mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-06 10:42:17 +00:00
Auto-Update: 2025-04-15T12:00:23.122165+00:00
This commit is contained in:
parent
eb9da2406f
commit
08b7ca5f20
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2024-12094",
|
||||
"sourceIdentifier": "vdisclose@cert-in.org.in",
|
||||
"published": "2024-12-05T13:15:05.923",
|
||||
"lastModified": "2024-12-05T13:15:05.923",
|
||||
"lastModified": "2025-04-15T10:15:13.780",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "This vulnerability exists in the Tinxy mobile app due to storage of logged-in user information in plaintext on the device database. An attacker with physical access to the rooted device could exploit this vulnerability by accessing its database leading to unauthorized access of user information such as username, email address and mobile number."
|
||||
"value": "This vulnerability exists in the Tinxy mobile app due to storage of logged-in user information in plaintext on the device database. An attacker with physical access to the rooted device could exploit this vulnerability by accessing its database leading to unauthorized access of user information such as username, email address and mobile number.\nNote:\nTo exploit this vulnerability, the device must be rooted/jailbroken."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
100
CVE-2025/CVE-2025-16xx/CVE-2025-1688.json
Normal file
100
CVE-2025/CVE-2025-16xx/CVE-2025-1688.json
Normal file
@ -0,0 +1,100 @@
|
||||
{
|
||||
"id": "CVE-2025-1688",
|
||||
"sourceIdentifier": "cf45122d-9d50-442a-9b23-e05cde9943d8",
|
||||
"published": "2025-04-15T11:15:44.140",
|
||||
"lastModified": "2025-04-15T11:15:44.140",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Milestone Systems has discovered a\nsecurity vulnerability in Milestone XProtect installer that resets system\nconfiguration password after the upgrading from older versions using specific\ninstallers.\n\n\n\nThe system configuration\npassword is an additional, optional protection that is enabled on the\nManagement Server.\n\n\nTo mitigate the issue, we highly recommend updating system configuration password via GUI with a standard procedure.\n\n\n\nAny system upgraded with\n2024 R1 or 2024 R2 release installer is vulnerable to this issue.\n\n\n\nSystems upgraded from 2023\nR3 or older with version 2025 R1 and newer are not affected."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cf45122d-9d50-442a-9b23-e05cde9943d8",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:H/AT:P/PR:H/UI:N/VC:L/VI:L/VA:L/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"attackRequirements": "PRESENT",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "LOW",
|
||||
"vulnIntegrityImpact": "LOW",
|
||||
"vulnAvailabilityImpact": "LOW",
|
||||
"subConfidentialityImpact": "HIGH",
|
||||
"subIntegrityImpact": "HIGH",
|
||||
"subAvailabilityImpact": "HIGH",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cf45122d-9d50-442a-9b23-e05cde9943d8",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 1.3,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cf45122d-9d50-442a-9b23-e05cde9943d8",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-311"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://supportcommunity.milestonesys.com/KBRedir?art=000069835&lang=en_US",
|
||||
"source": "cf45122d-9d50-442a-9b23-e05cde9943d8"
|
||||
}
|
||||
]
|
||||
}
|
72
CVE-2025/CVE-2025-20xx/CVE-2025-2083.json
Normal file
72
CVE-2025/CVE-2025-20xx/CVE-2025-2083.json
Normal file
@ -0,0 +1,72 @@
|
||||
{
|
||||
"id": "CVE-2025-2083",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2025-04-15T10:15:14.680",
|
||||
"lastModified": "2025-04-15T10:15:14.680",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Logo Carousel Gutenberg Block plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the \u2018sliderId\u2019 parameter in all versions up to, and including, 2.1.6 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El complemento Logo Carousel Gutenberg Block para WordPress es vulnerable a Cross-Site Scripting almacenado a trav\u00e9s del par\u00e1metro \u00absliderId\u00bb en todas las versiones hasta la 2.1.6 incluida, debido a una depuraci\u00f3n de entrada y un escape de salida insuficientes. Esto permite a atacantes autenticados, con acceso de colaborador o superior, inyectar scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n al acceder un usuario a una p\u00e1gina inyectada."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 6.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/awesome-logo-carousel-block/tags/2.1.3/inc/classes/style.php#L86",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3271660/",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://wordpress.org/plugins/awesome-logo-carousel-block/#developers",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/604123f4-9247-489a-8fc8-478bfc697c7f?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2025-22371",
|
||||
"sourceIdentifier": "csirt@divd.nl",
|
||||
"published": "2025-04-14T16:15:21.450",
|
||||
"lastModified": "2025-04-14T16:15:21.450",
|
||||
"lastModified": "2025-04-15T11:15:45.217",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in SicommNet BASEC (SaaS Service) login page allows an unauthenticated remote attacker to Bypass Authentication and execute arbitrary SQL commands. This issue at least affects BASEC for the date of 14 Dec 2021 onwards. It is very likely that this vulnerability has been present in the solution before that.\n\nAs of the date of this CVE record, there has been no patch"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de elementos especiales utilizados en un comando SQL ('Inyecci\u00f3n SQL') en SicommNet BASEC (SaaS Service) login page, permite a un atacante remoto no autenticado omitir la autenticaci\u00f3n y ejecutar comandos SQL arbitrarios. Este problema afecta a BASEC al menos desde el 14 de diciembre de 2021. Es muy probable que esta vulnerabilidad ya estuviera presente en la soluci\u00f3n. A la fecha de este registro CVE, no se ha publicado ning\u00fan parche."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -75,7 +79,7 @@
|
||||
"source": "csirt@divd.nl"
|
||||
},
|
||||
{
|
||||
"url": "https://cisrt.divd.nl/CVE-2025-22371",
|
||||
"url": "https://csirt.divd.nl/CVE-2025-22371",
|
||||
"source": "csirt@divd.nl"
|
||||
},
|
||||
{
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2025-22372",
|
||||
"sourceIdentifier": "csirt@divd.nl",
|
||||
"published": "2025-04-14T16:15:21.630",
|
||||
"lastModified": "2025-04-14T16:15:21.630",
|
||||
"lastModified": "2025-04-15T11:15:45.380",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Insufficiently Protected Credentials vulnerability in SicommNet BASEC on SaaS allows Password Recovery.\nPasswords are either stored in plain text using reversible encryption, allowing an attacker with sufficient privileges to extract plain text passwords easily.\n\nThis issue affects BASEC: from 14 Dec 2021."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "La vulnerabilidad de credenciales insuficientemente protegidas en SicommNet BASEC en SaaS permite la recuperaci\u00f3n de contrase\u00f1as. Las contrase\u00f1as se almacenan en texto plano mediante cifrado reversible, lo que permite a un atacante con privilegios suficientes extraerlas f\u00e1cilmente. Este problema afecta a BASEC desde el 14 de diciembre de 2021."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -75,7 +79,7 @@
|
||||
"source": "csirt@divd.nl"
|
||||
},
|
||||
{
|
||||
"url": "https://cisrt.divd.nl/CVE-2025-22372",
|
||||
"url": "https://csirt.divd.nl/CVE-2025-22372",
|
||||
"source": "csirt@divd.nl"
|
||||
},
|
||||
{
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2025-22373",
|
||||
"sourceIdentifier": "csirt@divd.nl",
|
||||
"published": "2025-04-14T16:15:21.767",
|
||||
"lastModified": "2025-04-14T16:15:21.767",
|
||||
"lastModified": "2025-04-15T11:15:45.533",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in SicommNet BASEC on SaaS allows Reflected XSS, XSS Through HTTP Query Strings, Rendering of Arbitrary HTML and alternation of CSS Styles\nThis issue affects BASEC: from 14 Dec 2021."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en SicommNet BASEC en SaaS permite XSS reflejado, XSS a trav\u00e9s de cadenas de consulta HTTP, representaci\u00f3n de HTML arbitrario y alternancia de estilos CSS. Este problema afecta a BASEC: desde el 14 de diciembre de 2021."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -75,7 +79,7 @@
|
||||
"source": "csirt@divd.nl"
|
||||
},
|
||||
{
|
||||
"url": "https://cisrt.divd.nl/CVE-2025-22373",
|
||||
"url": "https://csirt.divd.nl/CVE-2025-22373",
|
||||
"source": "csirt@divd.nl"
|
||||
},
|
||||
{
|
||||
|
60
CVE-2025/CVE-2025-329xx/CVE-2025-32943.json
Normal file
60
CVE-2025/CVE-2025-329xx/CVE-2025-32943.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2025-32943",
|
||||
"sourceIdentifier": "reefs@jfrog.com",
|
||||
"published": "2025-04-15T11:15:45.690",
|
||||
"lastModified": "2025-04-15T11:15:45.690",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The vulnerability allows any authenticated user to leak the contents of arbitrary \u201c.m3u8\u201d files from the PeerTube server due to a path traversal in the HLS endpoint."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "reefs@jfrog.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||||
"baseScore": 3.7,
|
||||
"baseSeverity": "LOW",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "reefs@jfrog.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-22"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Chocobozzz/PeerTube/releases/tag/v7.1.1",
|
||||
"source": "reefs@jfrog.com"
|
||||
},
|
||||
{
|
||||
"url": "https://research.jfrog.com/vulnerabilities/peertube-hls-path-traversal/",
|
||||
"source": "reefs@jfrog.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -9,6 +9,10 @@
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In versions prior to Aidex 1.7, an authenticated malicious user, taking advantage of an open registry, could execute unauthorised commands within the system. This includes executing operating system (Unix) commands, interacting with internal services such as PHP or MySQL, and even invoking native functions of the framework used, such as Laravel or Symfony. This execution is achieved by Prompt Injection attacks through the /api/<string-chat>/message endpoint, manipulating the content of the \u2018content\u2019 parameter."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "En versiones anteriores a Aidex 1.7, un usuario malicioso autenticado, aprovechando un registro abierto, pod\u00eda ejecutar comandos no autorizados dentro del sistema. Esto inclu\u00eda ejecutar comandos del sistema operativo (Unix), interactuar con servicios internos como PHP o MySQL, e incluso invocar funciones nativas del framework utilizado, como Laravel o Symfony. Esta ejecuci\u00f3n se logra mediante ataques de inyecci\u00f3n de mensajes a trav\u00e9s del endpoint /api//message, manipulando el contenido del par\u00e1metro 'content'."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
23
README.md
23
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2025-04-15T10:00:19.969184+00:00
|
||||
2025-04-15T12:00:23.122165+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2025-04-15T09:15:13.950000+00:00
|
||||
2025-04-15T11:15:45.690000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,24 +33,27 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
289852
|
||||
289855
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `5`
|
||||
Recently added CVEs: `3`
|
||||
|
||||
- [CVE-2024-45712](CVE-2024/CVE-2024-457xx/CVE-2024-45712.json) (`2025-04-15T09:15:13.293`)
|
||||
- [CVE-2025-3574](CVE-2025/CVE-2025-35xx/CVE-2025-3574.json) (`2025-04-15T09:15:13.500`)
|
||||
- [CVE-2025-3575](CVE-2025/CVE-2025-35xx/CVE-2025-3575.json) (`2025-04-15T09:15:13.670`)
|
||||
- [CVE-2025-3578](CVE-2025/CVE-2025-35xx/CVE-2025-3578.json) (`2025-04-15T09:15:13.810`)
|
||||
- [CVE-2025-3579](CVE-2025/CVE-2025-35xx/CVE-2025-3579.json) (`2025-04-15T09:15:13.950`)
|
||||
- [CVE-2025-1688](CVE-2025/CVE-2025-16xx/CVE-2025-1688.json) (`2025-04-15T11:15:44.140`)
|
||||
- [CVE-2025-2083](CVE-2025/CVE-2025-20xx/CVE-2025-2083.json) (`2025-04-15T10:15:14.680`)
|
||||
- [CVE-2025-32943](CVE-2025/CVE-2025-329xx/CVE-2025-32943.json) (`2025-04-15T11:15:45.690`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `0`
|
||||
Recently modified CVEs: `5`
|
||||
|
||||
- [CVE-2024-12094](CVE-2024/CVE-2024-120xx/CVE-2024-12094.json) (`2025-04-15T10:15:13.780`)
|
||||
- [CVE-2025-22371](CVE-2025/CVE-2025-223xx/CVE-2025-22371.json) (`2025-04-15T11:15:45.217`)
|
||||
- [CVE-2025-22372](CVE-2025/CVE-2025-223xx/CVE-2025-22372.json) (`2025-04-15T11:15:45.380`)
|
||||
- [CVE-2025-22373](CVE-2025/CVE-2025-223xx/CVE-2025-22373.json) (`2025-04-15T11:15:45.533`)
|
||||
- [CVE-2025-3579](CVE-2025/CVE-2025-35xx/CVE-2025-3579.json) (`2025-04-15T09:15:13.950`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
21
_state.csv
21
_state.csv
@ -246594,7 +246594,7 @@ CVE-2024-1209,0,0,0c11632b4f799f8334de1fe031a18ed75abc1306137789706f83e79036cdbf
|
||||
CVE-2024-12090,0,0,3ae49935c044b86a3444ecb09701dd060f603a46c2ce1e27c4f8226f9377436d,2024-12-16T15:15:06.393000
|
||||
CVE-2024-12091,0,0,35c9100407a2a2f03cc09233dbdc35208e548ffdd088d484bb9b374c740b5bc0,2024-12-16T15:15:06.540000
|
||||
CVE-2024-12092,0,0,6cedbb52bdc4fd872b35781acb98ac9a9b54d520c5d29f314ba42350997260f9,2024-12-16T15:15:06.677000
|
||||
CVE-2024-12094,0,0,6dd85a9b2557f08ee364682e83ba2b4a96df650121716b26f85951e9de06f6f5,2024-12-05T13:15:05.923000
|
||||
CVE-2024-12094,0,1,12c81bd6e44afba106aa5b9c1f1003a5bf1fbf3bef13df97a3697ccb2bca6566,2025-04-15T10:15:13.780000
|
||||
CVE-2024-12095,0,0,266981a4f802a4e630b12ac2741c69386abcb730aae3bae3718e0ed36165b300,2025-02-11T02:15:33.547000
|
||||
CVE-2024-12096,0,0,a0b37dcc639d983cbff8481184c987ae3b7851e6c867f94b52bee5fdf38bc784,2024-12-24T17:15:07.497000
|
||||
CVE-2024-12097,0,0,080558aa7b3ac1febe350d71d1f75d062875ebd1cc067888fb9586ec0ac95026,2025-03-05T14:15:35.280000
|
||||
@ -268927,7 +268927,7 @@ CVE-2024-45709,0,0,a0d4e56bb263bc9e47877f3006692003a99a930acd527517129f8ee5e89f2
|
||||
CVE-2024-4571,0,0,76823bb120333d1d68e24e57a18868a62bd826931cb118db3f1630877d1250ae,2024-05-14T15:44:05.750000
|
||||
CVE-2024-45710,0,0,d5d20bd0fdb7865f82e5f4b909a4d875dc5f3d77d52392f9ffe78a5294c66c14,2024-10-17T20:18:04.277000
|
||||
CVE-2024-45711,0,0,22c1ac5b6f0da26129aa7e9e3ba97f2e8dcb4bd8ce735f9d8d4ba8f17c970de0,2024-10-17T20:17:29.207000
|
||||
CVE-2024-45712,1,1,425d3ffbbdb368bb3f24cdc34c642716ef37128e2d988a83381a8c3f305f60a4,2025-04-15T09:15:13.293000
|
||||
CVE-2024-45712,0,0,425d3ffbbdb368bb3f24cdc34c642716ef37128e2d988a83381a8c3f305f60a4,2025-04-15T09:15:13.293000
|
||||
CVE-2024-45713,0,0,32ed7424619f61f0e03fc9972f78fa1c726821d98390dabdc73054fbc284d4f3,2025-02-25T17:15:36.083000
|
||||
CVE-2024-45714,0,0,c21a61c96d9ad07289ac1311a92c3e561bfa126cb238bbc3e6ffd66427ef24a4,2024-10-30T20:33:59.393000
|
||||
CVE-2024-45715,0,0,b59b14b28dcb4298df8d6640386a10aa143d80809296166ad7bdf16d746d8447,2025-02-26T18:47:19.923000
|
||||
@ -282391,6 +282391,7 @@ CVE-2025-1682,0,0,cc794daa0dbacddc54b0e89e0bf9a4796b5672845d169d6dbf1869b7f592f7
|
||||
CVE-2025-1683,0,0,bd65547481d5838793e5ad335f0bed73820ac4e81083a338100991ba4dbdb8f6,2025-03-13T10:15:19.687000
|
||||
CVE-2025-1686,0,0,d1ef42202e7d4a5987e7a7fded4c55f6d574235579a6aece0e74834a9611412f,2025-04-07T18:29:22.970000
|
||||
CVE-2025-1687,0,0,553889bbf1832e8d0246ba505a729ffeb25a6379aca1ca1f8f3f4851031d21de,2025-02-28T00:15:36.240000
|
||||
CVE-2025-1688,1,1,5c6a06bac422adb33706be8471e71dc0fb7c545a86012640310ae7a34b701c10,2025-04-15T11:15:44.140000
|
||||
CVE-2025-1689,0,0,ab0c739015e868491c3393a9dbae0818d17aadfd3d893b02587a47ce8b53dda1,2025-03-11T16:19:41.870000
|
||||
CVE-2025-1690,0,0,8515e3753c09328c692a367a40f4a48932e87850b11ca7360289773890aa45cb,2025-03-11T15:59:35.800000
|
||||
CVE-2025-1691,0,0,5eec1cea57e35f579c692b6064aead03fa43885ba22ff953ac9e969443e43853,2025-02-27T16:15:38.610000
|
||||
@ -282807,6 +282808,7 @@ CVE-2025-2078,0,0,9de7f9d36f257c6e4ade1283dce5bdc5d09f9fe37ce0133e41f71eebe0b83d
|
||||
CVE-2025-2079,0,0,1df99b44115761c768e37334a26d3048ad67e1a5d7d245b0266a3de82699255e,2025-03-13T17:15:38.080000
|
||||
CVE-2025-2080,0,0,8997dd07180b59c809f3df794229cdf89e46a6b355c2dafb103afdfc1a28dd39,2025-03-13T17:15:38.253000
|
||||
CVE-2025-2081,0,0,4bcbb760543adfc2793fb421232d69f0d37c0297321a5cb193e8d3ca3a30e752,2025-03-13T17:15:38.420000
|
||||
CVE-2025-2083,1,1,b56ebbfb64e690ba283af5695296a4a84125b08da3edddfa6c1f4a6e681671a4,2025-04-15T10:15:14.680000
|
||||
CVE-2025-2084,0,0,9186874e9417709e91bfbc0560be14cc85e2d2f24397f030f63236f2d997e78b,2025-03-12T17:20:12.987000
|
||||
CVE-2025-2085,0,0,cdc776ce557f1f5be020949a2de79ef2cb25d7baf89cebb5bb3d5d1806b66fad,2025-03-13T15:23:29.823000
|
||||
CVE-2025-2086,0,0,4e4362d5771bd0746a87b792e272a1c98aa3e837b1c239bf63f7ebc27efa4148,2025-03-13T16:05:15.390000
|
||||
@ -283954,9 +283956,9 @@ CVE-2025-22368,0,0,15868b6e5746df64ac40f74359090d3c138a5fc4277e3491f8b4d3153bda9
|
||||
CVE-2025-22369,0,0,914da155da04583b64bbcd7efb69cdb65cf9b4fa1a7a93f57111b5e36bed452e,2025-03-11T14:15:24.767000
|
||||
CVE-2025-2237,0,0,6c579bdd62bb8bda18ad2566fa6cb9554676ec322606aaab27d5422395dc3d2a,2025-04-01T20:26:11.547000
|
||||
CVE-2025-22370,0,0,e3b9834ee83fce05ff2df07009571f711e0033889d2c52add2c8f53db29092f5,2025-03-11T14:15:24.917000
|
||||
CVE-2025-22371,0,0,c82830eff61f786f4a41d520ced8b7d97f0fc968b9dca6d64ac8c8f5a8062949,2025-04-14T16:15:21.450000
|
||||
CVE-2025-22372,0,0,62059b0e6f5e800c7b741753fa399f925400e0a9d52baf43c329020697384563,2025-04-14T16:15:21.630000
|
||||
CVE-2025-22373,0,0,f58fa4b3cb6c5107efeaee8c66737066f251b2bcb6143590f5a88cee310c3f63,2025-04-14T16:15:21.767000
|
||||
CVE-2025-22371,0,1,0fd515925b08583f66cf085b616128c74a1f3ca917aaf620b57021f2d4ed8aeb,2025-04-15T11:15:45.217000
|
||||
CVE-2025-22372,0,1,75369389960d3f21f4b6bbb162c3c9c860956b812ae91586aca01dac2b81e9e1,2025-04-15T11:15:45.380000
|
||||
CVE-2025-22373,0,1,b4963d7ab520a3ca5c3658c16dccdae3f07c2db90137181fcb67a712fe2c95e6,2025-04-15T11:15:45.533000
|
||||
CVE-2025-22374,0,0,3c76c0c310d0a27c4ffac60f4f224c77b792b9b62909428eaeef4914314662fa,2025-04-11T15:39:52.920000
|
||||
CVE-2025-22375,0,0,ad41e29f59774e7ec2e9cb8e8af4d844651a9cedc9ff6f6b9f174f11c786065a,2025-04-11T15:39:52.920000
|
||||
CVE-2025-22376,0,0,0b599d4fbe0b053f67328db02ad6a56c3b1af5acbc775b8d4fa33614fa96b0bf,2025-01-21T18:15:15.473000
|
||||
@ -289662,6 +289664,7 @@ CVE-2025-32938,0,0,d97032ba2fb62d85b0fd781b1a847fc87e2cde9e5de8598412a81c2f7b235
|
||||
CVE-2025-32939,0,0,6d0ae9200a7976c683c740ee0295d246f733a1e3dbef51e2eacbe3ae7efb8a4d,2025-04-15T03:15:17.957000
|
||||
CVE-2025-32940,0,0,ef492180fd67c205ba6c2e08604b15b7b05288970e18fade437210606e359428,2025-04-15T03:15:18.013000
|
||||
CVE-2025-32941,0,0,7b47b38d71f23645464b8e8efcb34f5cd92a1b50b5494bf228368f472d5e5710,2025-04-15T03:15:18.077000
|
||||
CVE-2025-32943,1,1,23e64df0fd35a825759aae24d8798ec09a333f7b3609395a3902498ee98d825b,2025-04-15T11:15:45.690000
|
||||
CVE-2025-3296,0,0,604544c60030717a0b7298a4216c2cee6c0b09dc746101c73c6d715c2da17326,2025-04-08T16:49:21.037000
|
||||
CVE-2025-3297,0,0,450f027df383ac012c0d670b8246ab459ec83da0d22f33695d8eb8051ee5200e,2025-04-08T16:49:12.910000
|
||||
CVE-2025-3298,0,0,289613560130dabe199eea55128a1bdfe9eecd882e62238f3674c43e858ef0bc,2025-04-08T16:49:00.290000
|
||||
@ -289835,11 +289838,11 @@ CVE-2025-3570,0,0,cf9fb78e19d7bef088f008e110fad665be6507ce3e02644cb83c14c976813f
|
||||
CVE-2025-3571,0,0,7d08bea3ed82387da792d57f13b758e450a18d2640f2f9feafe1f3cbbdc5d106,2025-04-14T16:15:22.713000
|
||||
CVE-2025-3572,0,0,ce93ec390a9611703e154796a1c8b29e4cb3ba90d0f017a2ea9b391560345b34,2025-04-14T03:15:17
|
||||
CVE-2025-3573,0,0,52403cdc0d4d4fd5df289c287693d2c1bcd3dbc2441d5342f1cf42b619f826c7,2025-04-15T05:15:31.007000
|
||||
CVE-2025-3574,1,1,f996911954026f2b9520c1e3b9e7bc2c127ad4cd73d0acb10a428900f0672f69,2025-04-15T09:15:13.500000
|
||||
CVE-2025-3575,1,1,3b859cdcc75d19b0bd222446e0df21a3c805929d044033ae64d5f00e6acaf9a6,2025-04-15T09:15:13.670000
|
||||
CVE-2025-3574,0,0,f996911954026f2b9520c1e3b9e7bc2c127ad4cd73d0acb10a428900f0672f69,2025-04-15T09:15:13.500000
|
||||
CVE-2025-3575,0,0,3b859cdcc75d19b0bd222446e0df21a3c805929d044033ae64d5f00e6acaf9a6,2025-04-15T09:15:13.670000
|
||||
CVE-2025-3576,0,0,b0049c6025d64b2929e211c65d145d94da2ded08e6e9fc81bae0b76f324cbdc5,2025-04-15T06:15:44.047000
|
||||
CVE-2025-3578,1,1,87d1e0551317c254c64c797e6713254af47bbba82a0ddab4b2b90342d2423840,2025-04-15T09:15:13.810000
|
||||
CVE-2025-3579,1,1,72de94005a72ea4c7cd49f354d14e37d3c80cc3c42f74a93bd35e14111fe98bf,2025-04-15T09:15:13.950000
|
||||
CVE-2025-3578,0,0,87d1e0551317c254c64c797e6713254af47bbba82a0ddab4b2b90342d2423840,2025-04-15T09:15:13.810000
|
||||
CVE-2025-3579,0,1,14a4df7542b5c70b893d9914691e4b28106064c1cc523e6fc5e4c2a44d170fa3,2025-04-15T09:15:13.950000
|
||||
CVE-2025-3585,0,0,3f56099df0d5cbe2a28c49e0084d09a46fec0a860dece5bd91eb4466f785fbfe,2025-04-14T19:15:36.990000
|
||||
CVE-2025-3587,0,0,0b5d7c64b9281d67b2da75b50cd511d58c4d6400c863ce33e2f51939e792bcae,2025-04-14T21:15:18.220000
|
||||
CVE-2025-3588,0,0,325725e21d51ea302750035b03dc4eb21568d3831b2e5a943f3da0a80eb56df1,2025-04-14T21:15:18.343000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user