mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-05 10:18:41 +00:00
Auto-Update: 2025-03-22T17:00:19.933923+00:00
This commit is contained in:
parent
b20edaf720
commit
104af01555
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-20570",
|
||||
"sourceIdentifier": "psirt@amd.com",
|
||||
"published": "2024-02-13T18:15:47.233",
|
||||
"lastModified": "2024-11-21T07:41:08.820",
|
||||
"lastModified": "2025-03-22T15:15:35.730",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
|
||||
"baseScore": 3.3,
|
||||
"baseSeverity": "LOW",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-345"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-345"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-13120",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2025-02-13T06:15:20.917",
|
||||
"lastModified": "2025-02-18T18:15:18.040",
|
||||
"lastModified": "2025-03-22T15:15:36.820",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,30 @@
|
||||
"value": "El complemento Paid Membership Plugin, Ecommerce, User Registration Form, Login Form, User Profile & Restrict Content de WordPress anterior a la versi\u00f3n 4.15.20 no depura ni escapa de algunas de sus configuraciones, lo que podr\u00eda permitir que usuarios con privilegios altos como el administrador realicen ataques Cross-Site Scripting Almacenado incluso cuando la capacidad unfiltered_html no est\u00e1 permitida (por ejemplo, en una configuraci\u00f3n multisitio)."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 4.8,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.7,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/5b70798c-c30d-42e6-ac72-821c5568b9b5/",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-21175",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2024-07-16T23:15:21.337",
|
||||
"lastModified": "2024-11-21T08:53:55.820",
|
||||
"lastModified": "2025-03-22T15:15:36.973",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -19,7 +19,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "secalert_us@oracle.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
|
||||
@ -49,6 +49,16 @@
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-30159",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-21T21:15:05.073",
|
||||
"lastModified": "2024-10-25T16:30:47.127",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2025-03-22T15:15:37.173",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.7,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 4.8,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.7,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-30160",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-21T21:15:05.190",
|
||||
"lastModified": "2024-10-25T16:30:53.613",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2025-03-22T15:15:37.373",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.7,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 4.8,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.7,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-45317",
|
||||
"sourceIdentifier": "PSIRT@sonicwall.com",
|
||||
"published": "2024-10-11T13:15:16.103",
|
||||
"lastModified": "2024-10-15T12:58:51.050",
|
||||
"lastModified": "2025-03-22T15:15:37.560",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,30 @@
|
||||
"value": "Una vulnerabilidad de Server-Side Request Forgery (SSRF) en las versiones de firmware 12.4.3-02676 y anteriores del dispositivo SMA1000 permite que un atacante remoto no autenticado haga que la aplicaci\u00f3n del lado del servidor SMA1000 realice solicitudes a una direcci\u00f3n IP no deseada."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "PSIRT@sonicwall.com",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-57601",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-12T22:15:40.747",
|
||||
"lastModified": "2025-02-18T18:15:27.663",
|
||||
"lastModified": "2025-03-22T15:15:37.747",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "La vulnerabilidad de Cross Site Scripting en Alex Tselegidis EasyAppointments v.1.5.0 permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s del par\u00e1metro legal_settings."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://hkohi.ca/vulnerability/13",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-57656",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-01-14T01:15:14.417",
|
||||
"lastModified": "2025-02-18T22:15:15.500",
|
||||
"lastModified": "2025-03-22T15:15:37.953",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Un problema en el componente sqlc_add_distinct_node de openlink virtuoso-opensource v7.2.11 permite a los atacantes provocar una denegaci\u00f3n de servicio (DoS) a trav\u00e9s de declaraciones SQL manipuladas."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/openlink/virtuoso-opensource/issues/1210",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-57719",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-01-23T01:15:26.740",
|
||||
"lastModified": "2025-02-18T20:15:22.603",
|
||||
"lastModified": "2025-03-22T15:15:38.243",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Se descubri\u00f3 que lunasvg v3.0.0 conten\u00eda una violaci\u00f3n de segmentaci\u00f3n a trav\u00e9s del componente blend_transformed_tiled_argb.isra.0."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-476"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/keepinggg/poc/blob/main/poc_of_lunasvg_3.1.0",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-24158",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-01-27T22:15:19.800",
|
||||
"lastModified": "2025-03-03T22:51:31.440",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2025-03-22T15:15:38.440",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,19 +36,49 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Secondary",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-26408",
|
||||
"sourceIdentifier": "551230f0-3615-47bd-b7cc-93e92e730bbf",
|
||||
"published": "2025-02-11T10:15:09.617",
|
||||
"lastModified": "2025-02-18T18:15:36.097",
|
||||
"lastModified": "2025-03-22T15:15:38.687",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,30 @@
|
||||
"value": "Se puede acceder a la interfaz JTAG de los dispositivos Wattsense Bridge mediante acceso f\u00edsico a la PCB. Despu\u00e9s de conectarse a la interfaz, es posible acceder por completo al dispositivo. Esto permite a un atacante extraer informaci\u00f3n, modificar y depurar el firmware del dispositivo. Todas las versiones conocidas se ven afectadas."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "PHYSICAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 0.9,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "551230f0-3615-47bd-b7cc-93e92e730bbf",
|
||||
|
152
CVE-2025/CVE-2025-26xx/CVE-2025-2620.json
Normal file
152
CVE-2025/CVE-2025-26xx/CVE-2025-2620.json
Normal file
@ -0,0 +1,152 @@
|
||||
{
|
||||
"id": "CVE-2025-2620",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-03-22T15:15:38.860",
|
||||
"lastModified": "2025-03-22T15:15:38.860",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [
|
||||
{
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"unsupported-when-assigned"
|
||||
]
|
||||
}
|
||||
],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability has been found in D-Link DAP-1620 1.03 and classified as critical. This vulnerability affects the function mod_graph_auth_uri_handler of the file /storage of the component Authentication Handler. The manipulation leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 9.3,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "HIGH",
|
||||
"vulnIntegrityImpact": "HIGH",
|
||||
"vulnAvailabilityImpact": "HIGH",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||||
"baseScore": 10.0,
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "NONE",
|
||||
"confidentialityImpact": "COMPLETE",
|
||||
"integrityImpact": "COMPLETE",
|
||||
"availabilityImpact": "COMPLETE"
|
||||
},
|
||||
"baseSeverity": "HIGH",
|
||||
"exploitabilityScore": 10.0,
|
||||
"impactScore": 10.0,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-119"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-121"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.300622",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.300622",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.518969",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://witty-maiasaura-083.notion.site/D-link-DAP-1620-mod_graph_auth_uri_handler-Vulnerability-1afb2f2a6361809ea7f2dc4df3b85f1f",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.dlink.com/",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
39
README.md
39
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2025-03-22T15:00:20.196709+00:00
|
||||
2025-03-22T17:00:19.933923+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2025-03-22T14:15:16.867000+00:00
|
||||
2025-03-22T15:15:38.860000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,36 +33,31 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
286218
|
||||
286219
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `5`
|
||||
Recently added CVEs: `1`
|
||||
|
||||
- [CVE-2025-2186](CVE-2025/CVE-2025-21xx/CVE-2025-2186.json) (`2025-03-22T13:15:35.683`)
|
||||
- [CVE-2025-2617](CVE-2025/CVE-2025-26xx/CVE-2025-2617.json) (`2025-03-22T13:15:35.837`)
|
||||
- [CVE-2025-2618](CVE-2025/CVE-2025-26xx/CVE-2025-2618.json) (`2025-03-22T14:15:16.650`)
|
||||
- [CVE-2025-2619](CVE-2025/CVE-2025-26xx/CVE-2025-2619.json) (`2025-03-22T14:15:16.867`)
|
||||
- [CVE-2025-26796](CVE-2025/CVE-2025-267xx/CVE-2025-26796.json) (`2025-03-22T13:15:35.513`)
|
||||
- [CVE-2025-2620](CVE-2025/CVE-2025-26xx/CVE-2025-2620.json) (`2025-03-22T15:15:38.860`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `12`
|
||||
Recently modified CVEs: `11`
|
||||
|
||||
- [CVE-2024-10466](CVE-2024/CVE-2024-104xx/CVE-2024-10466.json) (`2025-03-22T14:15:13.777`)
|
||||
- [CVE-2024-2886](CVE-2024/CVE-2024-28xx/CVE-2024-2886.json) (`2025-03-22T14:15:14.203`)
|
||||
- [CVE-2024-39925](CVE-2024/CVE-2024-399xx/CVE-2024-39925.json) (`2025-03-22T14:15:14.477`)
|
||||
- [CVE-2024-40850](CVE-2024/CVE-2024-408xx/CVE-2024-40850.json) (`2025-03-22T14:15:14.713`)
|
||||
- [CVE-2024-44136](CVE-2024/CVE-2024-441xx/CVE-2024-44136.json) (`2025-03-22T14:15:14.963`)
|
||||
- [CVE-2024-51123](CVE-2024/CVE-2024-511xx/CVE-2024-51123.json) (`2025-03-22T14:15:15.170`)
|
||||
- [CVE-2024-51440](CVE-2024/CVE-2024-514xx/CVE-2024-51440.json) (`2025-03-22T14:15:15.390`)
|
||||
- [CVE-2024-56898](CVE-2024/CVE-2024-568xx/CVE-2024-56898.json) (`2025-03-22T14:15:15.590`)
|
||||
- [CVE-2024-56921](CVE-2024/CVE-2024-569xx/CVE-2024-56921.json) (`2025-03-22T14:15:15.787`)
|
||||
- [CVE-2024-57582](CVE-2024/CVE-2024-575xx/CVE-2024-57582.json) (`2025-03-22T14:15:15.960`)
|
||||
- [CVE-2024-57606](CVE-2024/CVE-2024-576xx/CVE-2024-57606.json) (`2025-03-22T14:15:16.170`)
|
||||
- [CVE-2025-23086](CVE-2025/CVE-2025-230xx/CVE-2025-23086.json) (`2025-03-22T14:15:16.360`)
|
||||
- [CVE-2023-20570](CVE-2023/CVE-2023-205xx/CVE-2023-20570.json) (`2025-03-22T15:15:35.730`)
|
||||
- [CVE-2024-13120](CVE-2024/CVE-2024-131xx/CVE-2024-13120.json) (`2025-03-22T15:15:36.820`)
|
||||
- [CVE-2024-21175](CVE-2024/CVE-2024-211xx/CVE-2024-21175.json) (`2025-03-22T15:15:36.973`)
|
||||
- [CVE-2024-30159](CVE-2024/CVE-2024-301xx/CVE-2024-30159.json) (`2025-03-22T15:15:37.173`)
|
||||
- [CVE-2024-30160](CVE-2024/CVE-2024-301xx/CVE-2024-30160.json) (`2025-03-22T15:15:37.373`)
|
||||
- [CVE-2024-45317](CVE-2024/CVE-2024-453xx/CVE-2024-45317.json) (`2025-03-22T15:15:37.560`)
|
||||
- [CVE-2024-57601](CVE-2024/CVE-2024-576xx/CVE-2024-57601.json) (`2025-03-22T15:15:37.747`)
|
||||
- [CVE-2024-57656](CVE-2024/CVE-2024-576xx/CVE-2024-57656.json) (`2025-03-22T15:15:37.953`)
|
||||
- [CVE-2024-57719](CVE-2024/CVE-2024-577xx/CVE-2024-57719.json) (`2025-03-22T15:15:38.243`)
|
||||
- [CVE-2025-24158](CVE-2025/CVE-2025-241xx/CVE-2025-24158.json) (`2025-03-22T15:15:38.440`)
|
||||
- [CVE-2025-26408](CVE-2025/CVE-2025-264xx/CVE-2025-26408.json) (`2025-03-22T15:15:38.687`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
57
_state.csv
57
_state.csv
@ -216257,7 +216257,7 @@ CVE-2023-20567,0,0,c964118cb11f73e6b60a22120cf87763e94154beef53a5219420f8ba021f3
|
||||
CVE-2023-20568,0,0,da565fc4dc5d60c80e362326f1bbc3cea5fe2bb5e947fdb4d44207deef9071ab,2025-02-13T17:16:01.573000
|
||||
CVE-2023-20569,0,0,9c57246b0f9b85ed1bb205cd78f96d07cdbdc134f8f4888158d7bbd00a5a4606,2024-11-21T07:41:08.533000
|
||||
CVE-2023-2057,0,0,d221bbe2743161f6d902280c378eea66efefb069a3c831c6d7b6071745e039eb,2024-11-21T07:57:51.210000
|
||||
CVE-2023-20570,0,0,7c7bd8c102f3da17973fb41ed490782475d32e06863503f8cc726b6eecea192a,2024-11-21T07:41:08.820000
|
||||
CVE-2023-20570,0,1,3f04701ed795d51d2dcb75de0253d91e51782d37c95cda88aadf51b95684d2a0,2025-03-22T15:15:35.730000
|
||||
CVE-2023-20571,0,0,124885a17b0594fd83dce4569d7fca5fe444643e548995c0e909a74c3e042d42,2024-11-21T07:41:09
|
||||
CVE-2023-20573,0,0,c1228e58cf6c75c55f40924878fd7ef9a08a1744efdfa2fdc877544f49aedfe3,2024-11-21T07:41:09.177000
|
||||
CVE-2023-20575,0,0,d454030d808802a4dcec640f81d272aa7c4135f2a2dc62f9cf54b366e4182643,2024-11-27T16:15:08.010000
|
||||
@ -244790,7 +244790,7 @@ CVE-2024-10462,0,0,2786d011829da8771867443f24aa66a7980a2c1c4ede689df85c917119c6e
|
||||
CVE-2024-10463,0,0,3ddfd266b41fd173cebb851d2bc34cbf2c785db4b330494b6a3f4845aa6052a5,2024-11-04T13:31:20.073000
|
||||
CVE-2024-10464,0,0,fa0fca4ba089b4bc982df15af00e5fe7b90b3385712043456e98d4b150175b15,2024-11-04T13:30:23.513000
|
||||
CVE-2024-10465,0,0,8955d1f0157719f4fbefe7fae8269c4898adc0f8f926a16acb2d50f72eb39e2b,2024-11-04T13:30:10.847000
|
||||
CVE-2024-10466,0,1,d37780994ce15448788df211d1c90c720a82eab889668623785a34933f069579,2025-03-22T14:15:13.777000
|
||||
CVE-2024-10466,0,0,d37780994ce15448788df211d1c90c720a82eab889668623785a34933f069579,2025-03-22T14:15:13.777000
|
||||
CVE-2024-10467,0,0,e1f34dd6104cfd3e09c5a71b6aa3ee970947971a56a24313d0f901ec95ffb9ce,2024-11-04T13:26:32.343000
|
||||
CVE-2024-10468,0,0,2e0775a6f7da096b11ed271b6d824dfb524d1f0c9aba0d0194c0beb3e139a796,2024-11-04T13:29:23.937000
|
||||
CVE-2024-10469,0,0,5ff565379c9cc646c3a0577a3fc586a540310f1f97f93d9364541d739cdc52c2,2025-03-17T17:15:20.267000
|
||||
@ -247399,7 +247399,7 @@ CVE-2024-13116,0,0,98f3ad6698735710def1c6baf530db546e54e66a9af268d4888f3cbf2c43d
|
||||
CVE-2024-13117,0,0,48c4c1a0deaa83ed5f11e564cf33aba28b1ea8edfb18de9dc2dbe1b856b27247,2025-02-03T15:15:16.440000
|
||||
CVE-2024-13119,0,0,73826a06c11021e3ab53b915522c9178a0e342dd2d9e6f744a28454c1427d96c,2025-02-13T15:15:17.360000
|
||||
CVE-2024-1312,0,0,d16b3ecc82cd74d4071dc20055eab0a36b43013bc6757c1d62cda1a87b890d59,2024-11-21T08:50:18.020000
|
||||
CVE-2024-13120,0,0,01e8eb521e95e41e82091c7a9f1593a28634c208db510b4e1c1c474760e5f764,2025-02-18T18:15:18.040000
|
||||
CVE-2024-13120,0,1,bf28b53c2d93a12739a8ec95b1d7d2d5cd7dd1e5003751f3f3cff0db287ff89c,2025-03-22T15:15:36.820000
|
||||
CVE-2024-13121,0,0,eea054139dc60b1a73e646e7a0792d046eb2c33404d8501622a8bb165162f3ee,2025-02-19T22:15:22.250000
|
||||
CVE-2024-13125,0,0,bcf9d3da81b0bd561483ac7c7c16f4aea5f6f77159bd25d7d228b3f63d6a7f5c,2025-02-19T22:15:22.390000
|
||||
CVE-2024-13126,0,0,2954b0c6d56f081558db1c9d9552b1f2529defcf3528faffaea30c48e2a49418,2025-03-17T19:15:21.573000
|
||||
@ -249777,7 +249777,7 @@ CVE-2024-21171,0,0,61b7882ff74299d4c34aa7d4392c360ac819414c7049ab797c7be620c6b6b
|
||||
CVE-2024-21172,0,0,ff5d0eda037e06e7f32897640b26e512b78468cde367840023f94016b9cff32b,2024-10-21T12:59:49.070000
|
||||
CVE-2024-21173,0,0,1dbc648a84b918e35f1a74d8e8514c5c1c2f9340b2449aca3fe5a999409fe38c,2024-11-21T08:53:55.570000
|
||||
CVE-2024-21174,0,0,3aedc4aa4a685a673eda6d373d2980d41a58f103654e9e3fbf1a83af6fe80b33,2024-12-03T20:15:14.673000
|
||||
CVE-2024-21175,0,0,130e23c31b3fd2a97af8d77e08bc4a8d42a9eb0b48d10e335706c1840de61bdc,2024-11-21T08:53:55.820000
|
||||
CVE-2024-21175,0,1,e03e7e0c59c793429b473a360114525d48cf5ca7657dc7f86416ef777a4c8504,2025-03-22T15:15:36.973000
|
||||
CVE-2024-21176,0,0,e67fa4210999e42aabb0f353f1923af498dc2157a69a86cdbcbbc16b079f6b49,2024-11-21T08:53:55.950000
|
||||
CVE-2024-21177,0,0,a7beebd8af66762ba6554b1372efec08a7ba14cfa8d8ffd3d0b507303d295027,2025-03-13T14:15:20.593000
|
||||
CVE-2024-21178,0,0,51bccbc8da1f038b0557737fb971680681a02da13b58dff07ed454014200ef9d,2025-03-14T17:15:42.167000
|
||||
@ -255666,7 +255666,7 @@ CVE-2024-28853,0,0,4174d9fe94e784f7c3c99aec47d682c70c2da871c53d6c4ae537c46c4c434
|
||||
CVE-2024-28854,0,0,fc72a1af9a4423f23eb1c2bfab5673b3cdf91d9369b066233da617e99e87a321,2024-11-21T09:07:03.207000
|
||||
CVE-2024-28855,0,0,acb3d3e157cc68dbbea7f5c0e503c2de3d780f240741901169138f093e88a38c,2025-01-08T18:14:28.137000
|
||||
CVE-2024-28859,0,0,6f026de9f6ccdab17442bfff936b54d3f18997dbcded841f5c04513f5212d2c9,2024-11-21T09:07:03.500000
|
||||
CVE-2024-2886,0,1,e685f1bc0205345c0f4a920ffe567af3277e0db261d94786025a410df3a46984,2025-03-22T14:15:14.203000
|
||||
CVE-2024-2886,0,0,e685f1bc0205345c0f4a920ffe567af3277e0db261d94786025a410df3a46984,2025-03-22T14:15:14.203000
|
||||
CVE-2024-28860,0,0,615b0e6dc4018679696c4d7b10ac840d76cd4c01792710452a17c3362532000e,2024-11-21T09:07:03.630000
|
||||
CVE-2024-28861,0,0,91b8766631083f156e1aa3c97aef0422736858e553cc07c5e68f331bab68b22d,2024-11-21T09:07:03.770000
|
||||
CVE-2024-28862,0,0,89d0e093402bd6601cb90bf8ad7d51712587ca0c9a18ec4ae831f726f4d4bd6f,2024-11-21T09:07:03.893000
|
||||
@ -256641,9 +256641,9 @@ CVE-2024-30154,0,0,44393c7dbeff68b7c1c8cbce1ba7b354794da02b96328afc30511aec1959a
|
||||
CVE-2024-30156,0,0,92fda2ccd849293e60b2e463cac31a4dc54847a22ed3e9030d260cf180d129ee,2024-11-21T20:15:40.067000
|
||||
CVE-2024-30157,0,0,559260e13715a400d85dadb0bfe165c83aef8f0ab0ce2b4b15f456f448eff1c9,2024-11-21T09:11:19.547000
|
||||
CVE-2024-30158,0,0,95d9ce829a91f171649545534b80b43680e23fd13b3b02f53cdc5be44785afcc,2024-10-25T16:30:09.927000
|
||||
CVE-2024-30159,0,0,ed3db34686e5511dbdca19f92f1fbab958d7ce6c0101ddde9d16cd6407215efb,2024-10-25T16:30:47.127000
|
||||
CVE-2024-30159,0,1,c35306423129c754aa1e4801387fe2a9b297967b0a913fec69e55815c59cfd0a,2025-03-22T15:15:37.173000
|
||||
CVE-2024-3016,0,0,58c170e1683a5dd60198d6e8d31a0de337246947c53fec4a9f8a4f07423100fa,2024-11-21T09:28:41.250000
|
||||
CVE-2024-30160,0,0,0b2b9103ae0c5965fe4e466cf09bb573bca5fc26c14f8291fbdc858b9f90e62f,2024-10-25T16:30:53.613000
|
||||
CVE-2024-30160,0,1,52fd0ec4c608ba112e9a81cff3ff9d4bcc0b1aaea51e1ea3541d490d3309738d,2025-03-22T15:15:37.373000
|
||||
CVE-2024-30161,0,0,bd9c6bbca173a3185882384150ea17a790a06755ac3f6e1d556a0c7f18eaf6e3,2025-03-14T02:15:13.777000
|
||||
CVE-2024-30162,0,0,1d89027fadd32d888ac91deacfb634da9306e22312414c5b33187ff9291e61a1,2024-11-21T09:11:20.300000
|
||||
CVE-2024-30163,0,0,2887459b66695d41f1e6d12551511852bcbdefc140339f61da6a07ca21c85b99,2025-03-19T17:15:39.967000
|
||||
@ -264422,7 +264422,7 @@ CVE-2024-39920,0,0,2d0ffc6668fc09328c8963241ae091338acc28267b723bf4cce9dfe8a3e96
|
||||
CVE-2024-39921,0,0,36bf5d750808c8cee840a08fb05bf4c020bb5eda7905a41156147b0de38b82b1,2025-03-13T14:15:29.073000
|
||||
CVE-2024-39922,0,0,fe52b48aabfd6b21ca5931e383040552b3df966bff80bf5d23fd885e311735af,2024-08-13T12:58:25.437000
|
||||
CVE-2024-39924,0,0,775d84fe24787256203d85215326581603dd25a3938d9f3efe7e3d3d7a679dd8,2025-03-18T20:15:22.283000
|
||||
CVE-2024-39925,0,1,2dce2b5635f20716f4573e8a9514565ced1083510693ffee5ac173e59be9bed4,2025-03-22T14:15:14.477000
|
||||
CVE-2024-39925,0,0,2dce2b5635f20716f4573e8a9514565ced1083510693ffee5ac173e59be9bed4,2025-03-22T14:15:14.477000
|
||||
CVE-2024-39926,0,0,62755f8b10d8d8cd0280358f682aebb8f7ee34ebaeb719fb16dd73cfad42b335,2025-03-18T19:15:43.093000
|
||||
CVE-2024-39927,0,0,d102506d349c6cd661c84f9625100fb5afa84e23351ca69840c038d426e26cb0,2024-11-21T09:28:35.253000
|
||||
CVE-2024-39928,0,0,36746816d5a179f8dacaec6e67ea9b447cd0145aa354104fbfbe630b6bc05ce0,2024-11-21T09:28:35.457000
|
||||
@ -264880,7 +264880,7 @@ CVE-2024-40846,0,0,9b851b4ce2280168886b830fe034334f0fa1485f27e31834954a719ee17a0
|
||||
CVE-2024-40847,0,0,ee5396e6f19805c5499c62b220104fc60114c82964b16e0b3e6ff332e23edee0,2024-09-24T15:56:35.753000
|
||||
CVE-2024-40848,0,0,86d3355851a7ddfb425292a80fa877eed599c8da4dfe9e7c1117852b3f5a865a,2024-09-24T15:57:03.893000
|
||||
CVE-2024-4085,0,0,787927bdbc60dd0adde121aa412a76d92ada213a43fd5512122c43f33043e993,2024-11-21T09:42:09.953000
|
||||
CVE-2024-40850,0,1,5fd4e1ce89b67cdde96ea8f6e4b8c9b60c6c754c7baeb31ce3f1ef13a57a0421,2025-03-22T14:15:14.713000
|
||||
CVE-2024-40850,0,0,5fd4e1ce89b67cdde96ea8f6e4b8c9b60c6c754c7baeb31ce3f1ef13a57a0421,2025-03-22T14:15:14.713000
|
||||
CVE-2024-40851,0,0,b958c164114af6b23a2bf7ef2bd1c6335c3be241ec455192784b6b386c9ef358,2024-10-30T15:35:14.883000
|
||||
CVE-2024-40852,0,0,2b759a1210705870844044ed842e04e851ef9bf743602e800520414310179172,2025-03-19T18:15:21.487000
|
||||
CVE-2024-40853,0,0,dfc9fa03d8fda58ef712d436e720ae0f21a7fffb74fe4326b57538d3690d7a89,2024-10-30T17:08:42.157000
|
||||
@ -267591,7 +267591,7 @@ CVE-2024-44132,0,0,8afd03fa4900bdc815951be587052cdc1902d648f6c0f1c1ad745b8e3479d
|
||||
CVE-2024-44133,0,0,9196ca541ad45474d5d5e36a2a1369fb1dbddc304bb390dd887770a28cf137d9,2024-09-24T18:24:44.733000
|
||||
CVE-2024-44134,0,0,1612170244774fb2cb867230c7f5140525c8398caef327a950c8a1f1680c0c76,2025-03-13T21:15:41.717000
|
||||
CVE-2024-44135,0,0,1f924f524e9404eadff6cf55bcdf5ce85faa4ce5abb51a5bd0b4ada1a8260302,2025-03-19T19:15:41.400000
|
||||
CVE-2024-44136,0,1,3f10ba2fc6f9d89689dbedfa47ad2452465bd91d215ce415d8601c8530edd5bd,2025-03-22T14:15:14.963000
|
||||
CVE-2024-44136,0,0,3f10ba2fc6f9d89689dbedfa47ad2452465bd91d215ce415d8601c8530edd5bd,2025-03-22T14:15:14.963000
|
||||
CVE-2024-44137,0,0,d4f6436a74ca2949527dd50649d59762594e5936bfba7a01a6e8b64ce29142e0,2024-10-30T19:35:16.590000
|
||||
CVE-2024-44139,0,0,be06b795fe6d7868956b3a70d447846cad4f23d9f9a466844492bf3101bd5609,2025-03-20T14:15:20.510000
|
||||
CVE-2024-44141,0,0,cf418c986171e3bc9f6e94361ae23fe33ff672a5506240ca7f0249f80c1cacd9,2024-12-11T18:29:33.870000
|
||||
@ -268339,7 +268339,7 @@ CVE-2024-45313,0,0,ffabf2497368b182081cd5c0b8f0370a40d21c279eab9f868fa173421d78b
|
||||
CVE-2024-45314,0,0,be94bf286290b49fc3c416c891ae3e1fb104053d3488507f8ca293d1cda88bb2,2024-09-12T16:39:53.690000
|
||||
CVE-2024-45315,0,0,312ff66923d8744d67c49b6e02fabcb8e9835b06304ea335e59014578bec528e,2024-11-01T16:35:26.853000
|
||||
CVE-2024-45316,0,0,ae32561cbb3e12520a1339144b5c2604a6ff780dc006584815b600f90f07a8a5,2024-10-15T12:58:51.050000
|
||||
CVE-2024-45317,0,0,5f43c76e9ff743bd3a3e5058ccc2d1ee5b77faf16f692fa3d7b6e565fa26561d,2024-10-15T12:58:51.050000
|
||||
CVE-2024-45317,0,1,631bc8ae61bb510eb08af8dc14b3a3e6bbed6e1feab59b5a31a9d74992157448,2025-03-22T15:15:37.560000
|
||||
CVE-2024-45318,0,0,75989837b2772ed0bee9b8d611c5c445760df07141b272a0d99d94a5a5004185,2024-12-05T17:15:11.880000
|
||||
CVE-2024-45319,0,0,f54a68d148467026440ad15f341a6bfb542cacddb35ec8506cc4659fa4aa336e,2024-12-05T17:15:12.040000
|
||||
CVE-2024-4532,0,0,014dcf5f2708015805e201ab211b9cd9fe192f81599e256bd8dd0d34d23e73ac,2024-11-21T09:43:02.993000
|
||||
@ -272531,7 +272531,7 @@ CVE-2024-51115,0,0,97924e30f339bc462ccaad1ee3c55c378e15485436cb0bc88676f0cde0303
|
||||
CVE-2024-51116,0,0,163c0d7988ca5329a27514b03075ee6d2fff2ef84e9d3dc466528f493b745f84,2024-11-06T18:17:17.287000
|
||||
CVE-2024-5112,0,0,f6f8682deff2408f9f0c77bfeb2725995cf9c58df252da300d15c186fb6583c9,2025-02-21T20:06:52.563000
|
||||
CVE-2024-51122,0,0,032eda6ef4356c413d34ec64379012302427108464591348425bff48a082f9f1,2025-03-18T21:15:30.977000
|
||||
CVE-2024-51123,0,1,7fb96633793369a89316aaa3fa097d3ce7001fefdc75c1abf4ea7cb6c1954e59,2025-03-22T14:15:15.170000
|
||||
CVE-2024-51123,0,0,7fb96633793369a89316aaa3fa097d3ce7001fefdc75c1abf4ea7cb6c1954e59,2025-03-22T14:15:15.170000
|
||||
CVE-2024-51127,0,0,5c5f040ac9c1963b030c4696070e1ab6a5b9c29a6f9ce0ae7436199ee45f28e8,2024-11-21T09:45:17.017000
|
||||
CVE-2024-5113,0,0,52336cb4930088acb460f77d5eb059ecb3d07bd3d2ff421073cdc789c54ac6fd,2025-02-21T20:01:00.100000
|
||||
CVE-2024-51132,0,0,f5dcb22b7125a1b94089072dd6f184dd6f0e35c20d2f6ced62d92bb6eded7439,2024-11-06T20:35:34.173000
|
||||
@ -272662,7 +272662,7 @@ CVE-2024-51431,0,0,828fd39fe0bf7bfec25d83e9c0a08cb7b9c4b5cc6704676ba7781e14660e7
|
||||
CVE-2024-51432,0,0,90d6088b4b691a13d46bf67decae9a8dc78d3184ac661e87666bdc2bf7a4111b,2024-11-04T22:35:10.037000
|
||||
CVE-2024-51434,0,0,fd0f2e493c6557b3a7b75698795afa3b125b8838b7989d6283ab0195617010c3,2024-11-08T19:01:03.880000
|
||||
CVE-2024-5144,0,0,6bbfaf13c1764c4fefc00893d80de8b864d8af9b05653210d129c904ab48e8ed,2024-05-31T18:15:13.217000
|
||||
CVE-2024-51440,0,1,06e59d576ccec69ba7fffa18e55bdd3df09904f0f19824a66a13b2c049fe2fa3,2025-03-22T14:15:15.390000
|
||||
CVE-2024-51440,0,0,06e59d576ccec69ba7fffa18e55bdd3df09904f0f19824a66a13b2c049fe2fa3,2025-03-22T14:15:15.390000
|
||||
CVE-2024-51442,0,0,663939a871d0d38a9b2a62d30b7d5c04a240d1619da5f372debf5ffd926c43c7,2025-01-08T20:15:28.137000
|
||||
CVE-2024-51448,0,0,c4c37037bf93a1f94e04f7270f02afe30201acf9ed636bd7a8ba3baefef67f6e,2025-01-18T15:15:08.183000
|
||||
CVE-2024-5145,0,0,46ac64e27ebb5b10cf08e3fb4f67dd66a2e01ddc2757a70804d55019b5d37c34,2025-02-10T13:57:18.723000
|
||||
@ -276282,7 +276282,7 @@ CVE-2024-56883,0,0,f99cbbbe44810ecf20ee9a822aaeeb39d677436c7acf1f70c821dc9769f4f
|
||||
CVE-2024-56889,0,0,5327859a7c5496e1e94f8bb9c02a37e2b8342a40649f534ed6f47845e36ee4d6,2025-03-18T15:15:58.090000
|
||||
CVE-2024-5689,0,0,7954cfa7cab5c9d284e75ff2916a8e3e6c71cab8207a342db66b72c3a9729209,2024-11-21T09:48:10.193000
|
||||
CVE-2024-56897,0,0,c86a728646b989ba2c34050e6cf558894a483f9e45fac8ad92b270dc1bfac754,2025-03-03T20:15:43.540000
|
||||
CVE-2024-56898,0,1,8124ee23f832958edf569107c7b288b2df457e1cf5fa891be5bacb4a1456c4c4,2025-03-22T14:15:15.590000
|
||||
CVE-2024-56898,0,0,8124ee23f832958edf569107c7b288b2df457e1cf5fa891be5bacb4a1456c4c4,2025-03-22T14:15:15.590000
|
||||
CVE-2024-5690,0,0,d4d62df1fcd0a6ab34cd7e4b18e0510e69dc46e6ad88d84635741631f871b265,2024-11-21T09:48:10.377000
|
||||
CVE-2024-56901,0,0,64eb0224a857e749243b1bd7bc2761e2c8263ae6819e4c9704a3b8650c9b496e,2025-03-04T22:15:39.143000
|
||||
CVE-2024-56902,0,0,3ef5942ce98190c5aa70f63a17781c2e2ea98e203a6427a08886aad5d3b44a9f,2025-03-04T22:15:39.340000
|
||||
@ -276291,7 +276291,7 @@ CVE-2024-56908,0,0,bbe0040508ad69151e90ab47c62a14618486e1b0815c01e094680be9e1e71
|
||||
CVE-2024-5691,0,0,9505e4d65453e2558c96eeea1a67c071cea95e3c90b63f8d9e952db5959b044b,2025-03-19T21:15:37.710000
|
||||
CVE-2024-56914,0,0,76cdd8d94ae11c2780ca41310bed1eae7879520cc428bb077f1f775e8c7b9036,2025-01-23T17:15:16.230000
|
||||
CVE-2024-5692,0,0,4b8f65097356fd8a548c2da4761bef878e098b44587a5b9b21bc347f46db95a8,2024-11-21T09:48:10.633000
|
||||
CVE-2024-56921,0,1,fb030f17d9ca025a22ece745e7ce38e34d1baa5c5f879c2284e94607c9076c35,2025-03-22T14:15:15.787000
|
||||
CVE-2024-56921,0,0,fb030f17d9ca025a22ece745e7ce38e34d1baa5c5f879c2284e94607c9076c35,2025-03-22T14:15:15.787000
|
||||
CVE-2024-56923,0,0,e2647403e0cf85e5fccf746b53a51e00d5aac61312608ca59ffcd83f3ff65dd9,2025-01-28T23:15:08.067000
|
||||
CVE-2024-56924,0,0,255fb5d959e1f1b6d9220b28e96e646f40e846b04df600718295ece436269b5a,2025-01-23T17:15:16.710000
|
||||
CVE-2024-5693,0,0,21ec44ee8ed5f9de3ae93fab02d376513f10f0c9f8c82a8733146d6a99b0ff3a,2024-11-21T09:48:10.807000
|
||||
@ -276570,7 +276570,7 @@ CVE-2024-57579,0,0,9ef3b077a13ee9d7526f1e765503d92542de13cba7b0fad4972ba1a9202a5
|
||||
CVE-2024-5758,0,0,c078716fbf80b259c8ceac06415d3d039d4ef773f8ae701649c6b0b1483ee99e,2024-06-13T21:15:57.543000
|
||||
CVE-2024-57580,0,0,ecfed55cf5b358c127e395a3e898c26702966c4825a41b3d33a695e34d0cb776,2025-03-18T19:15:46.850000
|
||||
CVE-2024-57581,0,0,4a3545198765c6460c9df2bbd8da1004daef02a4f94355754c92d51aeea05e63,2025-03-18T19:15:47.037000
|
||||
CVE-2024-57582,0,1,269fcfd2c5396a242690f6c1fdf50c42960a075cd46c2130a0df0e7c00b215ce,2025-03-22T14:15:15.960000
|
||||
CVE-2024-57582,0,0,269fcfd2c5396a242690f6c1fdf50c42960a075cd46c2130a0df0e7c00b215ce,2025-03-22T14:15:15.960000
|
||||
CVE-2024-57583,0,0,ccfb387ff3c30d35babb34dfb2c64006998b94ce941ed7ea8395016f8be83325,2025-02-04T15:15:18.557000
|
||||
CVE-2024-57587,0,0,69e0c38068f525a5b86457cd182be111c6d82d7686ae8a5f6131539166579a3b,2025-02-07T17:15:30.453000
|
||||
CVE-2024-5759,0,0,7a62530c172037696b680530af67b7622649644977afb4734ee0d6d8975bff51,2024-11-21T09:48:17.467000
|
||||
@ -276579,12 +276579,12 @@ CVE-2024-57595,0,0,5ac192d4452b1b04f540486f14602420111ddc5ce9ebf1466c634ddcfa94e
|
||||
CVE-2024-57598,0,0,f942cb84c2609b2961d7b373816f9239192ede7b991ad3bd5a46392c1f31f307,2025-02-06T16:15:41
|
||||
CVE-2024-57599,0,0,08a6b92156dbb47043a13e2f6a8f470b6ff2d84a2cc52c57a2605bc11a655e8e,2025-02-06T21:15:21.760000
|
||||
CVE-2024-5760,0,0,fdcabe1f95ff5e6dbce832204c1f64827ff6fe6277e57163fb295e96d7b29093,2024-09-13T16:28:43.077000
|
||||
CVE-2024-57601,0,0,53bfe5248e0c55062379b5772a0e365478a7cc4522b7eb09c12bbfc53a9014ac,2025-02-18T18:15:27.663000
|
||||
CVE-2024-57601,0,1,d978ee2acd4111ee755bc6d199e0b7a5b30d82c722a815c1a28b244c807873ce,2025-03-22T15:15:37.747000
|
||||
CVE-2024-57602,0,0,226d91ed331e63f738fd3b8b845736eb5a7fc570a3a123d5ea996b5176962aac,2025-03-18T16:15:25.597000
|
||||
CVE-2024-57603,0,0,8818c006a29d6f4bd13b4237aca8900d379684c37788b65eab93543c45a04038,2025-02-13T19:15:13.890000
|
||||
CVE-2024-57604,0,0,9dc897647370ae27cc2a2fe45d9c565c9d827fa05aa881ae8c05dff72d178677,2025-03-20T15:15:43.980000
|
||||
CVE-2024-57605,0,0,c41e31bc0c6b4266a22e57b7929d37215234774341d010b325202d9b2f8dc9f2,2025-03-19T15:15:52.740000
|
||||
CVE-2024-57606,0,1,88fff29b8b35a01ed272a18dce87c845eb952014b7761d37d399b66c213e66c6,2025-03-22T14:15:16.170000
|
||||
CVE-2024-57606,0,0,88fff29b8b35a01ed272a18dce87c845eb952014b7761d37d399b66c213e66c6,2025-03-22T14:15:16.170000
|
||||
CVE-2024-57608,0,0,f13d7092b69ab1bb8b9d9e29e8d71dd51ba622da797972897165fa9f6e4af609,2025-02-25T21:15:17.440000
|
||||
CVE-2024-57609,0,0,7e89dbfffc522c22f84645f0c7d618897ea46d1866f82abe6573f3d9437ce18a,2025-02-10T22:15:36.660000
|
||||
CVE-2024-5761,0,0,1fdad964c86313b412878f67fac5999c9a1ea015b844614bc58b000414661a53,2024-06-07T19:15:24.467000
|
||||
@ -276635,7 +276635,7 @@ CVE-2024-57652,0,0,d73e7be12017c8f1cd68a94beba6a947fa401580f763e064115069718c3a2
|
||||
CVE-2024-57653,0,0,42fd65211c7003dec5322ac0547672e4d3c8aab01cf5d3ed6c45ebb091bb68ec,2025-02-18T22:15:15.247000
|
||||
CVE-2024-57654,0,0,7f766ad02bc18df38721852911dbcc4b021e73b25a35d8fd990c3fd3aec04d8e,2025-01-14T17:15:20.233000
|
||||
CVE-2024-57655,0,0,1be0c1177e28b1a1bb7b680ab7109b0c840777062bda07d33388651769ea2a54,2025-03-18T19:15:47.213000
|
||||
CVE-2024-57656,0,0,09f0b8883074ef04a8cc8b0a0a6aed2bc5831dface16b2e7f31140043840c295,2025-02-18T22:15:15.500000
|
||||
CVE-2024-57656,0,1,7b7715aae3ceb9667d61aefc67555704c00401b1a12be6d6fc65e5dc49bd312b,2025-03-22T15:15:37.953000
|
||||
CVE-2024-57657,0,0,b09c438a14c3db4fe411704529d496d2bb6233f86346a91943c98c21994b6176,2025-03-19T15:15:53.050000
|
||||
CVE-2024-57658,0,0,e12e2e5c80101e7e7b06d323b6720ff3675db1a8a27ec11343898fca21b6fc03,2025-02-18T22:15:15.713000
|
||||
CVE-2024-57659,0,0,f32b1ab826823776ca0c8a17c8694a17edb2ecd676fd6e2f2814340b2ca52fc0,2025-01-15T15:15:13.450000
|
||||
@ -276672,7 +276672,7 @@ CVE-2024-57704,0,0,a9645cdb100870e11a8ca5752cec5d028eb030155daed4240595658dfba99
|
||||
CVE-2024-57707,0,0,256285bb0e4c937fcd8fcd84fe295c9ba07342d1410e4f5a401c2306ce0e91b0,2025-02-10T17:15:18.353000
|
||||
CVE-2024-5771,0,0,e471b000ba82873f846a0f0e75b0efdd4d37cb6fabf417a41ddc70ef105f4163,2024-11-21T09:48:18.863000
|
||||
CVE-2024-57716,0,0,79da6b902a2967abf048782629438cae155ee0d179ea2083ddc6c325108a1865,2025-02-21T16:15:32.453000
|
||||
CVE-2024-57719,0,0,9af381064dc4b979246282f21dfbef1d0e1e6baf2733f304b6946b2054a0e999,2025-02-18T20:15:22.603000
|
||||
CVE-2024-57719,0,1,91bc71e31e65cd5c466ef5757ec164b2cf640a216e5ea291e7cc4f766d77f2c8,2025-03-22T15:15:38.243000
|
||||
CVE-2024-5772,0,0,a62834c0864387c3b698a85018242263bd7f240d52606a720f52cc14c8c47fba,2025-01-29T17:46:54.753000
|
||||
CVE-2024-57720,0,0,c6ea7c04d1f31cae7cfb088d00930ccdd0afdbf506292dce573bf98c3a05537d,2025-03-14T16:15:37.977000
|
||||
CVE-2024-57721,0,0,c83b53b1f3da4e985aa3e8c6db4fa9cfaecd34c84a7a02eed4e5ae091c579b1b,2025-03-18T20:15:24.810000
|
||||
@ -282972,7 +282972,7 @@ CVE-2025-21856,0,0,b09c68ce23969b8e4c4ebe578130af0c7fcaa476814ad748e7bff8a78b6b4
|
||||
CVE-2025-21857,0,0,3e4b4b05242172562d45bfa80d4257741cfbd88b174535be049ad449c2660fc1,2025-03-13T21:15:46.950000
|
||||
CVE-2025-21858,0,0,66d9ca804eb089b50343b13981639c14692bfbf712b8926853e87f75b6577d63,2025-03-13T21:15:38.600000
|
||||
CVE-2025-21859,0,0,5a61501b66729f01bab9df64cbc72760c95b1c81ad9a7b8699565186c12dc20c,2025-03-13T21:15:30.040000
|
||||
CVE-2025-2186,1,1,afe893c7c50e4e6991ba24a24f04513ebe86e2979c302e20a272eed16c097c1a,2025-03-22T13:15:35.683000
|
||||
CVE-2025-2186,0,0,afe893c7c50e4e6991ba24a24f04513ebe86e2979c302e20a272eed16c097c1a,2025-03-22T13:15:35.683000
|
||||
CVE-2025-21860,0,0,7476c13026bd288cabe804eff8c676854d340bd1f590ce0f8ad19ee85a60a573,2025-03-13T21:14:08.347000
|
||||
CVE-2025-21861,0,0,512ea035cfd08d344857d6a2838b2f5da0a011cdea325d0d3a43a8bdbd21a518,2025-03-13T21:14:01.013000
|
||||
CVE-2025-21862,0,0,903ae3891f0b02eb2409a29ac67b669381656af60d8ebe4a4187837a3dfc54de,2025-03-13T21:13:53.200000
|
||||
@ -283585,7 +283585,7 @@ CVE-2025-23082,0,0,04a4f0f7ff5458b7d3b3235d7001e50f9111979d3e99a4d703024d8cba8b9
|
||||
CVE-2025-23083,0,0,8794d1163f9c90d3558297e77a843291a9ed4394f361008c98d5897814fbbb44,2025-02-28T13:15:28.213000
|
||||
CVE-2025-23084,0,0,66590369971d77e93d3e89e756431c61a64701ffca1861b58e6771ed8d358e6e,2025-01-28T16:15:40.827000
|
||||
CVE-2025-23085,0,0,889840804db6ae2520e814bb23e4a445ed73b7383c73820abba13ffae74db43d,2025-02-25T13:15:11.103000
|
||||
CVE-2025-23086,0,1,46dcdec6710242421727659f0f9de0b53db2ce8f2873db285d1b397dda7f2559,2025-03-22T14:15:16.360000
|
||||
CVE-2025-23086,0,0,46dcdec6710242421727659f0f9de0b53db2ce8f2873db285d1b397dda7f2559,2025-03-22T14:15:16.360000
|
||||
CVE-2025-23087,0,0,bfbdb144af271fa0463b1cfacae0c03f133d0c7157b9b6f33c666f41bdde0ea8,2025-03-01T03:15:23.067000
|
||||
CVE-2025-23088,0,0,369a084c0dac91f467d46a297093ab8c7b697484ff2e61fc017ffe639e3c12ed,2025-03-01T03:15:23.157000
|
||||
CVE-2025-23089,0,0,8538abc6f83acab58bdcb6440f1e22c462d137c99186166b0dcb3a7a245230db,2025-03-01T03:15:23.210000
|
||||
@ -284398,7 +284398,7 @@ CVE-2025-24152,0,0,94cf03b83e0d0bbf2e2519ab1fb41ecec660385e6e18386a8bccf1cff0fd2
|
||||
CVE-2025-24153,0,0,a962e00376d57b532ea670dc465405ba54e446d5423d2019e225758957981f83,2025-02-04T21:15:28.390000
|
||||
CVE-2025-24154,0,0,2133416aad04106ad04753c0c4ad3643abc6a261600e1250147cb0b1c5f17046,2025-03-18T20:15:25.680000
|
||||
CVE-2025-24156,0,0,8fa4c1a03f09991e5c2bed2e07959c1558a8892a2864cd53dcb29d166373a914,2025-01-30T16:43:39.593000
|
||||
CVE-2025-24158,0,0,acc7809ab4701d1dee654bd85d3ea355491d3c160b1e018c6b17b635a2e8852d,2025-03-03T22:51:31.440000
|
||||
CVE-2025-24158,0,1,35070c801a9b11c70eaf663a73a983a0e2a6932451a99df2d1775809dfa38432,2025-03-22T15:15:38.440000
|
||||
CVE-2025-24159,0,0,5049ee423dfbceaaa990b18ae981888a723164635f4aec7b443286d0a98a6096,2025-03-19T14:15:38.853000
|
||||
CVE-2025-24160,0,0,ae6edae2205c08dd8b969920bf8cb3dc84d26eaf5297b5739349f27fb704a2f3,2025-01-28T16:15:44.003000
|
||||
CVE-2025-24161,0,0,6d02f0f01530cc9b917612d04abebc1e6d67d88a440e864a6d1a14a27e3f4034,2025-02-04T22:15:43.057000
|
||||
@ -285344,10 +285344,11 @@ CVE-2025-26158,0,0,b94398759aa4427b7dc090483f4f088a5c44388e38d183da6dc19ae9b872c
|
||||
CVE-2025-2616,0,0,1df0cf877e710fe9be61f38515f018771e2a185b2390858bae14abf7c5bbe46a,2025-03-22T10:15:16.533000
|
||||
CVE-2025-26163,0,0,1a8da14fd3182531e44fdb492b7c9a837211526283840a4e5bb4333cbf418032,2025-03-19T19:15:46.853000
|
||||
CVE-2025-26167,0,0,b243267aa31b3c4d3db94db42f2915c63c26a12d7e4452c1efdd061381d17d44,2025-03-07T20:15:38.347000
|
||||
CVE-2025-2617,1,1,17ecf2a4afb7fa68080612946426fe6502dcbc52588757f2cad26c1a96015f20,2025-03-22T13:15:35.837000
|
||||
CVE-2025-2618,1,1,a0be16c007291a7654dfbd4f2c2eb5cd5612dbfd0d66d1c468dbb0c63d5d84a8,2025-03-22T14:15:16.650000
|
||||
CVE-2025-2617,0,0,17ecf2a4afb7fa68080612946426fe6502dcbc52588757f2cad26c1a96015f20,2025-03-22T13:15:35.837000
|
||||
CVE-2025-2618,0,0,a0be16c007291a7654dfbd4f2c2eb5cd5612dbfd0d66d1c468dbb0c63d5d84a8,2025-03-22T14:15:16.650000
|
||||
CVE-2025-26182,0,0,50bc93eea6be4a4f051a5cba8257a428d894f0c81b2a5095709deaa26b1aeef7,2025-03-05T19:15:39.023000
|
||||
CVE-2025-2619,1,1,27e06b14b4922e101e410b948b2adbb5b081f3be43d641aabf6c3fa5baa51dc1,2025-03-22T14:15:16.867000
|
||||
CVE-2025-2619,0,0,27e06b14b4922e101e410b948b2adbb5b081f3be43d641aabf6c3fa5baa51dc1,2025-03-22T14:15:16.867000
|
||||
CVE-2025-2620,1,1,2935d7219c87bcc2281f31bd551ed42a24dda18283b5cbd9b721ae21867a9a81,2025-03-22T15:15:38.860000
|
||||
CVE-2025-26200,0,0,07971a3db98f9cfae341b32901f42b0af32b82b7b85e8efc840488c86eda257e,2025-02-24T17:15:14.273000
|
||||
CVE-2025-26201,0,0,19cc0d8c975fa49352fb9ad1f8db6737d71edae986faba1d37ba48d4a441cec4,2025-02-24T18:15:21.047000
|
||||
CVE-2025-26202,0,0,f8b0cbe65a751dd37df4c2f886b778f4059fbbdee95a620e7d770c31cb87373d,2025-03-14T20:15:14.167000
|
||||
@ -285416,7 +285417,7 @@ CVE-2025-26376,0,0,90eeec3b23b739a411f2298590832d14f091d24699dbf3da6862c5e4407f2
|
||||
CVE-2025-26377,0,0,96f969cb5307f2cbebc16af725f96ac45b51be8c065b61bf3eeda7b6d861fdb8,2025-02-12T14:15:38.933000
|
||||
CVE-2025-26378,0,0,ee2f1897a6683ea6c4c3e60750a42143f8a85d34ee7d0a636569caad0aaac614,2025-03-03T22:06:52.163000
|
||||
CVE-2025-26393,0,0,0a56d68e056311c602cd521d02aa8a0c8475ada7ba02d263a955244f81b3c4c4,2025-03-17T20:15:14.140000
|
||||
CVE-2025-26408,0,0,e45f7220dde0c01d1f86f33cd06eb34062f4e98e989de6c2a87bcb17b259ee6c,2025-02-18T18:15:36.097000
|
||||
CVE-2025-26408,0,1,cc3ff44719bfe263908c93711d844cb0c43379729d03c83e2a4a7413b5395225,2025-03-22T15:15:38.687000
|
||||
CVE-2025-26409,0,0,cdf29866235215f5068aacbcbdb6f999e9c9f7adf8baf249758a0e54e8048ba1,2025-03-17T17:15:39.723000
|
||||
CVE-2025-26410,0,0,e0a8c1ecc38adad5db47008cfe5d8287500ec3cbba2c1f9a4a60a8e1051c525e,2025-03-18T19:15:50.450000
|
||||
CVE-2025-26411,0,0,3c8f066d5451ad6ef36a27d64d17719d6f654697fa56337f49dfc83e42e73333,2025-03-14T18:15:31.947000
|
||||
@ -285578,7 +285579,7 @@ CVE-2025-26789,0,0,ebea494059b94de49b6b520d5766b69e65af5f122cf9ef029bba111909dc2
|
||||
CVE-2025-26791,0,0,a7d63ea0959b4846f11cfb3951f45279f457c98157e5d52d56097a5da007bce1,2025-02-14T16:15:37.350000
|
||||
CVE-2025-26793,0,0,d30b44911459092c9e08ffe42552727cfd072bd06f4aa8564ac964446a27eec1,2025-02-24T17:15:14.580000
|
||||
CVE-2025-26794,0,0,fe65001567301b62f9f70becffce46b16ab4f6e8292d604a049482502e1fc499,2025-02-22T01:15:10.670000
|
||||
CVE-2025-26796,1,1,9dbf889de866ca41ab74b84afcf0d854880b44cea138661c6f19e43b7bc96f29,2025-03-22T14:15:16.537000
|
||||
CVE-2025-26796,0,0,9dbf889de866ca41ab74b84afcf0d854880b44cea138661c6f19e43b7bc96f29,2025-03-22T14:15:16.537000
|
||||
CVE-2025-26803,0,0,8c486e737c398ad4bd709101648ff92403877558e051d24af9f92cf436430efd,2025-02-28T17:21:55.827000
|
||||
CVE-2025-26816,0,0,2ec5a5349b9517d8ba53395229a7b8942acd452c9df91a0b3e2328a764fb96c9,2025-03-20T21:15:23.273000
|
||||
CVE-2025-26819,0,0,265b05b0b6b085ef27d0e218dd5a0f79b1864b8a6c0004a23e6fa9575a3cdbeb,2025-02-15T00:15:28.510000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user