mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-19 17:31:42 +00:00
Auto-Update: 2025-02-28T17:00:19.921748+00:00
This commit is contained in:
parent
f51bf49e3e
commit
30492cf778
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-24774",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-03-10T13:15:11.033",
|
||||
"lastModified": "2024-11-21T07:48:23.573",
|
||||
"lastModified": "2025-02-28T16:15:36.360",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2024-36046",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-27T23:15:36.953",
|
||||
"lastModified": "2025-02-27T23:15:36.953",
|
||||
"lastModified": "2025-02-28T16:15:36.987",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Infoblox NIOS through 8.6.4 executes with more privileges than required."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Informlox Nios a trav\u00e9s de 8.6.4 se ejecuta con m\u00e1s privilegios de los requeridos."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-269"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.infoblox.com/s/article/000010390",
|
||||
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2024-36047",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-27T23:15:37.040",
|
||||
"lastModified": "2025-02-27T23:15:37.040",
|
||||
"lastModified": "2025-02-28T16:15:37.137",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Infoblox NIOS through 8.6.4 and 9.x through 9.0.3 has Improper Input Validation."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Informlox NIOS a trav\u00e9s de 8.6.4 y 9.x a 9.0.3 tiene una validaci\u00f3n de entrada incorrecta."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-20"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.infoblox.com/s/article/000010391",
|
||||
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2024-37566",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-27T23:15:37.130",
|
||||
"lastModified": "2025-02-27T23:15:37.130",
|
||||
"lastModified": "2025-02-28T16:15:37.287",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Infoblox NIOS through 8.6.4 has Improper Authentication for Grids."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Informlox Nios a trav\u00e9s de 8.6.4 tiene una autenticaci\u00f3n inadecuada para Grids."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-284"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.infoblox.com/s/article/000010392",
|
||||
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2024-37567",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-27T23:15:37.210",
|
||||
"lastModified": "2025-02-27T23:15:37.210",
|
||||
"lastModified": "2025-02-28T16:15:37.440",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Infoblox NIOS through 8.6.4 has Improper Access Control for Grids."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Informlox NIOS hasta 8.6.4 tiene un control de acceso incorrecto para Grids."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
|
||||
"baseScore": 9.1,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-284"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.infoblox.com/s/article/000010393",
|
||||
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2024-41334",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-27T21:15:36.483",
|
||||
"lastModified": "2025-02-27T21:15:36.483",
|
||||
"lastModified": "2025-02-28T16:15:37.587",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Draytek devices Vigor 165/166 prior to v4.2.6 , Vigor 2620/LTE200 prior to v3.9.8.8, Vigor 2860/2925 prior to v3.9.7, Vigor 2862/2926 prior to v3.9.9.4, Vigor 2133/2762/2832 prior to v3.9.8, Vigor 2135/2765/2766 prior to v4.4.5.1, Vigor 2865/2866/2927 prior to v4.4.5.3, Vigor 2962/3910 prior to v4.3.2.7, Vigor 3912 prior to v4.3.5.2, and Vigor 2925 up to v3.9.6 were discovered to not utilize certificate verification, allowing attackers to upload crafted APPE modules from non-official servers, leading to arbitrary code execution."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se descubri\u00f3 que los dispositivos Draytek Vigor 165/166 anteriores a la v4.2.6, Vigor 2620/LTE200 anteriores a la v3.9.8.8, Vigor 2860/2925 anteriores a la v3.9.7, Vigor 2862/2926 anteriores a la v3.9.9.4, Vigor 2133/2762/2832 anteriores a la v3.9.8, Vigor 2135/2765/2766 anteriores a la v4.4.5.1, Vigor 2865/2866/2927 anteriores a la v4.4.5.3, Vigor 2962/3910 anteriores a la v4.3.2.7, Vigor 3912 anteriores a la v4.3.5.2 y Vigor 2925 hasta la v3.9.6 no utilizaban la verificaci\u00f3n de certificados, lo que permit\u00eda a los atacantes cargar m\u00f3dulos APPE manipulados desde servidores no oficiales, lo que lleva a la ejecuci\u00f3n de c\u00f3digo arbitrario."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-94"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "http://draytek.com",
|
||||
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2024-41338",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-27T21:15:36.753",
|
||||
"lastModified": "2025-02-27T21:15:36.753",
|
||||
"lastModified": "2025-02-28T15:15:11.727",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A NULL pointer dereference in Draytek devices Vigor 165/166 prior to v4.2.6 , Vigor 2620/LTE200 prior to v3.9.8.8, Vigor 2860/2925 prior to v3.9.7, Vigor 2862/2926 prior to v3.9.9.4, Vigor 2133/2762/2832 prior to v3.9.8, Vigor 2135/2765/2766 prior to v4.4.5.1, Vigor 2865/2866/2927 prior to v4.4.5.3, Vigor 2962/3910 prior to v4.3.2.7, Vigor 3912 prior to v4.3.5.2, and Vigor 2925 up to v3.9.6 allows attackers to cause a Denial of Service (DoS) via a crafted DHCP request."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Una desreferencia de puntero NULL en los dispositivos Draytek Vigor 165/166 anteriores a v4.2.6, Vigor 2620/LTE200 anteriores a v3.9.8.8, Vigor 2860/2925 anteriores a v3.9.7, Vigor 2862/2926 anteriores a v3.9.9.4, Vigor 2133/2762/2832 anteriores a v3.9.8, Vigor 2135/2765/2766 anteriores a v4.4.5.1, Vigor 2865/2866/2927 anteriores a v4.4.5.3, Vigor 2962/3910 anteriores a v4.3.2.7, Vigor 3912 anteriores a v4.3.5.2 y Vigor 2925 hasta v3.9.6 permite a los atacantes provocar una denegaci\u00f3n de servicio (DoS) a trav\u00e9s de una solicitud DHCP manipulada espec\u00edficamente."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-476"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "http://draytek.com",
|
||||
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2024-41339",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-27T21:15:36.837",
|
||||
"lastModified": "2025-02-27T21:15:36.837",
|
||||
"lastModified": "2025-02-28T16:15:37.737",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue in the CGI endpoint used to upload configurations in Draytek devices Vigor 165/166 prior to v4.2.6 , Vigor 2620/LTE200 prior to v3.9.8.8, Vigor 2860/2925 prior to v3.9.7, Vigor 2862/2926 prior to v3.9.9.4, Vigor 2133/2762/2832 prior to v3.9.8, Vigor 2135/2765/2766 prior to v4.4.5.1, Vigor 2865/2866/2927 prior to v4.4.5.3, Vigor 2962/3910 prior to v4.3.2.7, Vigor 3912 prior to v4.3.5.2, and Vigor 2925 up to v3.9.6 allows attackers to upload a crafted kernel module, allowing for arbitrary code execution."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Un problema en el endpoint CGI utilizado para cargar configuraciones en dispositivos Draytek Vigor 165/166 anterior a v4.2.6, Vigor 2620/LTE200 anterior a v3.9.8.8, Vigor 2860/2925 anterior a v3.9.7, Vigor 2862/2926 anterior a v3.9.9.4, Vigor 2133/2762/2832 anterior a v3.9.8, Vigor 2135/2765/2766 anterior a v4.4.5.1, Vigor 2865/2866/2927 anterior a v4.4.5.3, Vigor 2962/3910 anterior a v4.3.2.7, Vigor 3912 anterior a v4.3.5.2 y Vigor 2925 hasta v3.9.6 permite a los atacantes cargar un m\u00f3dulo de kernel manipulado espec\u00edficamente, lo que permite la ejecuci\u00f3n de c\u00f3digo arbitrario."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-94"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "http://draytek.com",
|
||||
|
25
CVE-2024/CVE-2024-447xx/CVE-2024-44754.json
Normal file
25
CVE-2024/CVE-2024-447xx/CVE-2024-44754.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2024-44754",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-28T16:15:37.883",
|
||||
"lastModified": "2025-02-28T16:15:37.883",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cryptographic key extraction from internal flash in Minut M2 with firmware version #15142 allows physically proximate attackers to inject modified firmware into any other Minut M2 product via USB."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "http://minut.com",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.amlisoft.se/sec_20241114.html",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,20 +2,63 @@
|
||||
"id": "CVE-2024-53408",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-27T20:16:01.790",
|
||||
"lastModified": "2025-02-27T20:16:01.790",
|
||||
"lastModified": "2025-02-28T15:15:12.317",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "AVE System Web Client v2.1.131.13992 was discovered to contain a cross-site scripting (XSS) vulnerability."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se descubri\u00f3 que AVE System Web Client v2.1.131.13992 conten\u00eda una vulnerabilidad de cross-site scripting (XSS)."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://cosmosofcyberspace.github.io/ave-system-cve.html",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://cosmosofcyberspace.github.io/ave-system-cve.html",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,20 +2,81 @@
|
||||
"id": "CVE-2024-57026",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-24T18:15:19.023",
|
||||
"lastModified": "2025-02-24T18:15:19.023",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-02-28T16:07:41.847",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "TawkTo Widget Version <= 1.3.7 is vulnerable to Cross Site Scripting (XSS) due to processing user input in a way that allows JavaScript execution."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": " La versi\u00f3n del widget TawkTo <= 1.3.7 es vulnerable a Cross Site Scripting (XSS) debido a que procesa la entrada del usuario de una manera que permite la ejecuci\u00f3n de JavaScript."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"url": "https://cosmosofcyberspace.github.io/tawk_to_cve.html",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:tawk:tawk.to:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "1.3.7",
|
||||
"matchCriteriaId": "B28A9CDE-1840-44C4-8BD1-2119AA6D1489"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://cosmosofcyberspace.github.io/tawk_to_cve.html",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-21184",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2025-02-11T18:15:30.180",
|
||||
"lastModified": "2025-02-11T18:15:30.180",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-02-28T16:02:50.353",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -42,19 +42,141 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "secure@microsoft.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-122"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*",
|
||||
"versionEndExcluding": "10.0.10240.20915",
|
||||
"matchCriteriaId": "8B692D57-D1F5-440E-AC28-C7633740ED6E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*",
|
||||
"versionEndExcluding": "10.0.10240.20915",
|
||||
"matchCriteriaId": "44723F8C-6B56-4A27-B213-E822ADC16078"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
|
||||
"versionEndExcluding": "10.0.14393.7785",
|
||||
"matchCriteriaId": "C91C224C-5CC9-42EF-8053-AC80EE2CC2B5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
|
||||
"versionEndExcluding": "10.0.14393.7785",
|
||||
"matchCriteriaId": "07421D08-3F88-4532-B652-36825784EFF9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
|
||||
"versionEndExcluding": "10.0.17763.6893",
|
||||
"matchCriteriaId": "B5BC47F5-150E-4D18-8CC4-356F22171D81"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*",
|
||||
"versionEndExcluding": "10.0.17763.6893",
|
||||
"matchCriteriaId": "E448ECB4-CE46-4A29-A092-5A4D334E5535"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.19044.5487",
|
||||
"matchCriteriaId": "A932CBA3-651F-4BBA-968A-2D6CA7DF8506"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.19045.5487",
|
||||
"matchCriteriaId": "810C8ECB-619F-447C-B352-E66F7EF5216E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.22621.4890",
|
||||
"matchCriteriaId": "30AF7170-5722-4C9C-A8AD-7A9F0C5952EE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.22631.4890",
|
||||
"matchCriteriaId": "62FFD367-FB8B-48CA-813F-760E4F393555"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.26100.3194",
|
||||
"matchCriteriaId": "B9C5B9BC-F08B-49F8-82D3-7CC6BDB68995"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.14393.7785",
|
||||
"matchCriteriaId": "208FA80F-F742-473E-81D5-003DC2BFFC6C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.17763.6893",
|
||||
"matchCriteriaId": "273EE4B9-8B53-4387-98C8-EC5D2558DB82"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.20348.3207",
|
||||
"matchCriteriaId": "1711CDE0-4C93-40D3-91B7-DE507143A45F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:x64:*",
|
||||
"versionEndExcluding": "10.0.25398.1425",
|
||||
"matchCriteriaId": "FB476271-F7D2-40F9-BAFC-2DCD597BFE27"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:x64:*",
|
||||
"versionEndExcluding": "10.0.26100.3194",
|
||||
"matchCriteriaId": "C5C38103-E0F4-4302-98CE-BD8B20460004"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21184",
|
||||
"source": "secure@microsoft.com"
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-21188",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2025-02-11T18:15:30.403",
|
||||
"lastModified": "2025-02-11T18:15:30.403",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-02-28T16:02:50.353",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -42,19 +42,51 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "secure@microsoft.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-59"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microsoft:azure_network_watcher:*:*:*:*:*:azure_virtual_machine:*:*",
|
||||
"versionEndExcluding": "1.4.3563.1",
|
||||
"matchCriteriaId": "5870563D-82CF-4D78-8020-7FD45C747385"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21188",
|
||||
"source": "secure@microsoft.com"
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-21190",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2025-02-11T18:15:30.610",
|
||||
"lastModified": "2025-02-11T18:15:30.610",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-02-28T16:02:50.353",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -42,19 +42,166 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "secure@microsoft.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-122"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*",
|
||||
"versionEndExcluding": "10.0.10240.20915",
|
||||
"matchCriteriaId": "8B692D57-D1F5-440E-AC28-C7633740ED6E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*",
|
||||
"versionEndExcluding": "10.0.10240.20915",
|
||||
"matchCriteriaId": "44723F8C-6B56-4A27-B213-E822ADC16078"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
|
||||
"versionEndExcluding": "10.0.14393.7785",
|
||||
"matchCriteriaId": "C91C224C-5CC9-42EF-8053-AC80EE2CC2B5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
|
||||
"versionEndExcluding": "10.0.14393.7785",
|
||||
"matchCriteriaId": "07421D08-3F88-4532-B652-36825784EFF9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
|
||||
"versionEndExcluding": "10.0.17763.6893",
|
||||
"matchCriteriaId": "B5BC47F5-150E-4D18-8CC4-356F22171D81"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*",
|
||||
"versionEndExcluding": "10.0.17763.6893",
|
||||
"matchCriteriaId": "E448ECB4-CE46-4A29-A092-5A4D334E5535"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.19044.5487",
|
||||
"matchCriteriaId": "A932CBA3-651F-4BBA-968A-2D6CA7DF8506"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.19045.5487",
|
||||
"matchCriteriaId": "810C8ECB-619F-447C-B352-E66F7EF5216E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.22621.4890",
|
||||
"matchCriteriaId": "30AF7170-5722-4C9C-A8AD-7A9F0C5952EE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.22631.4890",
|
||||
"matchCriteriaId": "62FFD367-FB8B-48CA-813F-760E4F393555"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.26100.3194",
|
||||
"matchCriteriaId": "B9C5B9BC-F08B-49F8-82D3-7CC6BDB68995"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*",
|
||||
"matchCriteriaId": "2127D10C-B6F3-4C1D-B9AA-5D78513CC996"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*",
|
||||
"matchCriteriaId": "AB425562-C0A0-452E-AABE-F70522F15E1A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
|
||||
"matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.14393.7785",
|
||||
"matchCriteriaId": "208FA80F-F742-473E-81D5-003DC2BFFC6C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.17763.6893",
|
||||
"matchCriteriaId": "273EE4B9-8B53-4387-98C8-EC5D2558DB82"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.20348.3207",
|
||||
"matchCriteriaId": "1711CDE0-4C93-40D3-91B7-DE507143A45F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:x64:*",
|
||||
"versionEndExcluding": "10.0.25398.1425",
|
||||
"matchCriteriaId": "FB476271-F7D2-40F9-BAFC-2DCD597BFE27"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:x64:*",
|
||||
"versionEndExcluding": "10.0.26100.3194",
|
||||
"matchCriteriaId": "C5C38103-E0F4-4302-98CE-BD8B20460004"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21190",
|
||||
"source": "secure@microsoft.com"
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-21198",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2025-02-11T18:15:31.020",
|
||||
"lastModified": "2025-02-11T18:15:31.020",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-02-28T16:02:50.353",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -49,12 +49,50 @@
|
||||
"value": "CWE-306"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microsoft:hpc_pack_2016:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "2016.3",
|
||||
"matchCriteriaId": "E75B4ABA-9F2F-49A7-9300-F987D791AEE4"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microsoft:hpc_pack_2019:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "6.3.8328.0",
|
||||
"matchCriteriaId": "7A1C45BD-7ED9-4F9F-A91D-810A4CC5E662"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21198",
|
||||
"source": "secure@microsoft.com"
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-21200",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2025-02-11T18:15:31.203",
|
||||
"lastModified": "2025-02-11T18:15:31.203",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-02-28T16:02:50.353",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -42,19 +42,166 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "secure@microsoft.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-122"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*",
|
||||
"versionEndExcluding": "10.0.10240.20915",
|
||||
"matchCriteriaId": "8B692D57-D1F5-440E-AC28-C7633740ED6E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*",
|
||||
"versionEndExcluding": "10.0.10240.20915",
|
||||
"matchCriteriaId": "44723F8C-6B56-4A27-B213-E822ADC16078"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
|
||||
"versionEndExcluding": "10.0.14393.7785",
|
||||
"matchCriteriaId": "C91C224C-5CC9-42EF-8053-AC80EE2CC2B5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
|
||||
"versionEndExcluding": "10.0.14393.7785",
|
||||
"matchCriteriaId": "07421D08-3F88-4532-B652-36825784EFF9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
|
||||
"versionEndExcluding": "10.0.17763.6893",
|
||||
"matchCriteriaId": "B5BC47F5-150E-4D18-8CC4-356F22171D81"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*",
|
||||
"versionEndExcluding": "10.0.17763.6893",
|
||||
"matchCriteriaId": "E448ECB4-CE46-4A29-A092-5A4D334E5535"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.19044.5487",
|
||||
"matchCriteriaId": "A932CBA3-651F-4BBA-968A-2D6CA7DF8506"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.19045.5487",
|
||||
"matchCriteriaId": "810C8ECB-619F-447C-B352-E66F7EF5216E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.22621.4890",
|
||||
"matchCriteriaId": "30AF7170-5722-4C9C-A8AD-7A9F0C5952EE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.22631.4890",
|
||||
"matchCriteriaId": "62FFD367-FB8B-48CA-813F-760E4F393555"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.26100.3194",
|
||||
"matchCriteriaId": "B9C5B9BC-F08B-49F8-82D3-7CC6BDB68995"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*",
|
||||
"matchCriteriaId": "2127D10C-B6F3-4C1D-B9AA-5D78513CC996"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*",
|
||||
"matchCriteriaId": "AB425562-C0A0-452E-AABE-F70522F15E1A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
|
||||
"matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.14393.7785",
|
||||
"matchCriteriaId": "208FA80F-F742-473E-81D5-003DC2BFFC6C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.17763.6893",
|
||||
"matchCriteriaId": "273EE4B9-8B53-4387-98C8-EC5D2558DB82"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.20348.3207",
|
||||
"matchCriteriaId": "1711CDE0-4C93-40D3-91B7-DE507143A45F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:x64:*",
|
||||
"versionEndExcluding": "10.0.25398.1425",
|
||||
"matchCriteriaId": "FB476271-F7D2-40F9-BAFC-2DCD597BFE27"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:x64:*",
|
||||
"versionEndExcluding": "10.0.26100.3194",
|
||||
"matchCriteriaId": "C5C38103-E0F4-4302-98CE-BD8B20460004"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21200",
|
||||
"source": "secure@microsoft.com"
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-21201",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2025-02-11T18:15:31.407",
|
||||
"lastModified": "2025-02-11T18:15:31.407",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-02-28T16:02:50.353",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -42,19 +42,166 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "secure@microsoft.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-415"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*",
|
||||
"versionEndExcluding": "10.0.10240.20915",
|
||||
"matchCriteriaId": "8B692D57-D1F5-440E-AC28-C7633740ED6E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*",
|
||||
"versionEndExcluding": "10.0.10240.20915",
|
||||
"matchCriteriaId": "44723F8C-6B56-4A27-B213-E822ADC16078"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
|
||||
"versionEndExcluding": "10.0.14393.7785",
|
||||
"matchCriteriaId": "C91C224C-5CC9-42EF-8053-AC80EE2CC2B5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
|
||||
"versionEndExcluding": "10.0.14393.7785",
|
||||
"matchCriteriaId": "07421D08-3F88-4532-B652-36825784EFF9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
|
||||
"versionEndExcluding": "10.0.17763.6893",
|
||||
"matchCriteriaId": "B5BC47F5-150E-4D18-8CC4-356F22171D81"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*",
|
||||
"versionEndExcluding": "10.0.17763.6893",
|
||||
"matchCriteriaId": "E448ECB4-CE46-4A29-A092-5A4D334E5535"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.19044.5487",
|
||||
"matchCriteriaId": "A932CBA3-651F-4BBA-968A-2D6CA7DF8506"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.19045.5487",
|
||||
"matchCriteriaId": "810C8ECB-619F-447C-B352-E66F7EF5216E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.22621.4890",
|
||||
"matchCriteriaId": "30AF7170-5722-4C9C-A8AD-7A9F0C5952EE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.22631.4890",
|
||||
"matchCriteriaId": "62FFD367-FB8B-48CA-813F-760E4F393555"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.26100.3194",
|
||||
"matchCriteriaId": "B9C5B9BC-F08B-49F8-82D3-7CC6BDB68995"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*",
|
||||
"matchCriteriaId": "2127D10C-B6F3-4C1D-B9AA-5D78513CC996"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*",
|
||||
"matchCriteriaId": "AB425562-C0A0-452E-AABE-F70522F15E1A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
|
||||
"matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.14393.7785",
|
||||
"matchCriteriaId": "208FA80F-F742-473E-81D5-003DC2BFFC6C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.17763.6893",
|
||||
"matchCriteriaId": "273EE4B9-8B53-4387-98C8-EC5D2558DB82"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.20348.3207",
|
||||
"matchCriteriaId": "1711CDE0-4C93-40D3-91B7-DE507143A45F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:x64:*",
|
||||
"versionEndExcluding": "10.0.25398.1425",
|
||||
"matchCriteriaId": "FB476271-F7D2-40F9-BAFC-2DCD597BFE27"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:x64:*",
|
||||
"versionEndExcluding": "10.0.26100.3194",
|
||||
"matchCriteriaId": "C5C38103-E0F4-4302-98CE-BD8B20460004"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21201",
|
||||
"source": "secure@microsoft.com"
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-21206",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2025-02-11T18:15:31.610",
|
||||
"lastModified": "2025-02-11T18:15:31.610",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-02-28T16:02:50.353",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -42,19 +42,80 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "secure@microsoft.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-427"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microsoft:visual_studio_2017:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "15.0",
|
||||
"versionEndExcluding": "15.9.70",
|
||||
"matchCriteriaId": "7148C3A7-9A70-4560-9A0C-94951B2C9B49"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "16.0",
|
||||
"versionEndExcluding": "16.11.44",
|
||||
"matchCriteriaId": "E672587A-4C0E-40F9-9417-0E9F91BC0361"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "17.8",
|
||||
"versionEndExcluding": "17.8.18",
|
||||
"matchCriteriaId": "6AD60982-A18A-446A-970E-212B3F351925"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "17.10",
|
||||
"versionEndExcluding": "17.10.11",
|
||||
"matchCriteriaId": "950538A7-8681-497B-BB96-A040B9989362"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "17.12",
|
||||
"versionEndExcluding": "17.12.5",
|
||||
"matchCriteriaId": "B7F01478-80E9-4E46-AD9B-CC6D095347D3"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21206",
|
||||
"source": "secure@microsoft.com"
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-21208",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2025-02-11T18:15:31.793",
|
||||
"lastModified": "2025-02-11T18:15:31.793",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-02-28T16:02:50.353",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -42,19 +42,100 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "secure@microsoft.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-122"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*",
|
||||
"matchCriteriaId": "2127D10C-B6F3-4C1D-B9AA-5D78513CC996"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*",
|
||||
"matchCriteriaId": "AB425562-C0A0-452E-AABE-F70522F15E1A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
|
||||
"matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.14393.7785",
|
||||
"matchCriteriaId": "208FA80F-F742-473E-81D5-003DC2BFFC6C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.17763.6893",
|
||||
"matchCriteriaId": "273EE4B9-8B53-4387-98C8-EC5D2558DB82"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.20348.3207",
|
||||
"matchCriteriaId": "1711CDE0-4C93-40D3-91B7-DE507143A45F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:x64:*",
|
||||
"versionEndExcluding": "10.0.25398.1425",
|
||||
"matchCriteriaId": "FB476271-F7D2-40F9-BAFC-2DCD597BFE27"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:x64:*",
|
||||
"versionEndExcluding": "10.0.26100.3194",
|
||||
"matchCriteriaId": "C5C38103-E0F4-4302-98CE-BD8B20460004"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21208",
|
||||
"source": "secure@microsoft.com"
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-21212",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2025-02-11T18:15:31.980",
|
||||
"lastModified": "2025-02-11T18:15:31.980",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-02-28T16:02:50.353",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -42,19 +42,129 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "secure@microsoft.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-125"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
|
||||
"versionEndExcluding": "10.0.14393.7785",
|
||||
"matchCriteriaId": "C91C224C-5CC9-42EF-8053-AC80EE2CC2B5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
|
||||
"versionEndExcluding": "10.0.14393.7785",
|
||||
"matchCriteriaId": "07421D08-3F88-4532-B652-36825784EFF9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
|
||||
"versionEndExcluding": "10.0.17763.6893",
|
||||
"matchCriteriaId": "B5BC47F5-150E-4D18-8CC4-356F22171D81"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*",
|
||||
"versionEndExcluding": "10.0.17763.6893",
|
||||
"matchCriteriaId": "E448ECB4-CE46-4A29-A092-5A4D334E5535"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.19044.5487",
|
||||
"matchCriteriaId": "A932CBA3-651F-4BBA-968A-2D6CA7DF8506"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.19045.5487",
|
||||
"matchCriteriaId": "810C8ECB-619F-447C-B352-E66F7EF5216E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.22621.4890",
|
||||
"matchCriteriaId": "30AF7170-5722-4C9C-A8AD-7A9F0C5952EE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.22631.4890",
|
||||
"matchCriteriaId": "62FFD367-FB8B-48CA-813F-760E4F393555"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.26100.3194",
|
||||
"matchCriteriaId": "B9C5B9BC-F08B-49F8-82D3-7CC6BDB68995"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.14393.7785",
|
||||
"matchCriteriaId": "208FA80F-F742-473E-81D5-003DC2BFFC6C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.17763.6893",
|
||||
"matchCriteriaId": "273EE4B9-8B53-4387-98C8-EC5D2558DB82"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.20348.3207",
|
||||
"matchCriteriaId": "1711CDE0-4C93-40D3-91B7-DE507143A45F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:x64:*",
|
||||
"versionEndExcluding": "10.0.25398.1425",
|
||||
"matchCriteriaId": "FB476271-F7D2-40F9-BAFC-2DCD597BFE27"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:x64:*",
|
||||
"versionEndExcluding": "10.0.26100.3194",
|
||||
"matchCriteriaId": "C5C38103-E0F4-4302-98CE-BD8B20460004"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21212",
|
||||
"source": "secure@microsoft.com"
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-21216",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2025-02-11T18:15:32.177",
|
||||
"lastModified": "2025-02-11T18:15:32.177",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-02-28T16:02:50.353",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -42,19 +42,129 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "secure@microsoft.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-125"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
|
||||
"versionEndExcluding": "10.0.14393.7785",
|
||||
"matchCriteriaId": "C91C224C-5CC9-42EF-8053-AC80EE2CC2B5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
|
||||
"versionEndExcluding": "10.0.14393.7785",
|
||||
"matchCriteriaId": "07421D08-3F88-4532-B652-36825784EFF9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
|
||||
"versionEndExcluding": "10.0.17763.6893",
|
||||
"matchCriteriaId": "B5BC47F5-150E-4D18-8CC4-356F22171D81"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*",
|
||||
"versionEndExcluding": "10.0.17763.6893",
|
||||
"matchCriteriaId": "E448ECB4-CE46-4A29-A092-5A4D334E5535"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.19044.5487",
|
||||
"matchCriteriaId": "A932CBA3-651F-4BBA-968A-2D6CA7DF8506"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.19045.5487",
|
||||
"matchCriteriaId": "810C8ECB-619F-447C-B352-E66F7EF5216E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.22621.4890",
|
||||
"matchCriteriaId": "30AF7170-5722-4C9C-A8AD-7A9F0C5952EE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.22631.4890",
|
||||
"matchCriteriaId": "62FFD367-FB8B-48CA-813F-760E4F393555"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.26100.3194",
|
||||
"matchCriteriaId": "B9C5B9BC-F08B-49F8-82D3-7CC6BDB68995"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.14393.7785",
|
||||
"matchCriteriaId": "208FA80F-F742-473E-81D5-003DC2BFFC6C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.17763.6893",
|
||||
"matchCriteriaId": "273EE4B9-8B53-4387-98C8-EC5D2558DB82"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.20348.3207",
|
||||
"matchCriteriaId": "1711CDE0-4C93-40D3-91B7-DE507143A45F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:x64:*",
|
||||
"versionEndExcluding": "10.0.25398.1425",
|
||||
"matchCriteriaId": "FB476271-F7D2-40F9-BAFC-2DCD597BFE27"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:x64:*",
|
||||
"versionEndExcluding": "10.0.26100.3194",
|
||||
"matchCriteriaId": "C5C38103-E0F4-4302-98CE-BD8B20460004"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21216",
|
||||
"source": "secure@microsoft.com"
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-21254",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2025-02-11T18:15:32.450",
|
||||
"lastModified": "2025-02-11T18:15:32.450",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-02-28T16:02:50.353",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -42,19 +42,129 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "secure@microsoft.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-125"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
|
||||
"versionEndExcluding": "10.0.14393.7785",
|
||||
"matchCriteriaId": "C91C224C-5CC9-42EF-8053-AC80EE2CC2B5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
|
||||
"versionEndExcluding": "10.0.14393.7785",
|
||||
"matchCriteriaId": "07421D08-3F88-4532-B652-36825784EFF9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
|
||||
"versionEndExcluding": "10.0.17763.6893",
|
||||
"matchCriteriaId": "B5BC47F5-150E-4D18-8CC4-356F22171D81"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*",
|
||||
"versionEndExcluding": "10.0.17763.6893",
|
||||
"matchCriteriaId": "E448ECB4-CE46-4A29-A092-5A4D334E5535"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.19044.5487",
|
||||
"matchCriteriaId": "A932CBA3-651F-4BBA-968A-2D6CA7DF8506"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.19045.5487",
|
||||
"matchCriteriaId": "810C8ECB-619F-447C-B352-E66F7EF5216E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.22621.4890",
|
||||
"matchCriteriaId": "30AF7170-5722-4C9C-A8AD-7A9F0C5952EE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.22631.4890",
|
||||
"matchCriteriaId": "62FFD367-FB8B-48CA-813F-760E4F393555"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.26100.3194",
|
||||
"matchCriteriaId": "B9C5B9BC-F08B-49F8-82D3-7CC6BDB68995"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.14393.7785",
|
||||
"matchCriteriaId": "208FA80F-F742-473E-81D5-003DC2BFFC6C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.17763.6893",
|
||||
"matchCriteriaId": "273EE4B9-8B53-4387-98C8-EC5D2558DB82"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.20348.3207",
|
||||
"matchCriteriaId": "1711CDE0-4C93-40D3-91B7-DE507143A45F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:x64:*",
|
||||
"versionEndExcluding": "10.0.25398.1425",
|
||||
"matchCriteriaId": "FB476271-F7D2-40F9-BAFC-2DCD597BFE27"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:x64:*",
|
||||
"versionEndExcluding": "10.0.26100.3194",
|
||||
"matchCriteriaId": "C5C38103-E0F4-4302-98CE-BD8B20460004"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21254",
|
||||
"source": "secure@microsoft.com"
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-21259",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2025-02-11T18:15:32.643",
|
||||
"lastModified": "2025-02-11T18:15:32.643",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-02-28T16:02:50.353",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -42,19 +42,51 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "secure@microsoft.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-451"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microsoft:outlook:*:*:*:*:*:android:*:*",
|
||||
"versionEndExcluding": "4.2501.1",
|
||||
"matchCriteriaId": "8DA759E6-2D16-4362-87BC-3FA342CC7D77"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21259",
|
||||
"source": "secure@microsoft.com"
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-21322",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2025-02-11T18:15:33.027",
|
||||
"lastModified": "2025-02-11T18:15:33.027",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-02-28T16:02:50.353",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -42,19 +42,51 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "secure@microsoft.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-59"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microsoft:pc_manager:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "3.15.4.0",
|
||||
"matchCriteriaId": "4CD76985-D5BF-41B9-80FF-3B3526B5B449"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21322",
|
||||
"source": "secure@microsoft.com"
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-21337",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2025-02-11T18:15:33.217",
|
||||
"lastModified": "2025-02-11T18:15:33.217",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-02-28T16:02:50.353",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -42,19 +42,166 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "secure@microsoft.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-284"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*",
|
||||
"versionEndExcluding": "10.0.10240.20915",
|
||||
"matchCriteriaId": "8B692D57-D1F5-440E-AC28-C7633740ED6E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*",
|
||||
"versionEndExcluding": "10.0.10240.20915",
|
||||
"matchCriteriaId": "44723F8C-6B56-4A27-B213-E822ADC16078"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
|
||||
"versionEndExcluding": "10.0.14393.7785",
|
||||
"matchCriteriaId": "C91C224C-5CC9-42EF-8053-AC80EE2CC2B5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
|
||||
"versionEndExcluding": "10.0.14393.7785",
|
||||
"matchCriteriaId": "07421D08-3F88-4532-B652-36825784EFF9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
|
||||
"versionEndExcluding": "10.0.17763.6893",
|
||||
"matchCriteriaId": "B5BC47F5-150E-4D18-8CC4-356F22171D81"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*",
|
||||
"versionEndExcluding": "10.0.17763.6893",
|
||||
"matchCriteriaId": "E448ECB4-CE46-4A29-A092-5A4D334E5535"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.19044.5487",
|
||||
"matchCriteriaId": "A932CBA3-651F-4BBA-968A-2D6CA7DF8506"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.19045.5487",
|
||||
"matchCriteriaId": "810C8ECB-619F-447C-B352-E66F7EF5216E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.22621.4890",
|
||||
"matchCriteriaId": "30AF7170-5722-4C9C-A8AD-7A9F0C5952EE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.22631.4890",
|
||||
"matchCriteriaId": "62FFD367-FB8B-48CA-813F-760E4F393555"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.26100.3194",
|
||||
"matchCriteriaId": "B9C5B9BC-F08B-49F8-82D3-7CC6BDB68995"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*",
|
||||
"matchCriteriaId": "2127D10C-B6F3-4C1D-B9AA-5D78513CC996"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*",
|
||||
"matchCriteriaId": "AB425562-C0A0-452E-AABE-F70522F15E1A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
|
||||
"matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.14393.7785",
|
||||
"matchCriteriaId": "208FA80F-F742-473E-81D5-003DC2BFFC6C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.17763.6893",
|
||||
"matchCriteriaId": "273EE4B9-8B53-4387-98C8-EC5D2558DB82"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.20348.3207",
|
||||
"matchCriteriaId": "1711CDE0-4C93-40D3-91B7-DE507143A45F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:x64:*",
|
||||
"versionEndExcluding": "10.0.25398.1425",
|
||||
"matchCriteriaId": "FB476271-F7D2-40F9-BAFC-2DCD597BFE27"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:x64:*",
|
||||
"versionEndExcluding": "10.0.26100.3194",
|
||||
"matchCriteriaId": "C5C38103-E0F4-4302-98CE-BD8B20460004"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21337",
|
||||
"source": "secure@microsoft.com"
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-21347",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2025-02-11T18:15:33.497",
|
||||
"lastModified": "2025-02-11T18:15:33.497",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-02-28T16:02:50.353",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -42,19 +42,151 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "secure@microsoft.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-59"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*",
|
||||
"versionEndExcluding": "10.0.10240.20915",
|
||||
"matchCriteriaId": "8B692D57-D1F5-440E-AC28-C7633740ED6E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*",
|
||||
"versionEndExcluding": "10.0.10240.20915",
|
||||
"matchCriteriaId": "44723F8C-6B56-4A27-B213-E822ADC16078"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
|
||||
"versionEndExcluding": "10.0.14393.7785",
|
||||
"matchCriteriaId": "C91C224C-5CC9-42EF-8053-AC80EE2CC2B5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
|
||||
"versionEndExcluding": "10.0.14393.7785",
|
||||
"matchCriteriaId": "07421D08-3F88-4532-B652-36825784EFF9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
|
||||
"versionEndExcluding": "10.0.17763.6893",
|
||||
"matchCriteriaId": "B5BC47F5-150E-4D18-8CC4-356F22171D81"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*",
|
||||
"versionEndExcluding": "10.0.17763.6893",
|
||||
"matchCriteriaId": "E448ECB4-CE46-4A29-A092-5A4D334E5535"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.19044.5487",
|
||||
"matchCriteriaId": "A932CBA3-651F-4BBA-968A-2D6CA7DF8506"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.19045.5487",
|
||||
"matchCriteriaId": "810C8ECB-619F-447C-B352-E66F7EF5216E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.22621.4890",
|
||||
"matchCriteriaId": "30AF7170-5722-4C9C-A8AD-7A9F0C5952EE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.22631.4890",
|
||||
"matchCriteriaId": "62FFD367-FB8B-48CA-813F-760E4F393555"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.26100.3194",
|
||||
"matchCriteriaId": "B9C5B9BC-F08B-49F8-82D3-7CC6BDB68995"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.14393.7785",
|
||||
"matchCriteriaId": "208FA80F-F742-473E-81D5-003DC2BFFC6C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.17763.6893",
|
||||
"matchCriteriaId": "273EE4B9-8B53-4387-98C8-EC5D2558DB82"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.20348.3207",
|
||||
"matchCriteriaId": "1711CDE0-4C93-40D3-91B7-DE507143A45F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:x64:*",
|
||||
"versionEndExcluding": "10.0.25398.1425",
|
||||
"matchCriteriaId": "FB476271-F7D2-40F9-BAFC-2DCD597BFE27"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:x64:*",
|
||||
"versionEndExcluding": "10.0.26100.3194",
|
||||
"matchCriteriaId": "C5C38103-E0F4-4302-98CE-BD8B20460004"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21347",
|
||||
"source": "secure@microsoft.com"
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-21349",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2025-02-11T18:15:33.697",
|
||||
"lastModified": "2025-02-11T18:15:33.697",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-02-28T16:02:50.353",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -42,19 +42,141 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "secure@microsoft.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-287"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*",
|
||||
"versionEndExcluding": "10.0.10240.20915",
|
||||
"matchCriteriaId": "8B692D57-D1F5-440E-AC28-C7633740ED6E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*",
|
||||
"versionEndExcluding": "10.0.10240.20915",
|
||||
"matchCriteriaId": "44723F8C-6B56-4A27-B213-E822ADC16078"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
|
||||
"versionEndExcluding": "10.0.14393.7785",
|
||||
"matchCriteriaId": "C91C224C-5CC9-42EF-8053-AC80EE2CC2B5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
|
||||
"versionEndExcluding": "10.0.14393.7785",
|
||||
"matchCriteriaId": "07421D08-3F88-4532-B652-36825784EFF9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
|
||||
"versionEndExcluding": "10.0.17763.6893",
|
||||
"matchCriteriaId": "B5BC47F5-150E-4D18-8CC4-356F22171D81"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*",
|
||||
"versionEndExcluding": "10.0.17763.6893",
|
||||
"matchCriteriaId": "E448ECB4-CE46-4A29-A092-5A4D334E5535"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.19044.5487",
|
||||
"matchCriteriaId": "A932CBA3-651F-4BBA-968A-2D6CA7DF8506"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.19045.5487",
|
||||
"matchCriteriaId": "810C8ECB-619F-447C-B352-E66F7EF5216E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.22621.4890",
|
||||
"matchCriteriaId": "30AF7170-5722-4C9C-A8AD-7A9F0C5952EE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.22631.4890",
|
||||
"matchCriteriaId": "62FFD367-FB8B-48CA-813F-760E4F393555"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.26100.3194",
|
||||
"matchCriteriaId": "B9C5B9BC-F08B-49F8-82D3-7CC6BDB68995"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.14393.7785",
|
||||
"matchCriteriaId": "208FA80F-F742-473E-81D5-003DC2BFFC6C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.17763.6893",
|
||||
"matchCriteriaId": "273EE4B9-8B53-4387-98C8-EC5D2558DB82"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.20348.3207",
|
||||
"matchCriteriaId": "1711CDE0-4C93-40D3-91B7-DE507143A45F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:x64:*",
|
||||
"versionEndExcluding": "10.0.25398.1425",
|
||||
"matchCriteriaId": "FB476271-F7D2-40F9-BAFC-2DCD597BFE27"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:x64:*",
|
||||
"versionEndExcluding": "10.0.26100.3194",
|
||||
"matchCriteriaId": "C5C38103-E0F4-4302-98CE-BD8B20460004"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21349",
|
||||
"source": "secure@microsoft.com"
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-21350",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2025-02-11T18:15:33.903",
|
||||
"lastModified": "2025-02-11T18:15:33.903",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-02-28T16:02:50.353",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -42,19 +42,166 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "secure@microsoft.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-20"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*",
|
||||
"versionEndExcluding": "10.0.10240.20915",
|
||||
"matchCriteriaId": "8B692D57-D1F5-440E-AC28-C7633740ED6E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*",
|
||||
"versionEndExcluding": "10.0.10240.20915",
|
||||
"matchCriteriaId": "44723F8C-6B56-4A27-B213-E822ADC16078"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
|
||||
"versionEndExcluding": "10.0.14393.7785",
|
||||
"matchCriteriaId": "C91C224C-5CC9-42EF-8053-AC80EE2CC2B5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
|
||||
"versionEndExcluding": "10.0.14393.7785",
|
||||
"matchCriteriaId": "07421D08-3F88-4532-B652-36825784EFF9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
|
||||
"versionEndExcluding": "10.0.17763.6893",
|
||||
"matchCriteriaId": "B5BC47F5-150E-4D18-8CC4-356F22171D81"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*",
|
||||
"versionEndExcluding": "10.0.17763.6893",
|
||||
"matchCriteriaId": "E448ECB4-CE46-4A29-A092-5A4D334E5535"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.19044.5487",
|
||||
"matchCriteriaId": "A932CBA3-651F-4BBA-968A-2D6CA7DF8506"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.19045.5487",
|
||||
"matchCriteriaId": "810C8ECB-619F-447C-B352-E66F7EF5216E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.22621.4890",
|
||||
"matchCriteriaId": "30AF7170-5722-4C9C-A8AD-7A9F0C5952EE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.22631.4890",
|
||||
"matchCriteriaId": "62FFD367-FB8B-48CA-813F-760E4F393555"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.26100.3194",
|
||||
"matchCriteriaId": "B9C5B9BC-F08B-49F8-82D3-7CC6BDB68995"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*",
|
||||
"matchCriteriaId": "2127D10C-B6F3-4C1D-B9AA-5D78513CC996"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*",
|
||||
"matchCriteriaId": "AB425562-C0A0-452E-AABE-F70522F15E1A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
|
||||
"matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.14393.7785",
|
||||
"matchCriteriaId": "208FA80F-F742-473E-81D5-003DC2BFFC6C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.17763.6893",
|
||||
"matchCriteriaId": "273EE4B9-8B53-4387-98C8-EC5D2558DB82"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.20348.3207",
|
||||
"matchCriteriaId": "1711CDE0-4C93-40D3-91B7-DE507143A45F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:x64:*",
|
||||
"versionEndExcluding": "10.0.25398.1425",
|
||||
"matchCriteriaId": "FB476271-F7D2-40F9-BAFC-2DCD597BFE27"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:x64:*",
|
||||
"versionEndExcluding": "10.0.26100.3194",
|
||||
"matchCriteriaId": "C5C38103-E0F4-4302-98CE-BD8B20460004"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21350",
|
||||
"source": "secure@microsoft.com"
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,20 +2,63 @@
|
||||
"id": "CVE-2025-25323",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-27T16:15:39.637",
|
||||
"lastModified": "2025-02-27T16:15:39.637",
|
||||
"lastModified": "2025-02-28T16:15:38.153",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue in Qianjin Network Information Technology (Shanghai) Co., Ltd 51Job iOS 14.22.0 allows attackers to access sensitive user information via supplying a crafted link."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Un problema en Qianjin Network Information Technology (Shanghai) Co., Ltd 51Job iOS 14.22.0 permite a los atacantes acceder a informaci\u00f3n confidencial del usuario mediante el suministro de un enlace manipulado espec\u00edficamente para ello."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-84"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/ZhouZiyi1/Vuls/blob/main/250111-51Job/250111-51Job.pdf",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/ZhouZiyi1/Vuls/blob/main/250111-51Job/250111-51Job.pdf",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,20 +2,63 @@
|
||||
"id": "CVE-2025-25324",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-27T16:15:39.760",
|
||||
"lastModified": "2025-02-27T16:15:39.760",
|
||||
"lastModified": "2025-02-28T16:15:38.307",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue in Shandong Provincial Big Data Center AiShanDong iOS 5.0.0 allows attackers to access sensitive user information via supplying a crafted link."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Un problema en Shandong Provincial Big Data Center AiShanDong iOS 5.0.0 permite a los atacantes acceder a informaci\u00f3n confidencial del usuario mediante el suministro de un enlace manipulado espec\u00edficamente para ello."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-84"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/ZhouZiyi1/Vuls/blob/main/250111-AiShanDong/250111-AiShanDong.pdf",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/ZhouZiyi1/Vuls/blob/main/250111-AiShanDong/250111-AiShanDong.pdf",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,20 +2,63 @@
|
||||
"id": "CVE-2025-25325",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-27T16:15:39.870",
|
||||
"lastModified": "2025-02-27T16:15:39.870",
|
||||
"lastModified": "2025-02-28T16:15:38.457",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue in Yibin Fengguan Network Technology Co., Ltd YuPao DirectHire iOS 8.8.0 allows attackers to access sensitive user information via supplying a crafted link."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Un problema en Yibin Fengguan Network Technology Co., Ltd YuPao DirectHire iOS 8.8.0 permite a los atacantes acceder a informaci\u00f3n confidencial del usuario mediante el suministro de un enlace manipulado espec\u00edficamente para ello."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-84"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/ZhouZiyi1/Vuls/blob/main/250112-YuPaoDirectHire/250112-YuPaoDirectHire.pdf",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/ZhouZiyi1/Vuls/blob/main/250112-YuPaoDirectHire/250112-YuPaoDirectHire.pdf",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,20 +2,63 @@
|
||||
"id": "CVE-2025-25326",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-27T16:15:39.987",
|
||||
"lastModified": "2025-02-27T16:15:39.987",
|
||||
"lastModified": "2025-02-28T16:15:38.603",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue in Merchants Union Consumer Finance Company Limited Merchants Union Finance iOS 6.19.0 allows attackers to access sensitive user information via supplying a crafted link."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Un problema en Merchants Union Consumer Finance Company Limited Merchants Union Finance iOS 6.19.0 permite a los atacantes acceder a informaci\u00f3n confidencial del usuario mediante el suministro de un enlace manipulado espec\u00edficamente para ello."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-84"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/ZhouZiyi1/Vuls/blob/main/250115-MerchantsUnionFinance/250115-MerchantsUnionFinance.pdf",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/ZhouZiyi1/Vuls/blob/main/250115-MerchantsUnionFinance/250115-MerchantsUnionFinance.pdf",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,20 +2,63 @@
|
||||
"id": "CVE-2025-25329",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-27T17:15:16.773",
|
||||
"lastModified": "2025-02-27T17:15:16.773",
|
||||
"lastModified": "2025-02-28T16:15:38.760",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue in Tencent Technology (Beijing) Company Limited Tencent MicroVision iOS 8.137.0 allows attackers to access sensitive user information via supplying a crafted link."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Un problema en Tencent Technology (Beijing) Company Limited Tencent MicroVision iOS 8.137.0 permite a los atacantes acceder a informaci\u00f3n confidencial del usuario mediante el suministro de un enlace manipulado espec\u00edficamente para ello."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-84"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/ZhouZiyi1/Vuls/blob/main/250116-TencentMicroVision/250116-TencentMicroVision.pdf",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/ZhouZiyi1/Vuls/blob/main/250116-TencentMicroVision/250116-TencentMicroVision.pdf",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,20 +2,63 @@
|
||||
"id": "CVE-2025-25330",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-27T16:15:40.103",
|
||||
"lastModified": "2025-02-27T16:15:40.103",
|
||||
"lastModified": "2025-02-28T16:15:38.913",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue in Boohee Technology Boohee Health iOS 13.0.13 allows attackers to access sensitive user information via supplying a crafted link."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Un problema en Boohee Technology Boohee Health iOS 13.0.13 permite a los atacantes acceder a informaci\u00f3n confidencial del usuario mediante el suministro de un enlace manipulado espec\u00edficamente para ello."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-84"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/ZhouZiyi1/Vuls/blob/main/250116-BooheeHealth/250116-BooheeHealth.pdf",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/ZhouZiyi1/Vuls/blob/main/250116-BooheeHealth/250116-BooheeHealth.pdf",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,20 +2,63 @@
|
||||
"id": "CVE-2025-25331",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-27T16:15:40.217",
|
||||
"lastModified": "2025-02-27T16:15:40.217",
|
||||
"lastModified": "2025-02-28T16:15:39.067",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue in Beitatong Technology LianJia iOS 9.83.50 allows attackers to access sensitive user information via supplying a crafted link."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Un problema en Beitatong Technology LianJia iOS 9.83.50 permite a los atacantes acceder a informaci\u00f3n confidencial del usuario mediante el suministro de un enlace manipulado espec\u00edficamente para ello."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-84"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/ZhouZiyi1/Vuls/blob/main/250116-LianJia/250116-LianJia.pdf",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/ZhouZiyi1/Vuls/blob/main/250116-LianJia/250116-LianJia.pdf",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,20 +2,63 @@
|
||||
"id": "CVE-2025-25334",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-27T16:15:40.463",
|
||||
"lastModified": "2025-02-27T16:15:40.463",
|
||||
"lastModified": "2025-02-28T16:15:39.220",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue in Suning Commerce Group Suning EMall iOS 9.5.198 allows attackers to access sensitive user information via supplying a crafted link."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Un problema en Suning Commerce Group Suning EMall iOS 9.5.198 permite a los atacantes acceder a informaci\u00f3n confidencial del usuario mediante el suministro de un enlace manipulado espec\u00edficamente para ello."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-84"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/ZhouZiyi1/Vuls/blob/main/250116-SuningEMall/250116-SuningEMall.pdf",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/ZhouZiyi1/Vuls/blob/main/250116-SuningEMall/250116-SuningEMall.pdf",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
64
CVE-2025/CVE-2025-254xx/CVE-2025-25461.json
Normal file
64
CVE-2025/CVE-2025-254xx/CVE-2025-25461.json
Normal file
@ -0,0 +1,64 @@
|
||||
{
|
||||
"id": "CVE-2025-25461",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-28T16:15:39.387",
|
||||
"lastModified": "2025-02-28T16:15:39.387",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A Stored Cross-Site Scripting (XSS) vulnerability exists in SeedDMS 6.0.29. A user or rogue admin with the \"Add Category\" permission can inject a malicious XSS payload into the category name field. When a document is subsequently associated with this category, the payload is stored on the server and rendered without proper sanitization or output encoding. This results in the XSS payload executing in the browser of any user who views the document."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/RoNiXxCybSeC0101/CVE-2025-25461",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.seeddms.org/",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/RoNiXxCybSeC0101/CVE-2025-25461",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-25477",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-28T00:15:36.380",
|
||||
"lastModified": "2025-02-28T00:15:36.380",
|
||||
"lastModified": "2025-02-28T16:15:39.550",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "A host header injection vulnerability in SysPass 3.2x allows an attacker to load malicious JS files from an arbitrary domain which would be executed in the victim's browser."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N",
|
||||
"baseScore": 8.1,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-74"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/sysentr0py/CVEs/tree/main/CVE-2025-25477",
|
||||
|
@ -2,20 +2,81 @@
|
||||
"id": "CVE-2025-25513",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-24T22:15:22.807",
|
||||
"lastModified": "2025-02-24T22:15:22.807",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-02-28T16:07:41.847",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Seacms <=13.3 is vulnerable to SQL Injection in admin_members.php."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": " Seacms <=13.3 es vulnerable a la inyecci\u00f3n SQL en admin_members.php."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"url": "https://github.com/Colorado-all/cve/blob/main/seacms/seacms%20V13.3-sql-1.md",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:seacms:seacms:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "13.3",
|
||||
"matchCriteriaId": "C75904E7-D260-47F7-9D21-2751E901FA86"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Colorado-all/cve/blob/main/seacms/seacms%20V13.3-sql-1.md",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-25729",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-28T00:15:36.827",
|
||||
"lastModified": "2025-02-28T00:15:36.827",
|
||||
"lastModified": "2025-02-28T16:15:39.707",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "An information disclosure vulnerability in Bosscomm IF740 Firmware versions:11001.7078 & v11001.0000 and System versions: 6.25 & 6.00 allows attackers to obtain hardcoded cleartext credentials via the update or boot process."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-200"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gainsec.com/2025/02/27/cve-2025-25727cve-2025-25728cve-2025-25729-multiple-vulnerabilities-found-in-bosscomm-obd2-tablet/",
|
||||
|
64
CVE-2025/CVE-2025-259xx/CVE-2025-25916.json
Normal file
64
CVE-2025/CVE-2025-259xx/CVE-2025-25916.json
Normal file
@ -0,0 +1,64 @@
|
||||
{
|
||||
"id": "CVE-2025-25916",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-28T15:15:13.613",
|
||||
"lastModified": "2025-02-28T16:15:39.867",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "wuzhicms v4.1.0 has a Cross Site Scripting (XSS) vulnerability in del function in \\coreframe\\app\\member\\admin\\group.php."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/A7cc/e28b5790d8b40df8d418d1bd15c25d12",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/wuzhicms/wuzhicms/issues/213",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/wuzhicms/wuzhicms/issues/213",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2025/CVE-2025-260xx/CVE-2025-26047.json
Normal file
21
CVE-2025/CVE-2025-260xx/CVE-2025-26047.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2025-26047",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-28T16:15:40.020",
|
||||
"lastModified": "2025-02-28T16:15:40.020",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Loggrove v1.0 is vulnerable to SQL Injection in the read.py file."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gitee.com/olajowon/loggrove/issues/IBJXG8",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
25
CVE-2025/CVE-2025-262xx/CVE-2025-26263.json
Normal file
25
CVE-2025/CVE-2025-262xx/CVE-2025-26263.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2025-26263",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-28T16:15:40.127",
|
||||
"lastModified": "2025-02-28T16:15:40.127",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "GeoVision ASManager Windows desktop application with the version 6.1.2.0 or less, is vulnerable to credentials disclosure due to improper memory handling in the ASManagerService.exe process."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/DRAGOWN/CVE-2025-26263",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.geovision.com.tw/download/product/GV-ASManager",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
25
CVE-2025/CVE-2025-263xx/CVE-2025-26326.json
Normal file
25
CVE-2025/CVE-2025-263xx/CVE-2025-26326.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2025-26326",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-28T15:15:13.743",
|
||||
"lastModified": "2025-02-28T15:15:13.743",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability in the remote connection complements of the NVDA (Nonvisual Desktop Access) 2024.4.1 and 2024.4.2 was identified, which allows an attacker to obtain total control of the remote system when guessing a weak password. The problem occurs because the complements accept any password typed by the user and do not have an additional authentication or checking mechanism by the computer that will be accessed. Tests indicate that over 1,000 systems use easy to guess passwords, many with less than 4 to 6 characters, including common sequences. This enables brute strength or attempt and error attacks on the part of malicious invaders. Vulnerability can be explored by a remote striker who knows or can guess the password used in the connection. As a result, the invader gets complete access to the affected system and can run commands, modify files and compromise user security."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/azurejoga/CVE-2025-26326",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.nvaccess.org",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2025-27133",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-02-24T19:15:14.763",
|
||||
"lastModified": "2025-02-24T19:15:14.763",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-02-28T16:07:41.847",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "WeGIA is a Web manager for charitable institutions. A SQL Injection vulnerability was discovered in the WeGIA application prior to version 3.2.15 at the `adicionar_tipo_exame.php` endpoint. This vulnerability allows an authorized attacker to execute arbitrary SQL queries, allowing access to sensitive information. Version 3.2.15 contains a patch for the issue."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "WeGIA es un gestor web para instituciones ben\u00e9ficas. Se descubri\u00f3 una vulnerabilidad de inyecci\u00f3n SQL en la aplicaci\u00f3n WeGIA anterior a la versi\u00f3n 3.2.15 en el endpoint `adicionar_tipo_exame.php`. Esta vulnerabilidad permite a un atacante autorizado ejecutar consultas SQL arbitrarias, lo que permite el acceso a informaci\u00f3n confidencial. La versi\u00f3n 3.2.15 contiene un parche para el problema."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -26,35 +30,57 @@
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnerableSystemConfidentiality": "HIGH",
|
||||
"vulnerableSystemIntegrity": "HIGH",
|
||||
"vulnerableSystemAvailability": "HIGH",
|
||||
"subsequentSystemConfidentiality": "HIGH",
|
||||
"subsequentSystemIntegrity": "HIGH",
|
||||
"subsequentSystemAvailability": "HIGH",
|
||||
"vulnConfidentialityImpact": "HIGH",
|
||||
"vulnIntegrityImpact": "HIGH",
|
||||
"vulnAvailabilityImpact": "HIGH",
|
||||
"subConfidentialityImpact": "HIGH",
|
||||
"subIntegrityImpact": "HIGH",
|
||||
"subAvailabilityImpact": "HIGH",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
@ -69,14 +95,39 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "https://github.com/LabRedesCefetRJ/WeGIA/commit/619ead748e18e685459c6dc3c226e621b9ff5403",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
"nodes": [
|
||||
{
|
||||
"url": "https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-xj79-w799-qjcp",
|
||||
"source": "security-advisories@github.com"
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:wegia:wegia:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "3.2.15",
|
||||
"matchCriteriaId": "4033D4E0-87CC-418C-BBA1-C63CF2C4F09C"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/LabRedesCefetRJ/WeGIA/commit/619ead748e18e685459c6dc3c226e621b9ff5403",
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-xj79-w799-qjcp",
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2025-27140",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-02-24T22:15:22.913",
|
||||
"lastModified": "2025-02-24T22:15:22.913",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-02-28T16:07:41.847",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "WeGIA is a Web manager for charitable institutions. An OS Command Injection vulnerability was discovered in versions prior to 3.2.15 of the WeGIA application, `importar_dump.php` endpoint. This vulnerability could allow an attacker to execute arbitrary code remotely. The command is basically a command to move a temporary file, so a webshell upload is also possible. Version 3.2.15 contains a patch for the issue."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": " WeGIA es un gestor web para instituciones ben\u00e9ficas. Se descubri\u00f3 una vulnerabilidad de inyecci\u00f3n de comandos en el sistema operativo en versiones anteriores a la 3.2.15 de la aplicaci\u00f3n WeGIA, endpoint `importar_dump.php`. Esta vulnerabilidad podr\u00eda permitir a un atacante ejecutar c\u00f3digo arbitrario de forma remota. El comando es b\u00e1sicamente un comando para mover un archivo temporal, por lo que tambi\u00e9n es posible una carga mediante webshell. La versi\u00f3n 3.2.15 contiene un parche para el problema."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -26,35 +30,57 @@
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"vulnerableSystemConfidentiality": "HIGH",
|
||||
"vulnerableSystemIntegrity": "HIGH",
|
||||
"vulnerableSystemAvailability": "HIGH",
|
||||
"subsequentSystemConfidentiality": "HIGH",
|
||||
"subsequentSystemIntegrity": "HIGH",
|
||||
"subsequentSystemAvailability": "HIGH",
|
||||
"vulnConfidentialityImpact": "HIGH",
|
||||
"vulnIntegrityImpact": "HIGH",
|
||||
"vulnAvailabilityImpact": "HIGH",
|
||||
"subConfidentialityImpact": "HIGH",
|
||||
"subIntegrityImpact": "HIGH",
|
||||
"subAvailabilityImpact": "HIGH",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
@ -71,16 +97,51 @@
|
||||
"value": "CWE-284"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-78"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:wegia:wegia:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "3.2.15",
|
||||
"matchCriteriaId": "4033D4E0-87CC-418C-BBA1-C63CF2C4F09C"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/LabRedesCefetRJ/WeGIA/commit/7d0df8c9a0b8b7d6862bbc23dc729d73e39672a1",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-xw6w-x28r-2p5c",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2025-27141",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-02-24T22:15:23.077",
|
||||
"lastModified": "2025-02-24T22:15:23.077",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-02-28T16:07:41.847",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Metabase Enterprise Edition is the enterprise version of Metabase business intelligence and data analytics software. Starting in version 1.47.0 and prior to versions 1.50.36, 1.51.14, 1.52.11, and 1.53.2 of Metabase Enterprise Edition, users with impersonation permissions may be able to see results of cached questions, even if their permissions don\u2019t allow them to see the data. If some user runs a question which gets cached, and then an impersonated user runs that question, then the impersonated user sees the same results as the previous user. These cached results may include data the impersonated user should not have access to. This vulnerability only impacts the Enterprise Edition of Metabase and not the Open Source Edition. Versions 1.53.2, 1.52.11, 1.51.14, and 1.50.36 contains a patch. Versions on the 1.49.X, 1.48.X, and 1.47.X branches are vulnerable but do not have a patch available, so users should upgrade to a major version with an available fix. Disabling question caching is a workaround for this issue."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Metabase Enterprise Edition es la versi\u00f3n empresarial del software de inteligencia empresarial y an\u00e1lisis de datos Metabase. A partir de la versi\u00f3n 1.47.0 y anteriores a las versiones 1.50.36, 1.51.14, 1.52.11 y 1.53.2 de Metabase Enterprise Edition, los usuarios con permisos de suplantaci\u00f3n de identidad pueden ver los resultados de las preguntas almacenadas en cach\u00e9, incluso si sus permisos no les permiten ver los datos. Si alg\u00fan usuario ejecuta una pregunta que se almacena en cach\u00e9 y luego un usuario suplantado ejecuta esa pregunta, el usuario suplantado ve los mismos resultados que el usuario anterior. Estos resultados almacenados en cach\u00e9 pueden incluir datos a los que el usuario suplantado no deber\u00eda tener acceso. Esta vulnerabilidad solo afecta a la Enterprise Edition de Metabase y no a la Open Source Edition. Las versiones 1.53.2, 1.52.11, 1.51.14 y 1.50.36 contienen un parche. Las versiones de las ramas 1.49.X, 1.48.X y 1.47.X son vulnerables, pero no tienen un parche disponible, por lo que los usuarios deben actualizar a una versi\u00f3n principal con una soluci\u00f3n disponible. Deshabilitar el almacenamiento en cach\u00e9 de preguntas es un workaround para este problema."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -26,35 +30,57 @@
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "ACTIVE",
|
||||
"vulnerableSystemConfidentiality": "NONE",
|
||||
"vulnerableSystemIntegrity": "NONE",
|
||||
"vulnerableSystemAvailability": "NONE",
|
||||
"subsequentSystemConfidentiality": "LOW",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"vulnConfidentialityImpact": "NONE",
|
||||
"vulnIntegrityImpact": "NONE",
|
||||
"vulnAvailabilityImpact": "NONE",
|
||||
"subConfidentialityImpact": "LOW",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
@ -69,18 +95,67 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "https://github.com/metabase/metabase/security/advisories/GHSA-6cc4-h534-xh5p",
|
||||
"source": "security-advisories@github.com"
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:metabase:metabase:*:*:*:*:enterprise:*:*:*",
|
||||
"versionStartIncluding": "1.47.0",
|
||||
"versionEndExcluding": "1.50.36",
|
||||
"matchCriteriaId": "AACC8509-72A6-4D34-834D-2E28DEE43E3B"
|
||||
},
|
||||
{
|
||||
"url": "https://www.metabase.com/docs/latest/configuring-metabase/caching",
|
||||
"source": "security-advisories@github.com"
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:metabase:metabase:*:*:*:*:enterprise:*:*:*",
|
||||
"versionStartIncluding": "1.51.0",
|
||||
"versionEndExcluding": "1.51.14",
|
||||
"matchCriteriaId": "838875F9-C45A-4610-9D27-476B440862C9"
|
||||
},
|
||||
{
|
||||
"url": "https://www.metabase.com/docs/latest/permissions/impersonation",
|
||||
"source": "security-advisories@github.com"
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:metabase:metabase:*:*:*:*:enterprise:*:*:*",
|
||||
"versionStartIncluding": "1.52.0",
|
||||
"versionEndExcluding": "1.52.11",
|
||||
"matchCriteriaId": "CAF5BC90-DC75-40EA-9ACA-EECB3E56EAD2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:metabase:metabase:*:*:*:*:enterprise:*:*:*",
|
||||
"versionStartIncluding": "1.53.0",
|
||||
"versionEndExcluding": "1.53.2",
|
||||
"matchCriteriaId": "F93B3622-0521-479F-817F-378FA03854AA"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/metabase/metabase/security/advisories/GHSA-6cc4-h534-xh5p",
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.metabase.com/docs/latest/configuring-metabase/caching",
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Technical Description"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.metabase.com/docs/latest/permissions/impersonation",
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Technical Description"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2025-27143",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-02-24T23:15:11.160",
|
||||
"lastModified": "2025-02-24T23:15:11.160",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-02-28T16:07:41.847",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Better Auth is an authentication and authorization library for TypeScript. Prior to version 1.1.21, the application is vulnerable to an open redirect due to improper validation of the callbackURL parameter in the email verification endpoint and any other endpoint that accepts callback url. While the server blocks fully qualified URLs, it incorrectly allows scheme-less URLs. This results in the browser interpreting the URL as a fully qualified URL, leading to unintended redirection. An attacker can exploit this flaw by crafting a malicious verification link and tricking users into clicking it. Upon successful email verification, the user will be automatically redirected to the attacker's website, which can be used for phishing, malware distribution, or stealing sensitive authentication tokens. This CVE is a bypass of the fix for GHSA-8jhw-6pjj-8723/CVE-2024-56734. Version 1.1.21 contains an updated patch."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Better Auth es una librer\u00eda de autenticaci\u00f3n y autorizaci\u00f3n para TypeScript. Antes de la versi\u00f3n 1.1.21, la aplicaci\u00f3n era vulnerable a una redirecci\u00f3n abierta debido a una validaci\u00f3n incorrecta del par\u00e1metro callbackURL en el endpoint de verificaci\u00f3n de correo electr\u00f3nico y cualquier otro endpoint que acepte una URL de devoluci\u00f3n de llamada. Si bien el servidor bloquea las URL completamente calificadas, permite incorrectamente las URL sin esquema. Esto hace que el navegador interprete la URL como una URL completamente calificada, lo que genera una redirecci\u00f3n no deseada. Un atacante puede explotar este fallo creando un enlace de verificaci\u00f3n malicioso y enga\u00f1ando a los usuarios para que hagan clic en \u00e9l. Tras una verificaci\u00f3n de correo electr\u00f3nico exitosa, el usuario ser\u00e1 redirigido autom\u00e1ticamente al sitio web del atacante, que puede usarse para suplantaci\u00f3n de identidad, distribuci\u00f3n de malware o robo de tokens de autenticaci\u00f3n confidenciales. Esta CVE es una omisi\u00f3n de la correcci\u00f3n para GHSA-8jhw-6pjj-8723/CVE-2024-56734. La versi\u00f3n 1.1.21 contiene un parche actualizado."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -26,35 +30,57 @@
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"vulnerableSystemConfidentiality": "NONE",
|
||||
"vulnerableSystemIntegrity": "NONE",
|
||||
"vulnerableSystemAvailability": "NONE",
|
||||
"subsequentSystemConfidentiality": "LOW",
|
||||
"subsequentSystemIntegrity": "LOW",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"vulnConfidentialityImpact": "NONE",
|
||||
"vulnIntegrityImpact": "NONE",
|
||||
"vulnAvailabilityImpact": "NONE",
|
||||
"subConfidentialityImpact": "LOW",
|
||||
"subIntegrityImpact": "LOW",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
@ -69,26 +95,59 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "https://github.com/better-auth/better-auth/commit/24659aefc35a536b95ea4e5347e52c8803910153",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
"nodes": [
|
||||
{
|
||||
"url": "https://github.com/better-auth/better-auth/commit/b381cac7aafd6aa53ef78b6ab771ebfa24643c80",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"url": "https://github.com/better-auth/better-auth/releases/tag/v1.1.21",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/better-auth/better-auth/security/advisories/GHSA-8jhw-6pjj-8723",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/better-auth/better-auth/security/advisories/GHSA-hjpm-7mrm-26w8",
|
||||
"source": "security-advisories@github.com"
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:better-auth:better_auth:*:*:*:*:*:node.js:*:*",
|
||||
"versionEndExcluding": "1.1.21",
|
||||
"matchCriteriaId": "31BED966-390F-4645-B4C8-DD62F07542B4"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/better-auth/better-auth/commit/24659aefc35a536b95ea4e5347e52c8803910153",
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/better-auth/better-auth/commit/b381cac7aafd6aa53ef78b6ab771ebfa24643c80",
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/better-auth/better-auth/releases/tag/v1.1.21",
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/better-auth/better-auth/security/advisories/GHSA-8jhw-6pjj-8723",
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Not Applicable"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/better-auth/better-auth/security/advisories/GHSA-hjpm-7mrm-26w8",
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
98
CVE-2025/CVE-2025-274xx/CVE-2025-27400.json
Normal file
98
CVE-2025/CVE-2025-274xx/CVE-2025-27400.json
Normal file
@ -0,0 +1,98 @@
|
||||
{
|
||||
"id": "CVE-2025-27400",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-02-28T16:15:40.237",
|
||||
"lastModified": "2025-02-28T16:15:40.237",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Magento Long Term Support (LTS) is an unofficial, community-driven project provides an alternative to the Magento Community Edition e-commerce platform with a high level of backward compatibility. Versions prior to 20.12.3 and 20.13.1 contain a vulnerability that allows script execution in the admin panel which could lead to cross-site scripting against authenticated admin users. The attack requires an admin user with configuration access, so in practicality it is not very likely to be useful given that a user with this level of access is probably already a full admin. Versions 20.12.3 and 20.13.1 contain a patch for the issue."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:N/I:L/A:L",
|
||||
"baseScore": 2.9,
|
||||
"baseSeverity": "LOW",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 0.4,
|
||||
"impactScore": 2.5
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:N/I:L/A:L",
|
||||
"baseScore": 2.9,
|
||||
"baseSeverity": "LOW",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 0.4,
|
||||
"impactScore": 2.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/OpenMage/magento-lts/commit/d307e5bf75729a2347dde0952fe9fd9fcd9c6aea",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/OpenMage/magento-lts/releases/tag/v20.12.3",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/OpenMage/magento-lts/releases/tag/v20.13.0",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/OpenMage/magento-lts/security/advisories/GHSA-5pxh-89cx-4668",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
79
README.md
79
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2025-02-28T15:00:20.043026+00:00
|
||||
2025-02-28T17:00:19.921748+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2025-02-28T14:53:55.297000+00:00
|
||||
2025-02-28T16:15:40.237000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,56 +33,51 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
283514
|
||||
283521
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `12`
|
||||
Recently added CVEs: `7`
|
||||
|
||||
- [CVE-2025-1300](CVE-2025/CVE-2025-13xx/CVE-2025-1300.json) (`2025-02-28T13:15:27.043`)
|
||||
- [CVE-2025-1319](CVE-2025/CVE-2025-13xx/CVE-2025-1319.json) (`2025-02-28T13:15:27.267`)
|
||||
- [CVE-2025-1746](CVE-2025/CVE-2025-17xx/CVE-2025-1746.json) (`2025-02-28T14:15:34.943`)
|
||||
- [CVE-2025-1747](CVE-2025/CVE-2025-17xx/CVE-2025-1747.json) (`2025-02-28T14:15:35.480`)
|
||||
- [CVE-2025-1748](CVE-2025/CVE-2025-17xx/CVE-2025-1748.json) (`2025-02-28T14:15:35.617`)
|
||||
- [CVE-2025-1749](CVE-2025/CVE-2025-17xx/CVE-2025-1749.json) (`2025-02-28T14:15:35.760`)
|
||||
- [CVE-2025-1776](CVE-2025/CVE-2025-17xx/CVE-2025-1776.json) (`2025-02-28T14:15:35.943`)
|
||||
- [CVE-2025-22270](CVE-2025/CVE-2025-222xx/CVE-2025-22270.json) (`2025-02-28T13:15:27.447`)
|
||||
- [CVE-2025-22271](CVE-2025/CVE-2025-222xx/CVE-2025-22271.json) (`2025-02-28T13:15:27.630`)
|
||||
- [CVE-2025-22272](CVE-2025/CVE-2025-222xx/CVE-2025-22272.json) (`2025-02-28T13:15:27.770`)
|
||||
- [CVE-2025-22273](CVE-2025/CVE-2025-222xx/CVE-2025-22273.json) (`2025-02-28T13:15:27.927`)
|
||||
- [CVE-2025-22274](CVE-2025/CVE-2025-222xx/CVE-2025-22274.json) (`2025-02-28T13:15:28.067`)
|
||||
- [CVE-2024-44754](CVE-2024/CVE-2024-447xx/CVE-2024-44754.json) (`2025-02-28T16:15:37.883`)
|
||||
- [CVE-2025-25461](CVE-2025/CVE-2025-254xx/CVE-2025-25461.json) (`2025-02-28T16:15:39.387`)
|
||||
- [CVE-2025-25916](CVE-2025/CVE-2025-259xx/CVE-2025-25916.json) (`2025-02-28T15:15:13.613`)
|
||||
- [CVE-2025-26047](CVE-2025/CVE-2025-260xx/CVE-2025-26047.json) (`2025-02-28T16:15:40.020`)
|
||||
- [CVE-2025-26263](CVE-2025/CVE-2025-262xx/CVE-2025-26263.json) (`2025-02-28T16:15:40.127`)
|
||||
- [CVE-2025-26326](CVE-2025/CVE-2025-263xx/CVE-2025-26326.json) (`2025-02-28T15:15:13.743`)
|
||||
- [CVE-2025-27400](CVE-2025/CVE-2025-274xx/CVE-2025-27400.json) (`2025-02-28T16:15:40.237`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `52`
|
||||
Recently modified CVEs: `42`
|
||||
|
||||
- [CVE-2021-3929](CVE-2021/CVE-2021-39xx/CVE-2021-3929.json) (`2025-02-28T13:15:25.913`)
|
||||
- [CVE-2022-22587](CVE-2022/CVE-2022-225xx/CVE-2022-22587.json) (`2025-02-28T14:53:55.297`)
|
||||
- [CVE-2022-22620](CVE-2022/CVE-2022-226xx/CVE-2022-22620.json) (`2025-02-28T14:44:48.713`)
|
||||
- [CVE-2022-22674](CVE-2022/CVE-2022-226xx/CVE-2022-22674.json) (`2025-02-28T14:53:55.297`)
|
||||
- [CVE-2022-32893](CVE-2022/CVE-2022-328xx/CVE-2022-32893.json) (`2025-02-28T14:53:55.297`)
|
||||
- [CVE-2022-32894](CVE-2022/CVE-2022-328xx/CVE-2022-32894.json) (`2025-02-28T14:53:55.297`)
|
||||
- [CVE-2022-32917](CVE-2022/CVE-2022-329xx/CVE-2022-32917.json) (`2025-02-28T14:53:55.297`)
|
||||
- [CVE-2022-42856](CVE-2022/CVE-2022-428xx/CVE-2022-42856.json) (`2025-02-28T14:44:48.713`)
|
||||
- [CVE-2023-23529](CVE-2023/CVE-2023-235xx/CVE-2023-23529.json) (`2025-02-28T14:53:55.297`)
|
||||
- [CVE-2023-28206](CVE-2023/CVE-2023-282xx/CVE-2023-28206.json) (`2025-02-28T14:53:55.297`)
|
||||
- [CVE-2023-32373](CVE-2023/CVE-2023-323xx/CVE-2023-32373.json) (`2025-02-28T14:53:55.297`)
|
||||
- [CVE-2023-34188](CVE-2023/CVE-2023-341xx/CVE-2023-34188.json) (`2025-02-28T13:15:26.103`)
|
||||
- [CVE-2024-23222](CVE-2024/CVE-2024-232xx/CVE-2024-23222.json) (`2025-02-28T14:53:55.297`)
|
||||
- [CVE-2024-26306](CVE-2024/CVE-2024-263xx/CVE-2024-26306.json) (`2025-02-28T13:15:26.423`)
|
||||
- [CVE-2024-36259](CVE-2024/CVE-2024-362xx/CVE-2024-36259.json) (`2025-02-28T13:35:22.340`)
|
||||
- [CVE-2024-40896](CVE-2024/CVE-2024-408xx/CVE-2024-40896.json) (`2025-02-28T13:15:26.640`)
|
||||
- [CVE-2025-0395](CVE-2025/CVE-2025-03xx/CVE-2025-0395.json) (`2025-02-28T13:15:26.860`)
|
||||
- [CVE-2025-23046](CVE-2025/CVE-2025-230xx/CVE-2025-23046.json) (`2025-02-28T13:35:22.340`)
|
||||
- [CVE-2025-23083](CVE-2025/CVE-2025-230xx/CVE-2025-23083.json) (`2025-02-28T13:15:28.213`)
|
||||
- [CVE-2025-24085](CVE-2025/CVE-2025-240xx/CVE-2025-24085.json) (`2025-02-28T14:44:48.713`)
|
||||
- [CVE-2025-25192](CVE-2025/CVE-2025-251xx/CVE-2025-25192.json) (`2025-02-28T13:35:22.340`)
|
||||
- [CVE-2025-26465](CVE-2025/CVE-2025-264xx/CVE-2025-26465.json) (`2025-02-28T13:15:28.343`)
|
||||
- [CVE-2025-27110](CVE-2025/CVE-2025-271xx/CVE-2025-27110.json) (`2025-02-28T13:35:22.340`)
|
||||
- [CVE-2025-27139](CVE-2025/CVE-2025-271xx/CVE-2025-27139.json) (`2025-02-28T13:35:22.340`)
|
||||
- [CVE-2025-27142](CVE-2025/CVE-2025-271xx/CVE-2025-27142.json) (`2025-02-28T13:35:22.340`)
|
||||
- [CVE-2025-21208](CVE-2025/CVE-2025-212xx/CVE-2025-21208.json) (`2025-02-28T16:02:50.353`)
|
||||
- [CVE-2025-21212](CVE-2025/CVE-2025-212xx/CVE-2025-21212.json) (`2025-02-28T16:02:50.353`)
|
||||
- [CVE-2025-21216](CVE-2025/CVE-2025-212xx/CVE-2025-21216.json) (`2025-02-28T16:02:50.353`)
|
||||
- [CVE-2025-21254](CVE-2025/CVE-2025-212xx/CVE-2025-21254.json) (`2025-02-28T16:02:50.353`)
|
||||
- [CVE-2025-21259](CVE-2025/CVE-2025-212xx/CVE-2025-21259.json) (`2025-02-28T16:02:50.353`)
|
||||
- [CVE-2025-21322](CVE-2025/CVE-2025-213xx/CVE-2025-21322.json) (`2025-02-28T16:02:50.353`)
|
||||
- [CVE-2025-21337](CVE-2025/CVE-2025-213xx/CVE-2025-21337.json) (`2025-02-28T16:02:50.353`)
|
||||
- [CVE-2025-21347](CVE-2025/CVE-2025-213xx/CVE-2025-21347.json) (`2025-02-28T16:02:50.353`)
|
||||
- [CVE-2025-21349](CVE-2025/CVE-2025-213xx/CVE-2025-21349.json) (`2025-02-28T16:02:50.353`)
|
||||
- [CVE-2025-21350](CVE-2025/CVE-2025-213xx/CVE-2025-21350.json) (`2025-02-28T16:02:50.353`)
|
||||
- [CVE-2025-25323](CVE-2025/CVE-2025-253xx/CVE-2025-25323.json) (`2025-02-28T16:15:38.153`)
|
||||
- [CVE-2025-25324](CVE-2025/CVE-2025-253xx/CVE-2025-25324.json) (`2025-02-28T16:15:38.307`)
|
||||
- [CVE-2025-25325](CVE-2025/CVE-2025-253xx/CVE-2025-25325.json) (`2025-02-28T16:15:38.457`)
|
||||
- [CVE-2025-25326](CVE-2025/CVE-2025-253xx/CVE-2025-25326.json) (`2025-02-28T16:15:38.603`)
|
||||
- [CVE-2025-25329](CVE-2025/CVE-2025-253xx/CVE-2025-25329.json) (`2025-02-28T16:15:38.760`)
|
||||
- [CVE-2025-25330](CVE-2025/CVE-2025-253xx/CVE-2025-25330.json) (`2025-02-28T16:15:38.913`)
|
||||
- [CVE-2025-25331](CVE-2025/CVE-2025-253xx/CVE-2025-25331.json) (`2025-02-28T16:15:39.067`)
|
||||
- [CVE-2025-25334](CVE-2025/CVE-2025-253xx/CVE-2025-25334.json) (`2025-02-28T16:15:39.220`)
|
||||
- [CVE-2025-25477](CVE-2025/CVE-2025-254xx/CVE-2025-25477.json) (`2025-02-28T16:15:39.550`)
|
||||
- [CVE-2025-25513](CVE-2025/CVE-2025-255xx/CVE-2025-25513.json) (`2025-02-28T16:07:41.847`)
|
||||
- [CVE-2025-25729](CVE-2025/CVE-2025-257xx/CVE-2025-25729.json) (`2025-02-28T16:15:39.707`)
|
||||
- [CVE-2025-27133](CVE-2025/CVE-2025-271xx/CVE-2025-27133.json) (`2025-02-28T16:07:41.847`)
|
||||
- [CVE-2025-27140](CVE-2025/CVE-2025-271xx/CVE-2025-27140.json) (`2025-02-28T16:07:41.847`)
|
||||
- [CVE-2025-27141](CVE-2025/CVE-2025-271xx/CVE-2025-27141.json) (`2025-02-28T16:07:41.847`)
|
||||
- [CVE-2025-27143](CVE-2025/CVE-2025-271xx/CVE-2025-27143.json) (`2025-02-28T16:07:41.847`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
219
_state.csv
219
_state.csv
@ -87889,8 +87889,8 @@ CVE-2016-4652,0,0,743b4e077d1600bf8aaea43c6730d83c83cdf30b8c52a624555f460f8e9989
|
||||
CVE-2016-4653,0,0,d894561ed26d3c592147a1313b1920ac20102bdee2962e3accda329b1da3b733,2024-11-21T02:52:42.343000
|
||||
CVE-2016-4654,0,0,74af2c171ca29b607036a19152933e201bbd895eb1ffcae27d358251dc54de64,2024-11-21T02:52:42.490000
|
||||
CVE-2016-4655,0,0,f3b2e2852359ec879f695defe2b724c840abee2b548d4c99ea49aea75b4f9d75,2025-02-04T21:03:31.853000
|
||||
CVE-2016-4656,0,1,311680fe0bb8cd88c66a9ead4a59631b992b995dd27bde0e785b2153f57c5d72,2025-02-28T14:53:55.297000
|
||||
CVE-2016-4657,0,1,f9e7d8d08b3ff494867f78b57ecd0bfe788b1cac1fecbc625ad44ea7cb25e45d,2025-02-28T14:44:48.713000
|
||||
CVE-2016-4656,0,0,311680fe0bb8cd88c66a9ead4a59631b992b995dd27bde0e785b2153f57c5d72,2025-02-28T14:53:55.297000
|
||||
CVE-2016-4657,0,0,f9e7d8d08b3ff494867f78b57ecd0bfe788b1cac1fecbc625ad44ea7cb25e45d,2025-02-28T14:44:48.713000
|
||||
CVE-2016-4658,0,0,075d3f82167218a13fe5a4cbb749a67c510179ede31fc77656bd872b094e7c8c,2024-11-21T02:52:43.043000
|
||||
CVE-2016-4659,0,0,24e16ca19628f69d9a5abdf267f119d264b31393a70db6d894d0d0cf653fe29f,2023-11-07T02:32:42.950000
|
||||
CVE-2016-4660,0,0,537ac03788d6e6fda7aeabd3bac1e8e212429a779adefa296b409ec2fbc15d68,2024-11-21T02:52:43.220000
|
||||
@ -122903,7 +122903,7 @@ CVE-2018-4340,0,0,b43a7e0ee120ba44162f384df239fbe47b66e855e37863afa72de3a193e074
|
||||
CVE-2018-4341,0,0,dea7e02377f1c376cd8c7dd3f2fc7eec24381821f6351ee5ef277a5dff751657,2024-11-21T04:07:13.693000
|
||||
CVE-2018-4342,0,0,b3f59b2ac0e3061a3d11a75df46b1eb40d080946d103d59cb30c9ce21652eb54,2024-11-21T04:07:13.817000
|
||||
CVE-2018-4343,0,0,9bd920e62f902f0e28bf3098ea4a2540290dbc2e43262cff2b5daf96ec73e24b,2024-11-21T04:07:13.930000
|
||||
CVE-2018-4344,0,1,c9cbae5048691b8f23ebfa2f3f2b1e95414a32ac0980b5ff328d938005ad17b8,2025-02-28T14:53:55.297000
|
||||
CVE-2018-4344,0,0,c9cbae5048691b8f23ebfa2f3f2b1e95414a32ac0980b5ff328d938005ad17b8,2025-02-28T14:53:55.297000
|
||||
CVE-2018-4345,0,0,d451457e99571660e2050d70a45a870ea804274a1fb75662fd8abb18d7011d71,2024-11-21T04:07:14.190000
|
||||
CVE-2018-4346,0,0,c4f593031dd265962878bb12b22a5c97f896433c5c8288900694de10de896240,2024-11-21T04:07:14.320000
|
||||
CVE-2018-4347,0,0,355d9b8cce85661c40a474957973641c83e188a4cf32f3c1f7abbba32c8c1096,2024-11-21T04:07:14.437000
|
||||
@ -141290,7 +141290,7 @@ CVE-2019-6219,0,0,51fb8aba06c50f5beb34035c1b242a41d19be52942c31c18d7c2bc7a8531d9
|
||||
CVE-2019-6220,0,0,cbf2407952b07ecf4492f093b5fc103d1b2a227a81b385b9faca3d2d185c14eb,2024-11-21T04:46:15.033000
|
||||
CVE-2019-6221,0,0,f50ee778054e49605f683211032acfa21388b43f0c6177a6b438d11f78a69b76,2024-11-21T04:46:15.137000
|
||||
CVE-2019-6222,0,0,b2e119bf8c2ad53cb80edcff569884b3877b26f333c41130791c9bc95e585fe3,2024-11-21T04:46:15.247000
|
||||
CVE-2019-6223,0,1,b0a1cf0311e6d7b17e3a1c232bfe5aa56b83af594803c0ed83b1b8e17a3d6f48,2025-02-28T14:53:55.297000
|
||||
CVE-2019-6223,0,0,b0a1cf0311e6d7b17e3a1c232bfe5aa56b83af594803c0ed83b1b8e17a3d6f48,2025-02-28T14:53:55.297000
|
||||
CVE-2019-6224,0,0,ecfbf121a69bfc82d1550f3281adf5d3bf177bace8e5f517f9f0d32509cf5d40,2024-11-21T04:46:15.460000
|
||||
CVE-2019-6225,0,0,ce41491fd66792659c0d145bd85753c0d55c4ec7b1ab133ce86b89f9ab9f2ca5,2024-11-21T04:46:15.573000
|
||||
CVE-2019-6226,0,0,2aa666681d279cd3af63767890ce00e7894e99d62118a90ff3d1b5e4f08ebd09,2024-11-21T04:46:15.687000
|
||||
@ -142061,7 +142061,7 @@ CVE-2019-7283,0,0,feffafb71756ca36d7ebb5e5732cf21c65af1eef8b0b4a000a01722bcbf9d7
|
||||
CVE-2019-7284,0,0,4f4944ffaef6b9ae94cd5db36f56541cb3730404bdacdc17a02e650c89f80cde,2024-11-21T04:47:55.540000
|
||||
CVE-2019-7285,0,0,313d5b7c9ac5d469845e6bfae8fac9cde4a21e9607c8aa24344fef7be804554b,2024-11-21T04:47:55.650000
|
||||
CVE-2019-7286,0,0,02a5092dc2c9edee56617f9cb1cc06cefc2fe17bcd4f6e2cc3426d833d26be53,2025-01-29T18:15:32.340000
|
||||
CVE-2019-7287,0,1,bcea0373ff9cd91321e9961f29326629e8c8c2294f50b6a6965bdf51faf4ab8f,2025-02-28T14:53:55.297000
|
||||
CVE-2019-7287,0,0,bcea0373ff9cd91321e9961f29326629e8c8c2294f50b6a6965bdf51faf4ab8f,2025-02-28T14:53:55.297000
|
||||
CVE-2019-7288,0,0,37259472abe9a71efd7ecb7947dce39a94a93ee4f5a3fc21f4b31239799bffb6,2024-11-21T04:47:56.020000
|
||||
CVE-2019-7289,0,0,490b84305deba02cd9c12685d90ff374698a1976137c62fa8dacb278f2a4b4ee,2024-11-21T04:47:56.150000
|
||||
CVE-2019-7290,0,0,364d38b1b25fabde5737927c410b77a3a82901e5520f715924a529b21f8dd778,2024-11-21T04:47:56.273000
|
||||
@ -142971,7 +142971,7 @@ CVE-2019-8502,0,0,c434befa76a4d4ec9f96079a6522d800615fb7b5a48ac54913486401cebb09
|
||||
CVE-2019-8503,0,0,0fa026e8d1f022ec049b1ca9e49137afb60072dff1e8e2dd72b28d15c80c7f81,2024-11-21T04:49:57.480000
|
||||
CVE-2019-8504,0,0,dbc06dfdb448c3a4a5038f7f7fffd2ddbd9e83bd6911705199749c704ab21b6d,2024-11-21T04:49:57.607000
|
||||
CVE-2019-8505,0,0,e1a01ac4804c5cc3e2fc73634b47f99331a6a4ce7a7c3c2bbfed7c9969ad3586,2024-11-21T04:49:57.723000
|
||||
CVE-2019-8506,0,1,8bc594c9d8b72685a83e0f4e7329dc602a676de64487ea84a22e29044361bae6,2025-02-28T14:44:48.713000
|
||||
CVE-2019-8506,0,0,8bc594c9d8b72685a83e0f4e7329dc602a676de64487ea84a22e29044361bae6,2025-02-28T14:44:48.713000
|
||||
CVE-2019-8507,0,0,b01ebef1a03939c2e3ada65de3c55f419e29cf0247c08ea4d212b6b10f7b019d,2024-11-21T04:49:57.980000
|
||||
CVE-2019-8508,0,0,cef14e0810b1e31a960bc6e50e6e7aba1a448ffacb5ba344f9c35735a88a9bf6,2024-11-21T04:49:58.090000
|
||||
CVE-2019-8509,0,0,ec37506e1999ed61157738d5e3cb9f41d210f01cd362d5aea688c39cd5258611,2024-11-21T04:49:58.203000
|
||||
@ -142991,7 +142991,7 @@ CVE-2019-8522,0,0,0eae3335c616182d312f36c43cae51aa49706785a5e522721af70477311a7b
|
||||
CVE-2019-8523,0,0,58aaa978a7e9de77277ba3f7bc706507334d4693bd0c5521150bdec55490072c,2024-11-21T04:49:59.800000
|
||||
CVE-2019-8524,0,0,32c4b83ccc7f0a278121313d1e2f9075e195d072f0b93eabeb1707ea8b920726,2024-11-21T04:49:59.923000
|
||||
CVE-2019-8525,0,0,6ecd93b661cfa469f49d67d3496d956460a9b9f18cdb8779c33e292274db4eb8,2024-11-21T04:50:00.047000
|
||||
CVE-2019-8526,0,1,df91717360992f75b9a028be6f4e595df112c6423e9a37d36a085ae3717da22f,2025-02-28T14:44:48.713000
|
||||
CVE-2019-8526,0,0,df91717360992f75b9a028be6f4e595df112c6423e9a37d36a085ae3717da22f,2025-02-28T14:44:48.713000
|
||||
CVE-2019-8527,0,0,7f47548387851680e5a961a6246e9e3c27175977bb648565dd45c6a5b3234b0e,2024-11-21T04:50:00.290000
|
||||
CVE-2019-8528,0,0,1639b73f58d13f7ed0ff712ed4ffad30e15b2bab49d4978d2759cd12fc2ee8e7,2024-11-21T04:50:00.423000
|
||||
CVE-2019-8529,0,0,cf361ae2751882bf4341036b0cfea24f00b715e4dc1d6ea3088e8dd4127f4153,2024-11-21T04:50:00.540000
|
||||
@ -143068,7 +143068,7 @@ CVE-2019-8601,0,0,5e1b649cd76c28875d6e8e75de505e8524898c98238cb4a152590695820ca2
|
||||
CVE-2019-8602,0,0,dfd4f0ad81cd404bc76b02e5763cbcb73de09c2d34cedf9136b1b93dd3c3c1d3,2024-11-21T04:50:09.217000
|
||||
CVE-2019-8603,0,0,397ffd36d4e84c621cf449a9fe68c20353e9e5a5e6eeb155fe03bdbf21382c50,2024-11-21T04:50:09.353000
|
||||
CVE-2019-8604,0,0,a865afc630f7beaf44df56caaf7efbc7bcf793b8a0a6e8a16c85b32c7369a571,2024-11-21T04:50:09.463000
|
||||
CVE-2019-8605,0,1,3a2299d2d1bfc7d2195a113ef0e40f429fd6a1ff9c25c8a2ae4da3435809117c,2025-02-28T14:44:48.713000
|
||||
CVE-2019-8605,0,0,3a2299d2d1bfc7d2195a113ef0e40f429fd6a1ff9c25c8a2ae4da3435809117c,2025-02-28T14:44:48.713000
|
||||
CVE-2019-8606,0,0,9d793373058d23a812a6cec3d9e2bdd104d6ee9c23a4401600c30545293a6e9d,2024-11-21T04:50:09.690000
|
||||
CVE-2019-8607,0,0,7ac0d064c6b42563e8682aff1dcfab6f7183e1d42a575096d72bb934c174f4b5,2024-11-21T04:50:09.797000
|
||||
CVE-2019-8608,0,0,db9ceb00c77dadef8090d297e1f1d19a2d5eb960a616fdf84109118f8a2fb620,2024-11-21T04:50:09.923000
|
||||
@ -156758,7 +156758,7 @@ CVE-2020-27947,0,0,bdab85e9f6517d7edd3e13b7350718f9ad953c6de0da6392435fb79ad4365
|
||||
CVE-2020-27948,0,0,74ff44fbc11d14ffb0e2560785e15d6d6ddb2c5037b226bcfd9403a14505cacc,2024-11-21T05:22:06.417000
|
||||
CVE-2020-27949,0,0,1e77071bd6ed69c94468c0ca30b29016b44256bbb0737e7795d5c1adfd21e5b9,2024-11-21T05:22:06.537000
|
||||
CVE-2020-2795,0,0,ea6d9119a7d08536109093ac2e9c142a3d976d091ca02de0b12940cd00b054e7,2024-11-21T05:26:17.380000
|
||||
CVE-2020-27950,0,1,dd947c41e325618f88642548f3547dabf83258dbec9e79e304742bfceab4e5ac,2025-02-28T14:44:48.713000
|
||||
CVE-2020-27950,0,0,dd947c41e325618f88642548f3547dabf83258dbec9e79e304742bfceab4e5ac,2025-02-28T14:44:48.713000
|
||||
CVE-2020-27951,0,0,4394fd9fd0d270e5685d681c055c43d114e98685e00457e179c818543125646b,2024-11-21T05:22:06.777000
|
||||
CVE-2020-27952,0,0,f8663fddee1a7d1e8de2028f541b90d05e9b18fe2b6c949432d04623122b475d,2024-11-21T05:22:06.910000
|
||||
CVE-2020-27955,0,0,84ffb7d25d038cf287196c1671c1e7197adbde6851d5e0fc38b11a1788de87ba,2024-11-21T05:22:07.027000
|
||||
@ -159728,7 +159728,7 @@ CVE-2020-3833,0,0,e764dc5cfbb8f637552b2441e9ddb593562a3918809b4c677bb07276f1f37b
|
||||
CVE-2020-3834,0,0,3e772505e33e0e780d0ee45c96850de3b9441fb84529cb87198cfe1cd9457c55,2024-11-21T05:31:48.527000
|
||||
CVE-2020-3835,0,0,cdcfa07a09a472bd33c6fad2c5ebc47f55b7047cf8a668f3558757ee2f0554ef,2024-11-21T05:31:48.627000
|
||||
CVE-2020-3836,0,0,26198ab0a7a09181b9daabad3d9d21eadd74796c73b69cca8eeebfe42cc70abc,2024-11-21T05:31:48.737000
|
||||
CVE-2020-3837,0,1,86abdb9e0304dc7bdf2ecb0d23fdef34602bfff56071f34c6be57fcbe54e5ce1,2025-02-28T14:44:48.713000
|
||||
CVE-2020-3837,0,0,86abdb9e0304dc7bdf2ecb0d23fdef34602bfff56071f34c6be57fcbe54e5ce1,2025-02-28T14:44:48.713000
|
||||
CVE-2020-3838,0,0,8d1784baae371177f9d969f0cf7d2c32eccd6737302888ee0e7d97c3ed35fe4e,2024-11-21T05:31:48.980000
|
||||
CVE-2020-3839,0,0,cce4070eb0b58eef19224cd877e2e6dd6b8f5e237e9f84b7c9bae85d5ed0c879,2024-11-21T05:31:49.107000
|
||||
CVE-2020-3840,0,0,514e04d2cf82acf4eded7fae4a5294fb412c6b1287f03b9bf0112344f66a3086,2024-11-21T05:31:49.210000
|
||||
@ -164696,8 +164696,8 @@ CVE-2020-9814,0,0,39d23ae595854756548268c04031dd78beb4f4daf7ec7db61e365f2b36b9a1
|
||||
CVE-2020-9815,0,0,a003a768ee0eea54e269add860f10e3abee748e6ca2781978085f4f2ae41bb71,2024-11-21T05:41:20.167000
|
||||
CVE-2020-9816,0,0,ead57dd330ea3372df51f17718a1057a151f35f4442acd93f18839173d58f970,2024-11-21T05:41:20.270000
|
||||
CVE-2020-9817,0,0,6451091f69be5568064f6c8a083aedc1278642490c4a281b5e17f6d40ca1424c,2024-11-21T05:41:20.380000
|
||||
CVE-2020-9818,0,1,7158fa775e6022751c784326b5e02610838f27aef51a64442d4f4f1e601d3c1a,2025-02-28T14:44:48.713000
|
||||
CVE-2020-9819,0,1,f896a3c2a319a7bb9db48cddc9d86c13dd6a1c64463ae5ccc663bd158270e3cd,2025-02-28T14:44:48.713000
|
||||
CVE-2020-9818,0,0,7158fa775e6022751c784326b5e02610838f27aef51a64442d4f4f1e601d3c1a,2025-02-28T14:44:48.713000
|
||||
CVE-2020-9819,0,0,f896a3c2a319a7bb9db48cddc9d86c13dd6a1c64463ae5ccc663bd158270e3cd,2025-02-28T14:44:48.713000
|
||||
CVE-2020-9820,0,0,4fdad7d17b8d9bbdef875e36d0061295507fa69ba2f8dbd3a4a1d39c55b0a586,2024-11-21T05:41:20.713000
|
||||
CVE-2020-9821,0,0,07529420971d10ff2bbfd70ddd9990d24f55005291e73adea0637f70f81b6285,2024-11-21T05:41:20.820000
|
||||
CVE-2020-9822,0,0,dd0bacca6d947be1747310d2122b048f784f56925b7be141e555edeaa848edf0,2024-11-21T05:41:20.927000
|
||||
@ -164735,7 +164735,7 @@ CVE-2020-9855,0,0,f62de7238477aea93f3abf3ab8ea2dfc400975c6489e15199db3b3de03a472
|
||||
CVE-2020-9856,0,0,e48989f32d60137c0edc8a02e834ea84cd4505ab62440e90630bb6ca0255475d,2024-11-21T05:41:25.117000
|
||||
CVE-2020-9857,0,0,4564f37640cf033d502580176544c1ca67b90e10b289096385a5ce052561a423,2024-11-21T05:41:25.217000
|
||||
CVE-2020-9858,0,0,365f269021dc2690a80c7be2353be85740b98a3c242d31c022e2f1ae9fd07a21,2024-11-21T05:41:25.317000
|
||||
CVE-2020-9859,0,1,f8d8dfa4d5caba5a14c215dcf9ef2f6a548e2d2a3ecc31a8703c7892ab30bb5c,2025-02-28T14:44:48.713000
|
||||
CVE-2020-9859,0,0,f8d8dfa4d5caba5a14c215dcf9ef2f6a548e2d2a3ecc31a8703c7892ab30bb5c,2025-02-28T14:44:48.713000
|
||||
CVE-2020-9860,0,0,6d689ddd768a7729996307cbe7c2aa5b1d09bcc559832a4fec10fff8c58a23c6,2024-11-21T05:41:25.513000
|
||||
CVE-2020-9861,0,0,5c800faea68343bf58424d7e251e1c13d6dc6d14a61816a5cf1f99cb4d5b1992,2024-11-21T05:41:25.610000
|
||||
CVE-2020-9862,0,0,b6f03288f468f0d4024a3988e42405a25e797fb0852093161144538c7e8105b3,2024-11-21T05:41:25.710000
|
||||
@ -164780,7 +164780,7 @@ CVE-2020-9903,0,0,fd8ba9246c03cf84ed34090daa738b1e21ec1682f0f8cda6dedaa4761c5864
|
||||
CVE-2020-9904,0,0,5fdc6e10d2f1f01c714b258e99f79acbd6194e185af91fb066f25cb2d75768c4,2024-11-21T05:41:30.013000
|
||||
CVE-2020-9905,0,0,b68cf578fe49078f790bcf44e5ff24959136d2e396535b0c2537b5b0ffecaa75,2024-11-21T05:41:30.123000
|
||||
CVE-2020-9906,0,0,166cedb6a95dee0a53a40439951152b4c6ffba0b89929eb32a8c66f410558976,2024-11-21T05:41:30.230000
|
||||
CVE-2020-9907,0,1,e1eb448ccd186c4271a29f7e5836588c535b03a045456a3bc9dba09ef694c182,2025-02-28T14:44:48.713000
|
||||
CVE-2020-9907,0,0,e1eb448ccd186c4271a29f7e5836588c535b03a045456a3bc9dba09ef694c182,2025-02-28T14:44:48.713000
|
||||
CVE-2020-9908,0,0,06606ab1c2077a54e1320041f575a636b9cd10146870b40c63b7a42243148093,2024-11-21T05:41:30.437000
|
||||
CVE-2020-9909,0,0,db45329d72cab554faea03693de3ea5691e4845af8f9053ecf8a8d9d2e894736,2024-11-21T05:41:30.537000
|
||||
CVE-2020-9910,0,0,eacc185ba0c7ff3cc1d990c8fea0abc7edb47327ee8ca9ee20d8023e0c9a1f62,2024-11-21T05:41:30.647000
|
||||
@ -164807,7 +164807,7 @@ CVE-2020-9930,0,0,6e27c898f04c57974ee33a6efc19d92b2d388cd1a02ee2fa6c053c46a67dc9
|
||||
CVE-2020-9931,0,0,f8db6056ab6e7b000a860597155fbc28fbf14076d94aef57849ea84edb033dec,2024-11-21T05:41:32.923000
|
||||
CVE-2020-9932,0,0,d4ac093d8a0c5c44ead5f82d1790e5da018a7c279ee0812a2e45de174844d665,2024-11-21T05:41:33.040000
|
||||
CVE-2020-9933,0,0,b1ac39dc4c32bae5f3c1adcbaa421d06f55965e5d7f7c3871b963dbc0c4a1561,2024-11-21T05:41:33.153000
|
||||
CVE-2020-9934,0,1,4d21200c47655d51de0db1c759e230024ba761fb080941cd11237a66be1e9820,2025-02-28T14:44:48.713000
|
||||
CVE-2020-9934,0,0,4d21200c47655d51de0db1c759e230024ba761fb080941cd11237a66be1e9820,2025-02-28T14:44:48.713000
|
||||
CVE-2020-9935,0,0,8c8962420a06ea8b9704251fdd323828ea6570405c8d4526638213ce066ddf64,2024-11-21T05:41:33.400000
|
||||
CVE-2020-9936,0,0,3f0520c5f2eface2c145c0dc6c279d5078dc8e79c797e1a3ffd2befbb5d1d782,2024-11-21T05:41:33.513000
|
||||
CVE-2020-9937,0,0,d572deb06e95e84154ea8a51424aa07761fb2c381fd1bef9008c747db6755e1f,2024-11-21T05:41:33.633000
|
||||
@ -166431,14 +166431,14 @@ CVE-2021-1778,0,0,8b826b7ae2ae17b8b9901d1f612230aee30d0fc68a265ebf3396e3ceebf943
|
||||
CVE-2021-1779,0,0,64bb89c45d76f13f2d9fd67f86b95e7c100b655c340943ae93bf17b44851a0c9,2024-11-21T05:45:05.733000
|
||||
CVE-2021-1780,0,0,23e85a6351e1b98f470ccb20f8ae4ad7e1ecfb25beb2334c601960dad2a662bf,2024-11-21T05:45:05.857000
|
||||
CVE-2021-1781,0,0,8c1ef084f5ffd81b1dfb865bf625ce113bbf8db4f404f5f4818a50fc994e667a,2024-11-21T05:45:05.980000
|
||||
CVE-2021-1782,0,1,a6fa5b0ece19eac0526619722b2b8053f557785f9b2432c61e563c0ba9541f75,2025-02-28T14:44:48.713000
|
||||
CVE-2021-1782,0,0,a6fa5b0ece19eac0526619722b2b8053f557785f9b2432c61e563c0ba9541f75,2025-02-28T14:44:48.713000
|
||||
CVE-2021-1783,0,0,a629262b9c76bc864d84116a8a9a03cf0ee6646c816a5b730a6fbd198836526b,2024-11-21T05:45:06.240000
|
||||
CVE-2021-1784,0,0,5dbd3fae571e03fbab98f6009778ed0be04756e7c33fd360175bd60500fa009e,2024-11-21T05:45:06.360000
|
||||
CVE-2021-1785,0,0,f5c50d287644a4824d77890a58b7c0971d824c705a80905719d22378d0b6b379,2024-11-21T05:45:06.473000
|
||||
CVE-2021-1786,0,0,844528cd02ae52e41c72912ba3abea868e3a31a8ead52c9afc5203d16bdb7bdd,2024-11-21T05:45:06.603000
|
||||
CVE-2021-1787,0,0,2fed3cae125c2895dac1e44fd837f817f5b5e70f63daf568baaa5ea04f53dd36,2024-11-21T05:45:06.733000
|
||||
CVE-2021-1788,0,0,7cd9b9e8fd97ec6f34bcc85b8d8ae756cef050deec7f91d8bdd5e69f3ff22f38,2024-11-21T05:45:06.860000
|
||||
CVE-2021-1789,0,1,1601985ede48d3a9fccb36bcea9d682fe7acb0623b59b92c9743d3b550ed4f2f,2025-02-28T14:44:48.713000
|
||||
CVE-2021-1789,0,0,1601985ede48d3a9fccb36bcea9d682fe7acb0623b59b92c9743d3b550ed4f2f,2025-02-28T14:44:48.713000
|
||||
CVE-2021-1790,0,0,453727956bec9f85809fc98d61ce3827a48322b65c0a1308fdd19254e25b7d46,2024-11-21T05:45:07.223000
|
||||
CVE-2021-1791,0,0,0858d7a66d6852664ff89bbf6b3f6519588dcf813a61680a95653c00c4525806,2024-11-21T05:45:07.340000
|
||||
CVE-2021-1792,0,0,5ffc2bf1833bc5c8fb2e4843cb4db95b9711424cf4aab2d2cc4aaf61cb70cd0c,2024-11-21T05:45:07.477000
|
||||
@ -166509,8 +166509,8 @@ CVE-2021-1864,0,0,e61bb78daa00b5dca2e6f100a892bda75d87a592b9962975d78c060881b491
|
||||
CVE-2021-1865,0,0,d4d8e0986b62bedaab54dbcf207c7ced93d3d91287ee0883bce3ef5ceb5d3d36,2024-11-21T05:45:15.390000
|
||||
CVE-2021-1867,0,0,88725f08a5e44d02242ea72ac07f37bb9e06618f3cd63825dbd1ad8b63b8cb04,2024-11-21T05:45:15.513000
|
||||
CVE-2021-1868,0,0,432a8d063e46b26199a2f940e4c6839746a15a330270af8952a5e97a5f7524ac,2024-11-21T05:45:15.640000
|
||||
CVE-2021-1870,0,1,d3172f265697091d76b36ed5dc99fb1ce60e7c8b5c92f65c90effae9bcbb20fd,2025-02-28T14:44:48.713000
|
||||
CVE-2021-1871,0,1,cceb5d9011172094e721f2a997f9baadaf42f1efa5cdac99fcee2f8ee4a2bb93,2025-02-28T14:44:48.713000
|
||||
CVE-2021-1870,0,0,d3172f265697091d76b36ed5dc99fb1ce60e7c8b5c92f65c90effae9bcbb20fd,2025-02-28T14:44:48.713000
|
||||
CVE-2021-1871,0,0,cceb5d9011172094e721f2a997f9baadaf42f1efa5cdac99fcee2f8ee4a2bb93,2025-02-28T14:44:48.713000
|
||||
CVE-2021-1872,0,0,4aad0f7c4f760558662da2aa02617c0ae0669394f36c9abb206cff7b5c7e6f77,2024-11-21T05:45:16.040000
|
||||
CVE-2021-1873,0,0,f647da70e48b4a0e757dc32d4da6a78ccdcb576a528532094359d47a435eae89,2024-11-21T05:45:16.153000
|
||||
CVE-2021-1874,0,0,11acb083af68bc66cbb55a31d610911ff9e1492756cdefbcf79bd2d863878bb4,2024-11-21T05:45:16.287000
|
||||
@ -166518,7 +166518,7 @@ CVE-2021-1875,0,0,a763019d62a197757c122cba7e6ec2caf0210e0fc06c38570a6774aace7636
|
||||
CVE-2021-1876,0,0,50e3e6073a13251685729089e5f9b48623129fa60396e005f85f8948fe4b1930,2024-11-21T05:45:16.527000
|
||||
CVE-2021-1877,0,0,78167aec1738ed934a9db101730f2475d220aa596ff08cccd6d82eadaaf3136f,2024-11-21T05:45:16.647000
|
||||
CVE-2021-1878,0,0,bbc94e824fa34a03db5d35e1bbb0245d5ebeb5ba4878c0691539ed3e105efdd0,2024-11-21T05:45:16.777000
|
||||
CVE-2021-1879,0,1,7d9df0393de12880300d4ee90fc81fc4100559c0ceb81aae28fa79423d6ded14,2025-02-28T14:44:48.713000
|
||||
CVE-2021-1879,0,0,7d9df0393de12880300d4ee90fc81fc4100559c0ceb81aae28fa79423d6ded14,2025-02-28T14:44:48.713000
|
||||
CVE-2021-1880,0,0,f21767cc17b0b400ea36769c68e9dc0fc94bd57122b1b556aeb6342108dfd313,2024-11-21T05:45:17.023000
|
||||
CVE-2021-1881,0,0,71d96589a667db4e83dea8a9b9340b5dda8ce4877b845ef6e86d23e76d807867,2024-11-21T05:45:17.143000
|
||||
CVE-2021-1882,0,0,0de80653eb0cc938d031bd299bc26b6178d33ea21b4b167b4804efdfdc78bad9,2024-11-21T05:45:17.280000
|
||||
@ -175042,15 +175042,15 @@ CVE-2021-30653,0,0,af6209998169bf0b59156640376c5ebe8e7a91975ee599eee6d8c80cb5bdb
|
||||
CVE-2021-30654,0,0,d454b5e9d0444f22c1324170868a7170e32ba4142b3b3d1feb9e8f43129b786d,2024-11-21T06:04:22.110000
|
||||
CVE-2021-30655,0,0,c5bd87f283bc66de8cf6a1dccdc1113eb65e46ccaaed5eff9fd5299b957c5164,2024-11-21T06:04:22.250000
|
||||
CVE-2021-30656,0,0,4f25be990cd3e56338347956b5cd16bd2d8602e91cf11f5de83660e31c7f84bc,2024-11-21T06:04:22.390000
|
||||
CVE-2021-30657,0,1,f0106b43b12737c131c03a5845f94b27adb33721d5ff25e41b5534a7e9c42b3f,2025-02-28T14:44:48.713000
|
||||
CVE-2021-30657,0,0,f0106b43b12737c131c03a5845f94b27adb33721d5ff25e41b5534a7e9c42b3f,2025-02-28T14:44:48.713000
|
||||
CVE-2021-30658,0,0,a7e6ce534983d6265ea77dbc37d43cd7f21d26f66f7c40d693487b5c676730f2,2024-11-21T06:04:22.637000
|
||||
CVE-2021-30659,0,0,ab538d4b06ae94ebba36b98d58ee05bc2d9da4cbd8fd10f31cd6e39e35257775,2024-11-21T06:04:22.750000
|
||||
CVE-2021-30660,0,0,387f96a9e1e920b2eb249913b885544bc18948e904113099ea966317a9059876,2024-11-21T06:04:22.877000
|
||||
CVE-2021-30661,0,1,5b53a91cf480f2b7b01bf8b1852ae2e3aac8b86844583ccf15476ba1c2a4de76,2025-02-28T14:44:48.713000
|
||||
CVE-2021-30661,0,0,5b53a91cf480f2b7b01bf8b1852ae2e3aac8b86844583ccf15476ba1c2a4de76,2025-02-28T14:44:48.713000
|
||||
CVE-2021-30662,0,0,c4dfc7192dbb2ce4bea44d273c3ad0bccd8bce5f5b4b72ed9d54ec2ac3781f53,2024-11-21T06:04:23.160000
|
||||
CVE-2021-30663,0,0,739ad3e92cf3fbef3967ff7bcf432b116b4e486bde9bad29cd9c8e885d5501f2,2025-02-14T16:22:02.543000
|
||||
CVE-2021-30664,0,0,f2057936986b5b73e1cba58f4707641670b3cbaa1c2859e5b4b8f8a2a91dd529,2024-11-21T06:04:23.470000
|
||||
CVE-2021-30665,0,1,1d936126b05f9b1fef9e3e5168af777bb636b8dc2991cae91e3f24af3c81e56b,2025-02-28T14:44:48.713000
|
||||
CVE-2021-30665,0,0,1d936126b05f9b1fef9e3e5168af777bb636b8dc2991cae91e3f24af3c81e56b,2025-02-28T14:44:48.713000
|
||||
CVE-2021-30666,0,0,8dab9f3ed80515f195857a53e3285adb85698bf6f582aa080b13fbb35f8312f2,2025-02-13T16:49:28.897000
|
||||
CVE-2021-30667,0,0,ee0c4829017313d8362cc93881a4782426de3146989d6fbd51513180306068f5,2024-11-21T06:04:23.897000
|
||||
CVE-2021-30668,0,0,ef8eec8272941e6ecce5f78376baeda179f835bab56dbd9979f2308401ea7e74,2024-11-21T06:04:24.030000
|
||||
@ -175096,7 +175096,7 @@ CVE-2021-30708,0,0,0d4ef740951de9fa3c7d46cd5d922d5031082b03c36b68901042a25459d7b
|
||||
CVE-2021-30709,0,0,ac4f597f103d40c646c9a37992122e647523ecf1a80c9ea7d0cad044139adf79,2024-11-21T06:04:29.733000
|
||||
CVE-2021-30710,0,0,6f9138aff87c816b5801441de245256cd714004b0c7fe4d082b9380d78dbecf5,2024-11-21T06:04:29.883000
|
||||
CVE-2021-30712,0,0,fd76d4bdea30f6917b1b4272719a88821011e5d27fc4ee0c3f5302060e454266,2024-11-21T06:04:30.037000
|
||||
CVE-2021-30713,0,1,9022cbef2103901be5c72836b4c01e327c510bb75b09aee001ae50fd693660f6,2025-02-28T14:44:48.713000
|
||||
CVE-2021-30713,0,0,9022cbef2103901be5c72836b4c01e327c510bb75b09aee001ae50fd693660f6,2025-02-28T14:44:48.713000
|
||||
CVE-2021-30714,0,0,1ac3cdebf872ac967c92c82c1f293c834ed9a9b2a9af3cbda73ed47dcff3c59f,2024-11-21T06:04:30.317000
|
||||
CVE-2021-30715,0,0,8526fff9426684bf5994f2385d0e54f12e8042c43b974b959d854ca5cfd03af8,2024-11-21T06:04:30.440000
|
||||
CVE-2021-30716,0,0,1351521f863a9be568843ed0717057da020860858dd82d7d962e25e477f48e69,2024-11-21T06:04:30.573000
|
||||
@ -175183,7 +175183,7 @@ CVE-2021-30802,0,0,d3af46ce2f497920c6024a63ea8ea8888c260d90da7eb1da62c0463dfa869
|
||||
CVE-2021-30803,0,0,da6c846ff7628e171742041c5c4f2a9ae56f35437b19a5957ae69acd101f42a1,2024-11-21T06:04:45.030000
|
||||
CVE-2021-30804,0,0,a8448168f3c60c9210c3b99df09e33ba1abc83f92b034856b3391f42be985878,2024-11-21T06:04:45.140000
|
||||
CVE-2021-30805,0,0,a45ac4492d17d042337985687b2b1544cdce5f65bc715a78eaef4fca60b02db2,2024-11-21T06:04:45.257000
|
||||
CVE-2021-30807,0,1,814e9c39cf301788a1885999e389fa0561c8fc705e7cb47c6be6427b9687a5ea,2025-02-28T14:44:48.713000
|
||||
CVE-2021-30807,0,0,814e9c39cf301788a1885999e389fa0561c8fc705e7cb47c6be6427b9687a5ea,2025-02-28T14:44:48.713000
|
||||
CVE-2021-30808,0,0,7332f9b25719fd725098c6e1a14e50d288895c73b1d9691fc7752d3662d18d33,2024-11-21T06:04:45.500000
|
||||
CVE-2021-30809,0,0,9faa62183c613ce8119ed921c618805568e2bfada6377a76f91a8e0d329247cf,2024-11-21T06:04:45.630000
|
||||
CVE-2021-30810,0,0,0e59876a610502b4445f0847e17025234c0f485bc63ceb2d065709a0d4be2e41,2024-11-21T06:04:45.760000
|
||||
@ -178812,7 +178812,7 @@ CVE-2021-35482,0,0,5b472310c7c4047d6c33038218d864d04f51f66e4d51e1cb7991026a14c61
|
||||
CVE-2021-35487,0,0,331ce5b429413f54a5bdb9718850b6786d3b058d3cbb6312518d5ffedf213af6,2024-11-21T06:12:21.600000
|
||||
CVE-2021-35488,0,0,e65262e0a1c1d0504b83abe345c410bff84cdfb7fa7e3e92be53ed427da99d9b,2024-11-21T06:12:21.740000
|
||||
CVE-2021-35489,0,0,53bce953b714dca045a33c64982814f760f224a2cdd4b57395f881b88326173d,2024-11-21T06:12:21.887000
|
||||
CVE-2021-3549,0,1,0103ce56d8fdeff983b83cbb86c1c31dad40df775c818ebef79f274a23fafeaa,2025-02-28T13:15:24.940000
|
||||
CVE-2021-3549,0,0,0103ce56d8fdeff983b83cbb86c1c31dad40df775c818ebef79f274a23fafeaa,2025-02-28T13:15:24.940000
|
||||
CVE-2021-35490,0,0,8518f891efcd6e2c5ff624523dd1d73b81408947a5d2a6dceb5053db70504775,2024-11-21T06:12:22.030000
|
||||
CVE-2021-35491,0,0,f4dc4e73cd732408245742225cf63817e06513f351fcb7db023db8d554876caa,2024-11-21T06:12:22.200000
|
||||
CVE-2021-35492,0,0,c1d7bd87fad0c3e28378adc00aafab61674ebaa8678be1c7775d09b09a4bb35b,2024-11-21T06:12:22.410000
|
||||
@ -180102,7 +180102,7 @@ CVE-2021-37346,0,0,946b92ddc4fbe8315c7d41ff29ec3fe6897aba5d320afff2a62bc560a60f7
|
||||
CVE-2021-37347,0,0,3b9e777c10e939bdebc4042602b6811e52742ff1bb9cf92b7d4c7384ff6b0b30,2024-11-21T06:14:59.177000
|
||||
CVE-2021-37348,0,0,ca272066b16ec187cad70b4e87c46a9e6652a909d15aa5859776a09d1693fbd9,2024-11-21T06:14:59.330000
|
||||
CVE-2021-37349,0,0,08392ea9c36b212d62ac5ffcca309c8a34443a89420b70fa89a06ba97b793121,2024-11-21T06:14:59.490000
|
||||
CVE-2021-3735,0,1,a6f7ba7652086c7fb0aaa922e8875ef97c011652c6a9945309818c4d7d776c4a,2025-02-28T13:15:25.767000
|
||||
CVE-2021-3735,0,0,a6f7ba7652086c7fb0aaa922e8875ef97c011652c6a9945309818c4d7d776c4a,2025-02-28T13:15:25.767000
|
||||
CVE-2021-37350,0,0,cf25b34ef1bbfd95231919aef949f1c5ef44e04e05be9690834576ef277c1b91,2024-11-21T06:14:59.677000
|
||||
CVE-2021-37351,0,0,d11c79c834d15cc2144d8711dffb0ddf0689cebc7c8d0fa23ad5d1503584c13d,2024-11-21T06:14:59.823000
|
||||
CVE-2021-37352,0,0,1d39000a015942794d66401eebb5b89f81736f941a96aecacf01420137c33cd4,2024-11-21T06:14:59.973000
|
||||
@ -181647,7 +181647,7 @@ CVE-2021-39283,0,0,eda15ad1b3bcdcea2bbabe3c3a719378090dd1f6b09ac9e32c24dec27d162
|
||||
CVE-2021-39285,0,0,a30e82f0b54273bf7230675bfc50d449c5b054125f271ae318a58b9f82ff968d,2024-11-21T06:19:07.193000
|
||||
CVE-2021-39286,0,0,ef6a7f535e70ea4c70e16914bb393fc1fe7ddce52d7869aa8e27ed3514a1c0a5,2024-11-21T06:19:07.390000
|
||||
CVE-2021-39289,0,0,065932f15029abf31cec0e9a8c93f437f6a2e6f1d70a6cf84aed55a74ab5c3a9,2024-11-21T06:19:07.593000
|
||||
CVE-2021-3929,0,1,9b475fc91b0b9592c4e6edc6366d3f7182869eb394ef53d8fac1179039a4fbdd,2025-02-28T13:15:25.913000
|
||||
CVE-2021-3929,0,0,9b475fc91b0b9592c4e6edc6366d3f7182869eb394ef53d8fac1179039a4fbdd,2025-02-28T13:15:25.913000
|
||||
CVE-2021-39290,0,0,4faf5271e88619fa8d7ac328a2e3cb3d6fd0f70f73052bb9ecd9122500b24399,2024-11-21T06:19:07.793000
|
||||
CVE-2021-39291,0,0,cdeac33e28dbcd5736066d6640e454e84e5a3f646d2543c33f601534582dc436,2024-11-21T06:19:07.980000
|
||||
CVE-2021-39293,0,0,7f06b7eb1a854fa9547bea97c0e43e43aaed1d5a57ac0f47b2f178f3861e1679,2024-11-21T06:19:08.180000
|
||||
@ -192299,7 +192299,7 @@ CVE-2022-22583,0,0,cef0a1b3c51e05882dd405aa523ef9e9bbbacbdae2cf3cbfa227960daba5e
|
||||
CVE-2022-22584,0,0,5248aa63983720014377ab3a932e7e26d00aa01f6109bfe9bbfe564e719ab265,2024-11-21T06:47:04.220000
|
||||
CVE-2022-22585,0,0,49d858c7854d86c30431073a89e3a77a374d0583f41fe955f4122b98bff7b1d8,2024-11-21T06:47:04.370000
|
||||
CVE-2022-22586,0,0,7a8c327b1fdb0dc879577cb6623c3b5a67edc10748196e7bf3d4d9a371e2a4bb,2024-11-21T06:47:04.493000
|
||||
CVE-2022-22587,0,1,c14d66a8098f837acb0b6ae91093d9dd88ec6df640a3e3319c4cbdfe64a3f169,2025-02-28T14:53:55.297000
|
||||
CVE-2022-22587,0,0,c14d66a8098f837acb0b6ae91093d9dd88ec6df640a3e3319c4cbdfe64a3f169,2025-02-28T14:53:55.297000
|
||||
CVE-2022-22588,0,0,6c57d89d82e014a04c1d1a269239114176bf790579db18cc8a4e0bb9b98618f5,2024-11-21T06:47:04.710000
|
||||
CVE-2022-22589,0,0,ad265160333aeff24b5a24815da36d925fd4417ebc2ddd4162500edd6aad12ec,2024-11-21T06:47:04.823000
|
||||
CVE-2022-2259,0,0,150b52071c57e9da09e4562b9e329d9ebb764927f18ed734d3725de25cc194b6,2024-11-21T07:00:38.140000
|
||||
@ -192334,7 +192334,7 @@ CVE-2022-22616,0,0,fd6c62268b016f15b1bb153516514624f101ccecfdc0b548b6bd7175935d8
|
||||
CVE-2022-22617,0,0,b9a76fb778badaf7135b648c1b9e7a3b21aea99bf752c663599f8da2405573b1,2024-11-21T06:47:07.893000
|
||||
CVE-2022-22618,0,0,53a6466f73e6695117bc56fb459dfa0bde3aacbb8110ea335a0c42333cb99e27,2024-11-21T06:47:08.017000
|
||||
CVE-2022-2262,0,0,48f9f12588c4cb17d7b597dce3fc433cbe7d88db72523f825ed2022a32d1a7a8,2024-11-21T07:00:38.480000
|
||||
CVE-2022-22620,0,1,d7ad2b5ab0664340b1590ca4fd11c5d8cc296fd60da2cb69592f304405aea94e,2025-02-28T14:44:48.713000
|
||||
CVE-2022-22620,0,0,d7ad2b5ab0664340b1590ca4fd11c5d8cc296fd60da2cb69592f304405aea94e,2025-02-28T14:44:48.713000
|
||||
CVE-2022-22621,0,0,f64d274fe62db017d3a340f8a8d18fc17ad01dea66a7a94ad96229b65fa87834,2024-11-21T06:47:08.227000
|
||||
CVE-2022-22622,0,0,096e2e61980549c51cd46b9fbef7cf08515942db2ff08880a7a4a737ef13b81f,2024-11-21T06:47:08.337000
|
||||
CVE-2022-22623,0,0,7ed1ca6096215ea8485a50fc8cae6d57524f6a37b6c47c50add71b768de4e4c8,2023-11-07T03:43:56.890000
|
||||
@ -192393,7 +192393,7 @@ CVE-2022-22670,0,0,c0441f67d04e29f04a1c244c888e912d7e003563c05a6c1660033505dca78
|
||||
CVE-2022-22671,0,0,45e3aec74933aee8afaecb8c21f01fd35faa1ff9c4bcaf50cb2218b868fb9d06,2024-11-21T06:47:14.617000
|
||||
CVE-2022-22672,0,0,de90c6361fd9a1d97789e7a6ba0e8b7338e0a166d931a68d67a731ed410f90a5,2024-11-21T06:47:14.713000
|
||||
CVE-2022-22673,0,0,1dd31fddf4bbbc6721841917516f4c12f29743bfe15c0fe0b54786a8e0aa0b40,2024-11-21T06:47:14.830000
|
||||
CVE-2022-22674,0,1,0fe9c46442247e9df0f83e3153b893fa055caba9dcc4dcfc03ff32c1d7fc7250,2025-02-28T14:53:55.297000
|
||||
CVE-2022-22674,0,0,0fe9c46442247e9df0f83e3153b893fa055caba9dcc4dcfc03ff32c1d7fc7250,2025-02-28T14:53:55.297000
|
||||
CVE-2022-22675,0,0,9b73e32495e2758110ec77d708c740d173f90851713a6ca3b25ff6cd4e5c8922,2025-02-14T16:20:32.273000
|
||||
CVE-2022-22676,0,0,6a65894de3df0ffc1b1b08e57dd9d4bcce3d4b842361847ed8290de73bac165c,2024-11-21T06:47:15.147000
|
||||
CVE-2022-22677,0,0,56cd059e6c2c7587fd722cd34a2465621c7288dd46eadedfd0cf211c80aa959f,2024-11-21T06:47:15.250000
|
||||
@ -201007,8 +201007,8 @@ CVE-2022-32889,0,0,e2460844c4ef16c6e6f8104f084d35290ec40172f3f975d6affa0424c61df
|
||||
CVE-2022-32890,0,0,785b75357f0818483d1cacb0d31d220a8c2994f7a37cf1dc95c6e55ec8b0f95f,2024-11-21T07:07:10.317000
|
||||
CVE-2022-32891,0,0,64dde404899da7b8a38662bf5bf5c5c622231e25930ce78f0e30e189e29b18b4,2024-11-21T07:07:10.457000
|
||||
CVE-2022-32892,0,0,445bb66d3cb66bfa52cb3b8f236b40adfc7de6fe48f16d3abd8207d65c213073,2024-11-21T07:07:10.590000
|
||||
CVE-2022-32893,0,1,0b4cb8917154340a768c6caf746a2afc42f9f1f351bceaad7f7405671ad2a0b5,2025-02-28T14:53:55.297000
|
||||
CVE-2022-32894,0,1,e113d16169fce5312414fa6207f899046aaa1659cac33c5e4d7ff051354fbb88,2025-02-28T14:53:55.297000
|
||||
CVE-2022-32893,0,0,0b4cb8917154340a768c6caf746a2afc42f9f1f351bceaad7f7405671ad2a0b5,2025-02-28T14:53:55.297000
|
||||
CVE-2022-32894,0,0,e113d16169fce5312414fa6207f899046aaa1659cac33c5e4d7ff051354fbb88,2025-02-28T14:53:55.297000
|
||||
CVE-2022-32895,0,0,43d08342ad442aaa6b2f9df4c24c35921ef46cb9a7757a6ff79496a2351a09c3,2024-11-21T07:07:11.033000
|
||||
CVE-2022-32896,0,0,c0ac2853331d6a1c5683c215abdb98389fc122489eb770c05070e76281984e79,2024-11-21T07:07:11.157000
|
||||
CVE-2022-32897,0,0,65b569b40094135fab0a0df9bc0002c37e324af1cb43918ea27c06ef6acc99c6,2024-11-21T07:07:11.290000
|
||||
@ -201033,7 +201033,7 @@ CVE-2022-32913,0,0,bee6ebe7950503c4671f6b8c49b9b32e763fce1b26b9f5979303d145518fc
|
||||
CVE-2022-32914,0,0,c93957ac54124f4a82d1596445082069643ca329b8d54de7ac7bd356a462fcc5,2024-11-21T07:07:13.600000
|
||||
CVE-2022-32915,0,0,78c1645616a106e9a0eb823083738dc505c10bc26bc5fe020d1a9501ef50763c,2024-11-21T07:07:13.737000
|
||||
CVE-2022-32916,0,0,8420c01847911ab237df6c870db458a29034fb7635c75b8df91dd2656da74c26,2024-11-21T07:07:13.857000
|
||||
CVE-2022-32917,0,1,7f5afa1ce6d55a936c916cb014cf1771975f898d365ebe6998411efcc626249e,2025-02-28T14:53:55.297000
|
||||
CVE-2022-32917,0,0,7f5afa1ce6d55a936c916cb014cf1771975f898d365ebe6998411efcc626249e,2025-02-28T14:53:55.297000
|
||||
CVE-2022-32918,0,0,7b720f0bcde294bb13f1ee5e56b3d84057c2065e51423f73b3abfbf3cdfd97c9,2024-11-21T07:07:14.143000
|
||||
CVE-2022-32919,0,0,cc19bca16313977b15c101fcc5b17a18fb56353b18bea3d46c6fe4ebd3d2f68d,2024-11-21T07:07:14.263000
|
||||
CVE-2022-3292,0,0,65c83db42f543a9e9f1e31aa23648b5d7ede84a2f95a828ce9f929872ace9884,2024-11-21T07:19:13.933000
|
||||
@ -208701,7 +208701,7 @@ CVE-2022-42852,0,0,e0476a217fd31c1483be3c5faedef92147a868042acfbbedc0b4746165316
|
||||
CVE-2022-42853,0,0,be314ca2e246b5cbd5d648caafe0058f4047aada97f0268096bc52c067d9151f,2024-11-21T07:25:28.887000
|
||||
CVE-2022-42854,0,0,69b8e36a93fdf0ee869d865dc40773b09a080590f8a161d00ba036b8c8c87754,2024-11-21T07:25:29.040000
|
||||
CVE-2022-42855,0,0,2438782da0ac107f7acfb77343c237e44eda85c7d815276b63602765d59cef45,2024-11-21T07:25:29.167000
|
||||
CVE-2022-42856,0,1,3acea9691a0666b002e87c0f351430e2f65b2ede9686b7cae8b49a205b46c393,2025-02-28T14:44:48.713000
|
||||
CVE-2022-42856,0,0,3acea9691a0666b002e87c0f351430e2f65b2ede9686b7cae8b49a205b46c393,2025-02-28T14:44:48.713000
|
||||
CVE-2022-42857,0,0,cdcf832ca21268788c00b206c507e4baf85763977b13479d6144d4ecea8b40eb,2023-11-07T03:53:39.147000
|
||||
CVE-2022-42858,0,0,c3aa949c738e65fc13679e368931fdfbe17d5f10b70e77201c050fac523b7dba,2025-02-11T18:15:20.220000
|
||||
CVE-2022-42859,0,0,b7c3c34368d49525f8b5113c35fe596dc55c4694a7957ea7631d371197964aec,2024-11-21T07:25:29.623000
|
||||
@ -218800,7 +218800,7 @@ CVE-2023-23525,0,0,78db85fa8f2d6299275740c679a54c95ef2f505fd0559284dfc708baa4471
|
||||
CVE-2023-23526,0,0,0b8fc79c9ef40704de6cf82fef3307acffc518a897d2d19bd4accf30ae6a56be,2025-01-29T16:15:36.057000
|
||||
CVE-2023-23527,0,0,95e09b7643b70de664ad0a17f59b03a1f5ad459216d89c350de15db250b6ebb9,2025-01-29T16:15:36.233000
|
||||
CVE-2023-23528,0,0,650e9a99e0fd9e60e2db38b8f8e5930d222f449e060a9d63b17dc22d8f595647,2024-11-21T07:46:21.600000
|
||||
CVE-2023-23529,0,1,0fa8be8a9e87df07f10b0296f82822f7c36349e16c235223bfc0e6bae0ef2822,2025-02-28T14:53:55.297000
|
||||
CVE-2023-23529,0,0,0fa8be8a9e87df07f10b0296f82822f7c36349e16c235223bfc0e6bae0ef2822,2025-02-28T14:53:55.297000
|
||||
CVE-2023-2353,0,0,d9677ccf6a1806a366039f2a958d6f73e93758433d611231baea25eb5f519b29,2024-11-21T07:58:26.637000
|
||||
CVE-2023-23530,0,0,d04c218cad5b3190fc98feca7f327753f411ad97fa4c08572069ca30e03769e3,2024-11-21T07:46:21.827000
|
||||
CVE-2023-23531,0,0,3a266917c705a24968ab3ed97ec3fdfa65e946f8403a4045383cd7e7c6ffbb7c,2024-11-21T07:46:21.933000
|
||||
@ -219841,7 +219841,7 @@ CVE-2023-24763,0,0,c65ce0ddbece16da49a908749c30b176c8580043353d7910dfbde6ccf84d4
|
||||
CVE-2023-24769,0,0,185959dd746941dbdbeac5aa148647daf8dd47d571a410211fc5c1d4bbded74d,2024-11-21T07:48:23.303000
|
||||
CVE-2023-2477,0,0,c293435cb6cb5f53f7904bcfb67b099084502f313f9448bc884a4e0dce52cc61,2024-11-21T07:58:41.623000
|
||||
CVE-2023-24773,0,0,1cc31190f570fc3c23b7b2196d6c7eae4d5aa9f41329bb819157d05a69818791,2024-11-21T07:48:23.443000
|
||||
CVE-2023-24774,0,0,7eafe72f4a7525306c79f6ce362726fff327ac2b01c767e3f25cf9b56332274f,2024-11-21T07:48:23.573000
|
||||
CVE-2023-24774,0,1,1bd4641ff4eba85584436710e425d7537ccf4e712955c73fafd022f1e56d88b5,2025-02-28T16:15:36.360000
|
||||
CVE-2023-24775,0,0,b668469f90fa3e9c9678adfb39908c761d3adbdd38c4e1fbc1564403498a6494,2024-11-21T07:48:23.700000
|
||||
CVE-2023-24776,0,0,de29802d611b377fda64ea3600ecffda20ec3bfaeee35b9a5967cdf2a0fba02b,2024-11-21T07:48:23.833000
|
||||
CVE-2023-24777,0,0,4a866ff95b4f709fb308f1ed6883b97243dc32bc5395b4fb2599794ee1bd83c4,2024-11-21T07:48:23.967000
|
||||
@ -222654,7 +222654,7 @@ CVE-2023-28202,0,0,191014a0200c592d291fa5fba60b126bce7fe013f7105ee7dd188bda0cdcf
|
||||
CVE-2023-28203,0,0,4cb19dbc67823a1f2ef0f3a0d6b749db68c9403e1ae6273e5d0d612a7d2831a7,2024-11-21T07:54:35.627000
|
||||
CVE-2023-28204,0,0,167d3cc08edbe340909a094ad5b1b69065f8bcf0543f3b516929c5d3da4ef5d1,2025-02-14T16:16:52.540000
|
||||
CVE-2023-28205,0,0,37b54305c2b3b2e91ff9c17ed58b5bf03ad35fd96c25af1cc3b2329eb3d9fb13,2025-02-14T16:19:28.840000
|
||||
CVE-2023-28206,0,1,ef1c4702c761ea5b1b4a52d49a8e7f3cb4359ab33625538e11d9132709f785dd,2025-02-28T14:53:55.297000
|
||||
CVE-2023-28206,0,0,ef1c4702c761ea5b1b4a52d49a8e7f3cb4359ab33625538e11d9132709f785dd,2025-02-28T14:53:55.297000
|
||||
CVE-2023-28208,0,0,8fc033bc09b7b40815121b04865c55bdd349e84c32a87bcecfbf9bec0bf2a61e,2024-12-12T14:26:18.893000
|
||||
CVE-2023-28209,0,0,ae4ef08c6845cc374897f4c97156cf6614c7c1aa7babc4b8a598ea53ad27998a,2024-11-21T07:54:36.330000
|
||||
CVE-2023-28210,0,0,0a0bf3ceb4448c02d2ec01f4d787a866c183ef21b5c4e0a2261156a4b2c55497,2024-11-21T07:54:36.460000
|
||||
@ -225918,7 +225918,7 @@ CVE-2023-3237,0,0,71364c0269205ecd02331252875cc17dcbb3a3b361f1f83cffee43f697e80f
|
||||
CVE-2023-32370,0,0,8af836e3f0aa426ccaafc4eb19ecf9bb0673e0f04a6355f18fa9f37c80cdcb5b,2024-11-21T08:03:13.227000
|
||||
CVE-2023-32371,0,0,2f4c4f84beaa5a69eb96316f215170b842018fba70a0460d227c16b6ae4ad731,2024-12-05T22:15:19.457000
|
||||
CVE-2023-32372,0,0,3735b4d95466ee316c3a874d27abb685a259a2edfa2f44f9a0507c56a6f3dc1e,2024-12-05T22:15:19.630000
|
||||
CVE-2023-32373,0,1,bed29a789a0ea3cadbb7b3cbab59d30b0092bd6e1e916abbd3c285f4354d5ecc,2025-02-28T14:53:55.297000
|
||||
CVE-2023-32373,0,0,bed29a789a0ea3cadbb7b3cbab59d30b0092bd6e1e916abbd3c285f4354d5ecc,2025-02-28T14:53:55.297000
|
||||
CVE-2023-32375,0,0,363d658b705a2905988a4381992e7e285988cfbbe26cd1b6b8bb78ee269b1a27,2024-12-05T22:15:19.837000
|
||||
CVE-2023-32376,0,0,95a529e4063990411c2ca53ecf165580bab43c05d8c5d78dd3562ccd8e98cd87,2024-11-21T08:03:13.820000
|
||||
CVE-2023-32377,0,0,ba36bd37b2f7c1e17d958e1f4d12ab4bfd5e2df22ada13420271f58cb2eaa905,2024-11-21T08:03:13.940000
|
||||
@ -227453,7 +227453,7 @@ CVE-2023-34184,0,0,2442eadc7f7ae90259cef50a8536ce9bd375108fe6cfeb3ded94765555a83
|
||||
CVE-2023-34185,0,0,4c5f4bf40def13d12fc3b4e803a32228e00caefcd5ded5fd0047f122b45f0170,2024-11-21T08:06:43.960000
|
||||
CVE-2023-34186,0,0,4a58da1254a6f379a26c0f12ec76897c53ffd6ab2c992e984b8875d4d20e7c36,2024-11-21T08:06:44.087000
|
||||
CVE-2023-34187,0,0,e39c35f0acec0e3289c801cedde27704e32b7fc40943aee9626533ee9c30b2f0,2024-11-21T08:06:44.200000
|
||||
CVE-2023-34188,0,1,96fc79f58f3b6c8bff0be6695ff26cf8292fada645e8527782080a2d07aa1a9a,2025-02-28T13:15:26.103000
|
||||
CVE-2023-34188,0,0,96fc79f58f3b6c8bff0be6695ff26cf8292fada645e8527782080a2d07aa1a9a,2025-02-28T13:15:26.103000
|
||||
CVE-2023-34189,0,0,d6ad5f296df91f0114d60cd15059ae984d1803b57558b7a9cf6db063968348f1,2025-02-13T17:16:34.990000
|
||||
CVE-2023-3419,0,0,df7622509fc0fb525cb2b82180f57ee07af06f367b6c89769e8b9596f2dc8ee2,2024-08-19T12:59:59.177000
|
||||
CVE-2023-34192,0,0,8e068b263c612b1cfb21e8e741bf1c7c4a21d6b7a2cbdefe2e15a248cfc85c32,2025-02-27T02:00:01.920000
|
||||
@ -250879,7 +250879,7 @@ CVE-2024-23218,0,0,0006a236dccd6d4040de501ecabab6df2a8d4ae9a8e9999585907fe0592c2
|
||||
CVE-2024-23219,0,0,b081eba13aaeb24e29a434866a76e06908163fa30bca3b04413807e5b483dafb,2024-11-21T08:57:13.093000
|
||||
CVE-2024-2322,0,0,b6a3f2a7272ccec85731db5e0c1d24de9d87c1f88cca07a2e8f931dd31cd1f77,2024-11-21T09:09:30.220000
|
||||
CVE-2024-23220,0,0,56ec6c9a0c3f534e407a25990b76d9f9791ed14187a0ea0d7f9d644c10ee29ca,2024-12-05T16:36:26.020000
|
||||
CVE-2024-23222,0,1,223e0e058e16e48787a6d33efec0059198ca659684bd4cd5053c30be40ac22ed,2025-02-28T14:53:55.297000
|
||||
CVE-2024-23222,0,0,223e0e058e16e48787a6d33efec0059198ca659684bd4cd5053c30be40ac22ed,2025-02-28T14:53:55.297000
|
||||
CVE-2024-23223,0,0,97ac05c5bd628f6060d7675906f33d1fe0db77305c0052816974d888e538e42e,2024-11-21T08:57:13.563000
|
||||
CVE-2024-23224,0,0,3122876ced1cc8436d3e7eab9ff8a2d8aa1d77b5acc6cd7e0eb039ac24059a35,2024-11-21T08:57:13.717000
|
||||
CVE-2024-23225,0,0,eb0782fbd39efc0814ff4369aa9a949dffdf3d310db982851067fe25e2177b43,2024-12-20T17:08:54.523000
|
||||
@ -253251,7 +253251,7 @@ CVE-2024-26302,0,0,fc5638e5f76b6239bb433ea39fb38c5e3b9f0a6c8cdf6356f010d0b303320
|
||||
CVE-2024-26303,0,0,683c75be030d56d22a80af6c831391a578fbff95d8a5ed04b60b17b6ef840eb2,2024-11-21T09:02:19.880000
|
||||
CVE-2024-26304,0,0,56bdf39b2fd43778db8cbd7fca5f3445a4b499228769887ce2c61f9a8c917ddf,2024-11-21T09:02:19.990000
|
||||
CVE-2024-26305,0,0,207af5372c6fc3b0f4dcceb5d80ed2c82c3f5ceac7cdcccb513c596eec6d1c42,2024-11-21T09:02:20.113000
|
||||
CVE-2024-26306,0,1,c069a5261b9deb6b8139352eeda6c0c8f7c03f1d588b2d0788484ef55f108ba1,2025-02-28T13:15:26.423000
|
||||
CVE-2024-26306,0,0,c069a5261b9deb6b8139352eeda6c0c8f7c03f1d588b2d0788484ef55f108ba1,2025-02-28T13:15:26.423000
|
||||
CVE-2024-26307,0,0,7842c4c7922e6571f612e3612dac5d83a0697d8de4e909017d23fbf7e015db1b,2025-02-13T18:17:19.070000
|
||||
CVE-2024-26308,0,0,16c5a822939dda338e35525cb9f0065373dcf06f18a2e2eeb8c290b5eb87a157,2025-02-13T18:17:19.247000
|
||||
CVE-2024-26309,0,0,29b65aa638465aa8c64d469c75ef0651a7e59224972ac32d6818f20d170c6343,2024-11-21T09:02:20.667000
|
||||
@ -260724,8 +260724,8 @@ CVE-2024-3604,0,0,0c726ac283946631d580b3ea047d73595adcfa6f29e4d6dd86387d266f76d4
|
||||
CVE-2024-36041,0,0,4161ec03e4910e4c5c5920c414e1b3c98759b0d09bfd41e398f897b3d9dafc1c,2024-11-21T09:21:29.970000
|
||||
CVE-2024-36042,0,0,dd61539a28198f3c8b42fd4591e0a6d17418212950f931fea78e92fd4e6935c4,2024-11-21T09:21:30.217000
|
||||
CVE-2024-36043,0,0,00a1a26002231c8d734c9833d45a24991429b502146d23df3d35da93eb56d40a,2024-11-25T18:15:12.213000
|
||||
CVE-2024-36046,0,0,a71f9d1ce14296660706291dadd5521ea62c73b042b976b441e24a15402db92d,2025-02-27T23:15:36.953000
|
||||
CVE-2024-36047,0,0,7264120aaaa6fc94b5c29d6436880879d0b64d1b7aadf156a698ef3f6a9f8070,2025-02-27T23:15:37.040000
|
||||
CVE-2024-36046,0,1,e0f89ab571addd6ccc0a13c28f0987d8d3a2bdf98f6b75fa4bcb1f70cd9694d0,2025-02-28T16:15:36.987000
|
||||
CVE-2024-36047,0,1,7e66dce3cf964e4f7a2d27e530fbb169401596667aecd9fd25058c0304521c6a,2025-02-28T16:15:37.137000
|
||||
CVE-2024-36048,0,0,6b6c5fd388f3c5986f4cdf4b3e4b8816859ba03c7b47f889f37c2525cf73f654,2024-11-21T09:21:30.610000
|
||||
CVE-2024-36049,0,0,f9b51d86d685dfe1d063607d35006d32c1c838354d8d3473b5b37799f50e9f38,2024-11-21T09:21:30.857000
|
||||
CVE-2024-3605,0,0,0fb02c5cf2e5e4c98134033d37fca28c8f48589ec9fb82d576232d111aa1b2cb,2024-11-21T09:29:58.370000
|
||||
@ -260922,7 +260922,7 @@ CVE-2024-36254,0,0,e9eafcb361359443ec23018fb13cf39a1d587f64303e68124435b0bb015f3
|
||||
CVE-2024-36255,0,0,d7e6d38e036e0f497734a7d5973895ae99eae13fe8c3484186f7badc29b2f6f4,2024-11-21T09:21:56.730000
|
||||
CVE-2024-36257,0,0,cad58f98b66417c7e60acb567f2e31a3e51b4ce6df93624519b9df82a7eb74e2,2024-11-21T09:21:56.843000
|
||||
CVE-2024-36258,0,0,9cc8c4c4751ce585d0e2c1f7f3567f7c439f589095db18218e1b06914b868919,2025-01-14T16:15:29.250000
|
||||
CVE-2024-36259,0,1,c607010f6bcd435299e92926ca57c078daf8730201372f203296f67e0bf5aa48,2025-02-28T13:35:22.340000
|
||||
CVE-2024-36259,0,0,c607010f6bcd435299e92926ca57c078daf8730201372f203296f67e0bf5aa48,2025-02-28T13:35:22.340000
|
||||
CVE-2024-3626,0,0,78aad9ff73ee6ab23b960b55469d89a68f0d505ac995edf1a620964e508201ae,2024-11-21T09:30:01.217000
|
||||
CVE-2024-36260,0,0,b666f10d8bb05b7b6ced715e15f1322e5ece66bcfb203e66e5a571b76c472ecd,2024-11-21T09:21:56.977000
|
||||
CVE-2024-36261,0,0,f5ff682881b9b6abafdae2b09997e2a3b3a9cf4a5388d69f9f28f1bab883cae3,2024-09-23T14:16:44.273000
|
||||
@ -262002,8 +262002,8 @@ CVE-2024-37562,0,0,5fff92160e9f180d6fe1aded48520e5c6ac7153a661594f79b08cd1a412b6
|
||||
CVE-2024-37563,0,0,d4e514fd48c3dba41649f3e92a70b0fc3d03714769849d8f74d1af2737d1f75a,2024-11-21T09:24:05.057000
|
||||
CVE-2024-37564,0,0,5e5d8deb79ce02d4743630e479447f7c70c69d56d6a449fdd936c029fbd20c0c,2024-11-21T09:24:05.177000
|
||||
CVE-2024-37565,0,0,bd3b0fed28622fea5585bed01c88dfdb2958196d65cd20b1a612d41bf69c1081,2024-11-21T09:24:05.300000
|
||||
CVE-2024-37566,0,0,afc84a078a0a9b0218b76c2095d0f3cbf51cacb2a19f425267ac8a51241b2229,2025-02-27T23:15:37.130000
|
||||
CVE-2024-37567,0,0,37373dfcb2cafd40454d28a85d4fe7f5b87c2e25faee6c6b1ee95dc38f4850da,2025-02-27T23:15:37.210000
|
||||
CVE-2024-37566,0,1,d7487614f1383b8e2d54d9b2f7eb4177f926ae1fbac788241489dfbdff3f5970,2025-02-28T16:15:37.287000
|
||||
CVE-2024-37567,0,1,095a22db77c4c3bfe2298e23cb9487c31d572f438204db0208873abaceb7a794,2025-02-28T16:15:37.440000
|
||||
CVE-2024-37568,0,0,856c439c12dc3c079f8f1ff58d753340540c2c4d1ef54b75ce0508c5a8fc3e4b,2024-11-21T09:24:05.420000
|
||||
CVE-2024-37569,0,0,8791820124a473aaae0983330573ab7c8bbd9a5bcb0565b37b2d1bf3d3a92c7e,2024-11-21T09:24:05.663000
|
||||
CVE-2024-3757,0,0,3b15c3daf6ad6b887b44ee124913c1fe2d8b6654e23c894d9fab65c313615142,2025-01-02T19:05:19.333000
|
||||
@ -264427,7 +264427,7 @@ CVE-2024-40891,0,0,cd384657f2d111008bfd470fb69eb7ea4bde608b2882d3a0b77536f9c9b56
|
||||
CVE-2024-40892,0,0,0bef0c096de1fd9b74596dba063b1cf9ffb172ff0abd417611d342278b46245f,2024-08-21T18:15:09.710000
|
||||
CVE-2024-40893,0,0,291c1cc414cfaa66f88e6f282a2cb52f9787a1f732797e904eca670adbd8e574,2024-08-21T18:15:09.803000
|
||||
CVE-2024-40895,0,0,9bfbe451c0a62cc469c348ecf829cab564e06b39ab7ab75fbb9a00c7abd49483,2024-11-21T09:31:48.250000
|
||||
CVE-2024-40896,0,1,5f7e6fd9c2c31c970118899766d9c516bac9322b2c6c87abac48ef256bc3de22,2025-02-28T13:15:26.640000
|
||||
CVE-2024-40896,0,0,5f7e6fd9c2c31c970118899766d9c516bac9322b2c6c87abac48ef256bc3de22,2025-02-28T13:15:26.640000
|
||||
CVE-2024-40897,0,0,5de984c0ce0b5f00f148c2d87f9ba7398ed21388187cb055a9d01cc9ee9adfcc,2024-11-21T09:31:48.450000
|
||||
CVE-2024-40898,0,0,b930bfc2025b86aea21c8f0fe9e9b6f374f54a09bbb3f9c81abb259ea87ff81c,2024-11-21T09:31:48.670000
|
||||
CVE-2024-40899,0,0,27efc19ced00bac32be0c727e443e10ff312f5514ad1f8ef8ce233abd9e28b76,2024-11-21T09:31:48.870000
|
||||
@ -264789,11 +264789,11 @@ CVE-2024-41320,0,0,2a8260febdf4182236d26585f89ccb09d753292e86d39cca719b36642a7c5
|
||||
CVE-2024-4133,0,0,b3ef04d8b613050399a6f1883ffb08523c57dc187e5da232762cb73f9e44251f,2024-11-21T09:42:15.257000
|
||||
CVE-2024-41332,0,0,cc02f33b74ee2fc09a400d920f2e51c2c74d8736b4d9412bf001181512ef987f,2024-08-21T18:53:15.927000
|
||||
CVE-2024-41333,0,0,5d0a608f5ba280f35dd905d53d7227fb5786301ea98916e97e2bbf00edad40a3,2024-08-07T20:54:44.060000
|
||||
CVE-2024-41334,0,0,5845fe9591167f9c467f1e510f13acf10e81dcd2a3a31ad8ab264052c9baab6a,2025-02-27T21:15:36.483000
|
||||
CVE-2024-41334,0,1,19fc7d796046d537baaf3e290ebf897dd5658e944e3500f513adc9003711ac13,2025-02-28T16:15:37.587000
|
||||
CVE-2024-41335,0,0,d3ee5339fa03fba2a5866f9228ee1228004e295e13e06cb78bf5e379f057c8b7,2025-02-27T21:15:36.577000
|
||||
CVE-2024-41336,0,0,016781541090851745dba8109086c189ef3dfbb0254c6447a98713589cf6b08a,2025-02-27T21:15:36.663000
|
||||
CVE-2024-41338,0,0,b47e2008cdd659d8f0cdedadff0bdbf2a4bfe032a7e5b7a1018561a0077dea9e,2025-02-27T21:15:36.753000
|
||||
CVE-2024-41339,0,0,1e4104fd36d7ad7e931c61df1818c76e0ae50dcc9a248e4d0ad045641b8caa68,2025-02-27T21:15:36.837000
|
||||
CVE-2024-41338,0,1,e56ba6eccb1f913832538e27e67769c5e8bccd2807f995ee0dbd29477021d2da,2025-02-28T15:15:11.727000
|
||||
CVE-2024-41339,0,1,95fa126ce7ca6eb431bde7c3eaf6536eeaddf344a24f0d3796abf61ab7720cf0,2025-02-28T16:15:37.737000
|
||||
CVE-2024-41340,0,0,5fb432a505b386cc70f2c3d152557019cc679584cc3504caf8f640cd7a854646,2025-02-27T21:15:36.923000
|
||||
CVE-2024-41344,0,0,c38269b43014f5cca22fcf4afc82639c77f2b3bf5d57b1fd1305828277d7aa4f,2024-10-16T16:38:43.170000
|
||||
CVE-2024-41345,0,0,8a6a87dfa4080752a61cdb78a92bacc8a547bb5d8e3779dd7c2648fc92fcbe83,2024-09-04T14:17:57.747000
|
||||
@ -267372,6 +267372,7 @@ CVE-2024-44739,0,0,6f14d5eff3dff89834977a4432c417b1af61a4ec23be95658eac014ef024c
|
||||
CVE-2024-4474,0,0,fd3fa0366486b2defe9820ff505cd8868a6d31d4b6c81237532989ab734a6a29,2024-11-21T09:42:53.833000
|
||||
CVE-2024-44744,0,0,13a864504cc5ddf6bb42dbaf6270143c0dd06ca1a55cc37045e7ac3ebdba96ae,2024-10-04T20:15:07.203000
|
||||
CVE-2024-4475,0,0,72508479edb36460622b89717d4eaedb904c06449d7fa7d7ad28501bc5167e0b,2024-11-21T09:42:54.027000
|
||||
CVE-2024-44754,1,1,51d8884ed60ddd5196cae74aa10aca836e313f5c9ccc9d407e3c2204d4dcafbc,2025-02-28T16:15:37.883000
|
||||
CVE-2024-44756,0,0,3cc662834a62f0e83640a2f55cde38782fc1a331b2d6e5bee47b1efe435ee06c,2024-11-21T17:15:14.863000
|
||||
CVE-2024-44757,0,0,d9a510bb1d7c1043adeeb88a2b183cdf042cccdbed8ccc72bbec6278713deeea,2024-11-21T17:15:15.110000
|
||||
CVE-2024-44758,0,0,0f87f6fd64cd3ee32a39610ab34845e08d64c79e468acaf8dd1c0a562c908710,2024-11-27T18:15:13.007000
|
||||
@ -273562,7 +273563,7 @@ CVE-2024-5338,0,0,abd3cd0960193de57487be3582f664d37ab06a1518c59aace36e92f8c263b6
|
||||
CVE-2024-5339,0,0,710abf6b65aa86d6904f8abe1101ad889bace87733c06f79ec2fe20822e1db4d,2024-11-21T09:47:27.133000
|
||||
CVE-2024-5340,0,0,2c2fba286498156a3309f1d9db161c67194b50596b7c53b6a9c7d8df9b89917d,2024-11-21T09:47:27.263000
|
||||
CVE-2024-53407,0,0,028a3e4d14bfc90eea9cc0c6159117f08c823fe19cf4dd25d6c1d6ae5f9691c6,2025-01-31T21:15:10.213000
|
||||
CVE-2024-53408,0,0,fad2504477aa5345271d8863f19e55b9d1c9b4f8952b0c3b4bfd093802e01e07,2025-02-27T20:16:01.790000
|
||||
CVE-2024-53408,0,1,bca41a6c9a00b3326c58a5e4ef803bf4bc97e2a577bf3cf6dac35f1dfb354578,2025-02-28T15:15:12.317000
|
||||
CVE-2024-5341,0,0,65ff8689965c5e29ef124f69d82afd0c059edc6db5694aac65d8224f8b995833,2025-01-29T18:09:48.960000
|
||||
CVE-2024-5342,0,0,c19ccffd3ff364daed28ff3ce4f3e63c62c97b909f79a312d9891c60f97a9cce,2024-11-21T09:47:27.517000
|
||||
CVE-2024-53425,0,0,dba41ac0d03c322e076798942c48ad94ab227d8220eb1e3a3534e4bdae7c6815,2024-11-26T18:15:20.090000
|
||||
@ -275645,7 +275646,7 @@ CVE-2024-57022,0,0,7e42a0eaca76fdaf1f44229827afe4be716bd161a679aa735bbcf9243657f
|
||||
CVE-2024-57023,0,0,01de6489e57ac073c34548807079eb2db864fcfb3e5a1353732f75c9ed7380a6,2025-01-21T18:15:14.677000
|
||||
CVE-2024-57024,0,0,dd6768df4410fc37cc8c4e8a948bb715a9d72db959034294e4bc9c1d5752aa77,2025-01-21T17:15:14.723000
|
||||
CVE-2024-57025,0,0,ba6eba255be4ec8bea25a2cdeb615de849af222ae85f044e2a8f32f3b1f8d1b7,2025-01-21T17:15:14.910000
|
||||
CVE-2024-57026,0,0,0ce7da422e56efba812503b0c89672f64eb9f586762377d6e2bc6a8033301fbd,2025-02-24T18:15:19.023000
|
||||
CVE-2024-57026,0,1,7bff9bc334b5d71c0a05dc5a9ea9ca7494445d26ebc88d7cd3f4e9846c368395,2025-02-28T16:07:41.847000
|
||||
CVE-2024-5703,0,0,3d28349807701c555fbb2ea67def24c228f00e38f4a4f9bb2c70209ffe7ffa47,2024-11-21T09:48:12.467000
|
||||
CVE-2024-57030,0,0,01cfe55aec58900b151b329d4f4c994ce5192423d15550098a7bc9a4f1082c3b,2025-01-17T21:15:09.823000
|
||||
CVE-2024-57031,0,0,1d859728d6d66a6bcfe5da6cfb404ff9c10a4846f51b5dd74817dad1e9184348,2025-02-18T21:15:22.993000
|
||||
@ -280037,7 +280038,7 @@ CVE-2025-0391,0,0,ab8f7905746a492810fe86765faefb1fff997fc4d75bb4be776d20c58a3559
|
||||
CVE-2025-0392,0,0,59785954f613ac3d294944412df9ed2ed102ba9c9ed7f965ef5916a645263c65,2025-01-11T11:15:06.657000
|
||||
CVE-2025-0393,0,0,959e820d75bdf7a4a4738ade5c663f0e8ec388ca0f6b468cd52102afbed99998,2025-01-14T09:15:21.263000
|
||||
CVE-2025-0394,0,0,8af05602da319139a083fa2a7a4d905dc508d9028abbcf98db5f09623dbab6ca,2025-01-14T09:15:21.430000
|
||||
CVE-2025-0395,0,1,6c0480d65cb32616c80fd0c8d1f7a5f562f82dede6c8f4e1992556d40f947f0a,2025-02-28T13:15:26.860000
|
||||
CVE-2025-0395,0,0,6c0480d65cb32616c80fd0c8d1f7a5f562f82dede6c8f4e1992556d40f947f0a,2025-02-28T13:15:26.860000
|
||||
CVE-2025-0396,0,0,18d39e6a7adcce3603c1c0aa9eb8543815bc0fec0a28cf7987d5debab0b3fa41,2025-01-12T12:15:17.963000
|
||||
CVE-2025-0397,0,0,08feac0210d169d6c425c3e514046442ce8702b1c9bf4c395a52e3132e842759,2025-01-12T13:15:07.333000
|
||||
CVE-2025-0398,0,0,4dce72a8ed9b3c643da849528d4f1f4a44373786b63fbf729a0e8a57af35dcc2,2025-01-12T14:15:08.993000
|
||||
@ -280585,9 +280586,9 @@ CVE-2025-1283,0,0,afbf73056779c2284deff120b8f7806be9c37e816574c79d2148aa8a36b813
|
||||
CVE-2025-1293,0,0,dbd776d425a4170ebc67e8f467d76fdb1a678c6cc6717d2977a3876685bd7d30,2025-02-20T01:15:09.950000
|
||||
CVE-2025-1295,0,0,675204ae0772f088026fc7f2412f8ab28c43fc8efc072775299de73d53b5b7cf,2025-02-27T06:15:21.990000
|
||||
CVE-2025-1298,0,0,3dd2689cd87b723cb3286c5171c05d1ec556a4e424788772bb6ebd63733b94f4,2025-02-18T15:15:18.007000
|
||||
CVE-2025-1300,1,1,8af8030eda5bcffd3329ecb9ab76f19bacf9a248f66c16097998067a1fef5ddf,2025-02-28T13:15:27.043000
|
||||
CVE-2025-1300,0,0,8af8030eda5bcffd3329ecb9ab76f19bacf9a248f66c16097998067a1fef5ddf,2025-02-28T13:15:27.043000
|
||||
CVE-2025-1302,0,0,c9edda63e4b129b83e4ee90ce332b54101d53accd5dbf791a7e11f6cb53d7bf8,2025-02-15T05:15:11.683000
|
||||
CVE-2025-1319,1,1,5e2010b65b7a6bd1939d4ac58e8aeeec8f3a828211b9c76b062b0f9265a18963,2025-02-28T13:15:27.267000
|
||||
CVE-2025-1319,0,0,5e2010b65b7a6bd1939d4ac58e8aeeec8f3a828211b9c76b062b0f9265a18963,2025-02-28T13:15:27.267000
|
||||
CVE-2025-1328,0,0,e2b9ad996048bde72d17ec9a6affa826b875b275e51ef749199b511eae0ab088,2025-02-25T18:03:46.410000
|
||||
CVE-2025-1332,0,0,b2a219041cab0c781fc3ed1f60bdc8b61e41c001aa3e4702ba19a1eecd971a1f,2025-02-16T01:15:20.440000
|
||||
CVE-2025-1335,0,0,dce25ef764e2aa650c44558ad3d713b3c94597288267c5643fa1900c1837549c,2025-02-16T04:15:23.230000
|
||||
@ -280752,15 +280753,15 @@ CVE-2025-1742,0,0,739398478edc9ddece71d3399efb7eaab9bd1f42fe6e327305583b23ec5e53
|
||||
CVE-2025-1743,0,0,f420185c057195d1e0f14c6168b6487602fc3aa63e73bf5c979d7d5fa960e55c,2025-02-27T18:15:27.650000
|
||||
CVE-2025-1744,0,0,5a87ca10a34bf3a6ed6260577bc3c3361cf00a88203a3dbaf734b36322e0f166,2025-02-28T04:15:09.603000
|
||||
CVE-2025-1745,0,0,9e47846683e7157da502ac5a77516ebab38eebca4e7114c00a2b8bf268b0ef4b,2025-02-27T18:15:27.923000
|
||||
CVE-2025-1746,1,1,4905eb9ce171b9c84f0ff4567ef4516b1dd01329de2a1281f5ad3cb7c808213b,2025-02-28T14:15:34.943000
|
||||
CVE-2025-1747,1,1,38667c313ae87dcac8801e920436cbf9de91b6386d76a94491b207db04add630,2025-02-28T14:15:35.480000
|
||||
CVE-2025-1748,1,1,9b3a786baaed5e1fea313e703ce5e17073f371e2ecf60737ba15e35e65e984f2,2025-02-28T14:15:35.617000
|
||||
CVE-2025-1749,1,1,dc52a2408e4b367b9ef9e6396ecbc738757ae1c437d9b5265de79d69416a00f5,2025-02-28T14:15:35.760000
|
||||
CVE-2025-1746,0,0,4905eb9ce171b9c84f0ff4567ef4516b1dd01329de2a1281f5ad3cb7c808213b,2025-02-28T14:15:34.943000
|
||||
CVE-2025-1747,0,0,38667c313ae87dcac8801e920436cbf9de91b6386d76a94491b207db04add630,2025-02-28T14:15:35.480000
|
||||
CVE-2025-1748,0,0,9b3a786baaed5e1fea313e703ce5e17073f371e2ecf60737ba15e35e65e984f2,2025-02-28T14:15:35.617000
|
||||
CVE-2025-1749,0,0,dc52a2408e4b367b9ef9e6396ecbc738757ae1c437d9b5265de79d69416a00f5,2025-02-28T14:15:35.760000
|
||||
CVE-2025-1751,0,0,e01d857b710fac9b7b6217b59ced116e365117c6a164f06207b3b6874d6bb32a,2025-02-27T12:15:35.030000
|
||||
CVE-2025-1755,0,0,022c1cdfb96f9a1d1782ea7a255dc456cf2cd5b57b21fa0b4b69f69925763fae,2025-02-27T16:15:39.137000
|
||||
CVE-2025-1756,0,0,20464066b464a87a383feb7ebdf7bcca2a5e74a3cb642d459cada04b2b771e8c,2025-02-27T16:15:39.287000
|
||||
CVE-2025-1757,0,0,2561a8f5c53734c028e83a6bda94ef29e169c9eb7376cb65d67bea6c6b2880de,2025-02-28T05:15:34.097000
|
||||
CVE-2025-1776,1,1,1a12423b233b2ef4ba69976c3f13498310a33efb7f09102cfb934a1191ac53f0,2025-02-28T14:15:35.943000
|
||||
CVE-2025-1776,0,0,1a12423b233b2ef4ba69976c3f13498310a33efb7f09102cfb934a1191ac53f0,2025-02-28T14:15:35.943000
|
||||
CVE-2025-20014,0,0,9692e5cd581a413def58e50a6734c5a89401a76673de37fc6a41ad824a4429cc,2025-01-29T20:15:35.207000
|
||||
CVE-2025-20016,0,0,6fccb84eb01c2cd66b422e82777f9738bfe5004121e1b551d0ae454724543c0e,2025-01-14T10:15:07.500000
|
||||
CVE-2025-20029,0,0,9b8781ac9a16d1f4940e1c86f8d87c8f1f8e66cb5b362950b6fdcd60c25126c4,2025-02-05T18:15:29.573000
|
||||
@ -280907,29 +280908,29 @@ CVE-2025-21179,0,0,56c99027ad0d41d9c697e46ad29c10aa7c65635cadb6d982db31f0458c99d
|
||||
CVE-2025-21181,0,0,71cd8e17f304081f3c6b0247ebefaddfaa4c353fcd560fa012fa60a9c60bf6bd,2025-02-25T16:58:10.650000
|
||||
CVE-2025-21182,0,0,cc183a741d3d0b62fc82a334158a2ca4fdae6dba068e1b2b22a750e1789b8393,2025-02-25T16:59:25.820000
|
||||
CVE-2025-21183,0,0,97c60133d935bc6f85808e271daf514b07d577c1754cf44ed14ffde224dc4835,2025-02-25T17:00:06.170000
|
||||
CVE-2025-21184,0,0,176160e0714d2f36cd4fbe06ebd53804dcc2c0a32ceb6ff9aa34164d56b4a8be,2025-02-11T18:15:30.180000
|
||||
CVE-2025-21184,0,1,5d06730c00c1dc25128c9225e356567d097b85e0f2f5db86ef3a5ca868f045e8,2025-02-28T16:02:50.353000
|
||||
CVE-2025-21185,0,0,382559bc0e85e942334285c772283cee8d0ca5a4b02a81c52925c66dc4c27526,2025-02-07T21:06:14.873000
|
||||
CVE-2025-21186,0,0,8a8ba48b87441215f1c43ede85a3e2813061bed74393786f63526fd639d8d046,2025-01-27T18:42:32.637000
|
||||
CVE-2025-21187,0,0,05994f278acb907e9de51acc1037aa859f6c5afa8dace166ad321c325a389481,2025-02-05T19:14:06.093000
|
||||
CVE-2025-21188,0,0,d7b111ff774208de399abaa7106629ded0401669785b4e7d276976a329fcb4c6,2025-02-11T18:15:30.403000
|
||||
CVE-2025-21188,0,1,b31daea4bb469ad7d6730cf1515cfeaf51d8ab46128508537630adf914f3c6d0,2025-02-28T16:02:50.353000
|
||||
CVE-2025-21189,0,0,329c5c7b58ec66de4b6d9cd35e4d5fad7c108585bdc451001b100691c802e6da,2025-01-27T18:42:24.057000
|
||||
CVE-2025-21190,0,0,07646213243484771acd05c18315f79affbd3ab1f88425845bb63026f32e5249,2025-02-11T18:15:30.610000
|
||||
CVE-2025-21190,0,1,8b2db67cb947998b5b47f9d8f9638f01b53bd9f51551def40a37a7298cc49d1c,2025-02-28T16:02:50.353000
|
||||
CVE-2025-21193,0,0,f3dd779a9a437e46fb9f30ebcb1d8f684dbb5bb54fbad7b1b2971d455cbeaf6b,2025-01-27T18:42:17.480000
|
||||
CVE-2025-21194,0,0,4cbf78ebc8712bf991c571b0aba8e62887ba280acbf4ff53a1e72f262be2e98d,2025-02-11T18:15:30.820000
|
||||
CVE-2025-21198,0,0,30ced4bcee2342c009365afe74226ad51767dba5f3716858f2213f4790dc210c,2025-02-11T18:15:31.020000
|
||||
CVE-2025-21200,0,0,6ab25dc0f13c1b559fcf2fc559f0570c61cd1162be881ce79b488a4181e69ae1,2025-02-11T18:15:31.203000
|
||||
CVE-2025-21201,0,0,d2413a74168a0176b2012cd098348307d5637137afb19e0de2733c18dfa6d511,2025-02-11T18:15:31.407000
|
||||
CVE-2025-21198,0,1,222e32f01b9e38e4737a53b6906c9486a61c90514139fa02b4604a18d9475dfb,2025-02-28T16:02:50.353000
|
||||
CVE-2025-21200,0,1,ac452cf5d8fd7ee078abc4bf9e8393b61bfd7da4b4c1364b02d5f65241a430a0,2025-02-28T16:02:50.353000
|
||||
CVE-2025-21201,0,1,33cb4b63d3221b6237489bbb3ee9e268d6b471a2dc92fe795430f2b500e3c69e,2025-02-28T16:02:50.353000
|
||||
CVE-2025-21202,0,0,ec4260bee4bd33c21d930aa9c88a20abd99a3045b6128e76b4237cf160037447,2025-01-27T18:41:27.647000
|
||||
CVE-2025-21206,0,0,a02355978bda2794140bd082fd4bb1ad68e34b4630d7bec026a9c3c3f9e70073,2025-02-11T18:15:31.610000
|
||||
CVE-2025-21206,0,1,30db180b922f51f20ac3dc612188bb7e771e65f4b8b0475b70dd344d2e79140d,2025-02-28T16:02:50.353000
|
||||
CVE-2025-21207,0,0,101f5aedceeec8e95c7aa4d154c4fe35b53d1787f61e5e9c69598a5be6aa3415,2025-01-27T18:41:10.137000
|
||||
CVE-2025-21208,0,0,b0a53ebd1070215b1bcd39c99be1f27e3e7b9ead96e6fc3a22f33f6cf9aad8ba,2025-02-11T18:15:31.793000
|
||||
CVE-2025-21208,0,1,d6750a7a531b1a606c0d78d60d369b1fb895e79f9d7f1a5bd19ef4a9dbb91db7,2025-02-28T16:02:50.353000
|
||||
CVE-2025-21210,0,0,c84a831bc35a18a87ded790fe8b815dc0d44394e8c6c6597dc3d56e3ec20caba,2025-01-27T18:41:01.470000
|
||||
CVE-2025-21211,0,0,50fa81ea05a4c3005f4b83063356d13451968ba8d4fc749bb0a7fe76cb440e94,2025-01-27T18:40:51.233000
|
||||
CVE-2025-21212,0,0,aacb1bf84eb558b2bb4a198390eb40b2a485f936654ed11ea4df089503cbb313,2025-02-11T18:15:31.980000
|
||||
CVE-2025-21212,0,1,c3cf3d27935b08b1f99386820b4127d20504a527c2595f60d30d4416e217289b,2025-02-28T16:02:50.353000
|
||||
CVE-2025-21213,0,0,528a66554547e026ef0c9b0b0fa09fbf1c8980822bfea86508e8a2b2b44cab58,2025-01-27T18:40:41.820000
|
||||
CVE-2025-21214,0,0,b4b935621385a9108dcb42d4939dc75aba798e00e57001b21bdc03438f9edeb9,2025-01-27T18:40:22.427000
|
||||
CVE-2025-21215,0,0,d2a7a3bab7c47b0d09e64e875649c7b8760c68d5eb2f91a478aa121dc7ec1b54,2025-01-27T18:38:36.757000
|
||||
CVE-2025-21216,0,0,0cbb9ca36d7650fef5802048880f5ab67aa53da9ffbd219a6bd893857b2720e2,2025-02-11T18:15:32.177000
|
||||
CVE-2025-21216,0,1,45d1d7bd112ffc38f5b77d54190bb31c57f5b75d109c891f1f43e2ff5b3e1337,2025-02-28T16:02:50.353000
|
||||
CVE-2025-21217,0,0,2a656e5f5fc07b78fa6836e5f8dacc4b8751a0a02e8cf075d2e4f1e57fc95b19,2025-01-27T18:45:20.030000
|
||||
CVE-2025-21218,0,0,d47e4e79318ebd737fa658b56f12e5fb3e30018465210b7af2b0de06c0f4fa6e,2025-01-27T18:46:14.487000
|
||||
CVE-2025-21219,0,0,424604839da721e4da825bd88d64a2416b0606f77e8b9a1190e69289c7bcf87d,2025-01-27T18:45:30.370000
|
||||
@ -280964,12 +280965,12 @@ CVE-2025-21250,0,0,4e89a566438f1e28e8838350c59192f7c8bae0fa09d47d1f5f0f32355a4e8
|
||||
CVE-2025-21251,0,0,5440266405ae4f5a1eea13ba92fdc75258561cea9d4f2a0de5b103c45023d533,2025-01-24T21:54:57.333000
|
||||
CVE-2025-21252,0,0,6055e1c3e54e765508a0901e6591be173ca3b23ac49a425f1555d0244d559b99,2025-01-24T21:55:05.360000
|
||||
CVE-2025-21253,0,0,998ca5933add3987f50ef40acf3b400fadb9546f5a2e9bc579c9e6ccaab029f6,2025-02-11T22:18:40.563000
|
||||
CVE-2025-21254,0,0,4bea76efb0bf23622a0abec3d73b3f9e14acca1cd80277710ecd589ef6304774,2025-02-11T18:15:32.450000
|
||||
CVE-2025-21254,0,1,910332dc041760d9bcacf4b45917e760de978adbf1ed3ea64c0f0eb9de810eb0,2025-02-28T16:02:50.353000
|
||||
CVE-2025-21255,0,0,8f8621218daa5ece83eff9b164b167c141187b12e766fb110978adaf1f9c2e14,2025-01-27T18:48:06.630000
|
||||
CVE-2025-21256,0,0,046fe33676648d49ab958cea06795409b133ff67b2e397e47021fff2b0522138,2025-01-27T18:48:24.467000
|
||||
CVE-2025-21257,0,0,a4aa8eb764428591988a4a9138451d22d056f236bcba642d77cd9ec1175f53f8,2025-01-27T18:48:34.057000
|
||||
CVE-2025-21258,0,0,1f595e4730f0a0101ec7c6ff9cdba409af8fa944714e620a4a15245fbce00d59,2025-01-27T18:48:41.780000
|
||||
CVE-2025-21259,0,0,d7b0093a133cb996a3cdc94dbca5e662a9f75469a51e68e8653813fca7fcf142,2025-02-11T18:15:32.643000
|
||||
CVE-2025-21259,0,1,8612071202f3d3592dfe29f2bd8e2314128424dcfd6444cf3765d46d69eb3ffb,2025-02-28T16:02:50.353000
|
||||
CVE-2025-21260,0,0,0a7c1f91b0bf465a1abd98448dde131c6cb51ed7e169790e660636d55e49b3fd,2025-01-27T18:48:49.733000
|
||||
CVE-2025-21261,0,0,4959e566283cea5c3896dc096def632c73bb2ea004186a297dc44c88399b27c3,2025-01-27T18:49:17.243000
|
||||
CVE-2025-21262,0,0,53158e77111cde0b4bd12b84c347b79f0eb1bff1360ae5aad148e2597a850e89,2025-02-07T15:18:05.707000
|
||||
@ -281031,7 +281032,7 @@ CVE-2025-21318,0,0,5ff3710adc6b941daeb26737ee7866486d9c863941517d982a3a97a2f0786
|
||||
CVE-2025-21319,0,0,f438a23881d0da34e77dbbeb756804186ca74b144b3c3080f26cf29fa51052e5,2025-01-22T14:44:50.860000
|
||||
CVE-2025-21320,0,0,2bf5b9d6da8e13f0983ed08dc9cf0a61539e484ef9e6c51d78636785e0ee89e5,2025-01-22T14:45:53.317000
|
||||
CVE-2025-21321,0,0,d4d04e43c9c7fb6525f2965fa6daa0b0763cac5e81f6f3f0f13b65d580f7df1d,2025-01-22T14:46:12.787000
|
||||
CVE-2025-21322,0,0,36afae68f9b6dac0a27406f76009dfe495c605cb1fe6c331fac0678ef1b2abae,2025-02-11T18:15:33.027000
|
||||
CVE-2025-21322,0,1,a36700e623b7042775efcb047c6ac1b4f686ce001f46283148f214e3a99ff95a,2025-02-28T16:02:50.353000
|
||||
CVE-2025-21323,0,0,3579efad4e0f21cb5d5e10181ff8bd15434d6e106723a06738697ae24cf26962,2025-01-22T14:47:11.963000
|
||||
CVE-2025-21324,0,0,c2e9c6050aebc2d5fce46b1fe10ad3769c28070faa9ed2d2a8db1006deedf2a2,2025-01-22T14:46:51.207000
|
||||
CVE-2025-21325,0,0,1e9ac8e59ea270ba0213d9228cab1f528312c5bc6be8058bf3244a2b7017b22f,2025-02-07T15:21:31.407000
|
||||
@ -281046,7 +281047,7 @@ CVE-2025-21333,0,0,53b6f65b92792d651bc7343d317ec8018ad636151aaaa8a80fe15ca3226ca
|
||||
CVE-2025-21334,0,0,fb3df3a0d1648467aa7e0321fb13275462a742bb7a179f1f294e1b9cdb3727fb,2025-01-15T20:10:39.600000
|
||||
CVE-2025-21335,0,0,9c773b3c3d2aec7a248b923a70e5a9419e37d3c58c810c23379a419aae9b4597,2025-01-15T20:24:16.867000
|
||||
CVE-2025-21336,0,0,b7a7af21654de5ea168378d332a9e476f7d93ade46bf5317196ee40a3fcc1e43,2025-01-21T20:06:35.720000
|
||||
CVE-2025-21337,0,0,3c3423720bfe0d3d5072f95cc233449f86d4cbb35a1665fae8eb0916093a452f,2025-02-11T18:15:33.217000
|
||||
CVE-2025-21337,0,1,4ecd6e025d7ebaf7e8da468d73429ad6ccf72512bb4d690335b019c7f0ef0c4d,2025-02-28T16:02:50.353000
|
||||
CVE-2025-21338,0,0,ab086dfca1b49b499ba269066d1300889796e4ccce139b627f3e11f636e5ba00,2025-01-21T20:08:44.550000
|
||||
CVE-2025-21339,0,0,442e09cebfc2b51a14d5657fd8bad9e56aae7d3e9ea789a26fb84dd1f483d156,2025-01-21T20:11:14.430000
|
||||
CVE-2025-21340,0,0,47a95b98bc1be24a98506d39df5e3299bee8f816a1a17f7db6df116c0f66f94c,2025-01-21T19:46:40.997000
|
||||
@ -281056,10 +281057,10 @@ CVE-2025-21343,0,0,0e6138632cbd4475bd4cf71380d93c68f5d11ac4e740335bf785ce7eae137
|
||||
CVE-2025-21344,0,0,77d0aae01883902f81c0082b1fd6e206aef82974cb0e1c18fa53c6191a390b22,2025-01-21T19:51:39.647000
|
||||
CVE-2025-21345,0,0,ac230bebff6a1de687bcf2e0076c3320e327f5480e428ca1278d4856df31bf4d,2025-01-21T19:52:00.833000
|
||||
CVE-2025-21346,0,0,6da1a91fd51d1c7f9efc77c3676ffc0110c4bfd2b3a26770e9ad9795c951b9d8,2025-01-21T19:29:19.320000
|
||||
CVE-2025-21347,0,0,7d247979bf64f9ac010be1587545cceb03684f90571ae4a0b943cddb699e58dc,2025-02-11T18:15:33.497000
|
||||
CVE-2025-21347,0,1,8cfce27db856ce3eff69887f010f026ad9562bd729925a63d44c80288ecaad45,2025-02-28T16:02:50.353000
|
||||
CVE-2025-21348,0,0,36348027e40942c567c69f35820a402c8269c98d7a09f418c29d2484864f7193,2025-01-21T19:30:06.410000
|
||||
CVE-2025-21349,0,0,6d368976201e52b2580e8a9496c7d5c8b2e92a3335a67efb6eb9f1e83d33b8cc,2025-02-11T18:15:33.697000
|
||||
CVE-2025-21350,0,0,afdf915978914de12ddb47f8080382e5c3b27b9e602062b6fd9ccfc1c9cd23c8,2025-02-11T18:15:33.903000
|
||||
CVE-2025-21349,0,1,db46bd1602eca8cc8efcbc08138ac4fee6a0023cf9b4457ce7e79e213146e7e0,2025-02-28T16:02:50.353000
|
||||
CVE-2025-21350,0,1,946270e0dd658c25e6baa6b79bc8dec8ca08afc3ec5969e08e7326bdd4ced332,2025-02-28T16:02:50.353000
|
||||
CVE-2025-21351,0,0,48fcf1f43b1c92276907ee87c085abb066108b8d3a5f6a626a70e01ac00f8d1a,2025-02-11T18:15:34.113000
|
||||
CVE-2025-21352,0,0,a81d34aef4d981cd5666fd3fb8eca70146e26df755619e866a1140df31ff66cc,2025-02-11T18:15:34.310000
|
||||
CVE-2025-21354,0,0,a598469cd8d9ca843575d2e14e67ad4c30737103b33f7ba5ce5c1e4d9ea266fc,2025-01-21T19:36:51.650000
|
||||
@ -281476,11 +281477,11 @@ CVE-2025-22262,0,0,2a90436047a91b64c9791cff4f6c4190896e3e92637458d2d2ccf25cb4f85
|
||||
CVE-2025-22264,0,0,79177f17455e861265910dfa8dd2caa5a78c248a179fa18c3179e839e36cde00,2025-01-23T16:15:37.257000
|
||||
CVE-2025-22265,0,0,51006a5fb12dad2a881e7b25e5673794091472c79149c473510be2ae25b435e8,2025-01-31T09:15:07.167000
|
||||
CVE-2025-22267,0,0,f20afa71bc4d80e805bd92045ab58754dc4544d5a2500dd19c3f675f1704780a,2025-01-21T18:15:15.100000
|
||||
CVE-2025-22270,1,1,807b190d4f0ab4862548791cd7de2d2a933fd7449e1c271e3fd639132b78f4c5,2025-02-28T13:15:27.447000
|
||||
CVE-2025-22271,1,1,91ec6fb2c7f6ff3b8a60edc9752c335d55e14d8925ec8a145331596c937be42d,2025-02-28T13:15:27.630000
|
||||
CVE-2025-22272,1,1,42f7a46564d7913ae6308d940294d39859803837e86188e097e97fa60177249d,2025-02-28T13:15:27.770000
|
||||
CVE-2025-22273,1,1,2c7f8a406837ec7fcfc81781955b6681674325dee7357023a9d83b9e62e01233,2025-02-28T13:15:27.927000
|
||||
CVE-2025-22274,1,1,e30e868656ff3716e21cdcc6b25ea9f58339324481c026750595358601d18f56,2025-02-28T13:15:28.067000
|
||||
CVE-2025-22270,0,0,807b190d4f0ab4862548791cd7de2d2a933fd7449e1c271e3fd639132b78f4c5,2025-02-28T13:15:27.447000
|
||||
CVE-2025-22271,0,0,91ec6fb2c7f6ff3b8a60edc9752c335d55e14d8925ec8a145331596c937be42d,2025-02-28T13:15:27.630000
|
||||
CVE-2025-22272,0,0,42f7a46564d7913ae6308d940294d39859803837e86188e097e97fa60177249d,2025-02-28T13:15:27.770000
|
||||
CVE-2025-22273,0,0,2c7f8a406837ec7fcfc81781955b6681674325dee7357023a9d83b9e62e01233,2025-02-28T13:15:27.927000
|
||||
CVE-2025-22274,0,0,e30e868656ff3716e21cdcc6b25ea9f58339324481c026750595358601d18f56,2025-02-28T13:15:28.067000
|
||||
CVE-2025-22275,0,0,dc0905974c721b278910237158fbbf2db7a66a5bd4b529c9d9744ba0c53260f3,2025-01-03T07:15:25.297000
|
||||
CVE-2025-22276,0,0,5a96987c782440e555f7f8980bf83cb51411fc2fe9b353a8ca4c203659e7b960,2025-01-21T18:15:15.303000
|
||||
CVE-2025-22280,0,0,36b57de6430c09432b283d29b57dfb0829f9a3d1e3f25ed71ed6457697f2c437,2025-02-27T14:15:36.033000
|
||||
@ -281929,7 +281930,7 @@ CVE-2025-23041,0,0,ffbaafde38ecaf1d57db26f1ec7a4a20e702b6709b42f775e18048cdcef4b
|
||||
CVE-2025-23042,0,0,92005faa00456aa5afa950bd4ab8b8a8c4ca330b482d221fa1133fac47b2b1ec,2025-01-14T19:15:44.863000
|
||||
CVE-2025-23044,0,0,5e238ef98168b46c67064d92777a89529d22a98b8fc7a39f7eca89a7360adfa3,2025-01-20T16:15:28.170000
|
||||
CVE-2025-23045,0,0,5cf9ac707be65a7cb86de834c6707744da7ff35db3dfb07c7b6442c00c475c3a,2025-01-28T16:15:40.690000
|
||||
CVE-2025-23046,0,1,1cf68391fb62814ffc831b7b70de30d2f6611790a490341e37e2a13af3ec6eca,2025-02-28T13:35:22.340000
|
||||
CVE-2025-23046,0,0,1cf68391fb62814ffc831b7b70de30d2f6611790a490341e37e2a13af3ec6eca,2025-02-28T13:35:22.340000
|
||||
CVE-2025-23047,0,0,3ee4320b803ce42dd11205db64093bb842ce4a15de110880f0def489c4da811f,2025-01-22T18:15:21.893000
|
||||
CVE-2025-23051,0,0,2aefe97c0e4795e43708ca4aacb91936a81f90520498dd80e4c2079564f0d911,2025-01-23T22:15:16
|
||||
CVE-2025-23052,0,0,9a4a619a1e7b14d6f53e5a9e3dd4b37f5c5ae0529b77755b68f828f3fee5c530,2025-01-23T22:15:16.133000
|
||||
@ -281950,7 +281951,7 @@ CVE-2025-23079,0,0,78406696c95877d502c4c9b4607328548f20c8246eeff924786f7d9228881
|
||||
CVE-2025-23080,0,0,165d07f7f3ac467de5017c0ed6cba0e28a556747a1eb136b531ca8b1a8ca92c9,2025-01-14T18:16:06.110000
|
||||
CVE-2025-23081,0,0,88335d5d07bd744f2fedc19f5e2fa983c6c0a68ed633dfc146bea9e424067900,2025-02-18T22:15:18.257000
|
||||
CVE-2025-23082,0,0,04a4f0f7ff5458b7d3b3235d7001e50f9111979d3e99a4d703024d8cba8b9a7c,2025-01-14T16:15:36.200000
|
||||
CVE-2025-23083,0,1,8794d1163f9c90d3558297e77a843291a9ed4394f361008c98d5897814fbbb44,2025-02-28T13:15:28.213000
|
||||
CVE-2025-23083,0,0,8794d1163f9c90d3558297e77a843291a9ed4394f361008c98d5897814fbbb44,2025-02-28T13:15:28.213000
|
||||
CVE-2025-23084,0,0,66590369971d77e93d3e89e756431c61a64701ffca1861b58e6771ed8d358e6e,2025-01-28T16:15:40.827000
|
||||
CVE-2025-23085,0,0,889840804db6ae2520e814bb23e4a445ed73b7383c73820abba13ffae74db43d,2025-02-25T13:15:11.103000
|
||||
CVE-2025-23086,0,0,4888f5c9ad449f11aff3bd2005f3629d6cccf17b7858fa974396434a1fb1f4d8,2025-02-18T21:15:28.100000
|
||||
@ -282476,7 +282477,7 @@ CVE-2025-24034,0,0,0513aff0d67a6ab3e752cdbedf94272062322edab521c53d56f2829172c81
|
||||
CVE-2025-24036,0,0,fd3c57cd706b96e46ede143d602a78012ec65a6099cd7b40520437f8a49a1d2e,2025-02-14T17:31:47.153000
|
||||
CVE-2025-24039,0,0,5a6deab998f4a04c1bf2aaa7b1334181c35e06bd462ce41096e3c4124f3cc07f,2025-02-11T18:15:40.927000
|
||||
CVE-2025-24042,0,0,73ad21e46a5c4d31019f3989aedc923af4f5ca7a98c12f75915ff5f7e0a5ecb5,2025-02-11T18:15:41.117000
|
||||
CVE-2025-24085,0,1,16fd34c7f1559d2ca0470b8ed5bce7fa8f5a69d4fe0caa33e25e5318e6902c07,2025-02-28T14:44:48.713000
|
||||
CVE-2025-24085,0,0,16fd34c7f1559d2ca0470b8ed5bce7fa8f5a69d4fe0caa33e25e5318e6902c07,2025-02-28T14:44:48.713000
|
||||
CVE-2025-24086,0,0,7c644e120cc41a291828171399048534e1e04b082ef7ed82ac204947bf2fab49,2025-02-05T15:15:21.750000
|
||||
CVE-2025-24087,0,0,b6d09d2d8f9c9fb48f34374a1c228deecaf72eab2a92a63c6f3af02952b5c8f4,2025-02-05T15:15:21.923000
|
||||
CVE-2025-24092,0,0,c2142774f8b6a5fb4fb8eae46efb7ed3d7fdb26d4474b884bc1d7f7bdbf6519a,2025-02-18T20:15:29.027000
|
||||
@ -283012,7 +283013,7 @@ CVE-2025-25187,0,0,2ca61614d958811964bebe01178416385840d15966b28619da4a847cdf1ef
|
||||
CVE-2025-25188,0,0,8332b0ed663268898f9dc507eb6ba5a1e3efef5bd07e1eeae60d0874cbfc0e96,2025-02-10T18:15:35.827000
|
||||
CVE-2025-25189,0,0,a628e87e2edecc47dcfffa2e7708c10cb2b7cfab3038d1b46f221f2a9f0dada1,2025-02-11T16:15:52.313000
|
||||
CVE-2025-25190,0,0,4b725faaa031d99f25796e8b66ce91cf84616a2e443190ddbf07d361baa5a988,2025-02-11T16:15:52.420000
|
||||
CVE-2025-25192,0,1,f74cd9479b2f16f1fb0994f5462818f67695100b0ab32ad2fce87051c690df90,2025-02-28T13:35:22.340000
|
||||
CVE-2025-25192,0,0,f74cd9479b2f16f1fb0994f5462818f67695100b0ab32ad2fce87051c690df90,2025-02-28T13:35:22.340000
|
||||
CVE-2025-25193,0,0,9c42e26d0a4f2052fdf43faa73fab75794f787f53e222117d45465e7383dd8fa,2025-02-21T18:15:37.253000
|
||||
CVE-2025-25194,0,0,278bc98c8a0ffe0e8a7e96acea34ed9bc50825c485f6cab1eaf41889a2da8034,2025-02-10T23:15:16.067000
|
||||
CVE-2025-25195,0,0,9f82ad0eee600ff678607270c492d4cbcd33d9a3de8e83d2ecd9f2fbea3012e4,2025-02-13T22:15:13.100000
|
||||
@ -283052,15 +283053,15 @@ CVE-2025-25299,0,0,3b24acf1d2004d8b4c6aca494f2152b620141ac014e17849f142b2b49de11
|
||||
CVE-2025-25300,0,0,b7e8b6eadd3a124fef94cf4aa5497d00354ff8a753d773c320d25ce607eb8590,2025-02-18T19:15:28.957000
|
||||
CVE-2025-25304,0,0,788bdf6a18db5f968ef26eda5d9694e7483d0ff6e02996c3186ccc8ce04eb43e,2025-02-14T20:15:36.903000
|
||||
CVE-2025-25305,0,0,3bc54120ca4b8dd20d29c84d0022ea008e0f61f5bc4dbbe96dcffeee4c227201,2025-02-18T19:15:29.083000
|
||||
CVE-2025-25323,0,0,9d54f6ab903f7d667d98dd6d95d826ddc61bd41984daa807a0cea6e5a7b6672c,2025-02-27T16:15:39.637000
|
||||
CVE-2025-25324,0,0,7416fec2baed5a33bce83e714c820e6bbedabfbd40ca8cfcf862246456e22209,2025-02-27T16:15:39.760000
|
||||
CVE-2025-25325,0,0,c86828d940531de1f9ba9a0442c7b2c96402c4863bc6449fb0dd3ed1d3adb216,2025-02-27T16:15:39.870000
|
||||
CVE-2025-25326,0,0,955c851f345060263e9fe55f19172f235fd67cd8788d63ce6cc31b2512aba192,2025-02-27T16:15:39.987000
|
||||
CVE-2025-25329,0,0,c3d3063744527b7041f8dc9250e7653ecc91051586557f2eedaceff36c858bc4,2025-02-27T17:15:16.773000
|
||||
CVE-2025-25330,0,0,0a92c33d73444ad205c8dff313935ffbef10654588ff371f4eadabd58b6898b2,2025-02-27T16:15:40.103000
|
||||
CVE-2025-25331,0,0,a7e1084033f53e04a790d37a366d6556d7807dba3d23cde5c9e0f882a523fe13,2025-02-27T16:15:40.217000
|
||||
CVE-2025-25323,0,1,54c9af45f2f2bfed3aa436188f6ce7824965b5e9499a263eee6799f1b580c38a,2025-02-28T16:15:38.153000
|
||||
CVE-2025-25324,0,1,5b3b99996b198db19221a35dfdee6e3286d56f16572f9eccdf5efd7ec5b7f501,2025-02-28T16:15:38.307000
|
||||
CVE-2025-25325,0,1,7ac080e63c68e81f20ebab4d9228091863e1f25a92d142072d332eff1106665c,2025-02-28T16:15:38.457000
|
||||
CVE-2025-25326,0,1,1a9fe139d2a10b61db16345be5208a2d5105ee9b72982d34638c81056b3db442,2025-02-28T16:15:38.603000
|
||||
CVE-2025-25329,0,1,f8df5c8a4c4e3265c55fb37312bb192f184fb852627dd7f8acac36e50a6f04fc,2025-02-28T16:15:38.760000
|
||||
CVE-2025-25330,0,1,d451444efefebddcfb3dc7ce57ea05cff35ad0f74087bdc5624d0389a4070004,2025-02-28T16:15:38.913000
|
||||
CVE-2025-25331,0,1,8c74b30f6148a1f86bd1fddddb97f036151c8ba6e2589e18bf4755369058efff,2025-02-28T16:15:39.067000
|
||||
CVE-2025-25333,0,0,6ec9229dcc048d32377c65843d4940ce53486855d56d23de2a9388232fef0e38,2025-02-27T20:16:05.073000
|
||||
CVE-2025-25334,0,0,09f902b448e0e9b7a4421fffc73864efaba3e065c215ef17ffb5bb8d88ce2adc,2025-02-27T16:15:40.463000
|
||||
CVE-2025-25334,0,1,8a5b702e03889f859a6722089fa3c1d74ed77250f83296688f277d5760349a3e,2025-02-28T16:15:39.220000
|
||||
CVE-2025-25343,0,0,58830c0cbe4e53f265b0e865057002c72f07a9ce6d9abf6a7103aa5f63054e04,2025-02-19T16:41:43.887000
|
||||
CVE-2025-25349,0,0,7493ec8dd478515c80e3ecdac0113c1e149e92926bb9c4a90d85a8a01928eead,2025-02-14T19:34:31.553000
|
||||
CVE-2025-25351,0,0,9b264106d1e8d6ffeef659bdf79e22896d03641eb6839ed6f4bc0ff6168f9910,2025-02-14T19:35:39.130000
|
||||
@ -283073,6 +283074,7 @@ CVE-2025-25387,0,0,795aaedd4d9e8425550ebd02042ed4a33da344802c3685e22ff847ed53820
|
||||
CVE-2025-25388,0,0,6a9ee7104467003ccd60c12bd6c2052b9cc5a20a13a182e826767b7f4080b7c7,2025-02-13T20:15:49.730000
|
||||
CVE-2025-25389,0,0,9f7198ffc91c33105d03adb0c3ce8e30d33f5591c78e15ae8d3046dd1ba01838,2025-02-14T17:15:20.663000
|
||||
CVE-2025-25460,0,0,c317be9cfc8a496a253be90cd4dd305f90921029147d15141e5d010adef6c61b,2025-02-24T17:15:13.900000
|
||||
CVE-2025-25461,1,1,abefcc4a87fcc99aefa917b36b82be2cf46ec09db32826ad12097cd2c52c8d9d,2025-02-28T16:15:39.387000
|
||||
CVE-2025-25462,0,0,dbc3563b50545898d3f8b4c30a8e42190486beb767837401e5dfa97eecd0595d,2025-02-26T16:15:16.933000
|
||||
CVE-2025-25467,0,0,88e8377464fdf0cf875ec11d3e8371c15a9465f85314cbabc34c80cddb507da4,2025-02-19T15:15:17.760000
|
||||
CVE-2025-25468,0,0,9209daa082de7c38fedec36f5894b79e14469faa71894740e63970dc23df9401,2025-02-19T15:15:17.930000
|
||||
@ -283082,11 +283084,11 @@ CVE-2025-25472,0,0,8e8e171c0300ed9c4535deaeb2c2bc6dfdc66f8eea702fd32fbe4b063c04d
|
||||
CVE-2025-25473,0,0,55a66f96efd34a8bf6959b64a64a5a6f9abb5389cacde3b98abeba35f1566b08,2025-02-20T22:15:30.863000
|
||||
CVE-2025-25474,0,0,19b4b9815528a4b62620eec453fddeb47ce33007b3a5a250ea134223fc74a338,2025-02-20T22:15:31.027000
|
||||
CVE-2025-25475,0,0,da2a2d1f29106b1a0859c6a65cc60cebccb336e99ff5a9bda978918b583eb1de,2025-02-20T22:15:31.190000
|
||||
CVE-2025-25477,0,0,fa83ac139b189320f092d0f9e3e2e1a7bed57d6a30bb1db68ae534b67a375486,2025-02-28T00:15:36.380000
|
||||
CVE-2025-25477,0,1,394fe8fbdba802b7903f79579ee44bd6683941d582eaf8039e436a0431983458,2025-02-28T16:15:39.550000
|
||||
CVE-2025-25505,0,0,c69812bbe3b275d3bc181fb00a5a8c8f1f26c31684ed982db7260503469e7b3d,2025-02-21T21:15:23.723000
|
||||
CVE-2025-25507,0,0,de0377abf29412c164b8ddbcc15e82dfdb0b23020e12eca7c6e04a6e73ed3fd7,2025-02-21T21:15:23.870000
|
||||
CVE-2025-25510,0,0,4997c3387297db121e4e9c1042fc244ebe3429ef8058fdf6dffa5196020cd974,2025-02-21T21:15:24.023000
|
||||
CVE-2025-25513,0,0,e1943590b94885dd95437dc0873156668d062e8b298f484c30409dc6927e7d11,2025-02-24T22:15:22.807000
|
||||
CVE-2025-25513,0,1,043fca8e8841337dff57d4e28c7e510727843dfcc920ce62d1b986adb3261f5b,2025-02-28T16:07:41.847000
|
||||
CVE-2025-25514,0,0,a88e1a82b61fa77a3d9be210516c051b22e00e5112ab6f4dd2c37a8804d7ed85,2025-02-25T22:15:23.900000
|
||||
CVE-2025-25515,0,0,12362bebea8038452149ff678950c3baddf6b375c654587a84882561b06de0a2,2025-02-26T15:15:25.327000
|
||||
CVE-2025-25516,0,0,2cdca73fe7bd0fa4ed6c7d23f220ae85378dc04e2718623592d0f0650288bb83,2025-02-26T15:15:25.507000
|
||||
@ -283118,7 +283120,7 @@ CVE-2025-25678,0,0,64aaf58170ee4d79f4247ea2c0b96da46219dfaa04983aca5741969381b23
|
||||
CVE-2025-25679,0,0,3cebd49dfacc441892528658235bae2847665b7e89bb57bdaf15bcd2a8d49f09,2025-02-24T18:15:19.213000
|
||||
CVE-2025-25727,0,0,eed5aa4e92d3da35936b8898a3baaeb8486976d6506a3be4f81c3be66ac7acb1,2025-02-28T00:15:36.530000
|
||||
CVE-2025-25728,0,0,38f14431760f1e1de76497ea43ecc3b94bb9bcb816cddba23322d1de4314bf22,2025-02-28T00:15:36.680000
|
||||
CVE-2025-25729,0,0,1dc91ccbc734b272e128d2f5d34455e76de95ae22cd801e388136dbd2cb156ea,2025-02-28T00:15:36.827000
|
||||
CVE-2025-25729,0,1,ccfc907a3cdaea5cce206db77e8845fc90cde4b7574f7479e893a07bcc8977b9,2025-02-28T16:15:39.707000
|
||||
CVE-2025-25730,0,0,9e2c6f6143351e8d57d454a9cbdf7dde2aaaadac268330af920b7098a53fa3df,2025-02-27T22:15:38.820000
|
||||
CVE-2025-25740,0,0,260642afc1d2693297702d9ce768686d3842d2725b59b6c83aca2b22bfb89d6f,2025-02-14T15:15:13.190000
|
||||
CVE-2025-25741,0,0,bd9cb96b0f827c65aa97d3cf4c8992f0fabd3fe1e6bdadae7cd80546fd1e08cc,2025-02-12T18:15:28.293000
|
||||
@ -283171,6 +283173,7 @@ CVE-2025-25898,0,0,04c24c833076238e0492d1c61fe2318923b61fe34c2d487dd0ee957f99c08
|
||||
CVE-2025-25899,0,0,0a94e1ac94f2348ced8620095f1a1cdbc8d00da1d929db972e382fd33828a613,2025-02-13T20:15:49.913000
|
||||
CVE-2025-25900,0,0,0a49592be1d696f5f901fb9602bc587e2d7d2fe0e68d036d6f9f545c33b03dec,2025-02-13T16:16:50.037000
|
||||
CVE-2025-25901,0,0,dbbaa66456410cc814c13398a9419347a95d4c008549889e82c9e08064439afb,2025-02-20T15:15:14.380000
|
||||
CVE-2025-25916,1,1,4e2a1655b4a6aaf2526c4ed04e0ae1c0b064355e8a43832e8f7a15b5c3ab676d,2025-02-28T16:15:39.867000
|
||||
CVE-2025-25942,0,0,aaefa1472b5a3a4ffd45a7b82843a4fba08935bb07eb639c11b55e6ffce6e19f,2025-02-20T15:15:14.587000
|
||||
CVE-2025-25943,0,0,3d5d9a9e07fdb25bf040079f5fee5cc6a8e0580e939f6bf77bd76c374978b2a7,2025-02-20T15:15:14.743000
|
||||
CVE-2025-25944,0,0,be3957e03ef6cc753272acb47a0146e6f3e330f45af5947134f7dfc1abcce0e4,2025-02-20T15:15:14.900000
|
||||
@ -283191,12 +283194,14 @@ CVE-2025-25994,0,0,aada5f394d667f977ebabeb966b8805ece67cc43768150de72852a4683195
|
||||
CVE-2025-25997,0,0,8311ed2a6df06b368ecafa86d7532bb151f440bce533690a11763d40390899ab,2025-02-18T15:15:19.063000
|
||||
CVE-2025-26013,0,0,681443cbea1aecaac9440a9aad5c73fef9dca35a347aeb9f53f53f8b739a2bc4,2025-02-21T21:15:24.470000
|
||||
CVE-2025-26014,0,0,4c1a90c8dc606f24e0044dd527fca4e86b8cdadd364a955283c3e7a026ac0a07,2025-02-21T17:15:14.680000
|
||||
CVE-2025-26047,1,1,6eee5ba5b9f24b6c856893b12cf4174655504b377088e34ddf907f7cbda1f89f,2025-02-28T16:15:40.020000
|
||||
CVE-2025-26058,0,0,d6830ee74802882f622367eb3e014df2c057afc37826d4d9d4aaa490f6e8cee5,2025-02-19T21:15:15.920000
|
||||
CVE-2025-26156,0,0,a8694b3e45c4489013c1cde3d4ed9238920082c88bdc645d51681df5fb2b64af,2025-02-14T19:15:15.033000
|
||||
CVE-2025-26157,0,0,7804a33112b2a9ac773ed8a4ce8c66afc4de94479098b9344da6b84d1d9bf6e8,2025-02-14T20:15:37.543000
|
||||
CVE-2025-26158,0,0,74f4aa7ecf6ee690115b15bb4e8b902a9165914e813dcbc79db25584fd407063,2025-02-14T20:15:37.677000
|
||||
CVE-2025-26200,0,0,d9acb4ba138dd72827a5ae920d4119a49bf77bd1ba787405ae12ac352e8d6e5e,2025-02-24T17:15:14.273000
|
||||
CVE-2025-26201,0,0,a0e37e7a39c3a07c990a5dcec1766cef724c487a497502e59b82a95800cc7450,2025-02-24T18:15:21.047000
|
||||
CVE-2025-26263,1,1,662238db512d7984d6510c607e6bc28336ca603217f5c07913705819afe210e7,2025-02-28T16:15:40.127000
|
||||
CVE-2025-26264,0,0,66de1a3ec09277cf0bb2d99d96048c42039940052291dafb3801b689b4bee37d,2025-02-27T22:15:38.947000
|
||||
CVE-2025-26304,0,0,70c8f37d4db2054dfe1099a4a2c4b06129c826d4de254465b9316b6b41e402d7,2025-02-21T21:15:24.653000
|
||||
CVE-2025-26305,0,0,1a1d603a79ab0dad9b04f449d78f3a3bb9f5de25113a59f9bb3a8e492946e3de,2025-02-21T21:15:24.803000
|
||||
@ -283207,6 +283212,7 @@ CVE-2025-26309,0,0,7ae8d8b0652f85e6f8fa255fc222f026973cab38848f066168ff295eb6f4e
|
||||
CVE-2025-26310,0,0,55b236dbeb9a20179e9b06fa335fdfa1062067456641081301fd898e499e9d2b,2025-02-21T18:16:17.950000
|
||||
CVE-2025-26311,0,0,06d541ea93c6274eb552bc93a46b31aab60c7a52133551001cc450c9b897d373,2025-02-20T21:15:25.907000
|
||||
CVE-2025-26325,0,0,159576ddbe22366fba138ea7241c3769634089af321e96d5b630e4afa13ef3de,2025-02-27T22:15:39.057000
|
||||
CVE-2025-26326,1,1,f84875e9cdda7cdf32b7a706b3dc63076bc4fd2668c6fb2df857dabcd399807f,2025-02-28T15:15:13.743000
|
||||
CVE-2025-26339,0,0,7ef9dcda2637eaa8381f0c62a213393a7c2029d066112e960db3e0a470c75e63,2025-02-12T14:15:33.510000
|
||||
CVE-2025-26340,0,0,ed188c0516bc2765f5549bbb8984d07bbadbda89d48c5e1878285cb21ac606ac,2025-02-12T14:15:33.650000
|
||||
CVE-2025-26341,0,0,6ceabd274660df5a6e17e97d397989a301331c2fd9cb0d9b6d2622b35273a528,2025-02-12T14:15:33.857000
|
||||
@ -283251,7 +283257,7 @@ CVE-2025-26408,0,0,e45f7220dde0c01d1f86f33cd06eb34062f4e98e989de6c2a87bcb17b259e
|
||||
CVE-2025-26409,0,0,998a9bcbefad73980e88cfadca0416aeed1df460a44260fe4402eb5cd5541ec2,2025-02-18T18:15:36.230000
|
||||
CVE-2025-26410,0,0,36441b10bb87afc4c434a271b8839836d6ce7232b364d1eaf56804b3d996ac68,2025-02-18T18:15:36.357000
|
||||
CVE-2025-26411,0,0,fcde46ab874d21012fc4027217c83b95868b33b38456359d4b0f7ea8269a0842,2025-02-18T18:15:36.473000
|
||||
CVE-2025-26465,0,1,fd5bb3f85e1a91bd1d8984e07b7b2ca19bc33d190686c0f3d55567168c5a90e9,2025-02-28T13:15:28.343000
|
||||
CVE-2025-26465,0,0,fd5bb3f85e1a91bd1d8984e07b7b2ca19bc33d190686c0f3d55567168c5a90e9,2025-02-28T13:15:28.343000
|
||||
CVE-2025-26473,0,0,db43a7bf53d161b7d55a979bd6ef7796563f4bed6f8f8b30bb8e0a50af69bdea,2025-02-13T22:15:13.417000
|
||||
CVE-2025-26490,0,0,b8bc76b2be7d18c514587d66cef4d0bee94c01d7b29c32dae10138139a41dc50,2025-02-14T20:15:37.847000
|
||||
CVE-2025-26491,0,0,7c0d222179eba4a77c32c46173122e282947b63a6de5118491e2b730e6dd9271,2025-02-14T20:15:37.930000
|
||||
@ -283443,17 +283449,17 @@ CVE-2025-27105,0,0,2bcb6c340eab97672213237573c8f6ca4eeeb614b47978107b021b4da927b
|
||||
CVE-2025-27106,0,0,2aea6dfc75b6de975e9d792b22b24672e89a28876099e5c80ae756f94e64cf9c,2025-02-22T16:15:33.003000
|
||||
CVE-2025-27108,0,0,34d6d1e5e32f01741f013d8e11085ab9652369eb805ee793ac08ed811303f050,2025-02-27T20:18:12.583000
|
||||
CVE-2025-27109,0,0,887a9677b59d7647aa063bf92caff49be61f0df690b2560df78fd44f58dfdb6b,2025-02-24T17:15:14.850000
|
||||
CVE-2025-27110,0,1,059d870c313e4a557107b6ae0082199b6395bbcf7d1ddc56d5ab6903b573b570,2025-02-28T13:35:22.340000
|
||||
CVE-2025-27110,0,0,059d870c313e4a557107b6ae0082199b6395bbcf7d1ddc56d5ab6903b573b570,2025-02-28T13:35:22.340000
|
||||
CVE-2025-27112,0,0,ad3bd22bf68a43e9ef7354153af5bf27543e71ad253b691f1b313d10f702063d,2025-02-27T20:18:12.583000
|
||||
CVE-2025-27113,0,0,1163a140c7451a5d3ce8342e9e475fc7cc692a5677dca273619df06c0d4a282d,2025-02-27T20:18:12.583000
|
||||
CVE-2025-27133,0,0,29844716abafc4dda273789005e3e16abe4d7d6eca7ec6dff9bfc7d4679fc1f2,2025-02-24T19:15:14.763000
|
||||
CVE-2025-27133,0,1,bfde01faa06d9963c59eea543f4fa6168a24602a8639d07c356f8930ec6d4154,2025-02-28T16:07:41.847000
|
||||
CVE-2025-27135,0,0,2b4ca3a6c4bb963ede6b8510aa33d7ae3bb4bf8b75f298a6d5163ae954eac93d,2025-02-25T19:15:15.677000
|
||||
CVE-2025-27137,0,0,5036444bad86a0c9ebb929b7c838035a7163ade99e11b550d9873b63f4ee5567,2025-02-24T21:15:11.213000
|
||||
CVE-2025-27139,0,1,2cb35550ba4d0a90ab72e4571ad148f33e854944ca8f8e710e17710ac500936e,2025-02-28T13:35:22.340000
|
||||
CVE-2025-27140,0,0,2964053422621195e160e6550b952cf184c5edc007d9580344eb7b008bf03c85,2025-02-24T22:15:22.913000
|
||||
CVE-2025-27141,0,0,19a3c923af6f6f4189d4be91702969bf59100e645a0e1d60c810d2a5f034238b,2025-02-24T22:15:23.077000
|
||||
CVE-2025-27142,0,1,50c09bf35dff2e7c08051751460862f1793d1e64e755656069216a4226cde41a,2025-02-28T13:35:22.340000
|
||||
CVE-2025-27143,0,0,f6196a31f6bc594bd6a78f99bac329907739405671eed3f73a517d781727c862,2025-02-24T23:15:11.160000
|
||||
CVE-2025-27139,0,0,2cb35550ba4d0a90ab72e4571ad148f33e854944ca8f8e710e17710ac500936e,2025-02-28T13:35:22.340000
|
||||
CVE-2025-27140,0,1,d3c1009e4516057e75528f0ea0c1750c681f482aac5f8e727817e26f4972cc64,2025-02-28T16:07:41.847000
|
||||
CVE-2025-27141,0,1,a41b4e712730fea8fc4ff3b257eef40bd5b6d5d5d2766ea09d25a8c5fedfd1f6,2025-02-28T16:07:41.847000
|
||||
CVE-2025-27142,0,0,50c09bf35dff2e7c08051751460862f1793d1e64e755656069216a4226cde41a,2025-02-28T13:35:22.340000
|
||||
CVE-2025-27143,0,1,b2f4a315d358bac155e0e21cd73590b43aafc4b46c5907cec4f1957f851895fd,2025-02-28T16:07:41.847000
|
||||
CVE-2025-27144,0,0,1943a5ebc9fa4ebdac773d12aa5884bfb6e27a53701e1ad9e8e73a5ce013ecba,2025-02-24T23:15:11.427000
|
||||
CVE-2025-27145,0,0,38c5004ff48d2670f12fb99a3982f3e02a12208e5ab880775c9f41ae19934057,2025-02-25T14:15:31.567000
|
||||
CVE-2025-27146,0,0,1949c93bb4c1257d1700888fb7aa70bba73c2053b702350dbd7e6c46a590f25c,2025-02-25T20:15:38.030000
|
||||
@ -283513,3 +283519,4 @@ CVE-2025-27356,0,0,451dc4587cf2e56d947661dd5ce87ee61b0a9c7d0fddf41bb2794ffa4d502
|
||||
CVE-2025-27357,0,0,a7a6432997c064e16448c81c4ebf75b9895532aa24152d8d607748003751d3d3,2025-02-24T15:15:21.233000
|
||||
CVE-2025-27364,0,0,a6f68b00caeb3fd723cefacab1c9d3bfa45e0696d3b00b1760eeb7e038956a23,2025-02-24T20:15:34.180000
|
||||
CVE-2025-27399,0,0,047834ae4cb02eb8c620e48e474a23f71c1292e787766a014db687c899a834cc,2025-02-27T18:15:30.380000
|
||||
CVE-2025-27400,1,1,cdbf04b984faf2bb61d60f663ecdfdd44190b0515d3b8d47c87701b41ec06666,2025-02-28T16:15:40.237000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user