mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-07 11:07:05 +00:00
Auto-Update: 2025-04-07T08:00:20.238066+00:00
This commit is contained in:
parent
69eafe2433
commit
2142d4d342
104
CVE-2024/CVE-2024-110xx/CVE-2024-11071.json
Normal file
104
CVE-2024/CVE-2024-110xx/CVE-2024-11071.json
Normal file
@ -0,0 +1,104 @@
|
||||
{
|
||||
"id": "CVE-2024-11071",
|
||||
"sourceIdentifier": "09832df1-09c1-45b4-8a85-16c601d30feb",
|
||||
"published": "2025-04-07T06:15:39.167",
|
||||
"lastModified": "2025-04-07T06:15:39.167",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Permissive Cross-domain Policy with Untrusted Domains vulnerability in local API server of DestinyECM solution(versions described below) which is developed and maintained by\u00a0Cyberdigm may allow Cross-Site Request Forgery (CSRF) attack, which probabilistically enables JSON Hijacking (aka JavaScript Hijacking) via forgery web page.* Due to product customization, version information may differ from the following version description. For further inquiries, please contact the vendor."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "09832df1-09c1-45b4-8a85-16c601d30feb",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 7.7,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "PRESENT",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "PASSIVE",
|
||||
"vulnConfidentialityImpact": "HIGH",
|
||||
"vulnIntegrityImpact": "HIGH",
|
||||
"vulnAvailabilityImpact": "HIGH",
|
||||
"subConfidentialityImpact": "LOW",
|
||||
"subIntegrityImpact": "LOW",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "09832df1-09c1-45b4-8a85-16c601d30feb",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "09832df1-09c1-45b4-8a85-16c601d30feb",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-942"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://cyberdigm.co.kr/destinyEcm",
|
||||
"source": "09832df1-09c1-45b4-8a85-16c601d30feb"
|
||||
}
|
||||
]
|
||||
}
|
141
CVE-2025/CVE-2025-33xx/CVE-2025-3338.json
Normal file
141
CVE-2025/CVE-2025-33xx/CVE-2025-3338.json
Normal file
@ -0,0 +1,141 @@
|
||||
{
|
||||
"id": "CVE-2025-3338",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-04-07T06:15:40.547",
|
||||
"lastModified": "2025-04-07T06:15:40.547",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability classified as critical has been found in codeprojects Online Restaurant Management System 1.0. Affected is an unknown function of the file /admin/user_save.php. The manipulation of the argument Name leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 6.9,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "LOW",
|
||||
"vulnIntegrityImpact": "LOW",
|
||||
"vulnAvailabilityImpact": "LOW",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||||
"baseScore": 7.3,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||||
"baseScore": 7.5,
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "NONE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL"
|
||||
},
|
||||
"baseSeverity": "HIGH",
|
||||
"exploitabilityScore": 10.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-74"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/p1026/CVE/issues/52",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.303552",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.303552",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.551912",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
141
CVE-2025/CVE-2025-33xx/CVE-2025-3339.json
Normal file
141
CVE-2025/CVE-2025-33xx/CVE-2025-3339.json
Normal file
@ -0,0 +1,141 @@
|
||||
{
|
||||
"id": "CVE-2025-3339",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-04-07T06:15:40.823",
|
||||
"lastModified": "2025-04-07T06:15:40.823",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability classified as critical was found in codeprojects Online Restaurant Management System 1.0. Affected by this vulnerability is an unknown functionality of the file /admin/user_update.php. The manipulation of the argument ID leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 6.9,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "LOW",
|
||||
"vulnIntegrityImpact": "LOW",
|
||||
"vulnAvailabilityImpact": "LOW",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||||
"baseScore": 7.3,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||||
"baseScore": 7.5,
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "NONE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL"
|
||||
},
|
||||
"baseSeverity": "HIGH",
|
||||
"exploitabilityScore": 10.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-74"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/p1026/CVE/issues/53",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.303553",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.303553",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.551913",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
141
CVE-2025/CVE-2025-33xx/CVE-2025-3340.json
Normal file
141
CVE-2025/CVE-2025-33xx/CVE-2025-3340.json
Normal file
@ -0,0 +1,141 @@
|
||||
{
|
||||
"id": "CVE-2025-3340",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-04-07T07:15:39.067",
|
||||
"lastModified": "2025-04-07T07:15:39.067",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability, which was classified as critical, has been found in codeprojects Online Restaurant Management System 1.0. Affected by this issue is some unknown functionality of the file /admin/combo_update.php. The manipulation of the argument ID leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 6.9,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "LOW",
|
||||
"vulnIntegrityImpact": "LOW",
|
||||
"vulnAvailabilityImpact": "LOW",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||||
"baseScore": 7.3,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||||
"baseScore": 7.5,
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "NONE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL"
|
||||
},
|
||||
"baseSeverity": "HIGH",
|
||||
"exploitabilityScore": 10.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-74"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/p1026/CVE/issues/55",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.303554",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.303554",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.551914",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
141
CVE-2025/CVE-2025-33xx/CVE-2025-3341.json
Normal file
141
CVE-2025/CVE-2025-33xx/CVE-2025-3341.json
Normal file
@ -0,0 +1,141 @@
|
||||
{
|
||||
"id": "CVE-2025-3341",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-04-07T07:15:39.573",
|
||||
"lastModified": "2025-04-07T07:15:39.573",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability, which was classified as critical, was found in codeprojects Online Restaurant Management System 1.0. This affects an unknown part of the file /admin/reservation_view.php. The manipulation of the argument ID leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 6.9,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "LOW",
|
||||
"vulnIntegrityImpact": "LOW",
|
||||
"vulnAvailabilityImpact": "LOW",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||||
"baseScore": 7.3,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||||
"baseScore": 7.5,
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "NONE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL"
|
||||
},
|
||||
"baseSeverity": "HIGH",
|
||||
"exploitabilityScore": 10.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-74"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/p1026/CVE/issues/56",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.303555",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.303555",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.551915",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
38
README.md
38
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2025-04-07T06:00:19.263058+00:00
|
||||
2025-04-07T08:00:20.238066+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2025-04-07T05:15:31.707000+00:00
|
||||
2025-04-07T07:15:39.573000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,38 +33,18 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
288782
|
||||
288787
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `35`
|
||||
Recently added CVEs: `5`
|
||||
|
||||
- [CVE-2024-58124](CVE-2024/CVE-2024-581xx/CVE-2024-58124.json) (`2025-04-07T04:15:18.487`)
|
||||
- [CVE-2024-58125](CVE-2024/CVE-2024-581xx/CVE-2024-58125.json) (`2025-04-07T04:15:18.687`)
|
||||
- [CVE-2024-58126](CVE-2024/CVE-2024-581xx/CVE-2024-58126.json) (`2025-04-07T04:15:18.850`)
|
||||
- [CVE-2024-58127](CVE-2024/CVE-2024-581xx/CVE-2024-58127.json) (`2025-04-07T04:15:19.013`)
|
||||
- [CVE-2025-20654](CVE-2025/CVE-2025-206xx/CVE-2025-20654.json) (`2025-04-07T04:15:19.180`)
|
||||
- [CVE-2025-20655](CVE-2025/CVE-2025-206xx/CVE-2025-20655.json) (`2025-04-07T04:15:19.327`)
|
||||
- [CVE-2025-20656](CVE-2025/CVE-2025-206xx/CVE-2025-20656.json) (`2025-04-07T04:15:19.447`)
|
||||
- [CVE-2025-20657](CVE-2025/CVE-2025-206xx/CVE-2025-20657.json) (`2025-04-07T04:15:19.577`)
|
||||
- [CVE-2025-20658](CVE-2025/CVE-2025-206xx/CVE-2025-20658.json) (`2025-04-07T04:15:19.703`)
|
||||
- [CVE-2025-20659](CVE-2025/CVE-2025-206xx/CVE-2025-20659.json) (`2025-04-07T04:15:19.820`)
|
||||
- [CVE-2025-20660](CVE-2025/CVE-2025-206xx/CVE-2025-20660.json) (`2025-04-07T04:15:19.940`)
|
||||
- [CVE-2025-20661](CVE-2025/CVE-2025-206xx/CVE-2025-20661.json) (`2025-04-07T04:15:20.057`)
|
||||
- [CVE-2025-20662](CVE-2025/CVE-2025-206xx/CVE-2025-20662.json) (`2025-04-07T04:15:20.187`)
|
||||
- [CVE-2025-20663](CVE-2025/CVE-2025-206xx/CVE-2025-20663.json) (`2025-04-07T04:15:20.300`)
|
||||
- [CVE-2025-20664](CVE-2025/CVE-2025-206xx/CVE-2025-20664.json) (`2025-04-07T04:15:20.420`)
|
||||
- [CVE-2025-31170](CVE-2025/CVE-2025-311xx/CVE-2025-31170.json) (`2025-04-07T04:15:20.557`)
|
||||
- [CVE-2025-31171](CVE-2025/CVE-2025-311xx/CVE-2025-31171.json) (`2025-04-07T04:15:20.730`)
|
||||
- [CVE-2025-31172](CVE-2025/CVE-2025-311xx/CVE-2025-31172.json) (`2025-04-07T04:15:20.913`)
|
||||
- [CVE-2025-31173](CVE-2025/CVE-2025-311xx/CVE-2025-31173.json) (`2025-04-07T04:15:21.997`)
|
||||
- [CVE-2025-31174](CVE-2025/CVE-2025-311xx/CVE-2025-31174.json) (`2025-04-07T04:15:22.937`)
|
||||
- [CVE-2025-31175](CVE-2025/CVE-2025-311xx/CVE-2025-31175.json) (`2025-04-07T04:15:24.080`)
|
||||
- [CVE-2025-3334](CVE-2025/CVE-2025-33xx/CVE-2025-3334.json) (`2025-04-07T04:15:26.117`)
|
||||
- [CVE-2025-3335](CVE-2025/CVE-2025-33xx/CVE-2025-3335.json) (`2025-04-07T04:15:36.017`)
|
||||
- [CVE-2025-3336](CVE-2025/CVE-2025-33xx/CVE-2025-3336.json) (`2025-04-07T05:15:29.767`)
|
||||
- [CVE-2025-3337](CVE-2025/CVE-2025-33xx/CVE-2025-3337.json) (`2025-04-07T05:15:31.707`)
|
||||
- [CVE-2024-11071](CVE-2024/CVE-2024-110xx/CVE-2024-11071.json) (`2025-04-07T06:15:39.167`)
|
||||
- [CVE-2025-3338](CVE-2025/CVE-2025-33xx/CVE-2025-3338.json) (`2025-04-07T06:15:40.547`)
|
||||
- [CVE-2025-3339](CVE-2025/CVE-2025-33xx/CVE-2025-3339.json) (`2025-04-07T06:15:40.823`)
|
||||
- [CVE-2025-3340](CVE-2025/CVE-2025-33xx/CVE-2025-3340.json) (`2025-04-07T07:15:39.067`)
|
||||
- [CVE-2025-3341](CVE-2025/CVE-2025-33xx/CVE-2025-3341.json) (`2025-04-07T07:15:39.573`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
75
_state.csv
75
_state.csv
@ -245534,6 +245534,7 @@ CVE-2024-11068,0,0,27b5234cdb2340fcc5efbf261c80bbf2d55dab89f3140f4955847575b03dd
|
||||
CVE-2024-11069,0,0,076f3859fdfa80941888f3284b502c2a2b6c46de09cc72f474773d2b7cedff3b,2025-01-23T17:20:03.587000
|
||||
CVE-2024-1107,0,0,5a3b93404fbe99abd1fe2d556d56f474326161e66d8f315a27927add1837860b,2024-11-21T08:49:48.697000
|
||||
CVE-2024-11070,0,0,d9ef5a8cd255789c36276ce8f4e1ab8ca41ed12c0a36ef18cc771900f2cf520f,2024-11-23T01:31:09.333000
|
||||
CVE-2024-11071,1,1,b764b907d689f24fd9ff9d6ff0b783ce48301d7517483a024e500845f3053aa5,2025-04-07T06:15:39.167000
|
||||
CVE-2024-11073,0,0,9e7fc2654a47a5aac025cc05db692caf55ef624e5b11770874bfc94cff9b5e2c,2024-11-18T17:21:19.557000
|
||||
CVE-2024-11074,0,0,58fb08bfcedc261a69e7301987c03f396959f4915994c478098af6f46a428527,2024-11-14T19:06:54.750000
|
||||
CVE-2024-11075,0,0,1453691218eaa30381e9b896380b7d3816e51e01355ecf6bb51d349da772dacc,2024-11-19T21:57:32.967000
|
||||
@ -277267,22 +277268,22 @@ CVE-2024-58102,0,0,dd42630c366d4fe40426e956fe445b75d82fa202b00380f941f341e0dcc82
|
||||
CVE-2024-58103,0,0,10a7b3d9d518bc786063856000a89f8cacb058ea7d9597066e2f5581bacc0a09,2025-03-16T04:15:12.313000
|
||||
CVE-2024-58104,0,0,ef5194668e17b2fae71aeef1b8cd3db28854aa445adae506302dfff073d0b351,2025-03-27T16:45:46.410000
|
||||
CVE-2024-58105,0,0,4859f47990653c401f3f164e41476521473722b323891039b1eca1ab0ae47278,2025-03-27T16:45:46.410000
|
||||
CVE-2024-58106,1,1,006df39166927c63ebb3b2286106e536988cf59bb94ee7fcb35a68ff7df2fe25,2025-04-07T04:15:15.293000
|
||||
CVE-2024-58107,1,1,879c7821c358b73de3c537fde5ebe6a982f88bce57b05f040322f8529b271e05,2025-04-07T04:15:15.613000
|
||||
CVE-2024-58108,1,1,35b558e87acbc94f2a26d32a3664374813f7d060a6312162c14e6f045306c208,2025-04-07T04:15:15.790000
|
||||
CVE-2024-58109,1,1,f7cb79aa04f90982b30758205d79b2340dca720436108ee322ae2ae46fab692a,2025-04-07T04:15:15.960000
|
||||
CVE-2024-58106,0,0,006df39166927c63ebb3b2286106e536988cf59bb94ee7fcb35a68ff7df2fe25,2025-04-07T04:15:15.293000
|
||||
CVE-2024-58107,0,0,879c7821c358b73de3c537fde5ebe6a982f88bce57b05f040322f8529b271e05,2025-04-07T04:15:15.613000
|
||||
CVE-2024-58108,0,0,35b558e87acbc94f2a26d32a3664374813f7d060a6312162c14e6f045306c208,2025-04-07T04:15:15.790000
|
||||
CVE-2024-58109,0,0,f7cb79aa04f90982b30758205d79b2340dca720436108ee322ae2ae46fab692a,2025-04-07T04:15:15.960000
|
||||
CVE-2024-5811,0,0,0c5a0ebde16bcb77e73a53dccf7ebf134980e586a889ff63137b1e7e940a0edc,2024-11-21T09:48:22.670000
|
||||
CVE-2024-58110,1,1,8e4e6b81fb8dc7ae09d4faff8c363b7f77572fdfda6136f5db052d73ece0afd8,2025-04-07T04:15:16.127000
|
||||
CVE-2024-58111,1,1,3eef1882e1142d4ad6c81484a49a51d35b0efd3c7b9f6458ae1e22f18d31f509,2025-04-07T04:15:16.300000
|
||||
CVE-2024-58112,1,1,b47d58ad2812ceb1dc3c9352b34d307b48a1a28b2e79378793358049112d387f,2025-04-07T04:15:17.047000
|
||||
CVE-2024-58113,1,1,781873ae60e5980f47c68309e4f5cefc8a257411ca7ddcb48f6df52e52414de1,2025-04-07T04:15:17.250000
|
||||
CVE-2024-58115,1,1,2790fd4ef1b26f072c46ed10ddc3cc98da064a268b0c6790df6f9486eab9e1d5,2025-04-07T04:15:18.157000
|
||||
CVE-2024-58116,1,1,0bbb073a95efd082c4f52b7fe0580baa39f3c8f0c4968a020edd11662451ea30,2025-04-07T04:15:18.323000
|
||||
CVE-2024-58110,0,0,8e4e6b81fb8dc7ae09d4faff8c363b7f77572fdfda6136f5db052d73ece0afd8,2025-04-07T04:15:16.127000
|
||||
CVE-2024-58111,0,0,3eef1882e1142d4ad6c81484a49a51d35b0efd3c7b9f6458ae1e22f18d31f509,2025-04-07T04:15:16.300000
|
||||
CVE-2024-58112,0,0,b47d58ad2812ceb1dc3c9352b34d307b48a1a28b2e79378793358049112d387f,2025-04-07T04:15:17.047000
|
||||
CVE-2024-58113,0,0,781873ae60e5980f47c68309e4f5cefc8a257411ca7ddcb48f6df52e52414de1,2025-04-07T04:15:17.250000
|
||||
CVE-2024-58115,0,0,2790fd4ef1b26f072c46ed10ddc3cc98da064a268b0c6790df6f9486eab9e1d5,2025-04-07T04:15:18.157000
|
||||
CVE-2024-58116,0,0,0bbb073a95efd082c4f52b7fe0580baa39f3c8f0c4968a020edd11662451ea30,2025-04-07T04:15:18.323000
|
||||
CVE-2024-5812,0,0,6925a842f54ea6dbd38d5338f4d1bba7949620aed85abec9f4ea1fe79df642ce,2025-02-11T21:36:43.423000
|
||||
CVE-2024-58124,1,1,17716009e419e4d08142289e25556f9bd3820ff87828741051ad73db5f362e8f,2025-04-07T04:15:18.487000
|
||||
CVE-2024-58125,1,1,ebf93d5f16d354d02f2d45701d1a06927f771baf84b4a4af9bb56b3f7822e876,2025-04-07T04:15:18.687000
|
||||
CVE-2024-58126,1,1,e62f30487d3f31de1ed3ed5b8013b2d897b4f96d7a234a1ee8e79b4ffd167ed9,2025-04-07T04:15:18.850000
|
||||
CVE-2024-58127,1,1,3350529ee0ea93a9e1f7ea82c5dcb14f0568cf3c06315084d0a3dda32f4f3e3d,2025-04-07T04:15:19.013000
|
||||
CVE-2024-58124,0,0,17716009e419e4d08142289e25556f9bd3820ff87828741051ad73db5f362e8f,2025-04-07T04:15:18.487000
|
||||
CVE-2024-58125,0,0,ebf93d5f16d354d02f2d45701d1a06927f771baf84b4a4af9bb56b3f7822e876,2025-04-07T04:15:18.687000
|
||||
CVE-2024-58126,0,0,e62f30487d3f31de1ed3ed5b8013b2d897b4f96d7a234a1ee8e79b4ffd167ed9,2025-04-07T04:15:18.850000
|
||||
CVE-2024-58127,0,0,3350529ee0ea93a9e1f7ea82c5dcb14f0568cf3c06315084d0a3dda32f4f3e3d,2025-04-07T04:15:19.013000
|
||||
CVE-2024-58128,0,0,2f080faeec9b7abd005e501afed73e7df0c396dabb6a1e25bf77fc72ecfac1be,2025-04-01T20:26:30.593000
|
||||
CVE-2024-58129,0,0,11e98106a59e025e34ac181bdadb4c8348e20bba976912e51d2c9c8ef8d2204d,2025-04-01T20:26:30.593000
|
||||
CVE-2024-5813,0,0,53a768ef9b74ee03be1393dbcc310c528fc37406ef9a9107d27a6d2a3860c95b,2025-02-11T21:36:40.947000
|
||||
@ -282656,18 +282657,18 @@ CVE-2025-20650,0,0,4839c3a5cbb4aeb9330b5312101e579111320a345dc24a6ab22be38037671
|
||||
CVE-2025-20651,0,0,ceca1abbe321244e95f52f7c0e364b2a5ac98d67119c4a4a7e3366e47c16ab0a,2025-03-03T19:15:34.823000
|
||||
CVE-2025-20652,0,0,9485bc5abd99cf5824b119c49fe5e9158c152f14429264c67d56a50ce2458755,2025-03-04T17:15:17.497000
|
||||
CVE-2025-20653,0,0,50d853eb215922ff4e0114da3bc24d2a38f72d15c38383615dd0616a498c1d6f,2025-03-20T19:15:37.333000
|
||||
CVE-2025-20654,1,1,d0fa17c75818a9cbe5b308c406b5732d06ea3a6fbf69f1b1dbe8af19d6a39301,2025-04-07T04:15:19.180000
|
||||
CVE-2025-20655,1,1,678d352c49c9af088f69bb470539660c45df33912ca252ba41586a283ebf820b,2025-04-07T04:15:19.327000
|
||||
CVE-2025-20656,1,1,7729f0f1119d687989581426e16a1849662d6d37c332915d1efe7d92f4403bea,2025-04-07T04:15:19.447000
|
||||
CVE-2025-20657,1,1,cb61d9a3cb9ac86d581ea186f2707d3303ba34a1b5871ef97c0a4971f7f1da04,2025-04-07T04:15:19.577000
|
||||
CVE-2025-20658,1,1,dcb8cc95b867798a792a1d460e36fdb3c8506d534357ec560dc53860750ea79d,2025-04-07T04:15:19.703000
|
||||
CVE-2025-20659,1,1,d3c6b1bdc63249ef98f9c2a96b682b02c845e0aaee705ebb7ce1bc8c2cdb4eb0,2025-04-07T04:15:19.820000
|
||||
CVE-2025-20654,0,0,d0fa17c75818a9cbe5b308c406b5732d06ea3a6fbf69f1b1dbe8af19d6a39301,2025-04-07T04:15:19.180000
|
||||
CVE-2025-20655,0,0,678d352c49c9af088f69bb470539660c45df33912ca252ba41586a283ebf820b,2025-04-07T04:15:19.327000
|
||||
CVE-2025-20656,0,0,7729f0f1119d687989581426e16a1849662d6d37c332915d1efe7d92f4403bea,2025-04-07T04:15:19.447000
|
||||
CVE-2025-20657,0,0,cb61d9a3cb9ac86d581ea186f2707d3303ba34a1b5871ef97c0a4971f7f1da04,2025-04-07T04:15:19.577000
|
||||
CVE-2025-20658,0,0,dcb8cc95b867798a792a1d460e36fdb3c8506d534357ec560dc53860750ea79d,2025-04-07T04:15:19.703000
|
||||
CVE-2025-20659,0,0,d3c6b1bdc63249ef98f9c2a96b682b02c845e0aaee705ebb7ce1bc8c2cdb4eb0,2025-04-07T04:15:19.820000
|
||||
CVE-2025-2066,0,0,91ff735ed7e88e4436bc7b6b6f477b59d5c22b6987e7f0098d0b58198b0d10ea,2025-03-07T05:15:17.293000
|
||||
CVE-2025-20660,1,1,5a0e16d1b9fcbf9b50e1e2f1126db84379e6c3c4873847ea4d4eb9c907170789,2025-04-07T04:15:19.940000
|
||||
CVE-2025-20661,1,1,2d6c225cc6369fd48b5afd7eab216047a75fabb7b11d6bd97e00428c08aaafb0,2025-04-07T04:15:20.057000
|
||||
CVE-2025-20662,1,1,a7df5eeb5335934ffe22936271de51d1c047777e45c8455b1a489096fabea978,2025-04-07T04:15:20.187000
|
||||
CVE-2025-20663,1,1,e4352794eb9003a710cd77b3d081a2d1e10689aa7af049d0c3efe7b7524e27fe,2025-04-07T04:15:20.300000
|
||||
CVE-2025-20664,1,1,709ace1634b454eb6ce553b4737fec7c67ecfbb10743c71915ae78ec3727478a,2025-04-07T04:15:20.420000
|
||||
CVE-2025-20660,0,0,5a0e16d1b9fcbf9b50e1e2f1126db84379e6c3c4873847ea4d4eb9c907170789,2025-04-07T04:15:19.940000
|
||||
CVE-2025-20661,0,0,2d6c225cc6369fd48b5afd7eab216047a75fabb7b11d6bd97e00428c08aaafb0,2025-04-07T04:15:20.057000
|
||||
CVE-2025-20662,0,0,a7df5eeb5335934ffe22936271de51d1c047777e45c8455b1a489096fabea978,2025-04-07T04:15:20.187000
|
||||
CVE-2025-20663,0,0,e4352794eb9003a710cd77b3d081a2d1e10689aa7af049d0c3efe7b7524e27fe,2025-04-07T04:15:20.300000
|
||||
CVE-2025-20664,0,0,709ace1634b454eb6ce553b4737fec7c67ecfbb10743c71915ae78ec3727478a,2025-04-07T04:15:20.420000
|
||||
CVE-2025-2067,0,0,e336b7e791e3fd3cb322ecbc1c5f69ca2b6e5c18fb1ce058eaa6d863ecf3dcd2,2025-03-07T05:15:17.527000
|
||||
CVE-2025-2071,0,0,7bfe8b685b8245c9943c6d89aac222493a621b72ec29c3cf9622feee00de6032,2025-04-01T20:26:30.593000
|
||||
CVE-2025-2072,0,0,7452b78e49b40682ae575d6750e2bb1f2de3946160c5bee4487d35d4121dbb19,2025-04-01T20:26:30.593000
|
||||
@ -288049,12 +288050,12 @@ CVE-2025-31162,0,0,cfeafc9944d79e10529164231b0943be3a87194c4053baabeebe9b961989c
|
||||
CVE-2025-31163,0,0,0d23fc46a79319324af9251b76f99e828668eada4156c0f4488a35318beebb85,2025-04-01T20:26:39.627000
|
||||
CVE-2025-31164,0,0,4b001c140896288467c92c772e2ebf8f58e53bdc0e31f0e36dc064cef4c67cc1,2025-04-01T20:26:39.627000
|
||||
CVE-2025-31165,0,0,890d4b71d79960b8670f39224093c3ef99c7f92edd823784cbe3204f4aa998a2,2025-03-27T16:45:27.850000
|
||||
CVE-2025-31170,1,1,f135d210c62e80c491e45acddec800af0c96e567bae1ef82f5a29354fa9a7a44,2025-04-07T04:15:20.557000
|
||||
CVE-2025-31171,1,1,2a25cfc43166b3e8cf9fe6db0ff1965b9971eeb72e5176799c54bb6e395ddbac,2025-04-07T04:15:20.730000
|
||||
CVE-2025-31172,1,1,7838defccb0ea372938e6aec1bf5b125516282d53f2fe961d5f0733740d1ab6a,2025-04-07T04:15:20.913000
|
||||
CVE-2025-31173,1,1,7ff90dab6c29299c5cfd913c5128855f2667eb4946f90949f880a14a31c5a00e,2025-04-07T04:15:21.997000
|
||||
CVE-2025-31174,1,1,668526b71016fc536bfdfe6b34d161643f357ca028d2e32ce93bea2b3844ec7f,2025-04-07T04:15:22.937000
|
||||
CVE-2025-31175,1,1,edfb0dfe2a3663607179334bd924a30b86e736372e071bd2f188af45953b1977,2025-04-07T04:15:24.080000
|
||||
CVE-2025-31170,0,0,f135d210c62e80c491e45acddec800af0c96e567bae1ef82f5a29354fa9a7a44,2025-04-07T04:15:20.557000
|
||||
CVE-2025-31171,0,0,2a25cfc43166b3e8cf9fe6db0ff1965b9971eeb72e5176799c54bb6e395ddbac,2025-04-07T04:15:20.730000
|
||||
CVE-2025-31172,0,0,7838defccb0ea372938e6aec1bf5b125516282d53f2fe961d5f0733740d1ab6a,2025-04-07T04:15:20.913000
|
||||
CVE-2025-31173,0,0,7ff90dab6c29299c5cfd913c5128855f2667eb4946f90949f880a14a31c5a00e,2025-04-07T04:15:21.997000
|
||||
CVE-2025-31174,0,0,668526b71016fc536bfdfe6b34d161643f357ca028d2e32ce93bea2b3844ec7f,2025-04-07T04:15:22.937000
|
||||
CVE-2025-31175,0,0,edfb0dfe2a3663607179334bd924a30b86e736372e071bd2f188af45953b1977,2025-04-07T04:15:24.080000
|
||||
CVE-2025-31176,0,0,5950baa63470ffff5328579543aed37796bcfb5a77b8a6c2dc6909c9a3e3e744,2025-03-27T16:45:12.210000
|
||||
CVE-2025-31178,0,0,0159271cafd90a7c68cb6b42d742565e913c95d142c34439b76c4b7fbcd3ab7d,2025-03-27T16:45:12.210000
|
||||
CVE-2025-31179,0,0,cda1c9467c3475201d82575e129fca6c85eec975e0bfb5c626efdafa30a80311,2025-03-27T16:45:12.210000
|
||||
@ -288777,7 +288778,11 @@ CVE-2025-3330,0,0,4a843d059e5e06f15119ea4e6c5d278725eeb744ba811bbe0d6ced59456cee
|
||||
CVE-2025-3331,0,0,c8ca7ffae1821c80498ae7a523d4faa8e91a75ad2fe84240017c872c35f3481f,2025-04-07T03:15:21.917000
|
||||
CVE-2025-3332,0,0,be76478f9334254931f964ee293028ab5863432a7bdca4f6f92490932b404cac,2025-04-07T03:15:22.117000
|
||||
CVE-2025-3333,0,0,e222a300067a40bc73f0a5f1c8619f59b6b4ae0fc2c12499e5093e8fa6f40a62,2025-04-07T03:15:22.307000
|
||||
CVE-2025-3334,1,1,706299386e020d274119decb9c2db2a55cacbe094a17783589bb7f32e5b96f58,2025-04-07T04:15:26.117000
|
||||
CVE-2025-3335,1,1,d09a7956d2ecee178f89e4e888552712d59a4d4339afa40dba244fe0fc6635cc,2025-04-07T04:15:36.017000
|
||||
CVE-2025-3336,1,1,3cc453d9260109ce1073b18d0eac2cfa232dee06f1b69469e964f5f7f315c468,2025-04-07T05:15:29.767000
|
||||
CVE-2025-3337,1,1,8715b9957d608f1ec7456c4f26c251aca7e422873ba24280bbceb69498efa44c,2025-04-07T05:15:31.707000
|
||||
CVE-2025-3334,0,0,706299386e020d274119decb9c2db2a55cacbe094a17783589bb7f32e5b96f58,2025-04-07T04:15:26.117000
|
||||
CVE-2025-3335,0,0,d09a7956d2ecee178f89e4e888552712d59a4d4339afa40dba244fe0fc6635cc,2025-04-07T04:15:36.017000
|
||||
CVE-2025-3336,0,0,3cc453d9260109ce1073b18d0eac2cfa232dee06f1b69469e964f5f7f315c468,2025-04-07T05:15:29.767000
|
||||
CVE-2025-3337,0,0,8715b9957d608f1ec7456c4f26c251aca7e422873ba24280bbceb69498efa44c,2025-04-07T05:15:31.707000
|
||||
CVE-2025-3338,1,1,10505a9cdc6664189920cbca060bf28870c086a7db40c4db16dca7e2d6fe94b1,2025-04-07T06:15:40.547000
|
||||
CVE-2025-3339,1,1,952d5ef6529dd456c22372c973d3a7e101a4c4f44c5b3d4621960313b13eb6ff,2025-04-07T06:15:40.823000
|
||||
CVE-2025-3340,1,1,220948cfb011f661ab01a7393803167ed1a1f0434fdec727018e38f04a5ca519,2025-04-07T07:15:39.067000
|
||||
CVE-2025-3341,1,1,7fb01e7c340f2b445323a7b7b6fb2098cb4ae15f633003f38b8bc602ab5c5bb8,2025-04-07T07:15:39.573000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user