 +- CVE-2024/CVE-2024-547xx/CVE-2024-54730.json | 39 +- CVE-2024/CVE-2024-549xx/CVE-2024-54916.json | 39 +- CVE-2024/CVE-2024-549xx/CVE-2024-54929.json | 34 +- CVE-2024/CVE-2024-559xx/CVE-2024-55959.json | 39 +- CVE-2024/CVE-2024-563xx/CVE-2024-56312.json | 39 +- CVE-2024/CVE-2024-568xx/CVE-2024-56889.json | 39 +- CVE-2024/CVE-2024-570xx/CVE-2024-57014.json | 34 +- CVE-2024/CVE-2024-571xx/CVE-2024-57169.json | 21 + CVE-2024/CVE-2024-571xx/CVE-2024-57170.json | 21 + CVE-2024/CVE-2024-573xx/CVE-2024-57360.json | 39 +- CVE-2024/CVE-2024-574xx/CVE-2024-57479.json | 39 +- CVE-2024/CVE-2024-576xx/CVE-2024-57602.json | 34 +- CVE-2024/CVE-2024-576xx/CVE-2024-57669.json | 39 +- CVE-2024/CVE-2024-61xx/CVE-2024-6156.json | 14 +- CVE-2024/CVE-2024-93xx/CVE-2024-9397.json | 34 +- CVE-2025/CVE-2025-04xx/CVE-2025-0441.json | 39 +- CVE-2025/CVE-2025-22xx/CVE-2025-2200.json | 10 +- CVE-2025/CVE-2025-23xx/CVE-2025-2390.json | 14 +- CVE-2025/CVE-2025-23xx/CVE-2025-2393.json | 14 +- CVE-2025/CVE-2025-23xx/CVE-2025-2397.json | 14 +- CVE-2025/CVE-2025-23xx/CVE-2025-2398.json | 14 +- CVE-2025/CVE-2025-240xx/CVE-2025-24092.json | 39 +- CVE-2025/CVE-2025-241xx/CVE-2025-24103.json | 34 +- CVE-2025/CVE-2025-241xx/CVE-2025-24123.json | 24 +- CVE-2025/CVE-2025-241xx/CVE-2025-24162.json | 36 +- CVE-2025/CVE-2025-243xx/CVE-2025-24399.json | 39 +- CVE-2025/CVE-2025-248xx/CVE-2025-24813.json | 4 +- CVE-2025/CVE-2025-24xx/CVE-2025-2491.json | 141 +++++++ CVE-2025/CVE-2025-255xx/CVE-2025-25580.json | 21 + CVE-2025/CVE-2025-255xx/CVE-2025-25582.json | 21 + CVE-2025/CVE-2025-255xx/CVE-2025-25585.json | 21 + CVE-2025/CVE-2025-255xx/CVE-2025-25586.json | 21 + CVE-2025/CVE-2025-255xx/CVE-2025-25589.json | 21 + CVE-2025/CVE-2025-255xx/CVE-2025-25590.json | 21 + CVE-2025/CVE-2025-257xx/CVE-2025-25746.json | 34 +- CVE-2025/CVE-2025-258xx/CVE-2025-25897.json | 34 +- CVE-2025/CVE-2025-259xx/CVE-2025-25914.json | 43 +- CVE-2025/CVE-2025-276xx/CVE-2025-27688.json | 56 +++ CVE-2025/CVE-2025-294xx/CVE-2025-29429.json | 43 +- CVE-2025/CVE-2025-297xx/CVE-2025-29781.json | 12 +- CVE-2025/CVE-2025-301xx/CVE-2025-30107.json | 25 ++ CVE-2025/CVE-2025-301xx/CVE-2025-30109.json | 25 ++ CVE-2025/CVE-2025-301xx/CVE-2025-30110.json | 25 ++ CVE-2025/CVE-2025-301xx/CVE-2025-30111.json | 25 ++ CVE-2025/CVE-2025-301xx/CVE-2025-30113.json | 25 ++ CVE-2025/CVE-2025-301xx/CVE-2025-30114.json | 25 ++ CVE-2025/CVE-2025-301xx/CVE-2025-30115.json | 25 ++ CVE-2025/CVE-2025-301xx/CVE-2025-30116.json | 25 ++ CVE-2025/CVE-2025-301xx/CVE-2025-30117.json | 25 ++ CVE-2025/CVE-2025-301xx/CVE-2025-30122.json | 25 ++ CVE-2025/CVE-2025-301xx/CVE-2025-30123.json | 25 ++ CVE-2025/CVE-2025-301xx/CVE-2025-30132.json | 25 ++ README.md | 93 +++-- _state.csv | 431 +++++++++++--------- 189 files changed, 6794 insertions(+), 676 deletions(-) create mode 100644 CVE-2024/CVE-2024-443xx/CVE-2024-44313.json create mode 100644 CVE-2024/CVE-2024-443xx/CVE-2024-44314.json create mode 100644 CVE-2024/CVE-2024-498xx/CVE-2024-49822.json create mode 100644 CVE-2024/CVE-2024-571xx/CVE-2024-57169.json create mode 100644 CVE-2024/CVE-2024-571xx/CVE-2024-57170.json create mode 100644 CVE-2025/CVE-2025-24xx/CVE-2025-2491.json create mode 100644 CVE-2025/CVE-2025-255xx/CVE-2025-25580.json create mode 100644 CVE-2025/CVE-2025-255xx/CVE-2025-25582.json create mode 100644 CVE-2025/CVE-2025-255xx/CVE-2025-25585.json create mode 100644 CVE-2025/CVE-2025-255xx/CVE-2025-25586.json create mode 100644 CVE-2025/CVE-2025-255xx/CVE-2025-25589.json create mode 100644 CVE-2025/CVE-2025-255xx/CVE-2025-25590.json create mode 100644 CVE-2025/CVE-2025-276xx/CVE-2025-27688.json create mode 100644 CVE-2025/CVE-2025-301xx/CVE-2025-30107.json create mode 100644 CVE-2025/CVE-2025-301xx/CVE-2025-30109.json create mode 100644 CVE-2025/CVE-2025-301xx/CVE-2025-30110.json create mode 100644 CVE-2025/CVE-2025-301xx/CVE-2025-30111.json create mode 100644 CVE-2025/CVE-2025-301xx/CVE-2025-30113.json create mode 100644 CVE-2025/CVE-2025-301xx/CVE-2025-30114.json create mode 100644 CVE-2025/CVE-2025-301xx/CVE-2025-30115.json create mode 100644 CVE-2025/CVE-2025-301xx/CVE-2025-30116.json create mode 100644 CVE-2025/CVE-2025-301xx/CVE-2025-30117.json create mode 100644 CVE-2025/CVE-2025-301xx/CVE-2025-30122.json create mode 100644 CVE-2025/CVE-2025-301xx/CVE-2025-30123.json create mode 100644 CVE-2025/CVE-2025-301xx/CVE-2025-30132.json diff --git a/CVE-2012/CVE-2012-58xx/CVE-2012-5853.json b/CVE-2012/CVE-2012-58xx/CVE-2012-5853.json index f588fc461d9..5c4b6b0805f 100644 --- a/CVE-2012/CVE-2012-58xx/CVE-2012-5853.json +++ b/CVE-2012/CVE-2012-58xx/CVE-2012-5853.json @@ -2,8 +2,8 @@ "id": "CVE-2012-5853", "sourceIdentifier": "cve@mitre.org", "published": "2015-01-08T01:59:00.047", - "lastModified": "2024-11-21T01:45:22.210", - "vulnStatus": "Modified", + "lastModified": "2025-03-18T15:11:20.680", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -63,9 +63,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:ajax_search_project:ajax_search:*:*:*:*:*:wordpress:*:*", - "versionEndIncluding": "1.2", - "matchCriteriaId": "10D56DC4-CA26-4E5D-AD75-6EBD3957F973" + "criteria": "cpe:2.3:a:vinojcardoza:ajax_post_search:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.3", + "matchCriteriaId": "EAC3CE54-DBEF-40BE-BEB8-07296266B508" } ] } diff --git a/CVE-2018/CVE-2018-93xx/CVE-2018-9383.json b/CVE-2018/CVE-2018-93xx/CVE-2018-9383.json index 08d8b6ce5ce..b1b30249829 100644 --- a/CVE-2018/CVE-2018-93xx/CVE-2018-9383.json +++ b/CVE-2018/CVE-2018-93xx/CVE-2018-9383.json @@ -2,7 +2,7 @@ "id": "CVE-2018-9383", "sourceIdentifier": "security@android.com", "published": "2025-01-17T23:15:12.020", - "lastModified": "2025-02-18T21:15:12.823", + "lastModified": "2025-03-18T15:15:39.420", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "En asn1_ber_decoder de asn1_decoder.c, existe una posible lectura fuera de los l\u00edmites debido a una neutra. Esto podr\u00eda provocar la divulgaci\u00f3n de informaci\u00f3n local con privilegios de ejecuci\u00f3n de System necesarios. No se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 4.4, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 0.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], "references": [ { "url": "https://source.android.com/security/bulletin/pixel/2018-06-01", diff --git a/CVE-2021/CVE-2021-224xx/CVE-2021-22484.json b/CVE-2021/CVE-2021-224xx/CVE-2021-22484.json index acce365255e..36861e8abe8 100644 --- a/CVE-2021/CVE-2021-224xx/CVE-2021-22484.json +++ b/CVE-2021/CVE-2021-224xx/CVE-2021-22484.json @@ -2,8 +2,8 @@ "id": "CVE-2021-22484", "sourceIdentifier": "psirt@huawei.com", "published": "2024-12-28T07:15:18.723", - "lastModified": "2024-12-28T17:15:06.360", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-18T16:09:16.963", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -50,6 +70,16 @@ } ] }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -61,10 +91,30 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:harmonyos:2.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "20112231-B840-44D3-A061-B9B9F80EE378" + } + ] + } + ] + } + ], "references": [ { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-wearables-202108-0000001135186780", - "source": "psirt@huawei.com" + "source": "psirt@huawei.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-263xx/CVE-2021-26344.json b/CVE-2021/CVE-2021-263xx/CVE-2021-26344.json index fdcf093f32b..23005810a51 100644 --- a/CVE-2021/CVE-2021-263xx/CVE-2021-26344.json +++ b/CVE-2021/CVE-2021-263xx/CVE-2021-26344.json @@ -2,8 +2,8 @@ "id": "CVE-2021-26344", "sourceIdentifier": "psirt@amd.com", "published": "2024-08-13T17:15:17.113", - "lastModified": "2024-12-12T20:41:30.647", - "vulnStatus": "Analyzed", + "lastModified": "2025-03-18T16:15:12.347", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -69,6 +69,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2021/CVE-2021-370xx/CVE-2021-37000.json b/CVE-2021/CVE-2021-370xx/CVE-2021-37000.json index cc0d61f39cb..91460ea1efa 100644 --- a/CVE-2021/CVE-2021-370xx/CVE-2021-37000.json +++ b/CVE-2021/CVE-2021-370xx/CVE-2021-37000.json @@ -2,8 +2,8 @@ "id": "CVE-2021-37000", "sourceIdentifier": "psirt@huawei.com", "published": "2024-12-28T07:15:18.887", - "lastModified": "2024-12-28T17:15:06.793", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-18T16:30:48.110", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.5, "impactScore": 5.2 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -50,6 +70,16 @@ } ] }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -61,10 +91,30 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:huawei:harmonyos:2.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "20112231-B840-44D3-A061-B9B9F80EE378" + } + ] + } + ] + } + ], "references": [ { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-wearables-202108-0000001135186780", - "source": "psirt@huawei.com" + "source": "psirt@huawei.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-232xx/CVE-2022-23240.json b/CVE-2022/CVE-2022-232xx/CVE-2022-23240.json index 8fea2b2e4bb..f540d749dfc 100644 --- a/CVE-2022/CVE-2022-232xx/CVE-2022-23240.json +++ b/CVE-2022/CVE-2022-232xx/CVE-2022-23240.json @@ -2,7 +2,7 @@ "id": "CVE-2022-23240", "sourceIdentifier": "security-alert@netapp.com", "published": "2023-02-28T23:15:11.240", - "lastModified": "2024-11-21T06:48:15.080", + "lastModified": "2025-03-18T15:15:40.637", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "NVD-CWE-Other" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-259xx/CVE-2022-25978.json b/CVE-2022/CVE-2022-259xx/CVE-2022-25978.json index d8fa951839f..e7b77ea756a 100644 --- a/CVE-2022/CVE-2022-259xx/CVE-2022-25978.json +++ b/CVE-2022/CVE-2022-259xx/CVE-2022-25978.json @@ -2,7 +2,7 @@ "id": "CVE-2022-25978", "sourceIdentifier": "report@snyk.io", "published": "2023-02-15T05:15:11.540", - "lastModified": "2024-11-21T06:53:16.640", + "lastModified": "2025-03-18T16:15:12.627", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -79,6 +79,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-329xx/CVE-2022-32933.json b/CVE-2022/CVE-2022-329xx/CVE-2022-32933.json index 35cef1db2e0..0b1f07a54b6 100644 --- a/CVE-2022/CVE-2022-329xx/CVE-2022-32933.json +++ b/CVE-2022/CVE-2022-329xx/CVE-2022-32933.json @@ -2,7 +2,7 @@ "id": "CVE-2022-32933", "sourceIdentifier": "product-security@apple.com", "published": "2024-06-10T20:15:12.533", - "lastModified": "2024-11-21T07:07:15.917", + "lastModified": "2025-03-18T16:15:12.880", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 } ] }, @@ -49,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-382xx/CVE-2022-38220.json b/CVE-2022/CVE-2022-382xx/CVE-2022-38220.json index dfcc6d142c7..a431874ec02 100644 --- a/CVE-2022/CVE-2022-382xx/CVE-2022-38220.json +++ b/CVE-2022/CVE-2022-382xx/CVE-2022-38220.json @@ -2,7 +2,7 @@ "id": "CVE-2022-38220", "sourceIdentifier": "cve@mitre.org", "published": "2023-03-01T00:15:10.823", - "lastModified": "2024-11-21T07:16:04.727", + "lastModified": "2025-03-18T15:15:41.067", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-400xx/CVE-2022-40032.json b/CVE-2022/CVE-2022-400xx/CVE-2022-40032.json index d1a41bca84f..f9f7d0f30ba 100644 --- a/CVE-2022/CVE-2022-400xx/CVE-2022-40032.json +++ b/CVE-2022/CVE-2022-400xx/CVE-2022-40032.json @@ -2,7 +2,7 @@ "id": "CVE-2022-40032", "sourceIdentifier": "cve@mitre.org", "published": "2023-02-17T14:15:15.370", - "lastModified": "2024-11-21T07:20:45.390", + "lastModified": "2025-03-18T16:15:13.077", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-89" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-403xx/CVE-2022-40347.json b/CVE-2022/CVE-2022-403xx/CVE-2022-40347.json index b0314da9d77..3af067e4782 100644 --- a/CVE-2022/CVE-2022-403xx/CVE-2022-40347.json +++ b/CVE-2022/CVE-2022-403xx/CVE-2022-40347.json @@ -2,7 +2,7 @@ "id": "CVE-2022-40347", "sourceIdentifier": "cve@mitre.org", "published": "2023-02-17T13:15:10.650", - "lastModified": "2024-11-21T07:21:19.913", + "lastModified": "2025-03-18T16:15:13.300", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-89" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-442xx/CVE-2022-44216.json b/CVE-2022/CVE-2022-442xx/CVE-2022-44216.json index cbd6ab5166d..a9cd4d38d5b 100644 --- a/CVE-2022/CVE-2022-442xx/CVE-2022-44216.json +++ b/CVE-2022/CVE-2022-442xx/CVE-2022-44216.json @@ -2,7 +2,7 @@ "id": "CVE-2022-44216", "sourceIdentifier": "cve@mitre.org", "published": "2023-02-20T20:15:10.290", - "lastModified": "2024-11-21T07:27:45.847", + "lastModified": "2025-03-18T16:15:13.567", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-306" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-306" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-455xx/CVE-2022-45551.json b/CVE-2022/CVE-2022-455xx/CVE-2022-45551.json index cdb57f3b2da..965c909b480 100644 --- a/CVE-2022/CVE-2022-455xx/CVE-2022-45551.json +++ b/CVE-2022/CVE-2022-455xx/CVE-2022-45551.json @@ -2,7 +2,7 @@ "id": "CVE-2022-45551", "sourceIdentifier": "cve@mitre.org", "published": "2023-03-03T13:15:10.710", - "lastModified": "2024-11-21T07:29:26.427", + "lastModified": "2025-03-18T16:15:13.773", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-306" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-306" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-457xx/CVE-2022-45701.json b/CVE-2022/CVE-2022-457xx/CVE-2022-45701.json index a23739df85e..5c67586ceef 100644 --- a/CVE-2022/CVE-2022-457xx/CVE-2022-45701.json +++ b/CVE-2022/CVE-2022-457xx/CVE-2022-45701.json @@ -2,7 +2,7 @@ "id": "CVE-2022-45701", "sourceIdentifier": "cve@mitre.org", "published": "2023-02-17T15:15:12.080", - "lastModified": "2024-11-21T07:29:36.463", + "lastModified": "2025-03-18T16:15:14.017", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-45xx/CVE-2022-4550.json b/CVE-2022/CVE-2022-45xx/CVE-2022-4550.json index 62777015273..68131d62be3 100644 --- a/CVE-2022/CVE-2022-45xx/CVE-2022-4550.json +++ b/CVE-2022/CVE-2022-45xx/CVE-2022-4550.json @@ -2,7 +2,7 @@ "id": "CVE-2022-4550", "sourceIdentifier": "contact@wpscan.com", "published": "2023-02-27T16:15:11.117", - "lastModified": "2024-11-21T07:35:28.293", + "lastModified": "2025-03-18T15:15:42.087", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, diff --git a/CVE-2022/CVE-2022-46xx/CVE-2022-4679.json b/CVE-2022/CVE-2022-46xx/CVE-2022-4679.json index ca52e2bba20..2cf9e6bd17f 100644 --- a/CVE-2022/CVE-2022-46xx/CVE-2022-4679.json +++ b/CVE-2022/CVE-2022-46xx/CVE-2022-4679.json @@ -2,7 +2,7 @@ "id": "CVE-2022-4679", "sourceIdentifier": "contact@wpscan.com", "published": "2023-02-27T16:15:11.193", - "lastModified": "2024-11-21T07:35:43.277", + "lastModified": "2025-03-18T15:15:42.313", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, diff --git a/CVE-2022/CVE-2022-470xx/CVE-2022-47075.json b/CVE-2022/CVE-2022-470xx/CVE-2022-47075.json index 123561107a5..a30e213e215 100644 --- a/CVE-2022/CVE-2022-470xx/CVE-2022-47075.json +++ b/CVE-2022/CVE-2022-470xx/CVE-2022-47075.json @@ -2,7 +2,7 @@ "id": "CVE-2022-47075", "sourceIdentifier": "cve@mitre.org", "published": "2023-02-28T23:15:11.317", - "lastModified": "2024-11-21T07:31:28.243", + "lastModified": "2025-03-18T15:15:41.377", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, diff --git a/CVE-2022/CVE-2022-470xx/CVE-2022-47076.json b/CVE-2022/CVE-2022-470xx/CVE-2022-47076.json index 7f55331e9c0..ccd87d5f79a 100644 --- a/CVE-2022/CVE-2022-470xx/CVE-2022-47076.json +++ b/CVE-2022/CVE-2022-470xx/CVE-2022-47076.json @@ -2,7 +2,7 @@ "id": "CVE-2022-47076", "sourceIdentifier": "cve@mitre.org", "published": "2023-02-28T23:15:11.390", - "lastModified": "2024-11-21T07:31:28.403", + "lastModified": "2025-03-18T15:15:41.650", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, diff --git a/CVE-2022/CVE-2022-481xx/CVE-2022-48115.json b/CVE-2022/CVE-2022-481xx/CVE-2022-48115.json index 77782c27299..a421d3eaaa7 100644 --- a/CVE-2022/CVE-2022-481xx/CVE-2022-48115.json +++ b/CVE-2022/CVE-2022-481xx/CVE-2022-48115.json @@ -2,7 +2,7 @@ "id": "CVE-2022-48115", "sourceIdentifier": "cve@mitre.org", "published": "2023-02-17T22:15:11.907", - "lastModified": "2024-11-21T07:32:52.267", + "lastModified": "2025-03-18T16:15:14.220", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-483xx/CVE-2022-48329.json b/CVE-2022/CVE-2022-483xx/CVE-2022-48329.json index 5916be91d33..1629e14fa6d 100644 --- a/CVE-2022/CVE-2022-483xx/CVE-2022-48329.json +++ b/CVE-2022/CVE-2022-483xx/CVE-2022-48329.json @@ -2,7 +2,7 @@ "id": "CVE-2022-48329", "sourceIdentifier": "cve@mitre.org", "published": "2023-02-20T04:15:11.227", - "lastModified": "2024-11-21T07:33:10.770", + "lastModified": "2025-03-18T16:15:14.440", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-755" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-755" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-483xx/CVE-2022-48337.json b/CVE-2022/CVE-2022-483xx/CVE-2022-48337.json index 579da07ccb0..6923da5dccd 100644 --- a/CVE-2022/CVE-2022-483xx/CVE-2022-48337.json +++ b/CVE-2022/CVE-2022-483xx/CVE-2022-48337.json @@ -2,7 +2,7 @@ "id": "CVE-2022-48337", "sourceIdentifier": "cve@mitre.org", "published": "2023-02-20T23:15:12.243", - "lastModified": "2024-11-21T07:33:11.937", + "lastModified": "2025-03-18T16:15:14.647", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-78" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-483xx/CVE-2022-48338.json b/CVE-2022/CVE-2022-483xx/CVE-2022-48338.json index 37d3b385e06..308d99472db 100644 --- a/CVE-2022/CVE-2022-483xx/CVE-2022-48338.json +++ b/CVE-2022/CVE-2022-483xx/CVE-2022-48338.json @@ -2,7 +2,7 @@ "id": "CVE-2022-48338", "sourceIdentifier": "cve@mitre.org", "published": "2023-02-20T23:15:12.297", - "lastModified": "2024-11-21T07:33:12.090", + "lastModified": "2025-03-18T16:15:14.863", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.3, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.3, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.3, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-77" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-483xx/CVE-2022-48339.json b/CVE-2022/CVE-2022-483xx/CVE-2022-48339.json index bbd225f9612..266ba81fdc2 100644 --- a/CVE-2022/CVE-2022-483xx/CVE-2022-48339.json +++ b/CVE-2022/CVE-2022-483xx/CVE-2022-48339.json @@ -2,7 +2,7 @@ "id": "CVE-2022-48339", "sourceIdentifier": "cve@mitre.org", "published": "2023-02-20T23:15:12.350", - "lastModified": "2024-11-21T07:33:12.250", + "lastModified": "2025-03-18T16:15:15.070", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-116" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1116" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-01xx/CVE-2023-0168.json b/CVE-2023/CVE-2023-01xx/CVE-2023-0168.json index 33b4283051c..c0157680dab 100644 --- a/CVE-2023/CVE-2023-01xx/CVE-2023-0168.json +++ b/CVE-2023/CVE-2023-01xx/CVE-2023-0168.json @@ -2,7 +2,7 @@ "id": "CVE-2023-0168", "sourceIdentifier": "contact@wpscan.com", "published": "2023-02-27T16:15:11.657", - "lastModified": "2024-11-21T07:36:40.573", + "lastModified": "2025-03-18T15:15:42.527", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 } ] }, diff --git a/CVE-2023/CVE-2023-03xx/CVE-2023-0381.json b/CVE-2023/CVE-2023-03xx/CVE-2023-0381.json index 79dedd80f34..97b3a0d0e5e 100644 --- a/CVE-2023/CVE-2023-03xx/CVE-2023-0381.json +++ b/CVE-2023/CVE-2023-03xx/CVE-2023-0381.json @@ -2,7 +2,7 @@ "id": "CVE-2023-0381", "sourceIdentifier": "contact@wpscan.com", "published": "2023-02-27T16:15:12.123", - "lastModified": "2024-11-21T07:37:05.027", + "lastModified": "2025-03-18T15:15:42.723", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, diff --git a/CVE-2023/CVE-2023-04xx/CVE-2023-0482.json b/CVE-2023/CVE-2023-04xx/CVE-2023-0482.json index 769e1bddbf0..dc3556b423b 100644 --- a/CVE-2023/CVE-2023-04xx/CVE-2023-0482.json +++ b/CVE-2023/CVE-2023-04xx/CVE-2023-0482.json @@ -2,8 +2,8 @@ "id": "CVE-2023-0482", "sourceIdentifier": "secalert@redhat.com", "published": "2023-02-17T22:15:11.957", - "lastModified": "2025-02-10T13:12:32.147", - "vulnStatus": "Analyzed", + "lastModified": "2025-03-18T16:15:15.277", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -32,13 +32,33 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, "weaknesses": [ { "source": "secalert@redhat.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", @@ -48,13 +68,23 @@ }, { "source": "nvd@nist.gov", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-378" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-05xx/CVE-2023-0552.json b/CVE-2023/CVE-2023-05xx/CVE-2023-0552.json index 417dd99d940..f4a2c158648 100644 --- a/CVE-2023/CVE-2023-05xx/CVE-2023-0552.json +++ b/CVE-2023/CVE-2023-05xx/CVE-2023-0552.json @@ -2,7 +2,7 @@ "id": "CVE-2023-0552", "sourceIdentifier": "contact@wpscan.com", "published": "2023-02-27T16:15:12.610", - "lastModified": "2024-11-21T07:37:23.420", + "lastModified": "2025-03-18T15:15:43.027", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, diff --git a/CVE-2023/CVE-2023-10xx/CVE-2023-1095.json b/CVE-2023/CVE-2023-10xx/CVE-2023-1095.json index 2a4de1c0254..198cefed1a4 100644 --- a/CVE-2023/CVE-2023-10xx/CVE-2023-1095.json +++ b/CVE-2023/CVE-2023-10xx/CVE-2023-1095.json @@ -2,7 +2,7 @@ "id": "CVE-2023-1095", "sourceIdentifier": "secalert@redhat.com", "published": "2023-02-28T23:15:11.460", - "lastModified": "2024-11-21T07:38:26.880", + "lastModified": "2025-03-18T16:15:16.013", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, diff --git a/CVE-2023/CVE-2023-14xx/CVE-2023-1420.json b/CVE-2023/CVE-2023-14xx/CVE-2023-1420.json index d4c4fcdcef6..dc5adae6998 100644 --- a/CVE-2023/CVE-2023-14xx/CVE-2023-1420.json +++ b/CVE-2023/CVE-2023-14xx/CVE-2023-1420.json @@ -2,7 +2,7 @@ "id": "CVE-2023-1420", "sourceIdentifier": "contact@wpscan.com", "published": "2023-04-24T19:15:09.487", - "lastModified": "2025-02-04T19:15:28.020", + "lastModified": "2025-03-18T15:21:33.470", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -64,15 +64,15 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:ajax_search_project:ajax_search:*:*:*:*:lite:wordpress:*:*", + "criteria": "cpe:2.3:a:wp-dreams:ajax_search:*:*:*:*:lite:wordpress:*:*", "versionEndExcluding": "4.11.1", - "matchCriteriaId": "C1EC9E83-5D02-4720-AD12-AD7BCE6F9F9A" + "matchCriteriaId": "29EAA46F-7186-4BE1-8F19-E262D67836FF" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:ajax_search_project:ajax_search:*:*:*:*:pro:wordpress:*:*", + "criteria": "cpe:2.3:a:wp-dreams:ajax_search:*:*:*:*:pro:wordpress:*:*", "versionEndExcluding": "4.26.2", - "matchCriteriaId": "87EE2C87-BD59-4699-A6C7-3E0FA82B5B94" + "matchCriteriaId": "BE3EA907-24EB-4CAF-9E37-F91810823565" } ] } diff --git a/CVE-2023/CVE-2023-14xx/CVE-2023-1435.json b/CVE-2023/CVE-2023-14xx/CVE-2023-1435.json index be63bff6ca6..776c6b3dc8a 100644 --- a/CVE-2023/CVE-2023-14xx/CVE-2023-1435.json +++ b/CVE-2023/CVE-2023-14xx/CVE-2023-1435.json @@ -2,7 +2,7 @@ "id": "CVE-2023-1435", "sourceIdentifier": "contact@wpscan.com", "published": "2023-04-24T19:15:09.560", - "lastModified": "2025-02-04T17:15:10.380", + "lastModified": "2025-03-18T15:21:33.470", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -64,9 +64,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:ajax_search_project:ajax_search:*:*:*:*:pro:wordpress:*:*", + "criteria": "cpe:2.3:a:wp-dreams:ajax_search:*:*:*:*:pro:wordpress:*:*", "versionEndExcluding": "4.26.2", - "matchCriteriaId": "87EE2C87-BD59-4699-A6C7-3E0FA82B5B94" + "matchCriteriaId": "BE3EA907-24EB-4CAF-9E37-F91810823565" } ] } diff --git a/CVE-2023/CVE-2023-209xx/CVE-2023-20948.json b/CVE-2023/CVE-2023-209xx/CVE-2023-20948.json index 3eec1cfa95d..eb7b4003439 100644 --- a/CVE-2023/CVE-2023-209xx/CVE-2023-20948.json +++ b/CVE-2023/CVE-2023-209xx/CVE-2023-20948.json @@ -2,7 +2,7 @@ "id": "CVE-2023-20948", "sourceIdentifier": "security@android.com", "published": "2023-02-28T17:15:11.147", - "lastModified": "2024-11-21T07:41:52.527", + "lastModified": "2025-03-18T16:15:16.227", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-125" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-230xx/CVE-2023-23007.json b/CVE-2023/CVE-2023-230xx/CVE-2023-23007.json index 4d56e77a875..061791b6e7a 100644 --- a/CVE-2023/CVE-2023-230xx/CVE-2023-23007.json +++ b/CVE-2023/CVE-2023-230xx/CVE-2023-23007.json @@ -2,7 +2,7 @@ "id": "CVE-2023-23007", "sourceIdentifier": "cve@mitre.org", "published": "2023-02-17T16:15:10.997", - "lastModified": "2024-11-21T07:45:47.323", + "lastModified": "2025-03-18T16:15:16.440", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-89" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-234xx/CVE-2023-23452.json b/CVE-2023/CVE-2023-234xx/CVE-2023-23452.json index 97aee3afb43..76c569f8c7e 100644 --- a/CVE-2023/CVE-2023-234xx/CVE-2023-23452.json +++ b/CVE-2023/CVE-2023-234xx/CVE-2023-23452.json @@ -2,7 +2,7 @@ "id": "CVE-2023-23452", "sourceIdentifier": "psirt@sick.de", "published": "2023-02-20T23:15:12.447", - "lastModified": "2024-11-21T07:46:13.673", + "lastModified": "2025-03-18T15:15:44.050", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -55,6 +75,16 @@ "value": "CWE-306" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-306" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-234xx/CVE-2023-23453.json b/CVE-2023/CVE-2023-234xx/CVE-2023-23453.json index bbdcb911261..d949fe42855 100644 --- a/CVE-2023/CVE-2023-234xx/CVE-2023-23453.json +++ b/CVE-2023/CVE-2023-234xx/CVE-2023-23453.json @@ -2,7 +2,7 @@ "id": "CVE-2023-23453", "sourceIdentifier": "psirt@sick.de", "published": "2023-02-20T23:15:12.517", - "lastModified": "2024-11-21T07:46:13.790", + "lastModified": "2025-03-18T15:15:44.323", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -55,6 +75,16 @@ "value": "CWE-306" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-306" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-235xx/CVE-2023-23524.json b/CVE-2023/CVE-2023-235xx/CVE-2023-23524.json index 12d93bf40a6..0fe6a574af0 100644 --- a/CVE-2023/CVE-2023-235xx/CVE-2023-23524.json +++ b/CVE-2023/CVE-2023-235xx/CVE-2023-23524.json @@ -2,7 +2,7 @@ "id": "CVE-2023-23524", "sourceIdentifier": "product-security@apple.com", "published": "2023-02-27T20:15:14.640", - "lastModified": "2024-11-21T07:46:21.153", + "lastModified": "2025-03-18T15:15:44.563", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-400" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-235xx/CVE-2023-23530.json b/CVE-2023/CVE-2023-235xx/CVE-2023-23530.json index cb39870d41a..19e722708ec 100644 --- a/CVE-2023/CVE-2023-235xx/CVE-2023-23530.json +++ b/CVE-2023/CVE-2023-235xx/CVE-2023-23530.json @@ -2,7 +2,7 @@ "id": "CVE-2023-23530", "sourceIdentifier": "product-security@apple.com", "published": "2023-02-27T20:15:14.773", - "lastModified": "2024-11-21T07:46:21.827", + "lastModified": "2025-03-18T15:15:44.803", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 6.0 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", + "baseScore": 8.6, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 6.0 } ] }, diff --git a/CVE-2023/CVE-2023-241xx/CVE-2023-24104.json b/CVE-2023/CVE-2023-241xx/CVE-2023-24104.json index 84b9255d81e..f9652169d64 100644 --- a/CVE-2023/CVE-2023-241xx/CVE-2023-24104.json +++ b/CVE-2023/CVE-2023-241xx/CVE-2023-24104.json @@ -2,7 +2,7 @@ "id": "CVE-2023-24104", "sourceIdentifier": "cve@mitre.org", "published": "2023-02-23T16:15:11.630", - "lastModified": "2024-11-21T07:47:24.257", + "lastModified": "2025-03-18T15:15:45.040", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, diff --git a/CVE-2023/CVE-2023-241xx/CVE-2023-24114.json b/CVE-2023/CVE-2023-241xx/CVE-2023-24114.json index d111ced41e4..4a09b48807c 100644 --- a/CVE-2023/CVE-2023-241xx/CVE-2023-24114.json +++ b/CVE-2023/CVE-2023-241xx/CVE-2023-24114.json @@ -2,7 +2,7 @@ "id": "CVE-2023-24114", "sourceIdentifier": "cve@mitre.org", "published": "2023-02-22T21:15:11.503", - "lastModified": "2024-11-21T07:47:24.707", + "lastModified": "2025-03-18T15:15:45.287", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-241xx/CVE-2023-24122.json b/CVE-2023/CVE-2023-241xx/CVE-2023-24122.json index 69af8b71b6d..30e0f1169ad 100644 --- a/CVE-2023/CVE-2023-241xx/CVE-2023-24122.json +++ b/CVE-2023/CVE-2023-241xx/CVE-2023-24122.json @@ -2,7 +2,7 @@ "id": "CVE-2023-24122", "sourceIdentifier": "cve@mitre.org", "published": "2023-03-01T21:15:11.057", - "lastModified": "2024-11-21T07:47:25.567", + "lastModified": "2025-03-18T16:15:16.760", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-241xx/CVE-2023-24123.json b/CVE-2023/CVE-2023-241xx/CVE-2023-24123.json index 6c2b6fe6368..b59f5bbeb4b 100644 --- a/CVE-2023/CVE-2023-241xx/CVE-2023-24123.json +++ b/CVE-2023/CVE-2023-241xx/CVE-2023-24123.json @@ -2,7 +2,7 @@ "id": "CVE-2023-24123", "sourceIdentifier": "cve@mitre.org", "published": "2023-03-01T21:15:11.117", - "lastModified": "2024-11-21T07:47:25.717", + "lastModified": "2025-03-18T16:15:16.987", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-241xx/CVE-2023-24124.json b/CVE-2023/CVE-2023-241xx/CVE-2023-24124.json index 2836675212e..3557f848d6e 100644 --- a/CVE-2023/CVE-2023-241xx/CVE-2023-24124.json +++ b/CVE-2023/CVE-2023-241xx/CVE-2023-24124.json @@ -2,7 +2,7 @@ "id": "CVE-2023-24124", "sourceIdentifier": "cve@mitre.org", "published": "2023-03-01T21:15:11.177", - "lastModified": "2024-11-21T07:47:25.863", + "lastModified": "2025-03-18T16:15:17.197", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-243xx/CVE-2023-24320.json b/CVE-2023/CVE-2023-243xx/CVE-2023-24320.json index 6f350f65db1..c2a03c9c884 100644 --- a/CVE-2023/CVE-2023-243xx/CVE-2023-24320.json +++ b/CVE-2023/CVE-2023-243xx/CVE-2023-24320.json @@ -2,7 +2,7 @@ "id": "CVE-2023-24320", "sourceIdentifier": "cve@mitre.org", "published": "2023-02-21T22:15:10.557", - "lastModified": "2024-11-21T07:47:40.207", + "lastModified": "2025-03-18T15:15:45.527", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "NVD-CWE-Other" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] } ], "configurations": [ @@ -90,6 +120,10 @@ { "url": "https://yuyudhn.github.io/CVE-2023-24320/", "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://yuyudhn.github.io/CVE-2023-24320/", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-243xx/CVE-2023-24369.json b/CVE-2023/CVE-2023-243xx/CVE-2023-24369.json index 9d0eb3f4f3f..8a60cd605ad 100644 --- a/CVE-2023/CVE-2023-243xx/CVE-2023-24369.json +++ b/CVE-2023/CVE-2023-243xx/CVE-2023-24369.json @@ -2,7 +2,7 @@ "id": "CVE-2023-24369", "sourceIdentifier": "cve@mitre.org", "published": "2023-02-17T17:15:11.857", - "lastModified": "2024-11-21T07:47:43.847", + "lastModified": "2025-03-18T16:15:17.417", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-247xx/CVE-2023-24769.json b/CVE-2023/CVE-2023-247xx/CVE-2023-24769.json index ef187bbaa28..5c76bb1954c 100644 --- a/CVE-2023/CVE-2023-247xx/CVE-2023-24769.json +++ b/CVE-2023/CVE-2023-247xx/CVE-2023-24769.json @@ -2,7 +2,7 @@ "id": "CVE-2023-24769", "sourceIdentifier": "cve@mitre.org", "published": "2023-02-17T22:15:14.407", - "lastModified": "2024-11-21T07:48:23.303", + "lastModified": "2025-03-18T16:15:17.883", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-247xx/CVE-2023-24785.json b/CVE-2023/CVE-2023-247xx/CVE-2023-24785.json index cb70ed462d0..89789f0284c 100644 --- a/CVE-2023/CVE-2023-247xx/CVE-2023-24785.json +++ b/CVE-2023/CVE-2023-247xx/CVE-2023-24785.json @@ -2,7 +2,7 @@ "id": "CVE-2023-24785", "sourceIdentifier": "cve@mitre.org", "published": "2023-02-17T18:15:12.127", - "lastModified": "2024-11-21T07:48:24.490", + "lastModified": "2025-03-18T16:15:18.153", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-770" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-770" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-252xx/CVE-2023-25264.json b/CVE-2023/CVE-2023-252xx/CVE-2023-25264.json index ef18d636800..e8b051a001d 100644 --- a/CVE-2023/CVE-2023-252xx/CVE-2023-25264.json +++ b/CVE-2023/CVE-2023-252xx/CVE-2023-25264.json @@ -2,7 +2,7 @@ "id": "CVE-2023-25264", "sourceIdentifier": "cve@mitre.org", "published": "2023-02-28T16:15:09.157", - "lastModified": "2024-11-21T07:49:22.163", + "lastModified": "2025-03-18T16:15:18.437", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-287" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-287" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-252xx/CVE-2023-25265.json b/CVE-2023/CVE-2023-252xx/CVE-2023-25265.json index 0929f30452d..1c5d84b6d13 100644 --- a/CVE-2023/CVE-2023-252xx/CVE-2023-25265.json +++ b/CVE-2023/CVE-2023-252xx/CVE-2023-25265.json @@ -2,7 +2,7 @@ "id": "CVE-2023-25265", "sourceIdentifier": "cve@mitre.org", "published": "2023-02-28T16:15:09.237", - "lastModified": "2024-11-21T07:49:22.303", + "lastModified": "2025-03-18T16:15:18.710", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-22" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-252xx/CVE-2023-25266.json b/CVE-2023/CVE-2023-252xx/CVE-2023-25266.json index f096a8626e7..8761130e282 100644 --- a/CVE-2023/CVE-2023-252xx/CVE-2023-25266.json +++ b/CVE-2023/CVE-2023-252xx/CVE-2023-25266.json @@ -2,7 +2,7 @@ "id": "CVE-2023-25266", "sourceIdentifier": "cve@mitre.org", "published": "2023-02-28T16:15:09.297", - "lastModified": "2024-11-21T07:49:22.433", + "lastModified": "2025-03-18T16:15:19.013", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, diff --git a/CVE-2023/CVE-2023-254xx/CVE-2023-25431.json b/CVE-2023/CVE-2023-254xx/CVE-2023-25431.json index 1d180af2c4e..5e6db8d1cfd 100644 --- a/CVE-2023/CVE-2023-254xx/CVE-2023-25431.json +++ b/CVE-2023/CVE-2023-254xx/CVE-2023-25431.json @@ -2,7 +2,7 @@ "id": "CVE-2023-25431", "sourceIdentifier": "cve@mitre.org", "published": "2023-02-28T18:15:10.393", - "lastModified": "2024-11-21T07:49:30.000", + "lastModified": "2025-03-18T16:15:19.330", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.7, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-256xx/CVE-2023-25621.json b/CVE-2023/CVE-2023-256xx/CVE-2023-25621.json index 7caa659e14a..e0e644d52ae 100644 --- a/CVE-2023/CVE-2023-256xx/CVE-2023-25621.json +++ b/CVE-2023/CVE-2023-256xx/CVE-2023-25621.json @@ -2,7 +2,7 @@ "id": "CVE-2023-25621", "sourceIdentifier": "security@apache.org", "published": "2023-02-23T09:15:10.023", - "lastModified": "2024-11-21T07:49:50.890", + "lastModified": "2025-03-18T15:15:45.757", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, diff --git a/CVE-2023/CVE-2023-260xx/CVE-2023-26081.json b/CVE-2023/CVE-2023-260xx/CVE-2023-26081.json index e8df3c3d39d..91b15ed3de8 100644 --- a/CVE-2023/CVE-2023-260xx/CVE-2023-26081.json +++ b/CVE-2023/CVE-2023-260xx/CVE-2023-26081.json @@ -2,7 +2,7 @@ "id": "CVE-2023-26081", "sourceIdentifier": "cve@mitre.org", "published": "2023-02-20T03:15:10.313", - "lastModified": "2024-11-21T07:50:44.520", + "lastModified": "2025-03-18T15:15:45.960", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-668" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-668" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-262xx/CVE-2023-26255.json b/CVE-2023/CVE-2023-262xx/CVE-2023-26255.json index 45d26bb5141..23e82e5631f 100644 --- a/CVE-2023/CVE-2023-262xx/CVE-2023-26255.json +++ b/CVE-2023/CVE-2023-262xx/CVE-2023-26255.json @@ -2,7 +2,7 @@ "id": "CVE-2023-26255", "sourceIdentifier": "cve@mitre.org", "published": "2023-02-28T16:15:09.447", - "lastModified": "2024-11-21T07:50:59.180", + "lastModified": "2025-03-18T16:15:19.610", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-22" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-344xx/CVE-2023-34401.json b/CVE-2023/CVE-2023-344xx/CVE-2023-34401.json index ab5dbd6d0c0..cb49d2521a6 100644 --- a/CVE-2023/CVE-2023-344xx/CVE-2023-34401.json +++ b/CVE-2023/CVE-2023-344xx/CVE-2023-34401.json @@ -2,7 +2,7 @@ "id": "CVE-2023-34401", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-13T23:15:08.867", - "lastModified": "2025-02-13T23:15:08.867", + "lastModified": "2025-03-18T16:15:19.893", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "La unidad principal NTG6 de Mercedes-Benz contiene funciones para importar o exportar configuraciones de perfil a trav\u00e9s de USB. Dentro de la carpeta de perfil hay un archivo codificado con el c\u00f3dec propietario UD2. Debido a que no se realizan comprobaciones de tama\u00f1o en el archivo encapsulado, el atacante puede lograr una lectura fuera de los l\u00edmites en la memoria del mont\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N", + "baseScore": 3.7, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.2, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], "references": [ { "url": "https://securelist.com/mercedes-benz-head-unit-security-research/115218/", diff --git a/CVE-2023/CVE-2023-366xx/CVE-2023-36681.json b/CVE-2023/CVE-2023-366xx/CVE-2023-36681.json index f157e1bc9c6..d4bc9530381 100644 --- a/CVE-2023/CVE-2023-366xx/CVE-2023-36681.json +++ b/CVE-2023/CVE-2023-366xx/CVE-2023-36681.json @@ -2,8 +2,8 @@ "id": "CVE-2023-36681", "sourceIdentifier": "audit@patchstack.com", "published": "2024-12-13T15:15:17.880", - "lastModified": "2024-12-13T15:15:17.880", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-18T15:29:53.393", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:coolplugins:cryptocurrency_widgets:*:*:*:*:free:wordpress:*:*", + "versionEndExcluding": "2.6.3", + "matchCriteriaId": "EA692232-0CA4-4283-8710-51CD66C46770" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/wordpress/plugin/cryptocurrency-price-ticker-widget/vulnerability/wordpress-cryptocurrency-widgets-price-ticker-coins-list-plugin-2-6-2-broken-access-control-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-401xx/CVE-2023-40108.json b/CVE-2023/CVE-2023-401xx/CVE-2023-40108.json index 3d6392f7771..f2443039816 100644 --- a/CVE-2023/CVE-2023-401xx/CVE-2023-40108.json +++ b/CVE-2023/CVE-2023-401xx/CVE-2023-40108.json @@ -2,7 +2,7 @@ "id": "CVE-2023-40108", "sourceIdentifier": "security@android.com", "published": "2025-01-21T23:15:11.320", - "lastModified": "2025-02-18T21:15:19.560", + "lastModified": "2025-03-18T15:15:46.217", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "En varias ubicaciones, existe una forma posible de acceder al contenido multimedia que pertenece a otro usuario debido a la falta de verificaci\u00f3n de permisos. Esto podr\u00eda provocar la divulgaci\u00f3n de informaci\u00f3n local sin necesidad de privilegios de ejecuci\u00f3n adicionales. No se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], "references": [ { "url": "https://source.android.com/security/bulletin/2025-01-01", diff --git a/CVE-2023/CVE-2023-517xx/CVE-2023-51787.json b/CVE-2023/CVE-2023-517xx/CVE-2023-51787.json index 4ca15d68a1a..0866a3c65fe 100644 --- a/CVE-2023/CVE-2023-517xx/CVE-2023-51787.json +++ b/CVE-2023/CVE-2023-517xx/CVE-2023-51787.json @@ -2,7 +2,7 @@ "id": "CVE-2023-51787", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-15T06:15:46.067", - "lastModified": "2024-11-21T08:38:48.577", + "lastModified": "2025-03-18T15:15:46.463", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], "references": [ { "url": "https://support2.windriver.com/index.php?page=cve&on=view&id=CVE-2023-51787", diff --git a/CVE-2023/CVE-2023-61xx/CVE-2023-6123.json b/CVE-2023/CVE-2023-61xx/CVE-2023-6123.json index a7a3293faf7..21d4203fcd8 100644 --- a/CVE-2023/CVE-2023-61xx/CVE-2023-6123.json +++ b/CVE-2023/CVE-2023-61xx/CVE-2023-6123.json @@ -2,8 +2,8 @@ "id": "CVE-2023-6123", "sourceIdentifier": "security@opentext.com", "published": "2024-02-15T21:15:08.500", - "lastModified": "2024-12-18T17:32:47.300", - "vulnStatus": "Analyzed", + "lastModified": "2025-03-18T15:15:46.680", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -69,6 +69,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-707" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-07xx/CVE-2024-0709.json b/CVE-2024/CVE-2024-07xx/CVE-2024-0709.json index ecad34569ea..f1469733a51 100644 --- a/CVE-2024/CVE-2024-07xx/CVE-2024-0709.json +++ b/CVE-2024/CVE-2024-07xx/CVE-2024-0709.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0709", "sourceIdentifier": "security@wordfence.com", "published": "2024-02-05T22:16:04.553", - "lastModified": "2024-11-21T08:47:11.277", - "vulnStatus": "Modified", + "lastModified": "2025-03-18T15:33:26.187", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,10 +80,10 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:coolplugins:cryptocurrency_widgets:*:*:*:*:*:wordpress:*:*", + "criteria": "cpe:2.3:a:coolplugins:cryptocurrency_widgets:*:*:*:*:free:wordpress:*:*", "versionStartIncluding": "2.0", "versionEndIncluding": "2.6.5", - "matchCriteriaId": "B5C1CD91-B13B-4EBA-8287-D2F287E51F3B" + "matchCriteriaId": "454760FF-E8EF-42DD-A2F8-D817CB39F2C3" } ] } diff --git a/CVE-2024/CVE-2024-114xx/CVE-2024-11482.json b/CVE-2024/CVE-2024-114xx/CVE-2024-11482.json index 6ed3f1d7f68..6061bdc2621 100644 --- a/CVE-2024/CVE-2024-114xx/CVE-2024-11482.json +++ b/CVE-2024/CVE-2024-114xx/CVE-2024-11482.json @@ -2,7 +2,7 @@ "id": "CVE-2024-11482", "sourceIdentifier": "trellixpsirt@trellix.com", "published": "2024-11-29T08:15:04.437", - "lastModified": "2024-11-29T08:15:04.437", + "lastModified": "2025-03-18T15:15:46.897", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -55,6 +55,10 @@ { "url": "https://thrive.trellix.com/s/article/000014058#h2_0", "source": "trellixpsirt@trellix.com" + }, + { + "url": "https://hackerone.com/reports/2817658", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-209xx/CVE-2024-20927.json b/CVE-2024/CVE-2024-209xx/CVE-2024-20927.json index b924d81bd49..58e0033c1ca 100644 --- a/CVE-2024/CVE-2024-209xx/CVE-2024-20927.json +++ b/CVE-2024/CVE-2024-209xx/CVE-2024-20927.json @@ -2,8 +2,8 @@ "id": "CVE-2024-20927", "sourceIdentifier": "secalert_us@oracle.com", "published": "2024-02-17T02:15:47.420", - "lastModified": "2024-11-29T14:08:26.950", - "vulnStatus": "Analyzed", + "lastModified": "2025-03-18T16:15:20.147", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secalert_us@oracle.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N", @@ -49,6 +49,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-210xx/CVE-2024-21006.json b/CVE-2024/CVE-2024-210xx/CVE-2024-21006.json index f44dd95bc2e..b83cf2de1d4 100644 --- a/CVE-2024/CVE-2024-210xx/CVE-2024-21006.json +++ b/CVE-2024/CVE-2024-210xx/CVE-2024-21006.json @@ -2,8 +2,8 @@ "id": "CVE-2024-21006", "sourceIdentifier": "secalert_us@oracle.com", "published": "2024-04-16T22:15:14.580", - "lastModified": "2024-11-27T16:36:05.623", - "vulnStatus": "Analyzed", + "lastModified": "2025-03-18T15:15:47.150", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secalert_us@oracle.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", @@ -49,6 +49,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-306" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-210xx/CVE-2024-21055.json b/CVE-2024/CVE-2024-210xx/CVE-2024-21055.json index 43e839b92ee..6badd170a84 100644 --- a/CVE-2024/CVE-2024-210xx/CVE-2024-21055.json +++ b/CVE-2024/CVE-2024-210xx/CVE-2024-21055.json @@ -2,8 +2,8 @@ "id": "CVE-2024-21055", "sourceIdentifier": "secalert_us@oracle.com", "published": "2024-04-16T22:15:23.010", - "lastModified": "2024-12-06T16:46:49.543", - "vulnStatus": "Analyzed", + "lastModified": "2025-03-18T16:15:20.353", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secalert_us@oracle.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", @@ -49,6 +49,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-211xx/CVE-2024-21142.json b/CVE-2024/CVE-2024-211xx/CVE-2024-21142.json index 7140dc09fa4..82222c62783 100644 --- a/CVE-2024/CVE-2024-211xx/CVE-2024-21142.json +++ b/CVE-2024/CVE-2024-211xx/CVE-2024-21142.json @@ -2,7 +2,7 @@ "id": "CVE-2024-21142", "sourceIdentifier": "secalert_us@oracle.com", "published": "2024-07-16T23:15:15.407", - "lastModified": "2024-11-21T08:53:51.993", + "lastModified": "2025-03-18T15:15:47.363", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secalert_us@oracle.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", @@ -49,6 +49,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-211xx/CVE-2024-21185.json b/CVE-2024/CVE-2024-211xx/CVE-2024-21185.json index 94ded7ea3b9..4131de2b810 100644 --- a/CVE-2024/CVE-2024-211xx/CVE-2024-21185.json +++ b/CVE-2024/CVE-2024-211xx/CVE-2024-21185.json @@ -2,7 +2,7 @@ "id": "CVE-2024-21185", "sourceIdentifier": "secalert_us@oracle.com", "published": "2024-07-16T23:15:23.260", - "lastModified": "2024-11-21T08:53:57.030", + "lastModified": "2025-03-18T16:15:20.577", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secalert_us@oracle.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", @@ -49,6 +49,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-225xx/CVE-2024-22525.json b/CVE-2024/CVE-2024-225xx/CVE-2024-22525.json index 2f7447356ea..2175e367f1e 100644 --- a/CVE-2024/CVE-2024-225xx/CVE-2024-22525.json +++ b/CVE-2024/CVE-2024-225xx/CVE-2024-22525.json @@ -2,7 +2,7 @@ "id": "CVE-2024-22525", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-06T22:15:10.127", - "lastModified": "2024-11-21T08:56:24.373", + "lastModified": "2025-03-18T16:15:20.850", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-476" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-237xx/CVE-2024-23737.json b/CVE-2024/CVE-2024-237xx/CVE-2024-23737.json index 2e41e5eb3a9..4855699319c 100644 --- a/CVE-2024/CVE-2024-237xx/CVE-2024-23737.json +++ b/CVE-2024/CVE-2024-237xx/CVE-2024-23737.json @@ -2,7 +2,7 @@ "id": "CVE-2024-23737", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-01T22:15:02.857", - "lastModified": "2024-11-21T08:58:16.923", + "lastModified": "2025-03-18T15:15:47.677", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.5 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-352" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-257xx/CVE-2024-25734.json b/CVE-2024/CVE-2024-257xx/CVE-2024-25734.json index 06763eeb921..b88aa05055d 100644 --- a/CVE-2024/CVE-2024-257xx/CVE-2024-25734.json +++ b/CVE-2024/CVE-2024-257xx/CVE-2024-25734.json @@ -2,7 +2,7 @@ "id": "CVE-2024-25734", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-27T03:15:12.077", - "lastModified": "2024-11-21T09:01:17.837", + "lastModified": "2025-03-18T15:15:47.980", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se descubri\u00f3 un problema en dispositivos WyreStorm Apollo VX20 anteriores a la versi\u00f3n 1.3.58. El servicio TELNET solicita una contrase\u00f1a s\u00f3lo despu\u00e9s de introducir un nombre de usuario v\u00e1lido, lo que podr\u00eda facilitar a atacantes remotos la enumeraci\u00f3n de cuentas de usuario." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], "references": [ { "url": "http://packetstormsecurity.com/files/177081", diff --git a/CVE-2024/CVE-2024-267xx/CVE-2024-26746.json b/CVE-2024/CVE-2024-267xx/CVE-2024-26746.json index cc130d4c3dd..c40d2d242c7 100644 --- a/CVE-2024/CVE-2024-267xx/CVE-2024-26746.json +++ b/CVE-2024/CVE-2024-267xx/CVE-2024-26746.json @@ -2,8 +2,8 @@ "id": "CVE-2024-26746", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-04T09:15:07.783", - "lastModified": "2024-11-21T09:02:58.613", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-18T16:45:08.557", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,31 +15,140 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: dmaengine: idxd: garantiza una copia segura del registro de finalizaci\u00f3n para el usuario. Si CONFIG_HARDENED_USERCOPY est\u00e1 habilitado, copiar el registro de finalizaci\u00f3n desde la cach\u00e9 del registro de eventos al usuario desencadena un error en el kernel. [ 1987.159822] usercopy: Kernel memory exposure attempt detected from SLUB object 'dsa0' (offset 74, size 31)! [ 1987.170845] ------------[ cut here ]------------ [ 1987.176086] kernel BUG at mm/usercopy.c:102! [ 1987.180946] invalid opcode: 0000 [#1] PREEMPT SMP NOPTI [ 1987.186866] CPU: 17 PID: 528 Comm: kworker/17:1 Not tainted 6.8.0-rc2+ #5 [ 1987.194537] Hardware name: Intel Corporation AvenueCity/AvenueCity, BIOS BHSDCRB1.86B.2492.D03.2307181620 07/18/2023 [ 1987.206405] Workqueue: wq0.0 idxd_evl_fault_work [idxd] [ 1987.212338] RIP: 0010:usercopy_abort+0x72/0x90 [ 1987.217381] Code: 58 65 9c 50 48 c7 c2 17 85 61 9c 57 48 c7 c7 98 fd 6b 9c 48 0f 44 d6 48 c7 c6 b3 08 62 9c 4c 89 d1 49 0f 44 f3 e8 1e 2e d5 ff <0f> 0b 49 c7 c1 9e 42 61 9c 4c 89 cf 4d 89 c8 eb a9 66 66 2e 0f 1f [ 1987.238505] RSP: 0018:ff62f5cf20607d60 EFLAGS: 00010246 [ 1987.244423] RAX: 000000000000005f RBX: 000000000000001f RCX: 0000000000000000 [ 1987.252480] RDX: 0000000000000000 RSI: ffffffff9c61429e RDI: 00000000ffffffff [ 1987.260538] RBP: ff62f5cf20607d78 R08: ff2a6a89ef3fffe8 R09: 00000000fffeffff [ 1987.268595] R10: ff2a6a89eed00000 R11: 0000000000000003 R12: ff2a66934849c89a [ 1987.276652] R13: 0000000000000001 R14: ff2a66934849c8b9 R15: ff2a66934849c899 [ 1987.284710] FS: 0000000000000000(0000) GS:ff2a66b22fe40000(0000) knlGS:0000000000000000 [ 1987.293850] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1987.300355] CR2: 00007fe291a37000 CR3: 000000010fbd4005 CR4: 0000000000f71ef0 [ 1987.308413] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1987.316470] DR3: 0000000000000000 DR6: 00000000fffe07f0 DR7: 0000000000000400 [ 1987.324527] PKRU: 55555554 [ 1987.327622] Call Trace: [ 1987.330424] [ 1987.332826] ? show_regs+0x6e/0x80 [ 1987.336703] ? die+0x3c/0xa0 [ 1987.339988] ? do_trap+0xd4/0xf0 [ 1987.343662] ? do_error_trap+0x75/0xa0 [ 1987.347922] ? usercopy_abort+0x72/0x90 [ 1987.352277] ? exc_invalid_op+0x57/0x80 [ 1987.356634] ? usercopy_abort+0x72/0x90 [ 1987.360988] ? asm_exc_invalid_op+0x1f/0x30 [ 1987.365734] ? usercopy_abort+0x72/0x90 [ 1987.370088] __check_heap_object+0xb7/0xd0 [ 1987.374739] __check_object_size+0x175/0x2d0 [ 1987.379588] idxd_copy_cr+0xa9/0x130 [idxd] [ 1987.384341] idxd_evl_fault_work+0x127/0x390 [idxd] [ 1987.389878] process_one_work+0x13e/0x300 [ 1987.394435] ? __pfx_worker_thread+0x10/0x10 [ 1987.399284] worker_thread+0x2f7/0x420 [ 1987.403544] ? _raw_spin_unlock_irqrestore+0x2b/0x50 [ 1987.409171] ? __pfx_worker_thread+0x10/0x10 [ 1987.414019] kthread+0x107/0x140 [ 1987.417693] ? __pfx_kthread+0x10/0x10 [ 1987.421954] ret_from_fork+0x3d/0x60 [ 1987.426019] ? __pfx_kthread+0x10/0x10 [ 1987.430281] ret_from_fork_asm+0x1b/0x30 [ 1987.434744] . El problema surge porque la cach\u00e9 del registro de eventos se crea usando kmem_cache_create(), que no es adecuado para la copia del usuario. Solucione el problema creando un cach\u00e9 de registro de eventos con kmem_cache_create_usercopy(), lo que garantiza una copia segura para el usuario." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.4", + "versionEndExcluding": "6.6.21", + "matchCriteriaId": "584D76D2-1164-4D5F-A720-182A249B363A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.7.9", + "matchCriteriaId": "1C538467-EDA0-4A9A-82EB-2925DE9FF827" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*", + "matchCriteriaId": "B9F4EA73-0894-400F-A490-3A397AB7A517" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:*", + "matchCriteriaId": "056BD938-0A27-4569-B391-30578B309EE3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:*", + "matchCriteriaId": "F02056A5-B362-4370-9FF8-6F0BD384D520" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc4:*:*:*:*:*:*", + "matchCriteriaId": "62075ACE-B2A0-4B16-829D-B3DA5AE5CC41" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc5:*:*:*:*:*:*", + "matchCriteriaId": "A780F817-2A77-4130-A9B7-5C25606314E3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc6:*:*:*:*:*:*", + "matchCriteriaId": "AEB9199B-AB8F-4877-8964-E2BA95B5F15C" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/5e3022ea42e490a36ec6f2cfa6fc603deb0bace4", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/bb71e040323175e18c233a9afef32ba14fa64eb7", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d3ea125df37dc37972d581b74a5d3785c3f283ab", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/5e3022ea42e490a36ec6f2cfa6fc603deb0bace4", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/bb71e040323175e18c233a9afef32ba14fa64eb7", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d3ea125df37dc37972d581b74a5d3785c3f283ab", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-267xx/CVE-2024-26750.json b/CVE-2024/CVE-2024-267xx/CVE-2024-26750.json index ba77e75e2f7..7d2cab66075 100644 --- a/CVE-2024/CVE-2024-267xx/CVE-2024-26750.json +++ b/CVE-2024/CVE-2024-267xx/CVE-2024-26750.json @@ -2,8 +2,8 @@ "id": "CVE-2024-26750", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-04T09:15:07.850", - "lastModified": "2024-11-21T09:02:59.203", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-18T16:49:59.607", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,47 +15,131 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: af_unix: elimine la referencia oob_skb antes de purgar la cola en GC. syzbot inform\u00f3 que otra tarea se colg\u00f3 en __unix_gc(). [0] El bucle while actual supone que todos los candidatos restantes tienen oob_skb y llamar a kfree_skb(oob_skb) libera los candidatos restantes. Sin embargo, me perd\u00ed un caso en el que oob_skb tiene fd autorreferenciado y otro fd y el \u00faltimo sk se coloca antes que el primero en la lista de candidatos. Luego, el ciclo while nunca contin\u00faa, lo que provoca que la tarea se bloquee. __unix_gc() tiene el mismo bucle justo antes de purgar el skb recopilado, por lo que podemos llamar a kfree_skb(oob_skb) all\u00ed y dejar que __skb_queue_purge() libere todos los sockets en vuelo. [0]: Env\u00edo de NMI desde la CPU 0 a las CPU 1: seguimiento de NMI para la CPU 1 CPU: 1 PID: 2784 Comm: kworker/u4:8 Not tainted 6.8.0-rc4-syzkaller-01028-g71b605d32017 #0 Nombre de hardware: Google Google Compute Engine/Google Compute Engine, BIOS Google 25/01/2024 Cola de trabajo: events_unbound __unix_gc RIP: 0010:__sanitizer_cov_trace_pc+0x0/0x70 kernel/kcov.c:200 C\u00f3digo: 89 fb e8 23 00 00 00 48 8b 3d 84 f5 1a 0c 48 89 de 5b e9 43 26 57 00 0f 1f 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 0f 1e fa 48 8b 04 24 65 48 8b 0d 90 5 2 70 7e 65 8b 15 91 52 70 RSP: 0018:ffffc9000a17fa78 EFLAGS: 00000287 RAX: ffffffff8a0a6108 RBX: ffff88802b6c2640 RCX: ffff88802c0b3b80 RDX: 0000000000000000 RSI: 0 000000000000002 RDI: 0000000000000000 RBP: ffffc9000a17fbf0 R08: ffffffff89383f1d R09: 1ffff1100ee5ff84 R10: dffffc0000000000 R11: ffffed100ee5ff85 R12: 1ffff110056d84ee R13: ffffc9000a17fae0 R14: 0000000000000000 R15: ffffffff8f47b840 FS: 0000000000000000(0000) GS:ffff8880b9500000(0000) knlGS:00000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007ffef5687ff8 CR3: 0000000029b34000 CR4: 00000000003506f0 DR0: 00000000000000000 DR1: 00000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Seguimiento de llamadas: __unix_gc+0xe69/0xf40 net/unix/garbage.c:343 proceso _one_work kernel/workqueue.c:2633 [en l\u00ednea] proceso_scheduled_works+ 0x913/0x1420 kernel/workqueue.c:2706 trabajador_thread+0xa5f/0x1000 kernel/workqueue.c:2787 kthread+0x2ef/0x390 kernel/kthread.c:388 ret_from_fork+0x4b/0x80 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1b/0x30 arch/x86/entry/entry_64.S:242 " } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.15.149", + "versionEndExcluding": "5.15.151", + "matchCriteriaId": "6F3A43DC-978D-470A-88C3-9EF55D158C7B" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/43ba9e331559a30000c862eea313248707afa787", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/6c480d0f131862645d172ca9e25dc152b1a5c3a6", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/aa82ac51d63328714645c827775d64dbfd9941f3", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/c4c795b21dd23d9514ae1c6646c3fb2c78b5be60", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e9eac260369d0cf57ea53df95427125725507a0d", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/43ba9e331559a30000c862eea313248707afa787", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/6c480d0f131862645d172ca9e25dc152b1a5c3a6", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/aa82ac51d63328714645c827775d64dbfd9941f3", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/c4c795b21dd23d9514ae1c6646c3fb2c78b5be60", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e9eac260369d0cf57ea53df95427125725507a0d", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-267xx/CVE-2024-26762.json b/CVE-2024/CVE-2024-267xx/CVE-2024-26762.json index 4bc2b997629..59f098f234e 100644 --- a/CVE-2024/CVE-2024-267xx/CVE-2024-26762.json +++ b/CVE-2024/CVE-2024-267xx/CVE-2024-26762.json @@ -2,8 +2,8 @@ "id": "CVE-2024-26762", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-03T17:15:52.470", - "lastModified": "2024-11-21T09:03:00.880", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-18T16:13:33.843", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,23 +15,114 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: cxl/pci: omita para manejar errores RAS si el dispositivo CXL.mem est\u00e1 desconectado. El modelo PCI AER no es adecuado para el manejo de errores CXL. Si bien la expectativa es que un dispositivo PCI pueda escalar hasta restablecer el enlace para recuperarse de un evento AER, el mismo restablecimiento en CXL equivale a una conexi\u00f3n en caliente sorpresa de cantidades masivas de memoria. Actualmente, el controlador de errores CXL intenta un manejo optimista de errores para desvincular el dispositivo del controlador cxl_mem despu\u00e9s de obtener algunos valores de registro RAS. Esto da como resultado un intento \"esperanzador\" de desconectar la memoria, pero no hay garant\u00eda de que tenga \u00e9xito. Una notificaci\u00f3n AER posterior despu\u00e9s del evento de desvinculaci\u00f3n de memdev ya no puede asumir que los registros est\u00e1n asignados. Verifique el enlace de memdev antes de obtener los valores del registro de estado para evitar fallas del tipo: ERROR: no se puede manejar el error de p\u00e1gina para la direcci\u00f3n: ffa00000195e9100 #PF: acceso de lectura del supervisor en modo kernel #PF: c\u00f3digo_error(0x0000) - p\u00e1gina no presente [. ..] RIP: 0010:__cxl_handle_ras+0x30/0x110 [cxl_core] [...] Seguimiento de llamadas: ? __morir+0x24/0x70 ? page_fault_oops+0x82/0x160? kernelmode_fixup_or_oops+0x84/0x110? exc_page_fault+0x113/0x170? asm_exc_page_fault+0x26/0x30? __pfx_dpc_reset_link+0x10/0x10 ? __cxl_handle_ras+0x30/0x110 [cxl_core] ? find_cxl_port+0x59/0x80 [cxl_core] cxl_handle_rp_ras+0xbc/0xd0 [cxl_core] cxl_error_detected+0x6c/0xf0 [cxl_core] report_error_detected+0xc7/0x1c0 pci_walk_bus+0x73/0x90 pcie_do_recovery+0x23f/0x330 A m\u00e1s largo plazo, es posible que sea necesario corregir el comportamiento de desvinculaci\u00f3n y PCI_ERS_RESULT_DISCONNECT. ser reemplazado por un nuevo PCI_ERS_RESULT_PANIC." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.7.7", + "matchCriteriaId": "575EE16B-67F2-4B5B-B5F8-1877715C898B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*", + "matchCriteriaId": "B9F4EA73-0894-400F-A490-3A397AB7A517" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:*", + "matchCriteriaId": "056BD938-0A27-4569-B391-30578B309EE3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:*", + "matchCriteriaId": "F02056A5-B362-4370-9FF8-6F0BD384D520" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc4:*:*:*:*:*:*", + "matchCriteriaId": "62075ACE-B2A0-4B16-829D-B3DA5AE5CC41" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc5:*:*:*:*:*:*", + "matchCriteriaId": "A780F817-2A77-4130-A9B7-5C25606314E3" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/21e5e84f3f63fdf44e49642a6e45cd895e921a84", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/eef5c7b28dbecd6b141987a96db6c54e49828102", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/21e5e84f3f63fdf44e49642a6e45cd895e921a84", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/eef5c7b28dbecd6b141987a96db6c54e49828102", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-267xx/CVE-2024-26763.json b/CVE-2024/CVE-2024-267xx/CVE-2024-26763.json index e983b0e44d5..6469a8d4e32 100644 --- a/CVE-2024/CVE-2024-267xx/CVE-2024-26763.json +++ b/CVE-2024/CVE-2024-267xx/CVE-2024-26763.json @@ -2,8 +2,8 @@ "id": "CVE-2024-26763", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-03T17:15:52.520", - "lastModified": "2024-11-21T09:03:00.980", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-18T16:40:18.300", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,79 +15,268 @@ "value": "En el kernel de Linux se ha resuelto la siguiente vulnerabilidad: dm-crypt: no modifica los datos cuando se utiliza cifrado autenticado Se dijo que el cifrado autenticado podr\u00eda producir etiquetas no v\u00e1lidas cuando se modifican los datos que se est\u00e1n cifrando [1]. Entonces, solucione este problema copiando primero los datos en la biograf\u00eda del clon y luego cifr\u00e1ndolos dentro de la biograf\u00eda del clon. Esto puede reducir el rendimiento, pero es necesario para evitar que el usuario da\u00f1e el dispositivo escribiendo datos con O_DIRECT y modific\u00e1ndolos al mismo tiempo. [1] https://lore.kernel.org/all/20240207004723.GA35324@sol.localdomain/T/" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionEndExcluding": "4.19.308", + "matchCriteriaId": "B6FB6042-3E0F-4A36-8DED-B3C350612BDC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", + "versionEndExcluding": "5.4.270", + "matchCriteriaId": "5D8044B1-C7E8-44A4-9F03-A4D7BCDB1721" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.211", + "matchCriteriaId": "7DDA4DCF-671D-415D-94DF-6E3C77DF0704" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.150", + "matchCriteriaId": "CB6C60DE-9E0C-46C5-904D-D4F4031F8E95" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.80", + "matchCriteriaId": "BA7850CE-97C9-4408-A348-6173296BCA2B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.19", + "matchCriteriaId": "8D82004C-B2AE-4048-9344-32EFF65953B0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.7.7", + "matchCriteriaId": "575EE16B-67F2-4B5B-B5F8-1877715C898B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*", + "matchCriteriaId": "B9F4EA73-0894-400F-A490-3A397AB7A517" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:*", + "matchCriteriaId": "056BD938-0A27-4569-B391-30578B309EE3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:*", + "matchCriteriaId": "F02056A5-B362-4370-9FF8-6F0BD384D520" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc4:*:*:*:*:*:*", + "matchCriteriaId": "62075ACE-B2A0-4B16-829D-B3DA5AE5CC41" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc5:*:*:*:*:*:*", + "matchCriteriaId": "A780F817-2A77-4130-A9B7-5C25606314E3" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", + "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/0dccbb93538fe89a86c6de31d4b1c8c560848eaa", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/1a4371db68a31076afbe56ecce34fbbe6c80c529", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/3c652f6fa1e1f9f02c3fbf359d260ad153ec5f90", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/43a202bd552976497474ae144942e32cc5f34d7e", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/50c70240097ce41fe6bce6478b80478281e4d0f7", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/64ba01a365980755732972523600a961c4266b75", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d9e3763a505e50ba3bd22846f2a8db99429fb857", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e08c2a8d27e989f0f5b0888792643027d7e691e6", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/0dccbb93538fe89a86c6de31d4b1c8c560848eaa", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/1a4371db68a31076afbe56ecce34fbbe6c80c529", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/3c652f6fa1e1f9f02c3fbf359d260ad153ec5f90", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/43a202bd552976497474ae144942e32cc5f34d7e", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/50c70240097ce41fe6bce6478b80478281e4d0f7", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/64ba01a365980755732972523600a961c4266b75", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d9e3763a505e50ba3bd22846f2a8db99429fb857", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e08c2a8d27e989f0f5b0888792643027d7e691e6", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] }, { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-267xx/CVE-2024-26764.json b/CVE-2024/CVE-2024-267xx/CVE-2024-26764.json index 69f0ae7c33f..eae53f11d45 100644 --- a/CVE-2024/CVE-2024-267xx/CVE-2024-26764.json +++ b/CVE-2024/CVE-2024-267xx/CVE-2024-26764.json @@ -2,8 +2,8 @@ "id": "CVE-2024-26764", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-03T17:15:52.580", - "lastModified": "2024-11-21T09:03:01.100", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-18T16:36:22.457", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,79 +15,268 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: fs/aio: restringe kiocb_set_cancel_fn() a E/S enviadas a trav\u00e9s de libaio. Si se llama a kiocb_set_cancel_fn() para E/S enviadas a trav\u00e9s de io_uring, aparece la siguiente advertencia del kernel: ADVERTENCIA: CPU : 3 PID: 368 en fs/aio.c:598 kiocb_set_cancel_fn+0x9c/0xa8 Rastreo de llamadas: kiocb_set_cancel_fn+0x9c/0xa8 ffs_epfile_read_iter+0x144/0x1d0 io_read+0x19c/0x498 io_issue_sqe+0x118/0x27c io_submit_sqes+0x25c/0x5fc __arm64_sys_io_uring_enter+0x104/ 0xab0 invoke_syscall+0x58/0x11c el0_svc_common+0xb4/0xf4 do_el0_svc+0x2c/0xb0 el0_svc+0x2c/0xa4 el0t_64_sync_handler+0x68/0xb4 el0t_64_sync+0x1a4/0x1a8 Solucionar esto configurando el IOC Bandera B_AIO_RW para E/S de lectura y escritura enviada por libaio ." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", + "baseScore": 3.3, + "baseSeverity": "LOW", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionEndExcluding": "4.19.308", + "matchCriteriaId": "B6FB6042-3E0F-4A36-8DED-B3C350612BDC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", + "versionEndExcluding": "5.4.270", + "matchCriteriaId": "5D8044B1-C7E8-44A4-9F03-A4D7BCDB1721" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.211", + "matchCriteriaId": "7DDA4DCF-671D-415D-94DF-6E3C77DF0704" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.150", + "matchCriteriaId": "CB6C60DE-9E0C-46C5-904D-D4F4031F8E95" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.80", + "matchCriteriaId": "BA7850CE-97C9-4408-A348-6173296BCA2B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.19", + "matchCriteriaId": "8D82004C-B2AE-4048-9344-32EFF65953B0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.7.7", + "matchCriteriaId": "575EE16B-67F2-4B5B-B5F8-1877715C898B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*", + "matchCriteriaId": "B9F4EA73-0894-400F-A490-3A397AB7A517" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:*", + "matchCriteriaId": "056BD938-0A27-4569-B391-30578B309EE3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:*", + "matchCriteriaId": "F02056A5-B362-4370-9FF8-6F0BD384D520" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc4:*:*:*:*:*:*", + "matchCriteriaId": "62075ACE-B2A0-4B16-829D-B3DA5AE5CC41" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc5:*:*:*:*:*:*", + "matchCriteriaId": "A780F817-2A77-4130-A9B7-5C25606314E3" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", + "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/18f614369def2a11a52f569fe0f910b199d13487", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/1dc7d74fe456944a9b1c57bd776280249f441ac6", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/337b543e274fe7a8f47df3c8293cc6686ffa620f", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b4eea7a05ee0ab5ab0514421e6ba8c5d249cf942", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b820de741ae48ccf50dd95e297889c286ff4f760", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d7b6fa97ec894edd02f64b83e5e72e1aa352f353", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e7e23fc5d5fe422827c9a43ecb579448f73876c7", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ea1cd64d59f22d6d13f367d62ec6e27b9344695f", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/18f614369def2a11a52f569fe0f910b199d13487", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/1dc7d74fe456944a9b1c57bd776280249f441ac6", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/337b543e274fe7a8f47df3c8293cc6686ffa620f", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b4eea7a05ee0ab5ab0514421e6ba8c5d249cf942", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b820de741ae48ccf50dd95e297889c286ff4f760", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d7b6fa97ec894edd02f64b83e5e72e1aa352f353", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e7e23fc5d5fe422827c9a43ecb579448f73876c7", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ea1cd64d59f22d6d13f367d62ec6e27b9344695f", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] }, { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-267xx/CVE-2024-26765.json b/CVE-2024/CVE-2024-267xx/CVE-2024-26765.json index cce5f4d3d01..5c5a7707212 100644 --- a/CVE-2024/CVE-2024-267xx/CVE-2024-26765.json +++ b/CVE-2024/CVE-2024-267xx/CVE-2024-26765.json @@ -2,8 +2,8 @@ "id": "CVE-2024-26765", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-03T17:15:52.633", - "lastModified": "2024-11-21T09:03:01.213", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-18T16:43:01.350", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,39 +15,155 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: LoongArch: deshabilite IRQ antes de init_fn() para CPU que no son de arranque. Deshabilite IRQ antes de init_fn() para CPU que no sean de arranque cuando se conectan en caliente, para silenciar dichas advertencias (y tambi\u00e9n evitar errores potenciales debido a problemas inesperados). interrupciones): ADVERTENCIA: CPU: 1 PID: 0 en kernel/rcu/tree.c:4503 rcu_cpu_starting+0x214/0x280 CPU: 1 PID: 0 Comm: swapper/1 No contaminado 6.6.17+ #1198 pc 90000000048e3334 ra 90000000047bd56c tp 900000010039c000 sp 900000010039fdd0 a0 0000000000000001 a1 0000000000000006 a2 900000000802c040 a3 0000000000000000 a4 00000000000 00001 a5 0000000000000004 a6 00000000000000000 a7 90000000048e3f4c t0 0000000000000001 t1 9000000005c70968 t2 0000000004000000 t3 000 000000005e56e t4 00000000000002e4 t5 0000000000001000 t6 ffffffff80000000 t7 000000000004000040000 t8 9000000007931638 u0 00000000000000006 s 9 0000000000000004 s0 0000000000000001 s1 9000000006356ac0 s2 9000000007244000 s3 0000000000000001 s4 0000000000000001 s5 900000000636f000 s6 7ffffffffffffffff s7 9000000002123940 s8 9000000001ca55f8 ra: 90000000047bd56c tlb_init+0x24c/0x52 8 ERA: 90000000048e3334 rcu_cpu_starting+0x214/0x280 CRMD: 000000b0 (PLV0 -IE -DA +PG DACF=CC DACM=CC -WE) PRMD: 00000000 (PPLV0 -PIE -PWE) EUEN: 00000000 (-FPE -SXE -ASXE -BTE) ECFG: 00071000 (LIE=12 VS=7) ESTAT: 000c0000 [BRK] (IS= ECode=12 EssubCode=0) PRID: 0014c010 (Loongson -64 bits, Loongson-3A5000) CPU: 1 PID: 0 Comunicaciones: intercambiador/1 No contaminado 6.6.17+ #1198 Pila: 0000000000000000 9000000006375000 9000000005b61878 900000010039c000 9000 00010039fa30 0000000000000000 900000010039fa38 900000000619a140 9000000006456888 9000000006456880 900000010039f950 0000000000000 0001 0000000000000001 cb0cb028ec7e52e1 0000000002b90000 9000000100348700 00000000000000000 000000000000000001 ffffffff916d12f1 00000000 00000003 0000000000040000 9000000007930370 0000000002b90000 0000000000000004 9000000006366000 900000000619a140 0000000000000000 00000000000000004 0000000000000000 0000 000000000009 ffffffffffc681f2 9000000002123940 9000000001ca55f8 9000000006366000 90000000047a4828 00007ffff057ded8 00000000000000b0 000 0000000000000 0000000000000000 0000000000071000 ... Seguimiento de llamadas: [<90000000047a4828>] show_stack+0x48/0x1a0 [<9000000005b61874>] dump_stack_lvl+0x84/0xcc [< 90000000047f60ac>] __advertir +0x8c/0x1e0 [<9000000005b0ab34>] report_bug+0x1b4/0x280 [<9000000005b63110>] do_bp+0x2d0/0x480 [<90000000047a2e20>] handle_bp+0x120/0x1c0 [<90000 000048e3334>] rcu_cpu_starting+0x214/0x280 [<90000000047bd568>] tlb_init +0x248/0x528 [<90000000047a4c44>] per_cpu_trap_init+0x124/0x160 [<90000000047a19f4>] cpu_probe+0x494/0xa00 [<90000000047b551c>] start_secondary+0x3c/0xc0 [ <9000000005b66134>] smpboot_entry+0x50/0x58" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.1.80", + "matchCriteriaId": "68B819D6-60AD-446F-A1CF-814A2ADCB42C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.19", + "matchCriteriaId": "8D82004C-B2AE-4048-9344-32EFF65953B0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.7.7", + "matchCriteriaId": "575EE16B-67F2-4B5B-B5F8-1877715C898B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*", + "matchCriteriaId": "B9F4EA73-0894-400F-A490-3A397AB7A517" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:*", + "matchCriteriaId": "056BD938-0A27-4569-B391-30578B309EE3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:*", + "matchCriteriaId": "F02056A5-B362-4370-9FF8-6F0BD384D520" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc4:*:*:*:*:*:*", + "matchCriteriaId": "62075ACE-B2A0-4B16-829D-B3DA5AE5CC41" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc5:*:*:*:*:*:*", + "matchCriteriaId": "A780F817-2A77-4130-A9B7-5C25606314E3" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/1001db6c42e4012b55e5ee19405490f23e033b5a", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/8bf2ca8c60712af288b88ba80f8e4df4573d923f", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a262b78dd085dbe9b3c75dc1d9c4cd102b110b53", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/dffdf7c783ef291eef38a5a0037584fd1a7fa464", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/1001db6c42e4012b55e5ee19405490f23e033b5a", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/8bf2ca8c60712af288b88ba80f8e4df4573d923f", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a262b78dd085dbe9b3c75dc1d9c4cd102b110b53", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/dffdf7c783ef291eef38a5a0037584fd1a7fa464", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-267xx/CVE-2024-26773.json b/CVE-2024/CVE-2024-267xx/CVE-2024-26773.json index 632e88b44b8..e175ce34471 100644 --- a/CVE-2024/CVE-2024-267xx/CVE-2024-26773.json +++ b/CVE-2024/CVE-2024-267xx/CVE-2024-26773.json @@ -2,8 +2,8 @@ "id": "CVE-2024-26773", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-03T17:15:53.080", - "lastModified": "2024-11-21T09:03:02.380", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-18T16:47:14.460", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,79 +15,253 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: ext4: evite asignar bloques de un grupo da\u00f1ado en ext4_mb_try_best_found() Determine si el mapa de bits del bloque del grupo est\u00e1 da\u00f1ado antes de usar ac_b_ex en ext4_mb_try_best_found() para evitar asignar bloques de un grupo con un bloque da\u00f1ado mapa de bits en la siguiente concurrencia y empeorando la situaci\u00f3n. ext4_mb_regular_allocator ext4_lock_group(sb, group) ext4_mb_good_group // verifica si el bbitmap del grupo est\u00e1 da\u00f1ado ext4_mb_complex_scan_group // El grupo de escaneo obtiene ac_b_ex pero no lo usa ext4_unlock_group(sb, group) ext4_mark_group_bitmap_corrupted(group) // El mapa de bits del bloque se corrompi\u00f3 durante // el grupo desbloquea la brecha. ext4_mb_try_best_found ext4_lock_group(ac->ac_sb, group) ext4_mb_use_best_found mb_mark_used // Asignaci\u00f3n de bloques en un grupo da\u00f1ado de mapa de bits de bloques" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionEndExcluding": "4.19.308", + "matchCriteriaId": "B6FB6042-3E0F-4A36-8DED-B3C350612BDC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", + "versionEndExcluding": "5.4.270", + "matchCriteriaId": "5D8044B1-C7E8-44A4-9F03-A4D7BCDB1721" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.211", + "matchCriteriaId": "7DDA4DCF-671D-415D-94DF-6E3C77DF0704" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.150", + "matchCriteriaId": "CB6C60DE-9E0C-46C5-904D-D4F4031F8E95" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.80", + "matchCriteriaId": "BA7850CE-97C9-4408-A348-6173296BCA2B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.19", + "matchCriteriaId": "8D82004C-B2AE-4048-9344-32EFF65953B0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.7.7", + "matchCriteriaId": "575EE16B-67F2-4B5B-B5F8-1877715C898B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*", + "matchCriteriaId": "B9F4EA73-0894-400F-A490-3A397AB7A517" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:*", + "matchCriteriaId": "056BD938-0A27-4569-B391-30578B309EE3" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", + "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/0184747b552d6b5a14db3b7fcc3b792ce64dedd1", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/21f8cfe79f776287459343e9cfa6055af61328ea", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/260fc96283c0f594de18a1b045faf6d8fb42874d", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/4530b3660d396a646aad91a787b6ab37cf604b53", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/4c21fa60a6f4606f6214a38f50612b17b2f738f5", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/927794a02169778c9c2e7b25c768ab3ea8c1dc03", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a2576ae9a35c078e488f2c573e9e6821d651fbbe", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/f97e75fa4e12b0aa0224e83fcbda8853ac2adf36", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/0184747b552d6b5a14db3b7fcc3b792ce64dedd1", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/21f8cfe79f776287459343e9cfa6055af61328ea", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/260fc96283c0f594de18a1b045faf6d8fb42874d", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/4530b3660d396a646aad91a787b6ab37cf604b53", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/4c21fa60a6f4606f6214a38f50612b17b2f738f5", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/927794a02169778c9c2e7b25c768ab3ea8c1dc03", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a2576ae9a35c078e488f2c573e9e6821d651fbbe", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/f97e75fa4e12b0aa0224e83fcbda8853ac2adf36", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] }, { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-267xx/CVE-2024-26780.json b/CVE-2024/CVE-2024-267xx/CVE-2024-26780.json index fa47974e3da..a9696cc6547 100644 --- a/CVE-2024/CVE-2024-267xx/CVE-2024-26780.json +++ b/CVE-2024/CVE-2024-267xx/CVE-2024-26780.json @@ -2,8 +2,8 @@ "id": "CVE-2024-26780", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-04T09:15:07.903", - "lastModified": "2024-11-21T09:03:03.370", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-18T16:52:16.970", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,47 +15,145 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: af_unix: se corrigi\u00f3 la tarea bloqueada al purgar oob_skb en GC. syzbot inform\u00f3 que se hab\u00eda colgado una tarea; al mismo tiempo, GC hac\u00eda un bucle infinito en list_for_each_entry_safe() para OOB skb. [0] syzbot demostr\u00f3 que list_for_each_entry_safe() en realidad no era seguro en este caso. Un solo skb podr\u00eda tener referencias para m\u00faltiples sockets. Si liberamos dicho skb en list_for_each_entry_safe(), los sockets actual y siguiente podr\u00edan desvincularse en una sola iteraci\u00f3n. unix_notinflight() usa list_del_init() para desvincular el socket, por lo que el siguiente socket precargado forma un bucle y list_for_each_entry_safe() nunca se detiene. Aqu\u00ed, debemos usar while() y asegurarnos de buscar siempre el primer socket. [0]: Env\u00edo de NMI desde la CPU 0 a las CPU 1: seguimiento de NMI para la CPU 1 CPU: 1 PID: 5065 Comm: syz-executor236 Not tainted 6.8.0-rc3-syzkaller-00136-g1f719a2f3fa6 #0 Nombre del hardware: Google Google Compute Engine/Google Compute Engine, BIOS Google 25/01/2024 RIP: 0010:preempt_count arch/x86/include/asm/preempt.h:26 [en l\u00ednea] RIP: 0010:check_kcov_mode kernel/kcov.c:173 [en l\u00ednea] RIP : 0010:__sanitizer_cov_trace_pc+0xd/0x60 kernel/kcov.c:207 C\u00f3digo: cc cc cc cc 66 0f 1f 84 00 00 00 00 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa 65 48 8b 14 25 40 c2 03 00 <65> 8b 05 b4 7c 78 7e a9 00 01 ff 00 48 8b 34 24 74 0f f6 c4 01 74 RSP: 0018:ffffc900033efa58 EFLAGS: 00000283 RAX: ffff88807b077800 RBX: ffff88807b077800 RCX: 1ffffffff27b1189 RDX: ffff88802a5a3b80 RSI: ffffffff8968488d RDI: ffff88807b077f70 RBP: ffffc900033efbb0 R08: 00000000000000001 R09: ffffbfff27a900c R10: ffffffff93d48067 R11: ffffffff8ae000eb R12: ffff88807b077800 R13: dffffc0000000000 R14: ffff88807b077e40 R15: 00000000000000001 FS: 0000000000000000(0000) GS:ffff888 0b9500000(0000) knlGS: 0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000564f4fc1e3a8 CR3: 000000000d57a000 CR4: 00000000003506f0 DR0: 00 00000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Seguimiento de llamadas: unix_gc+0x563/0x13b0 net/unix/garbage.c:319 unix_release_sock+0xa93/0xf80 net/unix/af_unix.c:683 unix_release+0x91/0xf0 net/unix/af_unix.c:1064 __sock_release+0xb0/0x270 net/socket.c:659 sock_close+0x1c/0x30 net/socket.c:1421 __fput+0x270/0xb80 fs/file_table.c:376 task_work_run+0x14f/0x250 kernel/task_work.c:180 exit_task_work include/linux/task_work. h:38 [en l\u00ednea] do_exit+0xa8a/0x2ad0 kernel/exit.c:871 do_group_exit+0xd4/0x2a0 kernel/exit.c:1020 __do_sys_exit_group kernel/exit.c:1031 [en l\u00ednea] __se_sys_exit_group kernel/exit.c:1029 [ en l\u00ednea] __x64_sys_exit_group+0x3e/0x50 kernel/exit.c:1029 do_syscall_x64 arch/x86/entry/common.c:52 [en l\u00ednea] do_syscall_64+0xd5/0x270 arch/x86/entry/common.c:83 Entry_SYSCALL_64_after_hwframe+0x6f/ 0x77 RIP: 0033:0x7f9d6cbdac09 C\u00f3digo: No se puede acceder a los bytes del c\u00f3digo de operaci\u00f3n en 0x7f9d6cbdabdf. RSP: 002b:00007fff5952feb8 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 RAX: ffffffffffffffda RBX: 00000000000000000 RCX: 00007f9d6cbdac09 RDX: 00000000 0000003c RSI: 00000000000000e7 RDI: 00000000000000000 RBP: 00007f9d6cc552b0 R08: ffffffffffffffffb8 R09: 0000000000000006 R10: 00000000000000006 R1 1: 0000000000000246 R12: 00007f9d6cc552b0 R13: 0000000000000000 R14: 00007f9d6cc55d00 R15: 00007f9d6cbabe70 " } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-835" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.1.78", + "versionEndExcluding": "6.1.81", + "matchCriteriaId": "85752186-97BF-451B-A0A1-B9181CD9F5D5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.6.17", + "versionEndExcluding": "6.6.21", + "matchCriteriaId": "4E553753-6598-4B25-B84D-3DB82F691AFC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7.5", + "versionEndExcluding": "6.7.9", + "matchCriteriaId": "EF2110E3-BADE-4676-95D2-56D0C24589C1" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/25236c91b5ab4a26a56ba2e79b8060cf4e047839", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/2a3d40b4025fcfe51b04924979f1653993b17669", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/36f7371de977f805750748e80279be7e370df85c", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/69e0f04460f4037e01e29f0d9675544f62aafca3", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/cb8890318dde26fc89c6ea67d6e9070ab50b6e91", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/25236c91b5ab4a26a56ba2e79b8060cf4e047839", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/2a3d40b4025fcfe51b04924979f1653993b17669", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/36f7371de977f805750748e80279be7e370df85c", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/69e0f04460f4037e01e29f0d9675544f62aafca3", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/cb8890318dde26fc89c6ea67d6e9070ab50b6e91", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-267xx/CVE-2024-26783.json b/CVE-2024/CVE-2024-267xx/CVE-2024-26783.json index 97175aba342..42d7fa36486 100644 --- a/CVE-2024/CVE-2024-267xx/CVE-2024-26783.json +++ b/CVE-2024/CVE-2024-267xx/CVE-2024-26783.json @@ -2,8 +2,8 @@ "id": "CVE-2024-26783", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-04T09:15:08.077", - "lastModified": "2024-11-21T09:03:03.733", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-18T16:53:41.060", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,31 +15,140 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: mm/vmscan: corrige un error al llamar a wakeup_kswapd() con un \u00edndice de zona incorrecto Con el equilibrio numa activado, cuando se ejecuta un SYSTEM numa donde un nodo numa no tiene su memoria local por lo que no tiene zonas administradas, se ha observado lo siguiente. Es porque se llama a wakeup_kswapd() con un \u00edndice de zona incorrecto, -1. Se solucion\u00f3 verificando el \u00edndice antes de llamar a wakeup_kswapd(). > ERROR: no se puede manejar el error de p\u00e1gina para la direcci\u00f3n: 00000000000033f3 > #PF: acceso de lectura del supervisor en modo kernel > #PF: error_code(0x0000) - p\u00e1gina no presente > PGD 0 P4D 0 > Ups: 0000 [#1] SMP PREEMPT NOPTI > CPU: 2 PID: 895 Comm: masim Not tainted 6.6.0-dirty #255 > Nombre del hardware: PC est\u00e1ndar QEMU (i440FX + PIIX, 1996), BIOS > rel-1.16.0-0-gd239552ce722-prebuilt.qemu .org 01/04/2014 > RIP: 0010:wakeup_kswapd (./linux/mm/vmscan.c:7812) > C\u00f3digo: (omitido) > RSP: 0000:ffffc90004257d58 EFLAGS: 00010286 > RAX: ffffffffffffffff RBX: ffff88883f ff0480RCX: 0000000000000003 > RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffff88883fff0480 > RBP: ffffffffffffffff R08: ff0003ffffffffff R09: ffffffffffffffff > R10: ff ff888106c95540 R11: 0000000055555554 R12: 0000000000000003 > R13: 0000000000000000 R14: 00000000000000000 R15: ffff88883fff0940 > FS: 0000 7fc4b8124740(0000) GS: ffff888827c00000(0000) knlGS:0000000000000000 > CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 > CR2: 00000000000033f3 CR3: 000000026cc08004 CR4: 0000000000770ee0 > DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 > DR3: 00000000000000000 DR6: 00000000ffe0ff0 DR7: 000 0000000000400 > PKRU: 55555554 > Rastreo de llamadas: > > ? __morir > ? page_fault_oops > ? __pte_offset_map_lock > ? exc_page_fault > ? asm_exc_page_fault > ? wakeup_kswapd > migrar_misplaced_page > __handle_mm_fault > handle_mm_fault > do_user_addr_fault > exc_page_fault > asm_exc_page_fault > RIP: 0033:0x55b897ba0808 > C\u00f3digo: (omitido) > RSP: 002b:00007ffeefa821a0 EFLAGS: 00 010287 > RAX: 000055b89983acd0 RBX: 00007ffeefa823f8 RCX: 000055b89983acd0 > RDX: 00007fc2f8122010 RSI: 0000000000020000 RDI: 000055b89983acd0 > RBP: 00007ffeefa821a0 R08: 0000000000000037 R09: 00000000000000075 > R10: 0000000000000000 R11: 0 000000000000202 R12: 0000000000000000 > R13: 00007ffeefa82410 R14: 000055b897ba5dd8 R15: 00007fc4b8340000 > " } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.18", + "versionEndExcluding": "6.6.22", + "matchCriteriaId": "A6D9B00F-1C32-42E5-A982-2FB0E9273753" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.7.9", + "matchCriteriaId": "1C538467-EDA0-4A9A-82EB-2925DE9FF827" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*", + "matchCriteriaId": "B9F4EA73-0894-400F-A490-3A397AB7A517" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:*", + "matchCriteriaId": "056BD938-0A27-4569-B391-30578B309EE3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:*", + "matchCriteriaId": "F02056A5-B362-4370-9FF8-6F0BD384D520" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc4:*:*:*:*:*:*", + "matchCriteriaId": "62075ACE-B2A0-4B16-829D-B3DA5AE5CC41" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc5:*:*:*:*:*:*", + "matchCriteriaId": "A780F817-2A77-4130-A9B7-5C25606314E3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc6:*:*:*:*:*:*", + "matchCriteriaId": "AEB9199B-AB8F-4877-8964-E2BA95B5F15C" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/2774f256e7c0219e2b0a0894af1c76bdabc4f974", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/bdd21eed8b72f9e28d6c279f6db258e090c79080", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d6159bd4c00594249e305bfe02304c67c506264e", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/2774f256e7c0219e2b0a0894af1c76bdabc4f974", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/bdd21eed8b72f9e28d6c279f6db258e090c79080", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d6159bd4c00594249e305bfe02304c67c506264e", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-273xx/CVE-2024-27382.json b/CVE-2024/CVE-2024-273xx/CVE-2024-27382.json index c521fbeb8e7..4a75613afff 100644 --- a/CVE-2024/CVE-2024-273xx/CVE-2024-27382.json +++ b/CVE-2024/CVE-2024-273xx/CVE-2024-27382.json @@ -2,7 +2,7 @@ "id": "CVE-2024-27382", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-05T19:15:14.957", - "lastModified": "2024-11-21T09:04:29.837", + "lastModified": "2025-03-18T16:15:21.107", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -69,6 +69,16 @@ "value": "CWE-125" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-279xx/CVE-2024-27953.json b/CVE-2024/CVE-2024-279xx/CVE-2024-27953.json index fc78cd03676..e184e369d97 100644 --- a/CVE-2024/CVE-2024-279xx/CVE-2024-27953.json +++ b/CVE-2024/CVE-2024-279xx/CVE-2024-27953.json @@ -2,8 +2,8 @@ "id": "CVE-2024-27953", "sourceIdentifier": "audit@patchstack.com", "published": "2024-03-13T17:15:48.993", - "lastModified": "2024-11-21T09:05:29.663", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-18T15:20:11.773", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 4.7, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.4 } ] }, @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:coolplugins:cryptocurrency_widgets:*:*:*:*:free:wordpress:*:*", + "versionEndExcluding": "2.6.9", + "matchCriteriaId": "6F78E719-F36B-4379-B92E-5FDD05ADB1E4" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/cryptocurrency-price-ticker-widget/wordpress-cryptocurrency-widgets-plugin-2-6-8-broken-access-control-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://patchstack.com/database/vulnerability/cryptocurrency-price-ticker-widget/wordpress-cryptocurrency-widgets-plugin-2-6-8-broken-access-control-vulnerability?_s_id=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-28xx/CVE-2024-2885.json b/CVE-2024/CVE-2024-28xx/CVE-2024-2885.json index c7e433f7030..a60f4d98743 100644 --- a/CVE-2024/CVE-2024-28xx/CVE-2024-2885.json +++ b/CVE-2024/CVE-2024-28xx/CVE-2024-2885.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2885", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-03-26T21:15:53.220", - "lastModified": "2024-12-19T16:04:04.557", - "vulnStatus": "Analyzed", + "lastModified": "2025-03-18T16:15:21.350", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -42,11 +42,11 @@ "type": "Secondary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", - "baseScore": 7.5, + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, "baseSeverity": "HIGH", "attackVector": "NETWORK", - "attackComplexity": "HIGH", + "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", @@ -54,7 +54,7 @@ "integrityImpact": "HIGH", "availabilityImpact": "HIGH" }, - "exploitabilityScore": 1.6, + "exploitabilityScore": 2.8, "impactScore": 5.9 } ] @@ -69,6 +69,16 @@ "value": "CWE-416" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-297xx/CVE-2024-29785.json b/CVE-2024/CVE-2024-297xx/CVE-2024-29785.json index c281e5a05de..87d55fb79a2 100644 --- a/CVE-2024/CVE-2024-297xx/CVE-2024-29785.json +++ b/CVE-2024/CVE-2024-297xx/CVE-2024-29785.json @@ -2,7 +2,7 @@ "id": "CVE-2024-29785", "sourceIdentifier": "dsap-vuln-management@google.com", "published": "2024-06-13T21:15:52.180", - "lastModified": "2024-11-21T09:08:19.567", + "lastModified": "2025-03-18T15:15:48.267", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-908" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-908" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-298xx/CVE-2024-29831.json b/CVE-2024/CVE-2024-298xx/CVE-2024-29831.json index ef240ef6a6c..193cb7781f2 100644 --- a/CVE-2024/CVE-2024-298xx/CVE-2024-29831.json +++ b/CVE-2024/CVE-2024-298xx/CVE-2024-29831.json @@ -2,8 +2,8 @@ "id": "CVE-2024-29831", "sourceIdentifier": "security@apache.org", "published": "2024-08-12T13:38:18.560", - "lastModified": "2024-11-21T09:08:25.767", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-18T15:56:38.357", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -49,16 +69,51 @@ "value": "CWE-20" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:apache:dolphinscheduler:*:*:*:*:*:*:*:*", + "versionEndExcluding": "3.2.2", + "matchCriteriaId": "CA3F4CF0-C52D-4EC7-AEA3-4B49F30F0B9C" + } + ] + } + ] } ], "references": [ { "url": "https://lists.apache.org/thread/x1ch0x5om3srtbnp7rtsvdszho3mdrq0", - "source": "security@apache.org" + "source": "security@apache.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "http://www.openwall.com/lists/oss-security/2024/08/09/6", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-318xx/CVE-2024-31805.json b/CVE-2024/CVE-2024-318xx/CVE-2024-31805.json index 9421486d173..e811e71cd49 100644 --- a/CVE-2024/CVE-2024-318xx/CVE-2024-31805.json +++ b/CVE-2024/CVE-2024-318xx/CVE-2024-31805.json @@ -2,8 +2,8 @@ "id": "CVE-2024-31805", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-08T13:15:08.500", - "lastModified": "2024-11-21T09:13:54.427", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-18T16:04:21.413", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,51 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:totolink:ex200_firmware:4.0.3c.7646_b20201211:*:*:*:*:*:*:*", + "matchCriteriaId": "DFAA2333-6AF0-4F2C-8695-0DE2024C634E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:totolink:ex200:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CCFDF09E-D255-4F5B-A099-71EE37A56492" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/4hsien/CVE-vulns/blob/main/TOTOLINK/EX200/CI_5_setTelnetCfg/CI.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/4hsien/CVE-vulns/blob/main/TOTOLINK/EX200/CI_5_setTelnetCfg/CI.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-318xx/CVE-2024-31806.json b/CVE-2024/CVE-2024-318xx/CVE-2024-31806.json index a9680374385..6cc430e1e8a 100644 --- a/CVE-2024/CVE-2024-318xx/CVE-2024-31806.json +++ b/CVE-2024/CVE-2024-318xx/CVE-2024-31806.json @@ -2,8 +2,8 @@ "id": "CVE-2024-31806", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-08T13:15:08.550", - "lastModified": "2025-03-13T14:15:25.800", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-18T16:04:16.430", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,49 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:totolink:ex200_firmware:4.0.3c.7646_b20201211:*:*:*:*:*:*:*", + "matchCriteriaId": "DFAA2333-6AF0-4F2C-8695-0DE2024C634E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:totolink:ex200:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CCFDF09E-D255-4F5B-A099-71EE37A56492" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/4hsien/CVE-vulns/blob/main/TOTOLINK/EX200/DoS_RebootSystem/DoS.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://github.com/4hsien/CVE-vulns/blob/main/TOTOLINK/EX200/DoS_RebootSystem/DoS.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-318xx/CVE-2024-31807.json b/CVE-2024/CVE-2024-318xx/CVE-2024-31807.json index 6841e605367..d9a6434fa34 100644 --- a/CVE-2024/CVE-2024-318xx/CVE-2024-31807.json +++ b/CVE-2024/CVE-2024-318xx/CVE-2024-31807.json @@ -2,8 +2,8 @@ "id": "CVE-2024-31807", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-08T13:15:08.603", - "lastModified": "2024-11-21T09:13:54.877", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-18T16:04:11.190", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,51 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:totolink:ex200_firmware:4.0.3c.7646_b20201211:*:*:*:*:*:*:*", + "matchCriteriaId": "DFAA2333-6AF0-4F2C-8695-0DE2024C634E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:totolink:ex200:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CCFDF09E-D255-4F5B-A099-71EE37A56492" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/4hsien/CVE-vulns/blob/main/TOTOLINK/EX200/CI_2_NTPSyncWithHost/CI.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/4hsien/CVE-vulns/blob/main/TOTOLINK/EX200/CI_2_NTPSyncWithHost/CI.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-318xx/CVE-2024-31808.json b/CVE-2024/CVE-2024-318xx/CVE-2024-31808.json index 1d0ea37bcde..df00b001fd3 100644 --- a/CVE-2024/CVE-2024-318xx/CVE-2024-31808.json +++ b/CVE-2024/CVE-2024-318xx/CVE-2024-31808.json @@ -2,8 +2,8 @@ "id": "CVE-2024-31808", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-08T13:15:08.650", - "lastModified": "2024-11-21T09:13:55.113", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-18T16:04:05.817", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,51 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:totolink:ex200_firmware:4.0.3c.7646_b20201211:*:*:*:*:*:*:*", + "matchCriteriaId": "DFAA2333-6AF0-4F2C-8695-0DE2024C634E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:totolink:ex200:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CCFDF09E-D255-4F5B-A099-71EE37A56492" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/4hsien/CVE-vulns/blob/main/TOTOLINK/EX200/CI_3_setWebWlanIdx/CI.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/4hsien/CVE-vulns/blob/main/TOTOLINK/EX200/CI_3_setWebWlanIdx/CI.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-318xx/CVE-2024-31809.json b/CVE-2024/CVE-2024-318xx/CVE-2024-31809.json index 7cf5dbee102..d6eb63dccdf 100644 --- a/CVE-2024/CVE-2024-318xx/CVE-2024-31809.json +++ b/CVE-2024/CVE-2024-318xx/CVE-2024-31809.json @@ -2,8 +2,8 @@ "id": "CVE-2024-31809", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-08T13:15:08.700", - "lastModified": "2024-11-21T09:13:55.333", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-18T16:03:53.180", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,51 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:totolink:ex200_firmware:4.0.3c.7646_b20201211:*:*:*:*:*:*:*", + "matchCriteriaId": "DFAA2333-6AF0-4F2C-8695-0DE2024C634E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:totolink:ex200:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CCFDF09E-D255-4F5B-A099-71EE37A56492" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/4hsien/CVE-vulns/blob/main/TOTOLINK/EX200/CI_4_setUpgradeFW/CI.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/4hsien/CVE-vulns/blob/main/TOTOLINK/EX200/CI_4_setUpgradeFW/CI.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-318xx/CVE-2024-31811.json b/CVE-2024/CVE-2024-318xx/CVE-2024-31811.json index 0f817f06f5f..09b5afc8fe9 100644 --- a/CVE-2024/CVE-2024-318xx/CVE-2024-31811.json +++ b/CVE-2024/CVE-2024-318xx/CVE-2024-31811.json @@ -2,8 +2,8 @@ "id": "CVE-2024-31811", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-08T13:15:08.750", - "lastModified": "2024-11-21T09:13:55.707", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-18T16:03:42.680", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,51 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:totolink:ex200_firmware:4.0.3c.7646_b20201211:*:*:*:*:*:*:*", + "matchCriteriaId": "DFAA2333-6AF0-4F2C-8695-0DE2024C634E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:totolink:ex200:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CCFDF09E-D255-4F5B-A099-71EE37A56492" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/4hsien/CVE-vulns/blob/main/TOTOLINK/EX200/CI_1_setLanguageCfg/CI.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/4hsien/CVE-vulns/blob/main/TOTOLINK/EX200/CI_1_setLanguageCfg/CI.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-318xx/CVE-2024-31812.json b/CVE-2024/CVE-2024-318xx/CVE-2024-31812.json index 4d850edb23b..d84294812c0 100644 --- a/CVE-2024/CVE-2024-318xx/CVE-2024-31812.json +++ b/CVE-2024/CVE-2024-318xx/CVE-2024-31812.json @@ -2,8 +2,8 @@ "id": "CVE-2024-31812", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-08T13:15:08.800", - "lastModified": "2024-11-21T09:13:55.930", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-18T16:03:37.920", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,49 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:totolink:ex200_firmware:4.0.3c.7646_b20201211:*:*:*:*:*:*:*", + "matchCriteriaId": "DFAA2333-6AF0-4F2C-8695-0DE2024C634E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:totolink:ex200:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CCFDF09E-D255-4F5B-A099-71EE37A56492" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/4hsien/CVE-vulns/blob/main/TOTOLINK/EX200/Leak_getWiFiExtenderConfig/Leak.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://github.com/4hsien/CVE-vulns/blob/main/TOTOLINK/EX200/Leak_getWiFiExtenderConfig/Leak.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-318xx/CVE-2024-31813.json b/CVE-2024/CVE-2024-318xx/CVE-2024-31813.json index ed37575e97b..5db6c236445 100644 --- a/CVE-2024/CVE-2024-318xx/CVE-2024-31813.json +++ b/CVE-2024/CVE-2024-318xx/CVE-2024-31813.json @@ -2,8 +2,8 @@ "id": "CVE-2024-31813", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-08T13:15:08.840", - "lastModified": "2024-11-21T09:13:56.147", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-18T16:03:30.870", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,49 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:totolink:ex200_firmware:4.0.3c.7646_b20201211:*:*:*:*:*:*:*", + "matchCriteriaId": "DFAA2333-6AF0-4F2C-8695-0DE2024C634E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:totolink:ex200:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CCFDF09E-D255-4F5B-A099-71EE37A56492" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/4hsien/CVE-vulns/blob/main/TOTOLINK/EX200/Missing_Authentication/missauth.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://github.com/4hsien/CVE-vulns/blob/main/TOTOLINK/EX200/Missing_Authentication/missauth.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-318xx/CVE-2024-31814.json b/CVE-2024/CVE-2024-318xx/CVE-2024-31814.json index 064c2823bb4..956fb4a47d0 100644 --- a/CVE-2024/CVE-2024-318xx/CVE-2024-31814.json +++ b/CVE-2024/CVE-2024-318xx/CVE-2024-31814.json @@ -2,8 +2,8 @@ "id": "CVE-2024-31814", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-08T13:15:08.887", - "lastModified": "2024-11-21T09:13:56.373", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-18T16:03:02.557", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,51 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:totolink:ex200_firmware:4.0.3c.7646_b20201211:*:*:*:*:*:*:*", + "matchCriteriaId": "DFAA2333-6AF0-4F2C-8695-0DE2024C634E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:totolink:ex200:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CCFDF09E-D255-4F5B-A099-71EE37A56492" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/4hsien/CVE-vulns/blob/main/TOTOLINK/EX200/Login_Bypass/bypass.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/4hsien/CVE-vulns/blob/main/TOTOLINK/EX200/Login_Bypass/bypass.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-318xx/CVE-2024-31816.json b/CVE-2024/CVE-2024-318xx/CVE-2024-31816.json index 33a917e2fd6..056c3abe188 100644 --- a/CVE-2024/CVE-2024-318xx/CVE-2024-31816.json +++ b/CVE-2024/CVE-2024-318xx/CVE-2024-31816.json @@ -2,8 +2,8 @@ "id": "CVE-2024-31816", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-08T13:15:08.987", - "lastModified": "2024-11-21T09:13:56.820", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-18T16:02:17.737", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,49 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:totolink:ex200_firmware:4.0.3c.7646_b20201211:*:*:*:*:*:*:*", + "matchCriteriaId": "DFAA2333-6AF0-4F2C-8695-0DE2024C634E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:totolink:ex200:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CCFDF09E-D255-4F5B-A099-71EE37A56492" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/4hsien/CVE-vulns/blob/main/TOTOLINK/EX200/Leak_getEasyWizardCfg/Leak.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://github.com/4hsien/CVE-vulns/blob/main/TOTOLINK/EX200/Leak_getEasyWizardCfg/Leak.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-340xx/CVE-2024-34092.json b/CVE-2024/CVE-2024-340xx/CVE-2024-34092.json index 1df9dfe0279..b7ba46251dc 100644 --- a/CVE-2024/CVE-2024-340xx/CVE-2024-34092.json +++ b/CVE-2024/CVE-2024-340xx/CVE-2024-34092.json @@ -2,8 +2,8 @@ "id": "CVE-2024-34092", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-06T16:15:13.770", - "lastModified": "2024-11-21T09:18:04.823", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-18T15:22:43.557", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,23 +15,93 @@ "value": "Se descubri\u00f3 un problema en Archer Platform 6 antes del 2024.04. La autenticaci\u00f3n se manej\u00f3 mal porque el bloqueo no finaliz\u00f3 una sesi\u00f3n existente. 6.14 P3 (6.14.0.3) tambi\u00e9n es una versi\u00f3n corregida." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-613" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:archerirm:archer:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.14.0.3", + "matchCriteriaId": "E4643898-6CFC-4F96-8564-BE6A46E7B75F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:archerirm:archer:2024.03:*:*:*:*:*:*:*", + "matchCriteriaId": "14B1EA5F-1E5D-4A30-88E5-4460188A7D19" + } + ] + } + ] + } + ], "references": [ { "url": "https://archerirm.com", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "https://www.archerirm.community/t5/platform-announcements/archer-update-for-multiple-vulnerabilities/ta-p/720963", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://archerirm.com", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://www.archerirm.community/t5/platform-announcements/archer-update-for-multiple-vulnerabilities/ta-p/720963", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-340xx/CVE-2024-34093.json b/CVE-2024/CVE-2024-340xx/CVE-2024-34093.json index 964d8f08c50..bed2182d66f 100644 --- a/CVE-2024/CVE-2024-340xx/CVE-2024-34093.json +++ b/CVE-2024/CVE-2024-340xx/CVE-2024-34093.json @@ -2,8 +2,8 @@ "id": "CVE-2024-34093", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-06T16:15:13.817", - "lastModified": "2024-11-21T09:18:04.953", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-18T15:26:21.247", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 } ] }, @@ -51,22 +71,52 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:archerirm:archer:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2024.03", + "matchCriteriaId": "FB9541F4-9921-4907-ABCF-EFB8B0674BCF" + } + ] + } + ] + } + ], "references": [ { "url": "https://archerirm.com", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "https://www.archerirm.community/t5/platform-announcements/archer-update-for-multiple-vulnerabilities/ta-p/720963", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://archerirm.com", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://www.archerirm.community/t5/platform-announcements/archer-update-for-multiple-vulnerabilities/ta-p/720963", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-354xx/CVE-2024-35426.json b/CVE-2024/CVE-2024-354xx/CVE-2024-35426.json index 2816d0d6feb..cc55ecc401f 100644 --- a/CVE-2024/CVE-2024-354xx/CVE-2024-35426.json +++ b/CVE-2024/CVE-2024-354xx/CVE-2024-35426.json @@ -2,7 +2,7 @@ "id": "CVE-2024-35426", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-08T23:15:03.580", - "lastModified": "2024-11-12T15:35:05.420", + "lastModified": "2025-03-18T15:15:50.280", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/haruki3hhh/9d2a5a139a8b72517009953d0ba7338c", diff --git a/CVE-2024/CVE-2024-35xx/CVE-2024-3596.json b/CVE-2024/CVE-2024-35xx/CVE-2024-3596.json index 0f9c7b1376a..e6dd8c9be77 100644 --- a/CVE-2024/CVE-2024-35xx/CVE-2024-3596.json +++ b/CVE-2024/CVE-2024-35xx/CVE-2024-3596.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3596", "sourceIdentifier": "cret@cert.org", "published": "2024-07-09T12:15:20.700", - "lastModified": "2024-12-30T19:23:20.437", - "vulnStatus": "Analyzed", + "lastModified": "2025-03-18T16:15:22.140", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.2, "impactScore": 6.0 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", + "baseScore": 9.0, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 6.0 } ] }, @@ -53,6 +73,28 @@ "value": "CWE-924" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + }, + { + "lang": "en", + "value": "CWE-328" + }, + { + "lang": "en", + "value": "CWE-354" + }, + { + "lang": "en", + "value": "CWE-924" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-363xx/CVE-2024-36359.json b/CVE-2024/CVE-2024-363xx/CVE-2024-36359.json index 694b87f7ffc..15fe74aa9ae 100644 --- a/CVE-2024/CVE-2024-363xx/CVE-2024-36359.json +++ b/CVE-2024/CVE-2024-363xx/CVE-2024-36359.json @@ -2,7 +2,7 @@ "id": "CVE-2024-36359", "sourceIdentifier": "security@trendmicro.com", "published": "2024-06-10T22:15:11.413", - "lastModified": "2024-11-21T09:22:01.040", + "lastModified": "2025-03-18T16:15:21.627", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -69,6 +69,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-374xx/CVE-2024-37479.json b/CVE-2024/CVE-2024-374xx/CVE-2024-37479.json index a8e03518f20..a0c9bda586c 100644 --- a/CVE-2024/CVE-2024-374xx/CVE-2024-37479.json +++ b/CVE-2024/CVE-2024-374xx/CVE-2024-37479.json @@ -2,7 +2,7 @@ "id": "CVE-2024-37479", "sourceIdentifier": "audit@patchstack.com", "published": "2024-07-02T08:15:06.190", - "lastModified": "2024-11-21T09:23:54.570", + "lastModified": "2025-03-18T15:15:50.993", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-98" + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/lastudio-element-kit/wordpress-la-studio-element-kit-for-elementor-plugin-1-3-8-1-local-file-inclusion-vulnerability?_s_id=cve", diff --git a/CVE-2024/CVE-2024-376xx/CVE-2024-37675.json b/CVE-2024/CVE-2024-376xx/CVE-2024-37675.json index 1bc1c950cf6..538eff65c61 100644 --- a/CVE-2024/CVE-2024-376xx/CVE-2024-37675.json +++ b/CVE-2024/CVE-2024-376xx/CVE-2024-37675.json @@ -2,7 +2,7 @@ "id": "CVE-2024-37675", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-21T17:15:11.143", - "lastModified": "2024-11-21T09:24:13.560", + "lastModified": "2025-03-18T15:15:51.737", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-388xx/CVE-2024-38816.json b/CVE-2024/CVE-2024-388xx/CVE-2024-38816.json index a7cd13fefc2..3c14cfcfa78 100644 --- a/CVE-2024/CVE-2024-388xx/CVE-2024-38816.json +++ b/CVE-2024/CVE-2024-388xx/CVE-2024-38816.json @@ -2,7 +2,7 @@ "id": "CVE-2024-38816", "sourceIdentifier": "security@vmware.com", "published": "2024-09-13T06:15:11.190", - "lastModified": "2024-12-27T16:15:24.313", + "lastModified": "2025-03-18T15:15:52.397", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], "references": [ { "url": "https://spring.io/security/cve-2024-38816", diff --git a/CVE-2024/CVE-2024-392xx/CVE-2024-39248.json b/CVE-2024/CVE-2024-392xx/CVE-2024-39248.json index 2836762cd76..6c0612d14cc 100644 --- a/CVE-2024/CVE-2024-392xx/CVE-2024-39248.json +++ b/CVE-2024/CVE-2024-392xx/CVE-2024-39248.json @@ -2,7 +2,7 @@ "id": "CVE-2024-39248", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-03T17:15:04.303", - "lastModified": "2024-11-21T09:27:21.960", + "lastModified": "2025-03-18T15:15:52.563", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-399xx/CVE-2024-39929.json b/CVE-2024/CVE-2024-399xx/CVE-2024-39929.json index 0de61191844..70d30006bdb 100644 --- a/CVE-2024/CVE-2024-399xx/CVE-2024-39929.json +++ b/CVE-2024/CVE-2024-399xx/CVE-2024-39929.json @@ -2,7 +2,7 @@ "id": "CVE-2024-39929", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-04T15:15:10.323", - "lastModified": "2024-11-21T09:28:35.660", + "lastModified": "2025-03-18T16:15:21.850", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-116" + } + ] + } + ], "references": [ { "url": "https://bugs.exim.org/show_bug.cgi?id=3099#c4", diff --git a/CVE-2024/CVE-2024-403xx/CVE-2024-40347.json b/CVE-2024/CVE-2024-403xx/CVE-2024-40347.json index f933a6ff304..5c6f77623c3 100644 --- a/CVE-2024/CVE-2024-403xx/CVE-2024-40347.json +++ b/CVE-2024/CVE-2024-403xx/CVE-2024-40347.json @@ -2,7 +2,7 @@ "id": "CVE-2024-40347", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-20T04:15:03.853", - "lastModified": "2024-11-21T09:31:01.713", + "lastModified": "2025-03-18T15:15:52.787", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-405xx/CVE-2024-40596.json b/CVE-2024/CVE-2024-405xx/CVE-2024-40596.json index 094c74b5987..b525da6c6a0 100644 --- a/CVE-2024/CVE-2024-405xx/CVE-2024-40596.json +++ b/CVE-2024/CVE-2024-405xx/CVE-2024-40596.json @@ -2,7 +2,7 @@ "id": "CVE-2024-40596", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-07T00:15:10.067", - "lastModified": "2024-11-21T09:31:20.793", + "lastModified": "2025-03-18T16:15:22.477", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-532" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-532" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-408xx/CVE-2024-40831.json b/CVE-2024/CVE-2024-408xx/CVE-2024-40831.json index bc21b2a51e7..2d4c5404c1c 100644 --- a/CVE-2024/CVE-2024-408xx/CVE-2024-40831.json +++ b/CVE-2024/CVE-2024-408xx/CVE-2024-40831.json @@ -2,8 +2,8 @@ "id": "CVE-2024-40831", "sourceIdentifier": "product-security@apple.com", "published": "2024-09-17T00:15:48.753", - "lastModified": "2024-09-23T19:18:02.207", - "vulnStatus": "Analyzed", + "lastModified": "2025-03-18T15:15:53.077", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-281" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-281" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-408xx/CVE-2024-40835.json b/CVE-2024/CVE-2024-408xx/CVE-2024-40835.json index b0de152c47f..d46ca269023 100644 --- a/CVE-2024/CVE-2024-408xx/CVE-2024-40835.json +++ b/CVE-2024/CVE-2024-408xx/CVE-2024-40835.json @@ -2,7 +2,7 @@ "id": "CVE-2024-40835", "sourceIdentifier": "product-security@apple.com", "published": "2024-07-29T23:15:14.487", - "lastModified": "2024-11-21T09:31:44.430", + "lastModified": "2025-03-18T15:15:53.270", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, diff --git a/CVE-2024/CVE-2024-415xx/CVE-2024-41587.json b/CVE-2024/CVE-2024-415xx/CVE-2024-41587.json index ae5c0ca7478..4ad375d0ce1 100644 --- a/CVE-2024/CVE-2024-415xx/CVE-2024-41587.json +++ b/CVE-2024/CVE-2024-415xx/CVE-2024-41587.json @@ -2,8 +2,8 @@ "id": "CVE-2024-41587", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-03T19:15:04.310", - "lastModified": "2024-10-08T15:32:18.313", - "vulnStatus": "Analyzed", + "lastModified": "2025-03-18T16:15:22.733", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-417xx/CVE-2024-41707.json b/CVE-2024/CVE-2024-417xx/CVE-2024-41707.json index c96e7661f1b..865d3bd73b5 100644 --- a/CVE-2024/CVE-2024-417xx/CVE-2024-41707.json +++ b/CVE-2024/CVE-2024-417xx/CVE-2024-41707.json @@ -2,7 +2,7 @@ "id": "CVE-2024-41707", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-25T08:15:02.980", - "lastModified": "2024-11-21T09:33:01.440", + "lastModified": "2025-03-18T16:15:23.030", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -69,6 +69,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-428xx/CVE-2024-42861.json b/CVE-2024/CVE-2024-428xx/CVE-2024-42861.json index 2feaa7f52b1..26b96f4d213 100644 --- a/CVE-2024/CVE-2024-428xx/CVE-2024-42861.json +++ b/CVE-2024/CVE-2024-428xx/CVE-2024-42861.json @@ -2,8 +2,8 @@ "id": "CVE-2024-42861", "sourceIdentifier": "cve@mitre.org", "published": "2024-09-23T21:15:12.870", - "lastModified": "2024-09-30T17:35:11.653", - "vulnStatus": "Analyzed", + "lastModified": "2025-03-18T16:15:23.257", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, diff --git a/CVE-2024/CVE-2024-429xx/CVE-2024-42952.json b/CVE-2024/CVE-2024-429xx/CVE-2024-42952.json index 3051053172a..b82fcdaf811 100644 --- a/CVE-2024/CVE-2024-429xx/CVE-2024-42952.json +++ b/CVE-2024/CVE-2024-429xx/CVE-2024-42952.json @@ -2,8 +2,8 @@ "id": "CVE-2024-42952", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-15T17:15:19.690", - "lastModified": "2024-08-15T19:30:38.387", - "vulnStatus": "Analyzed", + "lastModified": "2025-03-18T16:15:23.520", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-432xx/CVE-2024-43202.json b/CVE-2024/CVE-2024-432xx/CVE-2024-43202.json index eb257914b06..c32b7ed84c0 100644 --- a/CVE-2024/CVE-2024-432xx/CVE-2024-43202.json +++ b/CVE-2024/CVE-2024-432xx/CVE-2024-43202.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43202", "sourceIdentifier": "security@apache.org", "published": "2024-08-20T08:15:05.240", - "lastModified": "2024-11-21T09:35:07.797", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-18T15:57:37.460", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,26 +71,62 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:apache:dolphinscheduler:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.0.0", + "versionEndExcluding": "3.2.2", + "matchCriteriaId": "B8EC3473-58C8-4963-B966-C494C50DC5E7" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/apache/dolphinscheduler/pull/15758", - "source": "security@apache.org" + "source": "security@apache.org", + "tags": [ + "Issue Tracking", + "Patch" + ] }, { "url": "https://lists.apache.org/thread/nlmdp7q7l7o3l27778vxc5px24ncr5r5", - "source": "security@apache.org" + "source": "security@apache.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://lists.apache.org/thread/qbhk9wqyxhrn4z7m4m343wqxpwg926nh", - "source": "security@apache.org" + "source": "security@apache.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.cve.org/CVERecord?id=CVE-2023-49109", - "source": "security@apache.org" + "source": "security@apache.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://www.openwall.com/lists/oss-security/2024/08/20/2", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-433xx/CVE-2024-43304.json b/CVE-2024/CVE-2024-433xx/CVE-2024-43304.json index 96df377e189..36ebb1aad9a 100644 --- a/CVE-2024/CVE-2024-433xx/CVE-2024-43304.json +++ b/CVE-2024/CVE-2024-433xx/CVE-2024-43304.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43304", "sourceIdentifier": "audit@patchstack.com", "published": "2024-08-18T21:15:03.860", - "lastModified": "2024-08-19T12:59:59.177", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-18T15:29:07.507", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:coolplugins:cryptocurrency_widgets:*:*:*:*:free:wordpress:*:*", + "versionEndExcluding": "2.8.1", + "matchCriteriaId": "3572A5F2-8CBB-4D31-B9AC-E45A39BDCDE1" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/cryptocurrency-price-ticker-widget/wordpress-cryptocurrency-widgets-plugin-2-8-0-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-437xx/CVE-2024-43770.json b/CVE-2024/CVE-2024-437xx/CVE-2024-43770.json index b0fcffe61c6..e5bb331876c 100644 --- a/CVE-2024/CVE-2024-437xx/CVE-2024-43770.json +++ b/CVE-2024/CVE-2024-437xx/CVE-2024-43770.json @@ -2,7 +2,7 @@ "id": "CVE-2024-43770", "sourceIdentifier": "security@android.com", "published": "2025-01-21T23:15:13.790", - "lastModified": "2025-02-18T20:15:18.960", + "lastModified": "2025-03-18T15:15:53.527", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "En gatts_process_find_info de gatt_sr.cc, existe una posible escritura fuera de los l\u00edmites debido a neutra. Esto podr\u00eda provocar la ejecuci\u00f3n remota de c\u00f3digo (pr\u00f3ximo/adyacente) sin necesidad de privilegios de ejecuci\u00f3n adicionales. No se necesita interacci\u00f3n del usuario para la explotaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], "references": [ { "url": "https://source.android.com/security/bulletin/2025-01-01", diff --git a/CVE-2024/CVE-2024-441xx/CVE-2024-44122.json b/CVE-2024/CVE-2024-441xx/CVE-2024-44122.json index 282418c69b4..1ae22b45105 100644 --- a/CVE-2024/CVE-2024-441xx/CVE-2024-44122.json +++ b/CVE-2024/CVE-2024-441xx/CVE-2024-44122.json @@ -2,8 +2,8 @@ "id": "CVE-2024-44122", "sourceIdentifier": "product-security@apple.com", "published": "2024-10-28T21:15:05.123", - "lastModified": "2024-10-29T17:38:18.457", - "vulnStatus": "Analyzed", + "lastModified": "2025-03-18T16:15:23.783", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.0, "impactScore": 6.0 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.0, + "impactScore": 6.0 } ] }, @@ -49,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-693" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-441xx/CVE-2024-44142.json b/CVE-2024/CVE-2024-441xx/CVE-2024-44142.json index 5c28cc0c194..7bde6406aad 100644 --- a/CVE-2024/CVE-2024-441xx/CVE-2024-44142.json +++ b/CVE-2024/CVE-2024-441xx/CVE-2024-44142.json @@ -2,8 +2,8 @@ "id": "CVE-2024-44142", "sourceIdentifier": "product-security@apple.com", "published": "2025-01-30T19:15:13.910", - "lastModified": "2025-02-02T10:15:30.197", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-18T16:06:18.150", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -39,14 +59,52 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:apple:garageband:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.4.12", + "matchCriteriaId": "08180A03-77F4-4F8B-98F7-8A38A931127E" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/121866", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory", + "Release Notes" + ] }, { "url": "http://seclists.org/fulldisclosure/2025/Feb/2", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory", + "Release Notes" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-443xx/CVE-2024-44313.json b/CVE-2024/CVE-2024-443xx/CVE-2024-44313.json new file mode 100644 index 00000000000..a50d764cfc6 --- /dev/null +++ b/CVE-2024/CVE-2024-443xx/CVE-2024-44313.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-44313", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-03-18T15:15:53.720", + "lastModified": "2025-03-18T15:15:53.720", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "TastyIgniter 3.7.6 contains an Incorrect Access Control vulnerability in the invoice() function within Orders.php which allows unauthorized users to access and generate invoices due to missing permission checks." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/tastyigniter/TastyIgniter/blob/3.x/app/admin/controllers/Orders.php", + "source": "cve@mitre.org" + }, + { + "url": "https://medium.com/@cnetsec/cve-2024-44313-incorrect-access-control-in-tastyigniter-3-7-6-01a73c548b74", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-443xx/CVE-2024-44314.json b/CVE-2024/CVE-2024-443xx/CVE-2024-44314.json new file mode 100644 index 00000000000..1df3cc797bc --- /dev/null +++ b/CVE-2024/CVE-2024-443xx/CVE-2024-44314.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-44314", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-03-18T15:15:53.847", + "lastModified": "2025-03-18T15:15:53.847", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "TastyIgniter 3.7.6 contains an Incorrect Access Control vulnerability in the Orders Management System, allowing unauthorized users to update order statuses. The issue occurs in the index_onUpdateStatus() function within Orders.php, which fails to verify if the user has permission to modify an order's status. This flaw can be exploited remotely, leading to unauthorized order manipulation." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/tastyigniter/TastyIgniter/blob/3.x/app/admin/controllers/Orders.php", + "source": "cve@mitre.org" + }, + { + "url": "https://medium.com/@cnetsec/cve-2024-44314-incorrect-access-control-in-function-updateorder-fc5f2b1b0467", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-44xx/CVE-2024-4469.json b/CVE-2024/CVE-2024-44xx/CVE-2024-4469.json index 21e0e09ea65..05cc47b82e1 100644 --- a/CVE-2024/CVE-2024-44xx/CVE-2024-4469.json +++ b/CVE-2024/CVE-2024-44xx/CVE-2024-4469.json @@ -2,7 +2,7 @@ "id": "CVE-2024-4469", "sourceIdentifier": "contact@wpscan.com", "published": "2024-05-31T06:15:13.897", - "lastModified": "2024-11-21T09:42:53.253", + "lastModified": "2025-03-18T15:15:56.493", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "El complemento WP STAGING WordPress Backup Plugin de WordPress anterior a 3.5.0 no impide que los usuarios con funci\u00f3n de administrador hagan ping y realicen ataques SSRF, lo que puede ser un problema en configuraciones multisitio." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/d6b1270b-52c0-471d-a5fb-507e21b46310/", diff --git a/CVE-2024/CVE-2024-462xx/CVE-2024-46263.json b/CVE-2024/CVE-2024-462xx/CVE-2024-46263.json index 86a65a4f766..6686144c472 100644 --- a/CVE-2024/CVE-2024-462xx/CVE-2024-46263.json +++ b/CVE-2024/CVE-2024-462xx/CVE-2024-46263.json @@ -2,8 +2,8 @@ "id": "CVE-2024-46263", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-01T14:15:05.910", - "lastModified": "2024-10-04T16:39:33.890", - "vulnStatus": "Analyzed", + "lastModified": "2025-03-18T16:15:24.023", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-462xx/CVE-2024-46267.json b/CVE-2024/CVE-2024-462xx/CVE-2024-46267.json index 853ed2a12d3..e8d2de5b08c 100644 --- a/CVE-2024/CVE-2024-462xx/CVE-2024-46267.json +++ b/CVE-2024/CVE-2024-462xx/CVE-2024-46267.json @@ -2,8 +2,8 @@ "id": "CVE-2024-46267", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-01T14:15:06.090", - "lastModified": "2024-10-04T16:38:16.390", - "vulnStatus": "Analyzed", + "lastModified": "2025-03-18T15:15:53.997", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-462xx/CVE-2024-46274.json b/CVE-2024/CVE-2024-462xx/CVE-2024-46274.json index 9e8b9493eb0..ef386e3c035 100644 --- a/CVE-2024/CVE-2024-462xx/CVE-2024-46274.json +++ b/CVE-2024/CVE-2024-462xx/CVE-2024-46274.json @@ -2,8 +2,8 @@ "id": "CVE-2024-46274", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-01T14:15:06.177", - "lastModified": "2024-10-04T16:37:30.007", - "vulnStatus": "Analyzed", + "lastModified": "2025-03-18T15:15:54.230", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-465xx/CVE-2024-46535.json b/CVE-2024/CVE-2024-465xx/CVE-2024-46535.json index dc3eb409c4e..5082a073558 100644 --- a/CVE-2024/CVE-2024-465xx/CVE-2024-46535.json +++ b/CVE-2024/CVE-2024-465xx/CVE-2024-46535.json @@ -2,7 +2,7 @@ "id": "CVE-2024-46535", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-14T17:15:13.440", - "lastModified": "2024-10-15T16:35:08.740", + "lastModified": "2025-03-18T15:15:54.450", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://gitee.com/ketr/jepaas-release/issues/IAPJ8H?from=project-issue", diff --git a/CVE-2024/CVE-2024-465xx/CVE-2024-46555.json b/CVE-2024/CVE-2024-465xx/CVE-2024-46555.json index e3ec619b1c9..378339cdd5a 100644 --- a/CVE-2024/CVE-2024-465xx/CVE-2024-46555.json +++ b/CVE-2024/CVE-2024-465xx/CVE-2024-46555.json @@ -2,8 +2,8 @@ "id": "CVE-2024-46555", "sourceIdentifier": "cve@mitre.org", "published": "2024-09-18T15:15:16.837", - "lastModified": "2024-09-24T16:41:44.893", - "vulnStatus": "Analyzed", + "lastModified": "2025-03-18T15:15:54.673", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-120" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-465xx/CVE-2024-46556.json b/CVE-2024/CVE-2024-465xx/CVE-2024-46556.json index 427af21078b..4a775ae3964 100644 --- a/CVE-2024/CVE-2024-465xx/CVE-2024-46556.json +++ b/CVE-2024/CVE-2024-465xx/CVE-2024-46556.json @@ -2,8 +2,8 @@ "id": "CVE-2024-46556", "sourceIdentifier": "cve@mitre.org", "published": "2024-09-18T15:15:16.910", - "lastModified": "2024-09-24T16:41:46.957", - "vulnStatus": "Analyzed", + "lastModified": "2025-03-18T15:15:54.877", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-120" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-465xx/CVE-2024-46567.json b/CVE-2024/CVE-2024-465xx/CVE-2024-46567.json index 0853f36dabd..b8813bd6fda 100644 --- a/CVE-2024/CVE-2024-465xx/CVE-2024-46567.json +++ b/CVE-2024/CVE-2024-465xx/CVE-2024-46567.json @@ -2,8 +2,8 @@ "id": "CVE-2024-46567", "sourceIdentifier": "cve@mitre.org", "published": "2024-09-18T15:15:17.420", - "lastModified": "2024-09-24T16:42:00.340", - "vulnStatus": "Analyzed", + "lastModified": "2025-03-18T16:15:24.277", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-120" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-465xx/CVE-2024-46583.json b/CVE-2024/CVE-2024-465xx/CVE-2024-46583.json index 731b89f1340..f0bbcdb5653 100644 --- a/CVE-2024/CVE-2024-465xx/CVE-2024-46583.json +++ b/CVE-2024/CVE-2024-465xx/CVE-2024-46583.json @@ -2,8 +2,8 @@ "id": "CVE-2024-46583", "sourceIdentifier": "cve@mitre.org", "published": "2024-09-18T15:15:17.723", - "lastModified": "2024-09-24T16:40:48.437", - "vulnStatus": "Analyzed", + "lastModified": "2025-03-18T15:15:55.090", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-120" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-465xx/CVE-2024-46590.json b/CVE-2024/CVE-2024-465xx/CVE-2024-46590.json index fe6f9595f5d..939c3de480f 100644 --- a/CVE-2024/CVE-2024-465xx/CVE-2024-46590.json +++ b/CVE-2024/CVE-2024-465xx/CVE-2024-46590.json @@ -2,8 +2,8 @@ "id": "CVE-2024-46590", "sourceIdentifier": "cve@mitre.org", "published": "2024-09-18T15:15:18.067", - "lastModified": "2024-10-10T13:14:14.267", - "vulnStatus": "Analyzed", + "lastModified": "2025-03-18T15:15:55.303", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-120" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-465xx/CVE-2024-46598.json b/CVE-2024/CVE-2024-465xx/CVE-2024-46598.json index f3f35352aa9..b9a80955b29 100644 --- a/CVE-2024/CVE-2024-465xx/CVE-2024-46598.json +++ b/CVE-2024/CVE-2024-465xx/CVE-2024-46598.json @@ -2,8 +2,8 @@ "id": "CVE-2024-46598", "sourceIdentifier": "cve@mitre.org", "published": "2024-09-18T15:15:18.453", - "lastModified": "2024-09-24T16:37:39.833", - "vulnStatus": "Analyzed", + "lastModified": "2025-03-18T15:15:55.530", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-120" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-481xx/CVE-2024-48125.json b/CVE-2024/CVE-2024-481xx/CVE-2024-48125.json index f200a5bc922..f7bf0715ff2 100644 --- a/CVE-2024/CVE-2024-481xx/CVE-2024-48125.json +++ b/CVE-2024/CVE-2024-481xx/CVE-2024-48125.json @@ -2,7 +2,7 @@ "id": "CVE-2024-48125", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-15T21:15:13.477", - "lastModified": "2025-02-18T22:15:11.873", + "lastModified": "2025-03-18T15:15:55.733", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Un problema en el servicio AsDB de HI-SCAN 6040i Hitrax HX-03-19-I permite a los atacantes enumerar las credenciales de los usuarios a trav\u00e9s de solicitudes de protocolo GIOP manipuladas." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], "references": [ { "url": "https://kth.diva-portal.org/smash/get/diva2:1876534/FULLTEXT01.pdf", diff --git a/CVE-2024/CVE-2024-497xx/CVE-2024-49737.json b/CVE-2024/CVE-2024-497xx/CVE-2024-49737.json index 975bc0fec79..67b37972167 100644 --- a/CVE-2024/CVE-2024-497xx/CVE-2024-49737.json +++ b/CVE-2024/CVE-2024-497xx/CVE-2024-49737.json @@ -2,7 +2,7 @@ "id": "CVE-2024-49737", "sourceIdentifier": "security@android.com", "published": "2025-01-21T23:15:14.593", - "lastModified": "2025-02-18T20:15:20.460", + "lastModified": "2025-03-18T15:15:55.933", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "En applyTaskFragmentOperation de WindowOrganizerController.java, existe una forma posible de iniciar actividades arbitrarias como el UID sistema debido a un error l\u00f3gico en el c\u00f3digo. Esto podr\u00eda provocar una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. No se necesita interacci\u00f3n del usuario para la explotaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-276" + } + ] + } + ], "references": [ { "url": "https://source.android.com/security/bulletin/2025-01-01", diff --git a/CVE-2024/CVE-2024-497xx/CVE-2024-49747.json b/CVE-2024/CVE-2024-497xx/CVE-2024-49747.json index b219a569be9..4eff08ed740 100644 --- a/CVE-2024/CVE-2024-497xx/CVE-2024-49747.json +++ b/CVE-2024/CVE-2024-497xx/CVE-2024-49747.json @@ -2,7 +2,7 @@ "id": "CVE-2024-49747", "sourceIdentifier": "security@android.com", "published": "2025-01-21T23:15:15.100", - "lastModified": "2025-02-18T20:15:20.893", + "lastModified": "2025-03-18T15:15:56.117", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "En gatts_process_read_by_type_req de gatt_sr.cc, existe una posible escritura fuera de los l\u00edmites debido a un error l\u00f3gico en el c\u00f3digo. Esto podr\u00eda provocar la ejecuci\u00f3n remota de c\u00f3digo sin necesidad de privilegios de ejecuci\u00f3n adicionales. No se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], "references": [ { "url": "https://source.android.com/security/bulletin/2025-01-01", diff --git a/CVE-2024/CVE-2024-498xx/CVE-2024-49822.json b/CVE-2024/CVE-2024-498xx/CVE-2024-49822.json new file mode 100644 index 00000000000..8f1fe721bdf --- /dev/null +++ b/CVE-2024/CVE-2024-498xx/CVE-2024-49822.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-49822", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2025-03-18T15:15:56.283", + "lastModified": "2025-03-18T15:15:56.283", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "IBM QRadar Advisor 1.0.0 through 2.6.5 is vulnerable to server-side request forgery (SSRF). This may allow an authenticated attacker to send unauthorized requests from the system, potentially leading to network enumeration or facilitating other attacks." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:N/A:N", + "baseScore": 4.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-918" + } + ] + } + ], + "references": [ + { + "url": "https://www.ibm.com/support/pages/node/7186424", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-49xx/CVE-2024-4970.json b/CVE-2024/CVE-2024-49xx/CVE-2024-4970.json index 694e1b41902..81a0431c994 100644 --- a/CVE-2024/CVE-2024-49xx/CVE-2024-4970.json +++ b/CVE-2024/CVE-2024-49xx/CVE-2024-4970.json @@ -2,7 +2,7 @@ "id": "CVE-2024-4970", "sourceIdentifier": "contact@wpscan.com", "published": "2024-06-21T06:15:12.670", - "lastModified": "2024-11-21T09:43:58.627", + "lastModified": "2025-03-18T15:15:56.680", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.7, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, diff --git a/CVE-2024/CVE-2024-539xx/CVE-2024-53942.json b/CVE-2024/CVE-2024-539xx/CVE-2024-53942.json index fbf47dd529e..517b2520916 100644 --- a/CVE-2024/CVE-2024-539xx/CVE-2024-53942.json +++ b/CVE-2024/CVE-2024-539xx/CVE-2024-53942.json @@ -2,7 +2,7 @@ "id": "CVE-2024-53942", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-03T18:15:36.633", - "lastModified": "2025-02-03T18:15:36.633", + "lastModified": "2025-03-18T16:15:24.517", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se descubri\u00f3 un problema en los dispositivos NRadio N8-180 NROS-1.9.2.n3.c5. El /cgi-bin/luci/nradio/basic/radio endpoint es vulnerable a la inyecci\u00f3n de comandos a trav\u00e9s de los par\u00e1metros de nombre de 2,4 GHz y 5 GHz, lo que permite que un atacante remoto ejecute comandos arbitrarios del sistema operativo en el dispositivo (con permisos de nivel superusuario) a trav\u00e9s de la entrada manipulado." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.2, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], "references": [ { "url": "https://github.com/actuator/cve/blob/main/NRADIO/CVE-2024-53942.txt", diff --git a/CVE-2024/CVE-2024-545xx/CVE-2024-54537.json b/CVE-2024/CVE-2024-545xx/CVE-2024-54537.json index ed62036898e..842a23807c0 100644 --- a/CVE-2024/CVE-2024-545xx/CVE-2024-54537.json +++ b/CVE-2024/CVE-2024-545xx/CVE-2024-54537.json @@ -2,8 +2,8 @@ "id": "CVE-2024-54537", "sourceIdentifier": "product-security@apple.com", "published": "2025-01-27T22:15:13.940", - "lastModified": "2025-03-04T15:22:23.180", - "vulnStatus": "Analyzed", + "lastModified": "2025-03-18T15:15:56.877", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.8 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.2 } ] }, diff --git a/CVE-2024/CVE-2024-545xx/CVE-2024-54541.json b/CVE-2024/CVE-2024-545xx/CVE-2024-54541.json index 50dc96f2a88..7a84d9a84a9 100644 --- a/CVE-2024/CVE-2024-545xx/CVE-2024-54541.json +++ b/CVE-2024/CVE-2024-545xx/CVE-2024-54541.json @@ -2,8 +2,8 @@ "id": "CVE-2024-54541", "sourceIdentifier": "product-security@apple.com", "published": "2025-01-27T22:15:14.117", - "lastModified": "2025-01-30T17:31:31.880", - "vulnStatus": "Analyzed", + "lastModified": "2025-03-18T16:15:24.763", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-922" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-547xx/CVE-2024-54730.json b/CVE-2024/CVE-2024-547xx/CVE-2024-54730.json index 079363a3fdb..c982e1b114a 100644 --- a/CVE-2024/CVE-2024-547xx/CVE-2024-54730.json +++ b/CVE-2024/CVE-2024-547xx/CVE-2024-54730.json @@ -2,7 +2,7 @@ "id": "CVE-2024-54730", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-14T23:15:08.837", - "lastModified": "2025-02-18T22:15:12.677", + "lastModified": "2025-03-18T15:15:57.073", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": " Flatnotes " } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] + } + ], "references": [ { "url": "https://github.com/Startr4ck/CVE_lists/blob/main/flatnotes/flatnotes%20webserver%20dos.md", diff --git a/CVE-2024/CVE-2024-549xx/CVE-2024-54916.json b/CVE-2024/CVE-2024-549xx/CVE-2024-54916.json index 5db8c5418e9..e0ed173339b 100644 --- a/CVE-2024/CVE-2024-549xx/CVE-2024-54916.json +++ b/CVE-2024/CVE-2024-549xx/CVE-2024-54916.json @@ -2,7 +2,7 @@ "id": "CVE-2024-54916", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-11T23:15:09.227", - "lastModified": "2025-02-18T18:15:26.657", + "lastModified": "2025-03-18T15:15:57.267", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Un problema en la clase SharedConfig de Telegram Android APK v.11.7.0 permite que un atacante f\u00edsicamente pr\u00f3ximo evite la autenticaci\u00f3n y escale privilegios manipulando el valor de retorno del m\u00e9todo checkPasscode." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 6.8, + "baseSeverity": "MEDIUM", + "attackVector": "PHYSICAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] + } + ], "references": [ { "url": "https://drive.google.com/file/d/1knf8-_fFUSLd3ZmbEpy0_OVzSN1UR1JR/view?usp=sharing", diff --git a/CVE-2024/CVE-2024-549xx/CVE-2024-54929.json b/CVE-2024/CVE-2024-549xx/CVE-2024-54929.json index c9f5bc447a3..fba7bec63a7 100644 --- a/CVE-2024/CVE-2024-549xx/CVE-2024-54929.json +++ b/CVE-2024/CVE-2024-549xx/CVE-2024-54929.json @@ -2,8 +2,8 @@ "id": "CVE-2024-54929", "sourceIdentifier": "cve@mitre.org", "published": "2024-12-09T14:15:12.957", - "lastModified": "2024-12-10T15:47:10.800", - "vulnStatus": "Analyzed", + "lastModified": "2025-03-18T15:15:57.460", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-89" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-559xx/CVE-2024-55959.json b/CVE-2024/CVE-2024-559xx/CVE-2024-55959.json index 89e2ee3bd4a..788e9e78466 100644 --- a/CVE-2024/CVE-2024-559xx/CVE-2024-55959.json +++ b/CVE-2024/CVE-2024-559xx/CVE-2024-55959.json @@ -2,7 +2,7 @@ "id": "CVE-2024-55959", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-21T21:15:11.323", - "lastModified": "2025-02-18T21:15:22.793", + "lastModified": "2025-03-18T15:15:57.693", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Northern.tech Mender Client 4.x anterior a 4.0.5 tiene permisos inseguros." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "baseScore": 9.1, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-276" + } + ] + } + ], "references": [ { "url": "https://Northern.tech", diff --git a/CVE-2024/CVE-2024-563xx/CVE-2024-56312.json b/CVE-2024/CVE-2024-563xx/CVE-2024-56312.json index e480042750e..ae04f0db988 100644 --- a/CVE-2024/CVE-2024-563xx/CVE-2024-56312.json +++ b/CVE-2024/CVE-2024-563xx/CVE-2024-56312.json @@ -2,7 +2,7 @@ "id": "CVE-2024-56312", "sourceIdentifier": "cve@mitre.org", "published": "2024-12-22T22:15:05.630", - "lastModified": "2025-01-14T17:15:19.057", + "lastModified": "2025-03-18T15:15:57.893", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Una vulnerabilidad de cross-site scripting (XSS) almacenado en el nombre del panel de proyectos de REDCap hasta la versi\u00f3n 15.0.0 permite a los usuarios autenticados inyectar secuencias de comandos maliciosas en el campo de nombre de un panel de proyectos. Cuando un usuario hace clic en el nombre del panel de proyectos, se ejecuta el payload manipulado, lo que potencialmente permite la ejecuci\u00f3n de secuencias de comandos web arbitrarias." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/ping-oui-no/Vulnerability-Research-CVESS/tree/main/RedCap", diff --git a/CVE-2024/CVE-2024-568xx/CVE-2024-56889.json b/CVE-2024/CVE-2024-568xx/CVE-2024-56889.json index 2000a36a755..1b155f09857 100644 --- a/CVE-2024/CVE-2024-568xx/CVE-2024-56889.json +++ b/CVE-2024/CVE-2024-568xx/CVE-2024-56889.json @@ -2,7 +2,7 @@ "id": "CVE-2024-56889", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-06T22:15:38.903", - "lastModified": "2025-02-18T19:15:19.770", + "lastModified": "2025-03-18T15:15:58.090", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "El control de acceso incorrecto en el endpoint /admin/m_delete.php de CodeAstro Complaint Management System v1.0 permite a atacantes no autorizados eliminar quejas arbitrariamente mediante la modificaci\u00f3n del par\u00e1metro id." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], "references": [ { "url": "https://github.com/vigneshr232/CVE-2024-56889/blob/main/CVE-2024-56889.md", diff --git a/CVE-2024/CVE-2024-570xx/CVE-2024-57014.json b/CVE-2024/CVE-2024-570xx/CVE-2024-57014.json index 72f82134cfa..1ced552804d 100644 --- a/CVE-2024/CVE-2024-570xx/CVE-2024-57014.json +++ b/CVE-2024/CVE-2024-570xx/CVE-2024-57014.json @@ -2,8 +2,8 @@ "id": "CVE-2024-57014", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-15T17:15:17.307", - "lastModified": "2025-03-10T17:22:31.577", - "vulnStatus": "Analyzed", + "lastModified": "2025-03-18T15:15:58.283", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-78" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-571xx/CVE-2024-57169.json b/CVE-2024/CVE-2024-571xx/CVE-2024-57169.json new file mode 100644 index 00000000000..026a51ab80c --- /dev/null +++ b/CVE-2024/CVE-2024-571xx/CVE-2024-57169.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-57169", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-03-18T16:15:25.013", + "lastModified": "2025-03-18T16:15:25.013", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A file upload bypass vulnerability exists in SOPlanning 1.53.00, specifically in /process/upload.php. This vulnerability allows remote attackers to bypass upload restrictions and potentially achieve remote code execution by uploading malicious files." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://themcsam.github.io/posts/so-planing-vulnerabilities/#arbitrary-file-upload-leading-to-rce", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-571xx/CVE-2024-57170.json b/CVE-2024/CVE-2024-571xx/CVE-2024-57170.json new file mode 100644 index 00000000000..e56211c7b37 --- /dev/null +++ b/CVE-2024/CVE-2024-571xx/CVE-2024-57170.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-57170", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-03-18T16:15:25.180", + "lastModified": "2025-03-18T16:15:25.180", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "SOPlanning 1.53.00 is vulnerable to a directory traversal issue in /process/upload.php. The \"fichier_to_delete\" parameter allows authenticated attackers to specify file paths containing directory traversal sequences (e.g., ../). This vulnerability enables attackers to delete arbitrary files outside the intended upload directory, potentially leading to denial of service or disruption of application functionality." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://themcsam.github.io/posts/so-planing-vulnerabilities/#arbitrary-file-deletion", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-573xx/CVE-2024-57360.json b/CVE-2024/CVE-2024-573xx/CVE-2024-57360.json index ea91e07a5a5..f151cd169ca 100644 --- a/CVE-2024/CVE-2024-573xx/CVE-2024-57360.json +++ b/CVE-2024/CVE-2024-573xx/CVE-2024-57360.json @@ -2,7 +2,7 @@ "id": "CVE-2024-57360", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-21T21:15:11.440", - "lastModified": "2025-02-18T21:15:23.853", + "lastModified": "2025-03-18T16:15:25.340", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "https://www.gnu.org/software/binutils/ nm >=2.43 se ve afectado por: Control de acceso incorrecto. El tipo de explotaci\u00f3n es: local. El componente es: funci\u00f3n `nm --without-symbol-version`." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], "references": [ { "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=32467", diff --git a/CVE-2024/CVE-2024-574xx/CVE-2024-57479.json b/CVE-2024/CVE-2024-574xx/CVE-2024-57479.json index 5e3223acebc..c509852dd39 100644 --- a/CVE-2024/CVE-2024-574xx/CVE-2024-57479.json +++ b/CVE-2024/CVE-2024-574xx/CVE-2024-57479.json @@ -2,7 +2,7 @@ "id": "CVE-2024-57479", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-14T22:15:28.377", - "lastModified": "2025-02-18T22:15:14.930", + "lastModified": "2025-03-18T15:15:58.493", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": " H3C N12 V100R005 contiene una vulnerabilidad de desbordamiento de b\u00fafer debido a la falta de verificaci\u00f3n de longitud en la funci\u00f3n de actualizaci\u00f3n de la direcci\u00f3n MAC. Los atacantes que aprovechen esta vulnerabilidad con \u00e9xito pueden provocar que el dispositivo de destino remoto se bloquee o ejecute comandos arbitrarios enviando una solicitud POST a /bin/webs." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], "references": [ { "url": "http://h3c.com", diff --git a/CVE-2024/CVE-2024-576xx/CVE-2024-57602.json b/CVE-2024/CVE-2024-576xx/CVE-2024-57602.json index 10a922aec02..6bf467242ed 100644 --- a/CVE-2024/CVE-2024-576xx/CVE-2024-57602.json +++ b/CVE-2024/CVE-2024-576xx/CVE-2024-57602.json @@ -2,8 +2,8 @@ "id": "CVE-2024-57602", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-12T22:15:40.867", - "lastModified": "2025-02-24T16:40:27.567", - "vulnStatus": "Analyzed", + "lastModified": "2025-03-18T16:15:25.597", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-576xx/CVE-2024-57669.json b/CVE-2024/CVE-2024-576xx/CVE-2024-57669.json index 29ae07e091a..c5557a55bb8 100644 --- a/CVE-2024/CVE-2024-576xx/CVE-2024-57669.json +++ b/CVE-2024/CVE-2024-576xx/CVE-2024-57669.json @@ -2,7 +2,7 @@ "id": "CVE-2024-57669", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-03T20:15:34.960", - "lastModified": "2025-02-18T19:15:22.490", + "lastModified": "2025-03-18T16:15:25.960", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "La vulnerabilidad Directory Traversal en Zrlog backup-sql-file.jar v.3.0.31 permite a un atacante remoto obtener informaci\u00f3n confidencial a trav\u00e9s del archivo BackupController.java." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], "references": [ { "url": "https://github.com/94fzb/zrlog-plugin-backup-sql-file/commit/32bdb36e6cc4f0b72e1ba85ef4458fb980946ea4", diff --git a/CVE-2024/CVE-2024-61xx/CVE-2024-6156.json b/CVE-2024/CVE-2024-61xx/CVE-2024-6156.json index cbbcd8e7aa7..5a9d2088fed 100644 --- a/CVE-2024/CVE-2024-61xx/CVE-2024-6156.json +++ b/CVE-2024/CVE-2024-61xx/CVE-2024-6156.json @@ -2,7 +2,7 @@ "id": "CVE-2024-6156", "sourceIdentifier": "security@ubuntu.com", "published": "2024-12-06T00:15:04.380", - "lastModified": "2024-12-06T00:15:04.380", + "lastModified": "2025-03-18T16:15:26.213", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-295" + } + ] + } + ], "references": [ { "url": "https://github.com/canonical/lxd/security/advisories/GHSA-4c49-9fpc-hc3v", diff --git a/CVE-2024/CVE-2024-93xx/CVE-2024-9397.json b/CVE-2024/CVE-2024-93xx/CVE-2024-9397.json index 291d8a383ae..25232ae8dd6 100644 --- a/CVE-2024/CVE-2024-93xx/CVE-2024-9397.json +++ b/CVE-2024/CVE-2024-93xx/CVE-2024-9397.json @@ -2,8 +2,8 @@ "id": "CVE-2024-9397", "sourceIdentifier": "security@mozilla.org", "published": "2024-10-01T16:15:10.847", - "lastModified": "2024-10-11T16:07:56.577", - "vulnStatus": "Analyzed", + "lastModified": "2025-03-18T16:15:26.400", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-1021" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1021" + } + ] } ], "configurations": [ diff --git a/CVE-2025/CVE-2025-04xx/CVE-2025-0441.json b/CVE-2025/CVE-2025-04xx/CVE-2025-0441.json index 5decb44aa36..1429000c782 100644 --- a/CVE-2025/CVE-2025-04xx/CVE-2025-0441.json +++ b/CVE-2025/CVE-2025-04xx/CVE-2025-0441.json @@ -2,7 +2,7 @@ "id": "CVE-2025-0441", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2025-01-15T11:15:10.287", - "lastModified": "2025-02-18T22:15:17.087", + "lastModified": "2025-03-18T15:15:58.760", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": " Una implementaci\u00f3n inadecuada de Fenced Frames en Google Chrome anterior a la versi\u00f3n 132.0.6834.83 permiti\u00f3 que un atacante remoto obtuviera informaci\u00f3n potencialmente confidencial del sistema a trav\u00e9s de una p\u00e1gina HTML manipulada. (Gravedad de seguridad de Chromium: media)" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], "references": [ { "url": "https://chromereleases.googleblog.com/2025/01/stable-channel-update-for-desktop_14.html", diff --git a/CVE-2025/CVE-2025-22xx/CVE-2025-2200.json b/CVE-2025/CVE-2025-22xx/CVE-2025-2200.json index 0075b3c2684..f675c567357 100644 --- a/CVE-2025/CVE-2025-22xx/CVE-2025-2200.json +++ b/CVE-2025/CVE-2025-22xx/CVE-2025-2200.json @@ -2,13 +2,17 @@ "id": "CVE-2025-2200", "sourceIdentifier": "cve-coordination@incibe.es", "published": "2025-03-17T10:15:16.400", - "lastModified": "2025-03-17T11:15:37.090", - "vulnStatus": "Received", + "lastModified": "2025-03-18T16:15:28.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "QL injection vulnerability in the IcProgreso Innovaci\u00f3n y Cualificaci\u00f3n plugin. This vulnerability allows an attacker to obtain, update and delete data from the database by injecting an SQL query on the parameters user, id, idGroup, start_date and end_date in the endpoint /report/icprogreso/generar_blocks.php." + "value": "SQL injection vulnerability in the IcProgreso Innovaci\u00f3n y Cualificaci\u00f3n plugin. This vulnerability allows an attacker to obtain, update and delete data from the database by injecting an SQL query on the parameters user, id, idGroup, start_date and end_date in the endpoint /report/icprogreso/generar_blocks.php." + }, + { + "lang": "es", + "value": "Vulnerabilidad de inyecci\u00f3n de QL en el complemento IcProgreso Innovaci\u00f3n y Cualificaci\u00f3n. Esta vulnerabilidad permite a un atacante obtener, actualizar y eliminar datos de la base de datos mediante la inyecci\u00f3n de una consulta SQL en los par\u00e1metros usuario, idGroup, start_date and end_date del endpoint /report/icprogreso/generar_blocks.php." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-23xx/CVE-2025-2390.json b/CVE-2025/CVE-2025-23xx/CVE-2025-2390.json index 5f313c76041..64da6136532 100644 --- a/CVE-2025/CVE-2025-23xx/CVE-2025-2390.json +++ b/CVE-2025/CVE-2025-23xx/CVE-2025-2390.json @@ -2,13 +2,17 @@ "id": "CVE-2025-2390", "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-17T19:15:28.043", - "lastModified": "2025-03-17T19:15:28.043", + "lastModified": "2025-03-18T15:16:00.950", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as critical has been found in code-projects Blood Bank Management System 1.0. This affects an unknown part of the file /user_dashboard/add_donor.php. The manipulation leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha detectado una vulnerabilidad clasificada como cr\u00edtica en code-projects Blood Bank Management System 1.0. Esta afecta a una parte desconocida del archivo /user_dashboard/add_donor.php. La manipulaci\u00f3n provoca una inyecci\u00f3n SQL. Es posible iniciar el ataque de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -140,6 +144,10 @@ { "url": "https://vuldb.com/?submit.516908", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/intercpt/XSS1/blob/main/SQL8.md", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-23xx/CVE-2025-2393.json b/CVE-2025/CVE-2025-23xx/CVE-2025-2393.json index 7ac6bc063dc..fd96c803c30 100644 --- a/CVE-2025/CVE-2025-23xx/CVE-2025-2393.json +++ b/CVE-2025/CVE-2025-23xx/CVE-2025-2393.json @@ -2,13 +2,17 @@ "id": "CVE-2025-2393", "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-17T21:15:14.330", - "lastModified": "2025-03-17T21:15:14.330", + "lastModified": "2025-03-18T15:16:01.100", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as critical, was found in code-projects Online Class and Exam Scheduling System 1.0. Affected is an unknown function of the file /pages/salut_del.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad clasificada como cr\u00edtica en code-projects Online Class and Exam Scheduling System 1.0. Se ve afectada una funci\u00f3n desconocida del archivo /pages/salut_del.php. La manipulaci\u00f3n del argumento id provoca una inyecci\u00f3n SQL. Es posible ejecutar el ataque de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L", @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -140,6 +144,10 @@ { "url": "https://vuldb.com/?submit.516917", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/intercpt/XSS1/blob/main/SQL12.md", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-23xx/CVE-2025-2397.json b/CVE-2025/CVE-2025-23xx/CVE-2025-2397.json index 64596d48af4..0cf6e645105 100644 --- a/CVE-2025/CVE-2025-23xx/CVE-2025-2397.json +++ b/CVE-2025/CVE-2025-23xx/CVE-2025-2397.json @@ -2,13 +2,17 @@ "id": "CVE-2025-2397", "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-17T21:15:14.533", - "lastModified": "2025-03-17T21:15:14.533", + "lastModified": "2025-03-18T15:16:01.257", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in China Mobile P22g-CIac, ZXWT-MIG-P4G4V, ZXWT-MIG-P8G8V, GT3200-4G4P and GT3200-8G8P up to 20250305. It has been declared as problematic. This vulnerability affects unknown code of the component Telnet Service. The manipulation leads to improper authorization. The attack can only be initiated within the local network. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en China Mobile P22g-CIac, ZXWT-MIG-P4G4V, ZXWT-MIG-P8G8V, GT3200-4G4P y GT3200-8G8P hasta la versi\u00f3n 20250305. Se ha declarado problem\u00e1tica. Esta vulnerabilidad afecta a c\u00f3digo desconocido del componente Telnet Service. La manipulaci\u00f3n da lugar a una autorizaci\u00f3n indebida. El ataque solo puede iniciarse dentro de la red local. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Se contact\u00f3 al proveedor con antelaci\u00f3n para informarle sobre esta divulgaci\u00f3n, pero no respondi\u00f3." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N", @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -136,6 +140,10 @@ { "url": "https://vuldb.com/?submit.514957", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/Fizz-L/Vulnerability-report/blob/main/Unauthorized%20access%20to%20execute%20the%20telnet%20command.md", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-23xx/CVE-2025-2398.json b/CVE-2025/CVE-2025-23xx/CVE-2025-2398.json index 6d30ab5a2ae..5148a45b789 100644 --- a/CVE-2025/CVE-2025-23xx/CVE-2025-2398.json +++ b/CVE-2025/CVE-2025-23xx/CVE-2025-2398.json @@ -2,13 +2,17 @@ "id": "CVE-2025-2398", "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-17T22:15:15.257", - "lastModified": "2025-03-17T22:15:15.257", + "lastModified": "2025-03-18T15:16:01.407", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in China Mobile P22g-CIac, ZXWT-MIG-P4G4V, ZXWT-MIG-P8G8V, GT3200-4G4P and GT3200-8G8P up to 20250305. It has been rated as critical. This issue affects some unknown processing of the component CLI su Command Handler. The manipulation leads to use of default credentials. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en China Mobile P22g-CIac, ZXWT-MIG-P4G4V, ZXWT-MIG-P8G8V, GT3200-4G4P y GT3200-8G8P hasta 20250305. Se ha clasificado como cr\u00edtica. Este problema afecta a un procesamiento desconocido del componente CLI su Command Handler. La manipulaci\u00f3n conlleva el uso de credenciales predeterminadas. El ataque puede iniciarse remotamente. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Se contact\u00f3 al proveedor con antelaci\u00f3n sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -128,6 +132,10 @@ { "url": "https://vuldb.com/?id.299897", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/Fizz-L/Vulnerability-report/blob/main/Unauthorized%20access%20to%20execute%20the%20telnet%20command.md", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-240xx/CVE-2025-24092.json b/CVE-2025/CVE-2025-240xx/CVE-2025-24092.json index 3f4e26a3f19..9832eebe168 100644 --- a/CVE-2025/CVE-2025-240xx/CVE-2025-24092.json +++ b/CVE-2025/CVE-2025-240xx/CVE-2025-24092.json @@ -2,7 +2,7 @@ "id": "CVE-2025-24092", "sourceIdentifier": "product-security@apple.com", "published": "2025-01-27T22:15:15.267", - "lastModified": "2025-02-18T20:15:29.027", + "lastModified": "2025-03-18T15:15:58.933", "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Este problema se solucion\u00f3 con una protecci\u00f3n de datos mejorada. Este problema se solucion\u00f3 en macOS Sequoia 15.3 y macOS Sonoma 14.7.3. Es posible que una aplicaci\u00f3n pueda leer informaci\u00f3n confidencial sobre la ubicaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/122068", diff --git a/CVE-2025/CVE-2025-241xx/CVE-2025-24103.json b/CVE-2025/CVE-2025-241xx/CVE-2025-24103.json index 1cd5f93cd1d..8a88f55deff 100644 --- a/CVE-2025/CVE-2025-241xx/CVE-2025-24103.json +++ b/CVE-2025/CVE-2025-241xx/CVE-2025-24103.json @@ -2,8 +2,8 @@ "id": "CVE-2025-24103", "sourceIdentifier": "product-security@apple.com", "published": "2025-01-27T22:15:15.900", - "lastModified": "2025-03-04T15:24:55.633", - "vulnStatus": "Analyzed", + "lastModified": "2025-03-18T15:15:59.120", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,12 +36,42 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, "weaknesses": [ { "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-59" + } + ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "description": [ { diff --git a/CVE-2025/CVE-2025-241xx/CVE-2025-24123.json b/CVE-2025/CVE-2025-241xx/CVE-2025-24123.json index a6480fc3324..034a141c79a 100644 --- a/CVE-2025/CVE-2025-241xx/CVE-2025-24123.json +++ b/CVE-2025/CVE-2025-241xx/CVE-2025-24123.json @@ -2,8 +2,8 @@ "id": "CVE-2025-24123", "sourceIdentifier": "product-security@apple.com", "published": "2025-01-27T22:15:17.413", - "lastModified": "2025-03-04T15:17:41.803", - "vulnStatus": "Analyzed", + "lastModified": "2025-03-18T15:15:59.307", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, diff --git a/CVE-2025/CVE-2025-241xx/CVE-2025-24162.json b/CVE-2025/CVE-2025-241xx/CVE-2025-24162.json index e035d5b44e5..8307994d72f 100644 --- a/CVE-2025/CVE-2025-241xx/CVE-2025-24162.json +++ b/CVE-2025/CVE-2025-241xx/CVE-2025-24162.json @@ -2,8 +2,8 @@ "id": "CVE-2025-24162", "sourceIdentifier": "product-security@apple.com", "published": "2025-01-27T22:15:20.167", - "lastModified": "2025-03-03T22:51:02.523", - "vulnStatus": "Analyzed", + "lastModified": "2025-03-18T15:15:59.527", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,19 +36,49 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] } ], "configurations": [ diff --git a/CVE-2025/CVE-2025-243xx/CVE-2025-24399.json b/CVE-2025/CVE-2025-243xx/CVE-2025-24399.json index e0ce694ff3f..745b82e6c20 100644 --- a/CVE-2025/CVE-2025-243xx/CVE-2025-24399.json +++ b/CVE-2025/CVE-2025-243xx/CVE-2025-24399.json @@ -2,7 +2,7 @@ "id": "CVE-2025-24399", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2025-01-22T17:15:13.853", - "lastModified": "2025-02-18T20:15:31.523", + "lastModified": "2025-03-18T15:15:59.850", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "El complemento de autenticaci\u00f3n de Jenkins OpenId Connect 4.452.v2849b_d3945fa_ y anteriores, excepto 4.438.440.v3f5f201de5dc, trata los nombres de usuario como si no distinguieran entre may\u00fasculas y min\u00fasculas, lo que permite a los atacantes en instancias de Jenkins configuradas con un proveedor de OpenID Connect que distinga entre may\u00fasculas y min\u00fasculas iniciar sesi\u00f3n como cualquier usuario al proporcionar un nombre de usuario que difiere solo en may\u00fasculas y min\u00fasculas, lo que potencialmente les permite obtener acceso de administrador a Jenkins." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-276" + } + ] + } + ], "references": [ { "url": "https://www.jenkins.io/security/advisory/2025-01-22/#SECURITY-3461", diff --git a/CVE-2025/CVE-2025-248xx/CVE-2025-24813.json b/CVE-2025/CVE-2025-248xx/CVE-2025-24813.json index ba081702d7c..444174e606c 100644 --- a/CVE-2025/CVE-2025-248xx/CVE-2025-24813.json +++ b/CVE-2025/CVE-2025-248xx/CVE-2025-24813.json @@ -2,13 +2,13 @@ "id": "CVE-2025-24813", "sourceIdentifier": "security@apache.org", "published": "2025-03-10T17:15:35.067", - "lastModified": "2025-03-18T14:15:43.253", + "lastModified": "2025-03-18T16:15:26.677", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "Path Equivalence: 'file.Name' (Internal Dot) leading to\u00a0Remote Code Execution and/or Information disclosure\u00a0and/or malicious content added to uploaded files via write enabled\u00a0Default Servlet\u00a0in Apache Tomcat.\n\nThis issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.2, from 10.1.0-M1 through 10.1.34, from 9.0.0.M1 through 9.0.98.\n\nIf all of the following were true, a malicious user was able to view security sensitive files and/or inject content into those files:\n-\u00a0writes enabled for the default servlet (disabled by default)\n- support for partial PUT (enabled by default)\n- a target URL for security sensitive uploads that was a sub-directory of\u00a0a target URL for public uploads\n-\u00a0attacker knowledge of the names of security sensitive files being\u00a0uploaded\n-\u00a0the security sensitive files also being uploaded via partial PUT\n\nIf all of the following were true, a malicious user was able to perform remote code execution:\n- writes enabled for the default servlet (disabled by default)\n-\u00a0support for partial PUT (enabled by default)\n-\u00a0application was using Tomcat's file based session persistence with the\u00a0default storage location\n-\u00a0application included a library that may be leveraged in a\u00a0deserialization attack\n\nUsers are recommended to upgrade to version 11.0.3, 10.1.35 or 9.0.98, which fixes the issue." + "value": "Path Equivalence: 'file.Name' (Internal Dot) leading to\u00a0Remote Code Execution and/or Information disclosure\u00a0and/or malicious content added to uploaded files via write enabled\u00a0Default Servlet\u00a0in Apache Tomcat.\n\nThis issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.2, from 10.1.0-M1 through 10.1.34, from 9.0.0.M1 through 9.0.98.\n\nIf all of the following were true, a malicious user was able to view security sensitive files and/or inject content into those files:\n-\u00a0writes enabled for the default servlet (disabled by default)\n- support for partial PUT (enabled by default)\n- a target URL for security sensitive uploads that was a sub-directory of\u00a0a target URL for public uploads\n-\u00a0attacker knowledge of the names of security sensitive files being\u00a0uploaded\n-\u00a0the security sensitive files also being uploaded via partial PUT\n\nIf all of the following were true, a malicious user was able to perform remote code execution:\n- writes enabled for the default servlet (disabled by default)\n-\u00a0support for partial PUT (enabled by default)\n-\u00a0application was using Tomcat's file based session persistence with the\u00a0default storage location\n-\u00a0application included a library that may be leveraged in a\u00a0deserialization attack\n\nUsers are recommended to upgrade to version 11.0.3, 10.1.35 or 9.0.99, which fixes the issue." }, { "lang": "es", diff --git a/CVE-2025/CVE-2025-24xx/CVE-2025-2491.json b/CVE-2025/CVE-2025-24xx/CVE-2025-2491.json new file mode 100644 index 00000000000..32f9073b1d2 --- /dev/null +++ b/CVE-2025/CVE-2025-24xx/CVE-2025-2491.json @@ -0,0 +1,141 @@ +{ + "id": "CVE-2025-2491", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-03-18T15:16:01.707", + "lastModified": "2025-03-18T15:16:01.707", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability classified as problematic has been found in Dromara ujcms 9.7.5. This affects the function update of the file /main/java/com/ujcms/cms/ext/web/backendapi/WebFileTemplateController.java of the component Edit Template File Page. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "HIGH", + "userInteraction": "PASSIVE", + "vulnConfidentialityImpact": "NONE", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 2.4, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 0.9, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:M/C:N/I:P/A:N", + "baseScore": 3.3, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "MULTIPLE", + "confidentialityImpact": "NONE", + "integrityImpact": "PARTIAL", + "availabilityImpact": "NONE" + }, + "baseSeverity": "LOW", + "exploitabilityScore": 6.4, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + }, + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/dromara/ujcms/issues/14", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.299997", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.299997", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.517269", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-255xx/CVE-2025-25580.json b/CVE-2025/CVE-2025-255xx/CVE-2025-25580.json new file mode 100644 index 00000000000..4e78bcfde01 --- /dev/null +++ b/CVE-2025/CVE-2025-255xx/CVE-2025-25580.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2025-25580", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-03-18T15:16:00.123", + "lastModified": "2025-03-18T15:16:00.123", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "yimioa before v2024.07.04 was discovered to contain a SQL injection vulnerability via the listNameBySql() method at /xml/UserMapper.xml." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://gitee.com/r1bbit/yimioa/issues/IBI6XT", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-255xx/CVE-2025-25582.json b/CVE-2025/CVE-2025-255xx/CVE-2025-25582.json new file mode 100644 index 00000000000..2e38b3170d5 --- /dev/null +++ b/CVE-2025/CVE-2025-255xx/CVE-2025-25582.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2025-25582", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-03-18T16:15:26.900", + "lastModified": "2025-03-18T16:15:26.900", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "yimioa before v2024.07.04 was discovered to contain a SQL injection vulnerability via the selectNoticeList() method at /xml/OaNoticeMapper.xml." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://gitee.com/r1bbit/yimioa/issues/IBI74K", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-255xx/CVE-2025-25585.json b/CVE-2025/CVE-2025-255xx/CVE-2025-25585.json new file mode 100644 index 00000000000..17baf9cc6f0 --- /dev/null +++ b/CVE-2025/CVE-2025-255xx/CVE-2025-25585.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2025-25585", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-03-18T15:16:00.253", + "lastModified": "2025-03-18T15:16:00.253", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Incorrect access control in the component /config/WebSecurityConfig.java of yimioa before v2024.07.04 allows unauthorized attackers to arbitrarily modify Administrator passwords." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://gitee.com/r1bbit/yimioa/issues/IBI7PG", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-255xx/CVE-2025-25586.json b/CVE-2025/CVE-2025-255xx/CVE-2025-25586.json new file mode 100644 index 00000000000..7c4ba771ef3 --- /dev/null +++ b/CVE-2025/CVE-2025-255xx/CVE-2025-25586.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2025-25586", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-03-18T16:15:27.047", + "lastModified": "2025-03-18T16:15:27.047", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "yimioa before v2024.07.04 was discovered to contain an information disclosure vulnerability via the component /resources/application.yml." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://gitee.com/r1bbit/yimioa/issues/IBI7LR", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-255xx/CVE-2025-25589.json b/CVE-2025/CVE-2025-255xx/CVE-2025-25589.json new file mode 100644 index 00000000000..24e94ff9713 --- /dev/null +++ b/CVE-2025/CVE-2025-255xx/CVE-2025-25589.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2025-25589", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-03-18T16:15:27.200", + "lastModified": "2025-03-18T16:15:27.200", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An XML external entity (XXE) injection vulnerability in the component /weixin/aes/XMLParse.java of yimioa before v2024.07.04 allows attackers to execute arbitrary code via supplying a crafted XML file." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://gitee.com/r1bbit/yimioa/issues/IBI81R", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-255xx/CVE-2025-25590.json b/CVE-2025/CVE-2025-255xx/CVE-2025-25590.json new file mode 100644 index 00000000000..f6befcbaf1a --- /dev/null +++ b/CVE-2025/CVE-2025-255xx/CVE-2025-25590.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2025-25590", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-03-18T15:16:00.373", + "lastModified": "2025-03-18T15:16:00.373", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "yimioa before v2024.07.04 was discovered to contain a SQL injection vulnerability via the component /mapper/xml/AddressDao.xml." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://gitee.com/r1bbit/yimioa/issues/IBI7XH", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-257xx/CVE-2025-25746.json b/CVE-2025/CVE-2025-257xx/CVE-2025-25746.json index 5a18ec7a1e9..d386f0c3d58 100644 --- a/CVE-2025/CVE-2025-257xx/CVE-2025-25746.json +++ b/CVE-2025/CVE-2025-257xx/CVE-2025-25746.json @@ -2,8 +2,8 @@ "id": "CVE-2025-25746", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-12T17:15:24.500", - "lastModified": "2025-02-24T16:30:37.200", - "vulnStatus": "Analyzed", + "lastModified": "2025-03-18T16:15:27.343", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2025/CVE-2025-258xx/CVE-2025-25897.json b/CVE-2025/CVE-2025-258xx/CVE-2025-25897.json index a7d5c289f8e..0f76d128926 100644 --- a/CVE-2025/CVE-2025-258xx/CVE-2025-25897.json +++ b/CVE-2025/CVE-2025-258xx/CVE-2025-25897.json @@ -2,8 +2,8 @@ "id": "CVE-2025-25897", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-13T16:16:49.790", - "lastModified": "2025-02-18T15:00:36.487", - "vulnStatus": "Analyzed", + "lastModified": "2025-03-18T16:15:27.567", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2025/CVE-2025-259xx/CVE-2025-25914.json b/CVE-2025/CVE-2025-259xx/CVE-2025-25914.json index 74a9b22bb08..7f0420af6bb 100644 --- a/CVE-2025/CVE-2025-259xx/CVE-2025-25914.json +++ b/CVE-2025/CVE-2025-259xx/CVE-2025-25914.json @@ -2,16 +2,55 @@ "id": "CVE-2025-25914", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-17T20:15:14.013", - "lastModified": "2025-03-17T20:15:14.013", + "lastModified": "2025-03-18T16:15:27.773", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "SQL injection vulnerability in Online Exam Mastering System v.1.0 allows a remote attacker to execute arbitrary code via the fid parameter" + }, + { + "lang": "es", + "value": "La vulnerabilidad de inyecci\u00f3n SQL en Online Exam Mastering System v.1.0 permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s del par\u00e1metro fid." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/872323857/CVE/blob/main/online-exam-mastering-system_sqlinject.md", diff --git a/CVE-2025/CVE-2025-276xx/CVE-2025-27688.json b/CVE-2025/CVE-2025-276xx/CVE-2025-27688.json new file mode 100644 index 00000000000..f75ffa2602d --- /dev/null +++ b/CVE-2025/CVE-2025-276xx/CVE-2025-27688.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27688", + "sourceIdentifier": "security_alert@emc.com", + "published": "2025-03-18T16:15:27.980", + "lastModified": "2025-03-18T16:15:27.980", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Dell ThinOS 2408 and prior, contains an improper permissions vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Elevation of privileges." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security_alert@emc.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "security_alert@emc.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-732" + } + ] + } + ], + "references": [ + { + "url": "https://www.dell.com/support/kbdoc/en-us/000289886/dsa-2025-107", + "source": "security_alert@emc.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-294xx/CVE-2025-29429.json b/CVE-2025/CVE-2025-294xx/CVE-2025-29429.json index a3a10ecba88..170f34fe59b 100644 --- a/CVE-2025/CVE-2025-294xx/CVE-2025-29429.json +++ b/CVE-2025/CVE-2025-294xx/CVE-2025-29429.json @@ -2,16 +2,55 @@ "id": "CVE-2025-29429", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-17T18:15:22.013", - "lastModified": "2025-03-17T18:15:22.013", + "lastModified": "2025-03-18T16:15:28.153", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Code-projects Online Class and Exam Scheduling System V1.0 is vulnerable to Cross Site Scripting (XSS) in /pages/program.php via the id, code, and name parameters." + }, + { + "lang": "es", + "value": "Code-projects Online Class and Exam Scheduling System V1.0 es vulnerable a cross site scripting (XSS) en /pages/program.php a trav\u00e9s de los par\u00e1metros id, code y name." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/872323857/CVE/blob/main/Online%20Class%20and%20Exam%20Scheduling%20System-program.php.md", diff --git a/CVE-2025/CVE-2025-297xx/CVE-2025-29781.json b/CVE-2025/CVE-2025-297xx/CVE-2025-29781.json index a3a2e5d353d..ef253b435e1 100644 --- a/CVE-2025/CVE-2025-297xx/CVE-2025-29781.json +++ b/CVE-2025/CVE-2025-297xx/CVE-2025-29781.json @@ -2,13 +2,17 @@ "id": "CVE-2025-29781", "sourceIdentifier": "security-advisories@github.com", "published": "2025-03-17T22:15:14.493", - "lastModified": "2025-03-17T22:15:14.493", + "lastModified": "2025-03-18T15:16:00.747", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Bare Metal Operator (BMO) implements a Kubernetes API for managing bare metal hosts in Metal3. Baremetal Operator enables users to load Secret from arbitrary namespaces upon deployment of the namespace scoped Custom Resource `BMCEventSubscription`. Prior to versions 0.8.1 and 0.9.1, an adversary Kubernetes account with only namespace level roles (e.g. a tenant controlling a namespace) may create a `BMCEventSubscription` in his authorized namespace and then load Secrets from his unauthorized namespaces to his authorized namespace via the Baremetal Operator, causing Secret Leakage. The patch makes BMO refuse to read Secrets from other namespace than where the corresponding BMH resource is. The patch does not change the `BMCEventSubscription` API in BMO, but stricter validation will fail the request at admission time. It will also prevent the controller reading such Secrets, in case the BMCES CR has already been deployed. The issue exists for all versions of BMO, and is patched in BMO releases v0.9.1 and v0.8.1. Prior upgrading to patched BMO version, duplicate any existing Secret pointed to by `BMCEventSubscription`'s `httpHeadersRef` to the same namespace where the corresponding BMH exists. After upgrade, remove the old Secrets. As a workaround, the operator can configure BMO RBAC to be namespace scoped, instead of cluster scoped, to prevent BMO from accessing Secrets from other namespaces, and/or use `WATCH_NAMESPACE` configuration option to limit BMO to single namespace." + }, + { + "lang": "es", + "value": "Bare Metal Operator (BMO) implementa una API de Kubernetes para administrar hosts de hardware en Metal3. Este operador permite a los usuarios cargar secretos desde espacios de nombres arbitrarios al implementar el recurso personalizado `BMCEventSubscription` con \u00e1mbito de espacio de nombres. Antes de las versiones 0.8.1 y 0.9.1, una cuenta de Kubernetes adversaria con roles solo a nivel de espacio de nombres (por ejemplo, un inquilino que controla un espacio de nombres) pod\u00eda crear una `BMCEventSubscription` en su espacio de nombres autorizado y luego cargar secretos desde sus espacios de nombres no autorizados a su espacio de nombres autorizado mediante el Baremetal Operator, lo que causaba una fuga de secretos. El parche hace que BMO se niegue a leer secretos de un espacio de nombres diferente al del recurso BMH correspondiente. El parche no modifica la API `BMCEventSubscription` en BMO, pero una validaci\u00f3n m\u00e1s estricta fallar\u00e1 la solicitud en el momento de la admisi\u00f3n. Tambi\u00e9n impedir\u00e1 que el controlador lea dichos secretos, en caso de que el BMCES CR ya se haya implementado. El problema existe en todas las versiones de BMO y est\u00e1 corregido en las versiones 0.9.1 y 0.8.1 de BMO. Antes de actualizar a la versi\u00f3n corregida de BMO, duplique cualquier secreto existente al que apunte `httpHeadersRef` de `BMCEventSubscription` en el mismo espacio de nombres donde exista el BMH correspondiente. Tras la actualizaci\u00f3n, elimine los secretos antiguos. Como workaround, el operador puede configurar el RBAC de BMO para que tenga alcance de espacio de nombres, en lugar de cl\u00faster, para evitar que BMO acceda a secretos de otros espacios de nombres, o bien usar la opci\u00f3n de configuraci\u00f3n `WATCH_NAMESPACE` para limitar BMO a un solo espacio de nombres." } ], "metrics": { @@ -38,7 +42,7 @@ "weaknesses": [ { "source": "security-advisories@github.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -71,6 +75,10 @@ { "url": "https://github.com/metal3-io/metal3-docs/blob/main/design/baremetal-operator/bmc-events.md", "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/metal3-io/metal3-docs/blob/main/design/baremetal-operator/bmc-events.md", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-301xx/CVE-2025-30107.json b/CVE-2025/CVE-2025-301xx/CVE-2025-30107.json new file mode 100644 index 00000000000..1be4f228751 --- /dev/null +++ b/CVE-2025/CVE-2025-301xx/CVE-2025-30107.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2025-30107", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-03-18T15:16:01.930", + "lastModified": "2025-03-18T15:16:01.930", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "On IROAD V9 devices, Managing Settings and Obtaining Sensitive Data and Sabotaging the Car Battery can be performed by unauthorized parties. A vulnerability in the dashcam's configuration management allows unauthorized users to modify settings, disable critical functions, and turn off battery protection, potentially causing physical damage to the vehicle." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/geo-chen/IROAD-V", + "source": "cve@mitre.org" + }, + { + "url": "https://iroad-dashcam.nl/iroad/iroad-x5/%27", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-301xx/CVE-2025-30109.json b/CVE-2025/CVE-2025-301xx/CVE-2025-30109.json new file mode 100644 index 00000000000..c6e0482c9e8 --- /dev/null +++ b/CVE-2025/CVE-2025-301xx/CVE-2025-30109.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2025-30109", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-03-18T15:16:02.063", + "lastModified": "2025-03-18T15:16:02.063", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the IROAD APK 5.2.5, there are Hardcoded Credentials in the APK for ports 9091 and 9092. The mobile application for the dashcam contains hardcoded credentials that allow an attacker on the local Wi-Fi network to access API endpoints and retrieve sensitive device information, including live and recorded footage." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/geo-chen/IROAD-V", + "source": "cve@mitre.org" + }, + { + "url": "https://iroad-dashcam.nl/iroad/iroad-x5/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-301xx/CVE-2025-30110.json b/CVE-2025/CVE-2025-301xx/CVE-2025-30110.json new file mode 100644 index 00000000000..5d125954ce6 --- /dev/null +++ b/CVE-2025/CVE-2025-301xx/CVE-2025-30110.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2025-30110", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-03-18T15:16:02.197", + "lastModified": "2025-03-18T15:16:02.197", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "On IROAD X5 devices, a Bypass of Device Pairing can occur via MAC Address Spoofing. The dashcam's pairing mechanism relies solely on MAC address verification, allowing an attacker to bypass authentication by spoofing an already-paired MAC address that can be captured via an ARP scan." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/geo-chen/IROAD-V", + "source": "cve@mitre.org" + }, + { + "url": "https://iroad-dashcam.nl/iroad/iroad-x5/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-301xx/CVE-2025-30111.json b/CVE-2025/CVE-2025-301xx/CVE-2025-30111.json new file mode 100644 index 00000000000..902de430221 --- /dev/null +++ b/CVE-2025/CVE-2025-301xx/CVE-2025-30111.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2025-30111", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-03-18T15:16:02.323", + "lastModified": "2025-03-18T15:16:02.323", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "On IROAD v9 devices, one can Remotely Dump Video Footage and the Live Video Stream. The dashcam exposes endpoints that allow unauthorized users, who gained access through other means, to list and download recorded videos, as well as access live video streams without proper authentication." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/geo-chen/IROAD-V", + "source": "cve@mitre.org" + }, + { + "url": "https://iroad-dashcam.nl/iroad/iroad-x5/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-301xx/CVE-2025-30113.json b/CVE-2025/CVE-2025-301xx/CVE-2025-30113.json new file mode 100644 index 00000000000..0057f40ba2a --- /dev/null +++ b/CVE-2025/CVE-2025-301xx/CVE-2025-30113.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2025-30113", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-03-18T15:16:02.453", + "lastModified": "2025-03-18T15:16:02.453", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue was discovered on the Forvia Hella HELLA Driving Recorder DR 820. Hardcoded Credentials exist in the APK for Ports 9091 and 9092. The dashcam's Android application contains hardcoded credentials that allow unauthorized access to device settings through ports 9091 and 9092. These credentials, stored in cleartext, can be exploited by an attacker who gains access to the dashcam's network." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/geo-chen/Hella", + "source": "cve@mitre.org" + }, + { + "url": "https://medium.com/@geochen/cve-draft-hella-driving-recorder-dr-820-ff8c4e2cca26", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-301xx/CVE-2025-30114.json b/CVE-2025/CVE-2025-301xx/CVE-2025-30114.json new file mode 100644 index 00000000000..d4db15f7903 --- /dev/null +++ b/CVE-2025/CVE-2025-301xx/CVE-2025-30114.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2025-30114", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-03-18T15:16:02.583", + "lastModified": "2025-03-18T15:16:02.583", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue was discovered on the Forvia Hella HELLA Driving Recorder DR 820. Bypassing of Device Pairing can occur. The pairing mechanism relies solely on the connecting device's MAC address. By obtaining the MAC address through network scanning and spoofing it, an attacker can bypass the authentication process and gain full access to the dashcam's features without proper authorization." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/geo-chen/Hella", + "source": "cve@mitre.org" + }, + { + "url": "https://medium.com/@geochen/cve-draft-hella-driving-recorder-dr-820-ff8c4e2cca26", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-301xx/CVE-2025-30115.json b/CVE-2025/CVE-2025-301xx/CVE-2025-30115.json new file mode 100644 index 00000000000..84c3822d141 --- /dev/null +++ b/CVE-2025/CVE-2025-301xx/CVE-2025-30115.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2025-30115", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-03-18T15:16:02.720", + "lastModified": "2025-03-18T15:16:02.720", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue was discovered on the Forvia Hella HELLA Driving Recorder DR 820. Default Credentials Cannot Be Changed. It uses a fixed default SSID and password (\"qwertyuiop\"), which cannot be modified by users. The SSID is continuously broadcast, allowing unauthorized access to the device network." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/geo-chen/Hella", + "source": "cve@mitre.org" + }, + { + "url": "https://medium.com/@geochen/cve-draft-hella-driving-recorder-dr-820-ff8c4e2cca26", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-301xx/CVE-2025-30116.json b/CVE-2025/CVE-2025-301xx/CVE-2025-30116.json new file mode 100644 index 00000000000..50fa97df6da --- /dev/null +++ b/CVE-2025/CVE-2025-301xx/CVE-2025-30116.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2025-30116", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-03-18T15:16:02.850", + "lastModified": "2025-03-18T15:16:02.850", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue was discovered on the Forvia Hella HELLA Driving Recorder DR 820. Remotely Dumping of Video Footage and the Live Video Stream can occur. It allows remote attackers to access and download recorded video footage from the SD card via port 9091. Additionally, attackers can connect to port 9092 to stream the live video feed by bypassing the challenge-response authentication mechanism. This exposes sensitive location and personal data." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/geo-chen/Hella", + "source": "cve@mitre.org" + }, + { + "url": "https://medium.com/@geochen/cve-draft-hella-driving-recorder-dr-820-ff8c4e2cca26", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-301xx/CVE-2025-30117.json b/CVE-2025/CVE-2025-301xx/CVE-2025-30117.json new file mode 100644 index 00000000000..c9cc746b78d --- /dev/null +++ b/CVE-2025/CVE-2025-301xx/CVE-2025-30117.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2025-30117", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-03-18T15:16:02.990", + "lastModified": "2025-03-18T15:16:02.990", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue was discovered on the Forvia Hella HELLA Driving Recorder DR 820. Managing Settings and Obtaining Sensitive Data and Sabotaging the Car Battery can be performed by unauthorized parties. After bypassing the device pairing, an attacker can obtain sensitive user and vehicle information through the settings interface. Remote attackers can modify power management settings, disable recording, delete stored footage, and turn off battery protection, leading to potential denial-of-service conditions and vehicle battery drainage." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/geo-chen/Hella", + "source": "cve@mitre.org" + }, + { + "url": "https://medium.com/@geochen/cve-draft-hella-driving-recorder-dr-820-ff8c4e2cca26", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-301xx/CVE-2025-30122.json b/CVE-2025/CVE-2025-301xx/CVE-2025-30122.json new file mode 100644 index 00000000000..623173718a5 --- /dev/null +++ b/CVE-2025/CVE-2025-301xx/CVE-2025-30122.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2025-30122", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-03-18T15:16:03.143", + "lastModified": "2025-03-18T15:16:03.143", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue was discovered on ROADCAM X3 devices. It has a uniform default credential set that cannot be modified by users, making it easy for attackers to gain unauthorized access to multiple devices." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/geo-chen/RoadCam", + "source": "cve@mitre.org" + }, + { + "url": "https://roadcam.my/pages/install-x3", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-301xx/CVE-2025-30123.json b/CVE-2025/CVE-2025-301xx/CVE-2025-30123.json new file mode 100644 index 00000000000..35b50de0078 --- /dev/null +++ b/CVE-2025/CVE-2025-301xx/CVE-2025-30123.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2025-30123", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-03-18T15:16:03.293", + "lastModified": "2025-03-18T15:16:03.293", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue was discovered on ROADCAM X3 devices. The mobile app APK (Viidure) contains hardcoded FTP credentials for the FTPX user account, enabling attackers to gain unauthorized access and extract sensitive recorded footage from the device." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/geo-chen/RoadCam", + "source": "cve@mitre.org" + }, + { + "url": "https://roadcam.my/pages/install-x3", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-301xx/CVE-2025-30132.json b/CVE-2025/CVE-2025-301xx/CVE-2025-30132.json new file mode 100644 index 00000000000..fec463e2d22 --- /dev/null +++ b/CVE-2025/CVE-2025-301xx/CVE-2025-30132.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2025-30132", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-03-18T15:16:03.437", + "lastModified": "2025-03-18T15:16:03.437", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue was discovered on IROAD Dashcam V devices. It uses an unregistered public domain name as an internal domain, creating a security risk. During analysis, it was found that this domain was not owned by IROAD, allowing an attacker to register it and potentially intercept sensitive device traffic. If the dashcam or related services attempt to resolve this domain over the public Internet instead of locally, it could lead to data exfiltration or man-in-the-middle attacks." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/geo-chen/IROAD-V", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/geo-chen/IROAD?tab=readme-ov-file#finding-6-public-domain-used-for-internal-domain-name", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index f828464a414..96540e58db4 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-03-18T15:00:19.408688+00:00 +2025-03-18T17:00:20.156090+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-03-18T14:54:25.830000+00:00 +2025-03-18T16:53:41.060000+00:00 ``` ### Last Data Feed Release @@ -33,52 +33,69 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -285592 +285617 ``` ### CVEs added in the last Commit -Recently added CVEs: `8` +Recently added CVEs: `25` -- [CVE-2023-47539](CVE-2023/CVE-2023-475xx/CVE-2023-47539.json) (`2025-03-18T14:15:37.830`) -- [CVE-2024-21760](CVE-2024/CVE-2024-217xx/CVE-2024-21760.json) (`2025-03-18T14:15:38.297`) -- [CVE-2024-8997](CVE-2024/CVE-2024-89xx/CVE-2024-8997.json) (`2025-03-18T14:15:41.400`) -- [CVE-2025-2449](CVE-2025/CVE-2025-24xx/CVE-2025-2449.json) (`2025-03-18T14:15:45.670`) -- [CVE-2025-2450](CVE-2025/CVE-2025-24xx/CVE-2025-2450.json) (`2025-03-18T14:15:45.850`) -- [CVE-2025-2490](CVE-2025/CVE-2025-24xx/CVE-2025-2490.json) (`2025-03-18T14:15:46.250`) -- [CVE-2025-25500](CVE-2025/CVE-2025-255xx/CVE-2025-25500.json) (`2025-03-18T14:15:43.493`) -- [CVE-2025-30106](CVE-2025/CVE-2025-301xx/CVE-2025-30106.json) (`2025-03-18T14:15:46.480`) +- [CVE-2024-44313](CVE-2024/CVE-2024-443xx/CVE-2024-44313.json) (`2025-03-18T15:15:53.720`) +- [CVE-2024-44314](CVE-2024/CVE-2024-443xx/CVE-2024-44314.json) (`2025-03-18T15:15:53.847`) +- [CVE-2024-49822](CVE-2024/CVE-2024-498xx/CVE-2024-49822.json) (`2025-03-18T15:15:56.283`) +- [CVE-2024-57169](CVE-2024/CVE-2024-571xx/CVE-2024-57169.json) (`2025-03-18T16:15:25.013`) +- [CVE-2024-57170](CVE-2024/CVE-2024-571xx/CVE-2024-57170.json) (`2025-03-18T16:15:25.180`) +- [CVE-2025-2491](CVE-2025/CVE-2025-24xx/CVE-2025-2491.json) (`2025-03-18T15:16:01.707`) +- [CVE-2025-25580](CVE-2025/CVE-2025-255xx/CVE-2025-25580.json) (`2025-03-18T15:16:00.123`) +- [CVE-2025-25582](CVE-2025/CVE-2025-255xx/CVE-2025-25582.json) (`2025-03-18T16:15:26.900`) +- [CVE-2025-25585](CVE-2025/CVE-2025-255xx/CVE-2025-25585.json) (`2025-03-18T15:16:00.253`) +- [CVE-2025-25586](CVE-2025/CVE-2025-255xx/CVE-2025-25586.json) (`2025-03-18T16:15:27.047`) +- [CVE-2025-25589](CVE-2025/CVE-2025-255xx/CVE-2025-25589.json) (`2025-03-18T16:15:27.200`) +- [CVE-2025-25590](CVE-2025/CVE-2025-255xx/CVE-2025-25590.json) (`2025-03-18T15:16:00.373`) +- [CVE-2025-27688](CVE-2025/CVE-2025-276xx/CVE-2025-27688.json) (`2025-03-18T16:15:27.980`) +- [CVE-2025-30107](CVE-2025/CVE-2025-301xx/CVE-2025-30107.json) (`2025-03-18T15:16:01.930`) +- [CVE-2025-30109](CVE-2025/CVE-2025-301xx/CVE-2025-30109.json) (`2025-03-18T15:16:02.063`) +- [CVE-2025-30110](CVE-2025/CVE-2025-301xx/CVE-2025-30110.json) (`2025-03-18T15:16:02.197`) +- [CVE-2025-30111](CVE-2025/CVE-2025-301xx/CVE-2025-30111.json) (`2025-03-18T15:16:02.323`) +- [CVE-2025-30113](CVE-2025/CVE-2025-301xx/CVE-2025-30113.json) (`2025-03-18T15:16:02.453`) +- [CVE-2025-30114](CVE-2025/CVE-2025-301xx/CVE-2025-30114.json) (`2025-03-18T15:16:02.583`) +- [CVE-2025-30115](CVE-2025/CVE-2025-301xx/CVE-2025-30115.json) (`2025-03-18T15:16:02.720`) +- [CVE-2025-30116](CVE-2025/CVE-2025-301xx/CVE-2025-30116.json) (`2025-03-18T15:16:02.850`) +- [CVE-2025-30117](CVE-2025/CVE-2025-301xx/CVE-2025-30117.json) (`2025-03-18T15:16:02.990`) +- [CVE-2025-30122](CVE-2025/CVE-2025-301xx/CVE-2025-30122.json) (`2025-03-18T15:16:03.143`) +- [CVE-2025-30123](CVE-2025/CVE-2025-301xx/CVE-2025-30123.json) (`2025-03-18T15:16:03.293`) +- [CVE-2025-30132](CVE-2025/CVE-2025-301xx/CVE-2025-30132.json) (`2025-03-18T15:16:03.437`) ### CVEs modified in the last Commit -Recently modified CVEs: `34` +Recently modified CVEs: `162` -- [CVE-2024-40575](CVE-2024/CVE-2024-405xx/CVE-2024-40575.json) (`2025-03-18T14:15:39.260`) -- [CVE-2024-40789](CVE-2024/CVE-2024-407xx/CVE-2024-40789.json) (`2025-03-18T14:15:39.473`) -- [CVE-2024-40792](CVE-2024/CVE-2024-407xx/CVE-2024-40792.json) (`2025-03-18T14:15:39.723`) -- [CVE-2024-43765](CVE-2024/CVE-2024-437xx/CVE-2024-43765.json) (`2025-03-18T14:15:39.920`) -- [CVE-2024-43771](CVE-2024/CVE-2024-437xx/CVE-2024-43771.json) (`2025-03-18T14:15:40.117`) -- [CVE-2024-44151](CVE-2024/CVE-2024-441xx/CVE-2024-44151.json) (`2025-03-18T14:15:40.260`) -- [CVE-2024-45180](CVE-2024/CVE-2024-451xx/CVE-2024-45180.json) (`2025-03-18T14:15:40.437`) -- [CVE-2024-46582](CVE-2024/CVE-2024-465xx/CVE-2024-46582.json) (`2025-03-18T14:15:40.643`) -- [CVE-2024-5529](CVE-2024/CVE-2024-55xx/CVE-2024-5529.json) (`2025-03-18T14:15:41.210`) -- [CVE-2024-56313](CVE-2024/CVE-2024-563xx/CVE-2024-56313.json) (`2025-03-18T14:15:40.837`) -- [CVE-2024-57015](CVE-2024/CVE-2024-570xx/CVE-2024-57015.json) (`2025-03-18T14:15:41.020`) -- [CVE-2025-20634](CVE-2025/CVE-2025-206xx/CVE-2025-20634.json) (`2025-03-18T14:15:41.747`) -- [CVE-2025-21546](CVE-2025/CVE-2025-215xx/CVE-2025-21546.json) (`2025-03-18T14:15:41.940`) -- [CVE-2025-21548](CVE-2025/CVE-2025-215xx/CVE-2025-21548.json) (`2025-03-18T14:15:42.087`) -- [CVE-2025-22954](CVE-2025/CVE-2025-229xx/CVE-2025-22954.json) (`2025-03-18T14:15:42.213`) -- [CVE-2025-24108](CVE-2025/CVE-2025-241xx/CVE-2025-24108.json) (`2025-03-18T14:15:42.627`) -- [CVE-2025-24118](CVE-2025/CVE-2025-241xx/CVE-2025-24118.json) (`2025-03-18T14:15:42.797`) -- [CVE-2025-24174](CVE-2025/CVE-2025-241xx/CVE-2025-24174.json) (`2025-03-18T14:15:43.020`) -- [CVE-2025-2419](CVE-2025/CVE-2025-24xx/CVE-2025-2419.json) (`2025-03-18T14:15:45.067`) -- [CVE-2025-2420](CVE-2025/CVE-2025-24xx/CVE-2025-2420.json) (`2025-03-18T13:15:37.770`) -- [CVE-2025-24813](CVE-2025/CVE-2025-248xx/CVE-2025-24813.json) (`2025-03-18T14:15:43.253`) -- [CVE-2025-25898](CVE-2025/CVE-2025-258xx/CVE-2025-25898.json) (`2025-03-18T14:15:43.617`) -- [CVE-2025-29909](CVE-2025/CVE-2025-299xx/CVE-2025-29909.json) (`2025-03-18T14:15:43.803`) -- [CVE-2025-29910](CVE-2025/CVE-2025-299xx/CVE-2025-29910.json) (`2025-03-18T14:15:43.913`) -- [CVE-2025-29911](CVE-2025/CVE-2025-299xx/CVE-2025-29911.json) (`2025-03-18T14:15:44.023`) +- [CVE-2024-56889](CVE-2024/CVE-2024-568xx/CVE-2024-56889.json) (`2025-03-18T15:15:58.090`) +- [CVE-2024-57014](CVE-2024/CVE-2024-570xx/CVE-2024-57014.json) (`2025-03-18T15:15:58.283`) +- [CVE-2024-57360](CVE-2024/CVE-2024-573xx/CVE-2024-57360.json) (`2025-03-18T16:15:25.340`) +- [CVE-2024-57479](CVE-2024/CVE-2024-574xx/CVE-2024-57479.json) (`2025-03-18T15:15:58.493`) +- [CVE-2024-57602](CVE-2024/CVE-2024-576xx/CVE-2024-57602.json) (`2025-03-18T16:15:25.597`) +- [CVE-2024-57669](CVE-2024/CVE-2024-576xx/CVE-2024-57669.json) (`2025-03-18T16:15:25.960`) +- [CVE-2024-6156](CVE-2024/CVE-2024-61xx/CVE-2024-6156.json) (`2025-03-18T16:15:26.213`) +- [CVE-2024-9397](CVE-2024/CVE-2024-93xx/CVE-2024-9397.json) (`2025-03-18T16:15:26.400`) +- [CVE-2025-0441](CVE-2025/CVE-2025-04xx/CVE-2025-0441.json) (`2025-03-18T15:15:58.760`) +- [CVE-2025-2200](CVE-2025/CVE-2025-22xx/CVE-2025-2200.json) (`2025-03-18T16:15:28.347`) +- [CVE-2025-2390](CVE-2025/CVE-2025-23xx/CVE-2025-2390.json) (`2025-03-18T15:16:00.950`) +- [CVE-2025-2393](CVE-2025/CVE-2025-23xx/CVE-2025-2393.json) (`2025-03-18T15:16:01.100`) +- [CVE-2025-2397](CVE-2025/CVE-2025-23xx/CVE-2025-2397.json) (`2025-03-18T15:16:01.257`) +- [CVE-2025-2398](CVE-2025/CVE-2025-23xx/CVE-2025-2398.json) (`2025-03-18T15:16:01.407`) +- [CVE-2025-24092](CVE-2025/CVE-2025-240xx/CVE-2025-24092.json) (`2025-03-18T15:15:58.933`) +- [CVE-2025-24103](CVE-2025/CVE-2025-241xx/CVE-2025-24103.json) (`2025-03-18T15:15:59.120`) +- [CVE-2025-24123](CVE-2025/CVE-2025-241xx/CVE-2025-24123.json) (`2025-03-18T15:15:59.307`) +- [CVE-2025-24162](CVE-2025/CVE-2025-241xx/CVE-2025-24162.json) (`2025-03-18T15:15:59.527`) +- [CVE-2025-24399](CVE-2025/CVE-2025-243xx/CVE-2025-24399.json) (`2025-03-18T15:15:59.850`) +- [CVE-2025-24813](CVE-2025/CVE-2025-248xx/CVE-2025-24813.json) (`2025-03-18T16:15:26.677`) +- [CVE-2025-25746](CVE-2025/CVE-2025-257xx/CVE-2025-25746.json) (`2025-03-18T16:15:27.343`) +- [CVE-2025-25897](CVE-2025/CVE-2025-258xx/CVE-2025-25897.json) (`2025-03-18T16:15:27.567`) +- [CVE-2025-25914](CVE-2025/CVE-2025-259xx/CVE-2025-25914.json) (`2025-03-18T16:15:27.773`) +- [CVE-2025-29429](CVE-2025/CVE-2025-294xx/CVE-2025-29429.json) (`2025-03-18T16:15:28.153`) +- [CVE-2025-29781](CVE-2025/CVE-2025-297xx/CVE-2025-29781.json) (`2025-03-18T15:16:00.747`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 2cc32d25a4a..7352b9bf3cc 100644 --- a/_state.csv +++ b/_state.csv @@ -56979,7 +56979,7 @@ CVE-2012-5847,0,0,490be5938436680c1205012b8c56fca867f5b6852598e55a70a2d2cbcd62a5 CVE-2012-5848,0,0,51fc4b299103acaca6696cd75e85db30ee9cf8e07dd19f4d0164dbd2e450ec7b,2023-11-07T02:12:43.840000 CVE-2012-5849,0,0,728612c9d635e7e0bfaec89121de8c5f3f01c6637148196d0eb7fdcbecc4b7f2,2024-11-21T01:45:21.897000 CVE-2012-5851,0,0,5bcb6d3bc5550d39aac8f9572cad4007769579e432e2e93cc735747e6581fedb,2024-11-21T01:45:22.053000 -CVE-2012-5853,0,0,35b675880f1ce25f0d7aa4e477d22212078de3bf086fc98b5908bc420bf9f48b,2024-11-21T01:45:22.210000 +CVE-2012-5853,0,1,3086a9c85ae55c153839044fe253a4ec164fff572706dcd51ce5ffce08626f55,2025-03-18T15:11:20.680000 CVE-2012-5854,0,0,517de3d9512e2d5fa72e498496876bb77a7ee9a6aaf1662aa372472fa10963a2,2024-11-21T01:45:22.367000 CVE-2012-5855,0,0,039f258961ae3490822a7acc349373caa2f5191d196c1eff016f4b1bc3386279,2024-11-21T01:45:22.520000 CVE-2012-5856,0,0,6fd0355c0854405887eeed00fcfd9f37329549a4ceb42523d169762941ffd639,2024-11-21T01:45:22.670000 @@ -126970,7 +126970,7 @@ CVE-2018-9379,0,0,23a5e8d5f1b4aad089264edb2cf7c573d175d4af0d212598c2b4a8c17355a2 CVE-2018-9380,0,0,e12a43dbeeb8da1df7c5ede895c56553a0364f94530599aafaca6e6f3326ce02,2024-12-18T19:42:11.093000 CVE-2018-9381,0,0,2ce1fffdcf5aa87d66006064137212243a0a262bfc7f2cf820777dea17a7c8cc,2024-12-18T19:39:05.097000 CVE-2018-9382,0,0,5dda6ab08cf0a010c80456764df59f378c991a306f50d3e4fea522da240132d9,2025-03-13T15:15:37.857000 -CVE-2018-9383,0,0,f1eab6820883abc0b4dcc62ac5bfcd8dddf464c8c8ca681979fd19c082f88de6,2025-02-18T21:15:12.823000 +CVE-2018-9383,0,1,c092f728b286c469064e6a7736d5288e28ca146f4f3b735653ce50479b57eb9c,2025-03-18T15:15:39.420000 CVE-2018-9384,0,0,d189a25b581771fed8500dca3cae6816f0077e436d6f70bb76386ee97764c284,2025-03-15T15:15:36.110000 CVE-2018-9385,0,0,963ab87aab004413f51f225df7125c38dada01fc62280d1b6b2d796be35cbfda,2024-11-21T04:15:25.463000 CVE-2018-9386,0,0,00c05564d802b59f0ce740fae1821c18eb3e04be32703f1b88fcf171f14e151d,2024-12-19T16:51:52.097000 @@ -169036,7 +169036,7 @@ CVE-2021-22480,0,0,2ee40a5f0b744f8d85386ac8f7814fbb64db99b431af2d5fe4ee4168df648 CVE-2021-22481,0,0,3bb352b331d9b115a475b892af22ac8a789f8171a863aa0dc715be3219400678,2024-11-21T05:50:12.170000 CVE-2021-22482,0,0,064e5fd416b229a2cc3cd57c369c020311f44c434cd44e94f4e7f51e8f96e6e5,2024-11-21T05:50:12.273000 CVE-2021-22483,0,0,524ecb58c9226fedfac0aa1d752012c78263971e637a4fab6f2357c665a65c86,2024-11-21T05:50:12.377000 -CVE-2021-22484,0,0,d5da946e9d2a30a1f882a1ba169d587fabc14fac0ac3bd3f35d81a105019e1c6,2024-12-28T17:15:06.360000 +CVE-2021-22484,0,1,b6465c49751bf208cf2858a4cffb5fe97ef09834a987d8e5aa69ce9473d4800b,2025-03-18T16:09:16.963000 CVE-2021-22485,0,0,70a240bc4e8f228e753950c037f1a99222e031a229192fc1067dae316709cb7c,2024-11-21T05:50:12.477000 CVE-2021-22486,0,0,ff718655b7c31ca5258d20fd6fa88dcc7c99213588101d01513f6aca30678d47,2024-11-21T05:50:12.580000 CVE-2021-22487,0,0,f412d1dffba0205b3e669b30e0aa0c95982526422d0ee444ccb1ea2d81758abb,2024-11-21T05:50:12.683000 @@ -172108,7 +172108,7 @@ CVE-2021-26340,0,0,6ab890583afc2781a3bb79b8966dc9d34ccea62dbbdea07c636161c18e1db CVE-2021-26341,0,0,226cc1c698323973b998b7eb156f609fbf5e625ca6052324b869daa14539f982,2024-11-21T05:56:09.123000 CVE-2021-26342,0,0,815d2afcafca6144bdd6257dce639f57361b96cb6a601e3bd60e0077502cc823,2024-11-21T05:56:09.363000 CVE-2021-26343,0,0,148f87a394fb53bb955a969dd855c5acfe8f2541f34f78e9a1fd5d9b447a3cac,2024-11-21T05:56:09.520000 -CVE-2021-26344,0,0,c5aff58771c5f2a7403f1d04ba8583a29300bd375d3399bbb926ac5e408cd6b5,2024-12-12T20:41:30.647000 +CVE-2021-26344,0,1,1b8bbd2e1f05cad53f66aa26a5deafaaa2483661dd01543fc90a94b50f05a349,2025-03-18T16:15:12.347000 CVE-2021-26345,0,0,45d5cc66ab560e396fc506d1889e394356f506095ab50c0614404abccf752c36,2024-11-21T05:56:09.803000 CVE-2021-26346,0,0,052a4cde420acc889256f114e4a0df086d83423523a09016a1c4e5f898bea896,2024-11-21T05:56:10.023000 CVE-2021-26347,0,0,954a6a0424a891c30f66230aec92dde6009f31c49670d1492b86b2c9b7e1987f,2024-11-21T05:56:10.230000 @@ -179851,7 +179851,7 @@ CVE-2021-36997,0,0,e0416bc29d06ba5d2104b33ea06d00e260fb21201713bb4a52e41ef862240 CVE-2021-36998,0,0,2a5b87fdd4cba6e4c7d1ecba2c75232e886aecb744c74d01312049488cbfd80f,2024-11-21T06:14:28.027000 CVE-2021-36999,0,0,5c47786127591385e8ef253183f08f85cdf9eff7dd186a5dc91a842f845fb619,2024-11-21T06:14:28.133000 CVE-2021-3700,0,0,6f3c340c5b8b70af3c2e5704f87bdbba6c89b149c949c56f5930323b638fb982,2024-11-21T06:22:11.147000 -CVE-2021-37000,0,0,260f5f788860672676239962b9031e7ee22c575d75a0fefba230de701bd140ce,2024-12-28T17:15:06.793000 +CVE-2021-37000,0,1,c9a4a5f2a64233449be0732d3a6513720c9fe9c92f9c8121da1fb7ff6dcef695,2025-03-18T16:30:48.110000 CVE-2021-37001,0,0,720396941ab0bdecaff2714ea79d435b9999605f3fad92e1146886261e23e88c,2024-11-21T06:14:28.247000 CVE-2021-37002,0,0,85ee5e216930de66c1eb5cb142fdef511fd9c1d60803b15c9678deca82dfd20c,2024-11-21T06:14:28.357000 CVE-2021-37003,0,0,0aeaaf3bfce302da5ea2f00e7e9d5a91b289c67b2c8fb1c0440367b5d8fbee73,2024-11-21T06:14:28.473000 @@ -192936,7 +192936,7 @@ CVE-2022-23237,0,0,2bf4e0431dff2e41be72eacd8e75c6dcfc681039d1217e10d6438fbc83d3e CVE-2022-23238,0,0,ff0236a24037019f6ad6d4f727b4e5688456d1f86c8ad00c5b1d11adee8cbb68,2024-11-21T06:48:14.830000 CVE-2022-23239,0,0,efc7aa1d926e7db9b8f5c76ff9bae0f4ffac0fcc384b17348c378bdc31b64557,2024-11-21T06:48:14.950000 CVE-2022-2324,0,0,0971448b117a6b1bac4da6fe9405f4548dd7f2733589fc0a3931ededff4a0b91,2024-11-21T07:00:46.230000 -CVE-2022-23240,0,0,660fcb3e6dbf507c01e57713ef296e9bae14dd1ffb528a523e6544517f9387c3,2024-11-21T06:48:15.080000 +CVE-2022-23240,0,1,950d0a7e24d667208033552c4f8fa8f0c74d80ef0b21be785da6b66f51afd3ae,2025-03-18T15:15:40.637000 CVE-2022-23241,0,0,51705501b70ebaf00b01d95b228a51992cce13f4553ecb0dac0be4198ee6c813,2024-11-21T06:48:15.200000 CVE-2022-23242,0,0,9e1bef37b98c3960c8535940d7ee2a60db15b95a5b5c10d5a730641e2ab5afbd,2024-11-21T06:48:15.320000 CVE-2022-2325,0,0,4eea80b9601e5f492a0530b39c931f3deebff3f5460fba24a41d8996f7a36e17,2024-11-21T07:00:46.340000 @@ -195334,7 +195334,7 @@ CVE-2022-2597,0,0,c0482aad432cc06867515a47814a0a90f15c285b9c7ba0a6382e06feb82bd8 CVE-2022-25972,0,0,84d813d031553f1799102a2fa1139c5d508cb9c288ce5c15cc0465d618d8cfea,2024-11-21T06:53:16.317000 CVE-2022-25973,0,0,20e2e72e2c2759af5695eb312ec7e2785205b36a360bac9f160103118a3c6a74,2024-11-21T06:53:16.423000 CVE-2022-25976,0,0,f381284780b4bcd6e6ce96aa664b5ce10a4ef1ca2b7bfaff1e75248401e21bf2,2024-11-21T06:53:16.533000 -CVE-2022-25978,0,0,75bde884521c0f5139c54b9393bcc1c64e0853575c75d0100546f7239d890010,2024-11-21T06:53:16.640000 +CVE-2022-25978,0,1,e31fcefad021b7b555c31315767eedde111b8d8efe61971082b80bf48f3a7639,2025-03-18T16:15:12.627000 CVE-2022-25979,0,0,0bf107e17146f6efa8a0f38b171be535cca5b1886829f0d79b6f8115d39fde4a,2024-11-21T06:53:16.757000 CVE-2022-2598,0,0,63bd2b24ef17777bb438c84fec0d0f8ee0e07d083b91cf4a0e0eb629e9db7210,2024-11-21T07:01:19.493000 CVE-2022-25980,0,0,3a1c34f9820d00949c68ffe0a7e13bec97057b963f9b1450cdf6b30df031eada,2024-11-21T06:53:16.880000 @@ -201098,7 +201098,7 @@ CVE-2022-3293,0,0,a695a9baf1d54a10c1e3186512d151478863877fa0bbc83861f9373ffd4f60 CVE-2022-32930,0,0,6ae2a4b4403a86931d6362390ff5cf40cd3124ee620f4426d1d0ecb32f02d7b6,2023-11-07T03:48:16.257000 CVE-2022-32931,0,0,4c315f5a73cbb58611f7178aee32ff2eef51bd3d3929a84f746477e2ef7acfc9,2024-11-21T07:07:15.670000 CVE-2022-32932,0,0,1b0f57ebde6a0b4d08e463b749980ed2aa08b5cd000e0a8a8aa59fee66222a2d,2024-11-21T07:07:15.790000 -CVE-2022-32933,0,0,f887b45b93b3fa37695214d9c3d6f3fdcdcd6b9931ab27bc64144f2bdd8ad86f,2024-11-21T07:07:15.917000 +CVE-2022-32933,0,1,ee3b339606296cef3411172a1d33c90875c151d797f27cb80b854e2452dd5088,2025-03-18T16:15:12.880000 CVE-2022-32934,0,0,47c5e95d0f8b5ceff6125f82187a4c0464a8a0ffa1111e6bb85851b5e91bd7bc,2024-11-21T07:07:16.043000 CVE-2022-32935,0,0,a084c037b1166d6f45b7cba806aee5ef22faa4638746fede4d4304f6607bcb2a,2024-11-21T07:07:16.170000 CVE-2022-32936,0,0,7e03715bc7a4dbe409af8ff3d869877b951cde5371d3ff5b5422c03cd1a46ba7,2024-11-21T07:07:16.303000 @@ -205189,7 +205189,7 @@ CVE-2022-38211,0,0,237622d0f4ee7ddb35c7c50d1e0096a89ec5db961f7c0b21739aa201d5d96 CVE-2022-38212,0,0,0b210e11cb58e0f62b93fad799c1a993a9ca8e136ada36ccbfefad89a6045f44,2024-11-21T07:16:04.450000 CVE-2022-38216,0,0,53ad6a4bf21439d81742880b4310bac9b826a4caa93c0c8d77ff8af531f7fdde,2024-11-21T07:16:04.593000 CVE-2022-3822,0,0,ee98c78e919c24d4096ef955318057a448b7c47c9c5cdc193f37e851fe6f8af0,2024-11-21T07:20:18.383000 -CVE-2022-38220,0,0,8850874c8ed862adb7a1dc91be5276ea510dbf91c1684904feed4474a5b89f1f,2024-11-21T07:16:04.727000 +CVE-2022-38220,0,1,b317a9a4caef6fc9a703980616929643665fb6471f99fbfead5837cecbcb48df,2025-03-18T15:15:41.067000 CVE-2022-38221,0,0,fd78da8ad76fed3c951126436d0f81c2e548cc1f96c247fde12e3249209b83cd,2024-11-21T07:16:04.900000 CVE-2022-38222,0,0,7c7a2a13a7bb100acf8a26bdbfd02a83105b3b46dbc4a6c8e6cc767f8cce66a3,2024-11-21T07:16:05.063000 CVE-2022-38223,0,0,3f4fdfd7d100044b3e1d89b5c5e1369323d373ddf13b6ac76b348920215462a3,2024-11-21T07:16:05.223000 @@ -206449,7 +206449,7 @@ CVE-2022-40028,0,0,8504ed9c2609edb86b1a8009417ee29b43396730bea371f09bb5ba62aa82e CVE-2022-40029,0,0,6e59b2102e747cecee5acdef442cefb8efba31d7e3c80a24acc5166d255eb7b9,2024-11-21T07:20:45.083000 CVE-2022-4003,0,0,a9cee38f1f8c3af45745633117b9864b0ad71a205f846cffa4bc5bbc7b97b29d,2024-08-13T15:23:48.580000 CVE-2022-40030,0,0,a478ce4413a4dfd10b2e3967175fee507a12fc4b973c8329c10c81b11f04af6a,2024-11-21T07:20:45.237000 -CVE-2022-40032,0,0,6be96648f4904d37bacd04fdb93704d637a670631911fae2ebd17ae128ab0e96,2024-11-21T07:20:45.390000 +CVE-2022-40032,0,1,077891ea62a30e73409e234470534944a9819ad3705ad4b69ecf35a0a7ea980d,2025-03-18T16:15:13.077000 CVE-2022-40034,0,0,f5399211343d3982869c99f8397530501b829175a38c423c7766fc13b34b94dd,2024-11-21T07:20:45.560000 CVE-2022-40035,0,0,40672a6852f61faf1d632acce21a5120c17c83a7264c49422e608ec0979bc17b,2024-11-21T07:20:45.733000 CVE-2022-40036,0,0,1e6e31ce70ee81ffc38b817cf86d4ba6b08250f3b8688370094e8948702153ef,2024-11-21T07:20:45.907000 @@ -206713,7 +206713,7 @@ CVE-2022-4033,0,0,c930b4b4dbdd6ac949cc7fc9fdd140692a7288bea3301ee9b5ac4e028e04a2 CVE-2022-40337,0,0,550fdd0f0b78950c809e42053e282c0e96732affd4b2b60cf5475ea0af12c9c1,2024-11-21T07:21:19.610000 CVE-2022-4034,0,0,aad950aa3e007f54eec3e7b86f79eb6fb4f19b85bfaba45166e03743571a585a,2024-11-21T07:34:29.170000 CVE-2022-40341,0,0,0fa6bdad372c3bed8ef330ea2b94cceb7b6a87f8679d6a053686e5ad6da9cbfc,2024-11-21T07:21:19.767000 -CVE-2022-40347,0,0,bf6cf1198399aeff93adbc82abe5f023a06395b56aacd77c1fd8c1b9e1bdc8fb,2024-11-21T07:21:19.913000 +CVE-2022-40347,0,1,b800d307183768ae1f461e4c07b361194c0886e5da350e6a90c3df59b3716b53,2025-03-18T16:15:13.300000 CVE-2022-40348,0,0,d99927cc7cfec487324c0de3d61b1328e2b138ee703348d32ab3316185ba0681,2025-03-17T19:15:14.270000 CVE-2022-4035,0,0,61ab29a5bac69207542ed40aa18fd4ec1a06fe69482f0f0cae1402d93c370f5c,2024-11-21T07:34:29.310000 CVE-2022-40352,0,0,b0a787c58aa475a965a8144d6b63aca7f35b5788a2f6ead64068afacba583683,2024-11-21T07:21:20.253000 @@ -209792,7 +209792,7 @@ CVE-2022-44211,0,0,4694e1657822152e206589f198c10697ad8292117d4428e093cb3922589a4 CVE-2022-44212,0,0,9418c2f7e53e0a6e6d0f8fafec86e5a1776bc025c7f73a49e3c62b894df6474d,2024-11-21T07:27:45.390000 CVE-2022-44213,0,0,527d7872f95c2ceba9131c1dbd6b395deb9e8b32716e16ceff854f0f9020b15f,2024-11-21T07:27:45.533000 CVE-2022-44215,0,0,97b29df04b49081a933ac7e168d7e0f2dd3f42ba0ed62273b63800cc8082d135,2024-11-21T07:27:45.680000 -CVE-2022-44216,0,0,d1eb01ea6194c9efb0b2a57f1ab86f1120020f1b349a97f9c25819ad5b2bed29,2024-11-21T07:27:45.847000 +CVE-2022-44216,0,1,f109d57d47e66d4d38cb3ef4a876cafb1608bf70c055308a4341d236211069a4,2025-03-18T16:15:13.567000 CVE-2022-4422,0,0,2f8897b91daada41f8b072d24143cbc42853693e583b0a624e8340e20d416244,2024-11-21T07:35:14.237000 CVE-2022-44232,0,0,07b9e71fbb7eba093bb3164af0effe9aa5c5e9562a1a6e394fdeff634d375981,2025-02-03T18:15:28.347000 CVE-2022-44235,0,0,946acb83b06b71f31280ee9f801b382aba01dca2de9a6681724797974a8600d6,2024-11-21T07:27:46.150000 @@ -210640,7 +210640,7 @@ CVE-2022-45496,0,0,a7f53391ae87e391af358b796165d253b593d0e842584dc797f7ea43b915b CVE-2022-45497,0,0,39dfe8eef99e8d3c410610743a5d8278a9861cc90b9b95aa616a7f2df09a5abc,2024-11-21T07:29:20.730000 CVE-2022-45498,0,0,8515281443317ef9de343bce9fddd4918576238ffbb7e875eba96a93c7c23145,2024-11-21T07:29:20.863000 CVE-2022-45499,0,0,2938830f52bc9947239a0b1681ba169666ebce48e47d14009cb80aa205bbfe4f,2024-11-21T07:29:20.993000 -CVE-2022-4550,0,0,019e31bc8a51df1c9110a52d8d2159b3f0b22478728117f035aaa4fdfe5a0176,2024-11-21T07:35:28.293000 +CVE-2022-4550,0,1,47b472ec4f7a77938d31c2999b2048d12ac1ce6602444c535635d0716bff232b,2025-03-18T15:15:42.087000 CVE-2022-45501,0,0,00baf4c2f2586412552c66b30bb3bf66147fccbd9fab07f69ed0ef86c26e3c09,2024-11-21T07:29:21.127000 CVE-2022-45503,0,0,2b8e2f2e39ba18f18923e01a422896a20460a92b0e50f88ee21003e3e47409bb,2024-11-21T07:29:21.253000 CVE-2022-45504,0,0,42966f253049035e68652ad3938fcc3f61a7918c7c655543aabe0a3a221c0012,2024-11-21T07:29:21.383000 @@ -210686,7 +210686,7 @@ CVE-2022-45546,0,0,03f36a50f6fed2a35bf238e28ea14cd78b45fc5499135cb2f870a3224af77 CVE-2022-45548,0,0,e95a0b1f599986c19a82840fd26c1ada5e6cfb5cd55dee60741d610dc0fe0eb9,2024-11-21T07:29:26.143000 CVE-2022-4555,0,0,ab9573e8007e94879618723fe294ad8ddef575de9e9b6c5e7923556dd3555888,2024-11-21T07:35:28.900000 CVE-2022-45550,0,0,547c8bb332eedbeb52103741d5d16740a06bf4a7179e1dfd6e4ad53c93d1f4f4,2024-11-21T07:29:26.290000 -CVE-2022-45551,0,0,c3e2ff173685837cb5f02972064f49df34d340f6660f9412785ff40c333c35aa,2024-11-21T07:29:26.427000 +CVE-2022-45551,0,1,092a36591ebacda407ecdc12468795749b59082c41bf479d00ddf568e51708ea,2025-03-18T16:15:13.773000 CVE-2022-45552,0,0,cc0d2e0061f1a0a2ac9801b49129df629937065a2b27678cf05db36eccb47bd2,2025-03-07T18:15:36.307000 CVE-2022-45553,0,0,a3b2c354c931598a5629ee8628449e43eb4a82c8d377e393f721e42a93c32f75,2025-03-07T18:15:36.460000 CVE-2022-45557,0,0,eb992f12bdba5a9ed395677530ec85c0d605b8f3ec4bba6943db3924eb1dd000,2024-11-21T07:29:26.930000 @@ -210767,7 +210767,7 @@ CVE-2022-45693,0,0,fc3fe5af36456f18b36e45bc254568b5fd18a3793cf5d8c73cb97ef02fc53 CVE-2022-45697,0,0,34e5f81a9d7d780bc32c7f8e99772f6393c876c7e4c870d659e3da43d3fa8093,2024-11-21T07:29:36.173000 CVE-2022-45699,0,0,10cadbba003ff09c5091fe224739978d37ce5dcd53f35824b74e4731a6691da2,2024-11-21T07:29:36.317000 CVE-2022-4570,0,0,eb5c921aa26367c68e407300ccf00b99ca0cd6dd11d3e8800d584f4c15f5617b,2024-11-21T07:35:30.873000 -CVE-2022-45701,0,0,c6e2b173360376c6a41bbc0cd896fd67683c5f3bcb34777b713989e1abce9e0f,2024-11-21T07:29:36.463000 +CVE-2022-45701,0,1,4a857c13ecb2a2a96d48dbca497cbe2908e1b5647bdee259a6e0e187974e1465,2025-03-18T16:15:14.017000 CVE-2022-45703,0,0,587c7dc85b26b1aff8741752b40539a9f3d66e4c4b13a5463c19d08e410af2f7,2024-11-21T07:29:36.610000 CVE-2022-45706,0,0,0f2f1efa6247634c2abacee8ddcf6e2ac9fe25a66a6804f810c1ebaeb6c8766c,2024-11-21T07:29:36.750000 CVE-2022-45707,0,0,8cdfe2f7dd47fa126f7f3381854276ff4135433fa0fe4a64ab9ce7c7306ef838,2024-11-21T07:29:36.900000 @@ -211553,7 +211553,7 @@ CVE-2022-46786,0,0,d5404cbb1a26515d61a9babb3ad616913ca46443ebff56277fdeb72664e9b CVE-2022-46787,0,0,1839b44641e941ee1772f261a09e12bcd324858945a483d4c42f02c661dd4ce7,2023-11-07T03:55:59.233000 CVE-2022-46788,0,0,3ac1fb815cd67e4ae46ae9675a57474df4d82a1605c72a3c18226d6c74f350b3,2023-11-07T03:55:59.500000 CVE-2022-46789,0,0,3f59976c43a8f26c91d6d4fc169efde308d581c638b56a8cf36d91fb9631f55a,2023-11-07T03:55:59.897000 -CVE-2022-4679,0,0,2c76a2daf8ae8f9a4826729f1e15e9c7db28e26ce259508c82e37ae455cca8b7,2024-11-21T07:35:43.277000 +CVE-2022-4679,0,1,591bc6ff9ea64836f9bdd8511c1793d2f207e58c80aeada864d0352a3f0ae9a6,2025-03-18T15:15:42.313000 CVE-2022-46790,0,0,03eafee4a45749b94fdd4a8e09f0c9f2165561c0ee62a9b0d0d1ab54ebe66189,2023-11-07T03:56:00.277000 CVE-2022-46791,0,0,988d11109a84dee4f590d17107abb37c783dd5ff6b3299d2a64bb9f3c1508799,2023-11-07T03:56:00.643000 CVE-2022-46792,0,0,65bc3dc887a5765f9df6ac2982b0a3936af381bfb29f1f11a64b3bce13b2d4ed,2024-11-21T07:31:03.280000 @@ -211748,8 +211748,8 @@ CVE-2022-47070,0,0,71c8bcc6578714c3144a038254a7dc271b96363a1f21388701be9e04a61ae CVE-2022-47071,0,0,624d31c53a450474697f97b0ab9f7e502dd1abe95ebcceda2a0f3fe76bd81f51,2024-11-21T07:31:27.783000 CVE-2022-47072,0,0,36e706d3d20207b8800cdc3631c0ccbb74ffcd6e2a15d9b3c507223942950358,2024-11-21T07:31:27.933000 CVE-2022-47073,0,0,e3bc043ad438f7485ae3de916ae242b5d27d53be299b3c61b0cee4417d090e01,2024-11-21T07:31:28.107000 -CVE-2022-47075,0,0,b7301c40ac15203be0772839512143faf0cf3d69957715df471c6b1ed796c6d7,2024-11-21T07:31:28.243000 -CVE-2022-47076,0,0,9777c7b39fab04afbbaf93bc9e0f0571ff86f7bd259c42a8a809aa0965b445d2,2024-11-21T07:31:28.403000 +CVE-2022-47075,0,1,2572330a3306620b7535b124109a6025ade4f1de3dd5dea9b39b4b23f7bb6540,2025-03-18T15:15:41.377000 +CVE-2022-47076,0,1,1064197c46d1abb0c1de48b9c9fb82915f3705f9285dabfbf40c059d017a0bc7,2025-03-18T15:15:41.650000 CVE-2022-4708,0,0,35e61bf6d13fa13ffb5aaae38994c51c8997bb891bc7d0827ffda3d639152e05,2024-11-21T07:35:46.600000 CVE-2022-47083,0,0,85181f0a479b8a4c22fc95934f44c36d03a13cf826da4a67774ecac71ac65875,2024-11-21T07:31:28.553000 CVE-2022-47085,0,0,465faa6563d3e0ec16346306600cb39583679ddc1d7b05026b4eb8c2a27cb5e5,2024-11-21T07:31:28.703000 @@ -212369,7 +212369,7 @@ CVE-2022-48110,0,0,763d20be13ef5dbfe0eb13693f978f5479f04cde867846fcaa47508cb6f26 CVE-2022-48111,0,0,6d90f28a337f6a00ea5e92197007edfb483aacede200ab8d61a3d9120f75dc78,2025-02-27T20:15:34.833000 CVE-2022-48113,0,0,b0d683d068557c5969d1f62219ce4bf5e3277c4d0cb6043a6977a60f5c15c44d,2024-11-21T07:32:51.957000 CVE-2022-48114,0,0,efe3af806680c265fe7c78edb3e8c4369f4d49d721d84f4e91d3192d71856932,2024-11-21T07:32:52.123000 -CVE-2022-48115,0,0,15206669169e7037b99d6362d516c2e392b240a83497224679be0ab05586b8a0,2024-11-21T07:32:52.267000 +CVE-2022-48115,0,1,02d8358a7e7fb3290acfaa6cc9cfc976422606aefeb2f7a592225bc527fcfbb2,2025-03-18T16:15:14.220000 CVE-2022-48116,0,0,d439e25a633190dba6b6a3f4ee512e50765c42f419fa5db7ae37cbd17c724599,2024-11-21T07:32:52.407000 CVE-2022-48118,0,0,92c370b1269482a57aea9032555c816c443357bc9aca17b621cb8f86d88910ab,2024-11-21T07:32:52.550000 CVE-2022-4812,0,0,bbc94f47a7be1702b566e9efac3866803787a08ad1ab3c5f1c6664a83118af5f,2024-11-21T07:35:59.437000 @@ -212524,7 +212524,7 @@ CVE-2022-48325,0,0,821ba8cc369b5ed33317db3b64b95a83170165cbc402c12aff5e8190f61a6 CVE-2022-48326,0,0,8c83c2686cee6bb45d662eab9356be2dd72d81ea932ee3e3f416f1a1692a1027,2024-11-21T07:33:10.300000 CVE-2022-48327,0,0,12c4344fd4c4aa1af24d2a49216757a0f7a51529dcfcb52b3ea56753b5104ae0,2024-11-21T07:33:10.457000 CVE-2022-48328,0,0,7af5fde39d252e4062d2019ffaf8c5797159ea934eb48b4bdd2009ebf71b8355,2024-11-21T07:33:10.613000 -CVE-2022-48329,0,0,fd78d689f8b95c1c93c509a5f1be9b3702cac27fed0e5131a1f5474c412f9f40,2024-11-21T07:33:10.770000 +CVE-2022-48329,0,1,84bb8fbcffdb9c182f5c48840cf114cb6b9b6df0383eab7e3eae359284a37b20,2025-03-18T16:15:14.440000 CVE-2022-4833,0,0,3c60921c07f972d9dce9b0934da234081280df0ca1840ba48feb2901ab38f84c,2024-11-21T07:36:02.213000 CVE-2022-48330,0,0,e347d1a26351892c8f76e5194f278b078ff30f82ddb6fbc10aa8077094817419,2024-12-17T17:15:06.270000 CVE-2022-48331,0,0,fcf39240da7769727e27f44804bfe36cac835bdbdc347e7e92b25b27d0565501,2024-11-21T07:33:11.017000 @@ -212533,9 +212533,9 @@ CVE-2022-48333,0,0,275aa8ddccd1d003f9546b24b8a1c169abc7571752a249fcf06a20b9002eb CVE-2022-48334,0,0,bf69df872c432fc2cbfab74b16fbba9d232777b50d71e5f98b1fa7a3cdd44d7d,2024-11-21T07:33:11.520000 CVE-2022-48335,0,0,ce159771020046e751b1d1f9027b504a1158e45bbbe9a757748adc45ea2bb108,2024-11-21T07:33:11.650000 CVE-2022-48336,0,0,ba0217a40cc917b7cc43ebc898c8823e30e848f10286e73d38b211541025ad24,2024-11-21T07:33:11.790000 -CVE-2022-48337,0,0,cf77b5d3841c362b2d3d49e60e7f66828493028dbd30377a351b4759588c57e1,2024-11-21T07:33:11.937000 -CVE-2022-48338,0,0,e2d241e1926a53ea49cdc54d85ce41fab6c975c216e9d8995d15739be5279217,2024-11-21T07:33:12.090000 -CVE-2022-48339,0,0,1a2c23b629175c893922a4b742e993336ac82d79b77c5041aa864f737520692b,2024-11-21T07:33:12.250000 +CVE-2022-48337,0,1,e10025007eabb6b44845155875b8036b7cd258476065a31f0db5b947ea578d80,2025-03-18T16:15:14.647000 +CVE-2022-48338,0,1,eeffc00e354f6c3096eb8907d8f2fb2801a51f3a1e0efea7301efc2e80d0cccb,2025-03-18T16:15:14.863000 +CVE-2022-48339,0,1,dc47bbca04a3bb680ca1a557835b58dd411f30b2efb4a8941274b15529ef4eb6,2025-03-18T16:15:15.070000 CVE-2022-4834,0,0,3f53b6aa90f426d51dfb1aa08c7e2a881b23ce986555b9cff45e4b92b33cf79a,2024-11-21T07:36:02.330000 CVE-2022-48340,0,0,8e0f0fc27a6560aab5a7afbc3723b56256dd2045311fab0ac518ac28afdad99b,2025-03-14T19:15:40.370000 CVE-2022-48341,0,0,48aa520d98f65b45ae85915415cbb085208d85ef4d6403abeca4de4ebb7550af,2025-03-12T15:15:37.443000 @@ -214144,7 +214144,7 @@ CVE-2023-0164,0,0,51c32b819fc67e3646f865fa77c64f2d24aa44508624e04b02c13c4864862d CVE-2023-0165,0,0,7fcc3d9ed0c5d6428efa2bb074b9f90b7adb08040882994dabf7a3834cb08354,2025-03-06T15:15:13.633000 CVE-2023-0166,0,0,49b2ded7625387b1a13e7ac4f3c5d2fe1b752791752732fc35601586b7acbb56,2024-11-21T07:36:40.357000 CVE-2023-0167,0,0,459d4943ae7f6093e0c08e93f0df454bd6f8fc1ef44e06359463c8da2022995d,2025-02-26T19:15:14.690000 -CVE-2023-0168,0,0,480bb72aebfb6db5bc6de2fc7749a7dfe9ec422fccde53fd6ce097e3e084f78f,2024-11-21T07:36:40.573000 +CVE-2023-0168,0,1,10f076ba3e8ee67c995f745a1271bc59db19eb39e55acd95d9958f0bcd7ceb77,2025-03-18T15:15:42.527000 CVE-2023-0169,0,0,3ebd5a673119d51eef3e7abb5f06b05f9848a20d46a7404b0ed22a00320db063,2024-11-21T07:36:40.683000 CVE-2023-0170,0,0,3f6b0d3dcc40dded89b2acfa9b275f38cee69f0618392e50ed711911e66c8397,2024-11-21T07:36:40.787000 CVE-2023-0171,0,0,88549ef36d04c543f76735cf01c4aca2040798bfed1d7f5648621cd2ba5c5669,2024-11-21T07:36:40.893000 @@ -214351,7 +214351,7 @@ CVE-2023-0377,0,0,9985f7addb4b6395ecb8f44f70b75d5f0a14376de7e9bfa2d4adc8dd24e444 CVE-2023-0378,0,0,736996cb01e7855e9d6ff04f5f36851f6d27f466bd855e3b2600330380ed8d08,2025-03-12T21:15:40.490000 CVE-2023-0379,0,0,f5b465b78e05610316982960593550c1b8c5459baf2a808a9ef3a8e0b5f7b81e,2024-11-21T07:37:04.817000 CVE-2023-0380,0,0,e199a00c1e1579f86574b186fac08be1b5ee641379e96e857389051cc7026e5d,2025-03-14T19:15:40.897000 -CVE-2023-0381,0,0,f291ac1e09bd660789bb5a29512511da635cee82a7609efb1497b75e857225e1,2024-11-21T07:37:05.027000 +CVE-2023-0381,0,1,fb963192539a86802660cecf1f4984bcbc8442d3688b92930e1e773c336353cb,2025-03-18T15:15:42.723000 CVE-2023-0382,0,0,74df95cd11c65f3e32e101ac93474214ed7fd751aafe1a489acb854b3ad08870,2024-11-21T07:37:05.127000 CVE-2023-0383,0,0,2dd17f8e3f21172fd0d947223df8988fa47c58739face7170e70183ef112e5d2,2024-11-21T07:37:05.243000 CVE-2023-0384,0,0,317073837dfa5a62a0b542d55228582d6dcfc135bf2a6505767847825e5542c0,2024-11-21T07:37:05.360000 @@ -214444,7 +214444,7 @@ CVE-2023-0477,0,0,eb0bc6bf5a23628dfdac9cb891c1e82e4059f662cc20c61224b284586a02d6 CVE-2023-0479,0,0,06eb51de3a72b3f0164abb1d6de85689db57117f2d0744adcf915aab1c8b7b47,2024-11-21T07:37:15.660000 CVE-2023-0480,0,0,cf1509ef18aa8c565d0b78000b1b27da521169c923141537f706a90d527b084a,2025-02-13T17:15:55.443000 CVE-2023-0481,0,0,ba9e6554d7f44a8c58596e93e292e3ac4fdc86a2d0e90079914465d5e9f1ed4d,2025-03-12T16:15:18.873000 -CVE-2023-0482,0,0,cda6e71d60c25ecd692155f80f98bbbe549a3423e2be90fb267c38e0bc11da60,2025-02-10T13:12:32.147000 +CVE-2023-0482,0,1,859aad2ffe01f82b07e5471604c5bccfbf15cf8aad37f95a23916eb8aa4746c1,2025-03-18T16:15:15.277000 CVE-2023-0483,0,0,076aa122ad914c1164f82f3f9f173341f80591ee3542f2aef7ed6562b6f26e75,2024-11-21T07:37:16.120000 CVE-2023-0484,0,0,8bbf0133f11289ba6dab230eb2ebc471707598c6dc2e7bd50d80f9b6868763d1,2025-02-19T20:15:33.520000 CVE-2023-0485,0,0,c94592c0a92f081c506f16872d53f1637abd06d2d748b9cc55aedabdb3c6af8d,2024-11-21T07:37:16.357000 @@ -214511,7 +214511,7 @@ CVE-2023-0548,0,0,b9a98b7e80a5fd234336b65fbeeb6cd5d43dbc35e37a2dbe56ab6c787fe545 CVE-2023-0549,0,0,f6480b7e8d69b059109f807f8d590797408269f596b27b454312db7225cb4af2,2024-11-21T07:37:23.113000 CVE-2023-0550,0,0,bec5b5445a12fbf0814f5101c2402888112304285a3256f9f16660f8b16d4d24,2024-11-21T07:37:23.237000 CVE-2023-0551,0,0,30c9be71559fae5c12b24bfc599fd34d69ea838008cf2e194ad4186361ffc482,2024-11-21T07:37:23.333000 -CVE-2023-0552,0,0,979805bc8443f0b09dffcf1fbc16aa8c6552d62877b24318d15cdf334604f89f,2024-11-21T07:37:23.420000 +CVE-2023-0552,0,1,4d341a1c9ef739716341c461434b0146c2b7cdd62cd27ee8bf7ed13cbc17fbc0,2025-03-18T15:15:43.027000 CVE-2023-0553,0,0,4340a8a73fb8359c4474c5268c6c13a0228c595352429ff9eba387a55998109b,2024-11-21T07:37:23.507000 CVE-2023-0554,0,0,e970327a6a62ccfbf223f13951ce0ae633715535071575fc2bb377170acc4a30,2024-11-21T07:37:23.610000 CVE-2023-0555,0,0,12893a83303d72f15c97a22ef3b11c1e58606ca28f3ebeafcc668ca0df6746fb,2024-11-21T07:37:23.703000 @@ -215031,7 +215031,7 @@ CVE-2023-1091,0,0,9a128be955d385960ee0cec982b4debe4f2b0b70a6b1e923e5650e75a331bb CVE-2023-1092,0,0,e31563d04d690b62dfa9c64602f7df244d8ed613ffc4c36fe36570744d3bb422,2025-02-19T17:15:12.730000 CVE-2023-1093,0,0,c6a3a1bd53569005de3f9429f21188e50bde3e43821f61703bb904bed50eccb5,2025-02-19T21:15:12.523000 CVE-2023-1094,0,0,af6e6ff74b15ffdb3c40f6ff54ea20737a0e12cdef3e73b1717839dc6ab4148d,2025-01-29T17:15:22.277000 -CVE-2023-1095,0,0,558f2a036a0b0a2e819582a51740e472d06e69bb014f4579990a955403cd0444,2024-11-21T07:38:26.880000 +CVE-2023-1095,0,1,301fd250e7eb9db24b43d48ffb2a3e5643ae7932e812897fba3b1f1a76702e3b,2025-03-18T16:15:16.013000 CVE-2023-1096,0,0,10de65de0487fe9ed676022ccea3b2512ca19c2bed610c034452e6b6d3620b95,2025-01-27T19:15:14.237000 CVE-2023-1097,0,0,42dd918e8e58f1d2ed7de3a397688cccb30c2a849bb017b2637d6910ed633e59,2024-11-21T07:38:27.123000 CVE-2023-1098,0,0,02208ee76f6b1448194e9e24a7985a0f71156acb618b926a188184b60f2730c1,2025-02-10T21:15:14.137000 @@ -215343,7 +215343,7 @@ CVE-2023-1416,0,0,7e80c618136ceee77c10207d261275035d7f445f7adbc053b389431d568e0c CVE-2023-1417,0,0,13015eae16b23d3235117a6ef87101a599c93ae88a330dd6e8b6f6a47b3f3a2d,2025-02-11T16:15:31.197000 CVE-2023-1418,0,0,fcab4f4984136860b89354bcec8630480796df26dfc931bd2e8b23935788ec0d,2024-11-21T07:39:09.143000 CVE-2023-1419,0,0,a29db606d3871aa312ebefe30882b3cde150217808b6916c4fd17efb582a634c,2024-11-18T17:11:17.393000 -CVE-2023-1420,0,0,2b7a1c05cc4f4740f1454bde317cdf6b602206cea5a12cb57a1f4c811fbaa98b,2025-02-04T19:15:28.020000 +CVE-2023-1420,0,1,505291ed403845cb320b5c97b61c9cbdabdedc2119b9891274faca1ebcd3b878,2025-03-18T15:21:33.470000 CVE-2023-1421,0,0,6fdfeffdfb9d07c731faeae7bc98a5498d22bf5dbe52a625d47e5bc4b1da6b9e,2024-11-21T07:39:09.463000 CVE-2023-1424,0,0,a71e302d45ea4b4076c352c6c771e590799dc51d197774dd6269cd413640fbe3,2024-11-21T07:39:09.593000 CVE-2023-1425,0,0,3cbd7a1035e6d497474d098f6a1343af7ddb3cf32faf7ed04e6e836cd34dc2de,2025-02-11T22:15:25.583000 @@ -215355,7 +215355,7 @@ CVE-2023-1430,0,0,104755db4275942383c66b0ec9fe08157a8c3ac5a8dfd0f691a56fb2824e06 CVE-2023-1431,0,0,fa0397ff960a095d190d5218b781fa9a331ddc45b799729620aeb4706b98b124,2024-11-21T07:39:10.520000 CVE-2023-1432,0,0,f88c309390960735a40f91bed93484a21747577b1f31d306628bdb8e4b75699f,2024-11-21T07:39:10.640000 CVE-2023-1433,0,0,7897071d4de3cdc686f7970a21be3bd4ce969c3d3474e66d18eca43198e24a7a,2024-11-21T07:39:10.773000 -CVE-2023-1435,0,0,6c116c1bd9f1ac84f1a74556437c75b428d8ee0d86200a41ca80f90fdc623dfe,2025-02-04T17:15:10.380000 +CVE-2023-1435,0,1,8c39e292b9bc5a5e7c524c03d0bf953606fece7aa4732368ece496e57e58f8cf,2025-03-18T15:21:33.470000 CVE-2023-1436,0,0,f72e252f12b152cdb2e6f3867a3a11a13c52240e7c549273dddc9f4db49cd18b,2024-11-21T07:39:11.013000 CVE-2023-1437,0,0,24b958af28a0978bf410949ff65db271f11e8eddca263b39eb7b49413a6b507c,2024-11-21T07:39:11.140000 CVE-2023-1439,0,0,380c6068999b4c21db62a2a775ec6893f26072892a5f55649216b6370c1d2af3,2024-11-21T07:39:11.260000 @@ -216624,7 +216624,7 @@ CVE-2023-20944,0,0,f3ba54d283f3ec94a3b3706492bf10b1e4201b1c1ef754aae24f205cc9e12 CVE-2023-20945,0,0,3305736470fa992faa31daf683edade84e7b223ee819db71a5b457c381bcd58a,2024-11-21T07:41:52.210000 CVE-2023-20946,0,0,36c2432608ac697eddbe172d6f5aa7a6658c07a83192a438d8f5b9a3cfa0140c,2024-11-21T07:41:52.320000 CVE-2023-20947,0,0,b391e7da3f33513655e0b1f7fc2d60d1931a7f221187f4ae6383b147c42bf55d,2025-02-28T21:15:20.323000 -CVE-2023-20948,0,0,44959db932b3a74476389aadd63f8f33c477e012fb83fa21ad56201e80d9b878,2024-11-21T07:41:52.527000 +CVE-2023-20948,0,1,155732fc8e664f43579fa64f3f07c329b2c0033708f238ec58daab6d7bf5d5af,2025-03-18T16:15:16.227000 CVE-2023-20949,0,0,316dea8ef8347e96a4443d2b375666490d9da0b5bc49ada83bb0c6b2131ce34f,2024-11-21T07:41:52.637000 CVE-2023-2095,0,0,3c7b61baa8b47451def86a213a49c3157f17a9c9137789a496fd564cd76ce4fe,2024-11-21T07:57:55.663000 CVE-2023-20950,0,0,4865c61fce00fa55d1b6920408abf2784e24ef60f3b70a471e467b43c20a5d2c,2025-02-05T19:15:11.983000 @@ -218566,7 +218566,7 @@ CVE-2023-23003,0,0,f0792e782dce5c5fe5f15bd8d0061c6e00716557ac3381b38190d80f67483 CVE-2023-23004,0,0,ac130295d050193d02458109e23a3740be804911590fced3875d2f673ade5aa9,2024-11-21T07:45:46.863000 CVE-2023-23005,0,0,07097262a254eacbdb7fe0a19d71fd50833defda2e2095476000fae7e138de60,2024-11-21T07:45:47.017000 CVE-2023-23006,0,0,84901b6d76c82f7b11cb775bb18e53d272c3625022f0683931165808cc22ed05,2024-11-21T07:45:47.170000 -CVE-2023-23007,0,0,31c0421d381570d0b771851084f2d1889cd727c3923f482900e4880ddeeb5ae0,2024-11-21T07:45:47.323000 +CVE-2023-23007,0,1,8cf1a9a8db04d68b49b3bcbdd803770ff4fcbe312564ba2120812c7b776a4d08,2025-03-18T16:15:16.440000 CVE-2023-23009,0,0,8ad515f5911b9fcf65cf6cea06a5a525ae69bb49f95cac56284bfb3185444340,2025-03-17T17:15:15.920000 CVE-2023-2301,0,0,ca3d934402fb15ec6cb8ae895916b620e4b3addf26aacb9efac8bf5b1c34a9d9,2024-11-21T07:58:20.560000 CVE-2023-23010,0,0,46ca85fbd4f24d940f6c74b1fb4fb7fb2a909394f4ec952e14d2531d631c8484,2024-11-21T07:45:47.633000 @@ -218790,8 +218790,8 @@ CVE-2023-23449,0,0,c5234ad229754c153bb79613f0840f5621f932ce4eb094a1e5fd743df97fe CVE-2023-2345,0,0,a9fbcd39dc1b405e2b3eca6903f4768dd0d9f0ed5aa6af18f6e4929abde54e63,2024-11-21T07:58:25.630000 CVE-2023-23450,0,0,ed85c34c8cd78dd3a5207393ac9dd842dface30fa54b196cae78317e6f3f5382,2024-11-21T07:46:13.390000 CVE-2023-23451,0,0,7016ceaa7de232a71f46d20b0dd707f2e5ff5659c5c54b0289b718d37fb4767d,2025-02-05T16:15:35.057000 -CVE-2023-23452,0,0,7794609a7c92177d4b5f8d1512ca49423e2185c448c370f7f3280eaf0660b30e,2024-11-21T07:46:13.673000 -CVE-2023-23453,0,0,04f3407a1aad9a40c2fb62291a56f14898581ac442d9f9aac1f99c295964ebcc,2024-11-21T07:46:13.790000 +CVE-2023-23452,0,1,995c4a5cab66ad835557f0a06439a16e8b640455e1c3fd8ff9a1d7b09b4161ff,2025-03-18T15:15:44.050000 +CVE-2023-23453,0,1,9c4c81a9d90c786c6908b99cdebf33bf3d0097e13351b8352f85649611bbe804,2025-03-18T15:15:44.323000 CVE-2023-23454,0,0,17508cb1e4954dff4fe359b63cd793535c5eb6e9ab057c38dcf9e40f67ea5f5f,2024-11-21T07:46:13.913000 CVE-2023-23455,0,0,bccc3b4c3dc9a1fa58f316f1ea309499a8a108862fc3643350f262ed37959ca5,2024-11-21T07:46:14.060000 CVE-2023-23456,0,0,8fa4a5d56d9209dd58b00b8d725524663c8501554fb2f87038ef80179f9ad719,2024-12-12T01:15:48.337000 @@ -218859,14 +218859,14 @@ CVE-2023-2352,0,0,f2b57b0bbfa316225559cd4e96ca98c890ce4e800269f7fdc72b0f4686c5a0 CVE-2023-23520,0,0,efd133e62f690dd05db2066eb6ab55bdbbf771dc3d1cad458cd0761878b2f279,2025-03-11T18:15:28.667000 CVE-2023-23522,0,0,d634ece2f89debf226d2138009a3821f0730a25469953c3100b0f8a72e4b00df,2025-03-11T18:15:28.870000 CVE-2023-23523,0,0,f269553aabe3b769922b7fe99db9d02491b24fccbae44f488a700e2b7bf839e4,2025-01-29T16:15:35.643000 -CVE-2023-23524,0,0,6f3249006836706150b27662ff3f3a3771e72590d4b311d265b914ea55918059,2024-11-21T07:46:21.153000 +CVE-2023-23524,0,1,f7c6c05815810f794ee51cf24963dd5d952e107f766e94dfcc4446f3c14d206d,2025-03-18T15:15:44.563000 CVE-2023-23525,0,0,78db85fa8f2d6299275740c679a54c95ef2f505fd0559284dfc708baa44715ed,2025-01-29T16:15:35.870000 CVE-2023-23526,0,0,0b8fc79c9ef40704de6cf82fef3307acffc518a897d2d19bd4accf30ae6a56be,2025-01-29T16:15:36.057000 CVE-2023-23527,0,0,95e09b7643b70de664ad0a17f59b03a1f5ad459216d89c350de15db250b6ebb9,2025-01-29T16:15:36.233000 CVE-2023-23528,0,0,650e9a99e0fd9e60e2db38b8f8e5930d222f449e060a9d63b17dc22d8f595647,2024-11-21T07:46:21.600000 CVE-2023-23529,0,0,54f16d88df0c6b1159c9681a5cc298b151f0148f9ab564cddabe25d037602f5d,2025-02-28T14:57:19.360000 CVE-2023-2353,0,0,d9677ccf6a1806a366039f2a958d6f73e93758433d611231baea25eb5f519b29,2024-11-21T07:58:26.637000 -CVE-2023-23530,0,0,d04c218cad5b3190fc98feca7f327753f411ad97fa4c08572069ca30e03769e3,2024-11-21T07:46:21.827000 +CVE-2023-23530,0,1,44c5034a174febee983a09bd34d9592ed5bcaff7e8b9c68d3fd7f5d8c116cc9c,2025-03-18T15:15:44.803000 CVE-2023-23531,0,0,b213224bb465483065002ebf5d97dd285d18ab51c735e49d5b4003cf94d56a89,2025-03-11T17:15:47.627000 CVE-2023-23532,0,0,ddecd4a245a478eba8705477397f953a27552e4b5d464f2a095fb4267bd4cd82,2025-01-29T16:15:36.457000 CVE-2023-23533,0,0,bd0b9029b458bcf9565adcabbc400c36cc12a55ba52b3e33f2be71d8d8d23fc7,2025-01-29T16:15:36.650000 @@ -219416,20 +219416,20 @@ CVE-2023-24097,0,0,3536afb6c3f8e27ffd63853f503c7a90e0005c40f1d484d4a8831066f285b CVE-2023-24098,0,0,b879ce22a07ae11411c0df1137b5f7f89cad114eac23a699b420fbe5f4c30d55,2024-11-21T07:47:23.953000 CVE-2023-24099,0,0,d26f690ef7c6f68846cb7c7baee180602864568ea9dafb9ab4b7ab9c0e759d63,2024-11-21T07:47:24.097000 CVE-2023-2410,0,0,560f4403f9f31b29d3502c9a534f423b6bdd040bbac8f5d6bb1f5039b2dab99d,2024-11-21T07:58:33.687000 -CVE-2023-24104,0,0,b0d717c4fd119cee9973847f929cf373ec8124f484415ce0b9025d87a0878ca8,2024-11-21T07:47:24.257000 +CVE-2023-24104,0,1,ac2b84f1850b03d023fa2e7732801e511c0e4a1018f71f8e4299e1ccd87777c6,2025-03-18T15:15:45.040000 CVE-2023-24107,0,0,d0b7cb70b0846976dad5d11fae0b44c73c7bfba0e7a875d46e725570ca86f4be,2025-03-13T20:15:14.680000 CVE-2023-24108,0,0,b54cdd63d496b51fc9be03fab577e56fda00c0661e3e073fd0886862e2b8ba25,2025-03-13T20:15:14.903000 CVE-2023-2411,0,0,48e2dd8e32317ce67fe5cdde8c7bca570b474bf388ef23aded86e634b2dad07b,2024-11-21T07:58:33.810000 -CVE-2023-24114,0,0,76e9f701e31cb5df44c27a2baf89ea3860585eaaf8f5278b384644755c3fc2f1,2024-11-21T07:47:24.707000 +CVE-2023-24114,0,1,9032345aee66b7d3e0e37d354ea1bdf0321e33842a8fb0a098766a991cbae533,2025-03-18T15:15:45.287000 CVE-2023-24117,0,0,ce5ca96f7ef33bb88a08fedb0b5de8f644b7fe11f092c19dd5f0327669408df9,2025-03-07T17:15:16.737000 CVE-2023-24118,0,0,b9815cd8fb0dcbcd37aca85bfc8a715d5eb93c97f2edc7018fb0fe882d3547e3,2025-03-10T17:15:33.840000 CVE-2023-24119,0,0,80cb6502119a1de14e9171897ca7f8e5f1afed7ddaf8a27c955cb5d859eb123f,2025-03-07T21:15:15.050000 CVE-2023-2412,0,0,f89ba170f161b8d62ce35271e8715f316d8fd52eb600a4af46dfcf59117e77a5,2024-11-21T07:58:33.947000 CVE-2023-24120,0,0,714454f747e49f6103cdc79930ee3cdcfb846f1571c6409973adf5184b191a0c,2025-03-07T21:15:15.243000 CVE-2023-24121,0,0,ff474eed757250a26140832a24b10fe2db537337a9c72231f0bca27739f935db,2025-03-07T21:15:15.450000 -CVE-2023-24122,0,0,9d6e6a829fc0b5e93110b53d159f71dce1c42f0803e3f25d23d4d1b5ebba7ab5,2024-11-21T07:47:25.567000 -CVE-2023-24123,0,0,4a03d8bd4b45a0537d514da9141bf9191eeaf90adcca1a9cdf211c4f3f2751ea,2024-11-21T07:47:25.717000 -CVE-2023-24124,0,0,fafa55e4924d6cdb5c10332d5ae70d8c0c166a6f75634b5f8ecb70a3baf987e3,2024-11-21T07:47:25.863000 +CVE-2023-24122,0,1,8b5861f279884ad3d3cfa41568913c63c6898cd2f85f36fabcca8a90ac6803fc,2025-03-18T16:15:16.760000 +CVE-2023-24123,0,1,199fb6d522d14517ce784a4cc647ad0069b750b83a006c460cf35b62507baec1,2025-03-18T16:15:16.987000 +CVE-2023-24124,0,1,ebee9ba1ea350fb4f8726d3bd9a65e07fc2224220f66159bf579182442c69fbd,2025-03-18T16:15:17.197000 CVE-2023-24125,0,0,82f87336f5148fdd2b0e9d4f6e87ef7e1b72bfd4676e8a6450305dc8898fefb4,2025-03-07T21:15:15.643000 CVE-2023-24126,0,0,846e5bcfccf25d3c666ce84ecda97faeba85506dddb24e2fb75594d91ea72665,2025-03-07T21:15:15.840000 CVE-2023-24127,0,0,c881f5236367c9ce8ee841970ba415ec0e805b98796a268c34b2a25a7eb12f8b,2024-11-21T07:47:26.300000 @@ -219543,7 +219543,7 @@ CVE-2023-24304,0,0,cb73a3f62e0e814b15ae752098a3c12af36abb8672c526acd7ddd13d1756a CVE-2023-24308,0,0,261a6fc910071de82649c37f9ea8f42bc494f40254f4dd6b2a8f2efe7e72897e,2025-02-19T16:15:36.167000 CVE-2023-2431,0,0,939019fa791b41f7ce813012de1be4013166d78534d82797ca097ddd1a2cf895,2024-12-12T16:15:07.937000 CVE-2023-24317,0,0,e29969d3a23798cc443209fa7bb8c1eb64c8e7198066188a12f9c9059c1580ca,2024-11-21T07:47:40.047000 -CVE-2023-24320,0,0,88d18ffd50e18e72b2968c835f76418a06ef2d31bebcf67d9fd951974ecca640,2024-11-21T07:47:40.207000 +CVE-2023-24320,0,1,a06ccb76b8359ddd026951d4c9f01aa1a570483368fbe3d654e83c19584d026f,2025-03-18T15:15:45.527000 CVE-2023-24322,0,0,aa2662241a351491e188599a93af1e72b85d820e46364a5ca410d2e1a0359aa6,2024-11-21T07:47:40.347000 CVE-2023-24323,0,0,8f65038f7feb34c5457f95aee0c1af72cd7780fcd174203cb004f42698c639de,2024-11-21T07:47:40.493000 CVE-2023-24329,0,0,15d1a41d37f2d8fb1c58336a0c86512bb210db3fdd79cf1272f2039ab2a4055c,2024-11-21T07:47:40.647000 @@ -219570,7 +219570,7 @@ CVE-2023-24364,0,0,61f926ce1df43404bece98f2dd55d5ca5a40dbcd0b2a60e5372dd4cd23603 CVE-2023-24366,0,0,5d7db002c1457019f1582d6e2eb9871a01ac3c1ff77928c5a114a7191bcb3a47,2025-02-19T18:15:22.477000 CVE-2023-24367,0,0,bd2afe80ba273e0d4f82725134a30190fb13e39466ede74273078ca9c22f3c02,2023-11-07T04:08:26.813000 CVE-2023-24368,0,0,5900bc1b5bb4d3a71bee753000740d76a9c188b4b457ab1d2153e4af094e1845,2023-11-07T04:08:26.850000 -CVE-2023-24369,0,0,d45792764e567206ae0cb2390669734d2ad93cd810f8670b8f0fae82c5faaf5d,2024-11-21T07:47:43.847000 +CVE-2023-24369,0,1,36814ab72977e752b45729f8bb11b6b1f3b154fb343aff1a23fb318d45c79342,2025-03-18T16:15:17.417000 CVE-2023-2437,0,0,225eaae043eb2f8b6533e248cbd8b158dfa9d2f2d50334309a3f9b53226e6554,2024-11-21T07:58:37.013000 CVE-2023-24372,0,0,239892ae50958d33037cab2e2bbfd1320924b87074c71623b18d170a1b64d100,2024-11-21T07:47:44 CVE-2023-24373,0,0,107994e1df97306f9a856b46d5628f563bc6eb23330cc6326f17cb853cb40e19,2024-11-21T07:47:44.133000 @@ -219902,7 +219902,7 @@ CVE-2023-2476,0,0,3d6a64ed0387290daf173e01d49ebd8b729d7b39b6b58d91e9b98025edbc2a CVE-2023-24760,0,0,6fdb6eab210bf23cab3361beadfd284bb6edfd5089c660201dd2138f183574d7,2024-11-21T07:48:22.873000 CVE-2023-24762,0,0,807e0d63ba14b02052beafcb4136411dbac644adf997afa26932b541c68f2bba,2025-03-03T20:15:38.170000 CVE-2023-24763,0,0,2a90297b759d351a75bd275d5b38707d137212e854f8f294548b00c5f9c99d39,2025-03-07T17:15:17.230000 -CVE-2023-24769,0,0,185959dd746941dbdbeac5aa148647daf8dd47d571a410211fc5c1d4bbded74d,2024-11-21T07:48:23.303000 +CVE-2023-24769,0,1,04f9769f7244686e87774852aec4bb0e01904d631aa23f8ffb9b9962cc0d0a2d,2025-03-18T16:15:17.883000 CVE-2023-2477,0,0,c293435cb6cb5f53f7904bcfb67b099084502f313f9448bc884a4e0dce52cc61,2024-11-21T07:58:41.623000 CVE-2023-24773,0,0,2d8144c4ebf5bea0cf76049250e7a2583392a0cf4e670bdf63bfb725a05c9543,2025-03-05T19:15:29.460000 CVE-2023-24774,0,0,1bd4641ff4eba85584436710e425d7537ccf4e712955c73fafd022f1e56d88b5,2025-02-28T16:15:36.360000 @@ -219913,7 +219913,7 @@ CVE-2023-2478,0,0,e91b233a353d459fe8bdebf4b2ba61948a17e504cd67f12404049ad129f433 CVE-2023-24780,0,0,b9dd2f1fcd3f4b89350b74f229ea1d418203d839d7a2ae180cc7fa5be7783a26,2025-03-06T18:15:40.293000 CVE-2023-24781,0,0,3894237ed71ca7363e17746687075b44cf97033c92333187795d4139d0b6c65e,2025-03-06T18:15:40.553000 CVE-2023-24782,0,0,57db0d0839e35c2a54e424f4fd7fe928741c422b25adb1d1f016ad1dc9cc09c2,2025-03-05T19:15:29.800000 -CVE-2023-24785,0,0,316b9878f5504255dd810089f62d0c938bc918f44d5e8b00a11c8b78f26588e7,2024-11-21T07:48:24.490000 +CVE-2023-24785,0,1,88a43463e161afd61a521bc4d595318528d90cffd3005238ecea07b31f50d7d7,2025-03-18T16:15:18.153000 CVE-2023-24787,0,0,1bb160417f56158608d2467445788d315bc974ff3fa7fc414e55d4483c668cc3,2023-11-07T04:08:42.430000 CVE-2023-24788,0,0,868ff4d8e88aff25ad543e70a65b697e1d178d63050b1ca143aa0decdb797d27,2024-11-21T07:48:24.640000 CVE-2023-24789,0,0,367ace39fad6b1e514677c41a0ac737a131d93a7d1eb6bac3d0992b13a458a1d,2025-03-05T21:15:16.840000 @@ -220358,9 +220358,9 @@ CVE-2023-25260,0,0,462377383f05b127116564f95c3ee797ea8594c03c48377da2f91f298f833 CVE-2023-25261,0,0,d0c01fdead219b1a29a1bb92f7c51c59d5ddf06755d9d3a4ec4d5696dc672c95,2025-02-19T16:15:36.610000 CVE-2023-25262,0,0,bbc40bc3a1a27d5fcc6693f63adfdaed43a69ce9b442e713d7bece07d51f5302,2025-02-19T19:15:13.247000 CVE-2023-25263,0,0,4aad64f11ab2e0d4864dacc1cf8195140394e8e4cde0cfdba908ca1250f80377,2024-11-21T07:49:22.017000 -CVE-2023-25264,0,0,2610d9b0200f89f1533e61a73d97d3ca4968e7fb5865b80d7dc66d773cd6e133,2024-11-21T07:49:22.163000 -CVE-2023-25265,0,0,5f5ef04a6c09628b350029f5be3f3d8bc401eb158442b7c9069fcc5a728f700d,2024-11-21T07:49:22.303000 -CVE-2023-25266,0,0,a7a424dee66184245367649bf5db85fe3a024b5d141ab2b24100e5586bc08044,2024-11-21T07:49:22.433000 +CVE-2023-25264,0,1,4af03bae6b4a8906b80936a9cfec4a16a6c3c165b8ebe69e5796072140c470ba,2025-03-18T16:15:18.437000 +CVE-2023-25265,0,1,00836051c4d0f56f2bc815b7aa33bf98786ea2a02461fdf5b3fcaa612e484126,2025-03-18T16:15:18.710000 +CVE-2023-25266,0,1,ba92f339aa33f65aa81eb6d6bece047e5801344dea6245311eabe495576a1848,2025-03-18T16:15:19.013000 CVE-2023-25267,0,0,4259de3326950cd8e26ada70276d9aaf3cf4cb092f4dc89828c70d495046b4c7,2024-11-21T07:49:22.563000 CVE-2023-2527,0,0,b628c7086a29a9183da8f9f64491e1f494424d1684e0e71a944098c3e46be700,2024-12-12T01:20:30.213000 CVE-2023-25279,0,0,b1a7056aac972e2cef544266b63734e9282f2de2380e110d864a5fbe3b37fb78,2025-03-03T20:15:38.600000 @@ -220427,7 +220427,7 @@ CVE-2023-25413,0,0,7cf4333443d8c75fd4bfa89964e234e07e78bb111a1dbcf0fe87ea907d3f8 CVE-2023-25414,0,0,49ed0908ef2686668b0f58ba05192dbfb45aeeab248bc9958aff91be6964a481,2025-02-11T17:15:18.180000 CVE-2023-25415,0,0,a6e499da009674dd445d175e6469fbefa1046ef5e7acef7221e3e602ca3a164e,2025-02-11T17:15:18.370000 CVE-2023-25428,0,0,394fbb9a4bbe9ce705d46ba5ba0225c0e642240f4e95fba1842a0fee358881b5,2025-01-24T20:15:29.190000 -CVE-2023-25431,0,0,e316aa04217c95c99f1457a91f82135e51b8eff788a9ce2487c26f659f34afa3,2024-11-21T07:49:30 +CVE-2023-25431,0,1,49a2875ae15034d0d72e1b75fe7640f9f6022cc44904cc53d0f1a4b9a985544a,2025-03-18T16:15:19.330000 CVE-2023-25432,0,0,f20d1f459f74b986748a5528b7c2eb57d58187f6efbbf33869825f1d4e128f21,2024-11-21T07:49:30.130000 CVE-2023-25433,0,0,5df429e22dc751f41d7a433fdbe286812200698b107ca366808321b8c7ea1827,2024-11-21T07:49:30.260000 CVE-2023-25434,0,0,571f5e56236fa9808326880d35572a59c1b6a1bb40906c385bd1a6191e97c4f4,2025-01-06T17:15:11.303000 @@ -220621,7 +220621,7 @@ CVE-2023-25618,0,0,3835902b7df47dc78b892190ed872846683220b7535d848381afe6e2196ed CVE-2023-25619,0,0,30bdb6781bea30192f03aff26ae9bc6e8896561eeb7267b6ab178a32c9ba1b32,2025-02-05T16:15:35.453000 CVE-2023-2562,0,0,a560d2c53ed1bbd212fecc3d22df43f319970ea07142acb7da770e618405ec2a,2024-11-21T07:58:50.070000 CVE-2023-25620,0,0,091c5b50fcd46fdbffb3a115bc8f20d5c4182da6b09cdb2f0bceac8dbbcb07e5,2024-11-21T07:49:50.757000 -CVE-2023-25621,0,0,72173c8145d5d36b3dfaeda62234e1957127421826f0d4753f91d463e89ac4a4,2024-11-21T07:49:50.890000 +CVE-2023-25621,0,1,25e225195103dd7f468513d2f6be88847aed570c7cbcaf062b6ca28b44eec3e2,2025-03-18T15:15:45.757000 CVE-2023-2563,0,0,3392b57898105bf53fbf84456c9b8469decf3e4fa33df5915eefcc33cc950de5,2024-11-21T07:58:50.207000 CVE-2023-25632,0,0,808760f2f6c4d721417f965b74b9eea48cc42ae2ea4de7797a4b0e7bded80de1,2024-11-21T07:49:50.993000 CVE-2023-2564,0,0,4de187939fb00ff79844fc4e5c31eb883580172ac533c5aadf04da619fabeaed,2024-11-21T07:58:50.353000 @@ -221048,7 +221048,7 @@ CVE-2023-26076,0,0,e30c665235ca223c424307e1a3ca76b40dd12c9b5c65ef27ce1ef2b364bad CVE-2023-26077,0,0,82651bffd17201218473c387a66287ae68908d2c8c6a570401ca6c223517eea4,2024-11-21T07:50:44.210000 CVE-2023-26078,0,0,c3d7804ef5c232ff215416da75bb0ae90c43cc41842850d8baa070dc2dad30ac,2024-11-21T07:50:44.370000 CVE-2023-2608,0,0,15173476a57029e92a741b7bdf1508ad449142c8f8a5f0a3a32a4f190bbdec6c,2024-11-21T07:58:55.437000 -CVE-2023-26081,0,0,6a7d9a8f097dd763e8850807eac6ad5be0ab4a073e6f569cde29a0246c8fc47e,2024-11-21T07:50:44.520000 +CVE-2023-26081,0,1,bdce83397c7781427c71141a601292fe5ae19c993e887eeff096cae844f6684b,2025-03-18T15:15:45.960000 CVE-2023-26083,0,0,9e1cfa19452e0a7f66e3ae53bb18ed87989dbc5df4ac0c863851de760d7aa1ee,2025-02-03T15:15:15.960000 CVE-2023-26084,0,0,f29ea9908ca76c74e4cf4f4c61c40c0e77064bff3f01fe5bc0cea1825cb8b652,2025-02-27T22:15:35.920000 CVE-2023-26085,0,0,070f82b5ed8cbadfda668dffef030aa493bdfcd59150161180436bf894b27e5a,2024-11-21T07:50:44.987000 @@ -221169,7 +221169,7 @@ CVE-2023-26248,0,0,b659760351371093f79c1b897e56fe4caec1313ebacab2f806c9097a10b6f CVE-2023-26249,0,0,f3f3733086a8c3b5dd815792821b281960869f11e6b598f16566bc8ff10550bf,2025-03-14T19:15:41.807000 CVE-2023-2625,0,0,eb36b8c37d062943c23c5151f0121763fb0f6ecaae620ce31093c00728b2bd63,2024-11-21T07:58:57.377000 CVE-2023-26253,0,0,e6696e2b9b32fb8d0ab603f0ce9241d0e0f01284deb8c00e2afa863c764071a7,2025-03-14T19:15:41.997000 -CVE-2023-26255,0,0,f499c8261bdd8e86fcb212a43a2fc290b42fc7687ed0b6c131b8269f3b3434f1,2024-11-21T07:50:59.180000 +CVE-2023-26255,0,1,85ba356ecbe16d75ff3cc9aad29f97a59f5a57102bed9a061aecc8a629441464,2025-03-18T16:15:19.610000 CVE-2023-26256,0,0,97e3b52044cf66c51e85b21a03e76fc56c1fa497779d84f4109c34f5cc2b3489,2024-11-21T07:50:59.327000 CVE-2023-26257,0,0,651ae83f9b566794a14a3a87e0cadbdea81d8eb5e63fa2a4d16d316ec3fef466,2024-11-21T07:50:59.460000 CVE-2023-26258,0,0,ff9e8234c9784e7a294e94b80683256ffdc02c595f084313493ac6d35cf02eac,2024-11-21T07:50:59.670000 @@ -227739,7 +227739,7 @@ CVE-2023-34398,0,0,f40b1bc8ef7bff37b5c94626349277007b6e71dfd5ec75ad9b0932a8548c5 CVE-2023-34399,0,0,74b2b0691c171ae39f96d97caeb3a894d04d1c3b7d5650834d472fd56796ab54,2025-02-18T18:15:14.933000 CVE-2023-3440,0,0,c3a148f8bda83f5626794fbc68f98a1dc6c64d7bea5c4682462694a567b20fe9,2024-11-21T08:17:16.337000 CVE-2023-34400,0,0,37db130192f08f6dcbb2d615cfc31c4237e0ea5e7fbac9d725832b4d1b0cd355,2025-02-18T18:15:15.043000 -CVE-2023-34401,0,0,d5018bd5403195fa657947b0c47de7be3d14d2e89d1684cc1e15088cbf8cd1d8,2025-02-13T23:15:08.867000 +CVE-2023-34401,0,1,ab81635347d28735eac8d098569dae3fde7ef9c7481f02f774c73c812933749e,2025-03-18T16:15:19.893000 CVE-2023-34402,0,0,24a9d51756ef54ad82e66adff02724a6e51706ca15efbc51e7291ba30bdb2e17,2025-03-14T18:15:26.363000 CVE-2023-34403,0,0,eb37f013c2a5abaddf3384f071dae2c926d61150a4a683b3cec22d34f25f3a2d,2025-02-13T23:15:09.440000 CVE-2023-34404,0,0,07c8cf483499a62ad9c421829ca19bb311da173aa05ab9b5c82f0534ddb106b5,2025-03-17T19:15:20.573000 @@ -229229,7 +229229,7 @@ CVE-2023-36678,0,0,8e2ca3757ab8e217491173421c97f12fc5198222fd34c6f6238eae9d9ed45 CVE-2023-36679,0,0,364644acc22d0c51d3318746b480d85349e4de1efe059885d74d28d9b26b5c51,2025-03-05T20:55:27.583000 CVE-2023-3668,0,0,ee0fc8a117dff3c229840274c7d57f54273ddbff69a341d8dbdb2bd6060e7e7f,2024-11-21T08:17:47.787000 CVE-2023-36680,0,0,b9be5117546aa41ea1b0775680cd0c31aaaddfcf395655d1742c642ab34f3467,2024-12-13T15:15:17.740000 -CVE-2023-36681,0,0,b11a813f807650ef99ed1aeb70071d7ef02b7a8c18f90e2475ff7637b316f608,2024-12-13T15:15:17.880000 +CVE-2023-36681,0,1,ba75c1ed12841cccdd0dc45bcb2d67806bc34ea8ffe85b9ecba1ae7eef612478,2025-03-18T15:29:53.393000 CVE-2023-36682,0,0,a41c33aa328da6abdf6c6c55f258f097063853362c56d55f38e1ba1186fef322,2024-11-21T08:10:21.083000 CVE-2023-36683,0,0,8d83c95d8cd435a69efedd20d6968eda7a232d88890535bea10df8fb4fceac53,2024-11-21T08:10:21.260000 CVE-2023-36684,0,0,f72336fd565671fd468c54e38ccb885b594b1f1fc2f1521ebebd46b276f38303,2024-11-21T08:10:21.443000 @@ -229539,7 +229539,7 @@ CVE-2023-37033,0,0,4d19abd7a4b0679c963f8ae0666794b729ae8b36c669ea355e198e5d10e5d CVE-2023-37034,0,0,fa5a5e09d8d78e10a9175b15b4767670b021a7f2fdabb4036e210e9d3e979a0d,2025-02-18T21:15:18.657000 CVE-2023-37035,0,0,6fd1f0fcf8e0fd7b5fff245ed675e79d0e28b5c9d56b589ad47f9b27426f565f,2025-01-22T15:15:12.017000 CVE-2023-37036,0,0,6121be02129a87ac19af9dbdfa88faf71a80c89697c7eb9824b19b67281e7fe1,2025-02-18T21:15:18.833000 -CVE-2023-37037,0,1,4288177fbb520d26843219d9c7439a4ea638bd90dd89bfc8efaa2edd3b8881c9,2025-03-18T14:15:36.540000 +CVE-2023-37037,0,0,4288177fbb520d26843219d9c7439a4ea638bd90dd89bfc8efaa2edd3b8881c9,2025-03-18T14:15:36.540000 CVE-2023-37038,0,0,5bdea00602f2b8731b2d9fe065f617cd5b02fe40112461fb0ca64d4e532a3476,2025-03-13T20:15:15.297000 CVE-2023-37039,0,0,593095538e0a058f3185841ec48dc68f11660c8bdecf3a52a3448a987f5b7338,2025-03-14T18:15:26.553000 CVE-2023-3704,0,0,f6e670c2d83474f0123d0af7a87775cbeb898fda49a9a2d86b14ac103d673216,2024-11-21T08:17:52.930000 @@ -232046,7 +232046,7 @@ CVE-2023-40104,0,0,b3b514fe5c5c90b3fd96bac202151426665bbebe93179878299d731c6e6b4 CVE-2023-40105,0,0,99fd48612470195f9c737f8096f56e0b77060289b39968dc0daaaa2383cd197e,2024-12-13T21:27:40.283000 CVE-2023-40106,0,0,dd94462a1cc0ecff68b893d4c352cb3561e324fb5a1af15f4a62c1d3f1ffd1ae,2024-12-13T21:20:34.837000 CVE-2023-40107,0,0,cbfd670fe9974a0bf3a935ebb0bae79e008c2a28e1b9f32ec59b9835bda81f23,2024-12-13T21:02:17.693000 -CVE-2023-40108,0,0,b8712b356278dc3803b4cb37d66b8acfaf85a770c1aeaa18096441ed521d6654,2025-02-18T21:15:19.560000 +CVE-2023-40108,0,1,37f467598f03a862009d2e50dc041c31d9f2820abd65cff817b4d9d9f5b77974,2025-03-18T15:15:46.217000 CVE-2023-40109,0,0,e4c3773b4535f894e1bed277d66aa40ca3b1bf83f795fb073a350f209e5bc2e6,2024-12-16T19:34:04.793000 CVE-2023-4011,0,0,77e08656072a7907646eb543cf48d306dfce66e36e2f14dc48363fc6a8adc3bd,2024-11-21T08:34:13.530000 CVE-2023-40110,0,0,1796eb5c3e87a14dd825f784ac43182d16eca1e76a01978818fdb769a3e34ac4,2024-12-13T20:56:22.790000 @@ -234309,7 +234309,7 @@ CVE-2023-42927,0,0,14031071501231274e24e297950a9bf2d187da6694c43ed89fc9fa105221f CVE-2023-42928,0,0,09b31ffbb457522f85f851077716b61a6b3ab014cc929e3d598a183a03cc68c0,2024-12-04T22:34:44.777000 CVE-2023-42929,0,0,22e391c78b0bc708ad36e097e0efa7984486dffc0ca1c4dde9bea2af85485826,2025-01-27T18:15:36.240000 CVE-2023-4293,0,0,9fec83a175e041c854dcb2a5fb9a0694cdd7b06bced71f7469a7fdafb589dbd9,2024-11-21T08:34:47.947000 -CVE-2023-42930,0,1,25d7bd3e87a738a5f8af648624bebea7e0c1dc473f29a8a931720dc503713871,2025-03-18T14:15:37.640000 +CVE-2023-42930,0,0,25d7bd3e87a738a5f8af648624bebea7e0c1dc473f29a8a931720dc503713871,2025-03-18T14:15:37.640000 CVE-2023-42931,0,0,1f1699814f13af297276399444ed2998af062ed9a892f7f5fa3b5215b4d8431f,2024-11-21T08:23:32.337000 CVE-2023-42932,0,0,0fa8aee74d53ff347eeb67002789734567a456a1e02e04a09f94fc7aac778003,2024-11-21T08:23:32.547000 CVE-2023-42933,0,0,19e86fdfeca504e0149a8d635152cff97edbafa25dc596c6f832b0f0e3718e0c,2024-11-21T08:23:32.693000 @@ -237473,7 +237473,7 @@ CVE-2023-47534,0,0,156d1827eb4da96dc3cd2d8629999ea2e2fa724590606a3354fde4b400d38 CVE-2023-47535,0,0,f2482cd2a126c874431de1486430d927e5d2fe9233f7e6e04b7ad66b435fbddd,2025-03-17T23:15:16.877000 CVE-2023-47536,0,0,d84d72a63721689042d4832177b8ed0c4a9d504fac28b204af3cc47b40f30f39,2024-11-21T08:30:24.973000 CVE-2023-47537,0,0,2e59328fe99d373a050967f8884554343bd03b198b96f65b133b83e4d7c66e1c,2024-11-21T08:30:25.100000 -CVE-2023-47539,1,1,54596679236b300e906d331306b91f51f0b380b77c51cf9b8078260a43a824d0,2025-03-18T14:15:37.830000 +CVE-2023-47539,0,0,54596679236b300e906d331306b91f51f0b380b77c51cf9b8078260a43a824d0,2025-03-18T14:15:37.830000 CVE-2023-4754,0,0,0b14f0921b6667a528d8f56fea2f4c9f7f951287cede8fa8335afbbdb458b076,2024-11-21T08:35:54.460000 CVE-2023-47540,0,0,30ad5bce1a8ff12a551ea717bec4c760ac5e6136be380d2d553098d927c9acd4,2024-12-23T14:55:53.860000 CVE-2023-47541,0,0,3da53a23394974b989fe8799af46c85743ab703fa3c735d56b01dc047fc3d5b3,2024-12-23T14:57:00.153000 @@ -240603,7 +240603,7 @@ CVE-2023-51782,0,0,72d4de3298ed402217f500e77fa07d960a42777e53cd023337fcfe85aef1b CVE-2023-51784,0,0,33abdb44f8352bc344ff7190754aa5de7370c2b5a5625474493f212c95eff1eb,2025-02-13T18:15:53.733000 CVE-2023-51785,0,0,5ee9fbe53544d85ed0401e7c29e27cc2aa76495abf17f8988c3adbb017bb44e8,2025-02-13T18:15:53.863000 CVE-2023-51786,0,0,bf09d8f8f63a4e3f6f66005c6beaeb401c697f84374e0c65b239308cd8cc1700,2024-11-21T08:38:48.360000 -CVE-2023-51787,0,0,d004e7bb6b3cdc896868a8f325a8bd59f052bf2665243f98b829ebabc7cdbbed,2024-11-21T08:38:48.577000 +CVE-2023-51787,0,1,5f8d2c782dc788eee813e2402dfc152dffd31830ff89bb95262b37f03302844c,2025-03-18T15:15:46.463000 CVE-2023-5179,0,0,61058694efce3a9e55af6e46169562fc6182f98fba78c8e491ae3a650293c88a,2024-11-21T08:41:14.720000 CVE-2023-51790,0,0,a13b0c105e48a1a5b054d117a534fd4b2227bbeed075d8bc49d0275385a6a9e7,2024-11-21T08:38:48.780000 CVE-2023-51791,0,0,9a6e5760c598d28ed4df3a899528f346222833d0ffd0fbdebe747dca9fff247d,2024-11-21T08:38:48.937000 @@ -242379,7 +242379,7 @@ CVE-2023-6119,0,0,f907bdfebbfcac37637f5c8bdb63b2f5c6c4dcb0567ca3ec448b07963d811c CVE-2023-6120,0,0,da84340d1c5dfa32167b534b8b7cc767f6e28717b2b703f6ed27762f28f6e541,2025-02-20T18:34:50.990000 CVE-2023-6121,0,0,c1ffe3d1aca9c6ce7e9c8405bfa8c025c65f623b025bd65fed74c641e61f3c45,2024-11-21T08:43:10.460000 CVE-2023-6122,0,0,cab51e4f436a377319b9fdff95c2df46c82a130498ea39695665da328e66a6c8,2024-11-21T08:43:10.613000 -CVE-2023-6123,0,0,945d422ef5d56b423c8873dcf7c6ff717fe04de4fcc4bdaed30db49145443830,2024-12-18T17:32:47.300000 +CVE-2023-6123,0,1,82b28fbc02f605beb981cd53790a759652f77f9acf75528425ca7c8961b171ba,2025-03-18T15:15:46.680000 CVE-2023-6124,0,0,7c994a2fe4bb1e6dad4c17d36b2e47bd93e8d6a113b8f70751a8c56f8fc1029e,2024-11-21T08:43:10.837000 CVE-2023-6125,0,0,a761c0dfb9ffc3549e483f5835a7159db54019d62d11910f18c29bca723980f1,2024-11-21T08:43:10.980000 CVE-2023-6126,0,0,6dcf018542395777a28e8c127f562c94fd085ac705c5c329bd9ca1fc493c256c,2024-11-21T08:43:11.120000 @@ -244076,7 +244076,7 @@ CVE-2024-0705,0,0,5bf931a358cabda70b8b80f0cb82ca3341575ecda7a2685b6d892e9aebe15f CVE-2024-0706,0,0,77978e4e5459e5e9a74b58592083f13d9c5f468e05545e3a44b0c3b410a1e880,2024-01-22T15:15:08.897000 CVE-2024-0707,0,0,fcf403d9ff56bef4fb475ee45959dbfdd518eec562f26009cde0ceb893d5b681,2024-02-13T14:15:46.257000 CVE-2024-0708,0,0,99f969c0256cb15caa7d3ca3c67ae36f42fd0d56584b2b660445689d164da9da,2025-01-23T17:18:47.150000 -CVE-2024-0709,0,0,c440ff22fac5f3ac83986744aa7d20bd186117b6768b11c249e63468532d8958,2024-11-21T08:47:11.277000 +CVE-2024-0709,0,1,c868760244b81d9a90892519cf3d0b1ab7736324bed2231f773772ffcd0f7425,2025-03-18T15:33:26.187000 CVE-2024-0710,0,0,d836842b98bf8671a459bec581da23498bfa6d1b541242c4c5e777994ead2568,2024-11-21T08:47:11.403000 CVE-2024-0711,0,0,9a865d4175fd4a2b0f4fd543a5f08381777cc42c895e286890d791cfe74837bc,2024-11-21T08:47:11.560000 CVE-2024-0712,0,0,5dd4c3122731abb7d7ee3446b47e86ad69bb5bb758d4fe45a8a23b6bb811dd0d,2024-11-21T08:47:11.740000 @@ -245692,7 +245692,7 @@ CVE-2024-11477,0,0,586a2ebce80575ccd11b918994aeff6e6ed77d12ff6932b404f28ef9b1ace CVE-2024-11479,0,0,64cd37c11d69fb554cc4a2f6927969c2e71d06afe5cee0b82bc8d31b56a78bb5,2024-12-04T01:15:04.650000 CVE-2024-1148,0,0,42f8b4a331499e416da7e39ecb917cc148de70355c01e7459a0ecc809b95c273,2024-11-21T08:49:54.507000 CVE-2024-11481,0,0,43aefde0b60b7bb2c03e6e9073efa36888743c80ea5c30a176dc892fe3500a31,2024-11-29T08:15:04.270000 -CVE-2024-11482,0,0,4a494a040c0c12a4aaccef44b799c17acca5321d5d56618a638640183e9fb1c6,2024-11-29T08:15:04.437000 +CVE-2024-11482,0,1,5e7a4736fb5a2549e2b814b0458c14399e7834537ea698f0508e85a3f4e817fa,2025-03-18T15:15:46.897000 CVE-2024-11483,0,0,32b38db9518e8939d03a454ab14c476cd7f841536222995cb659679bfca30e6e,2024-12-18T04:15:07.210000 CVE-2024-11484,0,0,6d511a2f14fa9305d0bed2d13714e44bc5ef166aa5f282cff940fc24297d1bb9,2024-11-23T01:07:09.537000 CVE-2024-11485,0,0,706658d9aa6d2788ae1cff8275e450660f7556b8da3e80cf0e36a3a63248966b,2024-11-23T01:12:38.790000 @@ -249325,7 +249325,7 @@ CVE-2024-20923,0,0,d70477733a2ec2c69cc712af23ef63d26c10c96a6f097f00cabb198e91563 CVE-2024-20924,0,0,6696eb44649258a777624d23cb49fa99280b9707737aa5d67f5a22ba698986fd,2024-11-21T08:53:26.553000 CVE-2024-20925,0,0,ba37362cfed4e51f97ffa3fae9a5064e0b5685eb36d0a58b66b59b0d265aa5a1,2024-12-09T16:44:10.737000 CVE-2024-20926,0,0,76d4246dcda29824b0116625013c1c020b190258900cddbc68d057b4e3a565fe,2024-11-21T08:53:26.797000 -CVE-2024-20927,0,0,ddf59e8a68cb7014e1b6bfedf238ed234eb1e9f6713dbc0a4d42888633b19bd6,2024-11-29T14:08:26.950000 +CVE-2024-20927,0,1,9eb3a711432f92a63e5ccdb707a5a061985ee7ad4c9995c5c357dd6c26563ee3,2025-03-18T16:15:20.147000 CVE-2024-20928,0,0,f899f7f661fec3b37d33a9edf522b5c93f56abf2b9527ffe59b04e93771f608e,2024-11-21T08:53:27.050000 CVE-2024-20929,0,0,ef1e1961b7cfe3a171a2aa1bea736416b0c195604434ce728f35b9885910d984,2025-03-13T20:15:16.907000 CVE-2024-2093,0,0,a987f3cd769933540e0ca2c1e6014986bdfcabf3a28322dfa4b62e2bc8dfbe60,2024-11-21T09:09:01.800000 @@ -249340,7 +249340,7 @@ CVE-2024-20937,0,0,9f7a5f5a131093c9b119dbd0de8a4ddc6a0c065a2d2291ce3b1d58ce46223 CVE-2024-20938,0,0,6fe21b52aad41d5c17bb42ae4439eea9ca26609905457e042a739e5c570e5ae2,2024-11-21T08:53:28.290000 CVE-2024-20939,0,0,a61ef26bf2d0edb06b899a122ed306c452492ece485364c57e14dc58ca287a91,2024-11-29T14:08:10.783000 CVE-2024-20940,0,0,2eef388a674fa50646c1a9e94e9cc85f45f15970a44431d112399a9bcd04b4bd,2024-11-21T08:53:28.510000 -CVE-2024-20941,0,1,979ab879e23ba3c79bea46ae3f7a52ecf257a8180aebfc1872017418c29dd488,2025-03-18T14:15:37.983000 +CVE-2024-20941,0,0,979ab879e23ba3c79bea46ae3f7a52ecf257a8180aebfc1872017418c29dd488,2025-03-18T14:15:37.983000 CVE-2024-20942,0,0,2598677f0c454ed9ee0ba0704705d6276c039cbd72f273ab754a1b849ce636d5,2024-11-21T08:53:28.740000 CVE-2024-20943,0,0,0335ec4dd85ba21cfc62e7df0256bca3d058de7a66f986149db911f3e2f03ed7,2024-11-21T08:53:28.860000 CVE-2024-20944,0,0,431d40edb070cddbf02cbf85d009e07a3054fa640a623707fd6570608afaa9bf,2024-11-21T08:53:28.977000 @@ -249406,7 +249406,7 @@ CVE-2024-21002,0,0,acbcf2b77c5e9aef3c722c2851e5b55c9dbc45865ecee4cd7c315b1686d44 CVE-2024-21003,0,0,61517b1cf73c303164e97ec6f34757993637c9bbb91278457c17d933433e1681,2024-12-06T20:23:18.453000 CVE-2024-21004,0,0,7fc1f91c1bfcf63662bc83c23399306d3dcf14dd0f0e2da4987f97b55b71f163,2024-11-21T08:53:36.080000 CVE-2024-21005,0,0,57eb5426cdfea629d7918a5a66963363eb4d5c32ff1ca799fec374e8db3a8831,2024-12-05T21:52:13.690000 -CVE-2024-21006,0,0,763fa0e501646e3a8ddbcc45188b5773348d83ad9bb4b391996a6942519d1956,2024-11-27T16:36:05.623000 +CVE-2024-21006,0,1,e680337bc522caa1c873fb9afc9e522b974b790440ed68af198ab7fd75f19753,2025-03-18T15:15:47.150000 CVE-2024-21007,0,0,19d4839f8c0c4494be18be45f38a468212164a7bf22822a55cd6a6c1093f0744,2024-11-21T08:53:36.427000 CVE-2024-21008,0,0,11376e5194909d0d610f42d3afb489a3fd0d27f60a2c196da2976927ecc2cb39,2024-11-27T16:35:56.737000 CVE-2024-21009,0,0,af812c5e8a84169cfec251c1e067fa25e23db6feadfa3217596d3dc669751ab0,2024-11-27T16:35:46.023000 @@ -249458,7 +249458,7 @@ CVE-2024-21051,0,0,23f02eeb9f79fba574c025f41dadca98c0a9f0858b1a36b6f1546859b7c7b CVE-2024-21052,0,0,e3949841d9fa67edbdcab968c6ac42d301424c98f18703ad9fe9bea56c30002d,2024-12-03T17:15:08.950000 CVE-2024-21053,0,0,d41b295f1ccebf3eabcd07ef67324b35c96dcc8803a0f4ea88c3a1a6eaa33594,2024-11-21T08:53:41.723000 CVE-2024-21054,0,0,2e66f504052ab83f4e6a4e00bad58d6f7a9f7bfe8d5e3773fc8c106145e685cc,2024-11-21T08:53:41.840000 -CVE-2024-21055,0,0,d51ca5cc505201d164d1528cb69101ce925d2b8d1d74991bb83d4df9cb627779,2024-12-06T16:46:49.543000 +CVE-2024-21055,0,1,a95b7afe917900e71242e21db993c7eddd44d8ce48d8742f5399a7a7d1111b87,2025-03-18T16:15:20.353000 CVE-2024-21056,0,0,b3cd8883597d5b020b20843f644dd494e35df9dc3ebaf9876d8f8890e4200173,2024-12-06T16:37:56.173000 CVE-2024-21057,0,0,9156a0c0270c19c6134ff85d4642bca9c805b497ad32521cb29e5544a82a8ffe,2024-11-21T08:53:42.223000 CVE-2024-21058,0,0,6f275eaeb7b9391d2cc7e42353c58a7a5acdfd132d12496c0283d23778c3ba70,2024-11-21T08:53:42.340000 @@ -249522,7 +249522,7 @@ CVE-2024-2111,0,0,e7b737ad21498d72afeac55573741ec14d270cbe6717a3805c824181bcb9c5 CVE-2024-21110,0,0,5de512fcaa05c997e9352f53e43d504fb84e931f43c53c58b30d52517f92662b,2024-11-21T08:53:48.270000 CVE-2024-21111,0,0,ce04902122edd823f80a1fc79ecddd6498bfae611dda514cff0b08c3d5f73631,2024-12-05T15:16:10.643000 CVE-2024-21112,0,0,5f9a410d7e29e43b4a2df72469fe4323aca9f75837d3af964d48ebb5bcf4f6d9,2024-12-05T15:16:13.397000 -CVE-2024-21113,0,1,411587dffbfe770d177d8c0883d861ddd2f2043ed8343ef383b6912343263223,2025-03-18T14:15:38.140000 +CVE-2024-21113,0,0,411587dffbfe770d177d8c0883d861ddd2f2043ed8343ef383b6912343263223,2025-03-18T14:15:38.140000 CVE-2024-21114,0,0,07d8f756ac7ff4cb872f6c813a5a0d19c87016a2d3ef9a6dfa1d48896f6845b9,2024-11-21T08:53:48.723000 CVE-2024-21115,0,0,c8b5f110fee1084e3e4bbd02d3f1664b03293a1da68e5246ef4334e81776ca1c,2024-12-05T15:16:18.327000 CVE-2024-21116,0,0,37f57d56f4a480d238dbb22920cc5d24d95c2d6d67c36c3cddb7272c00327923,2024-12-05T15:16:20.707000 @@ -249553,7 +249553,7 @@ CVE-2024-21139,0,0,7f0885ed1752480a56d0d9343c5a8f780bac7c8a0ef57214cf469974f9ddd CVE-2024-2114,0,0,081a54e9ddc78ce4f436645892623548d1d04046abcae7e4f72c9961c208a850,2025-02-11T02:15:34.273000 CVE-2024-21140,0,0,4fdaeb1891358aed188cb510ef7acbfb67415e1764463a9604f6defe2a5b3e6e,2024-11-21T08:53:51.750000 CVE-2024-21141,0,0,2e1f4e3c12308092ab9f995d82e1ee32a9767df2d02e1ab56e654fbae48b6c02,2024-11-21T08:53:51.873000 -CVE-2024-21142,0,0,3bfa393e4ae1c998028c737a54acd7a5ba332dbb81efd8b2ee0ceaa1c8bded31,2024-11-21T08:53:51.993000 +CVE-2024-21142,0,1,53d3420ca8b3f2d2c47ae6b44acc3a6c8a647acd9c0347c0fce17aa3250ed344,2025-03-18T15:15:47.363000 CVE-2024-21143,0,0,93f983a28b3a2913f32b00f983906e9910e4b04aeb1a7a115a7b9505029b4666,2025-03-17T17:15:23.687000 CVE-2024-21144,0,0,80772246190c6786f238a3c4afbf41453e2add993bd948cb2907f0a5b4a17597,2024-12-16T20:13:40.827000 CVE-2024-21145,0,0,1ee954c2c32adc46d037a901264cb96b8363bfe311ba0a927c500e6f55effa80,2025-03-13T14:15:20.360000 @@ -249599,7 +249599,7 @@ CVE-2024-21181,0,0,a60f1b0e57b0cd3e44233d07de0594e8054f38610c0cce1881bc557cb4ea1 CVE-2024-21182,0,0,c0ef1551cd608efb9923a47e75483009646ac3591abed59e9ff2ad6e0cf43351,2024-11-21T08:53:56.667000 CVE-2024-21183,0,0,6249aa34dbb044e4f1eeff67db072798ecf143f18be834837f923e4eb3cce632,2024-11-21T08:53:56.780000 CVE-2024-21184,0,0,24425051df8220a39947a0a66cdd1a885e3fbd92924397baafaea753a30c1053,2024-11-21T08:53:56.900000 -CVE-2024-21185,0,0,322e492a363d80839a416218ebaaf63962844f1490c5dc26725ce1aefc6cb0a6,2024-11-21T08:53:57.030000 +CVE-2024-21185,0,1,d11b8472760cc1a71cdf615720512123ec90591d3b9a4789f2cd9eb70aea98ef,2025-03-18T16:15:20.577000 CVE-2024-21188,0,0,b867f787163ea0fc535229c913fa94918dbe07ee8e34eb83d23b693ac18ed7bb,2025-03-13T20:15:17.120000 CVE-2024-2119,0,0,0e5cc1c9dd926d4499d6722610e1dd5191fc5a94193ad958a551a0513230377a,2024-11-21T09:09:04.220000 CVE-2024-21190,0,0,067115da684342313c53c40fbb4155dbe1e2ef8e94d9c572ccc357157b5ace0e,2024-10-18T18:56:42.630000 @@ -250153,7 +250153,7 @@ CVE-2024-21757,0,0,2977bcabeb1633cac10a5d2b68ce6f1b718f97760675ba593569c66c881c2 CVE-2024-21758,0,0,ad55d9c19835721bfd9ae203af7dd8f725eb80a82daed984b63908fd7c66e709,2025-02-18T22:15:10.317000 CVE-2024-21759,0,0,c7b87faa73119d13eeff29f1fcc441192710ec05905507e64f7a792b951b9ab6,2024-11-21T08:54:57.347000 CVE-2024-2176,0,0,1aeee7ae52b7f70f1b987c126ac25fd385f727623c97d4e6f5fec3aa0f1aa936,2024-12-19T20:23:37.707000 -CVE-2024-21760,1,1,5bf0812dffd441322935e13797b30b53547dc7e04046b1be46dc81bb07bb7a33,2025-03-18T14:15:38.297000 +CVE-2024-21760,0,0,5bf0812dffd441322935e13797b30b53547dc7e04046b1be46dc81bb07bb7a33,2025-03-18T14:15:38.297000 CVE-2024-21761,0,0,82642bae2920dd7ff8b514e57bc1c1f5d6d71d9ec15a1b10f21b90ef60b69c46,2024-11-21T08:54:57.477000 CVE-2024-21762,0,0,46f8e56aa266e45cbb4ef8c12ef0ba4149aa340cd2149bb68f1bc655d5d263af,2024-11-29T15:23:32.167000 CVE-2024-21763,0,0,5aa1c67876a3611f6d45b29da83d05776ea7bdb28478c851cf0e3e3d1d0a0b00,2024-12-12T19:12:18.580000 @@ -250809,7 +250809,7 @@ CVE-2024-2252,0,0,f8b57c312f6f19268d4bca869e740a5fbb6730c139364507b27b9b965c25ea CVE-2024-22520,0,0,4ecf73bd6016d922ba8ef18264df5f5d1f20d231962fb990f30db04c87007cdd,2024-11-21T08:56:23.890000 CVE-2024-22523,0,0,6e5964ba2742903a94d6ed6e7d813b2cb962e78d9d72ebf5a21537964e4c33d8,2024-11-21T08:56:24.053000 CVE-2024-22524,0,0,5e8c8b8781d382aa9b0ca8659ecdc6cede8fd32e37d6b6765507f3668082e44e,2024-11-21T08:56:24.203000 -CVE-2024-22525,0,0,bc0f90b3b68e92e6f25c4e9415509d83bc93ee6461f7e0be9a27e235dc49edbb,2024-11-21T08:56:24.373000 +CVE-2024-22525,0,1,648e518c38d5bf43c132d3a4d8a8ea349898dca3d1c6692489faad9d15749e02,2025-03-18T16:15:20.850000 CVE-2024-22526,0,0,be0cd17245feb37010512e9e801fc3cf88fa259a228b2653acad22a5e1382569,2024-11-21T08:56:24.543000 CVE-2024-22529,0,0,b7de2a86923a330de5341c28dc3bd65e868ea4c1ee03bdb9090fc1322f705131,2024-11-21T08:56:24.773000 CVE-2024-2253,0,0,fcaa54d611112bbef2bb576728350004bcfdf9fe077edec443da7f473b69b277,2024-11-21T09:09:21.307000 @@ -251644,7 +251644,7 @@ CVE-2024-23733,0,0,f4aa8b2d2d18abc3ab75dc7b02b9b7a0f2289a6c83a9beb9f81d507a94fe5 CVE-2024-23734,0,0,e4ddb2b19ccaa4d5343dd0940d5cbfc02d0f7d5628e66b95b253e5d425ded40f,2024-11-21T08:58:16.280000 CVE-2024-23735,0,0,f1b3fd73c171e2471b0b8d6a13ee761a7d0601e34a52453fccbb77a2a9d3d13c,2024-12-04T21:15:21.980000 CVE-2024-23736,0,0,79df2399a819d34fa678176aa1fa937f65e00863f268b4896e44d2087292cada,2024-11-21T08:58:16.690000 -CVE-2024-23737,0,0,128ce7eb888b1f2ab89a87e502492380877e5f8862f4ee0596fcf966c4d1e5c7,2024-11-21T08:58:16.923000 +CVE-2024-23737,0,1,540efa9ee00efd37944f43ad1656f3b195cf720184caf65cc0e057840cf72c9f,2025-03-18T15:15:47.677000 CVE-2024-23738,0,0,194fa187167961d4a7ea8823665a156c16bef0fdb38b3bf079adecd3590504b6,2024-11-21T08:58:17.097000 CVE-2024-23739,0,0,8ed4b7d4529f6717d8856144f1353e525864063b2736752b03db5ff8c1f20576,2024-11-21T08:58:17.270000 CVE-2024-23740,0,0,34beda3e54cd0978fcac14899c36aafe18c35149b64bd9e4b15991be337be9af,2024-11-21T08:58:17.447000 @@ -251687,7 +251687,7 @@ CVE-2024-23782,0,0,c911c68bede1e979645b4c4cd33b7976d93900d1c38c4a770496a15f35fa8 CVE-2024-23783,0,0,3fa853eaf8b1055bdba72d2ea33e9c04fa8b0c3f0b50310fa2ab86ce2a523288,2024-11-21T08:58:23.570000 CVE-2024-23784,0,0,fbb08b4f0a06140ba3336bcd5ca10e9f46eba5802513fb502c644b9cd1ce9f5c,2024-11-21T08:58:23.717000 CVE-2024-23785,0,0,69098fe97dc1e2e17c091ef031f069829d6e9d34880e18423c024bf6d8297afb,2024-11-21T08:58:23.857000 -CVE-2024-23786,0,1,9b17729227428fd4f10a45c71207334db1786e3f72acd0de4b6b69c1fed63828,2025-03-18T14:15:38.450000 +CVE-2024-23786,0,0,9b17729227428fd4f10a45c71207334db1786e3f72acd0de4b6b69c1fed63828,2025-03-18T14:15:38.450000 CVE-2024-23787,0,0,029004547be72f5abdeaa1081c2db892ce33ae9fa873b72d24ff48254b202124,2024-11-25T18:54:34.530000 CVE-2024-23788,0,0,6560a1aa3a129015b4a3affeba177920091f2bc65e89a77b92a05faa90249853,2024-12-13T17:32:04.810000 CVE-2024-23789,0,0,bfb78a7de0bc7e7925bb84311505f5172d598e532ae0da2c006f3536a9f5dacf,2024-11-21T08:58:25.217000 @@ -253023,7 +253023,7 @@ CVE-2024-25729,0,0,3db67ab23a258a05979984a126775ad307c38690f174be37fd98d41efab85 CVE-2024-2573,0,0,b79b1180561c3a7fd205d80040573866ef52299a8fb246485f49ef358e1ae1de,2025-02-20T18:12:59.823000 CVE-2024-25730,0,0,85e063f99da70c01b1b3a3bbfc7f4b413bf752190780e969335d19a636e3425c,2024-11-21T09:01:17.477000 CVE-2024-25731,0,0,eee350625417e2d99d9a5fac4376db7df6a5f301846fa6119b95e4cdeee2402f,2025-02-26T16:46:02.700000 -CVE-2024-25734,0,0,3574c01447c22483c86f66e396d575e7bf7b614a6b4ebe187ebdc4c9a17dcf82,2024-11-21T09:01:17.837000 +CVE-2024-25734,0,1,527e447a884a88a64384bec0a173ecf9ef880b10e8ed79a82efc55a8a4a49418,2025-03-18T15:15:47.980000 CVE-2024-25735,0,0,9fdea3ad6de7f4f83bd747335b88ba4bc80cbb63cb46a203f3f828d80e36aca1,2024-11-21T09:01:17.970000 CVE-2024-25736,0,0,831650ee2b289fa09d115f05113a0521c5f85fe00e3f4a57b362a744d6e20323,2024-11-21T09:01:18.197000 CVE-2024-25737,0,0,4bf6de89cebe09aa2368df8de50a16d59403650b4e336a34b7d2536eee9a53ba,2024-11-21T09:01:18.417000 @@ -253811,12 +253811,12 @@ CVE-2024-26742,0,0,97fe5254fde21c5c42c0b34b715d464fd3f3a8c67ae978db2d115a5ad87be CVE-2024-26743,0,0,3ab52901b4f3295b59ffce3d32c81c40e12919de468adcccba2335902ceca63d,2025-03-17T15:44:46.180000 CVE-2024-26744,0,0,726af10ee1f156ef71f781f51f99bc1a73a1bd929743db54f0e9c55c799e21a8,2024-11-21T09:02:58.190000 CVE-2024-26745,0,0,b947ea109848474d6dfda2fbe16d216499111dccdd8dcd26899f1b894b9ea211,2024-11-21T09:02:58.403000 -CVE-2024-26746,0,0,86aa0528dca44c4fb5b6b5072954273d7d042341aa7f2115eafd32b46402ba28,2024-11-21T09:02:58.613000 +CVE-2024-26746,0,1,4e73ce7316452082e5a175700bbc863b03d4f10de6dba9a206faee8051759a4b,2025-03-18T16:45:08.557000 CVE-2024-26747,0,0,323d7942a2bf93956c96ff7aa8e4bf36497c276d5a0d7fc71fdc942c53c206ca,2024-11-21T09:02:58.743000 CVE-2024-26748,0,0,de80e1b40a25ded51f067fff844d8e2ac1ed0e390911ce7796a7ad960020e65b,2025-01-14T17:27:49.057000 CVE-2024-26749,0,0,aa7e7096104dbac75ed8cd854b66b0ce094be82817161ad941c47ae83e7cde08,2025-01-14T17:28:07.793000 CVE-2024-2675,0,0,a432f663f36093d2797dff29d97cb824a0923a29fe5d01cf99dea2b13534d1ca,2025-02-21T15:52:43.843000 -CVE-2024-26750,0,0,94dd61c3c28ff5b4b8be06dbb38fde205c5b9d50e1d14542fa5032faf9ddf704,2024-11-21T09:02:59.203000 +CVE-2024-26750,0,1,6fdc360273be1748eb3931071e974ddb183de2c06e29915c07252375db874884,2025-03-18T16:49:59.607000 CVE-2024-26751,0,0,2b857b3fa9b45ad36c14e1b8198bd7fed9f385dbc0df9988b27d23100a873fff,2025-03-17T16:57:25.003000 CVE-2024-26752,0,0,608ccfb4d7a8b8693d3731112e07e20428505e38a79f4c705a81d2d2794e1ed5,2025-03-17T16:57:11.283000 CVE-2024-26753,0,0,54bc9dc40e514e7212847ab36dae49d8dc3504887ffcc5dcbb1e839b6fcecf7b,2025-02-27T22:00:28.967000 @@ -253829,10 +253829,10 @@ CVE-2024-26759,0,0,4149d7c7033643511b1f9d0e90b6322498fff207ba3a277aedae496842f0c CVE-2024-2676,0,0,909464e30d2c10e8a9af079a102bd07a257c9534a32f512f1c3ed8618aa3e4c5,2025-02-21T16:06:24.990000 CVE-2024-26760,0,0,d446397ffceb7399af2d0770a591678d71834fbac6c4a5c29ba8551476b58a48,2025-03-03T17:34:59.137000 CVE-2024-26761,0,0,4a545fec9e70200014ce002ad7185549210023d8d2a1c4be74546ce8aaebf60d,2025-03-17T16:56:39.690000 -CVE-2024-26762,0,0,a287f1e9fd29a626fe10dbe6954ee97461b04e8a4deb899f82974d34c52e8f61,2024-11-21T09:03:00.880000 -CVE-2024-26763,0,0,ea60cb10ec181dc23fe842240e1437c7c10aef932cbc953d9703f81ca6ffe278,2024-11-21T09:03:00.980000 -CVE-2024-26764,0,0,182584c1b22dec918cc3c58a7bf9ff6e42e4473d6f7b976355d13ff4ba65cc27,2024-11-21T09:03:01.100000 -CVE-2024-26765,0,0,86639deee47c82199c185bbb9e529948404a232a3b8d78621e9c695bf46ea544,2024-11-21T09:03:01.213000 +CVE-2024-26762,0,1,6ae9c06935cf4f7d080aabde82c11884356d4acc431ceab9a2ea60870f5dd357,2025-03-18T16:13:33.843000 +CVE-2024-26763,0,1,abf5c36c298c7062b9d6afdbf8d4a5937208e3749af8ebb6841bb25903c94c26,2025-03-18T16:40:18.300000 +CVE-2024-26764,0,1,a9a5f6f39678f71d7f03e7c3a20c8e40d0ebb254dcb02bfd9af8c747760aa0ab,2025-03-18T16:36:22.457000 +CVE-2024-26765,0,1,9e540ea8f4d1d00edbbf8773d21c68fcb08ac8321c60ba6e6ed837063cdab015,2025-03-18T16:43:01.350000 CVE-2024-26766,0,0,5b0b0547d260200bc4ebc2eb81fed548f6a4648d11b21f4f25bbac67d8fa40eb,2025-02-27T22:00:45.430000 CVE-2024-26767,0,0,5772b82c429246618f54341350bcba6909fc1b320104e1434b760823236efcdb,2025-03-07T18:15:40.147000 CVE-2024-26768,0,0,6fafd2ec3e7cdf9346d5cf413e5e98785829ef156a7452d7bcbd56c557bb4b27,2024-11-21T09:03:01.570000 @@ -253841,7 +253841,7 @@ CVE-2024-2677,0,0,6a44ca783f96afdf6daeb2ac346e3e6dbf371bf3fa88ba024936355e01095f CVE-2024-26770,0,0,8d08eaa70a2e2e3d40574f2b704a77374cb9e6669a6ba5b5bad3773130c490ac,2025-01-27T14:58:19.130000 CVE-2024-26771,0,0,5e3318a5219a1562a00396de2c61a0fa558f01729e9603c0306f834212e0432f,2025-01-27T14:59:26.887000 CVE-2024-26772,0,0,fe8524e99fc68d449508f3ebfd8f6afb4c482f632501c09f5f84e454baa54b83,2024-11-21T09:03:02.190000 -CVE-2024-26773,0,0,7ef5aed49abdb8b41013d862bea1395e73f0e319d07ad740410642ca0777300e,2024-11-21T09:03:02.380000 +CVE-2024-26773,0,1,1d4a42bde597efed855450dd0aa8a8e904f698a7797b2eeeaff9bc97aa6ee818,2025-03-18T16:47:14.460000 CVE-2024-26774,0,0,1356b93fc761b0852a7c80176290616f9269a68e3fa4bb6d27677f517a92f70a,2025-02-27T14:37:32.300000 CVE-2024-26775,0,0,285e0acd81a3ae287fc503b023988af78322228ca5a120edc7cd1b3b8dae3d03,2025-01-07T17:29:01.727000 CVE-2024-26776,0,0,1bba81b8a8e72ec7c95ffb5d3e7b333d1413cd97a166084740a9af418cac677d,2025-02-27T14:37:18.470000 @@ -253849,10 +253849,10 @@ CVE-2024-26777,0,0,daa8d9f58a531907703c73a4675a28b328f6bf2537032c88b428620832a46 CVE-2024-26778,0,0,c128e84a577d26a64c1849f152170f9fd9186f967e7aa9c52b800d540182886f,2025-02-27T14:36:27.373000 CVE-2024-26779,0,0,d1dc3ab9d0793413ef8d6f7d472f6b251827d39f169d2e3624611da23e742948,2024-11-21T09:03:03.160000 CVE-2024-2678,0,0,1b8569b660baa62f28f36408544cf75e14fd1bbcb0868691da73c3b9150b92e8,2025-02-21T16:19:14.340000 -CVE-2024-26780,0,0,fee0ab2d14222179966bcf01d07c058d2d30ea8f43041aa94eb3ef9c96c6dd91,2024-11-21T09:03:03.370000 +CVE-2024-26780,0,1,a462a7ae5db36bf841edbc60dcf47f57865a887078f425fb3cbfb5e01765e9ba,2025-03-18T16:52:16.970000 CVE-2024-26781,0,0,8363890f5e40c49be0f36bf4bb23c5384620993df3f14b874ae1a4280c959004,2025-01-07T17:11:31.483000 CVE-2024-26782,0,0,55ed570f6e1cef5c54e218da555ee7a45ff77501097bebd5d3acda607a85eb10,2025-01-10T17:44:44.130000 -CVE-2024-26783,0,0,4c88f8a469d8e3fbcff9fc3b4ec47ce374be17421d39b0d3da1148c684918fac,2024-11-21T09:03:03.733000 +CVE-2024-26783,0,1,f682acf18dce3fa63c06899cfa9f12237f55c3a339426cd32d2639a18b998095,2025-03-18T16:53:41.060000 CVE-2024-26784,0,0,5821b81a5ef90036edef0036b32f90e3136a3fea2205d46ae75dbe8e20d91a20,2024-12-20T13:57:21.897000 CVE-2024-26785,0,0,fd8b0c8fbbf5be6442564966d80fad9e8c7c55937393b4a4181ec0d2ac84e9bd,2024-11-21T09:03:03.967000 CVE-2024-26786,0,0,3691d992d2ccdcf6ccdab7196cd4e2adf94f7ee23904744966f3cd487959c25f,2024-11-21T09:03:04.153000 @@ -254482,7 +254482,7 @@ CVE-2024-27379,0,0,3cd7a3bc568502beed867940be9efaab8a2476bbffd4d9c34135b745bfc52 CVE-2024-2738,0,0,93b58d0b4b0867809b18d6b9219831b6a83c9f9bc044abfa6d93410bae4df006,2025-02-13T17:01:33.040000 CVE-2024-27380,0,0,fd67f29d4e726d7274d19c0bcf4177f4144236ebf19de60c64cc3610d19682c7,2024-11-21T09:04:29.500000 CVE-2024-27381,0,0,ed20d9c6d93f1b4012848624f333ea949a091c4c85f8d560821c7e4155fa2e90,2025-03-13T19:15:43.400000 -CVE-2024-27382,0,0,707f41c0c38fdff19534efd7998b66186ca0c9cb742581a2c484f59be8fbb318,2024-11-21T09:04:29.837000 +CVE-2024-27382,0,1,441689058eb68e0538a8b198f737ed081cfc1f8e088f83163410e402ce6a5dd0,2025-03-18T16:15:21.107000 CVE-2024-27383,0,0,72e70359f0f73aeb1e6b8c0368d83827211bcfc295c5402bfd5cfdee6cfd7908,2024-09-11T15:25:24.303000 CVE-2024-27385,0,0,e1a41ce9dd72dcc7e74fb02b5b7a34d75ee1fd10edb45ea10c35a3afe68bad13,2024-11-21T09:04:30.110000 CVE-2024-27386,0,0,1b64d665730a7687a332bebc6b1e44f0548d458eb827204a2ee1cc939a731c55,2024-11-21T09:04:30.280000 @@ -254885,7 +254885,7 @@ CVE-2024-2795,0,0,cbb3083cd20608539cd31cee2da48aa63acf65d8b787a018dc03ebe3f26d6f CVE-2024-27950,0,0,53da77641072875e4be7a331920e4e65f0eff4f0d2cd1d57778fc38818e7c955,2024-11-21T09:05:29.223000 CVE-2024-27951,0,0,4d2ba26a6032e03de2aff525cd262e98565b7fc7badd9cb2f91868dd9835e904,2025-02-07T16:59:17.713000 CVE-2024-27952,0,0,751dabf6626a70900a15dc7860b75fb42752dc8fc505629059435a1fdee508ea,2025-03-18T11:07:04.300000 -CVE-2024-27953,0,0,c5d16c193543fca46282ab3c8cd23ba2c5868bd65b0e219f002c47b9928a9bbd,2024-11-21T09:05:29.663000 +CVE-2024-27953,0,1,129b8054db86d743e283e23817840c2be51e9599ad7c6daf77d4372d9f4f1131,2025-03-18T15:20:11.773000 CVE-2024-27954,0,0,868051cf140aca79ae18199226f95ebe38588b4710d77e4adca2895e0f6050b2,2024-11-21T09:05:29.807000 CVE-2024-27955,0,0,68f1b654e856ea89e2c3920d06b20f4b15b70ed46da32e67660258ac4409cc1b,2024-11-21T09:05:29.957000 CVE-2024-27956,0,0,5f7c522e54cc183f07e307bbcc5b53d49dbc65761e89d366db3002d9ea2e4434,2025-02-14T15:54:46.810000 @@ -254997,7 +254997,7 @@ CVE-2024-28065,0,0,29c965c618b196a2a981aebc47585c814c9fb99e0a8627060db88187d466b CVE-2024-28066,0,0,d0dd8700e3d67194ced6e44b8a1aa15edc2e5058e4dc671b0d3ef7a28fb38999,2024-11-21T09:05:44.270000 CVE-2024-28067,0,0,3565fd0ada2e0c321bb115af4a670e45b532df6130e88a302b617be4c5f9f12f,2024-11-21T09:05:44.517000 CVE-2024-28068,0,0,4ad18e3fac7a71a575f477d531a4c0047d3a9eba63b8ba6967e711d0116faaae,2024-11-21T09:05:44.713000 -CVE-2024-28069,0,1,efb0a27d12fc8c409138d4cb99523efd1ff8eff144f8315bf517a3e7f24c3984,2025-03-18T14:15:38.693000 +CVE-2024-28069,0,0,efb0a27d12fc8c409138d4cb99523efd1ff8eff144f8315bf517a3e7f24c3984,2025-03-18T14:15:38.693000 CVE-2024-2807,0,0,d5df072d14c63a150df30c06942ef8b1a4196e073cd023f9b3c41b08dcfaef61,2024-11-21T09:10:34.117000 CVE-2024-28070,0,0,636e2a0fb0d0c0f843795bd2fc360a9b786d38874ab72d393604ed9b95733d95,2024-11-21T09:05:45.067000 CVE-2024-28072,0,0,4c08f86186600b9b3288b9e0c28e7c3bbf121b9a165ab22ed55189c2b2697fdf,2025-02-25T17:12:45.987000 @@ -255467,7 +255467,7 @@ CVE-2024-2884,0,0,0f960eecd00a99c28c0967e9bf7b6b5acb44c0938ce2580d2bf9c52f104cc0 CVE-2024-28847,0,0,268bcd99493c8142c03138ae4c578b554dcd0966d72dfbc92319b075a2d99f62,2024-11-21T09:07:02.247000 CVE-2024-28848,0,0,ac0cc2f13d6479fa9ef5f40a6043a1e1afd98b06da363160eb2fde1d86caf54a,2024-11-21T09:07:02.380000 CVE-2024-28849,0,0,fce8d96d043a84934194a3ea53c2248ddb15ea8ac57d38977bd2580a60fca2aa,2024-11-21T09:07:02.530000 -CVE-2024-2885,0,0,633a142213b8958e55f192b95da07bd5bb8c23d90b6f6af638f09073f41aa90e,2024-12-19T16:04:04.557000 +CVE-2024-2885,0,1,13500220ac5bfd0454dd8131ee8b0be250041ef96368bc8fbccdb777f3e8b6de,2025-03-18T16:15:21.350000 CVE-2024-28850,0,0,a37a4283ca549b0be7779ab2ea5db14c7133dfb0bbc8866eaa8e09216cd2a001,2024-11-21T09:07:02.667000 CVE-2024-28851,0,0,64684c9808bba072162a30e9b68edda03449afeb907ef399bbfbbb2b88661563,2024-11-21T09:07:02.793000 CVE-2024-28852,0,0,f475d43fbffc7988bba339612aab712ade0a789878f9e53c80d1de90f77f2b04,2025-02-05T21:20:47.810000 @@ -256075,7 +256075,7 @@ CVE-2024-29781,0,0,81764d2ecaf2f1e1d825661ee17548a0995481805ec14200c1a9a7db0021c CVE-2024-29782,0,0,06eb5adaa45831479ffd87f06e34e670102447159d3877306e2aab7674670069,2024-11-21T15:15:29.660000 CVE-2024-29783,0,0,42e116ba0de4ca9018bb2cb30d30f6d650c585f5abd1ba4d4dfa3eb0b0d23d46,2024-11-21T09:08:19.240000 CVE-2024-29784,0,0,6410da5e9d69428c4d9e7c31b09a560c1233a73c5681293df4e3349cc79f9292,2024-11-21T09:08:19.350000 -CVE-2024-29785,0,0,5beb21ed22629810b74cec6c64339ec3242307f409d822b42af120b2c02ee55a,2024-11-21T09:08:19.567000 +CVE-2024-29785,0,1,31365898ee13b8a306bc4ef1af7b05e8c7ec93bee132b5aedd69eaa657b6ceaa,2025-03-18T15:15:48.267000 CVE-2024-29786,0,0,0447bd7e8fd3b77c2f391c605cb7a8749450b31ff248ce09ea0ea3f6b518cfa9,2024-11-21T09:08:19.697000 CVE-2024-29787,0,0,6a425a2ccc1760892bb9430767d14b065e53cb38a248fa311b7041cda9df00ef,2024-11-21T09:08:19.923000 CVE-2024-29788,0,0,99a3238700c1590f4469a7663ba2334415beb1a8e69fa4f6bf5573a8d26f75ec,2024-11-21T09:08:20.133000 @@ -256126,7 +256126,7 @@ CVE-2024-29828,0,0,0b8cc89625988a1f0ff53205ecc50cb342988e30b542b0d7876fa5c1adc49 CVE-2024-29829,0,0,118f67dd1d66f6715aa52001ac8fb136cc82b46087c116f68721b3a3cbac88b6,2024-11-21T09:08:25.467000 CVE-2024-2983,0,0,88f93e96dafdc858c4735367e13c5deef0764966dd914e5e8b51ce84f7f778a6,2025-01-14T15:31:10.653000 CVE-2024-29830,0,0,3f9252519d26c2a44915f75e911a6f26ff92e77c813067ee428ba5c495fa5e58,2024-11-21T09:08:25.620000 -CVE-2024-29831,0,0,e6c66beb73404b95bd012a575dfe2fbe460731a7b1a9e842d9b5a35c457e6ea5,2024-11-21T09:08:25.767000 +CVE-2024-29831,0,1,ace606dc9d924df2f2c39a33dd0f25168f42bf9064bf7682bd2f8485d3c23aa8,2025-03-18T15:56:38.357000 CVE-2024-29832,0,0,6056032a590f7abd34bd12f5925c086bdf38bbd060ac2b171db2d160a1e2f453,2024-11-21T09:08:25.963000 CVE-2024-29833,0,0,749e9d8c64909205659cff602c4225d0cb6353f71312c1f77d5c97e9e9c104c1,2024-11-21T09:08:26.100000 CVE-2024-29834,0,0,de32c83406ee0a8ef1956073d47bb9c94eff55af17248af2c5763cb541959bb5,2025-01-24T16:21:24.170000 @@ -257662,7 +257662,7 @@ CVE-2024-3170,0,0,596b407001ba195a8504d94c79f88526c2eece1c3e7d3022e47196ebfd910e CVE-2024-31705,0,0,21247aa945114616d9153c9180448ea2a0d6f5ce37586d25ca792bc45b7033bd,2024-11-21T09:13:49.640000 CVE-2024-3171,0,0,108508cc36c17f228cb917c4d635ba896d2a5833ac43ebb73307bfb04cf1f223,2024-11-21T09:29:04.030000 CVE-2024-31714,0,0,c0c6c7dc373b518d20be2543032a1d9a7a5244f08d272e125525335f6445b03a,2024-11-21T09:13:49.853000 -CVE-2024-3172,0,1,dde72649434996b3abc723061a7ec4be1a77c166c4b1e520c485e0c7af55195d,2025-03-18T14:15:39.083000 +CVE-2024-3172,0,0,dde72649434996b3abc723061a7ec4be1a77c166c4b1e520c485e0c7af55195d,2025-03-18T14:15:39.083000 CVE-2024-3173,0,0,66654af0a9b3693e714ed54dab6b753d23bb29503cbcc422c776834c0881735a,2024-11-21T09:29:04.353000 CVE-2024-3174,0,0,01b42bbeb78c5debdb12591a172fa4a735cab4eecdab161d70a702f00cb1c20f,2024-11-21T09:29:04.553000 CVE-2024-31741,0,0,6f9f2f7a1a9d031b20435c4525b96bae952709f51b2ddf9cec9e16a72c5cc2ab,2024-11-21T09:13:50.067000 @@ -257692,19 +257692,19 @@ CVE-2024-31801,0,0,c3fef98db9b31b362c26c0f91b41bd1c22b4a42e9aa117bc72dd6a8ffc8ed CVE-2024-31802,0,0,cbc35d8603249f0466c7706c961e0d2b59cf40c1ebcb8860e13ab16020756e8f,2024-11-21T09:13:53.733000 CVE-2024-31803,0,0,d9b26bc84c00ad02a4983e383e6cd9c0ab05ab8bc5091897dc5b0ed4bd5e0151,2024-11-21T09:13:53.947000 CVE-2024-31804,0,0,133cc37f55d88b9cc8e0bfb26f2c78c3ecb37149a83213ef766fef0bf5290f66,2024-11-22T16:15:22.133000 -CVE-2024-31805,0,0,3645de423b33a68a39cadcf0df163c1471a0d4a1ba0885c63aef6dea7e17df57,2024-11-21T09:13:54.427000 -CVE-2024-31806,0,0,279f8ccfdeafbbea2245569d10b2c3fb50fd01220245659ce1a8f2562ba5051a,2025-03-13T14:15:25.800000 -CVE-2024-31807,0,0,ccfa9f98bce4e15e80f573d64d69659f0ac76498224c191103aa278c376209ad,2024-11-21T09:13:54.877000 -CVE-2024-31808,0,0,e55f0c5d555b172d95e5c592f270d2945fef58b1c6177c4ab849b888f0409f6a,2024-11-21T09:13:55.113000 -CVE-2024-31809,0,0,69280cdf1c045d8ef4c16436e3bbcae1ff4bbfccf4e7cb0c463cd49aaf0abbfc,2024-11-21T09:13:55.333000 +CVE-2024-31805,0,1,91b9ade178de018d6323e4aa635b9250f84d8f008dd386140294b7df76bdce57,2025-03-18T16:04:21.413000 +CVE-2024-31806,0,1,95924e1c645fba26290c663bc82e19a379e61042766c9c620d680dd34e099bfe,2025-03-18T16:04:16.430000 +CVE-2024-31807,0,1,6460af78f61ecdbfc7a4ffdba9dc52a801085866892e8798dfd610354b72b583,2025-03-18T16:04:11.190000 +CVE-2024-31808,0,1,bc0dbd2448dde5eb8cc9d2ea71cb2775bf0db1bbb55ea5a2d5f1d982cd7c074f,2025-03-18T16:04:05.817000 +CVE-2024-31809,0,1,92427801fcdc5c85ea38d648bf18dafb5c3274243888cb5e5a830a17793d1a38,2025-03-18T16:03:53.180000 CVE-2024-3181,0,0,3adf9c861b0981337f35305092bf11e6714526a136621a8de97f63b17a5ae922,2024-12-16T19:07:04.087000 CVE-2024-31810,0,0,d6d6da5ef333809ab10a95322d4e5dcb46b837f55b6b6b3bdb735ab9d7d2335c,2024-11-21T09:13:55.557000 -CVE-2024-31811,0,0,cd9d5de2c9395516c50a16bdfd5b09a2fcc6663abe564d13e2174d52551ecc64,2024-11-21T09:13:55.707000 -CVE-2024-31812,0,0,73aee4834e391500d3c2896d20231fb0f66109fe83a1224890df798daff609e7,2024-11-21T09:13:55.930000 -CVE-2024-31813,0,0,328e78e4875b84f735d4ebc6e411b8696d680f2a8daa5f3527b7a38163371780,2024-11-21T09:13:56.147000 -CVE-2024-31814,0,0,88cad81f8ea048333405321f3c315e4e043e49a3a74c569122199363e755daa2,2024-11-21T09:13:56.373000 +CVE-2024-31811,0,1,87c75602351a38ffb5fb9bed79347f820348e1b2857df538f10d4d271e5073c6,2025-03-18T16:03:42.680000 +CVE-2024-31812,0,1,17148f5df09a6c99b320dad11c221635617b5c2bb39d3aafc53bce13629b7121,2025-03-18T16:03:37.920000 +CVE-2024-31813,0,1,30d19417f1f2f2a5ea73a5cb44f21b7612c43e8590ac154ff51e926e3c72f5be,2025-03-18T16:03:30.870000 +CVE-2024-31814,0,1,fcad33a5eb8065eb480c3ad9b2cbaf800929b46ac2faf9df86b6afc840c787cf,2025-03-18T16:03:02.557000 CVE-2024-31815,0,0,52b807f1595bdd87341e26f106ab7334fada0c2e588fde1b55352bf52610cf2a,2024-11-21T09:13:56.597000 -CVE-2024-31816,0,0,547d3096c6444c4c11fdae552490eff782a04ed9efce8c96a33b44650bb31f93,2024-11-21T09:13:56.820000 +CVE-2024-31816,0,1,c8b2b54ff9bfe6f29f56125a4edf7caa1ace286dae9fddd6e27518b856bf87b2,2025-03-18T16:02:17.737000 CVE-2024-31817,0,0,b96657597dd56cc7c853da147c86815a78952d61a673cc6fac2a8f77694f3c89,2024-11-21T09:13:57.043000 CVE-2024-31818,0,0,c156a59fccf793b2b7cee90bef878ec08da6736171b84383a1dabec31026a722,2024-11-21T09:13:57.257000 CVE-2024-31819,0,0,7d5fbc2ece5c7bed2e05e05c0b0302a35071e5640e81a745c25e56c6cb767114,2024-11-21T09:13:57.460000 @@ -259082,7 +259082,7 @@ CVE-2024-33598,0,0,d18b88b92de282a6e298e97b6b8298eb03639e013519623be4c3a6ce12426 CVE-2024-33599,0,0,7562b04f66c6d54d64426cb393ec1c5ece9c8a879f7afa7f5dac99b57a77072d,2025-02-13T18:18:03.513000 CVE-2024-3360,0,0,cc6d76ae5db0ce9bab65b748413469a70f295699df8c796e1ea5796d4203b12e,2025-02-10T23:10:22.100000 CVE-2024-33600,0,0,e7823dcd14d5bdee96702b4a26e8a35b47f7712e7aac9f5d7aaf271585ac0d3b,2025-02-13T18:18:03.643000 -CVE-2024-33601,0,1,12ad9e6fcf3b3b809eafc59904f4de659a65110943d6a70c17288cb40c56d749,2025-03-18T14:15:38.867000 +CVE-2024-33601,0,0,12ad9e6fcf3b3b809eafc59904f4de659a65110943d6a70c17288cb40c56d749,2025-03-18T14:15:38.867000 CVE-2024-33602,0,0,a9e22864890268ec8ff59de2c91d6473b5de5b495cf2c7b4e8c59156a6a79698,2025-02-13T18:18:03.950000 CVE-2024-33603,0,0,aab47ae0f47b94871d557c2edba07334d57457a2f8cbeb3e6bc397cd050c8cc5,2024-11-21T09:17:14.493000 CVE-2024-33604,0,0,b3da24552fb32841e75513561ad454f118005aa176ebb44510170968fd4ffa39,2024-11-21T09:17:14.630000 @@ -259473,9 +259473,9 @@ CVE-2024-34087,0,0,ad0eecbb0612f719db7e23c85ea2351d6bc1b74c0c7f2f45f413d40049f7b CVE-2024-34088,0,0,29ed9bff3f7a8aac8372db6383813d7ff3a9c10604e1b9decbbfa535edc1d6bc,2024-11-21T09:18:04.130000 CVE-2024-34089,0,0,e3ae5d593727aa9f206992806888f8b4a259e5a9864ac8d8f3c293e89b791320,2024-11-21T09:18:04.370000 CVE-2024-34090,0,0,31102a35767023992cf7abe1dae1bacab87f9368efd50ab8a275c9015b8dc10b,2024-11-21T09:18:04.523000 -CVE-2024-34091,0,1,519e69cce22b8c1316311fb4d4cc72759f50566992d370704c56d265bc32e1e8,2025-03-18T14:54:25.830000 -CVE-2024-34092,0,0,0ba3d8ee6d8ef468c315a26baac7305fb679ceec5f971590e1392c655be9203a,2024-11-21T09:18:04.823000 -CVE-2024-34093,0,0,0044f6cc121a6c9932833585ba18469e879c95b0ba2c45398dfb0161e5fcde00,2024-11-21T09:18:04.953000 +CVE-2024-34091,0,0,519e69cce22b8c1316311fb4d4cc72759f50566992d370704c56d265bc32e1e8,2025-03-18T14:54:25.830000 +CVE-2024-34092,0,1,03028f4bf647fe60ff9dc41f22799f5b661424f6b2f14d3e49a20b51b70e0827,2025-03-18T15:22:43.557000 +CVE-2024-34093,0,1,6c5685753d65dbac14a383343cdb5112393785fd3517688c38dfa7edfe0901da,2025-03-18T15:26:21.247000 CVE-2024-34094,0,0,78482e61bb057c4647bccd2a377fb3babc1863668db96b03b61e65a54b85b0db,2024-12-02T21:22:17.230000 CVE-2024-34095,0,0,146a5f7363f542c2a6eb0d3170e47871bcfd49a363420b426f7d5c3745f0bde1,2024-12-02T21:22:18.937000 CVE-2024-34096,0,0,689f499f67b51121d211a3946eb63c24197232fb3f2037429a063dc378d214cc,2024-12-02T21:22:21.580000 @@ -260475,7 +260475,7 @@ CVE-2024-35422,0,0,aa009d23935388c556c037771282a7c3dead706c11c68a3cd583e93352fb7 CVE-2024-35423,0,0,131a923d34bbf2e2c2b3871d13d4fbc7829109b7f2ac9a58ca91c1e97c8335aa,2024-11-12T16:35:15.027000 CVE-2024-35424,0,0,fce72a605afcb8cba44218bd65f2598a4a492a667488af1fe35084178edd8ff7,2024-11-12T16:35:15.950000 CVE-2024-35425,0,0,538c5756994fbfa9bb6e2b4a7135507d66d437c2f1230100d3db4bf3aed8d797,2024-11-12T16:35:16.757000 -CVE-2024-35426,0,0,e2faef100853dcb6301e1399585dde6fd174fcddaec891824a945904bfe162e0,2024-11-12T15:35:05.420000 +CVE-2024-35426,0,1,5823ef7a079a7966742d372e6237ba39975e15ea3cfa316d4244091a9afebaf0,2025-03-18T15:15:50.280000 CVE-2024-35427,0,0,ca89985cece233a208304f5ddf3fddcee54e63a435b1f07bdc5e62a36e401cdd,2024-11-12T15:35:05.710000 CVE-2024-35428,0,0,aca3f16ab820d94322438d3fc72ff10899261f2e903042de7a1a8f17c45384f8,2025-03-13T15:15:44.340000 CVE-2024-35429,0,0,52808e62548e3aeda013f9daa011659ff9f1882c40ae3f4171c4fa570e3eb02c,2024-11-21T09:20:19.380000 @@ -260919,7 +260919,7 @@ CVE-2024-35956,0,0,a2df20ee828a684480220f597be9391b4a50d33880f1470bf6aeca6acac4f CVE-2024-35957,0,0,63f1ef216f981899f739038c72e590e5dc7a92a6cab95efc5de09be8bad6816d,2024-11-21T09:21:17.513000 CVE-2024-35958,0,0,dea59fdb3b17c08467afba7fa0588c1d2e5cd5eb65fea4ada743f1bfb3c216a3,2024-11-21T09:21:17.707000 CVE-2024-35959,0,0,53f6e1bb6d9d49084925276b5c45c193850da3a7ac9cb385334abc5f14e36dbd,2024-11-21T09:21:17.913000 -CVE-2024-3596,0,0,a73be4dbd1ba2f2be100ff8602358c44e097c68e335a7e6fccfaec4ec8e338cc,2024-12-30T19:23:20.437000 +CVE-2024-3596,0,1,4246a2c2dc908d228b50ffca493329c9a7b02d6ef3b25fd6c58c4a1c29c8d4de,2025-03-18T16:15:22.140000 CVE-2024-35960,0,0,85a643c1126146028b0f246face42ec63a48e10da60dacaff32d51eebc9fc072,2024-11-21T09:21:18.037000 CVE-2024-35961,0,0,d8bede3118f3213f6531e3d4764ee351899ee3c652f6f84602e33285303dd68f,2024-11-21T09:21:18.270000 CVE-2024-35962,0,0,f360f85bc8ef52af04a2c558b97f52575478fb0db43fb8c16bc09d6f51c8dcff,2024-11-21T09:21:18.400000 @@ -261260,7 +261260,7 @@ CVE-2024-3634,0,0,3383030fed20fc028b4b4484c7a11fba64d2ea257fb986bc506941077c30f1 CVE-2024-3635,0,0,6b91ce08fb1c4fe8eb1c3b4b2db88c9ffd3abcddd772228d559fe4e3fab4a5b8,2024-10-02T14:30:24.627000 CVE-2024-36353,0,0,caf07d2a6c34feb51886f1ce6edb50e9937e103b379c80565763a756df3ec242,2025-03-02T18:15:34.033000 CVE-2024-36358,0,0,e66b6ff78de233048241c8ffda06ad191811a297c66565946adb609a3d8978b9,2025-03-13T14:15:26.933000 -CVE-2024-36359,0,0,3cc0d651469873089668811614995b932e2a134931c52e95469939b03a9b9e74,2024-11-21T09:22:01.040000 +CVE-2024-36359,0,1,681447f14a7123230c23ae85426c8aaf48135d70ce8470eeb85fe0cc08ab2eb1,2025-03-18T16:15:21.627000 CVE-2024-3636,0,0,4c7744b51293bd4e3a9aa3d916a63e7f32e699b3ac0ad0263818bae7fdeef663,2024-08-07T16:35:14.110000 CVE-2024-36360,0,0,98643c3072e9d590b4c751843f231fe3cbac85b5add3945e111d686ffb57c7ef,2025-03-14T15:15:41.037000 CVE-2024-36361,0,0,e4343f7ee38acd675bd11a78326fa9c9897eb116b95daf33a3c1581431d81b95,2024-11-21T09:22:01.357000 @@ -262200,7 +262200,7 @@ CVE-2024-37475,0,0,cbfefe230d52e2669fc5428c99656387af5b1fa2063bc21971532b1efb6e9 CVE-2024-37476,0,0,70a287032cfd661bff7984072099f8a4cdceab398083881040e461561ca16778,2024-12-06T20:15:25.137000 CVE-2024-37477,0,0,8c01fedbd87fceaee08e35077f2e94dbeb84cf888cf74c6ee69973e245a2067b,2024-11-01T20:24:53.730000 CVE-2024-37478,0,0,d08fba1f1012f9ccdb25796184c2cfecdff9e55599e9ef1af8075ff3a7e30907,2025-01-02T12:15:20.990000 -CVE-2024-37479,0,0,9aaaa4ef25c7ae11e8537120cb7bf226d7aefef3269d483dc0189d1a534c10d8,2024-11-21T09:23:54.570000 +CVE-2024-37479,0,1,764d5a55a81e588d334b220eb219c04491e88e120ba91d7b3ac026d8464fdb67,2025-03-18T15:15:50.993000 CVE-2024-3748,0,0,3cd921e4f9a499070c7216feb1d71d75725cdd06cbd3ca5f07632f39dc91c5d5,2024-11-21T09:30:18.467000 CVE-2024-37480,0,0,3a9ce5f957562287d8293e2da6c5bc55870c81b6c7f39a22438c6ccce2ea473b,2024-11-21T09:23:54.693000 CVE-2024-37481,0,0,f4552bd8e0251248063c299b12c831b86bb9fdf19221945903a28cb9bc21bbb8,2024-11-01T20:24:53.730000 @@ -262351,7 +262351,7 @@ CVE-2024-37671,0,0,63a7bb054b9783dd1c7933bd57d4a8f7e2cfd8dd008993792ee8177e6854a CVE-2024-37672,0,0,e44dfa3a5448c7ddc8be3e7358264cb6292a7fdffc27b2a73e33c9a81cd357fa,2024-11-21T09:24:12.893000 CVE-2024-37673,0,0,4948f447146a2f01fa61fd5402a993016f9583881e815929a457af264ecd9e35,2024-11-21T09:24:13.130000 CVE-2024-37674,0,0,98e471acbcdedb7acac7b1c1776950deb5bac40595f3e6346c2c265d802998ce,2024-11-21T09:24:13.360000 -CVE-2024-37675,0,0,e012c7b680f3555982e557ef6c730d0b1bfc327c86bf7039e0a3454c46a5b52f,2024-11-21T09:24:13.560000 +CVE-2024-37675,0,1,cd47fb3488bba19fc49d7577cb541036bb9ed9f63f77e17cc9553db9023f3802,2025-03-18T15:15:51.737000 CVE-2024-37676,0,0,415ada6299f7cd143b15bc431799ef76592986b2443e085c31e97cb8bf3da618,2024-11-21T09:24:13.720000 CVE-2024-37677,0,0,914b27f644b99c23fa73430b334c2012f02e568866d02ad51d6528274c4668e8,2024-11-21T09:24:13.930000 CVE-2024-37678,0,0,66d3748cd4e3715edd5f08d3f6dd1ace38fe5a2e775763ef129c478b46751a2f,2024-11-21T09:24:14.140000 @@ -263374,7 +263374,7 @@ CVE-2024-38812,0,0,2e704a7e06ecb019d5085676217a7390700a3558f717063ea75069351632b CVE-2024-38813,0,0,1409084c41adee72bdcf9934e18e7da6818185b8a3db90d337d0b96891a93438,2024-11-22T02:00:03.353000 CVE-2024-38814,0,0,90eab84aa18fb46329df62927ccc1d1c59410e741ce48795ab41f85e30e47d90,2024-10-21T18:20:53.267000 CVE-2024-38815,0,0,c2f3d96806ad2c957e6f1813738eb63c778dd5bcfc2ca0fb6ff008ef1226ae9b,2024-10-10T12:51:56.987000 -CVE-2024-38816,0,0,65fd0cf5f0fe6505681fcc328b56e581fddf781c33094976bd261108a87a06bd,2024-12-27T16:15:24.313000 +CVE-2024-38816,0,1,1c00608acef482d4e409b9c8f19e06efa8a3e80c134a2d34c3fb28c1b768ef9a,2025-03-18T15:15:52.397000 CVE-2024-38817,0,0,d35b7b204aab6983c6c262b508cc4ec8ea32f0ec3634fab0504cad88bd52a03a,2024-10-10T12:51:56.987000 CVE-2024-38818,0,0,f3b0a463e446554a0bbb57d124414991153a9fb40d9dc2ce6360b72156684b2b,2024-10-10T12:51:56.987000 CVE-2024-38819,0,0,c298508c17117e1259d3bfe55735b04be8f822cea51854f73ce47b1bd6cf019b,2025-01-10T13:15:09.287000 @@ -263587,7 +263587,7 @@ CVE-2024-3924,0,0,a7d7d2f179b70fee660a7c5121a05bb1bfb909c2c19095cfe92531fde96543 CVE-2024-39241,0,0,62f2aa86038a75db9f42650078b01738271c6f6139d6a16667450f1373f6b200,2024-11-21T09:27:21.467000 CVE-2024-39242,0,0,43a91895e92bd720e6caad7b641764febae124befd54612aee776ab0a64abe13,2024-11-21T09:27:21.613000 CVE-2024-39243,0,0,8a71f18c951566d7879eb980241b0471ab0905142b0166e227a16eb2063f3a99,2024-11-21T09:27:21.760000 -CVE-2024-39248,0,0,1bf76b2262f3407a8431a3b3e26c4e6ae4412d8dbda47d486dad5141d6444024,2024-11-21T09:27:21.960000 +CVE-2024-39248,0,1,ef5bdeda9bf8b129f7fdf1bf335dbd2259ee8389ce9f4b740214a512856eaf82,2025-03-18T15:15:52.563000 CVE-2024-39249,0,0,7be8f0314a4b46939ea494f384d9ffdc384f5f98b6cd05eb17cc6b2d50d2a427,2024-11-21T09:27:22.130000 CVE-2024-3925,0,0,cd8dfd6d51ac6cd690d67929a196f6da1ca4ca4430d5caf127ecc9ab5f16da00,2025-01-29T15:31:21.800000 CVE-2024-39250,0,0,21b05446dfdc54cf0c98fe165562927c7c8516143bc3a042c68b6df4fcb5511d,2024-11-21T09:27:22.363000 @@ -264235,7 +264235,7 @@ CVE-2024-39925,0,0,9746dcc58fb8cecc9e1d89cf824e88cac8bc60fdcab25d7646a74784aca52 CVE-2024-39926,0,0,4b5ea093d7330777157039117017f850139879a4c317f29d3725d66f7904f02a,2025-01-09T18:15:28.220000 CVE-2024-39927,0,0,d102506d349c6cd661c84f9625100fb5afa84e23351ca69840c038d426e26cb0,2024-11-21T09:28:35.253000 CVE-2024-39928,0,0,36746816d5a179f8dacaec6e67ea9b447cd0145aa354104fbfbe630b6bc05ce0,2024-11-21T09:28:35.457000 -CVE-2024-39929,0,0,04314018109d25707b696ce9116201fdf7383da3c0539980ecfd791403ce71c1,2024-11-21T09:28:35.660000 +CVE-2024-39929,0,1,e05786a0bff8a717a9d0e29fd179f70720437e88c3451a4fe1017b9aa0163a85,2025-03-18T16:15:21.850000 CVE-2024-3993,0,0,dfe7a0553427868055b3e1c0cde0f364fe08fe913b7ecb5123deb206c4ea7338,2024-11-21T09:30:52.047000 CVE-2024-39930,0,0,5dc01b3c8e1fb8f73588615aae7b8a8178fdcfb54e8c7686725ce4a45e216e26,2024-11-21T09:28:35.910000 CVE-2024-39931,0,0,4d0fc49e820fd6e541780bd9d8d0eca181c5f5d1fcd9439a146d43237b57d2b7,2024-11-21T09:28:36.087000 @@ -264331,7 +264331,7 @@ CVE-2024-40333,0,0,84a43b2fccbebb8a4be5c64af05a119fc4459f6881f546c0c9cd797fcb126 CVE-2024-40334,0,0,1cc55c7d262e1fe4311109f1b8889bb0596ed8b0bbb5eff12df349e099c782a7,2024-11-21T09:31:01.253000 CVE-2024-40336,0,0,cc28aa903c7eef4e70a8dcb45b3e9748940aa7f71b7209f48ae2bcfd47691fe1,2024-11-21T09:31:01.497000 CVE-2024-4034,0,0,3e1edb4e313fcec881652216da691401d01ef765d0e32a87a1a27b2115e70200,2024-11-21T09:42:04.307000 -CVE-2024-40347,0,0,60b2053268c3a4648405a4175a0e2efb76ebabdecc815aa0ac0049d8a1e08e72,2024-11-21T09:31:01.713000 +CVE-2024-40347,0,1,5c4f900c27a79a65c2c1950bebc45a10727f89a6cff7435d7eeeb5c0e73aa596,2025-03-18T15:15:52.787000 CVE-2024-40348,0,0,a58e6a47358e956246c4dcc36efd0ca5ef95a667f1cb47a658c76971b3dc1ffb,2024-11-21T09:31:01.867000 CVE-2024-4035,0,0,f76d80111e81f9edad4b19e9027b1d70e9b8c1241f56329bd5838cbdf02e9566,2024-11-21T09:42:04.440000 CVE-2024-4036,0,0,7aded61cfc52a62565b948ab8633b838a5ee4d72bb993ac0cbd5158ad07150eb,2025-02-20T19:52:28.110000 @@ -264446,7 +264446,7 @@ CVE-2024-4056,0,0,d578d896482bad42a689f24bb727d093d89b4e4ad9a16137115268e371c355 CVE-2024-40560,0,0,4df2ceb4f41adf8cf666410bb966237766648fac71bacffbfa433d4c66c2109b,2024-11-21T09:31:19.433000 CVE-2024-40568,0,0,c12c8f080192deabb173a3181ef7b218c84c4523adbfc6eb7f73c288b6931903,2024-09-20T12:30:17.483000 CVE-2024-4057,0,0,a8ad6ccfc0806ad96a1cb2ac3bade2f19ae5a39ef55d50ae8d2c9b80f3c0a3fc,2024-11-21T09:42:06.090000 -CVE-2024-40575,0,1,8f8f60ae0654b2cb189f518e1a74f4f9151a1448954bee799fbc3bd704a3ffa6,2025-03-18T14:15:39.260000 +CVE-2024-40575,0,0,8f8f60ae0654b2cb189f518e1a74f4f9151a1448954bee799fbc3bd704a3ffa6,2025-03-18T14:15:39.260000 CVE-2024-40576,0,0,8cfb8bd5f4a4277303f3ae5754ca38f6c2227922febe0cad08d341d6250d63a0,2024-11-21T09:31:19.970000 CVE-2024-40579,0,0,da11a1c0f7825d9658796f4408f8973703e2e8887ee02d7fb06e9fa156da18dd,2024-11-15T19:35:07.323000 CVE-2024-4058,0,0,320f03165657b376b0f731f9e1bae79a3d28f3ea9d5ed14ae2ced412f995a064,2025-03-14T15:15:44.400000 @@ -264462,7 +264462,7 @@ CVE-2024-40591,0,0,70c59ddda7629e1c082b5b948d65adc5f2ebe759d2e9b040cf087140e0407 CVE-2024-40592,0,0,70d588c7e0dd63c3f30c565c48cdd17864cf3988f3b717bd753beb73e71e83a3,2024-11-14T20:37:06.040000 CVE-2024-40594,0,0,bf65899143a2f4c0e93f528c3b9a7873123db8d586300b13b7dc1af3be463ad0,2024-11-21T09:31:20.467000 CVE-2024-40595,0,0,1086c58a18861988742c11b047f1900d16c515d21111ee56b1cf972adc3e9a0f,2024-10-25T12:56:07.750000 -CVE-2024-40596,0,0,cc871acc0d8ab01520b1271fab5c6989d4ce86d645264de6e102f86e2b5a9e4a,2024-11-21T09:31:20.793000 +CVE-2024-40596,0,1,5240a237ce3628ec365b817908f7b7916302d88981ea3c3bfa3cebdffdb8e722,2025-03-18T16:15:22.477000 CVE-2024-40597,0,0,8a4ea522434a8353ffa3db1f66d48d9ec686cbf011d935aed3582970ab4fee33,2024-11-21T09:31:20.973000 CVE-2024-40598,0,0,b777ec9c9772520a1470d608939dab7025140fd1aab87049fa38ec83eb520e9a,2024-11-21T09:31:21.177000 CVE-2024-40599,0,0,0d26c1cac9c656d98f818270c22297fbe6223c78d20070058c67c37b64dc564b,2024-11-21T09:31:21.317000 @@ -264624,11 +264624,11 @@ CVE-2024-40785,0,0,e7608cb4e789b0d57c87d46824a61398005e9bfcbb488fcf872b55b20c6fc CVE-2024-40786,0,0,be7513464307331b0f21d95b97bef5d1d4b3b9ee1591c2069c1d9ce282f49c20,2024-11-21T09:31:37.657000 CVE-2024-40787,0,0,ff74f1131bab9fe9382a9a7c925dfc41da9f84275eff94b172d96b4b7683c6dd,2025-03-13T19:15:45.973000 CVE-2024-40788,0,0,74fefda30f0aab4e09f30ade87f11c85de3de9a6b1f0932eeb0d9ad4ea247f18,2024-11-21T09:31:37.927000 -CVE-2024-40789,0,1,5a1885ade6f38c7b1421a592f3c0fe5196df044653ca548723a01f9980a37f3a,2025-03-18T14:15:39.473000 +CVE-2024-40789,0,0,5a1885ade6f38c7b1421a592f3c0fe5196df044653ca548723a01f9980a37f3a,2025-03-18T14:15:39.473000 CVE-2024-4079,0,0,d013459ffe1c358bbcd1714666185ba7ca2c58f58c35e2f334f09e957ec7acbf,2024-11-21T09:42:09.197000 CVE-2024-40790,0,0,d7d54daabba8d3f137709427c636b535799803d2811813d32fd0485b74b32f47,2024-09-23T22:55:36.537000 CVE-2024-40791,0,0,61e585f5c7e9e7a003c2692a4c8aea66b3ee7f0772ae5577a1ff0301d3e7d423,2024-09-24T15:44:24.397000 -CVE-2024-40792,0,1,400b069248cc8e9a30005addff3f79008090c1530afbf824d829a23243885942,2025-03-18T14:15:39.723000 +CVE-2024-40792,0,0,400b069248cc8e9a30005addff3f79008090c1530afbf824d829a23243885942,2025-03-18T14:15:39.723000 CVE-2024-40793,0,0,8e8c7f5f0283a5dfa91b2c2375ff0a12e95b20686971bdae8a146cfd87e7ca01,2025-03-14T16:15:33.573000 CVE-2024-40794,0,0,1c884dad1bfb64c4327882aaba41854cdcb1933185fad999593f033dbaf2fcc3,2025-03-14T19:15:46.877000 CVE-2024-40795,0,0,054a23cd21201389beb5d30170b0d11407f666b940f4c135b0ceb5b20c8a9212,2024-11-21T09:31:38.810000 @@ -264668,11 +264668,11 @@ CVE-2024-40828,0,0,7b08ff9a88811c1a2d2f6a8cabe468d48214feff7b5748f8277c1d1c6bcaa CVE-2024-40829,0,0,fd771f31bed178b3e41cb7798817c9ead3dca48f77739beb607453c8ec2928cc,2025-03-14T20:15:13.257000 CVE-2024-4083,0,0,861c69f070b98df21ed1e5fe755d0f8a3138be95fcc12d774c40863a7b1a40b2,2024-11-21T09:42:09.710000 CVE-2024-40830,0,0,5a11ad0fbf19f984d9514795e3ce671f0d4fd0db283d4edb735d82b003a62069,2024-09-23T19:19:46.127000 -CVE-2024-40831,0,0,77a034f59c59409708be4a3edb262d2ddfc572eafa36e0ec5128163562471781,2024-09-23T19:18:02.207000 +CVE-2024-40831,0,1,2c0a26ddf7f28eb9a72eac2ba6b26bbb5240bedac025ac96fc27fcb328c62b69,2025-03-18T15:15:53.077000 CVE-2024-40832,0,0,00c14c566f042719b789e0fa64de268df676d122f61af7b5d4e2c9ee45727210,2024-11-21T09:31:43.867000 CVE-2024-40833,0,0,b910eead051682eac062094cd6da18a48ed3792c5e338b1321e1813ef0d8294e,2024-11-21T09:31:44.070000 CVE-2024-40834,0,0,4f5e2fad4cc02ee645b2828d5399abfcc2bf826d6f9beb32772c022a7ec8aa76,2025-03-14T16:15:33.970000 -CVE-2024-40835,0,0,3f6ef0b1fef5cf4b00a629185a96b630665ef3a9544463783f9d2cf4975e71e7,2024-11-21T09:31:44.430000 +CVE-2024-40835,0,1,52873d1f01cd60d010cbe1b5ceb6ba2a867cc4086527e5948af908d356ac6e5b,2025-03-18T15:15:53.270000 CVE-2024-40836,0,0,f547bde23b2f283281ff845ac25e2bcd425617d92a5f6cef3ab7dfbc5d800bdd,2025-03-13T20:15:21.770000 CVE-2024-40837,0,0,d9e1d727c5489e5fbe91c9a35481e1b475460063dae3d0ae089fbdf692fb517e,2024-09-23T18:50:16.050000 CVE-2024-40838,0,0,580b3d51fd4431cbc24e96aafd19ebfdf3fdc30d947e42e3e5409dfdf94d1c3e,2024-09-25T16:46:24.123000 @@ -265190,7 +265190,7 @@ CVE-2024-41583,0,0,1a2cf944ac0faaad65d0fa8a08d6745d58f6ed5d5ab422f4a8a1c3b961675 CVE-2024-41584,0,0,a756336a17820148688412fc36dbdf4cf1430daae27f7ae91b5ca9d658835775,2024-10-04T13:50:43.727000 CVE-2024-41585,0,0,5c7959b63fb8c6f9f663defb96a0fee4ade3ece14e0b9bc7262ce5ca4b357f56,2024-10-07T19:37:13.900000 CVE-2024-41586,0,0,1dfe0a57832209bcd6e050fea5d10d9e2cc77b9729ee84c61dfed10c208841e5,2024-10-04T13:50:43.727000 -CVE-2024-41587,0,0,8ec618c35df2d6b6c47f939e884fc8f9f85c116799f47d62322ced2da972c24f,2024-10-08T15:32:18.313000 +CVE-2024-41587,0,1,49423dacd1b4227d5ab73e5f650b6e45277b0abc6417b9dfb6a350665edb1b90,2025-03-18T16:15:22.733000 CVE-2024-41588,0,0,fd3ce7f7855398e35ab5f6ddf4c9ca224e9b39f193258ed7cd185f9bbcbce78f,2024-10-07T19:37:15.063000 CVE-2024-41589,0,0,933f60891b4d710c7b37c18705d8a2738d871d9d2c4ed1642f1e707d191ac66c,2024-10-04T13:50:43.727000 CVE-2024-4159,0,0,79fc1543f1260705e74b8deeae175c555b129f183a9014a6e4288a6f9681a384,2025-02-06T17:49:55.727000 @@ -265293,7 +265293,7 @@ CVE-2024-41703,0,0,dcd3d03b5c434df16dd05071c7a10e72dc30a0e55c094ddf70ba67f091daa CVE-2024-41704,0,0,4b451a3437720020e26f13276b4101189d07bb87a6ecc73fbbbfc49dadf68967,2024-11-21T09:33:00.803000 CVE-2024-41705,0,0,f9b452eb2c649dec3587d950762de02d033570f02d82719bcb4e74c2dd7fde51,2024-11-21T09:33:01.050000 CVE-2024-41706,0,0,086c8cab7401c2f1177a3fd76ceb725f5d26d0babfccefc5733a534b68445607,2024-11-21T09:33:01.240000 -CVE-2024-41707,0,0,a3d7b79aeb6433d50f291b767e35dfd30d5dd12d277a3c66604231c335206a78,2024-11-21T09:33:01.440000 +CVE-2024-41707,0,1,26d5adf9fc4a67ac373f2e42725b344a271a662152f07d973038b9b3e5c308ff,2025-03-18T16:15:23.030000 CVE-2024-41708,0,0,445b65b3721f3d8f292337791cbf935557797b1033365e761cbc9951f26720b4,2024-09-26T14:35:13.827000 CVE-2024-41709,0,0,2cc1be93865d85286340548125958805b824c1daf6221d632f91b966c6c7e81d,2024-11-21T09:33:01.840000 CVE-2024-4171,0,0,1f56b05b395cd02714b648c07b8a801ca2a6b7d7ba94332e3b402d08208eafaa,2024-11-21T09:42:19.650000 @@ -266250,7 +266250,7 @@ CVE-2024-42850,0,0,d7a8d38a04634f82fc675534d943a1b888f811bb914d5e2f0551167dad572 CVE-2024-42851,0,0,a183967f2ef8595045c6c751447a6b2d914f25c5e17b122917202201a6ce3b28,2024-08-30T15:30:44.113000 CVE-2024-42852,0,0,b81891c57cec62244510e3d84ae796ccaf7c41b7c9858039dc7f4522044e03e6,2024-08-23T19:35:15.240000 CVE-2024-4286,0,0,fc10432f74acfd23bc16db5ad2ae8d1fb5ffa13fb0db5216eff98611dc6693fd,2024-11-21T09:42:32.600000 -CVE-2024-42861,0,0,c171ccea5ad776c157b3e5743fbc5040713688f83926001b0f23825a30a4e8b5,2024-09-30T17:35:11.653000 +CVE-2024-42861,0,1,5ac4827af3e3142d1b282b5930c3cc4ee3777c4ff3aba0df8482c0899ef1a430,2025-03-18T16:15:23.257000 CVE-2024-4287,0,0,b8a2cf136b3083f6bb500806e5afada31dbc16efa97357879361c58428559568,2024-11-21T09:42:32.727000 CVE-2024-4288,0,0,c3337da044993bbbc180fcf8a19f1690cecb1ffe7d7876ad254d73c7461b14d3,2025-01-28T16:28:47.287000 CVE-2024-42885,0,0,ee56590959e67a72b05a6cda20f46f0a9d3647870a63123321ef2d7e471b6b35,2024-09-05T18:35:07.060000 @@ -266291,7 +266291,7 @@ CVE-2024-42949,0,0,9f8b5b4e4aee6e98bf32e4da9ebfb50160519a4d8bbb63dde1bcfe8d1d9c5 CVE-2024-4295,0,0,3497c7c162f234e25b779e6081e0f5f23029726f30fe9ef0567d4354155d7c13,2024-11-21T09:42:33.840000 CVE-2024-42950,0,0,8d3c4f9e5b7f1ae7d57d05493f1a38815f7a0c368c26d7f26f414bdc43ad0fb0,2024-08-21T17:35:04.793000 CVE-2024-42951,0,0,6f1577746b788e0f187288d55cf9bf634b54d40201ad61768940e7c03e4f8018,2024-08-16T18:35:14.290000 -CVE-2024-42952,0,0,8abcc2254afeff2b663dc5abe321781dfa53d10192a55b26d72da03629749a59,2024-08-15T19:30:38.387000 +CVE-2024-42952,0,1,3d34c14baa0aafcceb39ab816d27fbe65cc95e4bcbef306d7b288f1971e33b86,2025-03-18T16:15:23.520000 CVE-2024-42953,0,0,432eba0db092d8bb12f3741838cfce68496139369ec076dbe732be24572f909a,2024-08-16T18:15:18.800000 CVE-2024-42954,0,0,ce001faffaeb5b74a439dd8880ff0db0879d5ece40e545af65a938b67aabb230,2024-08-16T18:14:12.620000 CVE-2024-42955,0,0,44c28e9fd8c2d224e1a27859f754d034a21a8eed8cb64bda1d2ae0957bb5ad2d,2024-08-16T17:35:08.957000 @@ -266467,7 +266467,7 @@ CVE-2024-43196,0,0,3289563bfba313d1a658d9221f9b742518d70cfef918039fc44e6c379e351 CVE-2024-43199,0,0,fcee5ba70074f223c6f2288517860f0fd6af7cbe4c5e3f3003c072f968a17261,2024-11-21T09:35:07.337000 CVE-2024-4320,0,0,66936457ccf92d087f54d9a7056c5f1c270eaa9e639ccc366ce51fdb54afa27d,2024-11-21T09:42:37.150000 CVE-2024-43201,0,0,453483b258239daf1448f7e5203b69017bb10ecdf3ec4f3974614dfa66c011ca,2025-02-28T18:15:27.813000 -CVE-2024-43202,0,0,ff09430528735443017e172da47152249178ba96acf44e33aa7fba1b3f412af9,2024-11-21T09:35:07.797000 +CVE-2024-43202,0,1,0306e27fa0f5d2471ca52d2752524c42228085c0227d9635d8c9c20b8e214708,2025-03-18T15:57:37.460000 CVE-2024-43207,0,0,99a8fcaea9f2d7bca6bcde4834954a187c4e78154a0eef48c8515243d2e23912,2024-08-19T12:59:59.177000 CVE-2024-43208,0,0,6ef73e79f1a23655911b75f5e499093305eae324ee0b651606b8f67181713805,2024-11-01T20:24:53.730000 CVE-2024-43209,0,0,13afd83d8f5f709b4e8cdda05cb0b2f4c1178a58cc15194cfbdf53d99012ba4b,2024-11-01T20:24:53.730000 @@ -266574,7 +266574,7 @@ CVE-2024-43300,0,0,75c9a8b2d238d9cab08f410484f7da41745998025cff71fbfeea803347300 CVE-2024-43301,0,0,aa76f6fbde52ce3291341ffba7f2d98ed66fd54c916fcbbb420fa731de750dc1,2025-01-23T15:22:55.803000 CVE-2024-43302,0,0,44315c5d32383f0113d45ca429d79ac6dd7e95eb518218abf2b5482a33567a34,2024-11-13T01:18:45.093000 CVE-2024-43303,0,0,1c32bbff9bd1187e68e8cd2cca6257b7188e97bbd8b8d913c2954bb21506b151,2024-08-19T12:59:59.177000 -CVE-2024-43304,0,0,a6e4736cb7ecc4711235c300561f3afe260626b72c3d0f4dbf014df002666bc1,2024-08-19T12:59:59.177000 +CVE-2024-43304,0,1,9495c8811a6ca1fec472d6a50052925236aba75234625ec9af7a3bdb1317ab22,2025-03-18T15:29:07.507000 CVE-2024-43305,0,0,1eb70e9c9f6193b1febd8d6e448de0abdea71eb037ab087c9f8fe03828411ea6,2024-08-19T12:59:59.177000 CVE-2024-43306,0,0,c5ce1c97ee2c551a6fa8788a19dd2d6978c52a875878f2df83b699738b025b70,2024-08-19T12:59:59.177000 CVE-2024-43307,0,0,8fbf744048c958ae300202c5f818de882814571bc06ebfdd9e652305b61701ed,2024-08-19T12:59:59.177000 @@ -267020,13 +267020,13 @@ CVE-2024-43760,0,0,0699b036c3a09290ea9d3ac93f3f512789df4a5bccdc81b41420a254e0401 CVE-2024-43762,0,0,b8dfe10bc41a54941c91e23f33f7c446be6ae8c1200d07b09e86c0c499c65832,2025-01-03T22:15:07.640000 CVE-2024-43763,0,0,3de4617186aced8f7b3d48e3a710fa14a6fbbe2a4553f4d993ab1ba76d0b7f88,2025-03-17T17:15:29.567000 CVE-2024-43764,0,0,b8a70c9b4bf3da07474f063814c421df50a0a0e7358525550868f9c97beac2b0,2025-01-03T22:15:07.783000 -CVE-2024-43765,0,1,e4250b40f4dc95af7fc01ebf26e3930da768b2af1b961aea947f144984b764a8,2025-03-18T14:15:39.920000 +CVE-2024-43765,0,0,e4250b40f4dc95af7fc01ebf26e3930da768b2af1b961aea947f144984b764a8,2025-03-18T14:15:39.920000 CVE-2024-43767,0,0,ea82ffa7edbe86b0487005b635a9495ff275642644aff14bb80ea65b81b8feec,2025-02-18T22:15:11.020000 CVE-2024-43768,0,0,d63d3ffccaf584eee421ee122021fb0ca8d78148254dd26c8ab21528b275e51d,2025-01-03T23:15:06.767000 CVE-2024-43769,0,0,2589038c48c31a391cd992614c4f3cec964d236c9a07eb46302073ef1c3a63da,2025-03-13T15:15:47.617000 CVE-2024-4377,0,0,9e469d2c6e38c9024d3118d881da3bdecf42eee078f84183253e0517e0cefe8c,2024-11-21T09:42:43.760000 -CVE-2024-43770,0,0,f01b43d491e44ad66b34234f220434dd71c1e3e43453bafc93ae111fc58bf574,2025-02-18T20:15:18.960000 -CVE-2024-43771,0,1,a4e7cb77edf20f08130c4e5aa48e2f2017a283a33ff6368994d069da352537ab,2025-03-18T14:15:40.117000 +CVE-2024-43770,0,1,ed07f7fae539397c6c9eae082ff026b70205c6df243f99a5dc80f3e02f6d02c5,2025-03-18T15:15:53.527000 +CVE-2024-43771,0,0,a4e7cb77edf20f08130c4e5aa48e2f2017a283a33ff6368994d069da352537ab,2025-03-18T14:15:40.117000 CVE-2024-43772,0,0,1ec9a5f39a4ef31a76fb428e7b3fe8d8c7cda3e7616b1dfc52864acd3e1bbbdb,2024-09-04T12:11:13.073000 CVE-2024-43773,0,0,2ee2804dd1e6aeea0733948db3d41a2e2f68fd10b6eded825d34c62d3248e740,2024-09-04T12:26:08.270000 CVE-2024-43774,0,0,dc2b3ecb213be315188d094eacf95425288510151e247e800354d794585eef91,2024-09-04T12:26:42.387000 @@ -267383,7 +267383,7 @@ CVE-2024-44116,0,0,3db093cb30ace757920a3622484cc0bdca29ee535abcc3c84b1a5cb000a76 CVE-2024-44117,0,0,24063a8ea675bd8c384464e19aae47590abc71a7958f72d6272d1677601950bc,2024-09-10T12:09:50.377000 CVE-2024-44120,0,0,a23eacb95ee3f1b4f51d80cc9486827fe6e631de529164a5d73256be26b01a1f,2024-09-10T12:09:50.377000 CVE-2024-44121,0,0,4d532d7c6744312fd32f52c427e58f8445964eff9054b8b10578350a1d9701db,2024-09-10T12:09:50.377000 -CVE-2024-44122,0,0,83449f5b02b2804c615d09a28c8a2c5166544a782562ba06a1cf55813808f9f5,2024-10-29T17:38:18.457000 +CVE-2024-44122,0,1,f32df93499db118ab4c406d60bbbac7bbac703a6867ed3f3187030a96168dd28,2025-03-18T16:15:23.783000 CVE-2024-44123,0,0,5e708718a9103a7844de666b77bb4fcfa45afc7a8f766a253df6e712ace1d189,2024-12-06T19:15:12.117000 CVE-2024-44124,0,0,a9d97986e080d715e7948f2db3e5c53f7c38344b30162699d2ea9fa1650f78a2,2024-09-25T15:14:13.593000 CVE-2024-44125,0,0,a8620f37f3eff23976050916a02b8df16d65e78e80ce6fb822fb90ae91e4a7a8,2024-09-25T13:30:11.570000 @@ -267402,14 +267402,14 @@ CVE-2024-44136,0,0,47f88abd6453d6797640eb3202b455efa88abb286d5ec26cab193900882bd CVE-2024-44137,0,0,d4f6436a74ca2949527dd50649d59762594e5936bfba7a01a6e8b64ce29142e0,2024-10-30T19:35:16.590000 CVE-2024-44139,0,0,227592f6930f5804ef7361e5c64b194003d6a9fbe8100b1944463ea300dd6852,2024-09-24T18:30:34.863000 CVE-2024-44141,0,0,cf418c986171e3bc9f6e94361ae23fe33ff672a5506240ca7f0249f80c1cacd9,2024-12-11T18:29:33.870000 -CVE-2024-44142,0,0,9dcc3da4377334a284b9c0576064167107da31021f2ac2c1645134903bcae588,2025-02-02T10:15:30.197000 +CVE-2024-44142,0,1,4afd7ef53a2dfe128a5ff6336e36df1d2c0f052696b3178fde4b8df4c9c5a909,2025-03-18T16:06:18.150000 CVE-2024-44144,0,0,9b76d7b551b1f0186bb586552a7b8b7528c49f9926c44e33ae408477bdfe743a,2024-10-29T21:35:14.290000 CVE-2024-44145,0,0,b5a7d8159d070a1738fbfcb4faf809263b03e283915c6233a643bc6179c97626,2024-12-12T19:10:46.387000 CVE-2024-44146,0,0,9fc3cf91a523a17011d8ddc92710ccca41ad98f894b85050d976b55965940506,2024-09-24T16:14:02.090000 CVE-2024-44147,0,0,0010b4e6f55ac982db2f0d22f0bf5765f6a7a167f9f9e0d3c647be24e3c70846,2024-12-12T15:04:03.623000 CVE-2024-44148,0,0,335338cc9709ff206063b9ab9c7d9114b0044f4fd6d0a94bd7c6bf382ee12cf9,2025-03-14T17:15:46.850000 CVE-2024-44149,0,0,6eeeb205f0113be4e2296a27ada921710ab4d7c81a3e95e9aa805acec5d12597,2024-09-24T15:58:38.770000 -CVE-2024-44151,0,1,3adb3cc493ef9fc3cca2cec3a09f77a8995ed8befc9b50d495377265c5c0fed5,2025-03-18T14:15:40.260000 +CVE-2024-44151,0,0,3adb3cc493ef9fc3cca2cec3a09f77a8995ed8befc9b50d495377265c5c0fed5,2025-03-18T14:15:40.260000 CVE-2024-44152,0,0,7550f779a958464ffd932d586cb89d009c0ca7eab9087769b3575744cdc01796,2024-09-24T15:55:06.100000 CVE-2024-44153,0,0,82097411ba307b5977c3f59bb78c96925324f15ed043a95bad15fc0eb0059c7f,2024-09-24T16:19:32.593000 CVE-2024-44154,0,0,8eadcc80f1753ce98600c5eb27ec23345023d248570d997f1192f7f23aac15e0,2024-09-24T16:16:39.947000 @@ -267561,6 +267561,8 @@ CVE-2024-44307,0,0,1f7e71cf7755409ec2cf8830e6d0a0c679d373aedb9b20dcc049bbb014d96 CVE-2024-44308,0,0,acc369578912d118b4a89ca8ee5987b89635f4149292d31f719e55be8c103584,2024-11-27T19:35:10.147000 CVE-2024-44309,0,0,52770843bac18ca9341a93eea8b19ddbef2c8812b70a8cb8a748cb3c19c4c5a4,2024-11-29T18:28:16.227000 CVE-2024-4431,0,0,357eff4f15b095adf7d0d7c2534d815a670275730c5f5456eabe410d4fe83988,2024-11-21T09:42:49.050000 +CVE-2024-44313,1,1,1f3ec35b4cd37cb4cd2ea01256d2b22f4a457d5d957d023b19e5193732ce8bc6,2025-03-18T15:15:53.720000 +CVE-2024-44314,1,1,5b3f5a5e3e1fa0521aea4d61f41e0058fd683a12d6976ab6b201f3ec8eecf116,2025-03-18T15:15:53.847000 CVE-2024-4432,0,0,b1011109a135728159919ca2afb1ae0725b244e2ce50695484274f21939f8b35,2024-11-21T09:42:49.180000 CVE-2024-4433,0,0,52e5c3aa55a76428e5b983f2313a8024c722a32b024bdcff6e4b6ad2cbe2c633,2024-11-21T09:42:49.300000 CVE-2024-44331,0,0,42b00072d48078e0b9a060027e505c6c6396591a3a5817312b42a22a13dd2545,2024-10-23T18:35:02.893000 @@ -267667,7 +267669,7 @@ CVE-2024-44682,0,0,6c8edb929241222c775226e0e9a579a93723389a504b040c56912570abf6f CVE-2024-44683,0,0,4f09b1238998a5a3d9b77f763fcdfbbc3350d7daebe8a7400a76e3f1196f7f9f,2024-09-04T16:41:01.467000 CVE-2024-44684,0,0,ca9a79e91bc9d1c7ddd6ceab423f06e6f37813c82b172366e5088549ad184571,2024-09-04T16:42:01.137000 CVE-2024-44685,0,0,138e5ccb6a247889566b2c8e876848883dccce9dffed61342cd752922384a187,2024-09-13T19:35:14.350000 -CVE-2024-4469,0,0,2acfa1019c2317d8aef7e399b196bfa2e7b6264982511057658094c0bb63f495,2024-11-21T09:42:53.253000 +CVE-2024-4469,0,1,ebd7571b8f63bf30b73793e0af1ba0c52c4215ad276ed86dd2014f9f3ecb5d25,2025-03-18T15:15:56.493000 CVE-2024-4470,0,0,95a96de7675987e789a46492efc5acc2246ba00fc92f0fc9109c8e99235cd5aa,2025-01-07T17:39:05.017000 CVE-2024-4471,0,0,4180714e8cfa916547c68fea005eda3c94d571b570a4287f33686157acb5dc91,2024-11-21T09:42:53.470000 CVE-2024-44711,0,0,620599d0f9bccc5f0a82e6591e0e72db06771c1ec29da729120ba22a8704288d,2024-10-10T14:15:04.777000 @@ -268023,7 +268025,7 @@ CVE-2024-45177,0,0,02e142914736a4d131e4e16ca54722d87db4be6796c690673dca68516f304 CVE-2024-45178,0,0,8683dd9a5cab4c34e39db0f407397a6453188323835c56f9f445f0b82747621c,2024-11-21T09:37:25.490000 CVE-2024-45179,0,0,f8a1e2d319c21f7b4d285e70a197aede9c3922e9add55bf81285495cf99880f9,2024-11-21T09:37:25.703000 CVE-2024-4518,0,0,07158500cac1dd7872433e30649263fdac5b4c1a9d1b0e56782e807a24814381,2025-02-19T18:00:39.067000 -CVE-2024-45180,0,1,21b07801d36cc3d756204c3207b5af3e7b329356676c352984cb9362561c3bbb,2025-03-18T14:15:40.437000 +CVE-2024-45180,0,0,21b07801d36cc3d756204c3207b5af3e7b329356676c352984cb9362561c3bbb,2025-03-18T14:15:40.437000 CVE-2024-45181,0,0,d85fe8450b776dd12e0896d567762d1e44709075751ae449df1ef8eef94490fd,2024-09-18T20:26:26.873000 CVE-2024-45182,0,0,744b0118419398ffc2eda737132cfe2e67a6694bc69f7527796471f039572fdd,2024-10-29T21:35:21.720000 CVE-2024-45184,0,0,5fe4e4003083a04b0eeb7a50ac75543168b7fbcd018d5a6c487cac1cdc809531,2024-11-06T17:35:34.223000 @@ -268696,11 +268698,11 @@ CVE-2024-46258,0,0,f0370fbfdad86ce1dfd5697a2aae76d6a5956ed64072b68df4d04522255e7 CVE-2024-46259,0,0,813dd7d277ffd375ba94a36a8b6d7e69da029202db3e5b5b3ff3980e7acd00a3,2024-10-04T16:40:29.857000 CVE-2024-4626,0,0,e6a81841b054989b62fde9d622901d07198d294f1608fb279a45bf1cc90a81a1,2024-11-21T09:43:14.590000 CVE-2024-46261,0,0,a63083e78a302200fa5c011996104c027553781607ce65625aeab1fca9bebe82,2025-03-17T15:15:41.780000 -CVE-2024-46263,0,0,72d71ad88db3e515c73d65b3f46bcb36aeb4d4facd4ca04d090b0bfd15aec6df,2024-10-04T16:39:33.890000 +CVE-2024-46263,0,1,0d984d366ce7051a7a4d4011e27b0a0ad85aa749d21623f27c3d9c6b6680848c,2025-03-18T16:15:24.023000 CVE-2024-46264,0,0,be06e296b4e59e09e64dbaeda765f7618a669d78bb93ff90d843b411140f4d6c,2025-03-13T16:15:22.753000 -CVE-2024-46267,0,0,aeae934bd4bbfbeed8faaf8bea421e6ed5b96de7ff47d363e97fe3a805aef3bb,2024-10-04T16:38:16.390000 +CVE-2024-46267,0,1,95466a54b42ae4f2a29a8bef81521bf5dd36626b709c1ce331ffa31e6688670d,2025-03-18T15:15:53.997000 CVE-2024-4627,0,0,f7b2668735eda41b9d9726bb9fb33ae297df80142bbb24fc9138372b67a25cad,2024-11-21T09:43:14.720000 -CVE-2024-46274,0,0,e8c90b6947c4da1392f83bfebd900cbdfed8c637485ec4663a2d105644845394,2024-10-04T16:37:30.007000 +CVE-2024-46274,0,1,c5af92c77bace8f2c59a2dee8c7b5a3f6e947c4f43d1511fa4b9a217d91e3f95,2025-03-18T15:15:54.230000 CVE-2024-46276,0,0,7d55d5b3c78e7b1cb07d93cf904b6cdffa90be9a2c801450cf936d1eb8f873b5,2025-03-14T14:15:16.497000 CVE-2024-46278,0,0,4acb28cd7ebc7add3a20d70095d3ee01ce1590ae1dbea75cd2bdc6a0c3af99da,2024-10-07T20:35:10.653000 CVE-2024-46280,0,0,ab3566e0063e53ac2e5b5f7c85459fe370bba081cd349a76be524da46e7b1f30,2024-10-04T13:51:25.567000 @@ -268808,7 +268810,7 @@ CVE-2024-46528,0,0,966deb12dddebc5137dae02ab6860999c025751d4180a1ef1379e24312a6e CVE-2024-4653,0,0,05a0bd75448bb177be53c40d574503310d9260891386f10103a2ab1e0fb8b86d,2024-11-21T09:43:18.643000 CVE-2024-46531,0,0,9332a2250fe65d14bd4c1d2552ff90a02dbd22ee531d6671700e40120c5feba9,2024-11-01T12:57:03.417000 CVE-2024-46532,0,0,fb99bbb875d6e467b1ed3043cedf30d6f1485897b14c4550bd7c98261c85aefd,2024-10-16T18:35:05.480000 -CVE-2024-46535,0,0,0faccbe5747ddca0b9cd91b3993a149493853b34097b7645cbca78207b863f0a,2024-10-15T16:35:08.740000 +CVE-2024-46535,0,1,0db09cdc25f6399278d3de8427309909cfbb4f1a148fef767bc166298eca9e58,2025-03-18T15:15:54.450000 CVE-2024-46538,0,0,36ab03c909d91ed67f1af19450c3d6e48453f6f51660df666d70bd09393db805,2024-10-30T20:45:35.240000 CVE-2024-46539,0,0,ae91e2d70102a1f16abd97afb097daba74795893f1a3d024416684e8f573e136,2024-10-10T12:56:30.817000 CVE-2024-4654,0,0,3ba1a7fb0c9b6d7f54909c48e7df48bad4f328f4a19665a74071d60aed80ba01,2024-11-21T09:43:18.787000 @@ -268824,8 +268826,8 @@ CVE-2024-46551,0,0,612df87ce6e0e5608e0dd96fa0d4ecdea5cb5f53b6c8db8fa2cd7f784a194 CVE-2024-46552,0,0,ef38b41fc7ad89ecb5f9b76e50035628f92ed73a67d682e797587b550bf0ca38,2025-03-17T20:15:13.237000 CVE-2024-46553,0,0,c8de2a7e8aa806380c2aa835d51b78f3297a7c82a688e2dc5667facf1e712f65,2024-09-24T16:41:41.600000 CVE-2024-46554,0,0,67b5c55fe41114fd5d67ee8445c655ce9975bed857a1819262e4e7132dde8a90,2025-03-13T20:15:23.180000 -CVE-2024-46555,0,0,2139881d51d59d0a8ee8f2806997fd1331f57341475afe81fe93b9196e107a1d,2024-09-24T16:41:44.893000 -CVE-2024-46556,0,0,4be32d1dd9b920a2c1fc1b732cd1d545e4d0ffc309d318181ac3cd7f5b8671af,2024-09-24T16:41:46.957000 +CVE-2024-46555,0,1,93e25c9ff9d57ba2124171f562fb12c7a0e1eaa20175ee56b11074f938aaa1b0,2025-03-18T15:15:54.673000 +CVE-2024-46556,0,1,74978fe720028839f26da81b38d6431324fa14c53d9892958a73460e49514d10,2025-03-18T15:15:54.877000 CVE-2024-46557,0,0,323b26a1d408e5772f94bbeb94adec7206ed84c340bd4d60f0299c78ea376d54,2025-03-13T18:15:44.340000 CVE-2024-46558,0,0,c7a5c991c0cc8c3b293f4659645e3fb16dc86228441930c52bace3fa4eec2443,2024-09-24T16:41:49.970000 CVE-2024-46559,0,0,47dcccbfda186ee89df945c3d934892f346e5127d13d5462ac7f684794d8e779,2024-09-24T16:41:51.380000 @@ -268835,21 +268837,21 @@ CVE-2024-46561,0,0,c25954c2fd9d3ad9e3b0bbe0be5d2cc787aa6e3078e6f23b1b9e5e3ce54e8 CVE-2024-46564,0,0,e3650601e6103c25c0638469ece4f175000c7656b133c286eaafe2153db2c0e0,2024-09-24T16:41:55.907000 CVE-2024-46565,0,0,f5657924f5aa18ab256492c2fb84533af8b2d2b6dc20c817da65bf4bfa08a6a2,2025-03-13T16:15:23.200000 CVE-2024-46566,0,0,49eaed23e4e0e48e2985ae061fe7a0e7c41e367260374586bae04acc04a09c1c,2024-09-24T16:41:58.953000 -CVE-2024-46567,0,0,db156d8caa136d073df3062cfe75a136c226f225cc5b035bc1124c685eab2380,2024-09-24T16:42:00.340000 +CVE-2024-46567,0,1,dc3cb195e900cad9c5ba8c571a707de430f78c6e79b59e5d2ca6aa377b09ee20,2025-03-18T16:15:24.277000 CVE-2024-46568,0,0,e7f46f518d6a5bb938dd4a39cbfd460f3e573d24d636393978cf638b8a830521,2025-03-17T14:15:19.110000 CVE-2024-4657,0,0,da1cc5f0f06e951757a7d9aa2ce7edd95b85064e3f725733e8932ef7a9a9ba36,2024-09-26T13:32:02.803000 CVE-2024-46571,0,0,d2aefd540d7a3f69a6c63893a70408e771411a89c3ea4f3a40ecac30e52b1a2a,2025-03-17T14:15:19.380000 CVE-2024-4658,0,0,8e8551e2dad8544932822e63f34e98151cdfa3d6ca2a97c2637382b0eddb6d52,2024-10-15T12:58:51.050000 CVE-2024-46580,0,0,57ce23079d22c520f558cf33d89b6b4b97b97ee6fc7acbd2cbcf182fb2bd3f83,2025-03-14T15:15:42.990000 CVE-2024-46581,0,0,5462b101fb440bc501a98cc921603a2137f1839db74d9038e8e4ca66f70ebf73,2024-09-24T16:41:36.533000 -CVE-2024-46582,0,1,866617c11a3fc07efe3a2534ae130fa8c5d8346f75b270945cef757d5c5a133b,2025-03-18T14:15:40.643000 -CVE-2024-46583,0,0,cf382f8da6cf6ab76f4c4d49ea272d0b3efa763944ca8b322f6d82dbef52da5f,2024-09-24T16:40:48.437000 +CVE-2024-46582,0,0,866617c11a3fc07efe3a2534ae130fa8c5d8346f75b270945cef757d5c5a133b,2025-03-18T14:15:40.643000 +CVE-2024-46583,0,1,17a20f25acc5d9bf41a52ba166de5210dfa2a4bc28de8f998c6eb5cb855bfd43,2025-03-18T15:15:55.090000 CVE-2024-46584,0,0,08f29613e1e223adeeb5f6aff9b13cd88155533380249640b96e771274344e9f,2025-03-14T16:15:36.087000 CVE-2024-46585,0,0,dc7ee54543f1dde85b7ec955c3e56c63aab70e8f4e8f2066fc5d9912f9a62f8c,2025-03-17T15:15:41.990000 CVE-2024-46586,0,0,ee7cb8ef34e89fb8c26b959b710d18e573af1a83392db3e9746a1d21e5db18c8,2025-03-13T16:15:23.420000 CVE-2024-46588,0,0,ee187a25ad0433069fae2e999c985d8a984d51cce26c5131cb4acdf3744f6ff1,2025-03-13T20:15:23.363000 CVE-2024-46589,0,0,c8c4ed997bde83e782ce97e84f35739533cd523937539c1183a8f4a87e466600,2024-09-24T16:40:56.763000 -CVE-2024-46590,0,0,b6d98463aa76d57d6a0122705b07fb816350d8e7cd2a74dba47f6c305e44c00c,2024-10-10T13:14:14.267000 +CVE-2024-46590,0,1,2791d45e5179308ec7bd3f0e9d8907c875b9f3d6a41f40adeb97463fdb458d19,2025-03-18T15:15:55.303000 CVE-2024-46591,0,0,2700ef2facc9b89f7e985c81db4f09383407582d56f7c763e4776a6ab667d26f,2024-09-24T16:40:58.790000 CVE-2024-46592,0,0,76629c413292a6e8bfffa287d4ed8e17ec868be559f837e0a989204ecf4464e8,2024-09-24T16:41:00.260000 CVE-2024-46593,0,0,e27feee37d3b36b7b0adf0271561a5eecf1408b2b98ffac7d2de2274061a26ee,2025-03-17T18:15:18.413000 @@ -268857,7 +268859,7 @@ CVE-2024-46594,0,0,726673ce354474dc1c71192b73cf4514e62c6c6a841b99fd649b0c08b1ac5 CVE-2024-46595,0,0,5fa35ad3466891c938fe0f9ea0c762d223ab31c3f74722a9f8c158af604c27f5,2025-03-13T19:15:48.263000 CVE-2024-46596,0,0,aa55eaec3eb4aedd1fefd5ca684ee59ae098e852d184a578731a56825f726fbd,2025-03-17T19:15:22.790000 CVE-2024-46597,0,0,c52dc232c382bb8b06d8853357df9fa3c69df01498ea057ff4e6221b106d850b,2024-09-24T16:41:09.457000 -CVE-2024-46598,0,0,cc14f076324de01fb0aedc665220d3a3ce311adfb4ca6be3700a7951d6f4c5a6,2024-09-24T16:37:39.833000 +CVE-2024-46598,0,1,9494d7319834b8a66a5df492839fcd1d2e1166a773222ec5cd24bcc96064b3ba,2025-03-18T15:15:55.530000 CVE-2024-4660,0,0,61cefac851d738e6211130f613c3c24b72cb5a59425ed2099eb13a6958c5f9b7,2024-11-21T09:43:19.410000 CVE-2024-46600,0,0,a2edf2944e549d9be47dd52eb91fd1fdfd1682be8e1c383075c7935775b4a0c4,2024-09-26T13:32:02.803000 CVE-2024-46601,0,0,e633f457fab116df7b96ddb36b709936b4c5bb4b333367ed75c1316bcee3af28,2025-01-09T16:15:38.330000 @@ -270186,7 +270188,7 @@ CVE-2024-48120,0,0,b0e650c739b138b707281499471fca0d2a4e71d5ab6d1ef4874ee3da12ecc CVE-2024-48121,0,0,7efa2761b19279a3b34df1a38c067e9528e726cff9ea5fc64d7fbd8302241d87,2025-02-03T18:15:35.503000 CVE-2024-48122,0,0,4d44b48fcc50f22b0934d4f02fcb47c2748daafc2a3b5c9c6ad8a758fe399423,2025-02-03T18:15:35.670000 CVE-2024-48123,0,0,1645c7813970614afd39e9118ff9c4d0225958c4f0f7d5fb4ffc1c6d3d89d3ae,2025-02-03T18:15:35.827000 -CVE-2024-48125,0,0,57e46888d81b26a68ee250b379874772b4b388bc16a033d2d9c2c0c4e3e2f426,2025-02-18T22:15:11.873000 +CVE-2024-48125,0,1,f8e51df502b7c7ca7c0428c52b46824cfc761a242f428f589aee1b343f8f0d65,2025-03-18T15:15:55.733000 CVE-2024-48126,0,0,3fd5ff5d24d9a5b21eda476d45e24ca4584c8bb2748e97ea3ebb4484645506c3,2025-02-18T22:15:11.980000 CVE-2024-4813,0,0,5b76e82432dc8147deff997806ac277b77cb0668d5b39ceb34b0d5ddb9b6e99b,2024-11-21T09:43:40.333000 CVE-2024-48138,0,0,1cf669aa62b7ce9fd297b61c1300f02586ab21a6411386c8391a654aac137760,2024-11-01T12:57:35.843000 @@ -271186,7 +271188,7 @@ CVE-2024-49696,0,0,527dc628015bfd53942eb90e4ad813b4a45b3c729bd97fce7834df7a63766 CVE-2024-49697,0,0,530eb2f42eba87aaffb73d54c4b9e27dfb5194483cfcc3edf311ece4f08a0142,2024-11-19T21:57:32.967000 CVE-2024-49698,0,0,0da674ff14e9a1aa3e4bc23d228b70f80e183926d4686276e19237b19658e09f,2024-12-31T14:15:23.697000 CVE-2024-49699,0,0,4ee8c413bed1ffd4b90762f39700b8d457afb872cbe86f74864072dd78b97b85,2025-01-21T14:15:08.780000 -CVE-2024-4970,0,0,ceae782189e36ea72b2794d871ba0e98c5d8d6d33670b120902bfb4e771c4acb,2024-11-21T09:43:58.627000 +CVE-2024-4970,0,1,79daa602151eaacf2520b960e10e3437c5c7370ad2718a07f80b855f1b69edf7,2025-03-18T15:15:56.680000 CVE-2024-49700,0,0,606a86305bfba31869c39264028e7e019fc9f7bae42891cf5aedbc545c1d9faf,2025-01-21T14:15:08.937000 CVE-2024-49701,0,0,faa8cd67d7f87e8b700116e3ea01c26a0bace35a674e83df64e802c479757838,2024-10-25T12:56:36.827000 CVE-2024-49702,0,0,95504b65313eac7b0c032b66b56870b8b510aa5556c8e61dadfd6a9c41944713,2024-11-08T14:32:56.010000 @@ -271201,13 +271203,13 @@ CVE-2024-49733,0,0,a7cfd89aa6b68cd8e5485019a4fd0f48d39b9467d3009297e3ab752caafca CVE-2024-49734,0,0,d3ac72a6472c8268b87f5e0ca1ede6b7f0075e81c16015023e7581e9e5cd8dcd,2025-02-18T20:15:20.197000 CVE-2024-49735,0,0,381b13f2289a1d9d2e9810a796a05a820e91e45c1c91962db6361475dee67c06,2025-02-18T20:15:20.287000 CVE-2024-49736,0,0,5d65034e6a437bc35da6f6c08397a0be0e0a03d47f9f43cfc258478cf4b7ce32,2025-02-18T20:15:20.373000 -CVE-2024-49737,0,0,190edc0929156245d0a3dd63e3e5eec45ca29fc09375fb72e2a732babdd62141,2025-02-18T20:15:20.460000 +CVE-2024-49737,0,1,2f6456a9f22f2346277a02e29134a095f6eccf4b39f2349397f72512d530949b,2025-03-18T15:15:55.933000 CVE-2024-49738,0,0,7ce66d89b5844ba38fe605f390e511e357367d07690c9220d86fbb73538d8167,2025-02-18T20:15:20.543000 CVE-2024-4974,0,0,1d9bd4071db4fba1455c875ceb689e947c4ee6c2af41f307cb1599a445ebc5d5,2025-02-18T18:41:36.180000 CVE-2024-49742,0,0,3c8ea0e80314a8acbdd42653f46a7083a0424366713a970835ba57a6d24efeca,2025-03-13T14:15:32.930000 CVE-2024-49744,0,0,fdf222f2037b17a852e00287bd367289c1e17112249d40b0fa59d066982c2c2f,2025-02-18T20:15:20.720000 CVE-2024-49745,0,0,3f919f7aa199c54c2341d3074c8c5b46e0ba6fcf2550fbd12aba17e82162ffb2,2025-01-22T15:15:13.707000 -CVE-2024-49747,0,0,74e3d425dced680a101eb5b5a196b8328c60686662eb6d14028d30343cfb09a2,2025-02-18T20:15:20.893000 +CVE-2024-49747,0,1,64661a74e04161519a03376f9233f8f23700a190185ff50de8ceeafd58161799,2025-03-18T15:15:56.117000 CVE-2024-49748,0,0,9234639dd18e0fb6aa52dd2164c77c6468dfa4953a72026bde79f96e9a60f327,2025-03-17T16:15:23.360000 CVE-2024-49749,0,0,f2d8d84256de3e70c30724c05f3ac65beb20293062d04373d0d95a5177f08b3c,2025-02-18T20:15:21.073000 CVE-2024-4975,0,0,7306049b298e2c8d2b7c91924a39c6bd95187aba6b38bd8d420b6dfbf4f5f2dd,2025-02-18T18:42:21.327000 @@ -271268,6 +271270,7 @@ CVE-2024-49817,0,0,faf269773338cb40692b44da53cb55c3f9c6f56cc98bbe6ac46416bd80e96 CVE-2024-49818,0,0,148b4e77a026b651bd8bac5c6677434a12ec93c5c55e11ec99c033a2167f5317,2025-01-07T17:20:08.497000 CVE-2024-49819,0,0,18989ee02215782dbaa36dd11585d529ff7cb27112e595064942a9ff9397ee70,2025-01-10T17:52:26.793000 CVE-2024-49820,0,0,fe904aab3b1423196226c288487d3e9f35952361c8f61f2d528fcf7833452731,2025-01-10T17:42:53.707000 +CVE-2024-49822,1,1,b1a0f483b9bd91f45cc08ba87edb06cf7e3e74576d91fd585a06a09ca301f9be,2025-03-18T15:15:56.283000 CVE-2024-49823,0,0,b9995d30c3d89f300a49ed834da93e73c4c732eba4dbf905de0dceb3a3258543,2025-03-11T01:15:33.583000 CVE-2024-49824,0,0,4072c1a943cc33d63481a74407022b24878ec14cb5f9e9fc6f5cb6ba7f3e8966,2025-01-18T16:15:39.183000 CVE-2024-4983,0,0,b82ab4bc704d323c7d9f24e0a3641c93b0503dba6a5392acd5923000e9eef05a,2025-01-29T18:07:43.813000 @@ -274323,7 +274326,7 @@ CVE-2024-53939,0,0,63ec4d4d8a57c7e9203228b0cd3c3c84ff0fa6ec3d0f30c37967d23e20f39 CVE-2024-5394,0,0,904601bc998a9774591874674f6528e3f4d37d37b943ba318b80c83e6b313c7b,2025-02-10T16:23:11.417000 CVE-2024-53940,0,0,04215bb77d44b273e9849b212da1715e4a88663d0a04d658e8b426292d6b2d3d,2024-12-03T19:15:12.910000 CVE-2024-53941,0,0,958fbab1dcd158d91125ecb71056e34e403404760a1ce78a6e1b2e3ede2a0630,2024-12-03T19:15:13.113000 -CVE-2024-53942,0,0,a82102ce95ecba9d91a325449993277e8666efd3fba33597504408ca5c2b2e17,2025-02-03T18:15:36.633000 +CVE-2024-53942,0,1,1f32b1e3201355e04ec4f3536407d1e7f9e40d7082e639005284dda85dd8cb78,2025-03-18T16:15:24.517000 CVE-2024-53943,0,0,437d28c72b812c4593516003fc2aba4b613f671a694938fbad086ef025289004,2025-02-05T19:15:44.257000 CVE-2024-53944,0,0,22692dca7fe9bf90c709d562a2f5e57fc8a071e9e5f9d218e87c93a1c791fa71,2025-03-04T15:15:19.667000 CVE-2024-53947,0,0,e2f76f81a7b4b04a6a0933301af0327b41592be00ca6e33f47671fd393eff3dc,2024-12-09T14:15:12.267000 @@ -274858,11 +274861,11 @@ CVE-2024-54531,0,0,4ac4afc6f09e7ffcf7b8ffd70d60f30d481febc6558e33c0b30a021721851 CVE-2024-54534,0,0,0a85dec86735f55fea4f61a67c35ec7283b453bf2b186b2f2a85ccae12df64e3,2024-12-13T19:15:09.890000 CVE-2024-54535,0,0,93cfc2e3f7ef6acbc5dbb1cc184a51f7781d104271fc6b2624d565551722e790,2025-01-23T22:15:14.160000 CVE-2024-54536,0,0,c98f603f951680ba4768b8a781e9ee4b1b50a2e9974ad3ec2a10b1d650e3b438,2025-01-31T22:15:10.077000 -CVE-2024-54537,0,0,d4cb98ff4acfb0d30c17b5195cfb52dbaee99c3766546d33bed5db683f9ca00b,2025-03-04T15:22:23.180000 +CVE-2024-54537,0,1,c68a6744bda0bf69e01783e98c5c4c4076f531c7f9b134c973d8c4233177cb65,2025-03-18T15:15:56.877000 CVE-2024-54538,0,0,7edb6abe162912ee005c390ccfee8e5c4c4cb96a25890eec5d650424cab9c014,2025-01-06T15:11:09.817000 CVE-2024-54539,0,0,01a7d44c10c6c32e638c545d288dcc2e4fdebabd02bc742815f2f95b4b761502,2025-02-18T20:15:21.923000 CVE-2024-54540,0,0,45cbf8d0efbe2b50a737f3ba5c71b070e28795ef3412a885891858b9f7aaea05,2025-03-04T15:42:52.453000 -CVE-2024-54541,0,0,9eb31cc1d58cfd2315f407b93bc0d1327da0fa870162c87480c553f25ee2693e,2025-01-30T17:31:31.880000 +CVE-2024-54541,0,1,f19c7b13045c8627a2b5a1173512bbfb9d625759e2824642b40f1cbcb1e144d8,2025-03-18T16:15:24.763000 CVE-2024-54542,0,0,e5a094da59025f31a497ea83cee49e2f88eb5fa3b5158cbc7466b9e85c396b28,2025-03-17T17:15:34.087000 CVE-2024-54543,0,0,603876c5dd2c62a2a366bc570ded9afb84d36803ecff2c07cec2b1684773ae76,2025-02-05T16:15:41.137000 CVE-2024-54546,0,0,74d2474bedbfbd0ad3c983a84a08e8278cf35ea05d87ada33d51119288ecc61e,2025-03-14T11:54:22.363000 @@ -274911,7 +274914,7 @@ CVE-2024-5472,0,0,5e12957cd076edb077638ab18db3a7202837e8fd64948bba00e3365a85b541 CVE-2024-54724,0,0,ba745a806f7adf5ec3f012771244838e01c7aa8ab9a8bb0162dc83573ba19f7a,2025-01-21T16:15:13.583000 CVE-2024-54728,0,0,de230d4ec76cefaf9e21b02cda086da5b830bf0b08010b441eb32fb7e5480358,2025-02-03T18:15:36.827000 CVE-2024-5473,0,0,fdd6160c6121db618882f16bfc9c17f8c3a2501715cb9519638ef5a1fcd2441d,2024-11-21T09:47:45.190000 -CVE-2024-54730,0,0,aa6b9f27e94b92dbfa122c9d81d22d63c3b53a20f3a5f2802c287c836fc62d24,2025-02-18T22:15:12.677000 +CVE-2024-54730,0,1,95ca640b793e47ed1368aaa3d27ab3cc7f087f6826888174e3e59e510389f8ba,2025-03-18T15:15:57.073000 CVE-2024-54731,0,0,acd86fbebdd274bead6535bf83cf37467581b483235e177fd7e87a697a25d37c,2025-01-08T05:15:11.810000 CVE-2024-5474,0,0,63893131768de13d83eb37c8075bce21b1c0f49d4d852fdf9f27e69aab8b3e48,2024-11-15T17:00:35.697000 CVE-2024-54745,0,0,fa6c31d7a2d0035c561f7b97850c2a530b0e2e38d0e9249ae4c46e230cdcbc34,2024-12-11T17:15:20.460000 @@ -274967,7 +274970,7 @@ CVE-2024-54907,0,0,80a392b1154d757e3dee13d617bee74a64b3baf8f41f4c6bebbb399698b18 CVE-2024-54909,0,0,e09df11f9fd23515b803ba3007fd40230638945f3a2c3c6e417f7f2b8d8f42bc,2025-02-12T15:15:15.220000 CVE-2024-5491,0,0,f430fd5a631d3836b39db69c0e7e21d3595a43a4e0a9c7d9dee8bbd76daa2dff,2024-11-21T09:47:47.017000 CVE-2024-54910,0,0,6581157280a10462a6b1d5622c98ff4607d8f7315bb6a89f500333c22a07f58a,2025-01-14T16:15:32.953000 -CVE-2024-54916,0,0,5d74cf5d7b441491d0dc9f2dfa79ebb2247618416e120b9804fa9c61da088c18,2025-02-18T18:15:26.657000 +CVE-2024-54916,0,1,c187c44e77f1284caa57fa2c5d09aa5819a1e6e1279a77edd94c2a7b2803ab06,2025-03-18T15:15:57.267000 CVE-2024-54918,0,0,8d1c74ed435285d94b09f28fd23f5ea9a7eeb2cd4aab9028349afde0dfc746c6,2024-12-12T18:15:25.790000 CVE-2024-54919,0,0,d240fd7b13ed8b141b8975d3eb4f4e201c9093f582cb0ecbb49a96c5b085f2d9,2024-12-10T18:15:42.770000 CVE-2024-5492,0,0,69e032d7889ecfac9ba9e43b34f5fb521197e5e97d6fe94180bc88bb517b1262,2024-11-21T09:47:47.140000 @@ -274980,7 +274983,7 @@ CVE-2024-54925,0,0,0427713396623991c3eadd7c380c12566f7b5c609830b6d9ab4f9a3524125 CVE-2024-54926,0,0,99308ee0c7bdb2555270e9769b907fdbadfdbd27447c982cce941529cd8dbe0a,2024-12-11T17:24:11.403000 CVE-2024-54927,0,0,743cd5f75576f93b89277c4c4bd309f2a9d5d44818b55b3d4433a9a3e5ce11c7,2024-12-11T16:15:16.360000 CVE-2024-54928,0,0,c0b3aee5ee0c3359e1bdf75741044319f3b2ae90c5d6a8fa2f4c6b96dad60fe9,2024-12-11T16:15:16.590000 -CVE-2024-54929,0,0,028424391bfd0e6e1a80decba8ca8422fb184a112971073f186a5d0b3e71e96b,2024-12-10T15:47:10.800000 +CVE-2024-54929,0,1,c8d5972e955c04324a51b1cf20a15c2def5520faa6dd30371420b7f5410130a2,2025-03-18T15:15:57.460000 CVE-2024-5493,0,0,e28052dbe6c7953505a06f636383a79eb3b96ef55b7ca08e8ed256a1f6ab6ea0,2024-12-26T16:36:54.357000 CVE-2024-54930,0,0,59137406324a26fde678f077cfa8b27bd914be08b6757bd42247e4c52270e1f7,2024-12-12T18:15:26.440000 CVE-2024-54931,0,0,ef3fc2dbe9a46d49c1248bd262a192fe17792d64b5abf18c5cb4f9afa4b62ded,2024-12-11T16:15:16.820000 @@ -275091,7 +275094,7 @@ CVE-2024-55268,0,0,5f3c37cf8158a1c44928734f909dc42c1030ecc39541485d8d944019f4ad5 CVE-2024-5527,0,0,d332540fc72a82323997817d4e967456b7cfd92130ba717f37312bb67a51dc8a,2024-08-16T20:24:34.470000 CVE-2024-55272,0,0,6e108f0e2cf675b62abdd4438f3d6786bca417f797f9b02de67c6172540f9241,2025-03-15T16:15:13.813000 CVE-2024-5528,0,0,f6c42b7e3780f6a788afad957fbc4af53b8e35d036bf5498b6d14206ce32a452,2025-02-05T20:15:45.090000 -CVE-2024-5529,0,1,095ee1b4a7c2e06520a57f410df528bd70394e4035579229461d97ba32a6aca4,2025-03-18T14:15:41.210000 +CVE-2024-5529,0,0,095ee1b4a7c2e06520a57f410df528bd70394e4035579229461d97ba32a6aca4,2025-03-18T14:15:41.210000 CVE-2024-5530,0,0,2d0b01cc83bfe8893d941d6bfdb13cbbc2a5c286addf6d9a79089f227ed325e3,2024-11-21T09:47:52.657000 CVE-2024-5531,0,0,866202d58b8a007888ee981e0536a62604559a6a86161db07d9686c5885862fa,2024-11-21T09:47:52.777000 CVE-2024-5532,0,0,23c4978c8c684edaa8b0b6827b3bbdb5dca4d9ba0bc473042cb29ea594ed00d8,2024-10-29T14:34:50.257000 @@ -275313,7 +275316,7 @@ CVE-2024-55955,0,0,18cba96888915c0389c7defca71606c5156a68e05c936a654d308cd47645f CVE-2024-55956,0,0,8e003bcd83f36937e9a2b31ec691c414788f321d9d46a225376429f5508797ad,2025-03-14T20:48:26.473000 CVE-2024-55957,0,0,6c602e0f76a20fda7f42445c9b864adcf6a396fd8cae1204da3e63207ea97994,2025-03-14T16:15:37.410000 CVE-2024-55958,0,0,805e9804f2e0f436a8b6462c6f5ea66eb72f3312c0b5dba8bff8785036cb57cd,2025-01-22T22:15:09.453000 -CVE-2024-55959,0,0,0c112c41f01d572027514a2e95890eb8f4ecc8f8dbd1a6a2d79a7e944cdff100,2025-02-18T21:15:22.793000 +CVE-2024-55959,0,1,e15201f3fe07c29fc504912bcda6a1d944bac3e2bdd2796e6ef3e6f7a8349e22,2025-03-18T15:15:57.693000 CVE-2024-5596,0,0,eb53dbc41b5b12ac359e7b7f77cdb6558119327982ea8ec36e1ee0087b4d4e06,2024-11-21T09:47:59.330000 CVE-2024-55968,0,0,21a8f37c739d149bd1e4df9fe706dc30398d1cc47207bf8dd29a76b83fa74cf7,2025-02-18T19:15:19.413000 CVE-2024-55969,0,0,1d80cecd30844cd68ce96a6b7ee5ef5d3b9107e1b08adee083a129c50a18336c,2024-12-16T17:15:12.337000 @@ -275605,8 +275608,8 @@ CVE-2024-56302,0,0,3cc2e63549a8e725e4b4c7af568502951e05c6a235ad3d0ca614770a8ee20 CVE-2024-5631,0,0,1180039d5b51b355c10882902757c5bad7937e7ec31e81b99a019ddedc795440,2024-11-21T09:48:03.210000 CVE-2024-56310,0,0,a3b0ecf50e8c7209a61a57095969ecfd6c116faafd65e192eb51abe661a5112b,2025-01-14T17:15:18.487000 CVE-2024-56311,0,0,a5f3b806b958921d1fdd47ae934460856fc391070c28ff5582bd271a9abc04fa,2025-03-13T19:15:48.973000 -CVE-2024-56312,0,0,a105d2d2c496ae4a31974572451f1a2391cb63512239c561ea05256145cfc002,2025-01-14T17:15:19.057000 -CVE-2024-56313,0,1,1b88794497f6eabc0004fec8ac6a8d185d6145923adb3ec2e2c9ede1c7b79c65,2025-03-18T14:15:40.837000 +CVE-2024-56312,0,1,ec6ad9e3aff51a846de9bba86b7c3a52a17ae2fffb31510f4ca2dae81601a513,2025-03-18T15:15:57.893000 +CVE-2024-56313,0,0,1b88794497f6eabc0004fec8ac6a8d185d6145923adb3ec2e2c9ede1c7b79c65,2025-03-18T14:15:40.837000 CVE-2024-56314,0,0,2ec81e76657f1aae1b2ad4a137a9dbaba36a59900a9638d6a55212d105f32134,2025-03-17T17:15:34.553000 CVE-2024-56316,0,0,cbe94587bc0fb5b8589f39655433a6e6725350771ffdee3bdca651a1d62b333a,2025-01-28T20:15:51.320000 CVE-2024-56317,0,0,8d6cb761ec1de8db3f8894652188d82bc1e600feec839db7f7746cdf2c5b129d,2025-01-02T20:16:06.723000 @@ -276056,7 +276059,7 @@ CVE-2024-5687,0,0,9369fec80d103c4a22eb73ec3506b871dd90ca5a0f07d3a11cd2907750f404 CVE-2024-5688,0,0,59dedd8cf99f47d5410a02cdff5c904f0e85c6f33d87952e208dd952bab09c4a,2024-11-21T09:48:09.993000 CVE-2024-56882,0,0,14ad5dd23b7cd0e6c0aca460d9e8ac5675d52da6a819b7bb02768fc85dd49dcf,2025-02-19T15:15:14.970000 CVE-2024-56883,0,0,f99cbbbe44810ecf20ee9a822aaeeb39d677436c7acf1f70c821dc9769f4ff38,2025-02-19T15:15:15.140000 -CVE-2024-56889,0,0,4693f62751a5a06c0b0a9e5d42dd6535c82427b71471993dfffea8ef941252b1,2025-02-18T19:15:19.770000 +CVE-2024-56889,0,1,5327859a7c5496e1e94f8bb9c02a37e2b8342a40649f534ed6f47845e36ee4d6,2025-03-18T15:15:58.090000 CVE-2024-5689,0,0,7954cfa7cab5c9d284e75ff2916a8e3e6c71cab8207a342db66b72c3a9729209,2024-11-21T09:48:10.193000 CVE-2024-56897,0,0,c86a728646b989ba2c34050e6cf558894a483f9e45fac8ad92b270dc1bfac754,2025-03-03T20:15:43.540000 CVE-2024-56898,0,0,6acb612a6a6d6abd3f207db73f49bdae4c033cc146d6a92b4e551f8b5a4c516d,2025-03-04T22:15:38.990000 @@ -276115,8 +276118,8 @@ CVE-2024-5701,0,0,9915dfee3e359182f9adc135791d10f705664babe0d2fafe943bf47d667472 CVE-2024-57011,0,0,00d9ca4de5bb838925ec85abe37499c50478611ba15145e710280c1c3635eb02,2025-03-17T17:15:34.950000 CVE-2024-57012,0,0,d12240ef1721114c58f109c402370244e27f23301561d4b425a46b9b4be84383,2025-03-14T16:15:37.603000 CVE-2024-57013,0,0,6e08c562bc43fbe99d8ca48ade9028273e79bb54bf7163d05964ffad7c768b3e,2025-03-13T15:15:49.867000 -CVE-2024-57014,0,0,de4aa7a9315f76bdfcffe2092ed70c917442fbca43db8473f76cf25db406bb89,2025-03-10T17:22:31.577000 -CVE-2024-57015,0,1,559c1f41db4b07569fd8f34461ee4cc0ab9cf8abb8f4d26444e2fdab359ec49f,2025-03-18T14:15:41.020000 +CVE-2024-57014,0,1,84deb770bd64faa7ed60e93911d565a754e913ea099e5e0ce60d8379985af92a,2025-03-18T15:15:58.283000 +CVE-2024-57015,0,0,559c1f41db4b07569fd8f34461ee4cc0ab9cf8abb8f4d26444e2fdab359ec49f,2025-03-18T14:15:41.020000 CVE-2024-57016,0,0,850796e338f48f156536ab37f7c45119c2b091d349009a63d7b83d5a0edc22f7,2025-03-10T17:23:48.830000 CVE-2024-57017,0,0,54624e242a7ea72e546dbcbe3522ad91dfa297cefabac8b613307955396e3be0,2025-03-13T15:15:50.090000 CVE-2024-57018,0,0,88513ced169b42c06a35f5f3dad8af71ece115206cec42a161e21a49cc4393f2,2025-03-13T15:15:50.280000 @@ -276188,7 +276191,9 @@ CVE-2024-5716,0,0,3d427df7306e5a73dc01967e843a1c8b689a272b3aba62391281a97b5c9d3d CVE-2024-57160,0,0,21efe21d39d81640d4b28d9b56e9e9917bc8862bd99f1332fce5cfffc07d8da0,2025-02-24T19:38:22.867000 CVE-2024-57161,0,0,2a35bb3f44d198292743676a0dabcc3033caa3631e24c5b8bbfb982d9a2e1148,2025-02-24T19:38:43.083000 CVE-2024-57162,0,0,2a8638ede0fef2149256ad633e78aa3419429f31868ef919df843d896f6f8d83,2025-03-03T15:52:49.507000 +CVE-2024-57169,1,1,17414b28a0256898c0c215c25432730c0d9ec182a0ec85c72f79f802a7b2bc50,2025-03-18T16:15:25.013000 CVE-2024-5717,0,0,fb2d4ea07d345b00fdb2b42ddabd6660deece1c7e8bb1f887295d0c9d91575e3,2024-11-22T20:15:10.227000 +CVE-2024-57170,1,1,0e3b06089dabeca0972faad116cfb8f14a23fde54f5e46bcaf55e43033ce9516,2025-03-18T16:15:25.180000 CVE-2024-57174,0,0,9cbb2f1e59fb66a9481612c580e31a8e5ffdd83f7fc0b62821d7143abff3ec40,2025-03-06T22:15:34.977000 CVE-2024-57175,0,0,e96a8c9420e12c8730fd044f61e074cae6b4f8900e0333d25afa5aec6b9ff461,2025-02-03T18:15:37.437000 CVE-2024-57176,0,0,f6b48d7368bea9a17183712b0b2f4847bda1b46032a5509ae05c1b2bc856580f,2025-03-17T19:15:24.250000 @@ -276250,7 +276255,7 @@ CVE-2024-57348,0,0,326786da84056ac79f3b88de6fa9f5293848469c4646131950b6409fb7ba2 CVE-2024-5735,0,0,d1bdbe15c58b88695f8700f15664f71a22d2ab1509942ff0bbda761cf134cfd1,2024-11-21T09:48:15.447000 CVE-2024-57357,0,0,7a4bd99721fa027b620ab5a55131dc9d19154d8b71aea2a7b20fcb3acdf7626e,2025-02-07T23:15:14.550000 CVE-2024-5736,0,0,bd1e900a757e864d07315e8306057766ada5f6519c6af0f8d1f246582ab8eb48,2024-11-21T09:48:15.580000 -CVE-2024-57360,0,0,d5d33846fab07f6d20c55d3504eddbf1bb13244cfdf074f31bd53c67ac99bd53,2025-02-18T21:15:23.853000 +CVE-2024-57360,0,1,7e76dec1d03fd94ba44fbb2404e6e39dc1000d8c999f78535692ff4e980cedf5,2025-03-18T16:15:25.340000 CVE-2024-57362,0,0,50988e95a9041076561946b9e88bf3f17ff6cab2639092f1509fed53be144855,2025-02-03T18:15:37.613000 CVE-2024-57369,0,0,0beeb3a945370495c7fab19794a2bd15bf04ce80c00d4b38b5b7c779de67923e,2025-01-28T21:15:17.933000 CVE-2024-5737,0,0,cd5c6423a27e90a610242cf52e502989ca1429c1507f238a032817178b3a04ed,2024-11-21T09:48:15.713000 @@ -276294,7 +276299,7 @@ CVE-2024-5746,0,0,983f92b35d2851c40a6d833edd298ce544be182f3cbb073e4d5723a1722836 CVE-2024-5747,0,0,b0a73052a2b0fb8e91ca0186eb03a0a139ee155bf24624c988c4f85a0b80da72,2025-02-11T02:15:35.543000 CVE-2024-57471,0,0,046199a988b5112e867977ad6d82bd57c13f52bc945d9be0e662c5b8b39ac509,2025-01-23T17:15:17.410000 CVE-2024-57473,0,0,d4deaefeb6fcbba59b8ce003fdeaebe59c96858a04f801a87a31eff516a545c7,2025-02-18T22:15:14.820000 -CVE-2024-57479,0,0,1c509d2517740d3b5beb13069ea9b358fcdb451e6e34c2c212472ea271ddebac,2025-02-18T22:15:14.930000 +CVE-2024-57479,0,1,a4fc4c04a4d0cd0e22b8fe1e9d84faf33bcfbb80c5a2b55e9ddb9daa820188a9,2025-03-18T15:15:58.493000 CVE-2024-57480,0,0,d0e18883e6902266b54d62d4eac19e51374b774a1c6f5c92001e711068cdca61,2025-02-18T22:15:15.033000 CVE-2024-57482,0,0,859c1ed6b53c872a2c976c747abee784c7f6cb88ac30b945b593d0bb4868f5bb,2025-01-23T17:15:17.677000 CVE-2024-57483,0,0,d80de86b8577cf6f4a0d95e5f2ea9968ae2b8769217aa4f6a37a72d077531697,2025-02-18T22:15:15.143000 @@ -276350,7 +276355,7 @@ CVE-2024-57598,0,0,f942cb84c2609b2961d7b373816f9239192ede7b991ad3bd5a46392c1f31f CVE-2024-57599,0,0,08a6b92156dbb47043a13e2f6a8f470b6ff2d84a2cc52c57a2605bc11a655e8e,2025-02-06T21:15:21.760000 CVE-2024-5760,0,0,fdcabe1f95ff5e6dbce832204c1f64827ff6fe6277e57163fb295e96d7b29093,2024-09-13T16:28:43.077000 CVE-2024-57601,0,0,53bfe5248e0c55062379b5772a0e365478a7cc4522b7eb09c12bbfc53a9014ac,2025-02-18T18:15:27.663000 -CVE-2024-57602,0,0,6fe666c0f6af4cfac4d7da5cef43b98ce0d8efe96257780d13ef483c2c9af379,2025-02-24T16:40:27.567000 +CVE-2024-57602,0,1,226d91ed331e63f738fd3b8b845736eb5a7fc570a3a123d5ea996b5176962aac,2025-03-18T16:15:25.597000 CVE-2024-57603,0,0,8818c006a29d6f4bd13b4237aca8900d379684c37788b65eab93543c45a04038,2025-02-13T19:15:13.890000 CVE-2024-57604,0,0,543c5b4910b41c72e908210bd3581236fe15916a3051d75b0cb98013a23bf9f9,2025-02-18T18:15:27.827000 CVE-2024-57605,0,0,7963b6f1477133cb94cbd1a3b1ada130c7fa95a02e2999810ff3a185f251a2ce,2025-02-18T18:15:27.983000 @@ -276417,7 +276422,7 @@ CVE-2024-57663,0,0,af724e08b2512d2fac8b54c94a21a2980259518668a0fc995304976d26139 CVE-2024-57664,0,0,a6fa34a691d9da68c87bfab6ccf4d259a0f0e898f32cce10aaac7c8f53eb5576,2025-01-23T17:15:18.160000 CVE-2024-57665,0,0,809d5e38d9875ce8f564eef43bf055ef7a18d727db5a6a5c84b4ec0d4427f2c8,2025-02-03T20:15:34.787000 CVE-2024-57668,0,0,6f321cda73040cf73bf295b23929186d4ed960cfa7a79684cd741fcaef7d989d,2025-03-13T20:15:24.613000 -CVE-2024-57669,0,0,2f4fc4d2260e34d110875389bd7ab9de03534a7c899c516b99b914ef7ba8823b,2025-02-18T19:15:22.490000 +CVE-2024-57669,0,1,87899ccbd34646b3b6caeac8f72ed276a8eeea44e46d38da3287be37e70981c5,2025-03-18T16:15:25.960000 CVE-2024-5767,0,0,83b611dd489bb163f66e83f90bca18a4479f0bb38020979c04a07f5718f3596b,2024-11-21T09:48:18.420000 CVE-2024-57672,0,0,67f9c08b270323d767cae96aeef593c59014ad489b52f9f2cc6081b31374ec77,2025-03-17T17:15:35.323000 CVE-2024-57673,0,0,072239101434e909ba50c8e42bb421d6a995a048d9e78b5c6cbf47de0427e1bf,2025-02-18T19:15:22.723000 @@ -277066,7 +277071,7 @@ CVE-2024-6152,0,0,56e39ec64bc38c4079fcca10d552cf2ac8153d4adf04ef1eb4977bff49f159 CVE-2024-6153,0,0,aae068275d4c4e63555b57416b174ee8f2e1ff96ec75d6bff3d4c959289ad262,2024-11-21T09:49:04.707000 CVE-2024-6154,0,0,44eb11c4fcc6c6616a2ed49e485a415327653c78c87a2ef8353cb2a27dda49c2,2024-11-21T09:49:04.847000 CVE-2024-6155,0,0,bcb0f3810af0585d1d27c2ff5653a3f57ff68bc54a136b27388e3e12e4cabf55,2025-01-09T11:15:16.330000 -CVE-2024-6156,0,0,ed2080432a92897efaf31c0ac3d09606d8e76b43d503d06d631742410471368e,2024-12-06T00:15:04.380000 +CVE-2024-6156,0,1,afb9aae17b935d1bada05ea12a21355dcb31768548000d2e6cc6be2d61619576,2025-03-18T16:15:26.213000 CVE-2024-6157,0,0,5be8de9f177d4f5bffe03509876e18a408a381753d90da1ebea280d1d882e02c,2024-10-15T12:58:51.050000 CVE-2024-6158,0,0,259665afaf15722a4d969735b84a2bbadf645404975cbe690c673aedfdc3c5bf,2024-08-13T15:35:29.740000 CVE-2024-6160,0,0,ef00bcbff90a4a536a269b2ef25e47d623432c13fb8ba447cd9e3f9d22135cbc,2024-11-21T09:49:05.247000 @@ -279569,7 +279574,7 @@ CVE-2024-8992,0,0,40a7a4df2932aada5d7ea8c618dc82aaa0081f2be58f5119fc917cca09bcb2 CVE-2024-8993,0,0,487588ac277153038a2522d3764ca3b3260ed861cecc57e6ed018cb6e09dc0f5,2024-12-26T17:15:08.387000 CVE-2024-8994,0,0,7eca867f48fcdffebd158a97c0fe53b92cc08cdc8d3d21178ec4fe0fdfa0f86b,2024-12-26T17:15:08.500000 CVE-2024-8996,0,0,cd0b990817d2076a00b5e7fddb7f69f718917b5a243671e20171ba3b0c170ebd,2024-10-01T19:16:02.793000 -CVE-2024-8997,1,1,00b0461a23030a123156b2802fc43242a67f87ebc4d8d4708eeaf4fcf436f742,2025-03-18T14:15:41.400000 +CVE-2024-8997,0,0,00b0461a23030a123156b2802fc43242a67f87ebc4d8d4708eeaf4fcf436f742,2025-03-18T14:15:41.400000 CVE-2024-9001,0,0,5445fb18419bcdf5da336d1b9dfc0c76a605d0071a53e5a9fa7d6b57bf4501c5,2024-09-24T16:14:30.190000 CVE-2024-9002,0,0,07bab80a5647df4577409503b6679799b5fed9b76f517f2c308405ac5c2a7ffe,2024-10-15T12:58:51.050000 CVE-2024-9003,0,0,675933072dcb8d03bba7ba12042ea7e3d3a6b4bf04af01f6a5d3444f949fe1cf,2024-09-25T17:18:44.523000 @@ -279906,7 +279911,7 @@ CVE-2024-9393,0,0,667033bb1f733528162456e6b641958ce1183e4102095b97e104c792a7b249 CVE-2024-9394,0,0,958ce1f2261ebc7b18d0cf704e326091d699d7faaed1195d3dfa8998ffc30071,2025-03-14T16:15:39.213000 CVE-2024-9395,0,0,2554a13607d564fd29a88bbed7fcbe8c28486d0f8a8445d3ed0f82d1c54dcb5f,2024-11-09T08:35:08.270000 CVE-2024-9396,0,0,c10a3e20decda098f06933d1de462ae3fa4f1a66fa91c3153629d4c02ece6dbd,2024-10-04T13:51:25.567000 -CVE-2024-9397,0,0,0bf72cc0a2bf50e31bb919a0244e6256d1b66b98d69c88223a4e924d0307d577,2024-10-11T16:07:56.577000 +CVE-2024-9397,0,1,e785e68637a9eb7f98955d1d3605a5e9bd0aa4ae19ce434a28489946af2f3e32,2025-03-18T16:15:26.400000 CVE-2024-9398,0,0,7816fdd7397120327755103e2ff0ea3409cc166af2d1e6a5235c318b69a40392,2024-10-30T18:35:22.757000 CVE-2024-9399,0,0,d8e406ee1beab284cfa9cbeb45a0d2c953df97248a1bc9b6aef82180ed3da0a2,2025-03-14T16:15:39.400000 CVE-2024-9400,0,0,4e0eb218b5de55a15a4a85f62e9e541831946bea4c202524d5661f5eb345d7e0,2024-10-04T13:51:25.567000 @@ -280656,7 +280661,7 @@ CVE-2025-0437,0,0,13fe255170db1ac9d25ee4d2027f7e4790c577c7c77e5e9506d3559bc1d411 CVE-2025-0438,0,0,8c7333aeb87f87a4f7e9edbefc8fc5ab12029c07bdaef09c154718d38cd9690f,2025-02-18T22:15:16.743000 CVE-2025-0439,0,0,101658db461148311c4db52613ef0d8a033b47ac11db7b69a0cae87e2b2f57c1,2025-03-17T16:15:24.267000 CVE-2025-0440,0,0,0111d0059d314ca24ec0c13e047ade75b4312adc756687d6a0945eb3b9980851,2025-02-18T22:15:16.993000 -CVE-2025-0441,0,0,57474fc72228f8141c82ccd8d5112a3f8c49a342741a3515cddc85e982f09d06,2025-02-18T22:15:17.087000 +CVE-2025-0441,0,1,9be667b7ca3d6b0c4024db684ea154da0a17206dccf5623644eeb5915a246618,2025-03-18T15:15:58.760000 CVE-2025-0442,0,0,b67a5ab0a614c9dcc349e6c0e7630de1fb2af7af324e655577d77f7fa5f9a38f,2025-03-14T18:15:31.303000 CVE-2025-0443,0,0,4e2be3496f444fcf7458a1d47d1d7961d812a34674fe69fb29e935339a7b951e,2025-02-18T21:15:25.007000 CVE-2025-0444,0,0,b57406504b58c76909f2c14a128c362cf7e0f5ed01cd46bcebd537920650043d,2025-02-07T22:15:13.807000 @@ -281782,7 +281787,7 @@ CVE-2025-20630,0,0,0cb6d1c0b91807d74fd49faca2a027b3e775f1213907ee8f88e4e58cb3b78 CVE-2025-20631,0,0,eae48a24cdb26043896339096d80c579b21423122c0cfb7d1789d616416831f6,2025-02-18T19:15:24.347000 CVE-2025-20632,0,0,a969832868dfeb065ef85d46f111fa582b74e32bc8195140bed8e964787add5d,2025-02-18T19:15:24.460000 CVE-2025-20633,0,0,38e2a030fd0d7f547703f3781e9e02df03269c9ee8f44017e895217aa066b8bb,2025-02-18T19:15:24.563000 -CVE-2025-20634,0,1,fc3c30b117b6bc8a9d8dd2703312cf2f61010370e7d8111081368f7b9b811b3c,2025-03-18T14:15:41.747000 +CVE-2025-20634,0,0,fc3c30b117b6bc8a9d8dd2703312cf2f61010370e7d8111081368f7b9b811b3c,2025-03-18T14:15:41.747000 CVE-2025-20635,0,0,8539c0947a7b8ea603fd19e11d259a5fccf8cdeabef5ef4676784c0a0d03499e,2025-03-13T20:15:25.597000 CVE-2025-20636,0,0,53b7c37fe38dde7172ef3ef0f4e80e1b55d45c79cbcdafad69f9ad23a7de5c5b,2025-02-18T19:15:24.960000 CVE-2025-20637,0,0,c98f77253202c98cc20372cd8c54d3277c2b4473b3f20cbc97ddd00be7dce7b1,2025-03-17T15:15:43.697000 @@ -282248,9 +282253,9 @@ CVE-2025-21542,0,0,c95405cb76e935b1424e2221df18a531e8229b571e27c205ad993787b875b CVE-2025-21543,0,0,53374fe0ecf629c278210d26d1681ca091ab0395a1fe0f57b870ba5811f37636,2025-01-22T19:15:13.060000 CVE-2025-21544,0,0,980b23066e2438b2ca08079f7db43e8e73ce5aa9b8984f4251d41d219739f055,2025-01-22T18:15:20.993000 CVE-2025-21545,0,0,ae165462504507994171914dc95c399eec9b17a232b15512feb5d6c34ad5b418,2025-03-13T21:15:43.297000 -CVE-2025-21546,0,1,1bc75ca469036c8c2de838e6459d5f4afe6abaec51522949c6e58c0c18f31efb,2025-03-18T14:15:41.940000 +CVE-2025-21546,0,0,1bc75ca469036c8c2de838e6459d5f4afe6abaec51522949c6e58c0c18f31efb,2025-03-18T14:15:41.940000 CVE-2025-21547,0,0,017438336a031ecfeb419dddba734aad9917fddf073391ba67ba0a836c8e9c64,2025-02-18T21:15:26.180000 -CVE-2025-21548,0,1,2356141980923b17add14f81c695e4cf913f4da3b633ff33eaa98cfadd55cdd1,2025-03-18T14:15:42.087000 +CVE-2025-21548,0,0,2356141980923b17add14f81c695e4cf913f4da3b633ff33eaa98cfadd55cdd1,2025-03-18T14:15:42.087000 CVE-2025-21549,0,0,b2a50028e1bcc49830245cddba3f2301a2c50c551db0641ba7ec8ccc88064540,2025-03-13T19:15:51.240000 CVE-2025-21550,0,0,e5b6aaf4a7d686aaab6f9ee2b427fd22c3f2ad68b4a328f360cd3d2ca4ff7acb,2025-03-13T15:15:51.980000 CVE-2025-21551,0,0,e440132bbc6782c14199732060271cc8dd08332646e455cc162209755bb4029f,2025-03-13T16:15:26.693000 @@ -282561,7 +282566,7 @@ CVE-2025-2194,0,0,b4dd8641e77488a17259d3350a63ebf3a520330ac934daffe3522a5e1d40c8 CVE-2025-2195,0,0,88be97fb77746ad354b4cacb4ede708d613024c3fc1ef6521708956b0de65094,2025-03-11T14:15:27.937000 CVE-2025-2196,0,0,9510c7ade92473f20d69a85eaaa107ad85d37d6676c7036cf3feceb20bb50931,2025-03-11T15:15:45.820000 CVE-2025-2199,0,0,abdd338b526da7cce1ea92026805369fa24f5c5a2864ed7d7da5e812d9c0750c,2025-03-17T10:15:16.243000 -CVE-2025-2200,0,0,c61aeb731a9773785d221b6aa0e5f49ba61d762c222917bb23443cf3c4b04cc3,2025-03-17T11:15:37.090000 +CVE-2025-2200,0,1,21deda7203fc92111d87559693dc915b258e0e0cc7d6dd852915de5a18e9eb3e,2025-03-18T16:15:28.347000 CVE-2025-2201,0,0,2572a8acaf33617a058f655cd8464a46a02bcb1da3ff972754db445d44e80e66,2025-03-17T10:15:16.543000 CVE-2025-2202,0,0,900de08f70f25b6ac1535d6e729ab3ddf41d5a42339d57ede87a29eb6e1c259c,2025-03-17T11:15:37.970000 CVE-2025-2205,0,0,fbf363faec05dffcfc872bf5b989460ea4958dbb9808068cb2832da5e42818ef,2025-03-12T04:15:19.810000 @@ -283074,7 +283079,7 @@ CVE-2025-22946,0,0,7db37666dfbf9142b1788db2e9c9ed7b839c8fa56ddb82a64c0b003e5a2ca CVE-2025-22949,0,0,4497a547d6c85b77c71713f92e0bd769cd0fee1b37f22227e370aa8af86f0dec,2025-01-14T15:15:28.637000 CVE-2025-2295,0,0,cbcc0c56a80887c639b1c020a9e0d32dcb46e1863cdf480258408f53dac0d5c9,2025-03-14T22:15:11.600000 CVE-2025-22952,0,0,8738861fe1665908aa1c319a7ebce3d9ea42370b11127fd19a92e609f78fcd8e,2025-03-03T16:15:40.010000 -CVE-2025-22954,0,1,7f3409fe8a848c0af5e5d301bd257dbf01b84794547ad3a40f7d0461b014ed94,2025-03-18T14:15:42.213000 +CVE-2025-22954,0,0,7f3409fe8a848c0af5e5d301bd257dbf01b84794547ad3a40f7d0461b014ed94,2025-03-18T14:15:42.213000 CVE-2025-22957,0,0,a83a10114b8bffbb61185f4b7e1da98510853b7fa64b4f1d87dfa557428e19b8,2025-02-18T19:15:26.813000 CVE-2025-22960,0,0,cc3ca59d93e0c0cb6135025d6f8dc37d0dc5645d22d9322f42b235e2a3f0c6b3,2025-03-17T19:15:25.750000 CVE-2025-22961,0,0,c2a3aa8716f6cada0d8a53e343e519973bc28bf36e56486c654940da963b9795,2025-03-12T19:15:38.433000 @@ -283763,7 +283768,7 @@ CVE-2025-23896,0,0,69eaaa34a46e8604218c9d61f1ccb999822d545454f0b80f6a3f239fa3cba CVE-2025-23897,0,0,b2f6344d86a531aa7a0520ca26d3ad0846e4161c55365af159a9362ee03debee,2025-01-16T21:15:31.310000 CVE-2025-23898,0,0,162a8fa96d4ddcbc3397f2f2c42321f0d3ed549c467508db248d37a09a8f074d,2025-01-16T21:15:31.497000 CVE-2025-23899,0,0,598182d1621caa24bf3c481ede2ce2b83897d5764a80f40ca9f00a668f077b93,2025-01-16T21:15:31.680000 -CVE-2025-2390,0,0,b80670af85578020f860b564ff43d1a668cef119f78770092bceb68a30b0af07,2025-03-17T19:15:28.043000 +CVE-2025-2390,0,1,e0b44d6dba28aed6ee0cec8db1f2cd5d8f6a2c2a6ed42b46d46991c7173a83f3,2025-03-18T15:16:00.950000 CVE-2025-23900,0,0,68aba21ddce77b08fbaa0dad71c040e65c232f030b0b325ddea5744be386b9b2,2025-01-16T21:15:31.857000 CVE-2025-23901,0,0,bf3c3b7205ed6fc1b684ded669be915dd1c9b905481743bdf15fb28a8c514c0e,2025-01-16T21:15:32.027000 CVE-2025-23902,0,0,991c47a865a929869add2c8c1b94dc787e70c9818f90cecd06fc91fb7023083e,2025-01-16T21:15:32.173000 @@ -283795,7 +283800,7 @@ CVE-2025-23926,0,0,3f860fb67d7dad3938306eea5a6699fafd6068686a18b0a289deb3c2af9a8 CVE-2025-23927,0,0,8d9bc571b10adf5f0a5277b4afea3bff2ef4c187801274cc14acbeffd320cbbf,2025-01-16T21:15:34.507000 CVE-2025-23928,0,0,dda7521d0ca3a1016d24ef4001c08678b9721ea4cf47bd8a5c455160651349dd,2025-01-16T21:15:34.663000 CVE-2025-23929,0,0,7a78b750dcc7312313e19411143a886e72bc0ae48e8c8ee26d293e169e386b25,2025-01-16T21:15:34.817000 -CVE-2025-2393,0,0,f6c88e081bd7ee291e090e6ce2f5476da7ca517a7ef35c51e3a06221bdb3fdc7,2025-03-17T21:15:14.330000 +CVE-2025-2393,0,1,864ac35d0be154e3b73c33625711f2df7edecb299ea8af2fb0b6cb3da9112741,2025-03-18T15:16:01.100000 CVE-2025-23930,0,0,6ba6d73f7443c4991c12a7db93d08a3afb46e790500ca2b79d23bef6b9715d9d,2025-01-16T21:15:34.987000 CVE-2025-23931,0,0,98adffc80665483c450548868650d513b8418ac3b0c254c279f2babb520784e4,2025-01-22T15:15:25.687000 CVE-2025-23932,0,0,dc3b48fa5b4910f667e7008bc8e71f318f67011fdca46abb1b2bc2a81a025f34,2025-01-22T15:15:25.827000 @@ -283831,12 +283836,12 @@ CVE-2025-23962,0,0,38c72a66f748d246b44f5351bf9ff0f3b3815cc4926f227945695c33eaf96 CVE-2025-23963,0,0,b25e75626ec56255a41425e6f3edd3e3aea1c19b7ee658d0d0b26b28ec1f0c5c,2025-01-16T21:15:37.873000 CVE-2025-23965,0,0,53fb1e10aaa7ebd57bd7f00633a90cd803f03e00b4bc8c44e50c428b42627500,2025-01-16T21:15:38.023000 CVE-2025-23966,0,0,7be907c83ff5fc724c156b1fa35d79f9d45ca14741abf1d0664a82e4e926bedb,2025-01-22T15:15:26.950000 -CVE-2025-2397,0,0,89578f819460be49dddc929d8463c4ed3406acd8b03b079e70f667b356fe952d,2025-03-17T21:15:14.533000 +CVE-2025-2397,0,1,52449db56ef0a79fe4e9bff6625c78fea42aa4c07ba65ad56ea36076675d0c10,2025-03-18T15:16:01.257000 CVE-2025-23975,0,0,e8001c46a9ccc486b1a86f3be17fa5f6b3ce26422e7bdcae0080fc4ebd4b6ef7,2025-02-16T23:15:10.477000 CVE-2025-23976,0,0,a29eb82e0663b02bfaa3596cfe2622c511331a5578d509b2b4b465f1a7a97d91,2025-01-31T09:15:08.530000 CVE-2025-23977,0,0,4d0f94ce84075ba723583d9d09a43737047f5d4a006604c1cf44bad3bcf53c59,2025-01-31T09:15:08.687000 CVE-2025-23978,0,0,12cd27921605bbe68c80af2d7542b500f0b94f840fdfb9147cbd42a4cab4c233,2025-01-31T09:15:08.830000 -CVE-2025-2398,0,0,6f799f63e332f78ad7f40ce6311ee2c5cab181f2a1e131bc07ccaacf708980b7,2025-03-17T22:15:15.257000 +CVE-2025-2398,0,1,21ab17218a1f078a4a7e1f8443dba9f783cd366bc78fa799cde1f89d40fefdc6,2025-03-18T15:16:01.407000 CVE-2025-23980,0,0,8872da9c62e5fc19bc3d70e71e092e5c3ddf2ed8956fceca3210043267ae5b57,2025-01-31T09:15:08.973000 CVE-2025-23982,0,0,e0849b3e88e4adeeb1070e30593dd8d33c7961042511a8282af88708bcef60d2,2025-01-27T15:15:13.247000 CVE-2025-23984,0,0,cab4b7e6abc1e55678c27aed5658e86316183a56bf5b5cf4fa55bd7e71e48b78,2025-02-03T15:15:23.480000 @@ -283911,7 +283916,7 @@ CVE-2025-24084,0,0,4f1d493333efac73a350343a7437854970264be0f4eb6be8e9cda2c1b784d CVE-2025-24085,0,0,10be84b7c6e6cef127d29aae2d31008399360c31674450bd2bdb82cd6d9411ab,2025-03-13T16:15:27.250000 CVE-2025-24086,0,0,7c644e120cc41a291828171399048534e1e04b082ef7ed82ac204947bf2fab49,2025-02-05T15:15:21.750000 CVE-2025-24087,0,0,b6d09d2d8f9c9fb48f34374a1c228deecaf72eab2a92a63c6f3af02952b5c8f4,2025-02-05T15:15:21.923000 -CVE-2025-24092,0,0,3aa2d06d87ef3fdeeea46531ff97ecfdcf2ce3948ca55a1ae44601e8047b47d4,2025-02-18T20:15:29.027000 +CVE-2025-24092,0,1,9eb96f60702d8d52d18cf5af4b10c1f0313cbbbec76e5656f12bbe6a8b58cf48,2025-03-18T15:15:58.933000 CVE-2025-24093,0,0,399fb99e86d72f8f64f535d1c8314fdb510773e1b0ff8ca78a6c885202395705,2025-03-18T12:15:14.730000 CVE-2025-24094,0,0,86d262f71f2e67892faf4dbf8f0a50eff9cb9026771b88386373f113d46381a8,2025-02-04T21:15:28.227000 CVE-2025-24096,0,0,ac69c9566c3d48cc557b26bc2ed716878d8206500a277eb4956f75bd231dad30,2025-02-05T16:15:41.840000 @@ -283919,11 +283924,11 @@ CVE-2025-24099,0,0,9ac733c66f981521044d55991b68403f81f4b4ece5888bc69708355b03857 CVE-2025-24100,0,0,2eb1be595e647c553152fa6178e0b240d2a4c9e18148941d2c792cbf709c2b81,2025-02-05T15:15:22.070000 CVE-2025-24101,0,0,dae89b1167004681c237272fea45914f96a54415fc2aa5c9187504f4af2012ba,2025-01-29T17:15:29.547000 CVE-2025-24102,0,0,ab0a87dcd7e5a26d34ae9d675723367aebf9570c32c854472c70e95b35517f99,2025-02-18T20:15:29.263000 -CVE-2025-24103,0,0,121f97805b28c552314d84eeaeab6e5c8e1907de50e8d236950d546904b71d80,2025-03-04T15:24:55.633000 +CVE-2025-24103,0,1,9d77a1391acd11970f5b83f9a3163a0cc44f6475e53e33ea770a58444256625e,2025-03-18T15:15:59.120000 CVE-2025-24104,0,0,eaf2341118958cce67dbc21070a8e2f4a62ff3d770291a310ec877a84b56e1da,2025-02-05T15:15:22.223000 CVE-2025-24106,0,0,7b1652442d8e4a2ef42869db0a96088570ce1bd80744fef4434e3c62e98b9210,2025-03-04T15:25:19.603000 CVE-2025-24107,0,0,96402cf84c64acffc4d1662c29f8a3c8a0f854a65ff188084b5ba4a1a1ec5a35,2025-02-05T16:15:42.013000 -CVE-2025-24108,0,1,9aaaaccaacf9017079892b606e6940de8d3cf8011d17b629bcde5009dfc6e215,2025-03-18T14:15:42.627000 +CVE-2025-24108,0,0,9aaaaccaacf9017079892b606e6940de8d3cf8011d17b629bcde5009dfc6e215,2025-03-18T14:15:42.627000 CVE-2025-24109,0,0,3a06e33059ab25d8437d67978eebded22edd06fe8c09a21c862e225782f2c988,2025-03-04T15:26:30.650000 CVE-2025-24112,0,0,00ac1ad70de7c95aa177469e4cbf1b6a59be3178c8668d42d9efaad7c292453f,2025-02-04T22:15:41.893000 CVE-2025-24113,0,0,dfb8fdeba08350f2d1ba047bdfca5272552cfc4b72a68de35cf8a6aa8ccbdc7b,2025-01-31T22:15:13.443000 @@ -283931,11 +283936,11 @@ CVE-2025-24114,0,0,060f1a53826cabb1840c2e97a20d5ed1dcd10135e4439b8b05507d5cf3545 CVE-2025-24115,0,0,15c49b282394a28d48f09f708393e8923948b48fe70b3e10a8d648cbaa5dc78b,2025-03-04T15:15:15.310000 CVE-2025-24116,0,0,aa7cef2fc6e8a345ed4ea9323be2cbc80d7f94c26743a1007a2eda67ae73a859,2025-02-04T22:15:42.203000 CVE-2025-24117,0,0,33c92b99d6665d1cd4e31cf979ddcb83dff08f0221ebf8ab36bcd83194dfd5e1,2025-01-31T14:40:21.463000 -CVE-2025-24118,0,1,231a8f647efccb698f2af26d75ca1326774dcd245b29e6b54409d56744ad43a7,2025-03-18T14:15:42.797000 +CVE-2025-24118,0,0,231a8f647efccb698f2af26d75ca1326774dcd245b29e6b54409d56744ad43a7,2025-03-18T14:15:42.797000 CVE-2025-24120,0,0,4de34b7518b30f914f0a7dc6f0d2169fee2b922e39b5b8be4b38ceb1cb6aab96,2025-02-05T15:15:22.373000 CVE-2025-24121,0,0,3147f918c1f3d7a66c464fe94f2778628efbf774801d0ad4400d3a98a4740b5a,2025-01-28T15:15:13.600000 CVE-2025-24122,0,0,63629b839b402edeef408de5ba24f2cb0ef35ef076785a337d7d7055ccc840b7,2025-03-04T15:16:52.190000 -CVE-2025-24123,0,0,4e49fa5cee2fdaa62f898b9fbbf4556effb9c8954fdd9c8a5b39828959525d73,2025-03-04T15:17:41.803000 +CVE-2025-24123,0,1,f151d1ba886f1980de255ffb27f17311f839ac035993761299fd7f3578a77b9e,2025-03-18T15:15:59.307000 CVE-2025-24124,0,0,162b63d0e3f74d8684529de2b3c84fa59b8bf0775ede92dbde308c3f3a40fdef,2025-03-04T15:18:09.183000 CVE-2025-24126,0,0,93626dca5a2efcd9402a6fa0ef63a8a1935cafd987992c392cd02dfb12247155,2025-03-17T16:15:25.117000 CVE-2025-24127,0,0,1d2b043a0b9d762748f03a2275d3e997d6427b918bf46a124cf4e281353abd3f,2025-02-05T16:15:42.163000 @@ -283965,16 +283970,16 @@ CVE-2025-24158,0,0,acc7809ab4701d1dee654bd85d3ea355491d3c160b1e018c6b17b635a2e88 CVE-2025-24159,0,0,3b398e5ec735d86e63a66bb20838217a4d8bb188393327507b8a692d20b032c8,2025-03-04T14:57:16.473000 CVE-2025-24160,0,0,ae6edae2205c08dd8b969920bf8cb3dc84d26eaf5297b5739349f27fb704a2f3,2025-01-28T16:15:44.003000 CVE-2025-24161,0,0,6d02f0f01530cc9b917612d04abebc1e6d67d88a440e864a6d1a14a27e3f4034,2025-02-04T22:15:43.057000 -CVE-2025-24162,0,0,03df16b2a66f8e69446966c3b753618fdfe5b4bbe0f6817c504bf02cea467bd6,2025-03-03T22:51:02.523000 +CVE-2025-24162,0,1,e7182d7278474afcab3466a5bca917be81e38e822e2649153160baaeab126f37,2025-03-18T15:15:59.527000 CVE-2025-24163,0,0,41a251fbd8e3fd1ad37794819de1e745b68c6aee16567b6569d089e58ae56145,2025-03-03T22:48:32.503000 CVE-2025-24166,0,0,15edf859d475720db53f3f95ed8d575ade96a95f125f2377032600fe411e75ab,2025-01-28T22:15:17.080000 CVE-2025-24169,0,0,dc7fdf5a34ca171f91b452ca483098d6852ee04a0c9927ea185bfbd0220db78b,2025-01-31T22:15:14.117000 -CVE-2025-24174,0,1,0904d4c28286c429cd94ca17762197a0f9f9874c511f730b1e00485e49f57ce4,2025-03-18T14:15:43.020000 +CVE-2025-24174,0,0,0904d4c28286c429cd94ca17762197a0f9f9874c511f730b1e00485e49f57ce4,2025-03-18T14:15:43.020000 CVE-2025-24176,0,0,8a151411616e238cc2afeabee27a87a9c1b6ac9dd5553369acab3c240b386505,2025-01-28T16:15:44.630000 CVE-2025-24177,0,0,79a71d65a51a9b6afaebd476d0d597d4ed4eaba333259a9c33b9b13f1b1bef2f,2025-02-04T22:15:43.237000 CVE-2025-24185,0,0,780ce933a4599922763fb258510562036511606364e33341b032c72a71c2a6a3,2025-03-17T20:15:13.907000 -CVE-2025-2419,0,1,26560479da279f4bc0d3906a2859a1d9a09a31e7b1f3ab3c1e12831d111e2b42,2025-03-18T14:15:45.067000 -CVE-2025-2420,0,1,98e6f051dbce823ddc0a11342a5f0a648b5fe3c71fa6e4c1ac96d722ae7874dd,2025-03-18T13:15:37.770000 +CVE-2025-2419,0,0,26560479da279f4bc0d3906a2859a1d9a09a31e7b1f3ab3c1e12831d111e2b42,2025-03-18T14:15:45.067000 +CVE-2025-2420,0,0,98e6f051dbce823ddc0a11342a5f0a648b5fe3c71fa6e4c1ac96d722ae7874dd,2025-03-18T13:15:37.770000 CVE-2025-24200,0,0,0f6f41d17b1c80c9261ddc7d6ef23ac7e19cbdbd2c08a07eed9362b293d75967,2025-03-07T17:12:01.477000 CVE-2025-24201,0,0,ce749944f29eb7a58a39f521ebc27f910b93ce1f347524410204067e6a960180,2025-03-14T20:35:27.923000 CVE-2025-24301,0,0,7b7c3fba06b103a537ce7db06429d9d2300d69047940e33831c6830c359206c5,2025-03-04T17:15:48.160000 @@ -284015,7 +284020,7 @@ CVE-2025-24389,0,0,1f2059cf3f125eed1b0425e33b29a7475638e7301a1298ff7d6746702fae8 CVE-2025-24390,0,0,53fee9e5767117124ab0c247372dae1e808caf6f2871cdd5b9d8bb2222404390,2025-01-27T06:15:24.313000 CVE-2025-24397,0,0,9ba22bfb54e58957b01d845dc69a58567b508933ed35160174e59b93ecc06487,2025-01-23T17:15:27.643000 CVE-2025-24398,0,0,ee9da22a13b3c2a05aba47928897e56493040057408f7bc7be29fd032a4fd24c,2025-01-23T16:15:40.920000 -CVE-2025-24399,0,0,cc1dc67e166d46e202433775f527773ccbf03165c2a7153bb8b52cfb69d98a89,2025-02-18T20:15:31.523000 +CVE-2025-24399,0,1,9e2b8368d79470df64393e92711907111b86a093d0c5d40914c6d8eac10d8a6a,2025-03-18T15:15:59.850000 CVE-2025-24400,0,0,fc2d35dcc02dfde6472cd44ddd220493709314070b1167c1ac10abb11d37eaff,2025-02-18T20:15:31.630000 CVE-2025-24401,0,0,4fb172772de67515fa4267387a9c7f60995cf88b73e8f04e780d1435e4b66f20,2025-01-23T16:15:41.050000 CVE-2025-24402,0,0,f4550d563ce08a51c6e77d15a75001488a90ae02ca9b5c4a4edceb8828b16ab8,2025-01-23T16:15:41.190000 @@ -284079,12 +284084,12 @@ CVE-2025-24480,0,0,8c69070e4602e3e045b6de7421f305082c0b32c33d67076e7034c529b969d CVE-2025-24481,0,0,1f18ba539d38ed86105e18de8f701df1ae615df6838eaafd5a3bd88fcca169e2,2025-01-28T21:15:18.520000 CVE-2025-24482,0,0,bddd8d62e1d1ef759d3d72d308a4499752a0ac6f47d6ad7b4c765c13d2fd27ef,2025-01-28T21:15:18.687000 CVE-2025-24483,0,0,8e8c3f541513089421e16456a3415c9fe977a1e0274a2d9a7826bef889eecc77,2025-02-06T08:15:30.327000 -CVE-2025-2449,1,1,097d8c56f0ba970961941521f178c20e7f071b70e485a5d69566fc048fc66802,2025-03-18T14:15:45.670000 +CVE-2025-2449,0,0,097d8c56f0ba970961941521f178c20e7f071b70e485a5d69566fc048fc66802,2025-03-18T14:15:45.670000 CVE-2025-24490,0,0,c90744a991c52fb51aa8e878b4b2657f71ca215607f5858e899dd6952ad19778,2025-02-24T08:15:10.260000 CVE-2025-24494,0,0,6cea07cccfd63e3e21e6431433f0fa67be526715b4452d5100ebbf4b4cf3063a,2025-03-05T16:15:38.937000 CVE-2025-24497,0,0,c353bcaacc4022d9f615cca17d8aba00bc9c27a2db4d05cf3443efd3facf0482,2025-02-05T18:15:35.613000 CVE-2025-24499,0,0,73c3be8f9b393062a6377e177930760395b929afa4bcb880a4961279b138a48c,2025-02-11T11:15:16.583000 -CVE-2025-2450,1,1,6cb1f4ef146253bb9ef2f720730f4941556b5180307da35c3787fcbf4dae8ed4,2025-03-18T14:15:45.850000 +CVE-2025-2450,0,0,6cb1f4ef146253bb9ef2f720730f4941556b5180307da35c3787fcbf4dae8ed4,2025-03-18T14:15:45.850000 CVE-2025-24500,0,0,47c4210aba4fa86ebb74871db3d78a27e196e119ac830b73a53d16e817dd5895,2025-03-13T14:15:35.930000 CVE-2025-24501,0,0,805ef05e75b283fb4d87128106cf95e77b6a4387edac60027da256d1e053a956,2025-02-05T05:15:11.197000 CVE-2025-24502,0,0,faeb6d58a720f7df24146e060ac5b9ad3285f3857cadba89f24692133122cb1d,2025-02-05T05:15:11.300000 @@ -284329,7 +284334,7 @@ CVE-2025-24807,0,0,a9342833f23aca9efb5658eaedc615b0791a1b8d97d1be177e79dcc0108d2 CVE-2025-24810,0,0,5dc96a04891b646d8f099d1fa627e0a60065bb9f47866c74211a0f5415867e23,2025-01-28T05:15:11.413000 CVE-2025-24811,0,0,2da7e99907675b0c3b84fff601eb43c4c4c27c662d95c7205901bce5bb8705d8,2025-02-11T11:15:16.907000 CVE-2025-24812,0,0,3542fd62679fcd1754aabe0f38d924c5bd34578dfc13aa46aeaa150dd810a16a,2025-02-11T11:15:17.080000 -CVE-2025-24813,0,1,207ab702a4c69496b55cb9cbff31ce62e3ea99cde099bf79ba109d3afc178ec4,2025-03-18T14:15:43.253000 +CVE-2025-24813,0,1,45e3f2173b053a66adbf0e16a18d95e0cc8e730bc1430998d827d943d45f705a,2025-03-18T16:15:26.677000 CVE-2025-24814,0,0,778c51f4f444afc315901ebeb1d1515ad066d9ae9182f0d62b926c00ff924803,2025-02-15T01:15:11.157000 CVE-2025-24826,0,0,afc4a3c6aa0e8288830e8c91cc81c25b8636a1b49a80120ea49c59c3d903f3ac,2025-01-28T21:15:18.817000 CVE-2025-24827,0,0,9def413bdd8ee8b51fbd9a0d5033d038fbca6373f01b1c0b3f27d7c9c702b649,2025-02-18T19:15:27.587000 @@ -284376,7 +284381,7 @@ CVE-2025-24896,0,0,990844e95cf5f001626311cb46be899bcd7e5e93cef08984ed7570a5b8885 CVE-2025-24897,0,0,b4a9ca153078c9451982223cb67d9a48c46e9b9480f45d60a768c29a811f5d8a,2025-02-11T16:15:51.610000 CVE-2025-24898,0,0,dd14a5484414b1ba9c22991f32be2602892353b81ceae03dd79061797e9e5adc,2025-02-11T08:15:32.003000 CVE-2025-24899,0,0,7816fe20b0c1908c0a40b5877e6e92a7dcc6eb4d232e7366b9208152803d77e6,2025-02-03T21:15:15.703000 -CVE-2025-2490,1,1,e7ec0264ef51f1a92542719fd7c8111b43b3537bd9fadbac1ab0d67b6349b05a,2025-03-18T14:15:46.250000 +CVE-2025-2490,0,0,e7ec0264ef51f1a92542719fd7c8111b43b3537bd9fadbac1ab0d67b6349b05a,2025-03-18T14:15:46.250000 CVE-2025-24900,0,0,12a09249a507b6d9fb85eedd73a9e64a950411d75e49fdadf829b0cc45e6b210,2025-02-11T16:15:51.763000 CVE-2025-24901,0,0,bd99b1b0ebfeeb520dd8f3faba434d145a8e1d709b882bc2215e45767faa0251,2025-02-13T19:01:24.310000 CVE-2025-24902,0,0,623a5d8cac0a059ec59c84d4f4cbfa6844d5070567ceaf720618a336c321ecaf,2025-02-13T19:00:59.777000 @@ -284384,6 +284389,7 @@ CVE-2025-24903,0,0,f94c50d2f0574a93b5b48805712360c1af6392fea087d65c2ed61830aedff CVE-2025-24904,0,0,922b25d3a9b426b643b71230fe8a3d6600552e09598c6cd6bc1bcb32f760c1d1,2025-02-13T16:16:49.053000 CVE-2025-24905,0,0,a12cf1d4a84b7dfc2fc6ddf401dddb1af801de5f0e459b8125fad6e258d821aa,2025-02-13T19:00:37.593000 CVE-2025-24906,0,0,c4750456c80f4de3a8d1ced568cbceb00ad477041c107087bb6724cafda48816,2025-02-13T18:59:59.940000 +CVE-2025-2491,1,1,53640a7ab81dcbe83fa2a877bef4ea258729718d3281206c6426c659b5fd6692,2025-03-18T15:16:01.707000 CVE-2025-24912,0,0,d10f05928f11c7a00e2a62c8635f9af5917fec081444b4d22020eb25a54c0654,2025-03-12T05:15:37.430000 CVE-2025-24924,0,0,3cb1f58ac0f82a4a651fd56ef4a80a8ba6f8902630bb63eebac1edae30e9552a,2025-03-05T00:15:38.423000 CVE-2025-24928,0,0,8e9335012d42a7d487e5f9921ea54f865e117f9248798a001634be5429fb2b4a,2025-02-18T23:15:10.250000 @@ -284656,7 +284662,7 @@ CVE-2025-25476,0,0,dcb05a63fbcff084bcf1c5df3723664abe2b9f2707596be8a1333f910233c CVE-2025-25477,0,0,186e1b1b42cd761794319ad88366f1783c2b185a5c4c7ba09f90886d766f572b,2025-02-28T16:15:39.550000 CVE-2025-25478,0,0,5d678bf64fff284866af822721a081473e94720053a6940e94e8607a25812368,2025-03-05T16:15:39.297000 CVE-2025-25497,0,0,342cc8c3073c7b4fb963ce6919474125872366956f79f35d55abc4517740c1dc,2025-03-07T20:15:38.013000 -CVE-2025-25500,1,1,111d4db0bc81dd7cc682206d7f44a5f888cd685ec97f9d39953e9264ebcd56f7,2025-03-18T14:15:43.493000 +CVE-2025-25500,0,0,111d4db0bc81dd7cc682206d7f44a5f888cd685ec97f9d39953e9264ebcd56f7,2025-03-18T14:15:43.493000 CVE-2025-25505,0,0,11c4c75af440f82d715defaf6782907c0744a464a1a91c9d9aeef14ada87484d,2025-02-21T21:15:23.723000 CVE-2025-25507,0,0,aaa8b5a00bc14c6200ce4ada5e546d091bf3632fba77c66b3ac71c873b2a184e,2025-02-21T21:15:23.870000 CVE-2025-25510,0,0,80b49d96f8cfea96d2e40e1145bf347e93013db39579b2b941514912fbfd558e,2025-02-21T21:15:24.023000 @@ -284682,6 +284688,12 @@ CVE-2025-25566,0,0,5d534d6b0fe1f7902c1dc640fde2534ed23638ce1e46237376fc281c161dc CVE-2025-25567,0,0,1a4bd950383b3325e775420b0643b083021178d77feb4623d8cc3f383d0db70c,2025-03-12T16:15:22.840000 CVE-2025-25568,0,0,4038dfb91217e4a1d34e8cd3d8c2fcfbe0b21f6d6d3aa6263682d4e3e26c8ab5,2025-03-12T16:15:22.930000 CVE-2025-25570,0,0,a1a60fff83d4e58f97f6cb73bc995dd008cce7cbdda97b57369c1d11bafc9be9,2025-02-28T22:15:39.630000 +CVE-2025-25580,1,1,c58c32d03d8ad1894c1c56e4d8dd24f4cc4915241c92e407bc5cc7606fecb841,2025-03-18T15:16:00.123000 +CVE-2025-25582,1,1,8edb7611fa3596d630b74ec88ccf1c3bb1034d2cb2ff5ec0d1272f82fca1b313,2025-03-18T16:15:26.900000 +CVE-2025-25585,1,1,80747c75020719441b1494270118cfe6daf65227a3f1c61a488d53873199d3e2,2025-03-18T15:16:00.253000 +CVE-2025-25586,1,1,744a470f770a9515b6f7dfb52c66d60af37830e5dc13b1912db087fb3afacbc6,2025-03-18T16:15:27.047000 +CVE-2025-25589,1,1,824725523e28132dad4cb2619d08cb50c773fd7753d8cafe5fb64b8961821ca3,2025-03-18T16:15:27.200000 +CVE-2025-25590,1,1,0ad36cf80c5032a80ad0bf8eb00193fecda94b0782be77115fea9b1209b274e1,2025-03-18T15:16:00.373000 CVE-2025-25598,0,0,77f039cd06718093e1c276e16fe184c5d4efc61143dbb11eacdc3787cfa066aa,2025-03-13T18:15:50.857000 CVE-2025-25604,0,0,7a8cc3234dfcf2fd463e6a54d1695816511ffd986519d0bafcb53e4f83d303ac,2025-02-21T21:15:24.170000 CVE-2025-25605,0,0,c0858a3094cad59e4cf6248dc23b2aa0633fe28bfdda9aca36970755a7dbfbce,2025-02-21T21:15:24.317000 @@ -284730,7 +284742,7 @@ CVE-2025-25742,0,0,c12f86a073dc42e0b5bc1597ed8b153f52d2513d95a33b84da5b5e9f2c778 CVE-2025-25743,0,0,304984a5ab9ad7f158808ee9d3872992975a39931983d4ba42d4f443e0977c14,2025-03-05T19:15:38.693000 CVE-2025-25744,0,0,9b17d9cf4931ebf4a6e3aaab07248462238b28b620de67883e624c40839a59fc,2025-03-05T19:15:38.860000 CVE-2025-25745,0,0,6954ac06db222a2d53d510e8895c4f26dd1f1d917e56ca97169f9eb9f3840768,2025-02-14T16:15:37.010000 -CVE-2025-25746,0,0,cbf058e2dc9833cb4adeac1d2f404166a61c0d96a6ad617dde3893fa4bf6a37d,2025-02-24T16:30:37.200000 +CVE-2025-25746,0,1,fd009721daa4af3e200d61df53a7719cd37175870c5071dcbbd0f0b0dec3078c,2025-03-18T16:15:27.343000 CVE-2025-25747,0,0,bb6f0e2739bcbcef1c4960f0faa49a38e842e1028b8b39583b65f79f0338ec69,2025-03-12T16:15:23.153000 CVE-2025-25748,0,0,d131b1239425b256503c95c96ccfc73ca03ffb8cceeb7ff3fb8fb51258d92793,2025-03-14T13:15:39.780000 CVE-2025-25749,0,0,b4e0d228f7a6b58fc969aa366cc14253082f867628bbf55a2d44edc56e01654a,2025-03-11T18:15:32.933000 @@ -284778,14 +284790,14 @@ CVE-2025-25893,0,0,b7b75d9889fadaf8bc68f465dfe363f8b02edfceddb27c75dd75f757929fb CVE-2025-25894,0,0,3f9d2e7801654dc301f71e4b1ffcdf5f43972d9bc766b46d709bc030e71ace33,2025-02-19T16:15:41.930000 CVE-2025-25895,0,0,420cfe9c83f8ba0a9cc6496ef638a111b855c60de22aee5c238d6d5765c63784,2025-02-19T16:15:42.087000 CVE-2025-25896,0,0,cd3dcc213555e90c5d040ed31f6976b5cb54f10c52efb54acc663fd3589794f4,2025-02-19T16:15:42.240000 -CVE-2025-25897,0,0,011a13475d5d2314ce8d3e20e2eaba51128ca214c7db076f61e733e1a30cacf0,2025-02-18T15:00:36.487000 -CVE-2025-25898,0,1,d58b45df31d2ab16820300309437bcd9af06cdd7005531ff67ae87c6f364cbef,2025-03-18T14:15:43.617000 +CVE-2025-25897,0,1,d9674c7c5fd9fd9b94366bbedbd501cc02c9ad2f3e9c6fed49cb7c232856e839,2025-03-18T16:15:27.567000 +CVE-2025-25898,0,0,d58b45df31d2ab16820300309437bcd9af06cdd7005531ff67ae87c6f364cbef,2025-03-18T14:15:43.617000 CVE-2025-25899,0,0,0a94e1ac94f2348ced8620095f1a1cdbc8d00da1d929db972e382fd33828a613,2025-02-13T20:15:49.913000 CVE-2025-25900,0,0,c19958e46a5c7601d0a2f6f81f8761b82e188d6b471104e0d3a3030c6717cdee,2025-03-13T14:15:36.057000 CVE-2025-25901,0,0,dbbaa66456410cc814c13398a9419347a95d4c008549889e82c9e08064439afb,2025-02-20T15:15:14.380000 CVE-2025-25907,0,0,042fa44ae3449a91128a4cfdb3781e1176518918252daa0010b67c1143785aa9,2025-03-11T03:15:39.160000 CVE-2025-25908,0,0,fe355032e83d1fcac48ab80d23790fbbd6e28bd9d81eb2d8242e10204ea981e4,2025-03-11T03:15:39.350000 -CVE-2025-25914,0,0,9fdcd48f7ecd1c8cb5569460541d6e7e93a844ef38ca7b96ea40448c7ded4d38,2025-03-17T20:15:14.013000 +CVE-2025-25914,0,1,3b531fa97892f288e5f3971ca5ed22b16ca78e5fc11d40f8353e924446c26c56,2025-03-18T16:15:27.773000 CVE-2025-25916,0,0,91ba974117f22dab8d3678a8beecd3ea90efc52e588600708e1af441e5e35add,2025-02-28T16:15:39.867000 CVE-2025-25925,0,0,992a4d92cdd1ca6c67a633afcfd4f776b6fb4440a7e0f0b6613ea419786bbe59,2025-03-12T16:15:23.337000 CVE-2025-25927,0,0,83d098307bb1434929b2c3eb986aaebca3bd185b63f2298cf5cea0f24c66cbeb,2025-03-12T16:15:23.480000 @@ -285436,6 +285448,7 @@ CVE-2025-27682,0,0,742b714f92ed91a22930704a9699246ae3b66144f4d050ebe9e1e1a276016 CVE-2025-27683,0,0,4b627b025d0617cee159fbfef38ddc5f2b647b4b19c44649113efa07335c1ee5,2025-03-05T21:15:23.060000 CVE-2025-27684,0,0,6cd030dc35cdde6abe4a85046a48e3fc802484220653099edea978c9a09f7bf9,2025-03-05T21:15:23.197000 CVE-2025-27685,0,0,78f1b0d4b3939d525b8aa8d6b40be5796a932b588a65f5386a00362208fe87e0,2025-03-05T21:15:23.337000 +CVE-2025-27688,1,1,11dc0ae1619b9a08bc2158bdd1119a1c755120b8a951d60785c3d6514433eccb,2025-03-18T16:15:27.980000 CVE-2025-27760,0,0,0fe214e27ee00978be2b2db20453752d3c587e2a097907bcd7b6f52eec4fd67b,2025-03-17T23:15:17.740000 CVE-2025-27761,0,0,ccacd385546f9e849c6762c7104b07eacb4ee137232b68db7722ae4c039dd182,2025-03-17T23:15:17.807000 CVE-2025-27762,0,0,2807d546b38a9bbaac57f4b35c24d7978c6bb44d3e22ed6d6636bd10822c6fbe,2025-03-17T23:15:17.863000 @@ -285554,7 +285567,7 @@ CVE-2025-29387,0,0,b884feacdec450fec77e09de60b95a7b9adedf54ff8f4d0b7df747bf1bec2 CVE-2025-29425,0,0,87a28f5f3cb0368100239b1107d69eb9b12e82b16435277aa5cd7892e9282f06,2025-03-17T19:15:26.957000 CVE-2025-29426,0,0,09d1a99f7aa9d2e75e6a9d2554c03c552501c41d4bc427f23e7d0bcf8992812d,2025-03-17T21:15:14.190000 CVE-2025-29427,0,0,987d8bd4a327fa972b2e877e9a8e6665199567b8b8331d056bc83c8812a05eeb,2025-03-17T19:15:27.067000 -CVE-2025-29429,0,0,eff1599c1d5d382102eeaf06a5115ac7f4a14399ca377163231d23bde9e3244b,2025-03-17T18:15:22.013000 +CVE-2025-29429,0,1,44860897b3803242e714435e6c68ab72f284208abcf5930a420f494f7998c0ee,2025-03-18T16:15:28.153000 CVE-2025-29430,0,0,bffb766891a9958401673e5e52420902a2d5b7f853afc668408ab63da29a7d5b,2025-03-17T18:15:22.113000 CVE-2025-29431,0,0,15372a748c46899c4000126cd17db1d84bd0c1697a7641eb5ef5e122561bcffc,2025-03-17T17:15:40.177000 CVE-2025-29768,0,0,2c8b2b435d3188ce40a9bc76756d1a1ddd7e3bfd7fd71f925a16c5ca51d2a16d,2025-03-13T17:15:37.623000 @@ -285565,7 +285578,7 @@ CVE-2025-29775,0,0,522b516d30bbdbec188f3eec37a35a5cfe0468d37d6cc055584df2785114e CVE-2025-29776,0,0,2bcf19cfe229ac44c33a42ac99a787c07bb1a792d9e30568e2fdaf86395b3131,2025-03-14T14:15:18.847000 CVE-2025-29779,0,0,f94912e4775e10dfe50b061ca0c1c5097a0c3f261c6939cb83b19433bd55af7a,2025-03-14T18:15:32.330000 CVE-2025-29780,0,0,6ef40c4b98f97bb03df3800eb89a6c6e47d766d28548870077283af7cf121185,2025-03-14T18:15:32.503000 -CVE-2025-29781,0,0,2ed5572627b9b2e76ff40e2c909725763abaf2676fc74b390e786f6d4dcca61d,2025-03-17T22:15:14.493000 +CVE-2025-29781,0,1,11468da575bc88f83630d2a3c1d3c52c4633da5dfa93d1362d874e9a4b38aa60,2025-03-18T15:16:00.747000 CVE-2025-29782,0,0,a79518f63be9c881de8db0a0651ea1fe984913327462a61af7597165766c4b7e,2025-03-14T19:15:49.190000 CVE-2025-29786,0,0,0c40fa5408515757638473e28641812347d31da5efea9c126f50ced0bd11d506,2025-03-17T14:15:22.237000 CVE-2025-29787,0,0,f2e861b6c4dbf868707fba7b3fb131d1b9814d3e4021455a52a8a2d5236bf0cb,2025-03-17T14:15:22.447000 @@ -285573,9 +285586,9 @@ CVE-2025-29788,0,0,e1a88fbf2eb4e52db6d664e73916facba347fa2e80c6c15ea20d2760d435b CVE-2025-29891,0,0,19957216c682a927ada7fbe8d799bf8aa1337ea00af552d450ee80a227a50322,2025-03-13T09:15:14.860000 CVE-2025-29903,0,0,10c68e7ddaac62cfaf56fa2d0c36952343de94dcaf74d7de9700d239804e47d3,2025-03-12T13:15:37.823000 CVE-2025-29904,0,0,8151be9d68bba0e8c527ecea5490dd29fd8894724b2933080703a0ecee03e639,2025-03-12T13:15:38.050000 -CVE-2025-29909,0,1,763144943d5bc13d24b119de23c47602f4df0647e1341ddac3a9c1d2fe539cba,2025-03-18T14:15:43.803000 -CVE-2025-29910,0,1,d918c1f18c48e000de1547503ce3f5501f2c110de54a5f25e6b09e52254e772e,2025-03-18T14:15:43.913000 -CVE-2025-29911,0,1,9bc03ebbf6bc4f31bea7d0d71fc54bd0d8eb994dcf1544391515e13547c2c935,2025-03-18T14:15:44.023000 +CVE-2025-29909,0,0,763144943d5bc13d24b119de23c47602f4df0647e1341ddac3a9c1d2fe539cba,2025-03-18T14:15:43.803000 +CVE-2025-29910,0,0,d918c1f18c48e000de1547503ce3f5501f2c110de54a5f25e6b09e52254e772e,2025-03-18T14:15:43.913000 +CVE-2025-29911,0,0,9bc03ebbf6bc4f31bea7d0d71fc54bd0d8eb994dcf1544391515e13547c2c935,2025-03-18T14:15:44.023000 CVE-2025-29912,0,0,e23f6e141e6c7cfa4a10c629df5522bf78a6021bcef4d2d4cdf07cb70dadff0f,2025-03-17T23:15:18.450000 CVE-2025-29913,0,0,571420058b3a2fca2a2137cd48ed447ba4bf465242535c3a89f7b7aade97c032,2025-03-17T23:15:18.590000 CVE-2025-29994,0,0,5456b8a283efd1eb6eeaed0238e41032f545196d53f3be8a9a39b4dbb8a3918b,2025-03-13T12:15:13.660000 @@ -285589,5 +285602,17 @@ CVE-2025-30074,0,0,5d0dfb842ba5d24afb134fe0eb5f7e2e10f0c5619590d2c6aaa9483b4a179 CVE-2025-30076,0,0,ae70a6cce406a05e108d38c82fa058b5f2fc46a32f1bafe789b6ecdef84b3c03,2025-03-17T16:15:28.220000 CVE-2025-30077,0,0,3552a491790a6839d39471705d681d0b56a0da48a2daaa633f419312864c12e5,2025-03-17T16:15:28.360000 CVE-2025-30089,0,0,26c0c3e573114b1e3e240c2d6bcb88b42d7bf3c75b6c33122ef4296822dfa500,2025-03-17T16:15:28.507000 -CVE-2025-30106,1,1,31af7150d5c12c0672c068b31fc4f3ce3cdb8904bdd8d13adc1c237b5e869d32,2025-03-18T14:15:46.480000 +CVE-2025-30106,0,0,31af7150d5c12c0672c068b31fc4f3ce3cdb8904bdd8d13adc1c237b5e869d32,2025-03-18T14:15:46.480000 +CVE-2025-30107,1,1,b033894f6cb64a847031f71393dd8d017661e2f668aae34c216db290b0dc4da5,2025-03-18T15:16:01.930000 +CVE-2025-30109,1,1,06d2dc4c29c6f29379d53b8858ace2b049505705b200bf3727e1a2ca688744fc,2025-03-18T15:16:02.063000 +CVE-2025-30110,1,1,5927a06d165d3fd97fbd010b6781578dcbbe694556168c615231853c333fcaf7,2025-03-18T15:16:02.197000 +CVE-2025-30111,1,1,f056a585bcc7cea9d0310d947d3c1500d6a518a1f0ab68138d1723d532a774ed,2025-03-18T15:16:02.323000 +CVE-2025-30113,1,1,e1aef95121ef47920ac68091f5a750fd6ccebbd92238b879849a91f9468289d0,2025-03-18T15:16:02.453000 +CVE-2025-30114,1,1,0a74e12181a20bbd05d509cb52e1e4c600bcd086180ebcb761c2fe7c5cd60f56,2025-03-18T15:16:02.583000 +CVE-2025-30115,1,1,edcb78d963db6b2fc5efde6f100f2302ce02a6d6083eed8ecee44df4287757a5,2025-03-18T15:16:02.720000 +CVE-2025-30116,1,1,8ea7ddad52a4b86fbc3eacab8a80a01051011605d113ba3c925aafec5c59e2c7,2025-03-18T15:16:02.850000 +CVE-2025-30117,1,1,38b83939aec5f473f46b41f3ae77055e4239f111ef0fb1c68447277c0d7a7709,2025-03-18T15:16:02.990000 +CVE-2025-30122,1,1,8aaff3fe605a67598e8afe805ec5684a861743b811ec3556deec658e1b9448e9,2025-03-18T15:16:03.143000 +CVE-2025-30123,1,1,2f87a320a7cec723f6fe28b26090f29e74b4451437f28fe37ac06edea9b92689,2025-03-18T15:16:03.293000 +CVE-2025-30132,1,1,b29101e9bf34942e922481f880025e43d633483e2755910cf59b4b7362cff58c,2025-03-18T15:16:03.437000 CVE-2025-30143,0,0,dfaeb3eef5e72894446a00bc252dd02d40d218e0a77cd9256d63da4e0a89e02b,2025-03-17T16:15:28.643000