Auto-Update: 2025-03-18T15:00:19.408688+00:00

This commit is contained in:
cad-safe-bot 2025-03-18 15:03:48 +00:00
parent 5ebcf3d6e9
commit 2632ded10d
44 changed files with 1411 additions and 169 deletions

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-37037",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-01-21T23:15:11.080",
"lastModified": "2025-02-18T21:15:19.017",
"lastModified": "2025-03-18T14:15:36.540",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-476"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-42930",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-03-28T16:15:08.090",
"lastModified": "2024-11-21T08:23:32.203",
"lastModified": "2025-03-18T14:15:37.640",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2023-47539",
"sourceIdentifier": "psirt@fortinet.com",
"published": "2025-03-18T14:15:37.830",
"lastModified": "2025-03-18T14:15:37.830",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An improper access control vulnerability in FortiMail version 7.4.0 configured with RADIUS authentication and remote_wildcard enabled may allow a remote unauthenticated attacker to bypass admin login via a crafted HTTP request."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@fortinet.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "psirt@fortinet.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-284"
}
]
}
],
"references": [
{
"url": "https://fortiguard.com/psirt/FG-IR-23-439",
"source": "psirt@fortinet.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-20941",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2024-02-17T02:15:48.560",
"lastModified": "2024-11-21T08:53:28.627",
"lastModified": "2025-03-18T14:15:37.983",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -19,7 +19,7 @@
"cvssMetricV31": [
{
"source": "secalert_us@oracle.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
@ -49,6 +49,16 @@
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21113",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2024-04-16T22:15:33.127",
"lastModified": "2024-12-05T15:16:15.940",
"vulnStatus": "Analyzed",
"lastModified": "2025-03-18T14:15:38.140",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -19,7 +19,7 @@
"cvssMetricV31": [
{
"source": "secalert_us@oracle.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
@ -49,6 +49,16 @@
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-284"
}
]
}
],
"configurations": [

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-21760",
"sourceIdentifier": "psirt@fortinet.com",
"published": "2025-03-18T14:15:38.297",
"lastModified": "2025-03-18T14:15:38.297",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An improper control of generation of code ('Code Injection') vulnerability [CWE-94]\u00a0in\u00a0FortiSOAR Connector FortiSOAR 7.4 all versions, 7.3 all versions, 7.2 all versions, 7.0 all versions, 6.4 all versions may allow\u00a0an authenticated attacker\u00a0to execute arbitrary code on the host via a playbook code snippet."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@fortinet.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H",
"baseScore": 8.4,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.7,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "psirt@fortinet.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"references": [
{
"url": "https://fortiguard.fortinet.com/psirt/FG-IR-23-420",
"source": "psirt@fortinet.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-23786",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2024-02-14T10:15:08.727",
"lastModified": "2024-11-21T08:58:24.090",
"lastModified": "2025-03-18T14:15:38.450",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 5.8
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N",
"baseScore": 9.3,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 5.8
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-79"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-28069",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-16T06:15:13.763",
"lastModified": "2024-11-21T09:05:44.903",
"lastModified": "2025-03-18T14:15:38.693",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,30 @@
"value": "Una vulnerabilidad en el componente de chat heredado de Mitel MiContact Center Business hasta la versi\u00f3n 10.0.0.4 podr\u00eda permitir que un atacante no autenticado lleve a cabo un ataque de divulgaci\u00f3n de informaci\u00f3n debido a una configuraci\u00f3n incorrecta. Un exploit exitoso podr\u00eda permitir a un atacante acceder a informaci\u00f3n confidencial y potencialmente realizar acciones no autorizadas dentro del componente vulnerable."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-3172",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2024-07-16T23:15:23.970",
"lastModified": "2024-11-21T09:29:04.223",
"lastModified": "2025-03-18T14:15:39.083",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
@ -49,6 +69,16 @@
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-33601",
"sourceIdentifier": "3ff69d7a-14f2-4f67-a097-88dee7810d18",
"published": "2024-05-06T20:15:11.603",
"lastModified": "2025-02-21T17:15:12.100",
"lastModified": "2025-03-18T14:15:38.867",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,30 @@
"value": "nscd: la cach\u00e9 de netgroup puede terminar el daemon ante una falla en la asignaci\u00f3n de memoria La cach\u00e9 de netgroup del daemon de cach\u00e9 del servicio de nombres (nscd) usa xmalloc o xrealloc y estas funciones pueden terminar el proceso debido a una falla en la asignaci\u00f3n de memoria que resulta en una denegaci\u00f3n de servicio a los clientes. La falla se introdujo en glibc 2.15 cuando se agreg\u00f3 el cach\u00e9 a nscd. Esta vulnerabilidad s\u00f3lo est\u00e1 presente en el binario nscd."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
}
]
},
"weaknesses": [
{
"source": "3ff69d7a-14f2-4f67-a097-88dee7810d18",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-34091",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-05-06T16:15:13.590",
"lastModified": "2024-11-21T09:18:04.670",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-18T14:54:25.830",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.1,
"impactScore": 5.2
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
@ -51,22 +71,57 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://archerirm.com",
"source": "cve@mitre.org"
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:archerirm:archer:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.14.0.3",
"matchCriteriaId": "E4643898-6CFC-4F96-8564-BE6A46E7B75F"
},
{
"url": "https://www.archerirm.community/t5/platform-announcements/archer-update-for-multiple-vulnerabilities/ta-p/720963",
"source": "cve@mitre.org"
},
{
"url": "https://archerirm.com",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://www.archerirm.community/t5/platform-announcements/archer-update-for-multiple-vulnerabilities/ta-p/720963",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"vulnerable": true,
"criteria": "cpe:2.3:a:archerirm:archer:2024.03:*:*:*:*:*:*:*",
"matchCriteriaId": "14B1EA5F-1E5D-4A30-88E5-4460188A7D19"
}
]
}
]
}
],
"references": [
{
"url": "https://archerirm.com",
"source": "cve@mitre.org",
"tags": [
"Product"
]
},
{
"url": "https://www.archerirm.community/t5/platform-announcements/archer-update-for-multiple-vulnerabilities/ta-p/720963",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://archerirm.com",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
]
},
{
"url": "https://www.archerirm.community/t5/platform-announcements/archer-update-for-multiple-vulnerabilities/ta-p/720963",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-40575",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-07-24T16:15:07.150",
"lastModified": "2024-11-21T09:31:19.820",
"lastModified": "2025-03-18T14:15:39.260",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.0,
"impactScore": 4.0
}
]
},
@ -49,6 +69,16 @@
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-400"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-40789",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-07-29T23:15:12.270",
"lastModified": "2024-11-21T09:31:38.157",
"lastModified": "2025-03-18T14:15:39.473",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-40792",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-10-28T21:15:04.670",
"lastModified": "2024-10-30T16:35:18.823",
"lastModified": "2025-03-18T14:15:39.723",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 1.4
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"baseScore": 3.3,
"baseSeverity": "LOW",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 1.4
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-43765",
"sourceIdentifier": "security@android.com",
"published": "2025-01-21T23:15:13.690",
"lastModified": "2025-02-18T20:15:18.873",
"lastModified": "2025-03-18T14:15:39.920",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "En varias ubicaciones, existe una forma posible de obtener acceso a una carpeta debido a un ataque de tapjacking/superposici\u00f3n. Esto podr\u00eda provocar una escalada local de privilegios, con la necesidad de privilegios de ejecuci\u00f3n del usuario. Se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-276"
}
]
}
],
"references": [
{
"url": "https://source.android.com/security/bulletin/2025-01-01",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-43771",
"sourceIdentifier": "security@android.com",
"published": "2025-01-21T23:15:13.880",
"lastModified": "2025-02-18T20:15:19.043",
"lastModified": "2025-03-18T14:15:40.117",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "En gatts_process_read_req de gatt_sr.cc, existe una posible escritura fuera de los l\u00edmites debido a una neutra. Esto podr\u00eda provocar la ejecuci\u00f3n remota de c\u00f3digo (proximal/adyacente) sin necesidad de privilegios de ejecuci\u00f3n adicionales. No se necesita interacci\u00f3n del usuario para la explotaci\u00f3n."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"references": [
{
"url": "https://source.android.com/security/bulletin/2025-01-01",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-44151",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-09-17T00:15:50.717",
"lastModified": "2024-09-24T16:21:05.280",
"vulnStatus": "Analyzed",
"lastModified": "2025-03-18T14:15:40.260",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
@ -49,6 +69,16 @@
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-276"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-45180",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-03T20:15:08.097",
"lastModified": "2024-09-13T19:55:54.477",
"vulnStatus": "Analyzed",
"lastModified": "2025-03-18T14:15:40.437",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-79"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-46582",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-18T15:15:17.680",
"lastModified": "2024-09-24T16:41:29.377",
"vulnStatus": "Analyzed",
"lastModified": "2025-03-18T14:15:40.643",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-120"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-5529",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-07-22T06:15:02.520",
"lastModified": "2024-11-21T09:47:52.530",
"lastModified": "2025-03-18T14:15:41.210",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-56313",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-12-22T22:15:06.540",
"lastModified": "2025-01-14T17:15:19.187",
"lastModified": "2025-03-18T14:15:40.837",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Una vulnerabilidad de cross-site scripting (XSS) almacenado en la funci\u00f3n Calendario de REDCap hasta la versi\u00f3n 15.0.0 permite a los usuarios autenticados inyectar secuencias de comandos maliciosas en el campo Notas de un evento del calendario. Cuando se visualiza el evento, se ejecuta el payload manipulado, lo que potencialmente permite la ejecuci\u00f3n de secuencias de comandos web arbitrarias."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://github.com/ping-oui-no/Vulnerability-Research-CVESS/tree/main/RedCap",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-57015",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-01-15T17:15:17.403",
"lastModified": "2025-03-10T17:22:42.443",
"vulnStatus": "Analyzed",
"lastModified": "2025-03-18T14:15:41.020",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-78"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"configurations": [

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-8997",
"sourceIdentifier": "iletisim@usom.gov.tr",
"published": "2025-03-18T14:15:41.400",
"lastModified": "2025-03-18T14:15:41.400",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Vestel EVC04 Configuration Interface allows SQL Injection.This issue affects EVC04 Configuration Interface: through 18.03.2025."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "iletisim@usom.gov.tr",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "iletisim@usom.gov.tr",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://www.usom.gov.tr/bildirim/tr-25-0070",
"source": "iletisim@usom.gov.tr"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2025-20634",
"sourceIdentifier": "security@mediatek.com",
"published": "2025-02-03T04:15:08.423",
"lastModified": "2025-02-18T19:15:24.690",
"lastModified": "2025-03-18T14:15:41.747",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2025-21546",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2025-01-21T21:15:20.987",
"lastModified": "2025-02-18T21:15:26.057",
"lastModified": "2025-03-18T14:15:41.940",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -39,6 +39,18 @@
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-863"
}
]
}
],
"references": [
{
"url": "https://www.oracle.com/security-alerts/cpujan2025.html",

View File

@ -2,7 +2,7 @@
"id": "CVE-2025-21548",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2025-01-21T21:15:21.240",
"lastModified": "2025-02-18T21:15:26.297",
"lastModified": "2025-03-18T14:15:42.087",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -39,6 +39,18 @@
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-400"
}
]
}
],
"references": [
{
"url": "https://www.oracle.com/security-alerts/cpujan2025.html",

View File

@ -2,7 +2,7 @@
"id": "CVE-2025-22954",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-03-12T15:15:39.700",
"lastModified": "2025-03-13T04:15:22.230",
"lastModified": "2025-03-18T14:15:42.213",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -36,26 +36,6 @@
},
"exploitabilityScore": 3.9,
"impactScore": 6.0
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 5.0,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 1.6,
"impactScore": 3.4
}
]
},
@ -69,16 +49,6 @@
"value": "CWE-89"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-24108",
"sourceIdentifier": "product-security@apple.com",
"published": "2025-01-27T22:15:16.263",
"lastModified": "2025-03-04T15:25:43.983",
"vulnStatus": "Analyzed",
"lastModified": "2025-03-18T14:15:42.627",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,19 +36,49 @@
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Secondary",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-24118",
"sourceIdentifier": "product-security@apple.com",
"published": "2025-01-27T22:15:17.033",
"lastModified": "2025-03-04T15:15:49.937",
"vulnStatus": "Analyzed",
"lastModified": "2025-03-18T14:15:42.797",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,19 +36,49 @@
},
"exploitabilityScore": 1.8,
"impactScore": 5.2
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Secondary",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-24174",
"sourceIdentifier": "product-security@apple.com",
"published": "2025-01-27T22:15:20.547",
"lastModified": "2025-03-03T22:47:07.577",
"vulnStatus": "Analyzed",
"lastModified": "2025-03-18T14:15:43.020",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,19 +36,49 @@
},
"exploitabilityScore": 2.5,
"impactScore": 5.2
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"baseScore": 7.7,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.5,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Secondary",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2025-24813",
"sourceIdentifier": "security@apache.org",
"published": "2025-03-10T17:15:35.067",
"lastModified": "2025-03-17T16:15:25.343",
"lastModified": "2025-03-18T14:15:43.253",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,11 +15,34 @@
"value": "Equivalencia de ruta: 'file.Name' (punto interno) que conduce a la ejecuci\u00f3n remota de c\u00f3digo y/o divulgaci\u00f3n de informaci\u00f3n y/o contenido malicioso agregado a los archivos cargados a trav\u00e9s del servlet predeterminado habilitado para escritura en Apache Tomcat. Este problema afecta a Apache Tomcat: desde 11.0.0-M1 hasta 11.0.2, desde 10.1.0-M1 hasta 10.1.34, desde 9.0.0.M1 hasta 9.0.98. Si todo lo siguiente fuera cierto, un usuario malintencionado podr\u00eda ver archivos sensibles de seguridad y/o inyectar contenido en esos archivos: - escrituras habilitadas para el servlet predeterminado (deshabilitado por defecto) - soporte para PUT parcial (habilitado por defecto) - una URL de destino para cargas sensibles de seguridad que era un subdirectorio de una URL de destino para cargas p\u00fablicas - conocimiento del atacante de los nombres de los archivos sensibles de seguridad que se estaban cargando - los archivos sensibles de seguridad tambi\u00e9n se estaban cargando a trav\u00e9s de PUT parcial Si todo lo siguiente fuera cierto, un usuario malintencionado podr\u00eda realizar una ejecuci\u00f3n remota de c\u00f3digo: - escrituras habilitadas para el servlet predeterminado (deshabilitado por defecto) - soporte para PUT parcial (habilitado por defecto) - la aplicaci\u00f3n estaba usando la persistencia de sesi\u00f3n basada en archivos de Tomcat con la ubicaci\u00f3n de almacenamiento predeterminada - la aplicaci\u00f3n inclu\u00eda una biblioteca que se puede aprovechar en un ataque de deserializaci\u00f3n Se recomienda a los usuarios actualizar a la versi\u00f3n 11.0.3, 10.1.35 o 9.0.98, que corrige el problema."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "security@apache.org",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-2419",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-03-17T22:15:15.450",
"lastModified": "2025-03-17T22:15:15.450",
"lastModified": "2025-03-18T14:15:45.067",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as critical has been found in code-projects Real Estate Property Management System 1.0. Affected is an unknown function of the file /InsertFeedback.php. The manipulation of the argument txtName/txtEmail/txtMobile/txtFeedback leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used."
},
{
"lang": "es",
"value": "Se ha detectado una vulnerabilidad cr\u00edtica en code-projects Real Estate Property Management System 1.0. Se ve afectada una funci\u00f3n desconocida del archivo /InsertFeedback.php. La manipulaci\u00f3n del argumento txtName/txtEmail/txtMobile/txtFeedback provoca una inyecci\u00f3n SQL. Es posible ejecutar el ataque de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado."
}
],
"metrics": {
@ -59,7 +63,7 @@
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
@ -107,7 +111,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -140,6 +144,10 @@
{
"url": "https://vuldb.com/?submit.516999",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/heiheiworld/cve/blob/main/cve-h.md",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-2420",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-03-17T23:15:18.723",
"lastModified": "2025-03-17T23:15:18.723",
"lastModified": "2025-03-18T13:15:37.770",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as problematic was found in \u732b\u5b81i Morning up to bc782730c74ff080494f145cc363a0b4f43f7d3e. Affected by this vulnerability is an unknown functionality. The manipulation leads to cross-site request forgery. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. This product takes the approach of rolling releases to provide continious delivery. Therefore, version details for affected and updated releases are not available."
},
{
"lang": "es",
"value": "Se encontr\u00f3 una vulnerabilidad clasificada como problem\u00e1tica en ??i Morning hasta bc782730c74ff080494f145cc363a0b4f43f7d3e. Esta vulnerabilidad afecta a una funcionalidad desconocida. La manipulaci\u00f3n provoca cross-site request forgery. El ataque puede ejecutarse remotamente. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Este producto utiliza el enfoque de lanzamiento continuo para garantizar una entrega continua. Por lo tanto, no se dispone de detalles de las versiones afectadas ni de las actualizadas."
}
],
"metrics": {
@ -59,7 +63,7 @@
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
@ -107,7 +111,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -136,6 +140,10 @@
{
"url": "https://vuldb.com/?submit.517009",
"source": "cna@vuldb.com"
},
{
"url": "https://gitee.com/morning-pro/Morning/issues/IBRVMX",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-2449",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2025-03-18T14:15:45.670",
"lastModified": "2025-03-18T14:15:45.670",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "NI FlexLogger usiReg URI File Parsing Directory Traversal Remote Code Execution Vulnerability. This vulnerability allows remote attackers to create arbitrary files on affected installations of NI FlexLogger. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of URI files by the usiReg component. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to execute code in the context of the current user. Was ZDI-CAN-21805."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"references": [
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-25-146/",
"source": "zdi-disclosures@trendmicro.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-2450",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2025-03-18T14:15:45.850",
"lastModified": "2025-03-18T14:15:45.850",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "NI Vision Builder AI VBAI File Processing Missing Warning Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of NI Vision Builder AI. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the processing of VBAI files. The issue results from allowing the execution of dangerous script without user warning. An attacker can leverage this vulnerability to execute code in the context of the current user. Was ZDI-CAN-22833."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-356"
}
]
}
],
"references": [
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-25-147/",
"source": "zdi-disclosures@trendmicro.com"
}
]
}

View File

@ -0,0 +1,145 @@
{
"id": "CVE-2025-2490",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-03-18T14:15:46.250",
"lastModified": "2025-03-18T14:15:46.250",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in Dromara ujcms 9.7.5. It has been rated as problematic. Affected by this issue is the function uploadZip/upload of the file /main/java/com/ujcms/cms/ext/web/backendapi/WebFileUploadController.java of the component File Upload. The manipulation leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "HIGH",
"userInteraction": "PASSIVE",
"vulnConfidentialityImpact": "NONE",
"vulnIntegrityImpact": "LOW",
"vulnAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N",
"baseScore": 2.4,
"baseSeverity": "LOW",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 0.9,
"impactScore": 1.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:M/C:N/I:P/A:N",
"baseScore": 3.3,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "MULTIPLE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE"
},
"baseSeverity": "LOW",
"exploitabilityScore": 6.4,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
},
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"references": [
{
"url": "https://github.com/dromara/ujcms/issues/12",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/dromara/ujcms/issues/13",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.299996",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.299996",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.517267",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2025-25500",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-03-18T14:15:43.493",
"lastModified": "2025-03-18T14:15:43.493",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue in CosmWasm prior to v2.2.0 allows attackers to bypass capability restrictions in blockchains by exploiting a lack of runtime capability validation. This allows attackers to deploy a contract without capability enforcement, and execute unauthorized actions on the blockchain."
}
],
"metrics": {},
"references": [
{
"url": "https://gist.github.com/H3T76/8096a6ff9410f3a6d9a25db1a68ae657#file-cve-2025-25500",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/CVEProject/cveproject.github.io/blob/gh-pages/requester/reservation-guidelines.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2025-25898",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-13T16:16:49.867",
"lastModified": "2025-02-18T18:15:35.503",
"lastModified": "2025-03-18T14:15:43.617",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-787"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-29909",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-03-17T22:15:14.657",
"lastModified": "2025-03-17T22:15:14.657",
"lastModified": "2025-03-18T14:15:43.803",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "CryptoLib provides a software-only solution using the CCSDS Space Data Link Security Protocol - Extended Procedures (SDLS-EP) to secure communications between a spacecraft running the core Flight System (cFS) and a ground station. In versions 1.3.3 and prior, a heap buffer overflow vulnerability in CryptoLib's `Crypto_TC_ApplySecurity()` allows an attacker to craft a malicious TC frame that causes out-of-bounds memory writes. This can result in denial of service (DoS) or, under certain conditions, remote code execution (RCE). Any application or system that relies on CryptoLib for Telecommand (TC) processing and does not strictly validate incoming TC frames is at risk. This includes satellite ground stations or mission control software where attackers can inject malformed frames. A patch is available at commit c7e8a8745ff4b5e9bd7e500e91358e86d5abedcc."
},
{
"lang": "es",
"value": "CryptoLib ofrece una soluci\u00f3n exclusivamente de software que utiliza el Protocolo de Seguridad de Enlace de Datos Espaciales (SDLS-EP) del CCSDS para proteger las comunicaciones entre una nave espacial que ejecuta el Sistema de Vuelo (cFS) y una estaci\u00f3n terrestre. En las versiones 1.3.3 y anteriores, una vulnerabilidad de desbordamiento de b\u00fafer en la pila de `Crypto_TC_ApplySecurity()` de CryptoLib permite a un atacante manipular una trama TC maliciosa que provoca escrituras fuera de los l\u00edmites de memoria. Esto puede provocar una denegaci\u00f3n de servicio (DoS) o, en determinadas circunstancias, la ejecuci\u00f3n remota de c\u00f3digo (RCE). Cualquier aplicaci\u00f3n o sistema que dependa de CryptoLib para el procesamiento de telecomandos (TC) y no valide estrictamente las tramas TC entrantes est\u00e1 en riesgo. Esto incluye estaciones terrestres de sat\u00e9lite o software de control de misi\u00f3n, donde los atacantes pueden inyectar tramas malformadas. Hay un parche disponible en el commit c7e8a8745ff4b5e9bd7e500e91358e86d5abedcc."
}
],
"metrics": {
@ -60,7 +64,7 @@
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -81,6 +85,10 @@
{
"url": "https://github.com/nasa/CryptoLib/security/advisories/GHSA-q2pc-c3jx-3852",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/nasa/CryptoLib/security/advisories/GHSA-q2pc-c3jx-3852",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-29910",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-03-17T22:15:14.810",
"lastModified": "2025-03-17T22:15:14.810",
"lastModified": "2025-03-18T14:15:43.913",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "CryptoLib provides a software-only solution using the CCSDS Space Data Link Security Protocol - Extended Procedures (SDLS-EP) to secure communications between a spacecraft running the core Flight System (cFS) and a ground station. A memory leak vulnerability was identified in the `crypto_handle_incrementing_nontransmitted_counter` function of CryptoLib versions 1.3.3 and prior. This vulnerability can lead to resource exhaustion and degraded system performance over time, particularly in long-running processes or systems processing large volumes of data. The vulnerability is present in the `crypto_handle_incrementing_nontransmitted_counter` function within `crypto_tc.c`. The function allocates memory using `malloc` without ensuring the allocated memory is always freed. This issue can lead to resource exhaustion, reduced system performance, and potentially a Denial of Service (DoS) in environments where CryptoLib is used in long-running processes or with large volumes of data. Any system using CryptoLib, especially those handling high-throughput or continuous data streams, could be impacted. As of time of publication, no known patched versions are available."
},
{
"lang": "es",
"value": "CryptoLib ofrece una soluci\u00f3n exclusivamente de software que utiliza el Protocolo de Seguridad de Enlace de Datos Espaciales CCSDS - Procedimientos Extendidos (SDLS-EP) para proteger las comunicaciones entre una nave espacial que ejecuta el Sistema de Vuelo (cFS) y una estaci\u00f3n terrestre. Se identific\u00f3 una vulnerabilidad de fuga de memoria en la funci\u00f3n `crypto_handle_incrementing_nontransmitted_counter` de las versiones 1.3.3 y anteriores de CryptoLib. Esta vulnerabilidad puede provocar el agotamiento de recursos y la degradaci\u00f3n del rendimiento del sistema con el tiempo, especialmente en procesos de larga duraci\u00f3n o sistemas que procesan grandes vol\u00famenes de datos. La vulnerabilidad est\u00e1 presente en la funci\u00f3n `crypto_handle_incrementing_nontransmitted_counter` dentro de `crypto_tc.c`. Esta funci\u00f3n asigna memoria mediante `malloc` sin garantizar que la memoria asignada siempre est\u00e9 libre. Este problema puede provocar el agotamiento de recursos, la reducci\u00f3n del rendimiento del sistema y, potencialmente, una denegaci\u00f3n de servicio (DoS) en entornos donde CryptoLib se utiliza en procesos de larga duraci\u00f3n o con grandes vol\u00famenes de datos. Cualquier sistema que utilice CryptoLib, especialmente aquellos que gestionan flujos de datos continuos o de alto rendimiento, podr\u00eda verse afectado. Al momento de la publicaci\u00f3n, no se conoc\u00edan versiones parcheadas."
}
],
"metrics": {
@ -60,7 +64,7 @@
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -73,6 +77,10 @@
{
"url": "https://github.com/nasa/CryptoLib/security/advisories/GHSA-p38w-p2r8-g6g5",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/nasa/CryptoLib/security/advisories/GHSA-p38w-p2r8-g6g5",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-29911",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-03-17T23:15:18.293",
"lastModified": "2025-03-17T23:15:18.293",
"lastModified": "2025-03-18T14:15:44.023",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "CryptoLib provides a software-only solution using the CCSDS Space Data Link Security Protocol - Extended Procedures (SDLS-EP) to secure communications between a spacecraft running the core Flight System (cFS) and a ground station. A critical heap buffer overflow vulnerability was identified in the `Crypto_AOS_ProcessSecurity` function of CryptoLib versions 1.3.3 and prior. This vulnerability allows an attacker to trigger a Denial of Service (DoS) or potentially execute arbitrary code (RCE) by providing a maliciously crafted AOS frame with an insufficient length. The vulnerability lies in the function `Crypto_AOS_ProcessSecurity`, specifically during the processing of the Frame Error Control Field (FECF). The affected code attempts to read from the `p_ingest` buffer at indices `current_managed_parameters_struct.max_frame_size - 2` and `current_managed_parameters_struct.max_frame_size - 1` without verifying if `len_ingest` is sufficiently large. This leads to a heap buffer overflow when `len_ingest` is smaller than `max_frame_size`. As of time of publication, no known patched versions exist."
},
{
"lang": "es",
"value": "CryptoLib ofrece una soluci\u00f3n exclusivamente de software que utiliza el Protocolo de Seguridad de Enlace de Datos Espaciales CCSDS - Procedimientos Extendidos (SDLS-EP) para proteger las comunicaciones entre una nave espacial que ejecuta el Sistema de Vuelo (cFS) y una estaci\u00f3n terrestre. Se identific\u00f3 una vulnerabilidad cr\u00edtica de desbordamiento del b\u00fafer de pila en la funci\u00f3n `Crypto_AOS_ProcessSecurity` de las versiones 1.3.3 y anteriores de CryptoLib. Esta vulnerabilidad permite a un atacante activar una denegaci\u00f3n de servicio (DoS) o, potencialmente, ejecutar c\u00f3digo arbitrario (RCE) al proporcionar una trama AOS maliciosa con una longitud insuficiente. La vulnerabilidad reside en la funci\u00f3n `Crypto_AOS_ProcessSecurity`, espec\u00edficamente durante el procesamiento del Campo de Control de Error de Trama (FECF). El c\u00f3digo afectado intenta leer del b\u00fafer `p_ingest` en los \u00edndices `current_managed_parameters_struct.max_frame_size - 2` y `current_managed_parameters_struct.max_frame_size - 1` sin verificar si `len_ingest` es lo suficientemente grande. Esto provoca un desbordamiento del b\u00fafer del mont\u00f3n cuando `len_ingest` es menor que `max_frame_size`. Al momento de la publicaci\u00f3n, no se conoc\u00edan versiones parcheadas."
}
],
"metrics": {
@ -60,7 +64,7 @@
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -73,6 +77,10 @@
{
"url": "https://github.com/nasa/CryptoLib/security/advisories/GHSA-7g6g-9gj4-8c68",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/nasa/CryptoLib/security/advisories/GHSA-7g6g-9gj4-8c68",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2025-30106",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-03-18T14:15:46.480",
"lastModified": "2025-03-18T14:15:46.480",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "On IROAD v9 devices, the dashcam has hardcoded default credentials (\"qwertyuiop\") that cannot be changed by the user. This allows an attacker within Wi-Fi range to connect to the device's network to perform sniffing."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/geo-chen/IROAD-V",
"source": "cve@mitre.org"
},
{
"url": "https://iroad-dashcam.nl/iroad/iroad-x5/",
"source": "cve@mitre.org"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2025-03-18T13:00:19.684554+00:00
2025-03-18T15:00:19.408688+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2025-03-18T12:34:33.997000+00:00
2025-03-18T14:54:25.830000+00:00
```
### Last Data Feed Release
@ -33,36 +33,52 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
285584
285592
```
### CVEs added in the last Commit
Recently added CVEs: `9`
Recently added CVEs: `8`
- [CVE-2024-23942](CVE-2024/CVE-2024-239xx/CVE-2024-23942.json) (`2025-03-18T11:15:38.777`)
- [CVE-2024-23943](CVE-2024/CVE-2024-239xx/CVE-2024-23943.json) (`2025-03-18T11:15:39.090`)
- [CVE-2024-41975](CVE-2024/CVE-2024-419xx/CVE-2024-41975.json) (`2025-03-18T11:15:39.247`)
- [CVE-2025-0694](CVE-2025/CVE-2025-06xx/CVE-2025-0694.json) (`2025-03-18T11:15:39.400`)
- [CVE-2025-1468](CVE-2025/CVE-2025-14xx/CVE-2025-1468.json) (`2025-03-18T11:15:39.553`)
- [CVE-2025-2489](CVE-2025/CVE-2025-24xx/CVE-2025-2489.json) (`2025-03-18T12:15:15.770`)
- [CVE-2025-2493](CVE-2025/CVE-2025-24xx/CVE-2025-2493.json) (`2025-03-18T12:15:15.950`)
- [CVE-2025-2494](CVE-2025/CVE-2025-24xx/CVE-2025-2494.json) (`2025-03-18T12:15:16.090`)
- [CVE-2025-2495](CVE-2025/CVE-2025-24xx/CVE-2025-2495.json) (`2025-03-18T12:15:16.227`)
- [CVE-2023-47539](CVE-2023/CVE-2023-475xx/CVE-2023-47539.json) (`2025-03-18T14:15:37.830`)
- [CVE-2024-21760](CVE-2024/CVE-2024-217xx/CVE-2024-21760.json) (`2025-03-18T14:15:38.297`)
- [CVE-2024-8997](CVE-2024/CVE-2024-89xx/CVE-2024-8997.json) (`2025-03-18T14:15:41.400`)
- [CVE-2025-2449](CVE-2025/CVE-2025-24xx/CVE-2025-2449.json) (`2025-03-18T14:15:45.670`)
- [CVE-2025-2450](CVE-2025/CVE-2025-24xx/CVE-2025-2450.json) (`2025-03-18T14:15:45.850`)
- [CVE-2025-2490](CVE-2025/CVE-2025-24xx/CVE-2025-2490.json) (`2025-03-18T14:15:46.250`)
- [CVE-2025-25500](CVE-2025/CVE-2025-255xx/CVE-2025-25500.json) (`2025-03-18T14:15:43.493`)
- [CVE-2025-30106](CVE-2025/CVE-2025-301xx/CVE-2025-30106.json) (`2025-03-18T14:15:46.480`)
### CVEs modified in the last Commit
Recently modified CVEs: `8`
Recently modified CVEs: `34`
- [CVE-2024-13564](CVE-2024/CVE-2024-135xx/CVE-2024-13564.json) (`2025-03-18T12:34:33.997`)
- [CVE-2024-21752](CVE-2024/CVE-2024-217xx/CVE-2024-21752.json) (`2025-03-18T11:53:39.520`)
- [CVE-2024-24835](CVE-2024/CVE-2024-248xx/CVE-2024-24835.json) (`2025-03-18T11:37:45.627`)
- [CVE-2024-27952](CVE-2024/CVE-2024-279xx/CVE-2024-27952.json) (`2025-03-18T11:07:04.300`)
- [CVE-2024-29117](CVE-2024/CVE-2024-291xx/CVE-2024-29117.json) (`2025-03-18T11:54:32.273`)
- [CVE-2024-29928](CVE-2024/CVE-2024-299xx/CVE-2024-29928.json) (`2025-03-18T11:33:47.187`)
- [CVE-2024-30549](CVE-2024/CVE-2024-305xx/CVE-2024-30549.json) (`2025-03-18T11:33:13.290`)
- [CVE-2025-24093](CVE-2025/CVE-2025-240xx/CVE-2025-24093.json) (`2025-03-18T12:15:14.730`)
- [CVE-2024-40575](CVE-2024/CVE-2024-405xx/CVE-2024-40575.json) (`2025-03-18T14:15:39.260`)
- [CVE-2024-40789](CVE-2024/CVE-2024-407xx/CVE-2024-40789.json) (`2025-03-18T14:15:39.473`)
- [CVE-2024-40792](CVE-2024/CVE-2024-407xx/CVE-2024-40792.json) (`2025-03-18T14:15:39.723`)
- [CVE-2024-43765](CVE-2024/CVE-2024-437xx/CVE-2024-43765.json) (`2025-03-18T14:15:39.920`)
- [CVE-2024-43771](CVE-2024/CVE-2024-437xx/CVE-2024-43771.json) (`2025-03-18T14:15:40.117`)
- [CVE-2024-44151](CVE-2024/CVE-2024-441xx/CVE-2024-44151.json) (`2025-03-18T14:15:40.260`)
- [CVE-2024-45180](CVE-2024/CVE-2024-451xx/CVE-2024-45180.json) (`2025-03-18T14:15:40.437`)
- [CVE-2024-46582](CVE-2024/CVE-2024-465xx/CVE-2024-46582.json) (`2025-03-18T14:15:40.643`)
- [CVE-2024-5529](CVE-2024/CVE-2024-55xx/CVE-2024-5529.json) (`2025-03-18T14:15:41.210`)
- [CVE-2024-56313](CVE-2024/CVE-2024-563xx/CVE-2024-56313.json) (`2025-03-18T14:15:40.837`)
- [CVE-2024-57015](CVE-2024/CVE-2024-570xx/CVE-2024-57015.json) (`2025-03-18T14:15:41.020`)
- [CVE-2025-20634](CVE-2025/CVE-2025-206xx/CVE-2025-20634.json) (`2025-03-18T14:15:41.747`)
- [CVE-2025-21546](CVE-2025/CVE-2025-215xx/CVE-2025-21546.json) (`2025-03-18T14:15:41.940`)
- [CVE-2025-21548](CVE-2025/CVE-2025-215xx/CVE-2025-21548.json) (`2025-03-18T14:15:42.087`)
- [CVE-2025-22954](CVE-2025/CVE-2025-229xx/CVE-2025-22954.json) (`2025-03-18T14:15:42.213`)
- [CVE-2025-24108](CVE-2025/CVE-2025-241xx/CVE-2025-24108.json) (`2025-03-18T14:15:42.627`)
- [CVE-2025-24118](CVE-2025/CVE-2025-241xx/CVE-2025-24118.json) (`2025-03-18T14:15:42.797`)
- [CVE-2025-24174](CVE-2025/CVE-2025-241xx/CVE-2025-24174.json) (`2025-03-18T14:15:43.020`)
- [CVE-2025-2419](CVE-2025/CVE-2025-24xx/CVE-2025-2419.json) (`2025-03-18T14:15:45.067`)
- [CVE-2025-2420](CVE-2025/CVE-2025-24xx/CVE-2025-2420.json) (`2025-03-18T13:15:37.770`)
- [CVE-2025-24813](CVE-2025/CVE-2025-248xx/CVE-2025-24813.json) (`2025-03-18T14:15:43.253`)
- [CVE-2025-25898](CVE-2025/CVE-2025-258xx/CVE-2025-25898.json) (`2025-03-18T14:15:43.617`)
- [CVE-2025-29909](CVE-2025/CVE-2025-299xx/CVE-2025-29909.json) (`2025-03-18T14:15:43.803`)
- [CVE-2025-29910](CVE-2025/CVE-2025-299xx/CVE-2025-29910.json) (`2025-03-18T14:15:43.913`)
- [CVE-2025-29911](CVE-2025/CVE-2025-299xx/CVE-2025-29911.json) (`2025-03-18T14:15:44.023`)
## Download and Usage

View File

@ -229539,7 +229539,7 @@ CVE-2023-37033,0,0,4d19abd7a4b0679c963f8ae0666794b729ae8b36c669ea355e198e5d10e5d
CVE-2023-37034,0,0,fa5a5e09d8d78e10a9175b15b4767670b021a7f2fdabb4036e210e9d3e979a0d,2025-02-18T21:15:18.657000
CVE-2023-37035,0,0,6fd1f0fcf8e0fd7b5fff245ed675e79d0e28b5c9d56b589ad47f9b27426f565f,2025-01-22T15:15:12.017000
CVE-2023-37036,0,0,6121be02129a87ac19af9dbdfa88faf71a80c89697c7eb9824b19b67281e7fe1,2025-02-18T21:15:18.833000
CVE-2023-37037,0,0,955cf823798334850c56511cc5d4474f00db6322afdf539bfc2d9677a497adbc,2025-02-18T21:15:19.017000
CVE-2023-37037,0,1,4288177fbb520d26843219d9c7439a4ea638bd90dd89bfc8efaa2edd3b8881c9,2025-03-18T14:15:36.540000
CVE-2023-37038,0,0,5bdea00602f2b8731b2d9fe065f617cd5b02fe40112461fb0ca64d4e532a3476,2025-03-13T20:15:15.297000
CVE-2023-37039,0,0,593095538e0a058f3185841ec48dc68f11660c8bdecf3a52a3448a987f5b7338,2025-03-14T18:15:26.553000
CVE-2023-3704,0,0,f6e670c2d83474f0123d0af7a87775cbeb898fda49a9a2d86b14ac103d673216,2024-11-21T08:17:52.930000
@ -234309,7 +234309,7 @@ CVE-2023-42927,0,0,14031071501231274e24e297950a9bf2d187da6694c43ed89fc9fa105221f
CVE-2023-42928,0,0,09b31ffbb457522f85f851077716b61a6b3ab014cc929e3d598a183a03cc68c0,2024-12-04T22:34:44.777000
CVE-2023-42929,0,0,22e391c78b0bc708ad36e097e0efa7984486dffc0ca1c4dde9bea2af85485826,2025-01-27T18:15:36.240000
CVE-2023-4293,0,0,9fec83a175e041c854dcb2a5fb9a0694cdd7b06bced71f7469a7fdafb589dbd9,2024-11-21T08:34:47.947000
CVE-2023-42930,0,0,c3000d0710eca7fcac206d7d07f55ef71a49336e4e8eba7db72184c755d073fa,2024-11-21T08:23:32.203000
CVE-2023-42930,0,1,25d7bd3e87a738a5f8af648624bebea7e0c1dc473f29a8a931720dc503713871,2025-03-18T14:15:37.640000
CVE-2023-42931,0,0,1f1699814f13af297276399444ed2998af062ed9a892f7f5fa3b5215b4d8431f,2024-11-21T08:23:32.337000
CVE-2023-42932,0,0,0fa8aee74d53ff347eeb67002789734567a456a1e02e04a09f94fc7aac778003,2024-11-21T08:23:32.547000
CVE-2023-42933,0,0,19e86fdfeca504e0149a8d635152cff97edbafa25dc596c6f832b0f0e3718e0c,2024-11-21T08:23:32.693000
@ -237473,6 +237473,7 @@ CVE-2023-47534,0,0,156d1827eb4da96dc3cd2d8629999ea2e2fa724590606a3354fde4b400d38
CVE-2023-47535,0,0,f2482cd2a126c874431de1486430d927e5d2fe9233f7e6e04b7ad66b435fbddd,2025-03-17T23:15:16.877000
CVE-2023-47536,0,0,d84d72a63721689042d4832177b8ed0c4a9d504fac28b204af3cc47b40f30f39,2024-11-21T08:30:24.973000
CVE-2023-47537,0,0,2e59328fe99d373a050967f8884554343bd03b198b96f65b133b83e4d7c66e1c,2024-11-21T08:30:25.100000
CVE-2023-47539,1,1,54596679236b300e906d331306b91f51f0b380b77c51cf9b8078260a43a824d0,2025-03-18T14:15:37.830000
CVE-2023-4754,0,0,0b14f0921b6667a528d8f56fea2f4c9f7f951287cede8fa8335afbbdb458b076,2024-11-21T08:35:54.460000
CVE-2023-47540,0,0,30ad5bce1a8ff12a551ea717bec4c760ac5e6136be380d2d553098d927c9acd4,2024-12-23T14:55:53.860000
CVE-2023-47541,0,0,3da53a23394974b989fe8799af46c85743ab703fa3c735d56b01dc047fc3d5b3,2024-12-23T14:57:00.153000
@ -247672,7 +247673,7 @@ CVE-2024-13560,0,0,bc3576a3348779a87640a25b38dfdb4ea2739f3634c8fab6266670a556723
CVE-2024-13561,0,0,2147326d45c7c96265106b6ff772f1393a83793dfac14b78a483fca6de875c16,2025-01-29T12:15:27.617000
CVE-2024-13562,0,0,b51ff5c1214904c48acd8185520c69905fbad554f23d67d52a0c555fc11349f1,2025-02-04T20:26:53.560000
CVE-2024-13563,0,0,7afda43f88427dad437c50be6603e252baea46e3fdf123d9d97727e766d854d8,2025-02-28T22:08:41.383000
CVE-2024-13564,0,1,b852ed41c482550afe0a693c7be7c11cdc0c6f8336e2a90e2b042aa465b4bef9,2025-03-18T12:34:33.997000
CVE-2024-13564,0,0,b852ed41c482550afe0a693c7be7c11cdc0c6f8336e2a90e2b042aa465b4bef9,2025-03-18T12:34:33.997000
CVE-2024-13565,0,0,684f7f6c469aa690c31498d8006cc3528a7f9ba92e597c468d835d0a7ab8e16b,2025-02-24T14:55:25.973000
CVE-2024-13566,0,0,4e1012bf67cdbac097d1c63a1c7fd79c8a8116508864b50fb7c66cdc833178a3,2025-01-31T09:15:06.847000
CVE-2024-13568,0,0,9e74afb56722f02929d754afa7c3b344f0fb3d262b0b29f693d93e682755b19b,2025-03-01T05:15:14.883000
@ -249339,7 +249340,7 @@ CVE-2024-20937,0,0,9f7a5f5a131093c9b119dbd0de8a4ddc6a0c065a2d2291ce3b1d58ce46223
CVE-2024-20938,0,0,6fe21b52aad41d5c17bb42ae4439eea9ca26609905457e042a739e5c570e5ae2,2024-11-21T08:53:28.290000
CVE-2024-20939,0,0,a61ef26bf2d0edb06b899a122ed306c452492ece485364c57e14dc58ca287a91,2024-11-29T14:08:10.783000
CVE-2024-20940,0,0,2eef388a674fa50646c1a9e94e9cc85f45f15970a44431d112399a9bcd04b4bd,2024-11-21T08:53:28.510000
CVE-2024-20941,0,0,ade6083dca081c447e1ccb896e38e59717d8aebeb9ead99ebd48803f468a3714,2024-11-21T08:53:28.627000
CVE-2024-20941,0,1,979ab879e23ba3c79bea46ae3f7a52ecf257a8180aebfc1872017418c29dd488,2025-03-18T14:15:37.983000
CVE-2024-20942,0,0,2598677f0c454ed9ee0ba0704705d6276c039cbd72f273ab754a1b849ce636d5,2024-11-21T08:53:28.740000
CVE-2024-20943,0,0,0335ec4dd85ba21cfc62e7df0256bca3d058de7a66f986149db911f3e2f03ed7,2024-11-21T08:53:28.860000
CVE-2024-20944,0,0,431d40edb070cddbf02cbf85d009e07a3054fa640a623707fd6570608afaa9bf,2024-11-21T08:53:28.977000
@ -249521,7 +249522,7 @@ CVE-2024-2111,0,0,e7b737ad21498d72afeac55573741ec14d270cbe6717a3805c824181bcb9c5
CVE-2024-21110,0,0,5de512fcaa05c997e9352f53e43d504fb84e931f43c53c58b30d52517f92662b,2024-11-21T08:53:48.270000
CVE-2024-21111,0,0,ce04902122edd823f80a1fc79ecddd6498bfae611dda514cff0b08c3d5f73631,2024-12-05T15:16:10.643000
CVE-2024-21112,0,0,5f9a410d7e29e43b4a2df72469fe4323aca9f75837d3af964d48ebb5bcf4f6d9,2024-12-05T15:16:13.397000
CVE-2024-21113,0,0,86df7db11640cede427be4212b6b270c53dafd862acd12cf7bd5eaf6600225ed,2024-12-05T15:16:15.940000
CVE-2024-21113,0,1,411587dffbfe770d177d8c0883d861ddd2f2043ed8343ef383b6912343263223,2025-03-18T14:15:38.140000
CVE-2024-21114,0,0,07d8f756ac7ff4cb872f6c813a5a0d19c87016a2d3ef9a6dfa1d48896f6845b9,2024-11-21T08:53:48.723000
CVE-2024-21115,0,0,c8b5f110fee1084e3e4bbd02d3f1664b03293a1da68e5246ef4334e81776ca1c,2024-12-05T15:16:18.327000
CVE-2024-21116,0,0,37f57d56f4a480d238dbb22920cc5d24d95c2d6d67c36c3cddb7272c00327923,2024-12-05T15:16:20.707000
@ -250143,7 +250144,7 @@ CVE-2024-21749,0,0,854c07ea14d44f1a6f258b4195b384ea52b627e1c7fb4eba6779b50701ad8
CVE-2024-2175,0,0,f23583a5f89b3c048c3a390c725234de0385c846391e27a731d22c7274e14129,2024-08-19T13:00:23.117000
CVE-2024-21750,0,0,34ac4bf556abed3b579ceb283a732cbafac6840724519bcf2f9521daaba609b5,2024-11-21T08:54:56.420000
CVE-2024-21751,0,0,37727b39c87b6c1a9e9b1b8c4a5a7fcb8c766a4a78fd465a68a305c6b49c5b57,2024-11-21T08:54:56.547000
CVE-2024-21752,0,1,b41317b4648baf91dd8a72a1931732fd9edddef7552ed76b1d7821ff0695a95c,2025-03-18T11:53:39.520000
CVE-2024-21752,0,0,b41317b4648baf91dd8a72a1931732fd9edddef7552ed76b1d7821ff0695a95c,2025-03-18T11:53:39.520000
CVE-2024-21753,0,0,45b065c6167769cb16d64a10ec6f37b04b38c9a33361a88b58e0222b96c5fb44,2024-09-25T18:36:45.307000
CVE-2024-21754,0,0,6726148c9c00979954f8e0e43980573889b19508b76c8b84b92cd601e38d1fce,2024-11-21T08:54:56.877000
CVE-2024-21755,0,0,3db688cacd77dd473c848be3e1117c1b29b56eeefd4b3b05f3fefc4fcada771b,2024-12-23T14:58:10.797000
@ -250152,6 +250153,7 @@ CVE-2024-21757,0,0,2977bcabeb1633cac10a5d2b68ce6f1b718f97760675ba593569c66c881c2
CVE-2024-21758,0,0,ad55d9c19835721bfd9ae203af7dd8f725eb80a82daed984b63908fd7c66e709,2025-02-18T22:15:10.317000
CVE-2024-21759,0,0,c7b87faa73119d13eeff29f1fcc441192710ec05905507e64f7a792b951b9ab6,2024-11-21T08:54:57.347000
CVE-2024-2176,0,0,1aeee7ae52b7f70f1b987c126ac25fd385f727623c97d4e6f5fec3aa0f1aa936,2024-12-19T20:23:37.707000
CVE-2024-21760,1,1,5bf0812dffd441322935e13797b30b53547dc7e04046b1be46dc81bb07bb7a33,2025-03-18T14:15:38.297000
CVE-2024-21761,0,0,82642bae2920dd7ff8b514e57bc1c1f5d6d71d9ec15a1b10f21b90ef60b69c46,2024-11-21T08:54:57.477000
CVE-2024-21762,0,0,46f8e56aa266e45cbb4ef8c12ef0ba4149aa340cd2149bb68f1bc655d5d263af,2024-11-29T15:23:32.167000
CVE-2024-21763,0,0,5aa1c67876a3611f6d45b29da83d05776ea7bdb28478c851cf0e3e3d1d0a0b00,2024-12-12T19:12:18.580000
@ -251685,7 +251687,7 @@ CVE-2024-23782,0,0,c911c68bede1e979645b4c4cd33b7976d93900d1c38c4a770496a15f35fa8
CVE-2024-23783,0,0,3fa853eaf8b1055bdba72d2ea33e9c04fa8b0c3f0b50310fa2ab86ce2a523288,2024-11-21T08:58:23.570000
CVE-2024-23784,0,0,fbb08b4f0a06140ba3336bcd5ca10e9f46eba5802513fb502c644b9cd1ce9f5c,2024-11-21T08:58:23.717000
CVE-2024-23785,0,0,69098fe97dc1e2e17c091ef031f069829d6e9d34880e18423c024bf6d8297afb,2024-11-21T08:58:23.857000
CVE-2024-23786,0,0,a322be34f5f40052b238177f89944db1eaac600cbfa145099e1d8ae5dcd93c7d,2024-11-21T08:58:24.090000
CVE-2024-23786,0,1,9b17729227428fd4f10a45c71207334db1786e3f72acd0de4b6b69c1fed63828,2025-03-18T14:15:38.450000
CVE-2024-23787,0,0,029004547be72f5abdeaa1081c2db892ce33ae9fa873b72d24ff48254b202124,2024-11-25T18:54:34.530000
CVE-2024-23788,0,0,6560a1aa3a129015b4a3affeba177920091f2bc65e89a77b92a05faa90249853,2024-12-13T17:32:04.810000
CVE-2024-23789,0,0,bfb78a7de0bc7e7925bb84311505f5172d598e532ae0da2c006f3536a9f5dacf,2024-11-21T08:58:25.217000
@ -251844,8 +251846,8 @@ CVE-2024-23938,0,0,5569f095c88d3edc91da7b05d4b47aad5d8c07d6eab7699149a618af2c5b0
CVE-2024-2394,0,0,ddcb12447d50a725981acd1252ac2e6f9236d64850dd4bb1a3a73b4edbe397ae,2025-02-26T16:21:37.120000
CVE-2024-23940,0,0,06d04c2e3a7f29a0e7a62a5331ae3d9d5c7acce3a81c480978850a16e4f0b74a,2024-11-21T08:58:43.807000
CVE-2024-23941,0,0,377e40ad54a332b818df016f5e6db38286f42aa52aa09ea13a642fb9c9a22ca1,2024-11-21T08:58:43.940000
CVE-2024-23942,1,1,b8b7a23af4a9c98af1108069667a31130c84842a8fcb9e546c0dc8f6de5a3e93,2025-03-18T11:15:38.777000
CVE-2024-23943,1,1,602551addfaf9449d22eafb915e2f6ab0ff3b2123ab4dc6ea23f9b224b0664d7,2025-03-18T11:15:39.090000
CVE-2024-23942,0,0,b8b7a23af4a9c98af1108069667a31130c84842a8fcb9e546c0dc8f6de5a3e93,2025-03-18T11:15:38.777000
CVE-2024-23943,0,0,602551addfaf9449d22eafb915e2f6ab0ff3b2123ab4dc6ea23f9b224b0664d7,2025-03-18T11:15:39.090000
CVE-2024-23944,0,0,d1f7d065765e5643c2171d654a3fe7a15ded2542e5ae0ba9d07c168a5a5837bf,2025-02-13T18:17:05.470000
CVE-2024-23945,0,0,0e48186ccb42f1ffb7728a08d36dafb5b233965e5e36ffdb7b0875fe5f7c17ad,2025-02-18T22:15:10.600000
CVE-2024-23946,0,0,9c898cf09e521a2a31019dd3080db79ce9c32f7697e5321cb7301cafff4ddf89,2024-11-21T08:58:44.260000
@ -252362,7 +252364,7 @@ CVE-2024-24831,0,0,79b53e3f2f08a9fcc2402c1ea185326b8812ae4c17ad199e9ba39e8d04543
CVE-2024-24832,0,0,785e2e692844876097d5d0266121b6c22b06e57908a170a654e785da1f3b18b9,2025-02-04T20:58:05.637000
CVE-2024-24833,0,0,0b569d5f030fc8d02fc4bcbaf8e65596ac662168b819175c4ff05ff2c74c4386,2025-01-08T17:14:47.103000
CVE-2024-24834,0,0,2b55d088597fc3ebc5386acef715e319fba0648d90a9c27dfb74125fc7cf22eb,2024-11-21T08:59:49.053000
CVE-2024-24835,0,1,7b3f8232aba032051f60d0f3e962cf9a4ea465f4c4e03b757da7b5787e1829a4,2025-03-18T11:37:45.627000
CVE-2024-24835,0,0,7b3f8232aba032051f60d0f3e962cf9a4ea465f4c4e03b757da7b5787e1829a4,2025-03-18T11:37:45.627000
CVE-2024-24836,0,0,0468b6ec04583463bff3590023f79b4c3fdc144c9a581e1e17284b820318e242,2024-11-21T08:59:49.317000
CVE-2024-24837,0,0,7ad01e4d66bd18540fc4a1df9e3655e1c4a199a45b0859636572272be2977ddb,2024-11-21T08:59:49.447000
CVE-2024-24838,0,0,8e4d815e4da317a92180027f298a62e47e86b6f757666b5c0dfaf2710c513fa3,2024-11-21T08:59:49.593000
@ -254882,7 +254884,7 @@ CVE-2024-27949,0,0,7571c2eec4740781a9a2f5965e4f7152dcfbce473dbe8ae2485667fe0e9eb
CVE-2024-2795,0,0,cbb3083cd20608539cd31cee2da48aa63acf65d8b787a018dc03ebe3f26d6f51,2024-11-21T09:10:32.120000
CVE-2024-27950,0,0,53da77641072875e4be7a331920e4e65f0eff4f0d2cd1d57778fc38818e7c955,2024-11-21T09:05:29.223000
CVE-2024-27951,0,0,4d2ba26a6032e03de2aff525cd262e98565b7fc7badd9cb2f91868dd9835e904,2025-02-07T16:59:17.713000
CVE-2024-27952,0,1,751dabf6626a70900a15dc7860b75fb42752dc8fc505629059435a1fdee508ea,2025-03-18T11:07:04.300000
CVE-2024-27952,0,0,751dabf6626a70900a15dc7860b75fb42752dc8fc505629059435a1fdee508ea,2025-03-18T11:07:04.300000
CVE-2024-27953,0,0,c5d16c193543fca46282ab3c8cd23ba2c5868bd65b0e219f002c47b9928a9bbd,2024-11-21T09:05:29.663000
CVE-2024-27954,0,0,868051cf140aca79ae18199226f95ebe38588b4710d77e4adca2895e0f6050b2,2024-11-21T09:05:29.807000
CVE-2024-27955,0,0,68f1b654e856ea89e2c3920d06b20f4b15b70ed46da32e67660258ac4409cc1b,2024-11-21T09:05:29.957000
@ -254995,7 +254997,7 @@ CVE-2024-28065,0,0,29c965c618b196a2a981aebc47585c814c9fb99e0a8627060db88187d466b
CVE-2024-28066,0,0,d0dd8700e3d67194ced6e44b8a1aa15edc2e5058e4dc671b0d3ef7a28fb38999,2024-11-21T09:05:44.270000
CVE-2024-28067,0,0,3565fd0ada2e0c321bb115af4a670e45b532df6130e88a302b617be4c5f9f12f,2024-11-21T09:05:44.517000
CVE-2024-28068,0,0,4ad18e3fac7a71a575f477d531a4c0047d3a9eba63b8ba6967e711d0116faaae,2024-11-21T09:05:44.713000
CVE-2024-28069,0,0,d642acf4387334ccc7ddc0fefc11a659d84d992af74df5733fb79a2023dc48aa,2024-11-21T09:05:44.903000
CVE-2024-28069,0,1,efb0a27d12fc8c409138d4cb99523efd1ff8eff144f8315bf517a3e7f24c3984,2025-03-18T14:15:38.693000
CVE-2024-2807,0,0,d5df072d14c63a150df30c06942ef8b1a4196e073cd023f9b3c41b08dcfaef61,2024-11-21T09:10:34.117000
CVE-2024-28070,0,0,636e2a0fb0d0c0f843795bd2fc360a9b786d38874ab72d393604ed9b95733d95,2024-11-21T09:05:45.067000
CVE-2024-28072,0,0,4c08f86186600b9b3288b9e0c28e7c3bbf121b9a165ab22ed55189c2b2697fdf,2025-02-25T17:12:45.987000
@ -255728,7 +255730,7 @@ CVE-2024-29113,0,0,19f739df1e3ffd99c17ee5134c1916be038e1d6ab800d9edd222b9c315a4e
CVE-2024-29114,0,0,99f225b963c90ecffa853266e83fb15bb853d6b76b2d94ce806d76cd9c3001de,2025-03-12T14:27:28.637000
CVE-2024-29115,0,0,1adaa965c7fdbdcaea4d6c977d75e4c572bbddffd3cad1334aee32788318bda0,2025-02-07T17:21:05.720000
CVE-2024-29116,0,0,26937c2303a397b0e754f86089c4e82794a9c01028d4fbb39ff77bb5a452c1e2,2024-11-21T09:07:35.393000
CVE-2024-29117,0,1,378efc3eed009982f9306687c76babb39f8ff6381283278b008e12d0df4c7a03,2025-03-18T11:54:32.273000
CVE-2024-29117,0,0,378efc3eed009982f9306687c76babb39f8ff6381283278b008e12d0df4c7a03,2025-03-18T11:54:32.273000
CVE-2024-29118,0,0,53699996adc37bf116f2e52d3369de9629ce479b5ba3d2e23b9e661ea562289d,2024-11-21T09:07:35.673000
CVE-2024-29119,0,0,3e47302e9e5c8f054b0ee0d042cd0bc0fe30b4364065a6dc24b1ebc8e9381bf0,2024-11-15T22:50:03.257000
CVE-2024-2912,0,0,37e835e5c308fa0aa260f2c273bc0161a037279353c9b0757bd2ac8975389355,2024-11-21T09:10:49.283000
@ -256221,7 +256223,7 @@ CVE-2024-29924,0,0,87db3b1eae3eb35152f68099374a0e872521a82a8e807d284e44cf4cc7045
CVE-2024-29925,0,0,9f6f6bdb0aca7932365f9103015a6a17d3f538ddfd9757873407ebac9569a669,2025-03-10T16:12:06.027000
CVE-2024-29926,0,0,8512e864b6381f2f50156ef75c9e441435b4f2442a0f43c3157889780e88cdee,2024-11-21T09:08:38.053000
CVE-2024-29927,0,0,b05c91b5a51ff0462c21cea7bf9fa4d2ff4eb7231a790e54cdf56b9b255b7c09,2024-11-21T09:08:38.187000
CVE-2024-29928,0,1,c62f5222b2d74d45f1365ec96af19b9a66ced9d160a0323e02d9cd8f7ed96939,2025-03-18T11:33:47.187000
CVE-2024-29928,0,0,c62f5222b2d74d45f1365ec96af19b9a66ced9d160a0323e02d9cd8f7ed96939,2025-03-18T11:33:47.187000
CVE-2024-29929,0,0,f91bd0d65bfbafabbfd1e47fc42f253445f71d47c1a395703c4c93c760349825,2024-11-21T09:08:38.430000
CVE-2024-2993,0,0,ca085be1f41ce1cdb604449d670421536b9009a843dba261ec4149fee50495e0,2025-01-15T18:21:04.553000
CVE-2024-29930,0,0,9749f3c46d5ed598350d72b277cf5b80576c9e694bfca9cc9de48ba3f3758cda,2024-11-21T09:08:38.547000
@ -256844,7 +256846,7 @@ CVE-2024-30544,0,0,000812eb578004fba324ad62ebd495504e2212c19a4b0b0e0a7882f2e09d5
CVE-2024-30545,0,0,9fc1519b1df9cef49e003c31844226b87a8a0876e6364f49bd01371911facd15,2024-11-21T09:12:08.943000
CVE-2024-30546,0,0,682d8bf45e6a08218a5a3a2da6b1491ce652cde21b3fc1369e6ec13bc346b6de,2024-11-21T09:12:09.073000
CVE-2024-30548,0,0,f693c6a877ff0dcdf6fe4ef2a958123b8947204e837af80130e7a6521588b872,2024-11-21T09:12:09.200000
CVE-2024-30549,0,1,e0aaef9d1124e68820ae2a631987df8341a68ae1335bb73b4b302dacd497888f,2025-03-18T11:33:13.290000
CVE-2024-30549,0,0,e0aaef9d1124e68820ae2a631987df8341a68ae1335bb73b4b302dacd497888f,2025-03-18T11:33:13.290000
CVE-2024-3055,0,0,80848d3ebe6c9d2dc11053b924adec8e053b2e76ed033beed24a77e64207f08e,2025-01-30T16:11:40.940000
CVE-2024-30550,0,0,b1012a09324820a2f5d1c5129a5f2c426e3a5ba9be88ba49aab751fbaf16a1e5,2024-11-21T09:12:09.457000
CVE-2024-30551,0,0,1e6b51a7a6c6332aac1197822ceff35a8c0ec56590e5297f09a269ea4cdb1fbc,2024-11-21T09:12:09.580000
@ -257660,7 +257662,7 @@ CVE-2024-3170,0,0,596b407001ba195a8504d94c79f88526c2eece1c3e7d3022e47196ebfd910e
CVE-2024-31705,0,0,21247aa945114616d9153c9180448ea2a0d6f5ce37586d25ca792bc45b7033bd,2024-11-21T09:13:49.640000
CVE-2024-3171,0,0,108508cc36c17f228cb917c4d635ba896d2a5833ac43ebb73307bfb04cf1f223,2024-11-21T09:29:04.030000
CVE-2024-31714,0,0,c0c6c7dc373b518d20be2543032a1d9a7a5244f08d272e125525335f6445b03a,2024-11-21T09:13:49.853000
CVE-2024-3172,0,0,c1460d40cc9eea526b6df59e9edd0f9182f07455da127b2ba1ce98ea539ab234,2024-11-21T09:29:04.223000
CVE-2024-3172,0,1,dde72649434996b3abc723061a7ec4be1a77c166c4b1e520c485e0c7af55195d,2025-03-18T14:15:39.083000
CVE-2024-3173,0,0,66654af0a9b3693e714ed54dab6b753d23bb29503cbcc422c776834c0881735a,2024-11-21T09:29:04.353000
CVE-2024-3174,0,0,01b42bbeb78c5debdb12591a172fa4a735cab4eecdab161d70a702f00cb1c20f,2024-11-21T09:29:04.553000
CVE-2024-31741,0,0,6f9f2f7a1a9d031b20435c4525b96bae952709f51b2ddf9cec9e16a72c5cc2ab,2024-11-21T09:13:50.067000
@ -259080,7 +259082,7 @@ CVE-2024-33598,0,0,d18b88b92de282a6e298e97b6b8298eb03639e013519623be4c3a6ce12426
CVE-2024-33599,0,0,7562b04f66c6d54d64426cb393ec1c5ece9c8a879f7afa7f5dac99b57a77072d,2025-02-13T18:18:03.513000
CVE-2024-3360,0,0,cc6d76ae5db0ce9bab65b748413469a70f295699df8c796e1ea5796d4203b12e,2025-02-10T23:10:22.100000
CVE-2024-33600,0,0,e7823dcd14d5bdee96702b4a26e8a35b47f7712e7aac9f5d7aaf271585ac0d3b,2025-02-13T18:18:03.643000
CVE-2024-33601,0,0,52eea2a235b9d6ab4f411c5b985e9ac6eee2f6b4710c12580c23463499fb4aa3,2025-02-21T17:15:12.100000
CVE-2024-33601,0,1,12ad9e6fcf3b3b809eafc59904f4de659a65110943d6a70c17288cb40c56d749,2025-03-18T14:15:38.867000
CVE-2024-33602,0,0,a9e22864890268ec8ff59de2c91d6473b5de5b495cf2c7b4e8c59156a6a79698,2025-02-13T18:18:03.950000
CVE-2024-33603,0,0,aab47ae0f47b94871d557c2edba07334d57457a2f8cbeb3e6bc397cd050c8cc5,2024-11-21T09:17:14.493000
CVE-2024-33604,0,0,b3da24552fb32841e75513561ad454f118005aa176ebb44510170968fd4ffa39,2024-11-21T09:17:14.630000
@ -259471,7 +259473,7 @@ CVE-2024-34087,0,0,ad0eecbb0612f719db7e23c85ea2351d6bc1b74c0c7f2f45f413d40049f7b
CVE-2024-34088,0,0,29ed9bff3f7a8aac8372db6383813d7ff3a9c10604e1b9decbbfa535edc1d6bc,2024-11-21T09:18:04.130000
CVE-2024-34089,0,0,e3ae5d593727aa9f206992806888f8b4a259e5a9864ac8d8f3c293e89b791320,2024-11-21T09:18:04.370000
CVE-2024-34090,0,0,31102a35767023992cf7abe1dae1bacab87f9368efd50ab8a275c9015b8dc10b,2024-11-21T09:18:04.523000
CVE-2024-34091,0,0,3769ba6d54384558d77e36358ef3bba573b8494db22e5f01d29af2b7cfccabee,2024-11-21T09:18:04.670000
CVE-2024-34091,0,1,519e69cce22b8c1316311fb4d4cc72759f50566992d370704c56d265bc32e1e8,2025-03-18T14:54:25.830000
CVE-2024-34092,0,0,0ba3d8ee6d8ef468c315a26baac7305fb679ceec5f971590e1392c655be9203a,2024-11-21T09:18:04.823000
CVE-2024-34093,0,0,0044f6cc121a6c9932833585ba18469e879c95b0ba2c45398dfb0161e5fcde00,2024-11-21T09:18:04.953000
CVE-2024-34094,0,0,78482e61bb057c4647bccd2a377fb3babc1863668db96b03b61e65a54b85b0db,2024-12-02T21:22:17.230000
@ -264444,7 +264446,7 @@ CVE-2024-4056,0,0,d578d896482bad42a689f24bb727d093d89b4e4ad9a16137115268e371c355
CVE-2024-40560,0,0,4df2ceb4f41adf8cf666410bb966237766648fac71bacffbfa433d4c66c2109b,2024-11-21T09:31:19.433000
CVE-2024-40568,0,0,c12c8f080192deabb173a3181ef7b218c84c4523adbfc6eb7f73c288b6931903,2024-09-20T12:30:17.483000
CVE-2024-4057,0,0,a8ad6ccfc0806ad96a1cb2ac3bade2f19ae5a39ef55d50ae8d2c9b80f3c0a3fc,2024-11-21T09:42:06.090000
CVE-2024-40575,0,0,a8f75e8e17d1ca3c5cff90298c3440e183032e028e89b6cd5ddda7707efd73e5,2024-11-21T09:31:19.820000
CVE-2024-40575,0,1,8f8f60ae0654b2cb189f518e1a74f4f9151a1448954bee799fbc3bd704a3ffa6,2025-03-18T14:15:39.260000
CVE-2024-40576,0,0,8cfb8bd5f4a4277303f3ae5754ca38f6c2227922febe0cad08d341d6250d63a0,2024-11-21T09:31:19.970000
CVE-2024-40579,0,0,da11a1c0f7825d9658796f4408f8973703e2e8887ee02d7fb06e9fa156da18dd,2024-11-15T19:35:07.323000
CVE-2024-4058,0,0,320f03165657b376b0f731f9e1bae79a3d28f3ea9d5ed14ae2ced412f995a064,2025-03-14T15:15:44.400000
@ -264622,11 +264624,11 @@ CVE-2024-40785,0,0,e7608cb4e789b0d57c87d46824a61398005e9bfcbb488fcf872b55b20c6fc
CVE-2024-40786,0,0,be7513464307331b0f21d95b97bef5d1d4b3b9ee1591c2069c1d9ce282f49c20,2024-11-21T09:31:37.657000
CVE-2024-40787,0,0,ff74f1131bab9fe9382a9a7c925dfc41da9f84275eff94b172d96b4b7683c6dd,2025-03-13T19:15:45.973000
CVE-2024-40788,0,0,74fefda30f0aab4e09f30ade87f11c85de3de9a6b1f0932eeb0d9ad4ea247f18,2024-11-21T09:31:37.927000
CVE-2024-40789,0,0,09922067eab122d58f2041478004e6ceb9a6e92293c6b9c2846852ea928f88b1,2024-11-21T09:31:38.157000
CVE-2024-40789,0,1,5a1885ade6f38c7b1421a592f3c0fe5196df044653ca548723a01f9980a37f3a,2025-03-18T14:15:39.473000
CVE-2024-4079,0,0,d013459ffe1c358bbcd1714666185ba7ca2c58f58c35e2f334f09e957ec7acbf,2024-11-21T09:42:09.197000
CVE-2024-40790,0,0,d7d54daabba8d3f137709427c636b535799803d2811813d32fd0485b74b32f47,2024-09-23T22:55:36.537000
CVE-2024-40791,0,0,61e585f5c7e9e7a003c2692a4c8aea66b3ee7f0772ae5577a1ff0301d3e7d423,2024-09-24T15:44:24.397000
CVE-2024-40792,0,0,0f479bdbfe1e90d04903650eb8df12de4ee4867b141b46a2b1e465bf58a267c6,2024-10-30T16:35:18.823000
CVE-2024-40792,0,1,400b069248cc8e9a30005addff3f79008090c1530afbf824d829a23243885942,2025-03-18T14:15:39.723000
CVE-2024-40793,0,0,8e8c7f5f0283a5dfa91b2c2375ff0a12e95b20686971bdae8a146cfd87e7ca01,2025-03-14T16:15:33.573000
CVE-2024-40794,0,0,1c884dad1bfb64c4327882aaba41854cdcb1933185fad999593f033dbaf2fcc3,2025-03-14T19:15:46.877000
CVE-2024-40795,0,0,054a23cd21201389beb5d30170b0d11407f666b940f4c135b0ceb5b20c8a9212,2024-11-21T09:31:38.810000
@ -265531,7 +265533,7 @@ CVE-2024-41971,0,0,668696cf9bc6f97dc564ddb2c3e45d63d066756411ea26f564fd9a1237b11
CVE-2024-41972,0,0,c459471151fc935a231b96b6afcfc6a69eba9b082b5fb25895b45b1b59391a2e,2025-02-03T18:15:34.740000
CVE-2024-41973,0,0,dc9d64c3e6dfe723790f5a90a004f72267aa8f02bf1b1695a1611a0101ebbdbe,2025-02-03T18:15:34.957000
CVE-2024-41974,0,0,25b72947bf98e5166cff2bb22cc778f589bed5c7a3ddc111764330188f4906ec,2025-02-03T18:15:35.163000
CVE-2024-41975,1,1,eed825352ad264dc6fd1064ead32010512a974bbd6d64dd3e64013788bc11967,2025-03-18T11:15:39.247000
CVE-2024-41975,0,0,eed825352ad264dc6fd1064ead32010512a974bbd6d64dd3e64013788bc11967,2025-03-18T11:15:39.247000
CVE-2024-41976,0,0,f8b19c02d108c2efe1d1ed401da5afe56ace8fd66d8eeddc91dea5ff2017c891,2024-08-23T18:40:16.173000
CVE-2024-41977,0,0,e19ff7a98e8eabdef3aae087b2686fed5e6936d4bc074b253e276f488c80402e,2024-08-23T18:39:13.990000
CVE-2024-41978,0,0,723389e61d01e198249e5575d29386b8bd5defd3fd47f1e14f8d09063bbeea65,2024-08-23T18:34:36.283000
@ -267018,13 +267020,13 @@ CVE-2024-43760,0,0,0699b036c3a09290ea9d3ac93f3f512789df4a5bccdc81b41420a254e0401
CVE-2024-43762,0,0,b8dfe10bc41a54941c91e23f33f7c446be6ae8c1200d07b09e86c0c499c65832,2025-01-03T22:15:07.640000
CVE-2024-43763,0,0,3de4617186aced8f7b3d48e3a710fa14a6fbbe2a4553f4d993ab1ba76d0b7f88,2025-03-17T17:15:29.567000
CVE-2024-43764,0,0,b8a70c9b4bf3da07474f063814c421df50a0a0e7358525550868f9c97beac2b0,2025-01-03T22:15:07.783000
CVE-2024-43765,0,0,0014a167ec18be31477f920e29d11f99a65e237b3783e3ef37ec168ee876e0b5,2025-02-18T20:15:18.873000
CVE-2024-43765,0,1,e4250b40f4dc95af7fc01ebf26e3930da768b2af1b961aea947f144984b764a8,2025-03-18T14:15:39.920000
CVE-2024-43767,0,0,ea82ffa7edbe86b0487005b635a9495ff275642644aff14bb80ea65b81b8feec,2025-02-18T22:15:11.020000
CVE-2024-43768,0,0,d63d3ffccaf584eee421ee122021fb0ca8d78148254dd26c8ab21528b275e51d,2025-01-03T23:15:06.767000
CVE-2024-43769,0,0,2589038c48c31a391cd992614c4f3cec964d236c9a07eb46302073ef1c3a63da,2025-03-13T15:15:47.617000
CVE-2024-4377,0,0,9e469d2c6e38c9024d3118d881da3bdecf42eee078f84183253e0517e0cefe8c,2024-11-21T09:42:43.760000
CVE-2024-43770,0,0,f01b43d491e44ad66b34234f220434dd71c1e3e43453bafc93ae111fc58bf574,2025-02-18T20:15:18.960000
CVE-2024-43771,0,0,ce3fb2ac81dbbd5a60c46b9a065a33126ec30db676ce372723a5045ddc3e26c4,2025-02-18T20:15:19.043000
CVE-2024-43771,0,1,a4e7cb77edf20f08130c4e5aa48e2f2017a283a33ff6368994d069da352537ab,2025-03-18T14:15:40.117000
CVE-2024-43772,0,0,1ec9a5f39a4ef31a76fb428e7b3fe8d8c7cda3e7616b1dfc52864acd3e1bbbdb,2024-09-04T12:11:13.073000
CVE-2024-43773,0,0,2ee2804dd1e6aeea0733948db3d41a2e2f68fd10b6eded825d34c62d3248e740,2024-09-04T12:26:08.270000
CVE-2024-43774,0,0,dc2b3ecb213be315188d094eacf95425288510151e247e800354d794585eef91,2024-09-04T12:26:42.387000
@ -267407,7 +267409,7 @@ CVE-2024-44146,0,0,9fc3cf91a523a17011d8ddc92710ccca41ad98f894b85050d976b55965940
CVE-2024-44147,0,0,0010b4e6f55ac982db2f0d22f0bf5765f6a7a167f9f9e0d3c647be24e3c70846,2024-12-12T15:04:03.623000
CVE-2024-44148,0,0,335338cc9709ff206063b9ab9c7d9114b0044f4fd6d0a94bd7c6bf382ee12cf9,2025-03-14T17:15:46.850000
CVE-2024-44149,0,0,6eeeb205f0113be4e2296a27ada921710ab4d7c81a3e95e9aa805acec5d12597,2024-09-24T15:58:38.770000
CVE-2024-44151,0,0,d47615a8526957c995af9749974971566bdfea864db32edef160569f5c47dcf0,2024-09-24T16:21:05.280000
CVE-2024-44151,0,1,3adb3cc493ef9fc3cca2cec3a09f77a8995ed8befc9b50d495377265c5c0fed5,2025-03-18T14:15:40.260000
CVE-2024-44152,0,0,7550f779a958464ffd932d586cb89d009c0ca7eab9087769b3575744cdc01796,2024-09-24T15:55:06.100000
CVE-2024-44153,0,0,82097411ba307b5977c3f59bb78c96925324f15ed043a95bad15fc0eb0059c7f,2024-09-24T16:19:32.593000
CVE-2024-44154,0,0,8eadcc80f1753ce98600c5eb27ec23345023d248570d997f1192f7f23aac15e0,2024-09-24T16:16:39.947000
@ -268021,7 +268023,7 @@ CVE-2024-45177,0,0,02e142914736a4d131e4e16ca54722d87db4be6796c690673dca68516f304
CVE-2024-45178,0,0,8683dd9a5cab4c34e39db0f407397a6453188323835c56f9f445f0b82747621c,2024-11-21T09:37:25.490000
CVE-2024-45179,0,0,f8a1e2d319c21f7b4d285e70a197aede9c3922e9add55bf81285495cf99880f9,2024-11-21T09:37:25.703000
CVE-2024-4518,0,0,07158500cac1dd7872433e30649263fdac5b4c1a9d1b0e56782e807a24814381,2025-02-19T18:00:39.067000
CVE-2024-45180,0,0,e25190523b6cc0290f39680e23c27065d57129d38d1a2d45683d50e8b98b8bd5,2024-09-13T19:55:54.477000
CVE-2024-45180,0,1,21b07801d36cc3d756204c3207b5af3e7b329356676c352984cb9362561c3bbb,2025-03-18T14:15:40.437000
CVE-2024-45181,0,0,d85fe8450b776dd12e0896d567762d1e44709075751ae449df1ef8eef94490fd,2024-09-18T20:26:26.873000
CVE-2024-45182,0,0,744b0118419398ffc2eda737132cfe2e67a6694bc69f7527796471f039572fdd,2024-10-29T21:35:21.720000
CVE-2024-45184,0,0,5fe4e4003083a04b0eeb7a50ac75543168b7fbcd018d5a6c487cac1cdc809531,2024-11-06T17:35:34.223000
@ -268840,7 +268842,7 @@ CVE-2024-46571,0,0,d2aefd540d7a3f69a6c63893a70408e771411a89c3ea4f3a40ecac30e52b1
CVE-2024-4658,0,0,8e8551e2dad8544932822e63f34e98151cdfa3d6ca2a97c2637382b0eddb6d52,2024-10-15T12:58:51.050000
CVE-2024-46580,0,0,57ce23079d22c520f558cf33d89b6b4b97b97ee6fc7acbd2cbcf182fb2bd3f83,2025-03-14T15:15:42.990000
CVE-2024-46581,0,0,5462b101fb440bc501a98cc921603a2137f1839db74d9038e8e4ca66f70ebf73,2024-09-24T16:41:36.533000
CVE-2024-46582,0,0,1b8144bd030454843ac8c6a6ad66282bbf8e59b632d02a0e7a976a686d4f89f8,2024-09-24T16:41:29.377000
CVE-2024-46582,0,1,866617c11a3fc07efe3a2534ae130fa8c5d8346f75b270945cef757d5c5a133b,2025-03-18T14:15:40.643000
CVE-2024-46583,0,0,cf382f8da6cf6ab76f4c4d49ea272d0b3efa763944ca8b322f6d82dbef52da5f,2024-09-24T16:40:48.437000
CVE-2024-46584,0,0,08f29613e1e223adeeb5f6aff9b13cd88155533380249640b96e771274344e9f,2025-03-14T16:15:36.087000
CVE-2024-46585,0,0,dc7ee54543f1dde85b7ec955c3e56c63aab70e8f4e8f2066fc5d9912f9a62f8c,2025-03-17T15:15:41.990000
@ -275089,7 +275091,7 @@ CVE-2024-55268,0,0,5f3c37cf8158a1c44928734f909dc42c1030ecc39541485d8d944019f4ad5
CVE-2024-5527,0,0,d332540fc72a82323997817d4e967456b7cfd92130ba717f37312bb67a51dc8a,2024-08-16T20:24:34.470000
CVE-2024-55272,0,0,6e108f0e2cf675b62abdd4438f3d6786bca417f797f9b02de67c6172540f9241,2025-03-15T16:15:13.813000
CVE-2024-5528,0,0,f6c42b7e3780f6a788afad957fbc4af53b8e35d036bf5498b6d14206ce32a452,2025-02-05T20:15:45.090000
CVE-2024-5529,0,0,163a9ebbb03299028cfce2ba2a1351447eb53d5a4fc9810f5fc56b6d374bb7d9,2024-11-21T09:47:52.530000
CVE-2024-5529,0,1,095ee1b4a7c2e06520a57f410df528bd70394e4035579229461d97ba32a6aca4,2025-03-18T14:15:41.210000
CVE-2024-5530,0,0,2d0b01cc83bfe8893d941d6bfdb13cbbc2a5c286addf6d9a79089f227ed325e3,2024-11-21T09:47:52.657000
CVE-2024-5531,0,0,866202d58b8a007888ee981e0536a62604559a6a86161db07d9686c5885862fa,2024-11-21T09:47:52.777000
CVE-2024-5532,0,0,23c4978c8c684edaa8b0b6827b3bbdb5dca4d9ba0bc473042cb29ea594ed00d8,2024-10-29T14:34:50.257000
@ -275604,7 +275606,7 @@ CVE-2024-5631,0,0,1180039d5b51b355c10882902757c5bad7937e7ec31e81b99a019ddedc7954
CVE-2024-56310,0,0,a3b0ecf50e8c7209a61a57095969ecfd6c116faafd65e192eb51abe661a5112b,2025-01-14T17:15:18.487000
CVE-2024-56311,0,0,a5f3b806b958921d1fdd47ae934460856fc391070c28ff5582bd271a9abc04fa,2025-03-13T19:15:48.973000
CVE-2024-56312,0,0,a105d2d2c496ae4a31974572451f1a2391cb63512239c561ea05256145cfc002,2025-01-14T17:15:19.057000
CVE-2024-56313,0,0,5f9fbb8f2eda640c1b051bfdc491a6a52b895e91ada0d44715e60ffa8a2b7b44,2025-01-14T17:15:19.187000
CVE-2024-56313,0,1,1b88794497f6eabc0004fec8ac6a8d185d6145923adb3ec2e2c9ede1c7b79c65,2025-03-18T14:15:40.837000
CVE-2024-56314,0,0,2ec81e76657f1aae1b2ad4a137a9dbaba36a59900a9638d6a55212d105f32134,2025-03-17T17:15:34.553000
CVE-2024-56316,0,0,cbe94587bc0fb5b8589f39655433a6e6725350771ffdee3bdca651a1d62b333a,2025-01-28T20:15:51.320000
CVE-2024-56317,0,0,8d6cb761ec1de8db3f8894652188d82bc1e600feec839db7f7746cdf2c5b129d,2025-01-02T20:16:06.723000
@ -276114,7 +276116,7 @@ CVE-2024-57011,0,0,00d9ca4de5bb838925ec85abe37499c50478611ba15145e710280c1c3635e
CVE-2024-57012,0,0,d12240ef1721114c58f109c402370244e27f23301561d4b425a46b9b4be84383,2025-03-14T16:15:37.603000
CVE-2024-57013,0,0,6e08c562bc43fbe99d8ca48ade9028273e79bb54bf7163d05964ffad7c768b3e,2025-03-13T15:15:49.867000
CVE-2024-57014,0,0,de4aa7a9315f76bdfcffe2092ed70c917442fbca43db8473f76cf25db406bb89,2025-03-10T17:22:31.577000
CVE-2024-57015,0,0,5e4e1bb49198f36a4dd84b451778f8aef129d4b4f841c347f59c5c6393f2c764,2025-03-10T17:22:42.443000
CVE-2024-57015,0,1,559c1f41db4b07569fd8f34461ee4cc0ab9cf8abb8f4d26444e2fdab359ec49f,2025-03-18T14:15:41.020000
CVE-2024-57016,0,0,850796e338f48f156536ab37f7c45119c2b091d349009a63d7b83d5a0edc22f7,2025-03-10T17:23:48.830000
CVE-2024-57017,0,0,54624e242a7ea72e546dbcbe3522ad91dfa297cefabac8b613307955396e3be0,2025-03-13T15:15:50.090000
CVE-2024-57018,0,0,88513ced169b42c06a35f5f3dad8af71ece115206cec42a161e21a49cc4393f2,2025-03-13T15:15:50.280000
@ -279567,6 +279569,7 @@ CVE-2024-8992,0,0,40a7a4df2932aada5d7ea8c618dc82aaa0081f2be58f5119fc917cca09bcb2
CVE-2024-8993,0,0,487588ac277153038a2522d3764ca3b3260ed861cecc57e6ed018cb6e09dc0f5,2024-12-26T17:15:08.387000
CVE-2024-8994,0,0,7eca867f48fcdffebd158a97c0fe53b92cc08cdc8d3d21178ec4fe0fdfa0f86b,2024-12-26T17:15:08.500000
CVE-2024-8996,0,0,cd0b990817d2076a00b5e7fddb7f69f718917b5a243671e20171ba3b0c170ebd,2024-10-01T19:16:02.793000
CVE-2024-8997,1,1,00b0461a23030a123156b2802fc43242a67f87ebc4d8d4708eeaf4fcf436f742,2025-03-18T14:15:41.400000
CVE-2024-9001,0,0,5445fb18419bcdf5da336d1b9dfc0c76a605d0071a53e5a9fa7d6b57bf4501c5,2024-09-24T16:14:30.190000
CVE-2024-9002,0,0,07bab80a5647df4577409503b6679799b5fed9b76f517f2c308405ac5c2a7ffe,2024-10-15T12:58:51.050000
CVE-2024-9003,0,0,675933072dcb8d03bba7ba12042ea7e3d3a6b4bf04af01f6a5d3444f949fe1cf,2024-09-25T17:18:44.523000
@ -280829,7 +280832,7 @@ CVE-2025-0689,0,0,f314d6c2840b37457f705a7bff5e9e063d6f291c45731360c8a19dc4638c43
CVE-2025-0690,0,0,bbbcb650d9130b5dd35bdfc4d8287eb5fdbb2a723c8cda9af36e91d7165433a0,2025-03-05T21:15:19.603000
CVE-2025-0692,0,0,3bbfd4bed044f796cd2d07e43de15285d842507b5abe7025f2d75e37bd86b43b,2025-02-19T22:15:23.433000
CVE-2025-0693,0,0,eb9b33dbce1f9879430fb8ae34fc689989eda5748b42d3c57f89b331c8c0f5eb,2025-01-23T22:15:15.397000
CVE-2025-0694,1,1,0ebe346a768e84281ec739137f12b69557526a2995b9e16a5df0c6282776dd55,2025-03-18T11:15:39.400000
CVE-2025-0694,0,0,0ebe346a768e84281ec739137f12b69557526a2995b9e16a5df0c6282776dd55,2025-03-18T11:15:39.400000
CVE-2025-0695,0,0,5a6f397a6b64075e37b58670bef347904c3201da024fb297d91e9e2cec2630c8,2025-01-27T11:15:11.087000
CVE-2025-0696,0,0,8bb1aa81d5469057848d400dac8fd3ed60fd05dfdf66155ab4dbeb5d35fb6ddc,2025-01-27T11:15:11.267000
CVE-2025-0697,0,0,0025729b7a8c8dfb3fb7c692492d826032ac90e2b3af69745256c93d5b68ecb8,2025-01-24T15:15:12.130000
@ -281325,7 +281328,7 @@ CVE-2025-1463,0,0,2a489d18ab145c49d92d5d5423e0c75c250fe44656454c4f0f8f5922284899
CVE-2025-1464,0,0,ea6fca9902a8d66594a81d7b3846b2dc6106ea09c92a543daddd03a001b2d75e,2025-02-19T14:15:30.337000
CVE-2025-1465,0,0,41a404e0122a844f3dcf572de60d74f1a85e1ffddfa3b480532531f09012cc4f,2025-02-25T21:07:23.137000
CVE-2025-1467,0,0,f546a361731baa7bcb46e4389211cb2202d736c84cdfe0fcff550dc198f81f26,2025-02-23T16:15:08.400000
CVE-2025-1468,1,1,e5d9bb0ea811bc8078fdab0c492e5a2dd263c632b7b907f43a1fa6ad74bb9cb1,2025-03-18T11:15:39.553000
CVE-2025-1468,0,0,e5d9bb0ea811bc8078fdab0c492e5a2dd263c632b7b907f43a1fa6ad74bb9cb1,2025-03-18T11:15:39.553000
CVE-2025-1470,0,0,e01b0f1bb79b7b859b47b359ce0cf41f9e90ba4e1803b43806d897949049f289,2025-03-05T19:18:19.887000
CVE-2025-1471,0,0,e9367bf2e65ca51cc57b591138b8194302d48e60fcb8c0503d4b9dd9d0af3110,2025-03-05T19:06:42.290000
CVE-2025-1475,0,0,dc71c83df2dea22fb2355bdce40ab12e4f98ce7aad24f8511146bb81157cc42d,2025-03-07T07:15:23.343000
@ -281779,7 +281782,7 @@ CVE-2025-20630,0,0,0cb6d1c0b91807d74fd49faca2a027b3e775f1213907ee8f88e4e58cb3b78
CVE-2025-20631,0,0,eae48a24cdb26043896339096d80c579b21423122c0cfb7d1789d616416831f6,2025-02-18T19:15:24.347000
CVE-2025-20632,0,0,a969832868dfeb065ef85d46f111fa582b74e32bc8195140bed8e964787add5d,2025-02-18T19:15:24.460000
CVE-2025-20633,0,0,38e2a030fd0d7f547703f3781e9e02df03269c9ee8f44017e895217aa066b8bb,2025-02-18T19:15:24.563000
CVE-2025-20634,0,0,b403d84e0221b3268f60e8ecac060161651ab801a15d09c6d731a484c65ed499,2025-02-18T19:15:24.690000
CVE-2025-20634,0,1,fc3c30b117b6bc8a9d8dd2703312cf2f61010370e7d8111081368f7b9b811b3c,2025-03-18T14:15:41.747000
CVE-2025-20635,0,0,8539c0947a7b8ea603fd19e11d259a5fccf8cdeabef5ef4676784c0a0d03499e,2025-03-13T20:15:25.597000
CVE-2025-20636,0,0,53b7c37fe38dde7172ef3ef0f4e80e1b55d45c79cbcdafad69f9ad23a7de5c5b,2025-02-18T19:15:24.960000
CVE-2025-20637,0,0,c98f77253202c98cc20372cd8c54d3277c2b4473b3f20cbc97ddd00be7dce7b1,2025-03-17T15:15:43.697000
@ -282245,9 +282248,9 @@ CVE-2025-21542,0,0,c95405cb76e935b1424e2221df18a531e8229b571e27c205ad993787b875b
CVE-2025-21543,0,0,53374fe0ecf629c278210d26d1681ca091ab0395a1fe0f57b870ba5811f37636,2025-01-22T19:15:13.060000
CVE-2025-21544,0,0,980b23066e2438b2ca08079f7db43e8e73ce5aa9b8984f4251d41d219739f055,2025-01-22T18:15:20.993000
CVE-2025-21545,0,0,ae165462504507994171914dc95c399eec9b17a232b15512feb5d6c34ad5b418,2025-03-13T21:15:43.297000
CVE-2025-21546,0,0,32a5341b789eda11ce19a4c5f9d800ff1dc21d315da1a67a68f9337da9d6eae6,2025-02-18T21:15:26.057000
CVE-2025-21546,0,1,1bc75ca469036c8c2de838e6459d5f4afe6abaec51522949c6e58c0c18f31efb,2025-03-18T14:15:41.940000
CVE-2025-21547,0,0,017438336a031ecfeb419dddba734aad9917fddf073391ba67ba0a836c8e9c64,2025-02-18T21:15:26.180000
CVE-2025-21548,0,0,3f89792c64b7a6cab787d6ccadaaf5c9faf61cdf4e0ea030114a832c7435a58e,2025-02-18T21:15:26.297000
CVE-2025-21548,0,1,2356141980923b17add14f81c695e4cf913f4da3b633ff33eaa98cfadd55cdd1,2025-03-18T14:15:42.087000
CVE-2025-21549,0,0,b2a50028e1bcc49830245cddba3f2301a2c50c551db0641ba7ec8ccc88064540,2025-03-13T19:15:51.240000
CVE-2025-21550,0,0,e5b6aaf4a7d686aaab6f9ee2b427fd22c3f2ad68b4a328f360cd3d2ca4ff7acb,2025-03-13T15:15:51.980000
CVE-2025-21551,0,0,e440132bbc6782c14199732060271cc8dd08332646e455cc162209755bb4029f,2025-03-13T16:15:26.693000
@ -283071,7 +283074,7 @@ CVE-2025-22946,0,0,7db37666dfbf9142b1788db2e9c9ed7b839c8fa56ddb82a64c0b003e5a2ca
CVE-2025-22949,0,0,4497a547d6c85b77c71713f92e0bd769cd0fee1b37f22227e370aa8af86f0dec,2025-01-14T15:15:28.637000
CVE-2025-2295,0,0,cbcc0c56a80887c639b1c020a9e0d32dcb46e1863cdf480258408f53dac0d5c9,2025-03-14T22:15:11.600000
CVE-2025-22952,0,0,8738861fe1665908aa1c319a7ebce3d9ea42370b11127fd19a92e609f78fcd8e,2025-03-03T16:15:40.010000
CVE-2025-22954,0,0,5a3750f9d09835146f3b5bfdf4182b3abbd7b051e3f216b3c4f1cf11622c37e6,2025-03-13T04:15:22.230000
CVE-2025-22954,0,1,7f3409fe8a848c0af5e5d301bd257dbf01b84794547ad3a40f7d0461b014ed94,2025-03-18T14:15:42.213000
CVE-2025-22957,0,0,a83a10114b8bffbb61185f4b7e1da98510853b7fa64b4f1d87dfa557428e19b8,2025-02-18T19:15:26.813000
CVE-2025-22960,0,0,cc3ca59d93e0c0cb6135025d6f8dc37d0dc5645d22d9322f42b235e2a3f0c6b3,2025-03-17T19:15:25.750000
CVE-2025-22961,0,0,c2a3aa8716f6cada0d8a53e343e519973bc28bf36e56486c654940da963b9795,2025-03-12T19:15:38.433000
@ -283909,7 +283912,7 @@ CVE-2025-24085,0,0,10be84b7c6e6cef127d29aae2d31008399360c31674450bd2bdb82cd6d941
CVE-2025-24086,0,0,7c644e120cc41a291828171399048534e1e04b082ef7ed82ac204947bf2fab49,2025-02-05T15:15:21.750000
CVE-2025-24087,0,0,b6d09d2d8f9c9fb48f34374a1c228deecaf72eab2a92a63c6f3af02952b5c8f4,2025-02-05T15:15:21.923000
CVE-2025-24092,0,0,3aa2d06d87ef3fdeeea46531ff97ecfdcf2ce3948ca55a1ae44601e8047b47d4,2025-02-18T20:15:29.027000
CVE-2025-24093,0,1,399fb99e86d72f8f64f535d1c8314fdb510773e1b0ff8ca78a6c885202395705,2025-03-18T12:15:14.730000
CVE-2025-24093,0,0,399fb99e86d72f8f64f535d1c8314fdb510773e1b0ff8ca78a6c885202395705,2025-03-18T12:15:14.730000
CVE-2025-24094,0,0,86d262f71f2e67892faf4dbf8f0a50eff9cb9026771b88386373f113d46381a8,2025-02-04T21:15:28.227000
CVE-2025-24096,0,0,ac69c9566c3d48cc557b26bc2ed716878d8206500a277eb4956f75bd231dad30,2025-02-05T16:15:41.840000
CVE-2025-24099,0,0,9ac733c66f981521044d55991b68403f81f4b4ece5888bc69708355b0385700d,2025-01-30T22:15:10.160000
@ -283920,7 +283923,7 @@ CVE-2025-24103,0,0,121f97805b28c552314d84eeaeab6e5c8e1907de50e8d236950d546904b71
CVE-2025-24104,0,0,eaf2341118958cce67dbc21070a8e2f4a62ff3d770291a310ec877a84b56e1da,2025-02-05T15:15:22.223000
CVE-2025-24106,0,0,7b1652442d8e4a2ef42869db0a96088570ce1bd80744fef4434e3c62e98b9210,2025-03-04T15:25:19.603000
CVE-2025-24107,0,0,96402cf84c64acffc4d1662c29f8a3c8a0f854a65ff188084b5ba4a1a1ec5a35,2025-02-05T16:15:42.013000
CVE-2025-24108,0,0,6be344d04ecaf8dd475407eee25414a45cdc991079dd56d6cd8f3decd1cd8a55,2025-03-04T15:25:43.983000
CVE-2025-24108,0,1,9aaaaccaacf9017079892b606e6940de8d3cf8011d17b629bcde5009dfc6e215,2025-03-18T14:15:42.627000
CVE-2025-24109,0,0,3a06e33059ab25d8437d67978eebded22edd06fe8c09a21c862e225782f2c988,2025-03-04T15:26:30.650000
CVE-2025-24112,0,0,00ac1ad70de7c95aa177469e4cbf1b6a59be3178c8668d42d9efaad7c292453f,2025-02-04T22:15:41.893000
CVE-2025-24113,0,0,dfb8fdeba08350f2d1ba047bdfca5272552cfc4b72a68de35cf8a6aa8ccbdc7b,2025-01-31T22:15:13.443000
@ -283928,7 +283931,7 @@ CVE-2025-24114,0,0,060f1a53826cabb1840c2e97a20d5ed1dcd10135e4439b8b05507d5cf3545
CVE-2025-24115,0,0,15c49b282394a28d48f09f708393e8923948b48fe70b3e10a8d648cbaa5dc78b,2025-03-04T15:15:15.310000
CVE-2025-24116,0,0,aa7cef2fc6e8a345ed4ea9323be2cbc80d7f94c26743a1007a2eda67ae73a859,2025-02-04T22:15:42.203000
CVE-2025-24117,0,0,33c92b99d6665d1cd4e31cf979ddcb83dff08f0221ebf8ab36bcd83194dfd5e1,2025-01-31T14:40:21.463000
CVE-2025-24118,0,0,bbf8ee1869f2b761d69d721d5372fa34230ee456a63911e31d2d0c2ea9869893,2025-03-04T15:15:49.937000
CVE-2025-24118,0,1,231a8f647efccb698f2af26d75ca1326774dcd245b29e6b54409d56744ad43a7,2025-03-18T14:15:42.797000
CVE-2025-24120,0,0,4de34b7518b30f914f0a7dc6f0d2169fee2b922e39b5b8be4b38ceb1cb6aab96,2025-02-05T15:15:22.373000
CVE-2025-24121,0,0,3147f918c1f3d7a66c464fe94f2778628efbf774801d0ad4400d3a98a4740b5a,2025-01-28T15:15:13.600000
CVE-2025-24122,0,0,63629b839b402edeef408de5ba24f2cb0ef35ef076785a337d7d7055ccc840b7,2025-03-04T15:16:52.190000
@ -283966,12 +283969,12 @@ CVE-2025-24162,0,0,03df16b2a66f8e69446966c3b753618fdfe5b4bbe0f6817c504bf02cea467
CVE-2025-24163,0,0,41a251fbd8e3fd1ad37794819de1e745b68c6aee16567b6569d089e58ae56145,2025-03-03T22:48:32.503000
CVE-2025-24166,0,0,15edf859d475720db53f3f95ed8d575ade96a95f125f2377032600fe411e75ab,2025-01-28T22:15:17.080000
CVE-2025-24169,0,0,dc7fdf5a34ca171f91b452ca483098d6852ee04a0c9927ea185bfbd0220db78b,2025-01-31T22:15:14.117000
CVE-2025-24174,0,0,663a91769a390a4d68add5caaf84637971f26aac3721aa5e89739580b02eaf92,2025-03-03T22:47:07.577000
CVE-2025-24174,0,1,0904d4c28286c429cd94ca17762197a0f9f9874c511f730b1e00485e49f57ce4,2025-03-18T14:15:43.020000
CVE-2025-24176,0,0,8a151411616e238cc2afeabee27a87a9c1b6ac9dd5553369acab3c240b386505,2025-01-28T16:15:44.630000
CVE-2025-24177,0,0,79a71d65a51a9b6afaebd476d0d597d4ed4eaba333259a9c33b9b13f1b1bef2f,2025-02-04T22:15:43.237000
CVE-2025-24185,0,0,780ce933a4599922763fb258510562036511606364e33341b032c72a71c2a6a3,2025-03-17T20:15:13.907000
CVE-2025-2419,0,0,8c988bbf24e798e007d0f5fb4500bf48e163fc935837eed17f7686360e365037,2025-03-17T22:15:15.450000
CVE-2025-2420,0,0,6cf9e237f7a2ee37abcfa838f9567dea6ed7f9da1ca13895b8ccedcfac01f783,2025-03-17T23:15:18.723000
CVE-2025-2419,0,1,26560479da279f4bc0d3906a2859a1d9a09a31e7b1f3ab3c1e12831d111e2b42,2025-03-18T14:15:45.067000
CVE-2025-2420,0,1,98e6f051dbce823ddc0a11342a5f0a648b5fe3c71fa6e4c1ac96d722ae7874dd,2025-03-18T13:15:37.770000
CVE-2025-24200,0,0,0f6f41d17b1c80c9261ddc7d6ef23ac7e19cbdbd2c08a07eed9362b293d75967,2025-03-07T17:12:01.477000
CVE-2025-24201,0,0,ce749944f29eb7a58a39f521ebc27f910b93ce1f347524410204067e6a960180,2025-03-14T20:35:27.923000
CVE-2025-24301,0,0,7b7c3fba06b103a537ce7db06429d9d2300d69047940e33831c6830c359206c5,2025-03-04T17:15:48.160000
@ -284076,10 +284079,12 @@ CVE-2025-24480,0,0,8c69070e4602e3e045b6de7421f305082c0b32c33d67076e7034c529b969d
CVE-2025-24481,0,0,1f18ba539d38ed86105e18de8f701df1ae615df6838eaafd5a3bd88fcca169e2,2025-01-28T21:15:18.520000
CVE-2025-24482,0,0,bddd8d62e1d1ef759d3d72d308a4499752a0ac6f47d6ad7b4c765c13d2fd27ef,2025-01-28T21:15:18.687000
CVE-2025-24483,0,0,8e8c3f541513089421e16456a3415c9fe977a1e0274a2d9a7826bef889eecc77,2025-02-06T08:15:30.327000
CVE-2025-2449,1,1,097d8c56f0ba970961941521f178c20e7f071b70e485a5d69566fc048fc66802,2025-03-18T14:15:45.670000
CVE-2025-24490,0,0,c90744a991c52fb51aa8e878b4b2657f71ca215607f5858e899dd6952ad19778,2025-02-24T08:15:10.260000
CVE-2025-24494,0,0,6cea07cccfd63e3e21e6431433f0fa67be526715b4452d5100ebbf4b4cf3063a,2025-03-05T16:15:38.937000
CVE-2025-24497,0,0,c353bcaacc4022d9f615cca17d8aba00bc9c27a2db4d05cf3443efd3facf0482,2025-02-05T18:15:35.613000
CVE-2025-24499,0,0,73c3be8f9b393062a6377e177930760395b929afa4bcb880a4961279b138a48c,2025-02-11T11:15:16.583000
CVE-2025-2450,1,1,6cb1f4ef146253bb9ef2f720730f4941556b5180307da35c3787fcbf4dae8ed4,2025-03-18T14:15:45.850000
CVE-2025-24500,0,0,47c4210aba4fa86ebb74871db3d78a27e196e119ac830b73a53d16e817dd5895,2025-03-13T14:15:35.930000
CVE-2025-24501,0,0,805ef05e75b283fb4d87128106cf95e77b6a4387edac60027da256d1e053a956,2025-02-05T05:15:11.197000
CVE-2025-24502,0,0,faeb6d58a720f7df24146e060ac5b9ad3285f3857cadba89f24692133122cb1d,2025-02-05T05:15:11.300000
@ -284324,7 +284329,7 @@ CVE-2025-24807,0,0,a9342833f23aca9efb5658eaedc615b0791a1b8d97d1be177e79dcc0108d2
CVE-2025-24810,0,0,5dc96a04891b646d8f099d1fa627e0a60065bb9f47866c74211a0f5415867e23,2025-01-28T05:15:11.413000
CVE-2025-24811,0,0,2da7e99907675b0c3b84fff601eb43c4c4c27c662d95c7205901bce5bb8705d8,2025-02-11T11:15:16.907000
CVE-2025-24812,0,0,3542fd62679fcd1754aabe0f38d924c5bd34578dfc13aa46aeaa150dd810a16a,2025-02-11T11:15:17.080000
CVE-2025-24813,0,0,74bcac62d22f1d058b2204263a509205db746b39180a79515430c5f759c43dec,2025-03-17T16:15:25.343000
CVE-2025-24813,0,1,207ab702a4c69496b55cb9cbff31ce62e3ea99cde099bf79ba109d3afc178ec4,2025-03-18T14:15:43.253000
CVE-2025-24814,0,0,778c51f4f444afc315901ebeb1d1515ad066d9ae9182f0d62b926c00ff924803,2025-02-15T01:15:11.157000
CVE-2025-24826,0,0,afc4a3c6aa0e8288830e8c91cc81c25b8636a1b49a80120ea49c59c3d903f3ac,2025-01-28T21:15:18.817000
CVE-2025-24827,0,0,9def413bdd8ee8b51fbd9a0d5033d038fbca6373f01b1c0b3f27d7c9c702b649,2025-02-18T19:15:27.587000
@ -284361,7 +284366,7 @@ CVE-2025-24885,0,0,809790028ca7e0dfec81701f262fd0f27740a460115b7bfa09e52c5dd0783
CVE-2025-24886,0,0,324d35c8722e17c18be480ab82b55101915c4949700cace26a13a2f1b626ed6b,2025-01-30T23:15:08.990000
CVE-2025-24888,0,0,b9ca9ab88f1cc9fd6807e407a101d4c9bd1a79c9adcc6d693619e4b5c638a59b,2025-02-13T18:18:23.047000
CVE-2025-24889,0,0,8300133ae2aedfb9f0174d2f87f5427533837a07fb360e45d39fb7eb96487cb4,2025-02-13T18:18:23.240000
CVE-2025-2489,1,1,ea985209b68962991b2177d10de12e123d562ae17eda9bc690081c74d6982ff9,2025-03-18T12:15:15.770000
CVE-2025-2489,0,0,ea985209b68962991b2177d10de12e123d562ae17eda9bc690081c74d6982ff9,2025-03-18T12:15:15.770000
CVE-2025-24891,0,0,fa354bb024eafc83868e45bcfabfb6da90613ba074888a78bff8f3e35d34ba85,2025-01-31T23:15:08.457000
CVE-2025-24892,0,0,51c367e6866b01e462dd4aa6239e7b847dd4ef3a2e44ef848d7f38e79a738768,2025-02-10T16:15:39.310000
CVE-2025-24893,0,0,14aab4eb42250523172f46956afe05bb6d2661db933b23bed541d9a55676b820,2025-02-20T20:15:46.697000
@ -284371,6 +284376,7 @@ CVE-2025-24896,0,0,990844e95cf5f001626311cb46be899bcd7e5e93cef08984ed7570a5b8885
CVE-2025-24897,0,0,b4a9ca153078c9451982223cb67d9a48c46e9b9480f45d60a768c29a811f5d8a,2025-02-11T16:15:51.610000
CVE-2025-24898,0,0,dd14a5484414b1ba9c22991f32be2602892353b81ceae03dd79061797e9e5adc,2025-02-11T08:15:32.003000
CVE-2025-24899,0,0,7816fe20b0c1908c0a40b5877e6e92a7dcc6eb4d232e7366b9208152803d77e6,2025-02-03T21:15:15.703000
CVE-2025-2490,1,1,e7ec0264ef51f1a92542719fd7c8111b43b3537bd9fadbac1ab0d67b6349b05a,2025-03-18T14:15:46.250000
CVE-2025-24900,0,0,12a09249a507b6d9fb85eedd73a9e64a950411d75e49fdadf829b0cc45e6b210,2025-02-11T16:15:51.763000
CVE-2025-24901,0,0,bd99b1b0ebfeeb520dd8f3faba434d145a8e1d709b882bc2215e45767faa0251,2025-02-13T19:01:24.310000
CVE-2025-24902,0,0,623a5d8cac0a059ec59c84d4f4cbfa6844d5070567ceaf720618a336c321ecaf,2025-02-13T19:00:59.777000
@ -284381,11 +284387,11 @@ CVE-2025-24906,0,0,c4750456c80f4de3a8d1ced568cbceb00ad477041c107087bb6724cafda48
CVE-2025-24912,0,0,d10f05928f11c7a00e2a62c8635f9af5917fec081444b4d22020eb25a54c0654,2025-03-12T05:15:37.430000
CVE-2025-24924,0,0,3cb1f58ac0f82a4a651fd56ef4a80a8ba6f8902630bb63eebac1edae30e9552a,2025-03-05T00:15:38.423000
CVE-2025-24928,0,0,8e9335012d42a7d487e5f9921ea54f865e117f9248798a001634be5429fb2b4a,2025-02-18T23:15:10.250000
CVE-2025-2493,1,1,2b3a514ada435fc466246da6d5a66a551f84e997c51e827ce1c658a6c518c797,2025-03-18T12:15:15.950000
CVE-2025-2494,1,1,90edcd70afa12a5b458787396b810c7a7c91617053c96db3161decbb0e3d078f,2025-03-18T12:15:16.090000
CVE-2025-2493,0,0,2b3a514ada435fc466246da6d5a66a551f84e997c51e827ce1c658a6c518c797,2025-03-18T12:15:15.950000
CVE-2025-2494,0,0,90edcd70afa12a5b458787396b810c7a7c91617053c96db3161decbb0e3d078f,2025-03-18T12:15:16.090000
CVE-2025-24946,0,0,6cbcc6ed12b7350bc1e3ba362180af6c5ebed1ea35a0fb612c7c5af9a1e19fef,2025-02-20T03:15:12.800000
CVE-2025-24947,0,0,0710d5740f5af2ba6f51dfd5917029f75791b75ba51884293887edaa47dfb4bd,2025-02-20T03:15:12.943000
CVE-2025-2495,1,1,f127770b943657c81257511dfa2f9513d8d8bb040f26e60d9ed50c5dc8a365b6,2025-03-18T12:15:16.227000
CVE-2025-2495,0,0,f127770b943657c81257511dfa2f9513d8d8bb040f26e60d9ed50c5dc8a365b6,2025-03-18T12:15:16.227000
CVE-2025-24956,0,0,915adf46e5e8d613d503b5df374b84b9ffba9c57344980265efed54c45eafcd8,2025-02-11T11:15:17.273000
CVE-2025-24957,0,0,caab3bc6d07aaaaaeb40190f59933fb518192f43d9ea569cde48752d4b2b9c97,2025-02-13T18:59:32.867000
CVE-2025-24958,0,0,0ae446ece37f4692f130ad0dc256efa2fd5d1fe74929c7d4ebe10575dc57a55a,2025-02-13T18:58:56.320000
@ -284650,6 +284656,7 @@ CVE-2025-25476,0,0,dcb05a63fbcff084bcf1c5df3723664abe2b9f2707596be8a1333f910233c
CVE-2025-25477,0,0,186e1b1b42cd761794319ad88366f1783c2b185a5c4c7ba09f90886d766f572b,2025-02-28T16:15:39.550000
CVE-2025-25478,0,0,5d678bf64fff284866af822721a081473e94720053a6940e94e8607a25812368,2025-03-05T16:15:39.297000
CVE-2025-25497,0,0,342cc8c3073c7b4fb963ce6919474125872366956f79f35d55abc4517740c1dc,2025-03-07T20:15:38.013000
CVE-2025-25500,1,1,111d4db0bc81dd7cc682206d7f44a5f888cd685ec97f9d39953e9264ebcd56f7,2025-03-18T14:15:43.493000
CVE-2025-25505,0,0,11c4c75af440f82d715defaf6782907c0744a464a1a91c9d9aeef14ada87484d,2025-02-21T21:15:23.723000
CVE-2025-25507,0,0,aaa8b5a00bc14c6200ce4ada5e546d091bf3632fba77c66b3ac71c873b2a184e,2025-02-21T21:15:23.870000
CVE-2025-25510,0,0,80b49d96f8cfea96d2e40e1145bf347e93013db39579b2b941514912fbfd558e,2025-02-21T21:15:24.023000
@ -284772,7 +284779,7 @@ CVE-2025-25894,0,0,3f9d2e7801654dc301f71e4b1ffcdf5f43972d9bc766b46d709bc030e71ac
CVE-2025-25895,0,0,420cfe9c83f8ba0a9cc6496ef638a111b855c60de22aee5c238d6d5765c63784,2025-02-19T16:15:42.087000
CVE-2025-25896,0,0,cd3dcc213555e90c5d040ed31f6976b5cb54f10c52efb54acc663fd3589794f4,2025-02-19T16:15:42.240000
CVE-2025-25897,0,0,011a13475d5d2314ce8d3e20e2eaba51128ca214c7db076f61e733e1a30cacf0,2025-02-18T15:00:36.487000
CVE-2025-25898,0,0,04c24c833076238e0492d1c61fe2318923b61fe34c2d487dd0ee957f99c08670,2025-02-18T18:15:35.503000
CVE-2025-25898,0,1,d58b45df31d2ab16820300309437bcd9af06cdd7005531ff67ae87c6f364cbef,2025-03-18T14:15:43.617000
CVE-2025-25899,0,0,0a94e1ac94f2348ced8620095f1a1cdbc8d00da1d929db972e382fd33828a613,2025-02-13T20:15:49.913000
CVE-2025-25900,0,0,c19958e46a5c7601d0a2f6f81f8761b82e188d6b471104e0d3a3030c6717cdee,2025-03-13T14:15:36.057000
CVE-2025-25901,0,0,dbbaa66456410cc814c13398a9419347a95d4c008549889e82c9e08064439afb,2025-02-20T15:15:14.380000
@ -285566,9 +285573,9 @@ CVE-2025-29788,0,0,e1a88fbf2eb4e52db6d664e73916facba347fa2e80c6c15ea20d2760d435b
CVE-2025-29891,0,0,19957216c682a927ada7fbe8d799bf8aa1337ea00af552d450ee80a227a50322,2025-03-13T09:15:14.860000
CVE-2025-29903,0,0,10c68e7ddaac62cfaf56fa2d0c36952343de94dcaf74d7de9700d239804e47d3,2025-03-12T13:15:37.823000
CVE-2025-29904,0,0,8151be9d68bba0e8c527ecea5490dd29fd8894724b2933080703a0ecee03e639,2025-03-12T13:15:38.050000
CVE-2025-29909,0,0,ac7d1844d1e2c309f19004efcf9bef8fdd465a1f2bcd636b0eb01eaf419f6421,2025-03-17T22:15:14.657000
CVE-2025-29910,0,0,a1449fa10c871b20c6a6ecb3b490c56a1057d8705ec496065bcd5667ab02ad5c,2025-03-17T22:15:14.810000
CVE-2025-29911,0,0,5d1ec805dc1e346e7e6b764ec7d8b70cd63fee9e1f021d9740a7b15e82142f1b,2025-03-17T23:15:18.293000
CVE-2025-29909,0,1,763144943d5bc13d24b119de23c47602f4df0647e1341ddac3a9c1d2fe539cba,2025-03-18T14:15:43.803000
CVE-2025-29910,0,1,d918c1f18c48e000de1547503ce3f5501f2c110de54a5f25e6b09e52254e772e,2025-03-18T14:15:43.913000
CVE-2025-29911,0,1,9bc03ebbf6bc4f31bea7d0d71fc54bd0d8eb994dcf1544391515e13547c2c935,2025-03-18T14:15:44.023000
CVE-2025-29912,0,0,e23f6e141e6c7cfa4a10c629df5522bf78a6021bcef4d2d4cdf07cb70dadff0f,2025-03-17T23:15:18.450000
CVE-2025-29913,0,0,571420058b3a2fca2a2137cd48ed447ba4bf465242535c3a89f7b7aade97c032,2025-03-17T23:15:18.590000
CVE-2025-29994,0,0,5456b8a283efd1eb6eeaed0238e41032f545196d53f3be8a9a39b4dbb8a3918b,2025-03-13T12:15:13.660000
@ -285582,4 +285589,5 @@ CVE-2025-30074,0,0,5d0dfb842ba5d24afb134fe0eb5f7e2e10f0c5619590d2c6aaa9483b4a179
CVE-2025-30076,0,0,ae70a6cce406a05e108d38c82fa058b5f2fc46a32f1bafe789b6ecdef84b3c03,2025-03-17T16:15:28.220000
CVE-2025-30077,0,0,3552a491790a6839d39471705d681d0b56a0da48a2daaa633f419312864c12e5,2025-03-17T16:15:28.360000
CVE-2025-30089,0,0,26c0c3e573114b1e3e240c2d6bcb88b42d7bf3c75b6c33122ef4296822dfa500,2025-03-17T16:15:28.507000
CVE-2025-30106,1,1,31af7150d5c12c0672c068b31fc4f3ce3cdb8904bdd8d13adc1c237b5e869d32,2025-03-18T14:15:46.480000
CVE-2025-30143,0,0,dfaeb3eef5e72894446a00bc252dd02d40d218e0a77cd9256d63da4e0a89e02b,2025-03-17T16:15:28.643000

Can't render this file because it is too large.