mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-06 10:42:17 +00:00
Auto-Update: 2025-03-06T21:00:19.931543+00:00
This commit is contained in:
parent
15db88e4ab
commit
3b37bc8f04
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2015-4852",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2015-11-18T15:59:00.133",
|
||||
"lastModified": "2025-02-04T19:15:20.693",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2025-03-06T19:48:51.880",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2016-1646",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2016-03-29T10:59:00.160",
|
||||
"lastModified": "2025-01-29T18:15:26.670",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-03-06T19:48:51.880",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2017-9805",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2017-09-15T19:29:00.237",
|
||||
"lastModified": "2025-02-06T22:15:32.763",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2025-03-06T19:48:51.880",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2018-17480",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2018-12-11T16:29:00.623",
|
||||
"lastModified": "2025-01-29T18:15:30.320",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-03-06T19:48:51.880",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2018-7841",
|
||||
"sourceIdentifier": "cybersecurity@se.com",
|
||||
"published": "2019-05-22T20:29:01.480",
|
||||
"lastModified": "2025-02-07T14:15:45.157",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-03-06T19:48:51.880",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2020-1956",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2020-05-22T14:15:11.840",
|
||||
"lastModified": "2025-02-06T21:15:14.887",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2025-03-06T19:48:51.880",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-20553",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2024-12-19T00:15:04.710",
|
||||
"lastModified": "2024-12-19T00:15:04.710",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-03-06T19:02:47.083",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -19,6 +19,26 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
@ -51,10 +71,32 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ibm:sterling_b2b_integrator:*:*:*:*:standard:*:*:*",
|
||||
"versionStartIncluding": "5.2.0.0",
|
||||
"versionEndIncluding": "6.1.1.0",
|
||||
"matchCriteriaId": "7339F569-9A57-49ED-9C88-72FEA51328AC"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/6496761",
|
||||
"source": "psirt@us.ibm.com"
|
||||
"source": "psirt@us.ibm.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-24112",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2022-02-11T13:15:08.073",
|
||||
"lastModified": "2025-01-29T22:15:27.690",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-03-06T19:48:51.880",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-24706",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2022-04-26T10:15:35.083",
|
||||
"lastModified": "2025-01-29T17:15:17.557",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-03-06T19:48:51.880",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -101,7 +101,7 @@
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Secondary",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-26485",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2022-12-22T20:15:22.563",
|
||||
"lastModified": "2025-01-28T22:15:09.727",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2025-03-06T19:48:51.880",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-3075",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2022-09-26T16:15:13.463",
|
||||
"lastModified": "2025-02-03T14:15:33.320",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-03-06T19:48:51.880",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -138,7 +138,7 @@
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4NMJURTG5RO3TGD7ZMIQ6Z4ZZ3SAVYE/",
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
@ -167,7 +167,7 @@
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4NMJURTG5RO3TGD7ZMIQ6Z4ZZ3SAVYE/",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-3854",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2023-03-06T23:15:11.013",
|
||||
"lastModified": "2024-11-21T07:20:22.313",
|
||||
"lastModified": "2025-03-06T19:15:25.907",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-4134",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2023-03-06T23:15:11.313",
|
||||
"lastModified": "2024-11-21T07:34:38.480",
|
||||
"lastModified": "2025-03-06T20:15:37.757",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,13 +32,33 @@
|
||||
},
|
||||
"exploitabilityScore": 1.3,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
|
||||
"baseScore": 2.8,
|
||||
"baseSeverity": "LOW",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.3,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "secalert@redhat.com",
|
||||
"type": "Secondary",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -48,6 +68,16 @@
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-829"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-48364",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-03-06T14:15:09.463",
|
||||
"lastModified": "2024-11-21T07:33:15.467",
|
||||
"lastModified": "2025-03-06T20:15:36.740",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-287"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-0093",
|
||||
"sourceIdentifier": "psirt@okta.com",
|
||||
"published": "2023-03-06T21:15:10.933",
|
||||
"lastModified": "2024-11-21T07:36:32.343",
|
||||
"lastModified": "2025-03-06T20:15:37.947",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-77"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-77"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-0669",
|
||||
"sourceIdentifier": "cve@rapid7.com",
|
||||
"published": "2023-02-06T20:15:14.300",
|
||||
"lastModified": "2025-02-04T15:15:16.333",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-03-06T19:48:51.880",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-12059",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-12-12T06:15:23.167",
|
||||
"lastModified": "2024-12-12T06:15:23.167",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-03-06T19:54:57.093",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,14 +51,38 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:elementinvader:elementinvader_addons_for_elementor:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "1.3.2",
|
||||
"matchCriteriaId": "5DBCE620-AFD4-4CFE-8A89-6010FEB573B8"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3203139%40elementinvader-addons-for-elementor&new=3203139%40elementinvader-addons-for-elementor&sfp_email=&sfph_mail=",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/cf7ec469-70b7-4ec2-83df-c788c76730b4?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-12205",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2025-01-08T05:15:09.667",
|
||||
"lastModified": "2025-01-08T05:15:09.667",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-03-06T19:02:47.083",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -19,7 +19,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -51,14 +71,38 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:themesflat:themesflat_addons_for_elementor:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndIncluding": "2.2.4",
|
||||
"matchCriteriaId": "F2D20855-0DDA-4884-B4D4-8F28D49B8961"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3215859%40themesflat-addons-for-elementor&new=3215859%40themesflat-addons-for-elementor&sfp_email=&sfph_mail=",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/45c6c041-91b0-4abe-ba72-ec1251651fdb?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,20 +2,24 @@
|
||||
"id": "CVE-2024-13796",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2025-02-28T05:15:32.950",
|
||||
"lastModified": "2025-02-28T05:15:32.950",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-03-06T20:21:36.547",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Post Grid and Gutenberg Blocks \u2013 ComboBlocks plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.3.6 via the /wp-json/post-grid/v2/get_users REST API This makes it possible for unauthenticated attackers to extract sensitive data including including emails and other user data."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El complemento Post Grid y Gutenberg Blocks \u2013 ComboBlocks para WordPress es vulnerable a la exposici\u00f3n de informaci\u00f3n confidencial en todas las versiones hasta la 2.3.6 incluida a trav\u00e9s de la API REST /wp-json/post-grid/v2/get_users. Esto hace posible que atacantes no autenticados extraigan datos confidenciales, incluidos correos electr\u00f3nicos y otros datos del usuario."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||||
@ -32,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,20 +69,57 @@
|
||||
"value": "CWE-200"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:pickplugins:post_grid:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "2.3.7",
|
||||
"matchCriteriaId": "2DBD40FB-4802-4D8E-B921-CC82EA8FDCB6"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/post-grid/trunk/includes/blocks/functions-rest.php?rev=3242718#L2055",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3245187%40post-grid&new=3245187%40post-grid&sfp_email=&sfph_mail=",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/0407223a-cd41-43d1-87b0-d6b83b57d4b3?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-39623",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2025-01-02T13:15:07.663",
|
||||
"lastModified": "2025-01-02T13:15:07.663",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-03-06T19:02:47.083",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -51,10 +71,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cridio:listingpro:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "2.9.5",
|
||||
"matchCriteriaId": "CC8FBAEC-D045-4B2E-9A33-686FD55135CF"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/wordpress/theme/listingpro/vulnerability/wordpress-listingpro-theme-2-9-3-cross-site-request-forgery-csrf-to-account-takeover-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
"source": "audit@patchstack.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-45195",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2024-09-04T09:15:04.397",
|
||||
"lastModified": "2025-02-05T02:00:01.767",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-03-06T19:48:51.880",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -125,7 +125,10 @@
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/09/03/6",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-506xx/CVE-2024-50600.json
Normal file
21
CVE-2024/CVE-2024-506xx/CVE-2024-50600.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-50600",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-03-06T19:15:26.750",
|
||||
"lastModified": "2025-03-06T19:15:26.750",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in Samsung Mobile Processor and Wearable Processor Exynos 980, 850, 1080, 1280, 1330, 1380, 1480, W920, W930, and W1000. Lack of a boundary check in STOP_KEEP_ALIVE_OFFLOAD leads to out-of-bounds access. An attacker can send a malformed message to the target through the Wi-Fi driver."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-53244",
|
||||
"sourceIdentifier": "prodsec@splunk.com",
|
||||
"published": "2024-12-10T18:15:41.243",
|
||||
"lastModified": "2024-12-10T18:15:41.243",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-03-06T19:54:57.093",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 5.7,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,12 +69,79 @@
|
||||
"value": "CWE-200"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:*",
|
||||
"versionStartIncluding": "9.1.0",
|
||||
"versionEndExcluding": "9.1.7",
|
||||
"matchCriteriaId": "6653C37D-03C0-47C1-BC9C-510EBB0CB4BE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:*",
|
||||
"versionStartIncluding": "9.2.0",
|
||||
"versionEndExcluding": "9.2.4",
|
||||
"matchCriteriaId": "E31DE8DF-1AAD-4570-93E3-711C07FE1227"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:*",
|
||||
"versionStartIncluding": "9.3.0",
|
||||
"versionEndExcluding": "9.3.2",
|
||||
"matchCriteriaId": "A709D871-A35B-4CF2-A9D7-23CE29D0A8C6"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:splunk:splunk_cloud_platform:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "9.1.2312",
|
||||
"versionEndExcluding": "9.1.2312.206",
|
||||
"matchCriteriaId": "C0338CF9-1AC9-4F45-9A68-06172C6B36A1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:splunk:splunk_cloud_platform:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "9.2.2403",
|
||||
"versionEndExcluding": "9.2.2403.109",
|
||||
"matchCriteriaId": "1D640552-2CAE-4747-9683-C7DC45D556EF"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:splunk:splunk_cloud_platform:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "9.2.2406",
|
||||
"versionEndExcluding": "9.2.2406.107",
|
||||
"matchCriteriaId": "5C9D4F64-DAA8-4692-AE4F-171777E8D7C3"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://advisory.splunk.com/advisories/SVD-2024-1202",
|
||||
"source": "prodsec@splunk.com"
|
||||
"source": "prodsec@splunk.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-53245",
|
||||
"sourceIdentifier": "prodsec@splunk.com",
|
||||
"published": "2024-12-10T18:15:41.397",
|
||||
"lastModified": "2024-12-10T18:15:41.397",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-03-06T19:54:57.093",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.6,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,12 +69,58 @@
|
||||
"value": "CWE-200"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:*",
|
||||
"versionStartIncluding": "9.1.0",
|
||||
"versionEndExcluding": "9.1.7",
|
||||
"matchCriteriaId": "6653C37D-03C0-47C1-BC9C-510EBB0CB4BE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:*",
|
||||
"versionStartIncluding": "9.2.0",
|
||||
"versionEndExcluding": "9.2.4",
|
||||
"matchCriteriaId": "E31DE8DF-1AAD-4570-93E3-711C07FE1227"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:splunk:splunk_cloud_platform:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "9.1.2312",
|
||||
"versionEndExcluding": "9.1.2312.206",
|
||||
"matchCriteriaId": "C0338CF9-1AC9-4F45-9A68-06172C6B36A1"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://advisory.splunk.com/advisories/SVD-2024-1203",
|
||||
"source": "prodsec@splunk.com"
|
||||
"source": "prodsec@splunk.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-53796",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-12-06T14:15:21.910",
|
||||
"lastModified": "2024-12-06T14:15:21.910",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-03-06T19:54:57.093",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 3.7
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -51,10 +71,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:themesflat:themesflat_addons_for_elementor:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndIncluding": "2.2.2",
|
||||
"matchCriteriaId": "87F800FE-24D3-4B37-81C3-2775F4B70B9D"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/wordpress/plugin/themesflat-addons-for-elementor/vulnerability/wordpress-themesflat-addons-for-elementor-plugin-2-2-2-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
"source": "audit@patchstack.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-54253",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-12-09T13:15:43.720",
|
||||
"lastModified": "2024-12-09T13:15:43.720",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-03-06T19:54:57.093",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 3.7
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -51,10 +71,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:wpxpro:xpro_addons_for_elementor:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "1.4.6.2",
|
||||
"matchCriteriaId": "9F3FADC8-E122-4E0C-A68B-13C5F3061776"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/wordpress/plugin/xpro-elementor-addons/vulnerability/wordpress-xpro-addons-for-elementor-plugin-1-4-6-1-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
"source": "audit@patchstack.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-56161",
|
||||
"sourceIdentifier": "psirt@amd.com",
|
||||
"published": "2025-02-03T18:15:37.280",
|
||||
"lastModified": "2025-03-06T06:15:36.640",
|
||||
"lastModified": "2025-03-06T19:15:26.840",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -63,6 +63,10 @@
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2025/03/06/2",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
},
|
||||
{
|
||||
"url": "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-7033.html",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-56225",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-12-31T11:15:08.380",
|
||||
"lastModified": "2024-12-31T11:15:08.380",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-03-06T19:02:47.083",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.5
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -51,10 +71,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:leap13:premium_addons_for_elementor:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "4.10.57",
|
||||
"matchCriteriaId": "B248D49B-01CA-4DAE-A549-E58ADDE7237D"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/wordpress/plugin/premium-addons-for-elementor/vulnerability/wordpress-premium-addons-for-elementor-plugin-4-10-56-broken-access-control-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
"source": "audit@patchstack.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,19 +2,43 @@
|
||||
"id": "CVE-2025-0801",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2025-02-28T05:15:33.683",
|
||||
"lastModified": "2025-02-28T05:15:33.683",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-03-06T20:21:36.547",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The RateMyAgent Official plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.4.0. This is due to missing or incorrect nonce validation on the 'rma-settings-wizard'. This makes it possible for unauthenticated attackers to update the plugin's API key via a forged request granted they can trick a site administrator into performing an action such as clicking on a link."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El complemento RateMyAgent Official para WordPress es vulnerable a Cross-Site Request Forgery en todas las versiones hasta la 1.4.0 incluida. Esto se debe a una validaci\u00f3n de nonce incorrecta o faltante en el 'rma-settings-wizard'. Esto hace posible que atacantes no autenticados actualicen la clave API del complemento a trav\u00e9s de una solicitud falsificada, siempre que puedan enga\u00f1ar a un administrador del sitio para que realice una acci\u00f3n como hacer clic en un enlace."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
@ -45,20 +69,57 @@
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ratemyagent:ratemyagent:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "1.5.0",
|
||||
"matchCriteriaId": "97281026-6E1D-4581-BFF3-FDF3FBA3C72F"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3244718%40ratemyagent-official&new=3244718%40ratemyagent-official&sfp_email=&sfph_mail=",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://wordpress.org/plugins/ratemyagent-official/",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/b559017c-f1d2-4f18-bfb6-e52f05910e34?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,19 +2,43 @@
|
||||
"id": "CVE-2025-1505",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2025-02-28T05:15:33.923",
|
||||
"lastModified": "2025-02-28T05:15:33.923",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-03-06T20:21:36.547",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Advanced AJAX Product Filters plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'nonce' parameter in all versions up to, and including, 1.6.8.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El complemento Advanced AJAX Product Filters para WordPress es vulnerable a Cross-Site Scripting Reflejado a trav\u00e9s del par\u00e1metro 'nonce' en todas las versiones hasta la 1.6.8.1 incluida, debido a una depuraci\u00f3n de entrada insuficiente y al escape de salida. Esto permite que atacantes no autenticados inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutan si logran enga\u00f1ar a un usuario para que realice una acci\u00f3n, como hacer clic en un enlace."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
@ -45,16 +69,50 @@
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:berocket:advanced_ajax_product_filters:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "1.6.8.2",
|
||||
"matchCriteriaId": "E5F57B06-EA69-40DE-A3CD-67CF358A8A14"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3245830/woocommerce-ajax-filters/trunk/includes/wizard.php",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/94b289bf-0ef1-47d1-98bd-8f7bb753c2bc?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,20 +2,24 @@
|
||||
"id": "CVE-2025-1757",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2025-02-28T05:15:34.097",
|
||||
"lastModified": "2025-02-28T05:15:34.097",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-03-06T20:21:36.547",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The WordPress Portfolio Builder \u2013 Portfolio Gallery plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'pfhub_portfolio' and 'pfhub_portfolio_portfolio' shortcodes in all versions up to, and including, 1.1.7 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El complemento Portfolio Builder \u2013 Portfolio Gallery de WordPress es vulnerable a cross site scripting almacenado a trav\u00e9s de los c\u00f3digos cortos 'pfhub_portfolio' y 'pfhub_portfolio_portfolio' del complemento en todas las versiones hasta la 1.1.7 incluida, debido a una depuraci\u00f3n de entrada insuficiente y al escape de salida en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
|
||||
@ -32,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,20 +69,57 @@
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:portfoliohub:portfoliohub:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndIncluding": "1.1.7",
|
||||
"matchCriteriaId": "5F653461-1C83-4AB9-8418-87811AC114AE"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/uber-grid/trunk/src/Frontend.php#L39",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/uber-grid/trunk/src/Frontend.php#L542",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/36dcf1c4-1e0a-4ab6-a1b3-a9fe3aaddd0b?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
141
CVE-2025/CVE-2025-20xx/CVE-2025-2036.json
Normal file
141
CVE-2025/CVE-2025-20xx/CVE-2025-2036.json
Normal file
@ -0,0 +1,141 @@
|
||||
{
|
||||
"id": "CVE-2025-2036",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-03-06T19:15:28.373",
|
||||
"lastModified": "2025-03-06T19:15:28.373",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in s-a-zhd Ecommerce-Website-using-PHP 1.0. It has been classified as critical. This affects an unknown part of the file details.php. The manipulation of the argument pro_id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "LOW",
|
||||
"vulnIntegrityImpact": "LOW",
|
||||
"vulnAvailabilityImpact": "LOW",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
||||
"baseScore": 6.5,
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL"
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-74"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.298779",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.298779",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.512405",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.websecurityinsights.my.id/2025/03/e-commerce-10-detailsphpproid-sql.html?m=1",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
145
CVE-2025/CVE-2025-20xx/CVE-2025-2037.json
Normal file
145
CVE-2025/CVE-2025-20xx/CVE-2025-2037.json
Normal file
@ -0,0 +1,145 @@
|
||||
{
|
||||
"id": "CVE-2025-2037",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-03-06T19:15:28.540",
|
||||
"lastModified": "2025-03-06T19:15:28.540",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in code-projects Blood Bank Management System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /user_dashboard/delete_requester.php. The manipulation of the argument requester_id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "LOW",
|
||||
"vulnIntegrityImpact": "LOW",
|
||||
"vulnAvailabilityImpact": "LOW",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
||||
"baseScore": 6.5,
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL"
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-74"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://code-projects.org/",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/intercpt/XSS1/blob/main/SQL1.md",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.298780",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.298780",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.512550",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
145
CVE-2025/CVE-2025-20xx/CVE-2025-2038.json
Normal file
145
CVE-2025/CVE-2025-20xx/CVE-2025-2038.json
Normal file
@ -0,0 +1,145 @@
|
||||
{
|
||||
"id": "CVE-2025-2038",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-03-06T20:15:38.583",
|
||||
"lastModified": "2025-03-06T20:15:38.583",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in code-projects Blood Bank Management System 1.0. It has been rated as critical. This issue affects some unknown processing of the file /upload/. The manipulation leads to exposure of information through directory listing. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 6.9,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "LOW",
|
||||
"vulnIntegrityImpact": "LOW",
|
||||
"vulnAvailabilityImpact": "LOW",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||||
"baseScore": 7.3,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||||
"baseScore": 7.5,
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "NONE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL"
|
||||
},
|
||||
"baseSeverity": "HIGH",
|
||||
"exploitabilityScore": 10.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-548"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-552"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://code-projects.org/",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/intercpt/XSS1/blob/main/Directorylisting.md",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.298781",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.298781",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.512558",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
145
CVE-2025/CVE-2025-20xx/CVE-2025-2039.json
Normal file
145
CVE-2025/CVE-2025-20xx/CVE-2025-2039.json
Normal file
@ -0,0 +1,145 @@
|
||||
{
|
||||
"id": "CVE-2025-2039",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-03-06T20:15:38.753",
|
||||
"lastModified": "2025-03-06T20:15:38.753",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability classified as critical has been found in code-projects Blood Bank Management System 1.0. Affected is an unknown function of the file /admin/delete_members.php. The manipulation of the argument member_id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 5.1,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "LOW",
|
||||
"vulnIntegrityImpact": "LOW",
|
||||
"vulnAvailabilityImpact": "LOW",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L",
|
||||
"baseScore": 4.7,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:M/C:P/I:P/A:P",
|
||||
"baseScore": 5.8,
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "MULTIPLE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL"
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 6.4,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-74"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://code-projects.org/",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/intercpt/XSS1/blob/main/SQL4.md",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.298782",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.298782",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.512564",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
141
CVE-2025/CVE-2025-20xx/CVE-2025-2040.json
Normal file
141
CVE-2025/CVE-2025-20xx/CVE-2025-2040.json
Normal file
@ -0,0 +1,141 @@
|
||||
{
|
||||
"id": "CVE-2025-2040",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-03-06T20:15:38.920",
|
||||
"lastModified": "2025-03-06T20:15:38.920",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability classified as critical was found in zhijiantianya ruoyi-vue-pro 2.4.1. Affected by this vulnerability is an unknown functionality of the file /admin-api/bpm/model/deploy. The manipulation leads to improper neutralization of special elements used in a template engine. The attack can be launched remotely. The exploit has been disclosed to the public and may be used."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "LOW",
|
||||
"vulnIntegrityImpact": "LOW",
|
||||
"vulnAvailabilityImpact": "LOW",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
||||
"baseScore": 6.5,
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL"
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-791"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-1336"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/uglory-gll/javasec/blob/main/ruoyi-vue-pro.md",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.298783",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.298783",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.512574",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-22786",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2025-01-15T16:15:41.440",
|
||||
"lastModified": "2025-01-15T16:15:41.440",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-03-06T19:02:47.083",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.6,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,12 +69,43 @@
|
||||
"value": "CWE-35"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-22"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:elementinvader:elementinvader_addons_for_elementor:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "1.2.7",
|
||||
"matchCriteriaId": "991BDA24-9A5A-411C-96AD-9D4F92D4CD71"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/wordpress/plugin/elementinvader-addons-for-elementor/vulnerability/wordpress-elementinvader-addons-for-elementor-plugin-1-2-6-local-file-inclusion-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
"source": "audit@patchstack.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-24578",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2025-01-24T18:15:34.947",
|
||||
"lastModified": "2025-01-24T18:15:34.947",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-03-06T19:02:47.083",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 3.7
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -51,10 +71,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:elementinvader:elementinvader_addons_for_elementor:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "1.3.1",
|
||||
"matchCriteriaId": "6C6F42E3-7FF8-44B9-ABF7-0002BB3F509E"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/wordpress/plugin/elementinvader-addons-for-elementor/vulnerability/wordpress-elementinvader-addons-for-elementor-plugin-1-3-0-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
"source": "audit@patchstack.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-24618",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2025-01-24T18:15:37.430",
|
||||
"lastModified": "2025-01-24T18:15:37.430",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-03-06T19:02:47.083",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -51,10 +71,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:elementinvader:elementinvader_addons_for_elementor:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "1.3.2",
|
||||
"matchCriteriaId": "5DBCE620-AFD4-4CFE-8A89-6010FEB573B8"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/wordpress/plugin/elementinvader-addons-for-elementor/vulnerability/wordpress-elementinvader-addons-for-elementor-plugin-1-3-1-broken-access-control-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
"source": "audit@patchstack.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-24729",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2025-01-24T18:15:47.037",
|
||||
"lastModified": "2025-01-24T18:15:47.037",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-03-06T19:02:47.083",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 3.7
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -51,10 +71,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:elementinvader:elementinvader_addons_for_elementor:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "1.3.4",
|
||||
"matchCriteriaId": "371A0ADE-5C9C-4B31-BD79-1CC66BCDA87D"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/wordpress/plugin/elementinvader-addons-for-elementor/vulnerability/wordpress-elementinvader-addons-for-elementor-plugin-1-3-3-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
"source": "audit@patchstack.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
78
CVE-2025/CVE-2025-247xx/CVE-2025-24796.json
Normal file
78
CVE-2025/CVE-2025-247xx/CVE-2025-24796.json
Normal file
@ -0,0 +1,78 @@
|
||||
{
|
||||
"id": "CVE-2025-24796",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-03-06T19:15:26.953",
|
||||
"lastModified": "2025-03-06T19:15:26.953",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Collabora Online is a collaborative online office suite based on LibreOffice. Macro support is disabled by default in Collabora Online, but can be enabled by an administrator. Collabora Online typically hosts each document instance within a jail and is allowed to download content from locations controlled by the net.lok_allow configuration option, which by default include the private IP ranges to enable access to the local network. If enabled, macros were allowed run executable binaries. By combining an ability to host executables, typically in the local network, in an allowed accessible location, with a macro enabled Collabora Online, it was then possible to install arbitrary binaries within the jail and execute them. These executables are restricted to the same jail file system and user as the document instance but can be used to bypass the additional limits on what network hosts are accessible and provide more flexibility as a platform for further attempts. This is issue is fixed in 24.04.12.4, 23.05.19, 22.05.25 and later macros."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "PRESENT",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "LOW",
|
||||
"vulnIntegrityImpact": "LOW",
|
||||
"vulnAvailabilityImpact": "NONE",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-829"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/CollaboraOnline/online/security/advisories/GHSA-4jjq-vgqp-qw45",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
82
CVE-2025/CVE-2025-251xx/CVE-2025-25191.json
Normal file
82
CVE-2025/CVE-2025-251xx/CVE-2025-25191.json
Normal file
@ -0,0 +1,82 @@
|
||||
{
|
||||
"id": "CVE-2025-25191",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-03-06T19:15:27.113",
|
||||
"lastModified": "2025-03-06T19:15:27.113",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Group-Office is an enterprise CRM and groupware tool. This Stored XSS vulnerability exists where user input in the Name field is not properly sanitized before being stored. This vulnerability is fixed in 6.8.100."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 6.9,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "NONE",
|
||||
"vulnIntegrityImpact": "NONE",
|
||||
"vulnAvailabilityImpact": "NONE",
|
||||
"subConfidentialityImpact": "LOW",
|
||||
"subIntegrityImpact": "LOW",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Intermesh/groupoffice/commit/c5c83e19a5cdf93b0e758726c97597861f1d6eda",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/Intermesh/groupoffice/security/advisories/GHSA-j7p3-v652-p3gf",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2025/CVE-2025-252xx/CVE-2025-25294.json
Normal file
60
CVE-2025/CVE-2025-252xx/CVE-2025-25294.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2025-25294",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-03-06T19:15:27.267",
|
||||
"lastModified": "2025-03-06T19:15:27.267",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Envoy Gateway is an open source project for managing Envoy Proxy as a standalone or Kubernetes-based application gateway. In all Envoy Gateway versions prior to 1.2.7 and 1.3.1 a default Envoy Proxy access log configuration is used. This format is vulnerable to log injection attacks. If the attacker uses a specially crafted user-agent which performs json injection, then he could add and overwrite fields to the access log. This vulnerability is fixed in 1.3.1 and 1.2.7. One can overwrite the old text based default format with JSON formatter by modifying the \"EnvoyProxy.spec.telemetry.accessLog\" setting."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-117"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/envoyproxy/gateway/commit/8f48f5199cf1bbb9a8ac0695c5171bfef6c9198a",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/envoyproxy/gateway/security/advisories/GHSA-mf24-chxh-hmvj",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2025/CVE-2025-253xx/CVE-2025-25361.json
Normal file
21
CVE-2025/CVE-2025-253xx/CVE-2025-25361.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2025-25361",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-03-06T19:15:27.410",
|
||||
"lastModified": "2025-03-06T19:15:27.410",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An arbitrary file upload vulnerability in the component /cms/CmsWebFileAdminController.java of PublicCMS v4.0.202406 allows attackers to execute arbitrary code via uploading a crafted svg or xml file."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/c0rdXy/POC/blob/master/CVE/PublicCMS/XSS_02/XSS_02.md",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2025/CVE-2025-253xx/CVE-2025-25381.json
Normal file
21
CVE-2025/CVE-2025-253xx/CVE-2025-25381.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2025-25381",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-03-06T19:15:27.500",
|
||||
"lastModified": "2025-03-06T19:15:27.500",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Incorrect access control in the KSRTC AWATAR app of Karnataka State Road Transport Corporation v1.3.0 allows to view sensitive information such as usernames and passwords."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/edwin-0990/CVE_ID/blob/main/CVE-2025-25381/README.md",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
25
CVE-2025/CVE-2025-254xx/CVE-2025-25497.json
Normal file
25
CVE-2025/CVE-2025-254xx/CVE-2025-25497.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2025-25497",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-03-06T20:15:38.290",
|
||||
"lastModified": "2025-03-06T20:15:38.290",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue in account management interface in Netsweeper Server v.8.2.6 and earlier (fixed in v.8.2.7) allows unauthorized changes to the \"Account Owner\" field due to client-side-only restrictions and a lack of server-side validation. This vulnerability enables account ownership reassignment to or away from any user."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://helpdesk.netsweeper.com/docs/8_2_Docs/8_2_Netsweeper_Docs/Content/Release_Notes/Netsweeper_Release_Notes/8_2_Release_Notes/8_2_7_Release_and_Downloads.htm",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://packetstorm.news/files/id/188626/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2025/CVE-2025-261xx/CVE-2025-26167.json
Normal file
21
CVE-2025/CVE-2025-261xx/CVE-2025-26167.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2025-26167",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-03-06T19:15:27.593",
|
||||
"lastModified": "2025-03-06T19:15:27.593",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Buffalo LS520D 4.53 is vulnerable to Arbitrary file read, which allows unauthenticated attackers to access the NAS web UI and read arbitrary internal files."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/SpikeReply/advisories/blob/0f15f5aefb959fbaff049da7cc3e36733e25b580/cve/buffalo/cve-2025-26167.md",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
68
CVE-2025/CVE-2025-266xx/CVE-2025-26699.json
Normal file
68
CVE-2025/CVE-2025-266xx/CVE-2025-26699.json
Normal file
@ -0,0 +1,68 @@
|
||||
{
|
||||
"id": "CVE-2025-26699",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-03-06T19:15:27.683",
|
||||
"lastModified": "2025-03-06T19:15:27.683",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in Django 5.1 before 5.1.7, 5.0 before 5.0.13, and 4.2 before 4.2.20. The django.utils.text.wrap() method and wordwrap template filter are subject to a potential denial-of-service attack when used with very long strings."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cve@mitre.org",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L",
|
||||
"baseScore": 5.0,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cve@mitre.org",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-770"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://docs.djangoproject.com/en/dev/releases/security/",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://groups.google.com/g/django-announce",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.djangoproject.com/weblog/2025/mar/06/security-releases/",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2025/03/06/12",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
}
|
||||
]
|
||||
}
|
68
CVE-2025/CVE-2025-275xx/CVE-2025-27506.json
Normal file
68
CVE-2025/CVE-2025-275xx/CVE-2025-27506.json
Normal file
@ -0,0 +1,68 @@
|
||||
{
|
||||
"id": "CVE-2025-27506",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-03-06T19:15:27.833",
|
||||
"lastModified": "2025-03-06T19:15:27.833",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NocoDB is software for building databases as spreadsheets. The API endpoint related to the password reset function is vulnerable to Reflected Cross-Site-Scripting. The endpoint /api/v1/db/auth/password/reset/:tokenId is vulnerable to Reflected Cross-Site-Scripting. The flaw occurs due to implementation of the client-side template engine ejs, specifically on file resetPassword.ts where the template is using the insecure function \u201c<%-\u201c, which is rendered by the function renderPasswordReset. This vulnerability is fixed in 0.258.0."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/nocodb/nocodb/blob/ba5a191b33259d984fc92df225f7d82ede2ddb56/packages/nocodb/src/modules/auth/auth.controller.ts#L251",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/nocodb/nocodb/blob/ba5a191b33259d984fc92df225f7d82ede2ddb56/packages/nocodb/src/modules/auth/ui/auth/resetPassword.ts#L71",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/nocodb/nocodb/commit/ea821edb133e621e26183ae65c8ff9ee5d6f2723",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/nocodb/nocodb/security/advisories/GHSA-wf6c-hrhf-86cw",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
82
CVE-2025/CVE-2025-275xx/CVE-2025-27509.json
Normal file
82
CVE-2025/CVE-2025-275xx/CVE-2025-27509.json
Normal file
@ -0,0 +1,82 @@
|
||||
{
|
||||
"id": "CVE-2025-27509",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-03-06T19:15:27.973",
|
||||
"lastModified": "2025-03-06T19:15:27.973",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "fleetdm/fleet is an open source device management, built on osquery. In vulnerable versions of Fleet, an attacker could craft a specially-formed SAML response to forge authentication assertions, provision a new administrative user account if Just-In-Time (JIT) provisioning is enabled, or create new accounts tied to forged assertions if f MDM enrollment is enabled. This vulnerability is fixed in 4.64.2, 4.63.2, 4.62.4, and 4.58.1."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 9.3,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "HIGH",
|
||||
"vulnIntegrityImpact": "HIGH",
|
||||
"vulnAvailabilityImpact": "NONE",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-285"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/fleetdm/fleet/commit/718c95e47ad010ad6b8ceb3f3460e921fbfc53bb",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/fleetdm/fleet/security/advisories/GHSA-52jx-g6m5-h735",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
78
CVE-2025/CVE-2025-276xx/CVE-2025-27600.json
Normal file
78
CVE-2025/CVE-2025-276xx/CVE-2025-27600.json
Normal file
@ -0,0 +1,78 @@
|
||||
{
|
||||
"id": "CVE-2025-27600",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-03-06T19:15:28.117",
|
||||
"lastModified": "2025-03-06T19:15:28.117",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "FastGPT is a knowledge-based platform built on the LLMs. Since the web crawling plug-in does not perform intranet IP verification, an attacker can initiate an intranet IP request, causing the system to initiate a request through the intranet and potentially obtain some private data on the intranet. This issue is fixed in 4.9.0."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 6.9,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "NONE",
|
||||
"vulnIntegrityImpact": "NONE",
|
||||
"vulnAvailabilityImpact": "NONE",
|
||||
"subConfidentialityImpact": "LOW",
|
||||
"subIntegrityImpact": "LOW",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-918"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/labring/FastGPT/security/advisories/GHSA-vc67-62v5-8cwx",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
102
README.md
102
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2025-03-06T19:00:21.526423+00:00
|
||||
2025-03-06T21:00:19.931543+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2025-03-06T18:15:43.457000+00:00
|
||||
2025-03-06T20:21:36.547000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,69 +33,61 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
284377
|
||||
284394
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `26`
|
||||
Recently added CVEs: `17`
|
||||
|
||||
- [CVE-2024-51476](CVE-2024/CVE-2024-514xx/CVE-2024-51476.json) (`2025-03-06T17:15:19.763`)
|
||||
- [CVE-2024-52923](CVE-2024/CVE-2024-529xx/CVE-2024-52923.json) (`2025-03-06T18:15:41.160`)
|
||||
- [CVE-2024-52924](CVE-2024/CVE-2024-529xx/CVE-2024-52924.json) (`2025-03-06T18:15:41.320`)
|
||||
- [CVE-2024-58076](CVE-2024/CVE-2024-580xx/CVE-2024-58076.json) (`2025-03-06T17:15:20.997`)
|
||||
- [CVE-2024-58077](CVE-2024/CVE-2024-580xx/CVE-2024-58077.json) (`2025-03-06T17:15:21.123`)
|
||||
- [CVE-2024-58078](CVE-2024/CVE-2024-580xx/CVE-2024-58078.json) (`2025-03-06T17:15:21.250`)
|
||||
- [CVE-2024-58079](CVE-2024/CVE-2024-580xx/CVE-2024-58079.json) (`2025-03-06T17:15:21.360`)
|
||||
- [CVE-2024-58080](CVE-2024/CVE-2024-580xx/CVE-2024-58080.json) (`2025-03-06T17:15:21.473`)
|
||||
- [CVE-2024-58081](CVE-2024/CVE-2024-580xx/CVE-2024-58081.json) (`2025-03-06T17:15:21.577`)
|
||||
- [CVE-2024-58082](CVE-2024/CVE-2024-580xx/CVE-2024-58082.json) (`2025-03-06T17:15:21.677`)
|
||||
- [CVE-2024-58083](CVE-2024/CVE-2024-580xx/CVE-2024-58083.json) (`2025-03-06T17:15:21.773`)
|
||||
- [CVE-2024-58084](CVE-2024/CVE-2024-580xx/CVE-2024-58084.json) (`2025-03-06T17:15:21.890`)
|
||||
- [CVE-2024-58085](CVE-2024/CVE-2024-580xx/CVE-2024-58085.json) (`2025-03-06T17:15:21.993`)
|
||||
- [CVE-2024-58086](CVE-2024/CVE-2024-580xx/CVE-2024-58086.json) (`2025-03-06T17:15:22.117`)
|
||||
- [CVE-2025-0337](CVE-2025/CVE-2025-03xx/CVE-2025-0337.json) (`2025-03-06T17:15:22.303`)
|
||||
- [CVE-2025-2032](CVE-2025/CVE-2025-20xx/CVE-2025-2032.json) (`2025-03-06T17:15:24.297`)
|
||||
- [CVE-2025-2033](CVE-2025/CVE-2025-20xx/CVE-2025-2033.json) (`2025-03-06T17:15:24.490`)
|
||||
- [CVE-2025-2034](CVE-2025/CVE-2025-20xx/CVE-2025-2034.json) (`2025-03-06T18:15:43.230`)
|
||||
- [CVE-2025-2035](CVE-2025/CVE-2025-20xx/CVE-2025-2035.json) (`2025-03-06T18:15:43.457`)
|
||||
- [CVE-2025-21829](CVE-2025/CVE-2025-218xx/CVE-2025-21829.json) (`2025-03-06T17:15:22.820`)
|
||||
- [CVE-2025-21830](CVE-2025/CVE-2025-218xx/CVE-2025-21830.json) (`2025-03-06T17:15:22.943`)
|
||||
- [CVE-2025-21831](CVE-2025/CVE-2025-218xx/CVE-2025-21831.json) (`2025-03-06T17:15:23.060`)
|
||||
- [CVE-2025-21832](CVE-2025/CVE-2025-218xx/CVE-2025-21832.json) (`2025-03-06T17:15:23.177`)
|
||||
- [CVE-2025-21833](CVE-2025/CVE-2025-218xx/CVE-2025-21833.json) (`2025-03-06T17:15:23.293`)
|
||||
- [CVE-2025-21834](CVE-2025/CVE-2025-218xx/CVE-2025-21834.json) (`2025-03-06T17:15:23.397`)
|
||||
- [CVE-2024-50600](CVE-2024/CVE-2024-506xx/CVE-2024-50600.json) (`2025-03-06T19:15:26.750`)
|
||||
- [CVE-2025-2036](CVE-2025/CVE-2025-20xx/CVE-2025-2036.json) (`2025-03-06T19:15:28.373`)
|
||||
- [CVE-2025-2037](CVE-2025/CVE-2025-20xx/CVE-2025-2037.json) (`2025-03-06T19:15:28.540`)
|
||||
- [CVE-2025-2038](CVE-2025/CVE-2025-20xx/CVE-2025-2038.json) (`2025-03-06T20:15:38.583`)
|
||||
- [CVE-2025-2039](CVE-2025/CVE-2025-20xx/CVE-2025-2039.json) (`2025-03-06T20:15:38.753`)
|
||||
- [CVE-2025-2040](CVE-2025/CVE-2025-20xx/CVE-2025-2040.json) (`2025-03-06T20:15:38.920`)
|
||||
- [CVE-2025-24796](CVE-2025/CVE-2025-247xx/CVE-2025-24796.json) (`2025-03-06T19:15:26.953`)
|
||||
- [CVE-2025-25191](CVE-2025/CVE-2025-251xx/CVE-2025-25191.json) (`2025-03-06T19:15:27.113`)
|
||||
- [CVE-2025-25294](CVE-2025/CVE-2025-252xx/CVE-2025-25294.json) (`2025-03-06T19:15:27.267`)
|
||||
- [CVE-2025-25361](CVE-2025/CVE-2025-253xx/CVE-2025-25361.json) (`2025-03-06T19:15:27.410`)
|
||||
- [CVE-2025-25381](CVE-2025/CVE-2025-253xx/CVE-2025-25381.json) (`2025-03-06T19:15:27.500`)
|
||||
- [CVE-2025-25497](CVE-2025/CVE-2025-254xx/CVE-2025-25497.json) (`2025-03-06T20:15:38.290`)
|
||||
- [CVE-2025-26167](CVE-2025/CVE-2025-261xx/CVE-2025-26167.json) (`2025-03-06T19:15:27.593`)
|
||||
- [CVE-2025-26699](CVE-2025/CVE-2025-266xx/CVE-2025-26699.json) (`2025-03-06T19:15:27.683`)
|
||||
- [CVE-2025-27506](CVE-2025/CVE-2025-275xx/CVE-2025-27506.json) (`2025-03-06T19:15:27.833`)
|
||||
- [CVE-2025-27509](CVE-2025/CVE-2025-275xx/CVE-2025-27509.json) (`2025-03-06T19:15:27.973`)
|
||||
- [CVE-2025-27600](CVE-2025/CVE-2025-276xx/CVE-2025-27600.json) (`2025-03-06T19:15:28.117`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `83`
|
||||
Recently modified CVEs: `34`
|
||||
|
||||
- [CVE-2024-53068](CVE-2024/CVE-2024-530xx/CVE-2024-53068.json) (`2025-03-06T17:15:19.957`)
|
||||
- [CVE-2024-53182](CVE-2024/CVE-2024-531xx/CVE-2024-53182.json) (`2025-03-06T17:15:20.157`)
|
||||
- [CVE-2024-53208](CVE-2024/CVE-2024-532xx/CVE-2024-53208.json) (`2025-03-06T17:15:20.330`)
|
||||
- [CVE-2024-56551](CVE-2024/CVE-2024-565xx/CVE-2024-56551.json) (`2025-03-06T17:15:20.590`)
|
||||
- [CVE-2024-56658](CVE-2024/CVE-2024-566xx/CVE-2024-56658.json) (`2025-03-06T17:15:20.783`)
|
||||
- [CVE-2024-8425](CVE-2024/CVE-2024-84xx/CVE-2024-8425.json) (`2025-03-06T16:36:34.470`)
|
||||
- [CVE-2024-9019](CVE-2024/CVE-2024-90xx/CVE-2024-9019.json) (`2025-03-06T16:36:34.470`)
|
||||
- [CVE-2024-9888](CVE-2024/CVE-2024-98xx/CVE-2024-9888.json) (`2025-03-06T18:13:11.800`)
|
||||
- [CVE-2025-0764](CVE-2025/CVE-2025-07xx/CVE-2025-0764.json) (`2025-03-06T17:52:55.370`)
|
||||
- [CVE-2025-1405](CVE-2025/CVE-2025-14xx/CVE-2025-1405.json) (`2025-03-06T17:52:55.370`)
|
||||
- [CVE-2025-1511](CVE-2025/CVE-2025-15xx/CVE-2025-1511.json) (`2025-03-06T17:52:55.370`)
|
||||
- [CVE-2025-1513](CVE-2025/CVE-2025-15xx/CVE-2025-1513.json) (`2025-03-06T17:52:55.370`)
|
||||
- [CVE-2025-1572](CVE-2025/CVE-2025-15xx/CVE-2025-1572.json) (`2025-03-06T16:36:54.387`)
|
||||
- [CVE-2025-2031](CVE-2025/CVE-2025-20xx/CVE-2025-2031.json) (`2025-03-06T17:15:24.153`)
|
||||
- [CVE-2025-25793](CVE-2025/CVE-2025-257xx/CVE-2025-25793.json) (`2025-03-06T18:15:41.480`)
|
||||
- [CVE-2025-25794](CVE-2025/CVE-2025-257xx/CVE-2025-25794.json) (`2025-03-06T18:15:41.883`)
|
||||
- [CVE-2025-25796](CVE-2025/CVE-2025-257xx/CVE-2025-25796.json) (`2025-03-06T18:15:42.103`)
|
||||
- [CVE-2025-25797](CVE-2025/CVE-2025-257xx/CVE-2025-25797.json) (`2025-03-06T18:15:42.377`)
|
||||
- [CVE-2025-25799](CVE-2025/CVE-2025-257xx/CVE-2025-25799.json) (`2025-03-06T18:15:42.587`)
|
||||
- [CVE-2025-25802](CVE-2025/CVE-2025-258xx/CVE-2025-25802.json) (`2025-03-06T18:15:42.800`)
|
||||
- [CVE-2025-25813](CVE-2025/CVE-2025-258xx/CVE-2025-25813.json) (`2025-03-06T18:15:43.027`)
|
||||
- [CVE-2025-27622](CVE-2025/CVE-2025-276xx/CVE-2025-27622.json) (`2025-03-06T17:15:23.497`)
|
||||
- [CVE-2025-27623](CVE-2025/CVE-2025-276xx/CVE-2025-27623.json) (`2025-03-06T17:15:23.647`)
|
||||
- [CVE-2025-27624](CVE-2025/CVE-2025-276xx/CVE-2025-27624.json) (`2025-03-06T17:15:23.797`)
|
||||
- [CVE-2025-27625](CVE-2025/CVE-2025-276xx/CVE-2025-27625.json) (`2025-03-06T17:15:23.960`)
|
||||
- [CVE-2022-26485](CVE-2022/CVE-2022-264xx/CVE-2022-26485.json) (`2025-03-06T19:48:51.880`)
|
||||
- [CVE-2022-3075](CVE-2022/CVE-2022-30xx/CVE-2022-3075.json) (`2025-03-06T19:48:51.880`)
|
||||
- [CVE-2022-3854](CVE-2022/CVE-2022-38xx/CVE-2022-3854.json) (`2025-03-06T19:15:25.907`)
|
||||
- [CVE-2022-4134](CVE-2022/CVE-2022-41xx/CVE-2022-4134.json) (`2025-03-06T20:15:37.757`)
|
||||
- [CVE-2022-48364](CVE-2022/CVE-2022-483xx/CVE-2022-48364.json) (`2025-03-06T20:15:36.740`)
|
||||
- [CVE-2023-0093](CVE-2023/CVE-2023-00xx/CVE-2023-0093.json) (`2025-03-06T20:15:37.947`)
|
||||
- [CVE-2023-0669](CVE-2023/CVE-2023-06xx/CVE-2023-0669.json) (`2025-03-06T19:48:51.880`)
|
||||
- [CVE-2024-12059](CVE-2024/CVE-2024-120xx/CVE-2024-12059.json) (`2025-03-06T19:54:57.093`)
|
||||
- [CVE-2024-12205](CVE-2024/CVE-2024-122xx/CVE-2024-12205.json) (`2025-03-06T19:02:47.083`)
|
||||
- [CVE-2024-13796](CVE-2024/CVE-2024-137xx/CVE-2024-13796.json) (`2025-03-06T20:21:36.547`)
|
||||
- [CVE-2024-39623](CVE-2024/CVE-2024-396xx/CVE-2024-39623.json) (`2025-03-06T19:02:47.083`)
|
||||
- [CVE-2024-45195](CVE-2024/CVE-2024-451xx/CVE-2024-45195.json) (`2025-03-06T19:48:51.880`)
|
||||
- [CVE-2024-53244](CVE-2024/CVE-2024-532xx/CVE-2024-53244.json) (`2025-03-06T19:54:57.093`)
|
||||
- [CVE-2024-53245](CVE-2024/CVE-2024-532xx/CVE-2024-53245.json) (`2025-03-06T19:54:57.093`)
|
||||
- [CVE-2024-53796](CVE-2024/CVE-2024-537xx/CVE-2024-53796.json) (`2025-03-06T19:54:57.093`)
|
||||
- [CVE-2024-54253](CVE-2024/CVE-2024-542xx/CVE-2024-54253.json) (`2025-03-06T19:54:57.093`)
|
||||
- [CVE-2024-56161](CVE-2024/CVE-2024-561xx/CVE-2024-56161.json) (`2025-03-06T19:15:26.840`)
|
||||
- [CVE-2024-56225](CVE-2024/CVE-2024-562xx/CVE-2024-56225.json) (`2025-03-06T19:02:47.083`)
|
||||
- [CVE-2025-0801](CVE-2025/CVE-2025-08xx/CVE-2025-0801.json) (`2025-03-06T20:21:36.547`)
|
||||
- [CVE-2025-1505](CVE-2025/CVE-2025-15xx/CVE-2025-1505.json) (`2025-03-06T20:21:36.547`)
|
||||
- [CVE-2025-1757](CVE-2025/CVE-2025-17xx/CVE-2025-1757.json) (`2025-03-06T20:21:36.547`)
|
||||
- [CVE-2025-22786](CVE-2025/CVE-2025-227xx/CVE-2025-22786.json) (`2025-03-06T19:02:47.083`)
|
||||
- [CVE-2025-24578](CVE-2025/CVE-2025-245xx/CVE-2025-24578.json) (`2025-03-06T19:02:47.083`)
|
||||
- [CVE-2025-24618](CVE-2025/CVE-2025-246xx/CVE-2025-24618.json) (`2025-03-06T19:02:47.083`)
|
||||
- [CVE-2025-24729](CVE-2025/CVE-2025-247xx/CVE-2025-24729.json) (`2025-03-06T19:02:47.083`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
303
_state.csv
303
_state.csv
@ -77865,7 +77865,7 @@ CVE-2015-4848,0,0,750d7ea2fe5e28106aadd0a3084b9228071088aa6e5db2f42974ef5cdb6da5
|
||||
CVE-2015-4849,0,0,6b86c817f1babbb9d16eb1d46adb56b1cd43ff753862b97640fc51580b2c70f0,2024-11-21T02:31:52.557000
|
||||
CVE-2015-4850,0,0,c757cb4f4f0fea29c5eaf2fc7e2266e0e51cd5a712fd3896ab26008767dc60d2,2024-11-21T02:31:52.673000
|
||||
CVE-2015-4851,0,0,a2130ce7be15a90b933eb8e4fbae047b8ce822785a0d48fb0b6fdfe2c89b4eb9,2024-11-21T02:31:52.787000
|
||||
CVE-2015-4852,0,0,abb2c793e98b1a0960781a78ae57bd9c494d5eb05d568e978e8863eaa3346b7b,2025-02-04T19:15:20.693000
|
||||
CVE-2015-4852,0,1,5105496b16c4a434bd0bb55cdf06c0ad8468d9d1ae263e637f5c1cfc006c65f6,2025-03-06T19:48:51.880000
|
||||
CVE-2015-4853,0,0,ecd9661ce16a834dcc07b12bf2e769dc04bd4672748e88851b80b52aeb5a32b3,2023-11-07T02:25:58.210000
|
||||
CVE-2015-4854,0,0,b610b2f8e7049df196042453871a69c9d80548566da024722248913f46b3f3c4,2024-11-21T02:31:53.113000
|
||||
CVE-2015-4855,0,0,b733bffd8e496cf35a751c917a5993a27d945bb8485db7a284952bc997748445,2023-11-07T02:25:58.463000
|
||||
@ -85029,7 +85029,7 @@ CVE-2016-1642,0,0,66841ee498ca853ea6b5936c383c57d7698ce1fabf9c8ee7451137702466df
|
||||
CVE-2016-1643,0,0,42a0f14881456f59b972cc3a93852e36631b4c9be928ccf9872f9dd28f88d14f,2024-11-21T02:46:48.240000
|
||||
CVE-2016-1644,0,0,b3b28a4b3543f909beb5109e758edb8e660120ad9a32629ead0d455446752dab,2024-11-21T02:46:48.350000
|
||||
CVE-2016-1645,0,0,c6fd969932556e60d0bd2093779d4a9531ece63c642981335df9f0ae9ef57939,2024-11-21T02:46:48.453000
|
||||
CVE-2016-1646,0,0,f4ca24264b7073d4bd045011d19aae5c779c30e0aa2652887d376f416b549546,2025-01-29T18:15:26.670000
|
||||
CVE-2016-1646,0,1,a081eb17eea938131a900fddfec0b42dfba7af762bdb23e0db1cbb005e8e61b9,2025-03-06T19:48:51.880000
|
||||
CVE-2016-1647,0,0,e08338c6621bdf3b997998680f254b4dd517410fe6cc2425120e41567d57f615,2024-11-21T02:46:48.697000
|
||||
CVE-2016-1648,0,0,774476717a95c723bbddd1c1af5822e5c17b3d5d970f0feb63f42e149e060d29,2024-11-21T02:46:48.807000
|
||||
CVE-2016-1649,0,0,3906b2c16ac489a143a7354ad8ab0a053bc66d60da97153cc6f9deacbf4ffa8b,2024-11-21T02:46:48.917000
|
||||
@ -109607,7 +109607,7 @@ CVE-2017-9801,0,0,dc7712f21d6648d38a7da724a52b54a68314aa36b346360fbeaaa7b15a72a5
|
||||
CVE-2017-9802,0,0,5a4ab8c40f57662955b5fa0b37a0f1fcd64d3bd6e8aec9194eabdcce1abe440b,2024-11-21T03:36:53.203000
|
||||
CVE-2017-9803,0,0,c4d53129e8c075cb9f562aa04ddbbbee900482544aa32757aaea8e4cdcd6dc13,2024-11-21T03:36:53.317000
|
||||
CVE-2017-9804,0,0,af1649f75773cd4ea2d950fc98ad79fede4cc3f9b0c159ad839eb42a8b7ba620,2024-11-21T03:36:53.423000
|
||||
CVE-2017-9805,0,0,7d208f3bb555d73a9fcd6982da35527b54e9c5170001d6fa9c8b0fbd9258281b,2025-02-06T22:15:32.763000
|
||||
CVE-2017-9805,0,1,9834360a58f7e680d0d3d229ee7a827af8f8803758a656a3f1ee91f189691107,2025-03-06T19:48:51.880000
|
||||
CVE-2017-9806,0,0,5f4606f350b1c0159ca2c28ac4d679896d973c48661ed62c7fc87a705e4212cc,2024-11-21T03:36:53.700000
|
||||
CVE-2017-9807,0,0,d589aad1d51bba53dd460e5f280723adca587151b78e5017337c0ad09ab990ae,2024-11-21T03:36:53.820000
|
||||
CVE-2017-9808,0,0,cf3b02988d19553966ec76ad68604222aeb2d90cf85579c1f38041928061a22a,2024-11-21T03:36:53.970000
|
||||
@ -117696,7 +117696,7 @@ CVE-2018-17476,0,0,b82e2586d31ff96e7ed50d9b32856cbcf064f3fc9c20e2d0340fb82cfd8cb
|
||||
CVE-2018-17477,0,0,62c76d413d0f58ae5f5b2bee9a0114cda8658fe7ab93ec9845c2b5dba5ee3fa3,2024-11-21T03:54:30.373000
|
||||
CVE-2018-17478,0,0,57f313c3ffbf31c83ffe86b2f8a6c7aae3a147584a1a7cad9f105ca5e1111d8d,2024-11-21T03:54:30.493000
|
||||
CVE-2018-17479,0,0,c76681d8118fafc2babcee23dcfa90a9c1484876a611e662828819ad714ffe25,2024-11-21T03:54:30.610000
|
||||
CVE-2018-17480,0,0,e0f5002a70c4e8eb2e6fd859a4c6b7b91cc53a4c875e3992c6b50281217cf412,2025-01-29T18:15:30.320000
|
||||
CVE-2018-17480,0,1,1874778c380ded6f1be18842adbbfca08aef82f42242fce9fd28c205427e8a57,2025-03-06T19:48:51.880000
|
||||
CVE-2018-17481,0,0,9741e539125e44a47705c78676f45007a9687377dca966576cd1dbdcb1fc73bc,2024-11-21T03:54:30.877000
|
||||
CVE-2018-17482,0,0,499d51e536f5d530705788d87899b5e2e8ba06842bd8f6d2e456e0c8448fa49f,2024-11-21T03:54:31.010000
|
||||
CVE-2018-17483,0,0,a70a6e7d0433cb2df7f68c5a06051d6c4e07fa9f804e81f0166a2b0eb1829002,2024-11-21T03:54:31.133000
|
||||
@ -125778,7 +125778,7 @@ CVE-2018-7837,0,0,ffad73203c6130b5acdfc40d107384215dbb8b25c8751613d632919e9c1cbc
|
||||
CVE-2018-7838,0,0,3225e1833cdfed2d1995884d8af16d3c9fc9a453fc66a5c9a2abb83c3b3a9e68,2024-11-21T04:12:51.240000
|
||||
CVE-2018-7839,0,0,8bf10ec39b509fb3dac2ed212ec90df38bc0825a726088a4185c3cec75f9cb0b,2024-11-21T04:12:51.377000
|
||||
CVE-2018-7840,0,0,d0f9ecd9980c937719a6e2adc5f16efcfa040e7aa577be012037a3aaf2da4dbc,2024-11-21T04:12:51.487000
|
||||
CVE-2018-7841,0,0,6df25584060dd144ccfbefb0cd5f980ba73ca7100072525cdf6ac3c21b35c19a,2025-02-07T14:15:45.157000
|
||||
CVE-2018-7841,0,1,62c35169876b001899814e5fca36a6d1470f24ba6a017c9b7b84f9304b5d8d24,2025-03-06T19:48:51.880000
|
||||
CVE-2018-7842,0,0,a4fa053504795e2b7465d7226d30935fd1797f1ae30fabd9b69a097135fb684f,2024-11-21T04:12:51.697000
|
||||
CVE-2018-7843,0,0,cd06c23a0db25479fda182631f95ec584adb2fcd8a98820eac1152dc16a5473c,2024-11-21T04:12:51.810000
|
||||
CVE-2018-7844,0,0,5b8905f4a610d68367ac80d96f33373b32cf1b39e86b07fafb58e8bab3835500,2024-11-21T04:12:51.913000
|
||||
@ -152518,7 +152518,7 @@ CVE-2020-19551,0,0,508596a646b11b6674fdfc234195e3108d532d69425e9c94eeb0b4102b0be
|
||||
CVE-2020-19553,0,0,5745870d6f10c9de7a31cd0385782765dbf765d05a4b5de751b57e3a69ec1131,2024-11-21T05:09:14.770000
|
||||
CVE-2020-19554,0,0,6be8a2b81eeb5c04893c2602c77ab4d6e4a4ad1f5b197e555177e61b0632e18a,2024-11-21T05:09:14.923000
|
||||
CVE-2020-19559,0,0,5e7c786bea8f8e669888e7803863f8641188ec1aec7770c40b72c98c7e54d8f5,2024-11-21T05:09:15.067000
|
||||
CVE-2020-1956,0,0,227b95e205b7b4d5bca37e5d3b95a2dc688487dfa2618350c2ed15dcb5ba784a,2025-02-06T21:15:14.887000
|
||||
CVE-2020-1956,0,1,6c9728e5c8fc92f79b31c70c194bd774aac5d53b18ba4a2c10e40d68c1d65787,2025-03-06T19:48:51.880000
|
||||
CVE-2020-1957,0,0,4926ccedb14d4e1cce95b4d1d56b91ffba0603faefbbcfc5836c10c691d6943b,2024-11-21T05:11:44.130000
|
||||
CVE-2020-1958,0,0,a08d296363bf493caa8c9270ddd60b93934f2391fc6f292af08f56d06962962f,2024-11-21T05:11:44.257000
|
||||
CVE-2020-19586,0,0,3ad70b4afadd9a1d95f2877e75b7531c98c9eb1b34c1f2bfbe0c1daa8c763cc1,2024-11-21T05:09:15.223000
|
||||
@ -167162,7 +167162,7 @@ CVE-2021-2055,0,0,19ef2def0996a3eda979d21e11c85c151931ff02412b22b62ca1d283c91a81
|
||||
CVE-2021-20550,0,0,bcfb998103aabb2db68eacb68d6e5e676e366b8736eddb04f9b1959de069212a,2024-11-21T05:46:45.610000
|
||||
CVE-2021-20551,0,0,7599827456c11032b04f5d5521c20a3fded80a5e3c708285d2d63204629663a1,2024-11-21T05:46:45.760000
|
||||
CVE-2021-20552,0,0,db1b98f153498419c0ae5ac70680b77b702feff37c6f6d82a53523aa26f56b3c,2024-11-21T05:46:45.883000
|
||||
CVE-2021-20553,0,0,29adadcd60470e04ecbfe9d1d04e3019b1969542a43f2d8e35834c6b6827cf3d,2024-12-19T00:15:04.710000
|
||||
CVE-2021-20553,0,1,4bd727c097ac782b29233920e7153c2c22240ab89a116508d920c31a7d7cd9dc,2025-03-06T19:02:47.083000
|
||||
CVE-2021-20554,0,0,2e5190cabe82cd81ebbfc6a35e57e2047a5de9b2faf0ac96253685a1f61ba149,2024-11-21T05:46:46.007000
|
||||
CVE-2021-20556,0,0,c01cecb547576fb07f154bd11b34124a7db1aab143b2b0033cf86a87ac8f9d2e,2025-01-07T18:20:08.197000
|
||||
CVE-2021-20557,0,0,d4a8b7981ff7e6cc87b1d17dad192132faa62d5127df8614b78f16f4ade1626a,2024-11-21T05:46:46.263000
|
||||
@ -185598,7 +185598,7 @@ CVE-2021-44446,0,0,25d803c7497c23932606314044802f4bad9cbd810fb1fb92bc1b945101709
|
||||
CVE-2021-44447,0,0,4a7186cd010739c789d7d14b149161b66fbefc37a56001c97a4349bee982928b,2024-11-21T06:31:00.043000
|
||||
CVE-2021-44448,0,0,a76546b0ddd2373705c50c9e1ee26958c89c4d9aecf415c1f47fae38cc01abc7,2024-11-21T06:31:00.193000
|
||||
CVE-2021-44449,0,0,e4a921b6ed77ec7d0c979e1c8cbca6b4ad31b1371beb3a5ef88b620f2bb9ad31,2024-11-21T06:31:00.317000
|
||||
CVE-2021-4445,0,1,1f13ec78eb553a7f2fdf4326d2dca5ab40cb37c6571166a813b8d5370ab6bd59,2025-03-06T18:13:11.800000
|
||||
CVE-2021-4445,0,0,1f13ec78eb553a7f2fdf4326d2dca5ab40cb37c6571166a813b8d5370ab6bd59,2025-03-06T18:13:11.800000
|
||||
CVE-2021-44450,0,0,9aaa14f8820be0af77790b7bde6886c33d1052567e15b863f83df8f41b2499ea,2024-11-21T06:31:00.447000
|
||||
CVE-2021-44451,0,0,1c84a549f4c7a0b5e257185c51135142c4e10920542577090af02c3338d6b4e4,2024-11-21T06:31:00.580000
|
||||
CVE-2021-44453,0,0,98781018fb7a6ea34a51aaee9c7be9f56f6b423c6fc32a990178e2f1e1dedbb8,2024-11-21T06:31:00.720000
|
||||
@ -193661,7 +193661,7 @@ CVE-2022-24109,0,0,a3de6fcc683c4c7b24080380d7f925454da13c54d2235023ab88990cec132
|
||||
CVE-2022-2411,0,0,ca9c83615b5a4bd566bcb71d857b9368ab54551d81d57dcdfb30e5919176e56c,2024-11-21T07:00:56.170000
|
||||
CVE-2022-24110,0,0,65f3dde568ed3390fbba963d442b71ce7e2da467bfd1ead012e4e3a6bacd3f5a,2024-11-21T06:49:49.510000
|
||||
CVE-2022-24111,0,0,fd2ffe0efb98d197c7531f3defe6abfe786dae537f59e2e8e8e77681cf8e5e19,2024-11-21T06:49:49.657000
|
||||
CVE-2022-24112,0,0,bcabec02209e3686e855fefa2b004c58c9cedcc290379d8afaf6c25aa8858f26,2025-01-29T22:15:27.690000
|
||||
CVE-2022-24112,0,1,03f6fe98ae44f7e50ad199348e21598367ebe9a68fa0bd9fc151be3a6125d71f,2025-03-06T19:48:51.880000
|
||||
CVE-2022-24113,0,0,b08b450631a5c4d09b3e64bbf5b729e9c2971d59d4e3b4ad7a055dd1b70798fe,2024-11-21T06:49:49.933000
|
||||
CVE-2022-24114,0,0,b921858749eabb462950c87fbeef78e9d9127fb723b4adfc75c40c48de23bb75,2024-11-21T06:49:50.053000
|
||||
CVE-2022-24115,0,0,07fca88d2c5b2f7d49a037a65f8537e26dbc956c3b5f7ac0fb58138895f281c2,2024-11-21T06:49:50.163000
|
||||
@ -194186,7 +194186,7 @@ CVE-2022-24701,0,0,07a386c067c72a923364259b0b8cbb62c5fe40637171f3ff876874c475328
|
||||
CVE-2022-24702,0,0,a248c5ba6594939f3b78f750dd634faf71af4bcd0ce369655730eeda6292b7c5,2024-11-21T06:50:54.630000
|
||||
CVE-2022-24704,0,0,06ebe7a984c823654d0bdbf33cbe7f93429877237842a629c81324e1ce89b5b4,2024-11-21T06:50:54.790000
|
||||
CVE-2022-24705,0,0,29792a396d8f0d926abcc5319a9a695c8800121354f46d540e822cb4690722e9,2024-11-21T06:50:54.903000
|
||||
CVE-2022-24706,0,0,0978f88f543f1e4ab0b60e8e7b1a73cf93d080047efc5bf881987faa6147609c,2025-01-29T17:15:17.557000
|
||||
CVE-2022-24706,0,1,f5bb4f2fa2ca100fbe346d546722997d7f7d335a790d75169dc02fac88a116d0,2025-03-06T19:48:51.880000
|
||||
CVE-2022-24707,0,0,71511411139c8cfaf9a872f42513435e3c387b87248b74c20b3c1ece4978f312,2024-11-21T06:50:55.173000
|
||||
CVE-2022-24708,0,0,b34a4d21d71d4595c8f24376caced501db78b6d5c21acb6420263f79dc2a6c28,2024-11-21T06:50:55.313000
|
||||
CVE-2022-24709,0,0,35affd62b04fbf0a166a199d0547cdb1204eb03a6bf7aa483db7a92271d775a8,2024-11-21T06:50:55.440000
|
||||
@ -195693,7 +195693,7 @@ CVE-2022-26481,0,0,755e955489efea83c182aa4dec7d1f511815232b348e5dd7d14ab199785e2
|
||||
CVE-2022-26482,0,0,e75509f0bd9a8a13c031cbb09cca69be5e865cb3455d1ed2d5212f35ea3044dc,2024-11-21T06:54:01.897000
|
||||
CVE-2022-26483,0,0,d46b1e0568306cd157a05c629956f16285216db5bd5ad42154809895c86b9a0c,2024-11-21T06:54:02.043000
|
||||
CVE-2022-26484,0,0,0d682b954d17e354b6e3ab68bd1f39f2ea2467b98fbad606737c826376a20f5b,2024-11-21T06:54:02.200000
|
||||
CVE-2022-26485,0,0,2264f3f42cf8e38b2af4d0c22dc4949abb0a4c999f4c04add8657026033cf0f0,2025-01-28T22:15:09.727000
|
||||
CVE-2022-26485,0,1,d54e13cfc77e3b4f287fbcdb56514be3bfe2905980d2034845257c054d7adcfd,2025-03-06T19:48:51.880000
|
||||
CVE-2022-26486,0,0,1e94b8d8b2c0f16edcf369fc63638cde3b97a3aea75ce89a8ff1bd7b56e34ca2,2025-01-28T22:15:09.987000
|
||||
CVE-2022-26487,0,0,aaa404b9f7bb30cc2e59ec05d3f9f09994f187371705fe9646d8a54450aaab35,2023-11-07T03:45:00.770000
|
||||
CVE-2022-26488,0,0,952711c6f20d344fd00e1b04d066dbbb1b0cd08cfffe5b8f11cff8f9566d4b5d,2024-11-21T06:54:02.590000
|
||||
@ -199175,7 +199175,7 @@ CVE-2022-30746,0,0,c7e7a88b7eaeb284b9d95575c2b962f866dbb3935fb2bb0dfe8f8ebe4f5ec
|
||||
CVE-2022-30747,0,0,03dd23137a267ee330474b14833bc16c231f59e950725fa5de7196c64a53291f,2024-11-21T07:03:18.060000
|
||||
CVE-2022-30748,0,0,89a3a2345f200905db84ec209c3362b205082d963beffaace9a42e5e913372b5,2024-11-21T07:03:18.177000
|
||||
CVE-2022-30749,0,0,594470ce17cbfaf7e3d662f3ab944ab6113ec000c1a4dba09bb2d80cac3aad49,2024-11-21T07:03:18.290000
|
||||
CVE-2022-3075,0,0,e83fd88f413bf6574f9cceb68493d8c6e6bf0a0165a9ca4b39c65ceb430db758,2025-02-03T14:15:33.320000
|
||||
CVE-2022-3075,0,1,305307dc17bf79216068e0d5e4e248d021a72db2906b451dd261aae9dc8cc5fd,2025-03-06T19:48:51.880000
|
||||
CVE-2022-30750,0,0,7727c4a050fab50e2cc3f857163cd21ef36a7edf7a466c191862ff0fddc4fc4e,2024-11-21T07:03:18.403000
|
||||
CVE-2022-30751,0,0,d9514ed381aecdb3424b6ec22eb6886ea1e03fbf7af95b81f561d00486b4b5e2,2024-11-21T07:03:18.530000
|
||||
CVE-2022-30752,0,0,3894c8352471b9e3ebe637c46e6b31bb88ee7fca58dcf7c9d863ec57831c9765,2024-11-21T07:03:18.653000
|
||||
@ -205403,7 +205403,7 @@ CVE-2022-38535,0,0,7ac451576b12d2418db8fc7ebc967c5897ccf4f5cdbe35f807634ec75884a
|
||||
CVE-2022-38537,0,0,63f83a1e72773f82ab29a7a9ebe7d3e32d94e6bf0672c5b66813237a971c1d40,2024-11-21T07:16:38.043000
|
||||
CVE-2022-38538,0,0,f36c938a9d839b34424f0905cd47ee0fd68d4b1f1f5571986796d8a2e45b1c3c,2024-11-21T07:16:38.197000
|
||||
CVE-2022-38539,0,0,7dc52e48c0ba5c48abf89366b23868780dc042661d056327b103fb1e87209e62,2024-11-21T07:16:38.337000
|
||||
CVE-2022-3854,0,0,4aa98e13b9025d8abad085bb1f7cdda6b680049714f507d166d8fce76ffc7566,2024-11-21T07:20:22.313000
|
||||
CVE-2022-3854,0,1,e09c081b732aba9f7d075f9c7797a60b2867d394e9a7f84b05d1b959b1cbd7cc,2025-03-06T19:15:25.907000
|
||||
CVE-2022-38540,0,0,8fffe9fb076012c39f4a6cea3c9e947145305711309013dda5cd4c652f267cc7,2024-11-21T07:16:38.483000
|
||||
CVE-2022-38541,0,0,ed9315c7ac8c591b324af1f7826a0d2543c4dc2dadf2bb610cdaf416306afb1f,2024-11-21T07:16:38.623000
|
||||
CVE-2022-38542,0,0,8973e0e66a8b2d799d68da2bfa4765aeeb0001a458ff9c7f97942e5fc03490eb,2024-11-21T07:16:38.783000
|
||||
@ -207499,7 +207499,7 @@ CVE-2022-41334,0,0,53601c094a5b9fb28872eecb331f329998f943fb32d1fcbf67c64f2cd85f6
|
||||
CVE-2022-41335,0,0,80187c0b47ee26add9cb19ff9f83d6d80500f857981b7ded620d4e7654760bc4,2024-11-21T07:23:04.617000
|
||||
CVE-2022-41336,0,0,35005d2f5af38e8d3a8c19f76bc3f2074c23f2ee2743a4f51d2fa1ad6099a61e,2024-11-21T07:23:04.760000
|
||||
CVE-2022-41339,0,0,35c42bc7b0a75c376af9e569a5f820562d7b337b962d5652408def1739b933df,2024-11-21T07:23:04.903000
|
||||
CVE-2022-4134,0,0,386f75217f52abdd0365e9083d8b89f80c4dc763f4de921736042eca5afdf088,2024-11-21T07:34:38.480000
|
||||
CVE-2022-4134,0,1,151d3c6d589aaaa64f0570c9b49144aed0838be561e57acc9369d56b98112a7b,2025-03-06T20:15:37.757000
|
||||
CVE-2022-41340,0,0,fb363f3541baa94169cf090fed35345f70c1e193bbc4e62603c0aec353759ee1,2024-11-21T07:23:05.067000
|
||||
CVE-2022-41342,0,0,0290aa34321786f3326740970f6018ba56ac2f85a5532d469b8b49b101429ca8,2024-11-21T07:23:05.220000
|
||||
CVE-2022-41343,0,0,d0ae95b40436fa24be988b15dd0d1de91272426bd16bd6d0a6ec7efe5f0c2b90,2024-11-21T07:23:05.350000
|
||||
@ -208238,7 +208238,7 @@ CVE-2022-42243,0,0,27fb3d1c60a5ad9e260fac234cf4eb2a2513452b4a9d94db8b2d2807bece5
|
||||
CVE-2022-42245,0,0,13128a38952324280b1251be3c0c1aa747213f6961720c71b231154ad488bf53,2024-11-21T07:24:34.413000
|
||||
CVE-2022-42246,0,0,6ffd0701b1a9f70d34d149d4f3fefc55ca101a6d92bf866854eb8443148f27ce,2024-11-21T07:24:34.563000
|
||||
CVE-2022-42247,0,0,ce691da6b43684d6268c7a450b7394840a313fab761f7a09cb49e78e92f6ce0e,2024-11-21T07:24:34.707000
|
||||
CVE-2022-42248,0,1,494d0437dea3033497e7f52509f358146015c5089867416938c3f5e97c481952,2025-03-06T17:15:13.097000
|
||||
CVE-2022-42248,0,0,494d0437dea3033497e7f52509f358146015c5089867416938c3f5e97c481952,2025-03-06T17:15:13.097000
|
||||
CVE-2022-42249,0,0,22d5e907a3a80e0b4fef45033eaea19cea3b2289c8397eaf4662c46564297eb0,2024-11-21T07:24:35.007000
|
||||
CVE-2022-42250,0,0,83140be693f5218650c4b3e40d3ff7d39f5e45add96f70c6710150256f648587,2024-11-21T07:24:35.230000
|
||||
CVE-2022-42252,0,0,bf4c39c5777eea3e439c532149f266ccb232c5681bedb7ef736a577734e82055,2024-11-21T07:24:35.377000
|
||||
@ -211985,11 +211985,11 @@ CVE-2022-47470,0,0,3a8fdd214f63e68ec87a63f525c2fdb0dc5cc3b7b715cee87fc3205f38d5b
|
||||
CVE-2022-47471,0,0,2bb1b295ba61b19da4df18a957858b0159037151bf82e7e4ccd434160cf98d54,2025-03-05T18:15:34.123000
|
||||
CVE-2022-47472,0,0,9fedf2ddd34ef86d1b864027fd832881ccf70fced06accfd8af23ca518fa7feb,2024-11-21T07:32:01.983000
|
||||
CVE-2022-47473,0,0,3335e5f0084985a2959a6836570a809e2a4bc068ee73d7232407f36e7fb1f62e,2024-11-21T07:32:02.103000
|
||||
CVE-2022-47474,0,1,de63cf7d11121fa8cd07cabdfd24913341ff42232880ab3180cd159c3738ceab,2025-03-06T17:15:14.250000
|
||||
CVE-2022-47475,0,1,7edce48094fa3e0a3faed545bdb4a1c5b7efd5ade9f7288d901e43bc847ee988,2025-03-06T17:15:14.413000
|
||||
CVE-2022-47474,0,0,de63cf7d11121fa8cd07cabdfd24913341ff42232880ab3180cd159c3738ceab,2025-03-06T17:15:14.250000
|
||||
CVE-2022-47475,0,0,7edce48094fa3e0a3faed545bdb4a1c5b7efd5ade9f7288d901e43bc847ee988,2025-03-06T17:15:14.413000
|
||||
CVE-2022-47476,0,0,9031e7c2ca06b021bf95e84e341e464b0078e7daa64a9d8e1a43f5244d5cd478,2025-03-06T16:15:38.127000
|
||||
CVE-2022-47477,0,1,063f4f37ec0d6f93a8425a2bf8116262d748e9ec217fcf63af2d841e5a3794f5,2025-03-06T17:15:14.580000
|
||||
CVE-2022-47478,0,1,9dda97a424de8ed0cd981fa1e3818b5c3500f5662ea6496e50d56fd189541a50,2025-03-06T17:15:14.747000
|
||||
CVE-2022-47477,0,0,063f4f37ec0d6f93a8425a2bf8116262d748e9ec217fcf63af2d841e5a3794f5,2025-03-06T17:15:14.580000
|
||||
CVE-2022-47478,0,0,9dda97a424de8ed0cd981fa1e3818b5c3500f5662ea6496e50d56fd189541a50,2025-03-06T17:15:14.747000
|
||||
CVE-2022-47479,0,0,71d5e9dafebc972c1236e061fd361e99a4b570f1b8a92d5da491037ea761985c,2025-03-06T16:15:38.340000
|
||||
CVE-2022-4748,0,0,ef3280be296917f093d7b5252769d8875b626bc3bcad498f72668da48999a400,2024-11-21T07:35:51.937000
|
||||
CVE-2022-47480,0,0,76a40e4c0a09df9bf69b4b9ade9ab4eabfc98c306705734307952abd63fc7c1f,2025-03-05T21:15:14.917000
|
||||
@ -212506,7 +212506,7 @@ CVE-2022-48360,0,0,a2f599bcb31fe0e65be8178ca2b24cfb899b6542743717b3373f5c8bbab19
|
||||
CVE-2022-48361,0,0,6b034f2ccbabb2b0b4002568b86f68ea980901a49de34e86421633d13aeefb1b,2024-11-21T07:33:15.043000
|
||||
CVE-2022-48362,0,0,a38eaad973d052fb8eacb61a27cb037ec8505981e43cf64cdd466cc188539039,2024-11-21T07:33:15.157000
|
||||
CVE-2022-48363,0,0,ae4c901f61cd4343186e6d40e9f444a91647523881c8c467f0d831123ad34cf8,2024-11-21T07:33:15.307000
|
||||
CVE-2022-48364,0,0,389a006950dbd3156debcd5c772205d3b42a4dd07de138f247cf906a4a434f6b,2024-11-21T07:33:15.467000
|
||||
CVE-2022-48364,0,1,a5522b2ef17628498c144d8341d2f7d708a02aa92b8fb2e3d88bf68857953bbe,2025-03-06T20:15:36.740000
|
||||
CVE-2022-48365,0,0,eae53272272059ee540fa751ff72ac0ef2f33a7f485342c55fa20e700679c0da,2025-03-04T21:15:11.377000
|
||||
CVE-2022-48366,0,0,40b8dcee156b44165a66a59dac89249a9f52ab12258de1e17f30c4c54cdff5b5,2025-03-04T17:15:10.980000
|
||||
CVE-2022-48367,0,0,d82067646b346a8279d79bfe5c8a110a939fc1772a639bf1a5605ff44510a41c,2025-03-04T17:15:11.203000
|
||||
@ -214010,7 +214010,7 @@ CVE-2023-0089,0,0,6c60b4af4ba253b8a4febd07150c06189513f24128db4ff7410488e1fad30c
|
||||
CVE-2023-0090,0,0,c15c40d6751ee339ab64f5b40aa08a3f54bcdabd5f7800894c5e0a44b85ec207,2024-11-21T07:36:32.103000
|
||||
CVE-2023-0091,0,0,46c0dab2e7d2216efa636bf9fbc629c5b6c2a3445fae33ad4f8cbb8e71e119c7,2024-11-21T07:36:32.227000
|
||||
CVE-2023-0092,0,0,ef8db00f32d23ac986463b04c512e0c34053da2cb8e99ab1bc7be468181791cb,2025-02-07T16:15:33.937000
|
||||
CVE-2023-0093,0,0,607afe295d61919d7ead04ba44446a45208196287b6f9acca487fdf4e095524e,2024-11-21T07:36:32.343000
|
||||
CVE-2023-0093,0,1,6f9c485568e18c814878943071f2c40f2d18b208ad6ee0a728f8e8b358afc841,2025-03-06T20:15:37.947000
|
||||
CVE-2023-0094,0,0,a89a17929970dc13f48dcdcd5ee44efd0ad1698543e99f1c3440861d97b08758,2024-11-21T07:36:32.463000
|
||||
CVE-2023-0095,0,0,6dc8e2554f999fe037965d222c5f05c6cb586eb1f5bdcea4bf6058bcd182fc9d,2024-11-21T07:36:32.640000
|
||||
CVE-2023-0096,0,0,7321c36f4f89a6785fad6fdb9435e212b799545c0e3c5038412c5a38fc786e69,2024-11-21T07:36:32.747000
|
||||
@ -214565,7 +214565,7 @@ CVE-2023-0665,0,0,f38be998f5b2ed4f8a710dae6c708e87a0da01499468b6ac7f9425307dec03
|
||||
CVE-2023-0666,0,0,ffdb9ed65b66d9501fb7ba4f3ba75e2f59e17b429aa8ed9e9aade22c103edf94,2025-01-07T16:15:28.873000
|
||||
CVE-2023-0667,0,0,6ce2da8cd021a850e6b966b13d3f1c5aa6c4612f36c388d5e418ef2a0edd1e51,2025-01-06T21:15:08.783000
|
||||
CVE-2023-0668,0,0,0bcd556958f148852498223d61a9b6e12f93a04aba52c0ec5107946ad0f89ac1,2025-01-07T16:15:29.157000
|
||||
CVE-2023-0669,0,0,550eb7c864902a258828f88859df06ea74eb5558e022bbfec15da3196f4e5cc5,2025-02-04T15:15:16.333000
|
||||
CVE-2023-0669,0,1,0160756a291ea0599fb98405fe40279ca727537b259e7364a0b94cda2285eb18,2025-03-06T19:48:51.880000
|
||||
CVE-2023-0670,0,0,ea50e87217b8cefec55d00cd66518fa489058e886474cbbebaeac93b96114e3c,2025-02-13T20:15:46.407000
|
||||
CVE-2023-0671,0,0,31a0191d43d5caefbf53a2b1834f7f7af28c570b673efd2065d279713f8ddd58,2024-11-21T07:37:35.960000
|
||||
CVE-2023-0673,0,0,c3bce74a461ebe1702e63971ad350776ed1eb8cf80ef301e8975000ddfcda787,2024-11-21T07:37:36.077000
|
||||
@ -216240,28 +216240,28 @@ CVE-2023-20619,0,0,a99172c725199c26d1ac611c126431876f6a08c48274d4e6188670672f9c5
|
||||
CVE-2023-2062,0,0,1b0cdbca534dee328f629d36f463ebda9984813ae4ee691e21873be1b8e874d7,2024-11-21T07:57:51.857000
|
||||
CVE-2023-20620,0,0,69b44fbb0e1221386a9c0b6299ccbc6f24c3da0896dbdc75497d1c96bf66ceeb,2024-11-21T07:41:14.413000
|
||||
CVE-2023-20621,0,0,a5f7461406513cc11dcf09408d4fc68bfd785df2fb5f1fd56c9dacd068217084,2024-11-21T07:41:14.520000
|
||||
CVE-2023-20623,0,1,aac55700e33d1669d5e839dd40bb9e7f0053a291ed8ac717d5d3e7d3995777f1,2025-03-06T17:15:15.163000
|
||||
CVE-2023-20624,0,1,080fcb6f0c41dd512a48a98419b388b2685ce36591c4933e6211c691f2ee4a75,2025-03-06T17:15:15.370000
|
||||
CVE-2023-20625,0,1,fce7c731ba737414271801df9f0de789c6364ed0923806cd9f0a8777531f89ae,2025-03-06T17:15:15.550000
|
||||
CVE-2023-20626,0,1,cd876ef76fdab4b1e97b29b0fc6e1ac08d664bcdc8f702625087532244e7daee,2025-03-06T17:15:15.717000
|
||||
CVE-2023-20627,0,1,66ac8990bf50f6150e1f38d2289f0f8fdc723a6a57ad29a8e5e7f6509cd8b0db,2025-03-06T17:15:15.890000
|
||||
CVE-2023-20623,0,0,aac55700e33d1669d5e839dd40bb9e7f0053a291ed8ac717d5d3e7d3995777f1,2025-03-06T17:15:15.163000
|
||||
CVE-2023-20624,0,0,080fcb6f0c41dd512a48a98419b388b2685ce36591c4933e6211c691f2ee4a75,2025-03-06T17:15:15.370000
|
||||
CVE-2023-20625,0,0,fce7c731ba737414271801df9f0de789c6364ed0923806cd9f0a8777531f89ae,2025-03-06T17:15:15.550000
|
||||
CVE-2023-20626,0,0,cd876ef76fdab4b1e97b29b0fc6e1ac08d664bcdc8f702625087532244e7daee,2025-03-06T17:15:15.717000
|
||||
CVE-2023-20627,0,0,66ac8990bf50f6150e1f38d2289f0f8fdc723a6a57ad29a8e5e7f6509cd8b0db,2025-03-06T17:15:15.890000
|
||||
CVE-2023-20628,0,0,a43f94bc27655b93099f567fd284ae00b065686b39b9054c4862b72cea71753f,2025-03-05T22:15:35.140000
|
||||
CVE-2023-2063,0,0,0aaf862838d3fc48a28b566a8ceaf8291ae1040d19422d9eb9fde272cb92f0f5,2024-11-21T07:57:51.990000
|
||||
CVE-2023-20630,0,0,373bf469509103d35ae343d6f2ea99e063d089c4b291ca1aedb51787a3d30c6a,2025-03-05T21:15:16.050000
|
||||
CVE-2023-20632,0,0,dbf315d861e3e5ca6a2602ca35016bde2eb440a8f2e0b22336c02aeb45f5da3d,2025-03-05T21:15:16.213000
|
||||
CVE-2023-20633,0,1,55da3ea3b095989eefe2280aa96c75179dec8710dc0e4976f20b04d3bd038656,2025-03-06T18:15:34.393000
|
||||
CVE-2023-20634,0,1,f71654de516b329eb0362d47269eca16449eb8c1337c18b5d999607cea867439,2025-03-06T18:15:36.003000
|
||||
CVE-2023-20633,0,0,55da3ea3b095989eefe2280aa96c75179dec8710dc0e4976f20b04d3bd038656,2025-03-06T18:15:34.393000
|
||||
CVE-2023-20634,0,0,f71654de516b329eb0362d47269eca16449eb8c1337c18b5d999607cea867439,2025-03-06T18:15:36.003000
|
||||
CVE-2023-20635,0,0,6f3b3918088ad0bffc5d893b39efaf6e458d611a6b2d15fad62ccf9b895a622a,2025-03-05T19:15:27.790000
|
||||
CVE-2023-20636,0,1,2e070513054d1ccc735fe0de9397c1f830d63571105fcac18a8be6e151d66745,2025-03-06T18:15:36.290000
|
||||
CVE-2023-20637,0,1,7a6676bc503c4f1ce77555d98f1e0dc15b975a2127ffae7504c6a4a521e7b459,2025-03-06T18:15:36.527000
|
||||
CVE-2023-20638,0,1,8563d171c2a70fa751dc3dfdfed72a80c8f9f90fd5a2a0f365690541c12def8b,2025-03-06T18:15:36.877000
|
||||
CVE-2023-20639,0,1,43de608c3376473623b6dc88e3044485798927d3f50b47525a7701c28b39de4b,2025-03-06T18:15:37.287000
|
||||
CVE-2023-20636,0,0,2e070513054d1ccc735fe0de9397c1f830d63571105fcac18a8be6e151d66745,2025-03-06T18:15:36.290000
|
||||
CVE-2023-20637,0,0,7a6676bc503c4f1ce77555d98f1e0dc15b975a2127ffae7504c6a4a521e7b459,2025-03-06T18:15:36.527000
|
||||
CVE-2023-20638,0,0,8563d171c2a70fa751dc3dfdfed72a80c8f9f90fd5a2a0f365690541c12def8b,2025-03-06T18:15:36.877000
|
||||
CVE-2023-20639,0,0,43de608c3376473623b6dc88e3044485798927d3f50b47525a7701c28b39de4b,2025-03-06T18:15:37.287000
|
||||
CVE-2023-2064,0,0,4259a1b04538f41db500878541515eda1a4c15b7e6d69a2162da1a1035ae3336,2024-11-21T07:57:52.120000
|
||||
CVE-2023-20640,0,1,280a1476622426990856812bfe738eef3711a9c0c1315ba677ec780e02e2bdcd,2025-03-06T18:15:37.700000
|
||||
CVE-2023-20641,0,1,7d5f961fb891ea2b347f3de2afc1c7149725f853a3a4fcf9fb672e867499b391,2025-03-06T18:15:38.040000
|
||||
CVE-2023-20642,0,1,86a840cfee1683f608316cc70559042fce2ebc5ccf3757fe257ca133605306a7,2025-03-06T18:15:38.883000
|
||||
CVE-2023-20643,0,1,83199c4f90ebf95de37affc2c495a78c23ea55f1c07720e95f54d9e4036f83db,2025-03-06T18:15:39.607000
|
||||
CVE-2023-20644,0,1,1e13cbd3ad894e861de8c5c2f1115691ac3e26c45da2a6d1bb0a6e4074f81d8c,2025-03-06T18:15:40.043000
|
||||
CVE-2023-20640,0,0,280a1476622426990856812bfe738eef3711a9c0c1315ba677ec780e02e2bdcd,2025-03-06T18:15:37.700000
|
||||
CVE-2023-20641,0,0,7d5f961fb891ea2b347f3de2afc1c7149725f853a3a4fcf9fb672e867499b391,2025-03-06T18:15:38.040000
|
||||
CVE-2023-20642,0,0,86a840cfee1683f608316cc70559042fce2ebc5ccf3757fe257ca133605306a7,2025-03-06T18:15:38.883000
|
||||
CVE-2023-20643,0,0,83199c4f90ebf95de37affc2c495a78c23ea55f1c07720e95f54d9e4036f83db,2025-03-06T18:15:39.607000
|
||||
CVE-2023-20644,0,0,1e13cbd3ad894e861de8c5c2f1115691ac3e26c45da2a6d1bb0a6e4074f81d8c,2025-03-06T18:15:40.043000
|
||||
CVE-2023-20645,0,0,ed1e23a6fdf450d446ca73727202e97d41960b27d4ec1f99ca645c2083ff5ce1,2025-03-05T20:15:42.957000
|
||||
CVE-2023-20646,0,0,9377d87b310648ae9645c937d011891b7daeffac896e258c0c187a5cf9686d76,2025-03-05T20:15:43.437000
|
||||
CVE-2023-20647,0,0,cab7941bcd35fe7279b563ee4a6947c5fe3ad29a6dad0910bbdd50b0284750a6,2025-03-05T19:15:27.987000
|
||||
@ -216269,7 +216269,7 @@ CVE-2023-20648,0,0,3b980e78cb172dead3d542036439304cb2c23e7475a12dcf5293329e0cbe6
|
||||
CVE-2023-20649,0,0,6d049a9ae41c67379592b3e6c0281ec1e7443234682da32d3264c73269e72923,2025-03-05T19:15:28.320000
|
||||
CVE-2023-2065,0,0,6adc1dc6e5421910a8f66b949b10ddd6e35171e99ee7723b2c415c61326c4780,2024-11-21T07:57:52.227000
|
||||
CVE-2023-20650,0,0,18438e1319cbd130b93b5945af38cf69973fd9c79425fcf3f888aede36b965fa,2025-03-05T19:15:28.530000
|
||||
CVE-2023-20651,0,1,445bbb9f357efada358e42f53b8f28cb4818878fdbd2362fe0914dcf7ac79c35,2025-03-06T17:15:16.063000
|
||||
CVE-2023-20651,0,0,445bbb9f357efada358e42f53b8f28cb4818878fdbd2362fe0914dcf7ac79c35,2025-03-06T17:15:16.063000
|
||||
CVE-2023-20652,0,0,17cd13e3445ca3b057e9c52c8e29168c960cf6c40ea3e47c6010e04cbf52887f,2025-02-13T16:15:37.597000
|
||||
CVE-2023-20653,0,0,2e3a6ce1de65ad8fc2ff0f067002d17f6c3e6a50911a4b2bd06bafbd2ec34c83,2025-02-13T16:15:37.793000
|
||||
CVE-2023-20654,0,0,a248cb21d0ff5aa290e571631f7026712aa2f0e6dc51485f7f3f566b2bea1c25,2024-11-21T07:41:17.990000
|
||||
@ -217760,8 +217760,8 @@ CVE-2023-22098,0,0,ab54971307e041767cd762fde9efe9f06170cb6c4e444af8d59bba46d875f
|
||||
CVE-2023-22099,0,0,a0531c62f33b0faa5b51ffe09be0962637e7faa1d6b39061fe737f630219b167,2024-11-21T07:44:16.420000
|
||||
CVE-2023-2210,0,0,8309fc99c807835c61ab8e059b4b5a0e763661115d2ce03b9eb516471a6f626c,2024-11-21T07:58:09.740000
|
||||
CVE-2023-22100,0,0,bb07c770ea538f7eb053face39ebabb82178a40c6bd12367b25d8d6f14087355,2024-11-21T07:44:16.543000
|
||||
CVE-2023-22101,0,1,666806589af0c6e55ac15196c34b0c632bf93945bfeca5110c8ca7c2f6de1e18,2025-03-06T17:15:16.297000
|
||||
CVE-2023-22102,0,1,1716c1fb5d193a060754b01e270f609fda0ff9ad5fd7023b5e0850f6dc117d37,2025-03-06T17:15:16.437000
|
||||
CVE-2023-22101,0,0,666806589af0c6e55ac15196c34b0c632bf93945bfeca5110c8ca7c2f6de1e18,2025-03-06T17:15:16.297000
|
||||
CVE-2023-22102,0,0,1716c1fb5d193a060754b01e270f609fda0ff9ad5fd7023b5e0850f6dc117d37,2025-03-06T17:15:16.437000
|
||||
CVE-2023-22103,0,0,540fb0374154836f69250627c813a65ff7d11a0b4baef6cea3cc5a7dac8cbcad,2024-11-21T07:44:16.883000
|
||||
CVE-2023-22104,0,0,a7b346fe02ceb17c28ea3c299fe4fe06d09bf2c46b2a425e1ed5e0c3b0fc2e71,2024-11-21T07:44:17
|
||||
CVE-2023-22105,0,0,69363992d9aaffc606bfbd0b8485d542b11892589275e2aa435b193fd771a5b8,2024-11-21T07:44:17.110000
|
||||
@ -217915,7 +217915,7 @@ CVE-2023-22331,0,0,975a66678c947c6fd9643dc7b61d657f7c1544ac1f02f7181b9b7b2352404
|
||||
CVE-2023-22332,0,0,5b53881cc7f561923a7307a21fa724cf6206fbff5ce2eff252fbfaafd93e829c,2024-11-21T07:44:34.840000
|
||||
CVE-2023-22333,0,0,f8db12d8428f1a8ad7049d32b56eb3660d94221ec6bac9fcf6874edf8c2b1e2d,2024-11-21T07:44:34.950000
|
||||
CVE-2023-22334,0,0,59460f6c544ae5c2a09037f61f18c7df553834d7cb5bdb8f6cd83508a0355120,2024-11-21T07:44:35.050000
|
||||
CVE-2023-22335,0,1,e2cdbe44d7f025f42ed55394ac631a52bcf1b0b793133f5a3a5c8a0edc560d3f,2025-03-06T17:15:16.593000
|
||||
CVE-2023-22335,0,0,e2cdbe44d7f025f42ed55394ac631a52bcf1b0b793133f5a3a5c8a0edc560d3f,2025-03-06T17:15:16.593000
|
||||
CVE-2023-22336,0,0,f4a7cab6a1ad5814eee212d8dee5da87605af397c1ab560ff48f1b473d5cec8e,2024-11-21T07:44:35.247000
|
||||
CVE-2023-22337,0,0,68cdff4a5de2d37748865c4d18c75672713a6de85f16bdea2f3a69aa137a3663,2024-11-21T07:44:35.350000
|
||||
CVE-2023-22338,0,0,6a898e6ea95789cbd91787962adff9be95cc17c08fb8c6011f49f48c8a42b585,2024-11-21T07:44:35.463000
|
||||
@ -218379,7 +218379,7 @@ CVE-2023-22843,0,0,dc94f4b1265240b7ed270eeb504c59f2e8374b2d5a4c5042200809e958e7b
|
||||
CVE-2023-22844,0,0,787a14b65a310549a82f3dbdd1f01916498b8f42be7162fb11044a02fe1bfaf4,2024-11-21T07:45:30.557000
|
||||
CVE-2023-22845,0,0,b5a8c9562c7fce8da51cdd95f83f5d7edf3993c341da2739448a4ca824e85ef7,2024-11-21T07:45:30.680000
|
||||
CVE-2023-22846,0,0,4182fcfc80d62a777d200202aaa27ceebaa157e73317e756c4766a80e47f0beb,2024-11-21T07:45:30.803000
|
||||
CVE-2023-22847,0,1,e4246a91b107fe35121d0fee0284d23d74653569c27a65d903d65b7088641f37,2025-03-06T17:15:16.783000
|
||||
CVE-2023-22847,0,0,e4246a91b107fe35121d0fee0284d23d74653569c27a65d903d65b7088641f37,2025-03-06T17:15:16.783000
|
||||
CVE-2023-22848,0,0,3f961db3a5863de2ea6f2808366686b131b7c82f64d6f20a39867776a1a6317b,2024-11-21T07:45:31.037000
|
||||
CVE-2023-22849,0,0,64d5df5a24d384078fde691f204b71945da421970f2d9c69c21d5729de0cdbeb,2024-11-21T07:45:31.163000
|
||||
CVE-2023-2285,0,0,429610ee7b9031eadcf24b669b6be2efc2d895f5ad52396c22959801e4441d14,2024-11-21T07:58:18.600000
|
||||
@ -218832,7 +218832,7 @@ CVE-2023-23550,0,0,d536d881c69c4fc2ee36bde32a4e777d709d4a376bd8b90100e22fa21725e
|
||||
CVE-2023-23551,0,0,d2a330092fbace6a9eeb31a46bdb453c4c64d137eefba00c2e8aa548be3d2349,2024-11-21T07:46:24.247000
|
||||
CVE-2023-23552,0,0,a58eaae02053549fd1cb717e43d94c5953ea0937dbd36a072ef7b28dca47add2,2024-11-21T07:46:24.367000
|
||||
CVE-2023-23553,0,0,41cded4a1482a0786080eab0481338f108027ab66f80124dfb6babb83584e00e,2024-11-21T07:46:24.490000
|
||||
CVE-2023-23554,0,1,d2f4c86a724cfbf05bafbbaaf6e994b973ccd00d1182c614809e0fa13232f5b3,2025-03-06T17:15:16.980000
|
||||
CVE-2023-23554,0,0,d2f4c86a724cfbf05bafbbaaf6e994b973ccd00d1182c614809e0fa13232f5b3,2025-03-06T17:15:16.980000
|
||||
CVE-2023-23555,0,0,e30d8f18c2d1a132d0df67f1b70fedf2fdf02ee2d11321d043b7f29747bdcc77,2024-11-21T07:46:24.737000
|
||||
CVE-2023-23556,0,0,503b06a1aaa56659575f9dd82d5ace1280a0ef2eacc1b1c261cbb1016e608859,2025-01-31T14:15:29.200000
|
||||
CVE-2023-23557,0,0,965eacda3f7071dc643df400155fecca58ae64b391e9f8b1c0621ee7e1d2c780,2025-01-21T22:15:09.520000
|
||||
@ -219851,8 +219851,8 @@ CVE-2023-24775,0,0,370e52e17f228ac5b00111d084ae9525ce1a2e22d3eea9b60c4e85f7644c8
|
||||
CVE-2023-24776,0,0,0a5f5709e205dd9226376644553b486dea56437f189c294a8080391f52998384,2025-03-06T16:15:40.317000
|
||||
CVE-2023-24777,0,0,a00b279e478c451a27881293d2469f6eae0019065247a670b5fb4f948be6bc73,2025-03-05T19:15:29.630000
|
||||
CVE-2023-2478,0,0,e91b233a353d459fe8bdebf4b2ba61948a17e504cd67f12404049ad129f433dc,2025-01-29T18:15:44.907000
|
||||
CVE-2023-24780,0,1,b9dd2f1fcd3f4b89350b74f229ea1d418203d839d7a2ae180cc7fa5be7783a26,2025-03-06T18:15:40.293000
|
||||
CVE-2023-24781,0,1,3894237ed71ca7363e17746687075b44cf97033c92333187795d4139d0b6c65e,2025-03-06T18:15:40.553000
|
||||
CVE-2023-24780,0,0,b9dd2f1fcd3f4b89350b74f229ea1d418203d839d7a2ae180cc7fa5be7783a26,2025-03-06T18:15:40.293000
|
||||
CVE-2023-24781,0,0,3894237ed71ca7363e17746687075b44cf97033c92333187795d4139d0b6c65e,2025-03-06T18:15:40.553000
|
||||
CVE-2023-24782,0,0,57db0d0839e35c2a54e424f4fd7fe928741c422b25adb1d1f016ad1dc9cc09c2,2025-03-05T19:15:29.800000
|
||||
CVE-2023-24785,0,0,316b9878f5504255dd810089f62d0c938bc918f44d5e8b00a11c8b78f26588e7,2024-11-21T07:48:24.490000
|
||||
CVE-2023-24787,0,0,1bb160417f56158608d2467445788d315bc974ff3fa7fc414e55d4483c668cc3,2023-11-07T04:08:42.430000
|
||||
@ -221609,7 +221609,7 @@ CVE-2023-26950,0,0,db6c38d36c1604a374855dab0dc50986d0667800502993578acb51fb8137a
|
||||
CVE-2023-26951,0,0,e1adc49b9103f912e0f2aa00fe9d939d9cab78c809f7f4a57db4e408eaae3d8c,2024-11-21T07:52:06.123000
|
||||
CVE-2023-26952,0,0,9a77e11b71d30a33fc14ddb60eb3c430a4af1c5011ff90903a5c4573a4441c86,2025-03-03T16:15:37.590000
|
||||
CVE-2023-26953,0,0,df116039a3d5e2187601aea238f6a2dc84108655cb925d05b197fe653c3aa647,2025-03-04T20:15:36.217000
|
||||
CVE-2023-26954,0,1,b94865c54780c7ba7a79b21a259127affa70ba3b43f0a5bc14f9d7ce32f7327f,2025-03-06T18:15:40.840000
|
||||
CVE-2023-26954,0,0,b94865c54780c7ba7a79b21a259127affa70ba3b43f0a5bc14f9d7ce32f7327f,2025-03-06T18:15:40.840000
|
||||
CVE-2023-26955,0,0,b8f41864dbe1598322641771160d9e7a2e547f6259bb94db906df77dcc968550,2024-11-21T07:52:06.740000
|
||||
CVE-2023-26956,0,0,c5b33ec4fa43b617109d236f6bbf1d37ebc8bc0e77d9487798a624e5f0cd4a70,2025-03-05T19:15:32.153000
|
||||
CVE-2023-26957,0,0,9186fd6b7a0d9f712399075270eb4fab0601187e7a185759478106bd46f6bc40,2025-03-05T19:15:32.410000
|
||||
@ -222105,14 +222105,14 @@ CVE-2023-27562,0,0,02aaf69009c5868c27182c47816fc008f7a8a0de1090d6b5ba61af000201d
|
||||
CVE-2023-27563,0,0,67a3d59b5a20d3eb85cf287c56fcd025386cd683108d3a9c95939840486f9c63,2025-01-27T22:15:10.730000
|
||||
CVE-2023-27564,0,0,2a39219f90001ea5b6f0d4e90096c2619009a5852031e492e1348901c3cc374e,2025-01-27T21:15:09.593000
|
||||
CVE-2023-27566,0,0,f10ab8e0b7d4d116a52a66dc38e37d7b8d17b6f95eb30a8352a16094944dceb2,2024-11-21T07:53:09.667000
|
||||
CVE-2023-27567,0,1,94668bfbfd880085e80fa7471a835a196739f664f1b422751085c2605049dffe,2025-03-06T17:15:17.347000
|
||||
CVE-2023-27567,0,0,94668bfbfd880085e80fa7471a835a196739f664f1b422751085c2605049dffe,2025-03-06T17:15:17.347000
|
||||
CVE-2023-27568,0,0,f5a1403363921ab7fc1cf56bc2c0d0905aeb65a857a163fd7edcf497d05172a0,2025-01-29T21:15:15.063000
|
||||
CVE-2023-27569,0,0,2ba164fc48bc30437e173646a4df537fcfe9af96c0088975a8abeebb4af24201,2025-02-26T19:15:18.457000
|
||||
CVE-2023-2757,0,0,a2cd86ad9d8f6d688347ab07eee9989a9090ac17e23e43d191468be0c19893fb,2024-11-21T07:59:13.940000
|
||||
CVE-2023-27570,0,0,ffffed4a5c2b06d092bfd16ce63e7837d76e279fceaff993a18a505133a896cb,2025-02-26T18:15:12.583000
|
||||
CVE-2023-27571,0,0,1664d994358801a2e2cc6084d7f67372ed92e7bfc4f7161e3ba1f66590f3a522,2025-02-10T16:15:34.290000
|
||||
CVE-2023-27572,0,0,13e429f2aaecf4c9aca9a294c0bd171df16f2ce6e26e8cfec3e8388ac5794180,2025-02-10T16:15:34.503000
|
||||
CVE-2023-27574,0,1,365e860ab89cbceb9e5f99f017f2d220b1632f36ed81b4c4d75cf574f2f2a0c0,2025-03-06T17:15:17.480000
|
||||
CVE-2023-27574,0,0,365e860ab89cbceb9e5f99f017f2d220b1632f36ed81b4c4d75cf574f2f2a0c0,2025-03-06T17:15:17.480000
|
||||
CVE-2023-27576,0,0,df8958a2c7e5597719cf58a7c6fd6b0d8479173cfc9e96e91767543d29a9dbb4,2024-11-21T07:53:10.920000
|
||||
CVE-2023-27577,0,0,0da2b25e0a1965db86ba365b137153bb2f27399113760640b8e95cd7713c3a3f,2024-11-21T07:53:11.080000
|
||||
CVE-2023-27578,0,0,988b28a78350e95e49bee99d6d0a6c5d6e46ad44d77272c1b11ed40acd47c2eb,2024-11-21T07:53:11.210000
|
||||
@ -246157,7 +246157,7 @@ CVE-2024-12054,0,0,2e8ec9badf8036c584f4a34dc52af1608569bf624cab5cf18f8bb46436f20
|
||||
CVE-2024-12056,0,0,10d9c36bf9a3ef7782963e14177fb1a983e8eb8ca0a779264b8a46bf859b25c1,2024-12-04T15:15:09.700000
|
||||
CVE-2024-12057,0,0,ce7f3a57942c75009ffa01267ac1957bfbafb0b76aaba9d30fe117abc212dfe3,2024-12-09T19:15:12.750000
|
||||
CVE-2024-12058,0,0,30c22f7be7c3f1b207f93ab8480a170bfa1d3a5ae9ab44b79f749c82b604db70,2025-02-11T16:15:38.663000
|
||||
CVE-2024-12059,0,0,9c6b9e40ba3530efc99fd3b20a62c2d64e18bfab9b7e6210831ac824ade4b6d9,2024-12-12T06:15:23.167000
|
||||
CVE-2024-12059,0,1,8b40a19eba57d179c7b6b201e122af3e3490fc5aa386acd7b4e86d1b63559be8,2025-03-06T19:54:57.093000
|
||||
CVE-2024-1206,0,0,65bf1c4d8e30d73d5e9c6bb1e7a109c9fc8e4ba9e642b51fc692775f81e5075d,2025-02-26T15:14:42.477000
|
||||
CVE-2024-12060,0,0,00194c71df08040c99f5a5536b3c32fccdf95c506294b164954268126957b170,2024-12-06T09:15:08.117000
|
||||
CVE-2024-12061,0,0,e705f6d208be0412d9e4e1ed849702d7bdef1edc0803b726bf0fe97bd2731f5b,2024-12-18T04:15:07.500000
|
||||
@ -246291,7 +246291,7 @@ CVE-2024-12201,0,0,959e06a9a36a119c26515d53c30f3df9520512fa9f4b92daec3a5d4316162
|
||||
CVE-2024-12202,0,0,f8e879b581e6948b8611c91e34e77898ab31ee3bd4fed08e5a23f457acda7001,2025-01-07T08:15:25.090000
|
||||
CVE-2024-12203,0,0,071877eff24cde372305d0756ca5c641682cded9e0285349acc0f650dba1e42d,2025-01-17T07:15:25.990000
|
||||
CVE-2024-12204,0,0,8869bb642f03c4aa3a02796800d2990e817fabee5feb10cf5da5780c611929a6,2025-01-11T03:15:20.997000
|
||||
CVE-2024-12205,0,0,3f132fb045992282c7f82c5a064b4363ee95bb769165d08b8391a552ea18c9e1,2025-01-08T05:15:09.667000
|
||||
CVE-2024-12205,0,1,649609ae4642f3bc6f586e1f4e1ac2a9542921b3958f0bc6858500a985b781a4,2025-03-06T19:02:47.083000
|
||||
CVE-2024-12206,0,0,2d268b18f02f4bd906dad5a4345fbb5bf68ec20740bfded288226575e3fdc866,2025-01-09T11:15:12.070000
|
||||
CVE-2024-12207,0,0,4215076d4c349db5508fc90ade02423810084b601173785e651a4489dedc1db2,2025-01-07T05:15:16.080000
|
||||
CVE-2024-12208,0,0,570ae5920f0e6b28dc0cde719aa86834356ad1572351e3f8a72e245ec26cd554,2025-01-17T17:15:10.740000
|
||||
@ -246770,7 +246770,7 @@ CVE-2024-12738,0,0,0cee8c1793928a32af812059d0c46039bd10d2c94f791e505cd74a43ef658
|
||||
CVE-2024-1274,0,0,8b1ee7c9f6e7817a23a525a715cd0c1ef18c567c26c711e49e1e872df04cda9a,2024-11-21T08:50:12.730000
|
||||
CVE-2024-12740,0,0,e6c4d03a8c2935c7f946e2ddf8fb2efb52eeb4b7b990af277f1511faff48b8c0,2025-01-27T18:15:36.743000
|
||||
CVE-2024-12741,0,0,8d4c06d6204bde3983a442ab297408366d3d8d84bd77eb948d96a8745c52828f,2024-12-18T20:15:22.390000
|
||||
CVE-2024-12742,1,1,b1b5177f24d796a05ba85af261155fd9d40463bd10b9762f91a27ba214cab5e2,2025-03-06T17:15:17.740000
|
||||
CVE-2024-12742,0,0,b1b5177f24d796a05ba85af261155fd9d40463bd10b9762f91a27ba214cab5e2,2025-03-06T17:15:17.740000
|
||||
CVE-2024-12744,0,0,d9bcd7b60c79640d4995955dca329cb96a3574a3f475005b85edf507783c7d57,2024-12-26T15:15:06.290000
|
||||
CVE-2024-12745,0,0,56f1c84b33bef267b3eb5e88e8c9c1273071ba9706fba6301263255413a17152,2024-12-26T15:15:06.527000
|
||||
CVE-2024-12746,0,0,3dc399827dbe6da7d4657aa1f300fc1452e75823ea53e19ad5a88d067d48a8c0,2024-12-26T15:15:06.650000
|
||||
@ -247429,7 +247429,7 @@ CVE-2024-13465,0,0,ec8251f01c9f88d7585f9bf4822b9e6fe7e3358f78bb52205382957231114
|
||||
CVE-2024-13466,0,0,ad9c9053e3167555f400e28f8c129f78ebaefbfea867abbbb84a69e9c4118ca4,2025-02-18T19:15:13.923000
|
||||
CVE-2024-13467,0,0,923a38005e4f33b4b00ab497e7b9124480dbc307e6f66ebdda4f5013f61f8d36,2025-02-04T19:33:01.617000
|
||||
CVE-2024-13468,0,0,b48d1fa3d35721ccb47a1fb4394610e679bd03891ed40ec26ea0d83834fe394b,2025-02-19T08:15:16.027000
|
||||
CVE-2024-13469,0,1,f5f4e039fc9029d34c0aa8afde7e8626db9dde4b5a828e2df2285c49cc2b04d1,2025-03-06T16:36:54.387000
|
||||
CVE-2024-13469,0,0,f5f4e039fc9029d34c0aa8afde7e8626db9dde4b5a828e2df2285c49cc2b04d1,2025-03-06T16:36:54.387000
|
||||
CVE-2024-1347,0,0,b12a4cbf8e4f285872bf9a248874204d9208208e515ae74de2299237bb6626ad,2024-12-11T19:24:26.643000
|
||||
CVE-2024-13470,0,0,62d62489ae69e29df63f8eb0190e3d2c26ee16e4de50a68486e1e17ce16780e9,2025-02-04T18:51:38.467000
|
||||
CVE-2024-13471,0,0,c2b3475b8b9340ee7eafc3015ca60d311a7a71d13802743276d03f35c7f296e9,2025-03-05T12:15:35.110000
|
||||
@ -247586,7 +247586,7 @@ CVE-2024-13632,0,0,7b015e6f72d13589b7d97462ac3bfe30f6a11cf8c1a6af3a853d02e1efd6d
|
||||
CVE-2024-13633,0,0,2deb3debe35674bbdda8b971fff5055affb3f691f2d8ba5d3756a5bf2ffc5b2e,2025-02-26T15:15:22.940000
|
||||
CVE-2024-13634,0,0,5d8a1f3015a94814647bc0bb3707cb44d4707b2ce8e11e273153be3bca7bdefc,2025-02-26T15:15:23.103000
|
||||
CVE-2024-13636,0,0,060ea877f973da3e3139131075fc6b65a68ba520ee71166120bdf003d38b6862,2025-02-24T22:15:11.277000
|
||||
CVE-2024-13638,0,1,eb0f7891b8d7544d8603ae647ef33cb2a949acbc2f71d820d25576adb876013a,2025-03-06T16:36:54.387000
|
||||
CVE-2024-13638,0,0,eb0f7891b8d7544d8603ae647ef33cb2a949acbc2f71d820d25576adb876013a,2025-03-06T16:36:54.387000
|
||||
CVE-2024-13639,0,0,071381e5184000ecf8c72dcde14c2011c1cb4ea4b355e15fb5e9c5b4fb270c14,2025-02-18T18:15:51.587000
|
||||
CVE-2024-1364,0,0,47f33fd19586ab96196a2cb0337c2030aca42f1bd8c4ab84cfa2e52c3dbe5e59,2024-11-21T08:50:25.223000
|
||||
CVE-2024-13641,0,0,f5ae933978b19eaa8786ac84fc5f20a253f923886108cb6b544c748640981d51,2025-02-25T19:39:47.477000
|
||||
@ -247657,7 +247657,7 @@ CVE-2024-13712,0,0,5175bdafe3447afb47dbb7442f9744ca12f1d9f2556123222083243df1a3f
|
||||
CVE-2024-13713,0,0,90954b7583c56b27a881e3e89dac99a8fe4d669edd575847540b2c9eda75eaf1,2025-02-25T03:28:44.207000
|
||||
CVE-2024-13714,0,0,b97d32dee0692688a979a37af59123f65e30a687518c4b6566287e3189fcc055,2025-02-12T06:15:19.987000
|
||||
CVE-2024-13715,0,0,f17d510da8f1903ed11deb0997b2f7b6b7c66954d157d92b6358d4c629959cde,2025-01-30T18:53:45.883000
|
||||
CVE-2024-13716,0,1,081a135d344e341b95895d1b6ec4c3b57f2f922fe4703ef063ddd985ea5ad68d,2025-03-06T16:36:54.387000
|
||||
CVE-2024-13716,0,0,081a135d344e341b95895d1b6ec4c3b57f2f922fe4703ef063ddd985ea5ad68d,2025-03-06T16:36:54.387000
|
||||
CVE-2024-13717,0,0,4177d6f2dff693b69b1517de82a3632e741bac0287c1343530f73c4d6d1ed41b,2025-01-31T06:15:29.770000
|
||||
CVE-2024-13718,0,0,2a66de61882126095d3053f4a883ea3530a7a8c40923166079a0a9d06dc8603b,2025-02-21T15:25:03.847000
|
||||
CVE-2024-13719,0,0,0bd57a765654eeb9e811d1d099eab00bee38dce668b56e8d067bea2502bfa18f,2025-02-19T08:15:20.737000
|
||||
@ -247711,7 +247711,7 @@ CVE-2024-13791,0,0,87d34d666cc6abe64fd811a08f4df25c9dcd54e5f0bd075f781061adfbd26
|
||||
CVE-2024-13792,0,0,95c136c58ffd0d86dab2da9aa86fa75170f9d7e438d0612c3363162ba0d1c0ed,2025-02-25T20:56:55.553000
|
||||
CVE-2024-13794,0,0,7d022241f9cbf94ac9ed1b3f72ace036ea4f25f4241c06ac4a29fc609bc50719,2025-02-25T19:38:05.950000
|
||||
CVE-2024-13795,0,0,5c01555cf2ad62d519339aa7fca734aa9775ae1bd36f752424bbf014d4c482c0,2025-02-21T15:33:49.100000
|
||||
CVE-2024-13796,0,0,087b9ce07eec49c2f22f938b8e7bf977a4fb1b62eb4416dd03b68c4248b79ae2,2025-02-28T05:15:32.950000
|
||||
CVE-2024-13796,0,1,b7063018a85fc6dff6370df0e081b44bc61db6f1ac3a0f81916fc1f9c074cab2,2025-03-06T20:21:36.547000
|
||||
CVE-2024-13797,0,0,784cf91e048f4958bdad15f96921115cca7505f76e057d124aec3331890c0072,2025-02-21T12:17:17.200000
|
||||
CVE-2024-13798,0,0,2fd23a3ceae4673afe62b8e23cda28ec1fe45b9d60f7b2a4cfebb6247a6b184a,2025-02-22T05:15:12.590000
|
||||
CVE-2024-13799,0,0,568137e6611c802d800a1c88238ba60b18e92925318c7d21fcf20c95230c7dfb,2025-02-19T06:15:21.283000
|
||||
@ -247736,8 +247736,8 @@ CVE-2024-13827,0,0,40b9b2f1bee49602bcbc26b5d44dfb98f0e80093153eca031d92ad08d3803
|
||||
CVE-2024-13829,0,0,0eb68c1cd51e57e24834aa430c28539b9740e4aeaf2e4bf4d57d2d018e612c3a,2025-02-05T06:15:31.257000
|
||||
CVE-2024-1383,0,0,93ff0b2eb9f4abe59909f3b49d94bb9635c166ee2ef0054262af8a40f59e1121,2025-02-13T20:02:55.647000
|
||||
CVE-2024-13830,0,0,c6d7b41600cf06f096c92eda44ad4947ed0129124f061312ef644e59d67aa0f4,2025-02-13T17:09:11.660000
|
||||
CVE-2024-13831,0,1,4c2b1db0ccfc994ec4b508e4cd77974628a0e7ffbd6d59f8a9682096022eb59a,2025-03-06T16:36:54.387000
|
||||
CVE-2024-13832,0,1,7b2f53a85419258936a296c93c771968c75a2af3851abffefcd1775c16b73917,2025-03-06T16:36:54.387000
|
||||
CVE-2024-13831,0,0,4c2b1db0ccfc994ec4b508e4cd77974628a0e7ffbd6d59f8a9682096022eb59a,2025-03-06T16:36:54.387000
|
||||
CVE-2024-13832,0,0,7b2f53a85419258936a296c93c771968c75a2af3851abffefcd1775c16b73917,2025-03-06T16:36:54.387000
|
||||
CVE-2024-13833,0,0,25224aa5db16e2fcf2ffae150064444414666930ac899e8863e3333ed3af74b5,2025-03-01T12:15:33.230000
|
||||
CVE-2024-13834,0,0,43e5ae6cc904537a30eeccc37c7b9a07fd2bfb264b9574278bc2a72960c00c36,2025-02-24T12:37:18.957000
|
||||
CVE-2024-13837,0,0,b186071e4ea62233d731f5821d490b3ab777186a5f4da25e22f6fedfafcbdd0c,2025-02-17T19:15:09.463000
|
||||
@ -247751,7 +247751,7 @@ CVE-2024-13848,0,0,5623c6bf6e4d11fedf071f2d8a6a41f683ea08f022ec414f86d8eab78cead
|
||||
CVE-2024-13849,0,0,ff236b733a56083f87d9fda1374c64bc737bce2f85ab541b6c51d8f632de7db5,2025-02-25T20:58:18.983000
|
||||
CVE-2024-1385,0,0,8d44f2ddcfbec761b90cec48d83e59f97d1a3c53ec848ed4ca09c1c2ed005096,2024-11-21T08:50:27.933000
|
||||
CVE-2024-13850,0,0,21374982a6b82adc74612a8ed4ca91538e192f9010fe0e837b933250ab0049eb,2025-02-24T17:36:09.667000
|
||||
CVE-2024-13851,0,1,592a591d98f0f1b719f907e8ef0e6cf89b3d77cf86e303183778d5c89e82d5cb,2025-03-06T16:36:54.387000
|
||||
CVE-2024-13851,0,0,592a591d98f0f1b719f907e8ef0e6cf89b3d77cf86e303183778d5c89e82d5cb,2025-03-06T16:36:54.387000
|
||||
CVE-2024-13852,0,0,dd2c33f18b8ccbee6b646903a658fcb7af55315e978ebdb8f9c794cc0b1e0482,2025-02-21T15:50:45.813000
|
||||
CVE-2024-13854,0,0,b568f01b297c5912b2612b134f4f5250b2d30544244315a9c47edd8900e54042,2025-02-19T08:15:21.440000
|
||||
CVE-2024-13855,0,0,9aad1f9df577d823156d8f799c672a44111ca2c006ede84d8cbdc8cff07c1227,2025-02-25T18:23:31.507000
|
||||
@ -263729,7 +263729,7 @@ CVE-2024-3962,0,0,02d50a8b0ad476102baf3a7dace0f624e1034f6562936e79a43b09bad9b4c1
|
||||
CVE-2024-39620,0,0,3103eb99384deca53db687a27b3e5caaa6689cbe4eb572f735afe1f0771046b8,2024-08-30T16:30:39.210000
|
||||
CVE-2024-39621,0,0,cae5d3932e35cf944a4b54df61d1a71bb4b968e663eaab53930d5e8f7875fe91,2024-08-02T12:59:43.990000
|
||||
CVE-2024-39622,0,0,96c23485620f3e81773744aee243cf0e7c37a5f3d8735fada97fe48ab111df1c,2024-08-30T16:30:11.797000
|
||||
CVE-2024-39623,0,0,a6d3d898833627c5e82954f61e13e5da066b3d59896a9cad6881d9e17d472ce3,2025-01-02T13:15:07.663000
|
||||
CVE-2024-39623,0,1,eee6c115b61b6d39836de7f3e851c7de876c80df169ff71cf1cbd1863618848f,2025-03-06T19:02:47.083000
|
||||
CVE-2024-39624,0,0,356071d6949b7757bd9aa077ca0da5d76bd89bdee245d3181d732776519b4640,2024-08-02T12:59:43.990000
|
||||
CVE-2024-39625,0,0,46865006049bffb348ab617483bb31d9740d02162fa7d3feb0dbc34b627dd67a,2024-11-01T20:24:53.730000
|
||||
CVE-2024-39626,0,0,835849b2c37f1f26f813e34459395f2aefd3b469ce947b1acbdf13cc9885f721,2024-09-17T15:07:49.433000
|
||||
@ -266023,7 +266023,7 @@ CVE-2024-42834,0,0,4682a7643f4f1c0d32c2822f9fd1a1c021fa496bbb8846e29948873617922
|
||||
CVE-2024-42835,0,0,22a6f739b93aacf1745ceb89b53a8f50b01769e067cdb25293fef7ccf249d315,2024-11-01T12:57:03.417000
|
||||
CVE-2024-4284,0,0,78f6e6bd631db92106983a80d2af17b1ce9aee6f8799b7d845b4a68ba7f16cc6,2024-11-21T09:42:32.463000
|
||||
CVE-2024-42843,0,0,ff9fe7d40ac7d40e1ac640d2b984df3686e2b8fb167f41b98a9e8430915f9584,2024-08-19T19:35:09.180000
|
||||
CVE-2024-42844,0,1,88ed36143d303e407c74e41833d667588b182b1fffad850c1b0fda1be264cc78,2025-03-06T17:15:18.793000
|
||||
CVE-2024-42844,0,0,88ed36143d303e407c74e41833d667588b182b1fffad850c1b0fda1be264cc78,2025-03-06T17:15:18.793000
|
||||
CVE-2024-42845,0,0,9b5c61583f167788abce82e6afb0b505f7db99254d9ef509083483fc304c8d3d,2024-08-28T16:35:23.650000
|
||||
CVE-2024-42849,0,0,c66070e6231ba1d77eff858a1ed19124639e16c363eab861a1ca84d9d7b0aa3e,2024-08-19T13:00:23.117000
|
||||
CVE-2024-4285,0,0,d88ae73b3a1728178791a9277a690a4c488f4499a452379ab5fa50a282469f93,2025-02-11T02:15:35.033000
|
||||
@ -266132,13 +266132,13 @@ CVE-2024-43051,0,0,a32eb75159144fc0400f4a3fd843070d06a761b09ec2ffb1df7f4ea71fd6c
|
||||
CVE-2024-43052,0,0,f688f09d75ea1280493efd246e06c860b66ffbaf35b8c8d551fb0708ef09b9d5,2024-12-12T15:28:54.787000
|
||||
CVE-2024-43053,0,0,557eafb2a972c600f8cd1195cb2a7ab112336dd759ccf7035648b847cc40a102,2024-12-12T15:29:14.443000
|
||||
CVE-2024-43055,0,0,f1e527a3020db36b83a4085bce3603ba4821d3466fea47fcc96aa727049dc57a,2025-03-03T11:15:11.637000
|
||||
CVE-2024-43056,0,1,105c5ae07dbf24a96965557708fab371c04681c71723e190b979a744755c3f53,2025-03-06T16:36:34.470000
|
||||
CVE-2024-43057,0,1,61adf70e579a5da8c905801d8f413a4e3c5876cc97bcf21d6faca34c1c10eda3,2025-03-06T16:36:34.470000
|
||||
CVE-2024-43059,0,1,6795c629bedf24aa03163f66f78d4bf9d586d690d508cb9463c00a7a1799cff4,2025-03-06T16:36:34.470000
|
||||
CVE-2024-43056,0,0,105c5ae07dbf24a96965557708fab371c04681c71723e190b979a744755c3f53,2025-03-06T16:36:34.470000
|
||||
CVE-2024-43057,0,0,61adf70e579a5da8c905801d8f413a4e3c5876cc97bcf21d6faca34c1c10eda3,2025-03-06T16:36:34.470000
|
||||
CVE-2024-43059,0,0,6795c629bedf24aa03163f66f78d4bf9d586d690d508cb9463c00a7a1799cff4,2025-03-06T16:36:34.470000
|
||||
CVE-2024-4306,0,0,a9d1ef0236802bb22bfceddb930f35a94054088f067df2c4e92b7fc4f2d8e7ec,2024-11-21T09:42:35.350000
|
||||
CVE-2024-43060,0,1,73eb1dcf52b735b517c35ff021b6d8818c553272204a3b88e55db7230853db97,2025-03-06T16:36:34.470000
|
||||
CVE-2024-43061,0,1,5fd1c22654161125f5b35831faedec49b77a0a2e4eba90e72c514d3e47740d08,2025-03-06T16:36:34.470000
|
||||
CVE-2024-43062,0,1,15ec1460cdf056cd63ebe0c0d8881ed0f31442f183fe6dcdb847b814037f0932,2025-03-06T16:36:34.470000
|
||||
CVE-2024-43060,0,0,73eb1dcf52b735b517c35ff021b6d8818c553272204a3b88e55db7230853db97,2025-03-06T16:36:34.470000
|
||||
CVE-2024-43061,0,0,5fd1c22654161125f5b35831faedec49b77a0a2e4eba90e72c514d3e47740d08,2025-03-06T16:36:34.470000
|
||||
CVE-2024-43062,0,0,15ec1460cdf056cd63ebe0c0d8881ed0f31442f183fe6dcdb847b814037f0932,2025-03-06T16:36:34.470000
|
||||
CVE-2024-43063,0,0,8753ed6cced2789acaf67947f81e20495a0bebb4d20a1a7648ba9c44702bfc30,2025-01-10T15:37:33.340000
|
||||
CVE-2024-43064,0,0,3bca3804c5d22727d53d3aebc24210f9425875c9c0a366159e62b07b6f538d51,2025-01-13T21:50:35.483000
|
||||
CVE-2024-4307,0,0,e22b3a2ddde6a1bbbef551e8119df90fb59ea5e219b25194ed74d47d12720593,2024-11-21T09:42:35.467000
|
||||
@ -267813,7 +267813,7 @@ CVE-2024-45191,0,0,85750924302de32758668d824c400f03ec874589b01e5f9cc93263d9b344c
|
||||
CVE-2024-45192,0,0,43a7c431a16c707384aad36a7c459b5416237a7f09d05eece76501eccaa0c165,2024-09-10T19:35:09.943000
|
||||
CVE-2024-45193,0,0,97e23cf5bb2e50a369e95a1523b175851171783613d8e26e1d3a20ce3e5a05bc,2024-09-10T19:35:10.143000
|
||||
CVE-2024-45194,0,0,39e2c5f5618c81787bf696cee2375dcc2cb2276d4de328350b388d7b61cd41b4,2024-11-21T18:15:07.483000
|
||||
CVE-2024-45195,0,0,cf816ffcad66cd1790c759ffe0962c9c7ca15d04497b53b3356b6c253bdba65a,2025-02-05T02:00:01.767000
|
||||
CVE-2024-45195,0,1,3f1d1f45bcc714f5b7670b86f6ee04bcfdda3c27a5b691981d84155f9dd9422a,2025-03-06T19:48:51.880000
|
||||
CVE-2024-4520,0,0,ee81a89389de5b30bb2a69c5a856e44bc0ce84cd6ef34fd29b4c99337e9f4fec,2024-11-21T09:43:01.267000
|
||||
CVE-2024-45200,0,0,816959e7602786604e30587a4aecd68df769826aff5588f51b07d55181578adc,2024-09-30T18:35:06.983000
|
||||
CVE-2024-45201,0,0,1008d923104020063a79ec3ff9863805234d3d78944913eab118b0fc97b0b3b3,2024-11-25T19:15:10.473000
|
||||
@ -268109,7 +268109,7 @@ CVE-2024-4557,0,0,f03788c64b01fc0f9d9c6cb18548e7bc0f50cbdbc649d65a3f2f5d0fd687df
|
||||
CVE-2024-45571,0,0,c7f0d89973a00808e2faef19f5c20c56647cadbd6769b20ffdcbb83a50343c42,2025-02-05T16:01:46.163000
|
||||
CVE-2024-45573,0,0,9a59c58b652198dcc2bdac9416fb5756a5d9c1df6029d3282d02eb5461aa2816,2025-02-05T16:01:49.620000
|
||||
CVE-2024-4558,0,0,3406f02edd918cc96dd602fdb16b4d4e12ad3abf909753504b463aebc8840fcf,2024-12-20T17:18:09.597000
|
||||
CVE-2024-45580,0,1,fa24b0c33eb036de609601c5dd309d71a2ceec7a996e62a5e8ab7732417211d2,2025-03-06T16:36:34.470000
|
||||
CVE-2024-45580,0,0,fa24b0c33eb036de609601c5dd309d71a2ceec7a996e62a5e8ab7732417211d2,2025-03-06T16:36:34.470000
|
||||
CVE-2024-45582,0,0,00793631d633ec24d1a40beef713f9d423a97e799b35bd6ffc13cd157f29be0d,2025-02-05T16:01:56.140000
|
||||
CVE-2024-45584,0,0,f0e0d36031c24782c73f581d2df414b44393105ea3cd6d5d26cfa9e14b2899fe,2025-02-05T16:01:23.100000
|
||||
CVE-2024-45586,0,0,4deeb3aa2260cd51b7800a8653efd1821ed71cf9ac1cbe48f44f9b10b4dcaa22,2024-09-04T12:15:05.320000
|
||||
@ -269908,7 +269908,7 @@ CVE-2024-48037,0,0,c9e6e1de12a38761a91128dd7b7093f8be45ac4420071ee22249f7d6576f3
|
||||
CVE-2024-48038,0,0,f9c82f0773e46b3d6b5d34944d486acf07324058a93dd6789c674bfec9c2db36,2024-10-18T12:52:33.507000
|
||||
CVE-2024-48039,0,0,fd533117e654782f708ec481788be5b0376656cee4e99ab6cab664ba59707d7a,2024-11-13T01:20:55.087000
|
||||
CVE-2024-4804,0,0,6afe17d2ae623338e85ed62e051581e10f28a6be240abfbe7ddd19f86bf90a1f,2025-02-11T18:29:40.827000
|
||||
CVE-2024-48040,0,1,dfb40e0ffd290a97d6508378a0e9073e64670d21880b5173463365700c990412,2025-03-06T18:13:11.800000
|
||||
CVE-2024-48040,0,0,dfb40e0ffd290a97d6508378a0e9073e64670d21880b5173463365700c990412,2025-03-06T18:13:11.800000
|
||||
CVE-2024-48041,0,0,7fe5b2c4c4596c36444d450fb013b750556e7b5655ff838480e8c733fcf350b8,2024-10-15T12:57:46.880000
|
||||
CVE-2024-48042,0,0,4cade6e65f529b89f46c5c3fadfb4d4fb014eea01f57d007e0716bc6213d18e7,2024-10-16T16:38:14.557000
|
||||
CVE-2024-48043,0,0,97dfa512ab1417089c41cc3aef499a1734e595ce60b4fa2176474eeb4a80221a,2024-10-18T12:52:33.507000
|
||||
@ -271031,7 +271031,7 @@ CVE-2024-4983,0,0,b82ab4bc704d323c7d9f24e0a3641c93b0503dba6a5392acd5923000e9eef0
|
||||
CVE-2024-49832,0,0,391e39e7c5b3e995146e5c9a1ef83712ccc04ea31043b019d156c859ce3b56e4,2025-02-05T16:01:09.627000
|
||||
CVE-2024-49833,0,0,329298065bd1bb3d724e94c1deac431743ff5a22858b998a02d9a56030763581,2025-02-05T16:01:01.780000
|
||||
CVE-2024-49834,0,0,b4f95628a52aac961e7bbe4a6f241fc7f4346fc4867395a783a39604f3de43eb,2025-02-05T16:02:02.183000
|
||||
CVE-2024-49836,0,1,e2ad87c073f91597b574a8828b67b09bd65056e714f1bc8ac144e9e32c8723b5,2025-03-06T16:36:34.470000
|
||||
CVE-2024-49836,0,0,e2ad87c073f91597b574a8828b67b09bd65056e714f1bc8ac144e9e32c8723b5,2025-03-06T16:36:34.470000
|
||||
CVE-2024-49837,0,0,44c0adc79a1133ef0cbafd5e3b95fe7c89090e533d5628dee2688fd57953cb25,2025-02-05T16:02:51.587000
|
||||
CVE-2024-49838,0,0,10eea15eb9bc1e1b66fb4d58e05a766814d469a560b08490c060ef06fde08f69,2025-02-05T16:02:40.720000
|
||||
CVE-2024-49839,0,0,e4adae2e6a6fd99d4a1ef07f5bb8c358f7fb67c7e6ba84888990afb4dab67568,2025-02-05T16:02:33.117000
|
||||
@ -271341,7 +271341,7 @@ CVE-2024-50127,0,0,14e691dcff3be7b44a2e862c8be6dd3b7fb8e12b2bfeba5e6287ff367c903
|
||||
CVE-2024-50128,0,0,5a6e47cd9b5d69a2eea013f8788e8d5c29dc7ba908f82d447bdc15b8e487da34,2024-11-08T19:39:38.027000
|
||||
CVE-2024-50129,0,0,4afc9b05928cde60da6fd42289df21085616ed6772331b233c0f07a2117e1699,2024-11-07T21:49:14.723000
|
||||
CVE-2024-5013,0,0,e1e7f2f15abd8b5ddce78bb3bfd5b29ef2a6e608e2ff5c6e5a25699ed1c42a03,2024-11-21T09:46:46.933000
|
||||
CVE-2024-50130,0,1,867ecc421755f7acb8f90988d6ccc46c36f7f28a62c306f6761fb741eb230c58,2025-03-06T17:15:18.953000
|
||||
CVE-2024-50130,0,0,867ecc421755f7acb8f90988d6ccc46c36f7f28a62c306f6761fb741eb230c58,2025-03-06T17:15:18.953000
|
||||
CVE-2024-50131,0,0,4b8634159d9971aa4f0325d50bab72d0427a17886a1825f5db2c04b9486f25d1,2024-11-08T16:15:47.497000
|
||||
CVE-2024-50132,0,0,4b1fa138e51daf4ff55e3f4defb4236c0e429e261e7e7b7431dbd58c7ea1da8d,2024-11-07T21:32:37.433000
|
||||
CVE-2024-50133,0,0,13c1cd7465b48aa25814a39632f462a103df89235e5513a5a7e914dc44df913d,2024-11-07T21:17:35.673000
|
||||
@ -271363,7 +271363,7 @@ CVE-2024-50147,0,0,b3b71bdc694c103dbc53ae8dd319728eabf98a5d7ef19dbedccdab8d20522
|
||||
CVE-2024-50148,0,0,29eee073fa03f15b890aa5c0bce0077794c99acb699f53407212567151a1a25f,2024-11-18T21:24:05.020000
|
||||
CVE-2024-50149,0,0,c787490f93b85be8fc6ccda6ac0403d02734503c1dbcd49a6038dc27a90e3da9,2024-12-11T15:15:13.170000
|
||||
CVE-2024-5015,0,0,9218c0d4680ce7feac4e690eef9de38e90fbacbd010584a684598c56ec66e8b1,2024-11-21T09:46:47.193000
|
||||
CVE-2024-50150,0,1,c614755499802c490e0967d91adbf3882b59c12152f29569662f92ce37a75d09,2025-03-06T17:15:19.133000
|
||||
CVE-2024-50150,0,0,c614755499802c490e0967d91adbf3882b59c12152f29569662f92ce37a75d09,2025-03-06T17:15:19.133000
|
||||
CVE-2024-50151,0,0,62ad275354c7f8426638d9d3cf6ac2c18d4f6587fc81c2e836120fca0d5f264a,2024-11-22T17:30:55.633000
|
||||
CVE-2024-50152,0,0,ce260ef40b16562745980e81801229188ab0549d552df6e6dfd81c947dab4664,2024-11-19T02:16:17.787000
|
||||
CVE-2024-50153,0,0,4390df0987d50d0c03cb92674634c76add54a8ab8f3c4746ec3bb9e53e9c8704,2024-11-13T15:23:49.717000
|
||||
@ -271507,10 +271507,10 @@ CVE-2024-5028,0,0,dd1dfc08c8c4ad0249eff6068a8953d40d7e70c3ce4697c65d3cb70a1f48c4
|
||||
CVE-2024-50280,0,0,b6a13b4a1bf730cfee2fa214d3a5f3f7f9268a884bdb652dd0a2e1369ec157e6,2024-12-11T15:15:14.733000
|
||||
CVE-2024-50281,0,0,9089d0de95391a0377f6af8be3fbc8b5c88017f220930e10bade7b480247946e,2024-11-21T19:27:19.097000
|
||||
CVE-2024-50282,0,0,a18aaa4d9c56a7b792aa668609a3693693842b73f1319cca3f63e3a5b5584f28,2025-02-18T16:15:17.927000
|
||||
CVE-2024-50283,0,1,f4898d4d5ef8e3025a7388e60aebfcef54608ef3b201be10bb8572c893d7d72a,2025-03-06T17:15:19.347000
|
||||
CVE-2024-50283,0,0,f4898d4d5ef8e3025a7388e60aebfcef54608ef3b201be10bb8572c893d7d72a,2025-03-06T17:15:19.347000
|
||||
CVE-2024-50284,0,0,0dd2f3e0d578dbadc046954dcf53364b51273841493d336e73c7cec144ecffef,2024-11-27T16:20:08.917000
|
||||
CVE-2024-50285,0,0,57dd7110572199115d76d8b0594b83deda57634c8161b67a640ec65820d64279,2024-11-27T15:31:58.063000
|
||||
CVE-2024-50286,0,1,5618c077e6152816a4221f2d5f5b9427749abb7e34e3ade2f03b1805e0717cc1,2025-03-06T17:15:19.563000
|
||||
CVE-2024-50286,0,0,5618c077e6152816a4221f2d5f5b9427749abb7e34e3ade2f03b1805e0717cc1,2025-03-06T17:15:19.563000
|
||||
CVE-2024-50287,0,0,038cac0a3eba1e418017a1bff5b13ba3a2ab69d5204a1dae8a6971bef21ae4b7,2024-11-21T21:11:54.510000
|
||||
CVE-2024-50288,0,0,6e2039ce756a6b1a292181b98f184f82f5cbcaecd4e1ac460ee0f3a4ece05c7c,2024-11-27T15:32:45.147000
|
||||
CVE-2024-50289,0,0,cbe890f5c9d4c6f76920eb8ce53083b1779519960db0d61cf86dba6e738923f2,2024-11-19T21:57:32.967000
|
||||
@ -271824,6 +271824,7 @@ CVE-2024-50592,0,0,a6b9e87fd57064f6dc9dbf642c75d666df5f937f6f995d9c771d2dd40fe0c
|
||||
CVE-2024-50593,0,0,85285fd934fce7a07a482d466bb0f9d6271f8e35c821e6b9c439d056b38052fe,2024-11-08T19:01:03.880000
|
||||
CVE-2024-50599,0,0,99b41d9153a383085a781f702eda5c5b6c0a4c09361c5d793d58b32c7c8c4b07,2024-11-08T19:01:03.880000
|
||||
CVE-2024-5060,0,0,774ede4fef00eaff2622d378b43e47e362f56e93e6a9ac286796581c1618e627,2024-11-21T09:46:52.847000
|
||||
CVE-2024-50600,1,1,57862be166b5927f92dbf71c7c467534c7341eebf3c63252e3212f6e509437ca,2025-03-06T19:15:26.750000
|
||||
CVE-2024-50601,0,0,f1ed1f41be3342c5f62bc0e6c95ce90f7003505883e3692b4481b9f4c5037234,2024-11-12T16:35:22.810000
|
||||
CVE-2024-50602,0,0,4b4971c64777a836fd26303daa5582edc7318e926eac34f5212c388d763a3479,2024-10-30T18:35:16.237000
|
||||
CVE-2024-50603,0,0,24fb0be84e47828c5797e34e5928a6606de2ff4bc3a8f0552606a200fb006b94,2025-01-23T20:44:04.367000
|
||||
@ -272222,7 +272223,7 @@ CVE-2024-5147,0,0,8fbafca2fdd8f848d9909cb6aba93924ff1b404381295f27635bce00c52eaa
|
||||
CVE-2024-51470,0,0,e89d5ef183a7d29ac11af41a2499db74df261ac8afb07d8bd5315410d8114abd,2024-12-18T20:15:23.233000
|
||||
CVE-2024-51471,0,0,124b7b8875d261820d9fc9a3eefcc2e273bec0e6de9ec2bd5f9981a02008418a,2024-12-19T18:15:23.153000
|
||||
CVE-2024-51472,0,0,f3c11cd77c7846a44169144fd921c2c0e0db8174944eee5fd716f8b0395e6de7,2025-01-06T17:15:38.517000
|
||||
CVE-2024-51476,1,1,38ce9c6359aee1035e09906170ed0e5c54174e877be664b5033f8187be6372ff,2025-03-06T17:15:19.763000
|
||||
CVE-2024-51476,0,0,38ce9c6359aee1035e09906170ed0e5c54174e877be664b5033f8187be6372ff,2025-03-06T17:15:19.763000
|
||||
CVE-2024-51478,0,0,f0595ed35f1f283d907e9d623fdb50e27981165a57dcab6e98c75f63ec12b3b4,2024-11-01T12:57:03.417000
|
||||
CVE-2024-51479,0,0,cb129c5fa9252110468d8449b172cda17bf48af7dcff3fe804fa3e07241cca0d,2024-12-17T19:15:06.697000
|
||||
CVE-2024-5148,0,0,f40c04de71d66c8857441b50b10a14db507d29d1691198e2bceac6bdc772cfd5,2024-09-03T12:59:02.453000
|
||||
@ -273334,8 +273335,8 @@ CVE-2024-5292,0,0,1452aec2e6f1e5f02e53c45b3ee750a7e5d33f92b8e7382e2bc21f3b08b3e5
|
||||
CVE-2024-52920,0,0,d51c19b029322a73c74b6821f9cbcbea373837a9a5ff27d72ff8adc9e86cc1bc,2024-11-18T17:11:17.393000
|
||||
CVE-2024-52921,0,0,25b2bda62d23ac11ec224824331b7110da2b691d46f1f7381cfaabb403afcc15,2024-11-18T17:11:17.393000
|
||||
CVE-2024-52922,0,0,6a8e09d1bf0adb255aa582ae6b8ef0e4e406447b917ba92ca194beb3eadfb929,2024-11-18T17:35:09.720000
|
||||
CVE-2024-52923,1,1,19635c127148f2f5585537a1b159c866b6c63f244ac62def1347dce2496757b3,2025-03-06T18:15:41.160000
|
||||
CVE-2024-52924,1,1,2ee33df823a805b8cfcc43621d2727535e520e4b1b88d5691a0601715e6c1c58,2025-03-06T18:15:41.320000
|
||||
CVE-2024-52923,0,0,19635c127148f2f5585537a1b159c866b6c63f244ac62def1347dce2496757b3,2025-03-06T18:15:41.160000
|
||||
CVE-2024-52924,0,0,2ee33df823a805b8cfcc43621d2727535e520e4b1b88d5691a0601715e6c1c58,2025-03-06T18:15:41.320000
|
||||
CVE-2024-52925,0,0,94495667e9e08fa1d0d119d4faf0b9b5f1ca27514fe32d58631c29811775f341,2025-02-26T15:15:23.867000
|
||||
CVE-2024-52926,0,0,5021ba3f217b734483a326034e850572aad7fe69e34251b753d7998240a26e61,2024-12-24T19:15:06.940000
|
||||
CVE-2024-5293,0,0,f489071fddfba63fc047e3d21a5cfec46b34b73b22b63f08d456cdba6a84add5,2024-11-21T09:47:22.487000
|
||||
@ -273400,13 +273401,13 @@ CVE-2024-53008,0,0,36a5b7477386f9a2d6dcbfd20d0c70ef83d1d8823020ec6fd4bce69664128
|
||||
CVE-2024-5301,0,0,9944435231e4232deb9644b6756c62dd37aded32278d6910acfd86a9fca6bba1,2024-11-21T09:47:23.327000
|
||||
CVE-2024-53011,0,0,6541fabf7a5e7d0669e1f4c44e5c4716c7ec9d8cf2120ac219f149b9e79ccc2a,2025-03-03T13:15:10.853000
|
||||
CVE-2024-53012,0,0,f829f2be2897b05770fba117015cdc095129f5aca857f32e3d3e206b67416909,2025-03-03T11:15:13.280000
|
||||
CVE-2024-53014,0,1,9c1edb228a5b8cc996160851a8b343e3ab0752f1faf2a9a0b97b21596a7476c1,2025-03-06T17:52:55.370000
|
||||
CVE-2024-53014,0,0,9c1edb228a5b8cc996160851a8b343e3ab0752f1faf2a9a0b97b21596a7476c1,2025-03-06T17:52:55.370000
|
||||
CVE-2024-5302,0,0,82745a56882a5e93127da6843cc252c1f39f5e3b6031b0cf4b30203e7450051c,2024-11-21T09:47:23.453000
|
||||
CVE-2024-53022,0,1,bf37234b3029621977db8a6eb910eaacbdefe222a51ee4b1dd0e6bc99734b38b,2025-03-06T17:52:55.370000
|
||||
CVE-2024-53022,0,0,bf37234b3029621977db8a6eb910eaacbdefe222a51ee4b1dd0e6bc99734b38b,2025-03-06T17:52:55.370000
|
||||
CVE-2024-53023,0,0,612b784a0b4449dafe1a79ca5c35a38d27ba32c15da36d51b12329ef573d438f,2025-03-03T11:15:13.777000
|
||||
CVE-2024-53024,0,1,dee384a56a392bb5c68af003e0565435d517937d0c855508efc39ab47a26479c,2025-03-06T17:52:41.783000
|
||||
CVE-2024-53025,0,1,16c1f10a9e32146258f0298653aa7c8d9aa99a8093c702b0136a087cb12cc311,2025-03-06T17:52:41.783000
|
||||
CVE-2024-53027,0,1,7e26db2b11e78988a639ecdb6205eabd88644f64d5e4e6ee02565356b8b93b25,2025-03-06T17:52:41.783000
|
||||
CVE-2024-53024,0,0,dee384a56a392bb5c68af003e0565435d517937d0c855508efc39ab47a26479c,2025-03-06T17:52:41.783000
|
||||
CVE-2024-53025,0,0,16c1f10a9e32146258f0298653aa7c8d9aa99a8093c702b0136a087cb12cc311,2025-03-06T17:52:41.783000
|
||||
CVE-2024-53027,0,0,7e26db2b11e78988a639ecdb6205eabd88644f64d5e4e6ee02565356b8b93b25,2025-03-06T17:52:41.783000
|
||||
CVE-2024-53028,0,0,1adb2bc3a9fffb0f3270ec1a52d1282da84ff633e0579fcb5f081c5602eab4bf,2025-03-03T11:15:14.460000
|
||||
CVE-2024-53029,0,0,6b15739cda1fd16dc50d37e7b0bac1f5ddb8ebcde19352cac213a642e632c56b,2025-03-03T11:15:14.617000
|
||||
CVE-2024-5303,0,0,3ed489db17064b2aff86e9a31b51d53d757813a529fdb6ed7379a772174cd7ec,2024-11-21T09:47:23.590000
|
||||
@ -273445,7 +273446,7 @@ CVE-2024-53064,0,0,49b7807eb411df809f5f195d068c447b8770736f74653af5c13ce45d1d5ba
|
||||
CVE-2024-53065,0,0,c5c6de1dc34956135702b6505991c2e7ff92bc704a59b87713633a300daa61a4,2024-11-25T21:04:38.343000
|
||||
CVE-2024-53066,0,0,0c86d7ce5fb53df5464e6f073cc19a2aa67ae25292a1f6583a1478ef90016ea3,2024-11-25T21:03:09.620000
|
||||
CVE-2024-53067,0,0,d8942bf1aa909e21d0b48cd870079e0183034b36b3a36833f5334c885e8856cb,2024-11-25T21:00:06.237000
|
||||
CVE-2024-53068,0,1,d5cdc1fd5d7fb0c7952a4dc84ce274e8dc2accbd15fa1ffb9e28901e55263200,2025-03-06T17:15:19.957000
|
||||
CVE-2024-53068,0,0,d5cdc1fd5d7fb0c7952a4dc84ce274e8dc2accbd15fa1ffb9e28901e55263200,2025-03-06T17:15:19.957000
|
||||
CVE-2024-53069,0,0,2f8d2bb328ae06bfbd9a5aaf3e45bed4d90c0f43106ef8f4e009f680b4cec49c,2024-11-22T22:26:20.310000
|
||||
CVE-2024-5307,0,0,5865308c4abde936d7b931374475ba3a6f8b899b5f443fa0d8a4411dbf222652,2024-11-21T09:47:24.087000
|
||||
CVE-2024-53070,0,0,6d00bd640e3dc3b5147d89af6cc648368bd0287a01dd8943781ce8ead40fb1de,2024-11-25T20:53:55.200000
|
||||
@ -273570,7 +273571,7 @@ CVE-2024-53179,0,0,10b7cbbae319b5ce0332616aac783eb28b0511713459dbbe639dd971af2be
|
||||
CVE-2024-5318,0,0,87e97b53a33051fc1fa3c078212ad6afb68bf37151bd321e62e233d7b2989703,2024-12-13T17:04:31.133000
|
||||
CVE-2024-53180,0,0,dbcd148eb4ee7c09b8edc88493ea339c7cb556753e766db6e76ec0f2696918d2,2025-01-16T16:44:59.437000
|
||||
CVE-2024-53181,0,0,75b064e17895b9f277789ad64fcd6ed5a3980c88dfbac5e82d8241bbd1116758,2024-12-27T14:15:25.530000
|
||||
CVE-2024-53182,0,1,0d5ee53895fb547dfa0d8f8cfcc2b23e2c938a4528ed98426f8f9dd397c17bf8,2025-03-06T17:15:20.157000
|
||||
CVE-2024-53182,0,0,0d5ee53895fb547dfa0d8f8cfcc2b23e2c938a4528ed98426f8f9dd397c17bf8,2025-03-06T17:15:20.157000
|
||||
CVE-2024-53183,0,0,654d7facdcdf21d8448703d0aca76dbb4f82fcf4dcd5a0bcb5fcec43860cb2c1,2024-12-27T14:15:25.743000
|
||||
CVE-2024-53184,0,0,2a27b94391b5bbab80d359ad179ae46b2fc322eea3533f3c18f42b154d4e7c8c,2024-12-27T14:15:25.853000
|
||||
CVE-2024-53185,0,0,7946a8c98e0b3bfe8696da8f83553787644c42dde2be9ce431db8174b7e07a89,2025-02-10T18:15:28.080000
|
||||
@ -273596,7 +273597,7 @@ CVE-2024-53204,0,0,253a86a67cc86d83f5b45b7081fcaef8f54aea697a0bb5732c9f1f31c626c
|
||||
CVE-2024-53205,0,0,aad40af383a0fae2dfd165489485b38af4279f086ab2ffc2acc584ef6f7715e5,2025-01-14T15:51:28.677000
|
||||
CVE-2024-53206,0,0,2f6a2fc7adb42267dc8ee97a338aa8c24c6fa9462fbe1480b8392e4aae94186c,2025-02-11T16:15:41.840000
|
||||
CVE-2024-53207,0,0,eb965d61db6125837dce0de6ef3af14c44ea9331488a35d8508a0d1b2053b009,2025-01-08T21:26:42.470000
|
||||
CVE-2024-53208,0,1,86c96edbd92ca06a52f16f5b9645a95fa806a309a3f4ff9028c19f867167bdda,2025-03-06T17:15:20.330000
|
||||
CVE-2024-53208,0,0,86c96edbd92ca06a52f16f5b9645a95fa806a309a3f4ff9028c19f867167bdda,2025-03-06T17:15:20.330000
|
||||
CVE-2024-53209,0,0,fbdb0aa91991e41bb2553cc9ad5cfedb1ff21c2c3efb53602bcaf5363e2b2b68,2025-03-06T12:42:52.363000
|
||||
CVE-2024-5321,0,0,0f218b8b6fcc3fc0b4ccef7040ede5ee801dc8e00258e6450bd3f123b6e73ca4,2024-11-21T09:47:25.283000
|
||||
CVE-2024-53210,0,0,edb6f6743b39b3d9aaae84e10ec98f8816051f339f526267a629d8a9b382a055,2025-01-14T15:50:32.413000
|
||||
@ -273635,8 +273636,8 @@ CVE-2024-53240,0,0,9b22f872478d25b1b8d5510910ebb2d032d63f29cc9ff7aa44552f79bec6d
|
||||
CVE-2024-53241,0,0,a7e121cbe6737ad10ede045c0fde5c0fb585d55680124447ad43e1c369544bc7,2025-01-05T07:15:05.377000
|
||||
CVE-2024-53242,0,0,951ddb4b6f620a267d348f005ad18e193ee858461e708335d3d7b94c2b54cee0,2024-12-10T14:30:46.700000
|
||||
CVE-2024-53243,0,0,0055f373ee76668c96d6bfcf8a6f00835a4bd98d186934410e0656653ee7c808,2024-12-10T18:15:41.093000
|
||||
CVE-2024-53244,0,0,314d52ddee68b7d194db67c48301dcf21a10bd6aaea8b99e26bb6f18d015b1d7,2024-12-10T18:15:41.243000
|
||||
CVE-2024-53245,0,0,04861bf86b12606e48c43727b40f901f810eef8f23a378e1dae51ade99580152,2024-12-10T18:15:41.397000
|
||||
CVE-2024-53244,0,1,8ab64fc6c408ab75c7fcd2976b2f913eac512d7587dc319e310d3559937ce101,2025-03-06T19:54:57.093000
|
||||
CVE-2024-53245,0,1,3240ff05e80470ad0909b77b8789a110c0339586cd0134fd740f67ea1b43e760,2025-03-06T19:54:57.093000
|
||||
CVE-2024-53246,0,0,f508ff57ce46569426027f607ebd345d92cd707d202551709cada6e889f553d4,2024-12-10T18:15:41.553000
|
||||
CVE-2024-53247,0,0,bc83b9af87256557839cb9887ebc94d8027f3118f62d49387889799a0e85c9ce,2025-01-02T18:15:19.887000
|
||||
CVE-2024-5325,0,0,6fb157711d80f391f873772a3be62fe029a107c4c82e0f59ae798d9b15b764bd,2024-11-21T09:47:25.650000
|
||||
@ -273934,7 +273935,7 @@ CVE-2024-53792,0,0,5c82eb1f8b13dd05491c87a39aa89e01a0904fb242c154724f0f2e5004b03
|
||||
CVE-2024-53793,0,0,471f5b61daba42899f2865d9a43fe8571b3439d86d8853c40ee71d386cc47473,2024-12-02T14:15:19.587000
|
||||
CVE-2024-53794,0,0,53bdcd0c14706998c2cd9f47910539712a3615202fb4dcbd0f944b33344d1233,2024-12-06T14:15:21.567000
|
||||
CVE-2024-53795,0,0,8e9aa46546fe812a37b65a86378b2e704aee7666a07357d4b384515d03e6e3e4,2024-12-06T14:15:21.737000
|
||||
CVE-2024-53796,0,0,dc37acfd7b14eaf06f2627eb51d3eec4a0afeb13b808c5b64e19c6004d08d179,2024-12-06T14:15:21.910000
|
||||
CVE-2024-53796,0,1,9f56ca7a5c2ba32ff078c63cb92c6d96327d05c9d35a1692d7885a60d6730c23,2025-03-06T19:54:57.093000
|
||||
CVE-2024-53797,0,0,c99581830dd5815cdb774d1a45262b406e0bdfd06505198e25487f6e7b67fa93,2025-01-31T16:49:57.640000
|
||||
CVE-2024-53798,0,0,dd15d9db7be990295567f0511fa2c3e51a57e6a70e8f9db78d34a77a51f00ebd,2024-12-09T13:15:40.930000
|
||||
CVE-2024-53799,0,0,783da60a33ccbce78617be33a3c476d287119720767ee98d4405ce9d100a841c,2024-12-06T14:15:22.170000
|
||||
@ -274294,7 +274295,7 @@ CVE-2024-5425,0,0,39c2f07d9a14a501f6a62a9467f6ca87f9b63c1b18438a7bf6cb3ddf24a3b1
|
||||
CVE-2024-54250,0,0,78fcb3858ab7f1ef9ede3fceef4a3cbbe59fbca2a29716c28266988c0c4ca3d3,2024-12-13T15:15:29.540000
|
||||
CVE-2024-54251,0,0,88555ba4b3a32f180346f6738dcf0b83adaa6db6974925f721d191bb83a4f8fd,2024-12-09T13:15:43.587000
|
||||
CVE-2024-54252,0,0,f04dfc232b58df9591cdf5dc556515d1b2f2c382cae7d60ee98f9367ae076e90,2024-12-13T15:15:29.667000
|
||||
CVE-2024-54253,0,0,3e7f14d57faa9aa8a35c642a9452a28b4636dd0d4a1cba0850dcbd3450d69653,2024-12-09T13:15:43.720000
|
||||
CVE-2024-54253,0,1,934df548cc26062f8c4112a756edeb63a67162278240274e91b44063b96d49b2,2025-03-06T19:54:57.093000
|
||||
CVE-2024-54254,0,0,04373a59529aaae92a87c4a192571d7f42eb990ce554ec6c5442265fabd555f6,2024-12-09T13:15:43.860000
|
||||
CVE-2024-54255,0,0,9be77e20322099703040d9eab39da1153fb30df746e4acd9c4440dfc860382ad,2024-12-09T13:15:44.007000
|
||||
CVE-2024-54256,0,0,959cab9c20f6ef96b9651c688cb051269d85907fa2c27eade17b46674c690c1f,2024-12-13T15:15:29.800000
|
||||
@ -275170,7 +275171,7 @@ CVE-2024-56145,0,0,1bf04321f372be6a391b26e37787c9310c18edadc786028f82c542bd3efa0
|
||||
CVE-2024-5615,0,0,37856ff1a2df0ee42bdd2faed17aef170393a5807410ba1a41f1c8e8ad65ffc3,2024-11-21T09:48:01.413000
|
||||
CVE-2024-56159,0,0,d6437f8167288212b0feaa31ad952f4a47211de648a6e462a65c30d1453de687,2024-12-20T21:15:09.940000
|
||||
CVE-2024-5616,0,0,423edee4a921052dcb3d8ded851b7450a0c7bfa0bf926ae022e11e86747b1818,2024-11-21T09:48:01.540000
|
||||
CVE-2024-56161,0,0,cd0de4438b5b4aaa67a57689c54fc4182cd270be65158ff9fc5864c87b196fde,2025-03-06T06:15:36.640000
|
||||
CVE-2024-56161,0,1,74b9e0f4da77c5661e3a9b8f6f148609867e6a20dd72c293a01b3c60c27da44c,2025-03-06T19:15:26.840000
|
||||
CVE-2024-56169,0,0,567a94aa793aa7d8ac0858cf8e15bf66684dbd548103356ddbc53b2c4594c82e,2025-02-10T23:15:15.203000
|
||||
CVE-2024-56170,0,0,32611264582c3e86fc6149b20f12d5acbffe58d1028228c5f9baa4ad2faec8d4,2024-12-26T19:15:08.283000
|
||||
CVE-2024-56171,0,0,8cc43a9d9ba32f16f963a5c9359e85704bcc5f8cac2b879034099a3ffd3643fe,2025-02-18T23:15:09.413000
|
||||
@ -275212,7 +275213,7 @@ CVE-2024-56221,0,0,fdf47273b779d54b522059e7a09503abe8e1e1a786ba390437404d5e71d1c
|
||||
CVE-2024-56222,0,0,8810dd9c4275622264198a551b3e10116409c38a6d308f62b5625200c1c0ed67,2024-12-31T10:15:10.583000
|
||||
CVE-2024-56223,0,0,cf7b20f3d20067df73affdcf9ec9590890a2805e825d483671787f5cda604665,2024-12-31T11:15:08.090000
|
||||
CVE-2024-56224,0,0,c33122241f6fdaccb34e9d12df45ea9fac34e8317b626d4fa6f4c067498b02a2,2024-12-31T11:15:08.240000
|
||||
CVE-2024-56225,0,0,066c339b92e3febc5eed0d76ae063fefa0d49cc02f3f7ddfb250078be37a05ad,2024-12-31T11:15:08.380000
|
||||
CVE-2024-56225,0,1,eae3aef797232b3b73a3d6f99d8fc026550db6704e5d9b7b4ec7184e2104cf2f,2025-03-06T19:02:47.083000
|
||||
CVE-2024-56226,0,0,be0cff3d76ccab7393103003fcbb33465bd822472c65e7087b1b885c2004c952,2024-12-31T11:15:08.527000
|
||||
CVE-2024-56227,0,0,04288e9fe2a6c2ced8521fb46ff45aff570f37c311884cc4a84d7592bf6ea025,2024-12-31T11:15:08.670000
|
||||
CVE-2024-56228,0,0,2340e357d84ddd1c8be1bb37a5630061a8f59b945e2b529ff168994ed8fa3747,2024-12-31T11:15:08.817000
|
||||
@ -275456,7 +275457,7 @@ CVE-2024-56548,0,0,0c74a7d90e7eef20610734f63deefd7089991371ee9a9bdcec249a4eb0b73
|
||||
CVE-2024-56549,0,0,f06d0249fff07a351b0adb594ef910674acea63172f8ea331235c7c1107d08ec,2025-02-21T14:15:50.947000
|
||||
CVE-2024-5655,0,0,0fa4e3b504ccc8e08941dc807198e5a29b07306b6e1d02090b484b1570bb08fd,2024-11-21T09:48:06.140000
|
||||
CVE-2024-56550,0,0,04d74517c386c38c5a8c7b0e1144163e0e9e19fcfd004bb9db0bb6bb64a064cf,2024-12-27T15:15:13.737000
|
||||
CVE-2024-56551,0,1,d1f20def6278634dae6e074c624470264118e96aaf74555b9b48cbbe6905534c,2025-03-06T17:15:20.590000
|
||||
CVE-2024-56551,0,0,d1f20def6278634dae6e074c624470264118e96aaf74555b9b48cbbe6905534c,2025-03-06T17:15:20.590000
|
||||
CVE-2024-56552,0,0,a3c48da8b466f06a1443e801f2355b958e7309a0c2bd86f0bd0c1f10746499ed,2024-12-27T15:15:13.970000
|
||||
CVE-2024-56553,0,0,d73f092fa407a2c4632c4de0d4d2babdb741c99293b819a91977b3209c030fb6,2025-01-15T18:35:51.337000
|
||||
CVE-2024-56554,0,0,4950d099528e83b14a4e664e675a49b2cb0f0bca70f7a35876c65aeedeef4938,2025-02-10T18:15:30.680000
|
||||
@ -275573,7 +275574,7 @@ CVE-2024-56654,0,0,9e61aaa697592ea74d94ab060d486564b3c917c417bf5745395edd40f490b
|
||||
CVE-2024-56655,0,0,15370a8c8802791631374c1b398d205e6228e13f4d3acf29761181b2fe76f053,2025-01-06T19:39:02.183000
|
||||
CVE-2024-56656,0,0,c45608fb96c1d9d3ec6fdafc60038556053690b8422a06c9b78c70da4adc48cc,2025-01-06T19:27:40.187000
|
||||
CVE-2024-56657,0,0,24b7a2608e29205998c248ed91c6d0279f60b2603ab2a2945b2346a131e1b818,2025-01-06T19:28:49.760000
|
||||
CVE-2024-56658,0,1,d0e4e2b9c31e906ba20770ff150734c04340f4fd2623d09971e8f8ac49651053,2025-03-06T17:15:20.783000
|
||||
CVE-2024-56658,0,0,d0e4e2b9c31e906ba20770ff150734c04340f4fd2623d09971e8f8ac49651053,2025-03-06T17:15:20.783000
|
||||
CVE-2024-56659,0,0,5af48fbfd500475e97f794efbfd7019c9d1e6ea37e201e41e887360f28ef3a74,2025-01-06T19:30:32.403000
|
||||
CVE-2024-5666,0,0,8139975e898ee1091802fa011bf50726a9ce2f054b4cff2fd9267df5d7986a48,2024-11-21T09:48:07.360000
|
||||
CVE-2024-56660,0,0,cfed4a787333c42a3454657a06f0d3b7a6226ccb05b4cc27e3c9f4d563a87d98,2025-01-06T18:43:45.897000
|
||||
@ -276402,18 +276403,18 @@ CVE-2024-58072,0,0,24d89844d6f1493212431ad264fcbbbb1973872706eac6c214cfaf903e3d1
|
||||
CVE-2024-58073,0,0,109fadd3201cf47ca89f9a569fc60b9a69b2ee83d751aa8631e712ab45aeb7f0,2025-03-06T16:15:53.833000
|
||||
CVE-2024-58074,0,0,883e6ff7932d7cffafc87fdaad452ce3afa9cc5ba5a81459b9802774df1ecc0c,2025-03-06T16:15:53.943000
|
||||
CVE-2024-58075,0,0,a06e38c607e2bc80efcf58b48a2e1ae65450ec85e29b0d8b484a5f78766e8877,2025-03-06T16:15:54.040000
|
||||
CVE-2024-58076,1,1,7085da638c21ca57990fd7c37bd4707567fcadc2cee7aa8033606eff4d8d979a,2025-03-06T17:15:20.997000
|
||||
CVE-2024-58077,1,1,98f4ab5e1f94781a6de11323b83c21351e0d2042ab3e0bbabbc98a9c21201fac,2025-03-06T17:15:21.123000
|
||||
CVE-2024-58078,1,1,f56d136ab34ab9a5d07b8e02a923dee03d8b53e371c69bec309ed43ea32faa2e,2025-03-06T17:15:21.250000
|
||||
CVE-2024-58079,1,1,579d9d645c94a89400ca687a17c00a8eeebf4813296e5c52f584eb6e27eeb15c,2025-03-06T17:15:21.360000
|
||||
CVE-2024-58076,0,0,7085da638c21ca57990fd7c37bd4707567fcadc2cee7aa8033606eff4d8d979a,2025-03-06T17:15:20.997000
|
||||
CVE-2024-58077,0,0,98f4ab5e1f94781a6de11323b83c21351e0d2042ab3e0bbabbc98a9c21201fac,2025-03-06T17:15:21.123000
|
||||
CVE-2024-58078,0,0,f56d136ab34ab9a5d07b8e02a923dee03d8b53e371c69bec309ed43ea32faa2e,2025-03-06T17:15:21.250000
|
||||
CVE-2024-58079,0,0,579d9d645c94a89400ca687a17c00a8eeebf4813296e5c52f584eb6e27eeb15c,2025-03-06T17:15:21.360000
|
||||
CVE-2024-5808,0,0,8544bff4c0ab9040235b040d590c0013468843f3e678f1770e3c92d0e5bbd73b,2024-11-21T09:48:22.213000
|
||||
CVE-2024-58080,1,1,e0e7489b58abb5b7e54d34d0b4dd4274b92c6df50b99fb34b4758a6a68d90d60,2025-03-06T17:15:21.473000
|
||||
CVE-2024-58081,1,1,80dd2b309c1430de6d6e28a7ef0ef223d643d27fd579373dc5640d3f3d6fad7a,2025-03-06T17:15:21.577000
|
||||
CVE-2024-58082,1,1,499452ad0355aa6c904b9df7b6880d14ce8265474f0b29ab42bb87143a85ba14,2025-03-06T17:15:21.677000
|
||||
CVE-2024-58083,1,1,bd7cfb950a2c169e6423eab96cbba45b1cde4a4295ee7100f509f98188eaf827,2025-03-06T17:15:21.773000
|
||||
CVE-2024-58084,1,1,a41bf7a6804b945971730ab63f6618961e5bea4f9ad3567be6339142dc5c7265,2025-03-06T17:15:21.890000
|
||||
CVE-2024-58085,1,1,47b3e6ef1fbef3749b81ec4e1f9f1f251d5e9c39cca48b3d54a6db21ff814257,2025-03-06T17:15:21.993000
|
||||
CVE-2024-58086,1,1,31e9af0e84acc2b9ad39f5b34fbb6206a8e2c6a4b156a4c24852e0249fb9ac4c,2025-03-06T17:15:22.117000
|
||||
CVE-2024-58080,0,0,e0e7489b58abb5b7e54d34d0b4dd4274b92c6df50b99fb34b4758a6a68d90d60,2025-03-06T17:15:21.473000
|
||||
CVE-2024-58081,0,0,80dd2b309c1430de6d6e28a7ef0ef223d643d27fd579373dc5640d3f3d6fad7a,2025-03-06T17:15:21.577000
|
||||
CVE-2024-58082,0,0,499452ad0355aa6c904b9df7b6880d14ce8265474f0b29ab42bb87143a85ba14,2025-03-06T17:15:21.677000
|
||||
CVE-2024-58083,0,0,bd7cfb950a2c169e6423eab96cbba45b1cde4a4295ee7100f509f98188eaf827,2025-03-06T17:15:21.773000
|
||||
CVE-2024-58084,0,0,a41bf7a6804b945971730ab63f6618961e5bea4f9ad3567be6339142dc5c7265,2025-03-06T17:15:21.890000
|
||||
CVE-2024-58085,0,0,47b3e6ef1fbef3749b81ec4e1f9f1f251d5e9c39cca48b3d54a6db21ff814257,2025-03-06T17:15:21.993000
|
||||
CVE-2024-58086,0,0,31e9af0e84acc2b9ad39f5b34fbb6206a8e2c6a4b156a4c24852e0249fb9ac4c,2025-03-06T17:15:22.117000
|
||||
CVE-2024-5809,0,0,d3a3cb96d02b3d9c2efd17f0531d777c80fde692d386c7f6a56c47f2ca5601d8,2024-11-21T09:48:22.387000
|
||||
CVE-2024-5810,0,0,1cfa1d347c98633461d8a7b5c70e7a88c8da42418f63ef991acf03eb3681102e,2024-11-21T09:48:22.557000
|
||||
CVE-2024-5811,0,0,0c5a0ebde16bcb77e73a53dccf7ebf134980e586a889ff63137b1e7e940a0edc,2024-11-21T09:48:22.670000
|
||||
@ -278745,7 +278746,7 @@ CVE-2024-8420,0,0,e5b34eba9759f64190d5368c0038dd88344afb756085f618381e7952d1be6f
|
||||
CVE-2024-8421,0,0,6800675b8d580f62fefe249f14070dd1be7b0d76f26f1a650e36706f5d41a8e4,2024-10-30T22:15:03.503000
|
||||
CVE-2024-8422,0,0,595c3a4c4569e5d22b76db5956453d2a1a1a701b00065efde8acf9a79c387cf0,2024-10-16T18:00:10.507000
|
||||
CVE-2024-8424,0,0,70e0efba1b7474fd71ae798ee933fd249d2e6d2cb69d7469e257caaac30ab429,2024-11-08T19:01:03.880000
|
||||
CVE-2024-8425,0,1,8578acc89b2c74a945f63151fb9b4780a5d6bb1dca81911192e21bd3d88f3265,2025-03-06T16:36:34.470000
|
||||
CVE-2024-8425,0,0,8578acc89b2c74a945f63151fb9b4780a5d6bb1dca81911192e21bd3d88f3265,2025-03-06T16:36:34.470000
|
||||
CVE-2024-8427,0,0,b84207915031e0f3fd8ae31fc1649578b63ca815fcdfb9b3c22054b4863be5e4,2024-09-11T17:41:18.733000
|
||||
CVE-2024-8428,0,0,16614a0b61f86dd0b83d47d6c77d8385fb4c68c4d0f570f88f7c5094d2f7b53a,2024-09-26T21:58:45.393000
|
||||
CVE-2024-8429,0,0,7d7adc19f31eabcda933830e1386025bcbab9119931c58d61657c8ea833e8e43,2024-12-17T12:15:20.853000
|
||||
@ -279254,7 +279255,7 @@ CVE-2024-9011,0,0,24ced7d06552bc9d1dd30636af61f2f64e910b6c47eefac677c31a4765d5a4
|
||||
CVE-2024-9014,0,0,220003038e0ed1cc49a0befe3090135c41cd16a5f829c2d65bd6cc8f984c0497,2024-09-26T13:32:55.343000
|
||||
CVE-2024-9015,0,0,70610f66e2554a4ae6806b1835adece9ecbb77c46846bbc910eff47baf4dabd3,2025-02-11T02:15:36.640000
|
||||
CVE-2024-9018,0,0,9d5f9a71065cb5737c3eb97e3b8fce2545d7a7505edc442df3224ec9cdcd8b15,2024-10-07T19:20:48.293000
|
||||
CVE-2024-9019,0,1,43802e19726442119cda3a15e8bb288e02463bb359c959714418efb58e791166,2025-03-06T16:36:34.470000
|
||||
CVE-2024-9019,0,0,43802e19726442119cda3a15e8bb288e02463bb359c959714418efb58e791166,2025-03-06T16:36:34.470000
|
||||
CVE-2024-9020,0,0,13f7d55260c3dda01ac88411af938bbf50d791e8c741bac69665223f77a450e5,2025-01-22T15:15:14.407000
|
||||
CVE-2024-9021,0,0,38ce15408413883ac2962e131e46ff98aae3d8ba8d1d410ba95b4f315f4dd5ce,2024-10-10T12:57:21.987000
|
||||
CVE-2024-9022,0,0,b97de3f37f13459888a48b84864cef3e3e6492a34af924d2e6bb02f8326a41fe,2024-10-15T14:34:12.063000
|
||||
@ -279990,7 +279991,7 @@ CVE-2024-9884,0,0,4a0a77563fc4e06c8296a47a1c8635fcfa8e5f69be4a2d7e1096bd71ca362f
|
||||
CVE-2024-9885,0,0,b21445718b93ae656c78bfcfeb3bf6e8a2777208198bab62cb8e54c1d6ea88a9,2024-11-01T12:57:03.417000
|
||||
CVE-2024-9886,0,0,04ce6f029ebf112e409af5e292567f14dcda7336912ff68f33d70d3ca5fdf4fb,2024-11-01T12:57:03.417000
|
||||
CVE-2024-9887,0,0,a57bb96d7f5d03d33f9ea1b06c833521402094a65a8335751f2160d8f17c9a14,2024-11-18T17:11:17.393000
|
||||
CVE-2024-9888,0,1,ed3e67c9269e016b58aaa245366e12d42e3eb929376a6f7d519cfa91bd57288e,2025-03-06T18:13:11.800000
|
||||
CVE-2024-9888,0,0,ed3e67c9269e016b58aaa245366e12d42e3eb929376a6f7d519cfa91bd57288e,2025-03-06T18:13:11.800000
|
||||
CVE-2024-9889,0,0,7a64698fdf3298a7b4d684626a6830e5a5b785a9e26986bee7406f479d860681,2024-11-01T15:27:23.777000
|
||||
CVE-2024-9890,0,0,b0e8bda7f7d806e933d15bb3145a9edb8c134858dbfd5a95388bc8af05629f9f,2024-10-28T13:58:09.230000
|
||||
CVE-2024-9891,0,0,4d46692b8a9a483c19484401ddd06b53b7467e4ccf0ce5f92f7bde6fae1d0eb4,2024-10-16T16:38:14.557000
|
||||
@ -280235,7 +280236,7 @@ CVE-2025-0333,0,0,81e4cc439859af53c1b986765c85b9db6681ddfd15355f617bb0f4d13181d4
|
||||
CVE-2025-0334,0,0,a2752894f0956fdde9f25172948b20b0ef85e697939129012141ceedb1b495bc,2025-01-09T06:15:15.610000
|
||||
CVE-2025-0335,0,0,d5fa0c487675ca616e7ff135ad8a970ffdd4ae08b32ac07ee07443b3a83ed665,2025-02-26T18:25:29.120000
|
||||
CVE-2025-0336,0,0,795ad1de1d64b863b23a9ee9f1f8e965a4f5ae1458793c278520d16970dab18d,2025-01-09T07:15:27.860000
|
||||
CVE-2025-0337,1,1,e1c87c19f3cc4ac741cd664509844da009a4879547ec0484afa3b36eca0f697b,2025-03-06T17:15:22.303000
|
||||
CVE-2025-0337,0,0,e1c87c19f3cc4ac741cd664509844da009a4879547ec0484afa3b36eca0f697b,2025-03-06T17:15:22.303000
|
||||
CVE-2025-0339,0,0,56d80730bd4432f993e46d3759d1fe5c37d850c2923afcadbbf473db701d571e,2025-03-03T16:25:24.627000
|
||||
CVE-2025-0340,0,0,d2643790c5408b8656f83d48122b2edd0443b492b102add5cec114f36ec3d251,2025-02-27T02:05:55.703000
|
||||
CVE-2025-0341,0,0,b0cebaf9b276af573888ac34520a7b93ce4fdf91461ce7b89f083d81a4f7efff,2025-03-04T19:30:24.047000
|
||||
@ -280523,7 +280524,7 @@ CVE-2025-0754,0,0,01e22cbc27c23b2a20fc22b4b38925f42f70aba0e3cf26d239fd3f71faae49
|
||||
CVE-2025-0759,0,0,3950068b51270dbe7575a23dc385c472189e9c3ef0131c0ca8aebf6982e5189c,2025-02-27T15:15:40.603000
|
||||
CVE-2025-0760,0,0,4ca9ac99fb9336a13e4c0593cd94e546cc82a4636817a6aff90106a98c22e8a6,2025-02-26T00:15:10.890000
|
||||
CVE-2025-0762,0,0,e4f54e0a8112ca4bbd93833150136d658b70b741ccb351b92cec93e89ce75210,2025-01-29T15:15:17.687000
|
||||
CVE-2025-0764,0,1,05565ab00dd47478df6fddf826fcaa677cc4cff7c4d3d296c1f19709af483840,2025-03-06T17:52:55.370000
|
||||
CVE-2025-0764,0,0,05565ab00dd47478df6fddf826fcaa677cc4cff7c4d3d296c1f19709af483840,2025-03-06T17:52:55.370000
|
||||
CVE-2025-0767,0,0,ebaf8c1290fdf05b5e391e352659acacd8062a3880fa35ea591d863dd24a3d46,2025-02-27T19:15:49.350000
|
||||
CVE-2025-0769,0,0,b581b08d9ccf53eafac9a57a886485fd542a058d854e1408644a5ca22deab911,2025-02-28T20:15:46.440000
|
||||
CVE-2025-0781,0,0,b187217e5320659130c2f954520571f906b51edbf3680129182cf06170507db1,2025-01-29T22:15:30.187000
|
||||
@ -280545,7 +280546,7 @@ CVE-2025-0797,0,0,628cb42a56ef07dcbaa45af1f8d9d3fc26d2336850c357cde77be8ecc6fe0f
|
||||
CVE-2025-0798,0,0,240e6753a9a70f85045c542456d47e2b00fd8af1466dad3f65c55bce760bc2af,2025-01-29T02:15:27.190000
|
||||
CVE-2025-0799,0,0,24d7e10897e858e097e83298564d3196763b9824077dbf2b4283317ae2c0fd13,2025-02-06T01:15:09.580000
|
||||
CVE-2025-0800,0,0,a4d441f5ad8f092cad659ed164fad1f06151d2e4e9a65c6f4154f4044dd829f4,2025-02-10T14:11:58.423000
|
||||
CVE-2025-0801,0,0,e2bc3bb5a984a8abcd451e3de8f434f19668d21b83a5b66f1573755941e16889,2025-02-28T05:15:33.683000
|
||||
CVE-2025-0801,0,1,b395d71ba1ad16ae31b91af2615c0cb141ca15feb6df9644acedc04f23e5a3f3,2025-03-06T20:21:36.547000
|
||||
CVE-2025-0802,0,0,922faa0c50420f9e3c596274859a8be228a56434ef22c6b0d9550828a164d7dd,2025-02-10T14:06:03.410000
|
||||
CVE-2025-0803,0,0,5311b2d33830c023a1dc5f2b7be0ab7412630dc054ac16cd734b6b3ebdc3c91f,2025-02-11T19:48:06.860000
|
||||
CVE-2025-0804,0,0,53f7fab3a5e8ab11732155ff3e17826c7a6f61d1fcafd348f26f842f26491509,2025-01-29T04:15:07.193000
|
||||
@ -280901,7 +280902,7 @@ CVE-2025-1393,0,0,7e67ea62469d5decfffee901208f62ab89eaada4966e37e0b8373112ec3c53
|
||||
CVE-2025-1402,0,0,c23c451cfa1d570fb16b3d38ae224aa085b42cdb084d4b1dbd67b0732fd42aba,2025-02-25T04:04:59.860000
|
||||
CVE-2025-1403,0,0,d98767ffbbabf7b703d6464c4760704cf18c9952a200d902dfdc98a149c5818d,2025-02-21T18:15:20.550000
|
||||
CVE-2025-1404,0,0,206798e10794776f5070bd90971934cac6d858de29398b0cd87fe60644cffca8,2025-03-01T12:15:34.310000
|
||||
CVE-2025-1405,0,1,016e0a2d9c49bef945de3d88454b1b089cb01529a46c8d393d534fcf1fc43e82,2025-03-06T17:52:55.370000
|
||||
CVE-2025-1405,0,0,016e0a2d9c49bef945de3d88454b1b089cb01529a46c8d393d534fcf1fc43e82,2025-03-06T17:52:55.370000
|
||||
CVE-2025-1406,0,0,6fbc92715581c083383884df65716e311e7920e9986e87816bf21c4af15408ec,2025-02-25T03:38:24.303000
|
||||
CVE-2025-1407,0,0,81ebc501504f4e0e97111e960151a7a649f1ecbd9d904ea14ecfe9745b475037,2025-02-25T03:37:32.347000
|
||||
CVE-2025-1410,0,0,1acd34ee1bf4de50c7bb7990bb2833820ce8a935ac6fe3383da13c0fe4fe3da0,2025-02-25T03:35:42.633000
|
||||
@ -280930,12 +280931,12 @@ CVE-2025-1489,0,0,3008549e3d2861f78796256b763f59eec371226dd4b84353f864c64443cf0e
|
||||
CVE-2025-1491,0,0,40186b708c4228824b2aec7aee2f2d8fd38e21f8b843bfbf932f90bc1889000b,2025-03-01T13:15:10.750000
|
||||
CVE-2025-1492,0,0,b9223b4db500ae771be5ddc029bc738cd0c9e1261ad47ff66314ecd9bf92d1b3,2025-02-20T02:15:38.553000
|
||||
CVE-2025-1502,0,0,0a039472763f0268c96bf0cb63d948faf52e8b650cac893f2842ccae51bdaafc,2025-03-01T07:15:11.183000
|
||||
CVE-2025-1505,0,0,f07d028c0b1afb5f694ef937c5c5c28e5a39031e094947035ed6a198be466653,2025-02-28T05:15:33.923000
|
||||
CVE-2025-1505,0,1,1355264158a2ba11ce2fd21a6bc45f6ba2c7a41beba2055617c8a72a80e67517,2025-03-06T20:21:36.547000
|
||||
CVE-2025-1506,0,0,3f7cdcccb4278d311606b0b4c7fc8dc6a6db82f7eaadf4061c1d5cb0a4181211,2025-02-28T06:15:25.557000
|
||||
CVE-2025-1509,0,0,96513da0fa9cb03c336b83bf5bddf52acacdda9db2e967b5f8ef0dc0a4de0f27,2025-02-22T04:15:09.883000
|
||||
CVE-2025-1510,0,0,5e7f4e908d48e1455cf18a81d8dfff338614746cef18c3315cc85b0c64b8c8df,2025-02-22T04:15:10.040000
|
||||
CVE-2025-1511,0,1,b1b588667a5e649574877e42702a5753176a9b5bb63efe10313a554d2504ba09,2025-03-06T17:52:55.370000
|
||||
CVE-2025-1513,0,1,3e83881e26d14d0e87001b4c3ba5dc79f7552c69b46afe7ea910cd8458998dde,2025-03-06T17:52:55.370000
|
||||
CVE-2025-1511,0,0,b1b588667a5e649574877e42702a5753176a9b5bb63efe10313a554d2504ba09,2025-03-06T17:52:55.370000
|
||||
CVE-2025-1513,0,0,3e83881e26d14d0e87001b4c3ba5dc79f7552c69b46afe7ea910cd8458998dde,2025-03-06T17:52:55.370000
|
||||
CVE-2025-1515,0,0,40fb5af3561fa8566133f431829f949e2515107ad298d86ca1e6887d1d266212,2025-03-05T10:15:19.850000
|
||||
CVE-2025-1517,0,0,f77151ae5031cf639b38b016ea952fb6438aadc87174ef04eae6ee15efb2dd99,2025-02-26T13:15:41.193000
|
||||
CVE-2025-1535,0,0,6080c0c0968f3ab3c5259d9031c93f6d6c93dcaef1c71aa8b7e3b62645a6a84e,2025-02-21T12:15:30.877000
|
||||
@ -280956,7 +280957,7 @@ CVE-2025-1560,0,0,ba11227614899d3056761ea4c890190d97fc89170a767994ef7607faca65ce
|
||||
CVE-2025-1564,0,0,645d5d3c72d90d98c848dad749bda526f296bef655490c72ec6d985301cb81b4,2025-03-01T08:15:34.007000
|
||||
CVE-2025-1570,0,0,9c53718a1eed240e02a569965a467342bf3a80fb8b884074af55a034defd9df2,2025-03-06T15:00:16.447000
|
||||
CVE-2025-1571,0,0,2ff9d1871ce4b294af235897d1f180d1853e1f37cf780d6e8da053f8773e82c8,2025-02-28T07:15:34.227000
|
||||
CVE-2025-1572,0,1,4624d62075f2625515018b130359f28dc2ef1b58e0a085f5d23b7995a7032a3a,2025-03-06T16:36:54.387000
|
||||
CVE-2025-1572,0,0,4624d62075f2625515018b130359f28dc2ef1b58e0a085f5d23b7995a7032a3a,2025-03-06T16:36:54.387000
|
||||
CVE-2025-1575,0,0,295612ec0ffb6cc1f5a98b01cca7e60e463451cd2e098b1e5038c15250f15467,2025-02-23T04:15:24.980000
|
||||
CVE-2025-1576,0,0,aeb190ff01707b8d12dded28d81e8d078211363f2b351bee055762ff93e0203e,2025-03-03T16:25:24.627000
|
||||
CVE-2025-1577,0,0,4d8fa583e71372f21db5fe2ef87d702b5d584f75eb8697a695605f1072d59f24,2025-03-03T16:25:24.627000
|
||||
@ -281049,7 +281050,7 @@ CVE-2025-1749,0,0,2ed2d8a684d2a9d359b913eedd08701fd98f085a7906d02a287bb2e85b9600
|
||||
CVE-2025-1751,0,0,23febf746b08b9b62d9a86bc04beb9eb423113024e0cb3002fb920be2326e655,2025-02-27T12:15:35.030000
|
||||
CVE-2025-1755,0,0,e98722605b3f73dbcfde847f93fc06a2f7a469a54167735911620ea692356f92,2025-02-27T16:15:39.137000
|
||||
CVE-2025-1756,0,0,9d3e6b9b79f2288093ce2574e75d10b1239a012c0c72bf0cd61bb2c5778cb69e,2025-02-27T16:15:39.287000
|
||||
CVE-2025-1757,0,0,2561a8f5c53734c028e83a6bda94ef29e169c9eb7376cb65d67bea6c6b2880de,2025-02-28T05:15:34.097000
|
||||
CVE-2025-1757,0,1,78b33a074cf39bfe778889068f984255867e6a5fb09e8f531bc6334acbd95f5f,2025-03-06T20:21:36.547000
|
||||
CVE-2025-1776,0,0,1a12423b233b2ef4ba69976c3f13498310a33efb7f09102cfb934a1191ac53f0,2025-02-28T14:15:35.943000
|
||||
CVE-2025-1780,0,0,226a30a5273cda636f0411ff11753517352eef60dfa6b2b998a1836a6dc818bf,2025-03-01T04:15:09.713000
|
||||
CVE-2025-1786,0,0,6efea7c83ade59c3484e3ccdf6b16455298d78bd2d350ead5c28c52e73509d8e,2025-03-03T21:15:16.130000
|
||||
@ -281252,11 +281253,16 @@ CVE-2025-20208,0,0,1dec4a67abad93b4e30bff99a42e85d57a7d0f10ed0df9df2a04fceabe83c
|
||||
CVE-2025-20211,0,0,f40e52cb9e720a750ff40a6d984cd863919cf3388eccfdd326c3ba9106482e42,2025-02-19T16:15:41.163000
|
||||
CVE-2025-2029,0,0,93023c22912987564123e39309d24758527c12f0e9ccb8c0c3ff604f1965ea96,2025-03-06T15:15:17.943000
|
||||
CVE-2025-2030,0,0,45c9009752edf05edc8391d031a81451ba0bee5f88f8e7315cd270279d6ba239,2025-03-06T16:15:55.593000
|
||||
CVE-2025-2031,0,1,5d7168f995fac2cab500af0410060e80ff271f06a0fc111270c45267a1b51cb4,2025-03-06T17:15:24.153000
|
||||
CVE-2025-2032,1,1,87651d4114c21c653ae66312bcfd16b6cc53059907a14bac1fe2bfc7cef78ab9,2025-03-06T17:15:24.297000
|
||||
CVE-2025-2033,1,1,f8953d527a8dd7fa2ec425e0e1a8988a67e5617e7fb84176b06f18b159bf60ed,2025-03-06T17:15:24.490000
|
||||
CVE-2025-2034,1,1,7e09b40d8d5a9b9e58f6982b85a86c374e9be1daceb370522cd6b32725c7f889,2025-03-06T18:15:43.230000
|
||||
CVE-2025-2035,1,1,b0efa60056ad785ecb86b50f239ca2d1bd151941c88e0523d6aaad336bc0b51b,2025-03-06T18:15:43.457000
|
||||
CVE-2025-2031,0,0,5d7168f995fac2cab500af0410060e80ff271f06a0fc111270c45267a1b51cb4,2025-03-06T17:15:24.153000
|
||||
CVE-2025-2032,0,0,87651d4114c21c653ae66312bcfd16b6cc53059907a14bac1fe2bfc7cef78ab9,2025-03-06T17:15:24.297000
|
||||
CVE-2025-2033,0,0,f8953d527a8dd7fa2ec425e0e1a8988a67e5617e7fb84176b06f18b159bf60ed,2025-03-06T17:15:24.490000
|
||||
CVE-2025-2034,0,0,7e09b40d8d5a9b9e58f6982b85a86c374e9be1daceb370522cd6b32725c7f889,2025-03-06T18:15:43.230000
|
||||
CVE-2025-2035,0,0,b0efa60056ad785ecb86b50f239ca2d1bd151941c88e0523d6aaad336bc0b51b,2025-03-06T18:15:43.457000
|
||||
CVE-2025-2036,1,1,f3489ea667e662fab3178088dd832969cc1b9422b6a3b1239d861788bf10172a,2025-03-06T19:15:28.373000
|
||||
CVE-2025-2037,1,1,b92bcfa0abb7e17a83db53e791d9663e4edd62b805978b3db76a293acfdf1d1c,2025-03-06T19:15:28.540000
|
||||
CVE-2025-2038,1,1,2271724b1f005285850f3f1195201d86cca4f380c3c280127fe4a8a63bef7f51,2025-03-06T20:15:38.583000
|
||||
CVE-2025-2039,1,1,0c70a175e47b2d67392cc26ee1e5102912074eb08bc629dae498524f54077aa8,2025-03-06T20:15:38.753000
|
||||
CVE-2025-2040,1,1,62465f73ef399ccbd582deb5961c1f9a6ef4e9fe1de22af0c2a399f13fca6466,2025-03-06T20:15:38.920000
|
||||
CVE-2025-2045,0,0,5f954a149cde3c0670007c2686ef3ff487d6b9cfe276e63999bff89b33566b76,2025-03-06T13:15:12.553000
|
||||
CVE-2025-20615,0,0,246812c21ea1208c6577dd2f9795a7d98215e290c9dd9fcc59c79b81edac8805,2025-02-13T22:15:11.590000
|
||||
CVE-2025-20617,0,0,c8bfdf3a13c0fef33afce1eb72104d7b2280ba78c5b2dced7cd944ea31c0a2c7,2025-02-20T06:15:20.277000
|
||||
@ -281925,12 +281931,12 @@ CVE-2025-21825,0,0,8870dfd89a416f2d4819ebc7dda8e31caac49b07c149c21ec32a3a7d987be
|
||||
CVE-2025-21826,0,0,d8d55921ef1e36df7091e5de134407839b84b0822bba50536183d3f97f7ce0cf,2025-03-06T16:15:54.863000
|
||||
CVE-2025-21827,0,0,798ad67445b56cee9d7e2654d461c72d1706e81ca338689a6a6b575e66e62661,2025-03-06T16:15:54.967000
|
||||
CVE-2025-21828,0,0,1d423c38cfc3b27519324f42fcfede2fa1caf4961cb465a838aa6e06d0f9b7b8,2025-03-06T16:15:55.070000
|
||||
CVE-2025-21829,1,1,565eb8245bf46ec2e8aea4da181586644cadcf072d0e6c514e0c828dc274ac61,2025-03-06T17:15:22.820000
|
||||
CVE-2025-21830,1,1,305117e9f901262e313c4c6a00e95c29dffd65f2d4dc9ad7dbea30d015c9cfc8,2025-03-06T17:15:22.943000
|
||||
CVE-2025-21831,1,1,02e7212ed4caf03d5b4e694a67d7e4c69f77a56f55cdaa5770166dd4f4d6bdd9,2025-03-06T17:15:23.060000
|
||||
CVE-2025-21832,1,1,e0629aa46decd0ab7966c3eb122fc42ab87700e1c595ae30430876b531e02ab0,2025-03-06T17:15:23.177000
|
||||
CVE-2025-21833,1,1,06865424bb811f3a4d3c7108ae185516bc9999aacbe2f3e2364847e7bebe4c01,2025-03-06T17:15:23.293000
|
||||
CVE-2025-21834,1,1,88b8e4410246a3f9f8e9a91872d4e127cbe716c34bcd9a96cadc63e87a32cb76,2025-03-06T17:15:23.397000
|
||||
CVE-2025-21829,0,0,565eb8245bf46ec2e8aea4da181586644cadcf072d0e6c514e0c828dc274ac61,2025-03-06T17:15:22.820000
|
||||
CVE-2025-21830,0,0,305117e9f901262e313c4c6a00e95c29dffd65f2d4dc9ad7dbea30d015c9cfc8,2025-03-06T17:15:22.943000
|
||||
CVE-2025-21831,0,0,02e7212ed4caf03d5b4e694a67d7e4c69f77a56f55cdaa5770166dd4f4d6bdd9,2025-03-06T17:15:23.060000
|
||||
CVE-2025-21832,0,0,e0629aa46decd0ab7966c3eb122fc42ab87700e1c595ae30430876b531e02ab0,2025-03-06T17:15:23.177000
|
||||
CVE-2025-21833,0,0,06865424bb811f3a4d3c7108ae185516bc9999aacbe2f3e2364847e7bebe4c01,2025-03-06T17:15:23.293000
|
||||
CVE-2025-21834,0,0,88b8e4410246a3f9f8e9a91872d4e127cbe716c34bcd9a96cadc63e87a32cb76,2025-03-06T17:15:23.397000
|
||||
CVE-2025-22129,0,0,d84466451eb5813ecdb45d579943a91ad86a0d891b836c8fd8053b0ece067119,2025-02-04T19:15:33.360000
|
||||
CVE-2025-22130,0,0,fe16d9f63e9545f97bce7adcca434385cbaf054f6f17003be6f1b5abf3fc1663,2025-01-08T16:15:38.543000
|
||||
CVE-2025-22131,0,0,6176cb6449a6745057b5584cc8bde5826af6d54b0e60fda45ed3c6106ba08f4b,2025-03-06T13:30:34.893000
|
||||
@ -282319,7 +282325,7 @@ CVE-2025-22781,0,0,1afa1e21c86cac8ee7b1d1071985c89e8ee67ff99915e1b488521ef5a115a
|
||||
CVE-2025-22782,0,0,4d4a57c4ca0b47080b236548a74a5ed3bac54edcb8336bdf840fd3b341ca7ef9,2025-01-15T16:15:40.973000
|
||||
CVE-2025-22784,0,0,92af1dcbc21436bcacbb4f07d9a62f95575ba7fc084cf7ac65c2b20d13664c0a,2025-01-15T16:15:41.127000
|
||||
CVE-2025-22785,0,0,aa4353d5806fe5723076a35c33b8891ff3a61998eca5d33194fb5785a62e2d25,2025-01-15T16:15:41.290000
|
||||
CVE-2025-22786,0,0,bbe34793af48ca2408914a3f7c7ee4c16a9abc2b55fa750872644376b8835093,2025-01-15T16:15:41.440000
|
||||
CVE-2025-22786,0,1,2219052100f6e7a6b9d13334f91b94965fd55d75b45edfe90ddca7a6208e3ec4,2025-03-06T19:02:47.083000
|
||||
CVE-2025-22787,0,0,123539ec0f563d41af7ca03da6e6f99109a8200bc75541fbc478fac310c97242,2025-02-25T15:41:08.223000
|
||||
CVE-2025-22788,0,0,af55bbe385e5ad19db90f54f67dcad4a6458802599e6dbb5e4a7878a0103b5e0,2025-01-15T16:15:41.750000
|
||||
CVE-2025-22793,0,0,1e0903441186396148f438dd4c5bf609b6c2892614e2b8eb44fcfefd5125737c,2025-01-15T16:15:41.897000
|
||||
@ -283311,7 +283317,7 @@ CVE-2025-24573,0,0,56d0d64dff037f658f0c767f6aad192ed4cc48ff77cf44250998dad4e3bc1
|
||||
CVE-2025-24574,0,0,c33ac486c050e3e57ec517b763df987799e73ad8e1160b69b1646685a1bb4361,2025-02-03T15:15:26.013000
|
||||
CVE-2025-24575,0,0,025389a169c496ef6d6fedb8e1d36b112ee89d07ab0bebfab560187cfa1b9353,2025-01-24T18:15:34.793000
|
||||
CVE-2025-24576,0,0,2765bf68fdca59f5678eccf28012221f8f65e8cc8e6ad593abf3e9e803ba44a9,2025-02-03T15:15:26.310000
|
||||
CVE-2025-24578,0,0,18d6d541b81b116f923b49fbb357794bb3f5b6116da9c89615296e25659da1df,2025-01-24T18:15:34.947000
|
||||
CVE-2025-24578,0,1,172de195b39ec23afbb2c959e696d28e3f83362b36d48bedf487bd3ca4e6d8b6,2025-03-06T19:02:47.083000
|
||||
CVE-2025-24579,0,0,1ff118a80031f6e9188c9c18ca66942b92452beb89610750f176f36b429de4b2,2025-01-24T18:15:35.090000
|
||||
CVE-2025-24580,0,0,3ac0c4c6045678b72e87005384f5e6de52eb3bd6459338ea250229c9d3171372,2025-01-24T18:15:35.247000
|
||||
CVE-2025-24582,0,0,62063760b35cdff28e72d2d925dca694f2a36a877c07ea2ef7d309664ff448e6,2025-01-24T18:15:35.397000
|
||||
@ -283348,7 +283354,7 @@ CVE-2025-24614,0,0,0ead5ce7538f0f45f75c0eca0a35e7740c1a473c3b8f8f2252b2ca066ed72
|
||||
CVE-2025-24615,0,0,bb9f2133a024bd838182b13bd2e45367b2874f171a39a46fd748cdfc70a69e80,2025-02-14T13:15:49.353000
|
||||
CVE-2025-24616,0,0,a8d2738b549251a0111881423e505a3fd396277d11679b465dd06c3c95a1da92,2025-02-14T13:15:49.490000
|
||||
CVE-2025-24617,0,0,972fde5763d796b483e656605f6360dc4b09c7f8adea8ff2b5a23cc35b8e7092,2025-02-14T13:15:49.633000
|
||||
CVE-2025-24618,0,0,a5f6f3160a6a75d9f173a96a6834161f30c514b68875c3d26116ca9f5fdfafbd,2025-01-24T18:15:37.430000
|
||||
CVE-2025-24618,0,1,4bd40b4b6092cd1b16fa938fa02033e1cf56a565032cc82c02d9e4113f9d0d0a,2025-03-06T19:02:47.083000
|
||||
CVE-2025-24620,0,0,b444442cc1b23af3af8ae533f2aed8473d4d75a376ebfe4727e41bd7d72161cb,2025-02-03T15:15:26.697000
|
||||
CVE-2025-24622,0,0,40b10bf41ce4b777512f2bfa275634ecc97858c1be10f89ac72c62de5b5c8685,2025-01-24T18:15:37.577000
|
||||
CVE-2025-24623,0,0,e2efe38ad89c57e398c055c1350e8dcbae99221a204ae29654fb946b0f963965,2025-01-24T18:15:37.727000
|
||||
@ -283449,7 +283455,7 @@ CVE-2025-24725,0,0,a0e252a651d31906e931aabf1afe1a1acf899eea1aa87f5cd5f7fb623547b
|
||||
CVE-2025-24726,0,0,643457e78383ffd21c80ba87cde1f90064aab70800fe6ac90c239f7f356518e7,2025-01-24T18:15:46.530000
|
||||
CVE-2025-24727,0,0,50c53138b35e4c8d6f22f4348f002321bb971f965d9e30f873316a30effbd955,2025-01-24T18:15:46.707000
|
||||
CVE-2025-24728,0,0,838d34167d6e9360204659821ee61be03178a357afccd2fffe732d67db08ac02,2025-01-24T18:15:46.877000
|
||||
CVE-2025-24729,0,0,c7a17f72b743cc9855b58992cbb6454263ecaa969defd8589f1123a192889c8a,2025-01-24T18:15:47.037000
|
||||
CVE-2025-24729,0,1,8dc8344bb02bcef77a948622735797e4aafaad488eec9af68a538372de4eeb72,2025-03-06T19:02:47.083000
|
||||
CVE-2025-24730,0,0,fc837ddd0a9b843a50233d49b160d1ffcc2a42a504761ca2d6cbe244eb7ae5c1,2025-01-24T18:15:47.193000
|
||||
CVE-2025-24731,0,0,49b9d87fe50843eb1bd58d4e2d6c6d09038a230901783130e84ac391da7f362f,2025-01-24T18:15:47.370000
|
||||
CVE-2025-24732,0,0,c415d1fd5de8703d180e448901772f07d2bcadd6548313af1a4bf127cb6f5bdc,2025-01-24T18:15:47.530000
|
||||
@ -283487,6 +283493,7 @@ CVE-2025-24792,0,0,815c00b91fe0508a6ac1ee7b62f401c19482a17315a51f6f7a6adbc3c30a5
|
||||
CVE-2025-24793,0,0,e28f23f8765521f3c09231efc18389c18020ab59aed59a8a8b47cb836c195885,2025-01-29T21:15:21.270000
|
||||
CVE-2025-24794,0,0,c04b940ac82a2657417f797fe796501aa31f53e5a08053b008970823006b7cde,2025-01-29T21:15:21.397000
|
||||
CVE-2025-24795,0,0,4e7d355e1e973178e45904614970e5915bed2547d76d074d93927fc694a1b13e,2025-01-29T21:15:21.533000
|
||||
CVE-2025-24796,1,1,eb645f4107f1de4fc5f3a387f5b0d6cc2457622dca701d42f68f9ef307ccc215,2025-03-06T19:15:26.953000
|
||||
CVE-2025-24800,0,0,7ed7267931cd5ab7815e3084be7a388ce38e4d4a267ef28098f1d5b3017953e4,2025-01-28T16:15:45.063000
|
||||
CVE-2025-24802,0,0,7dd003e792c772d8d409000d77fae7f13160cda3e1a330b0895620a7fc320ad5,2025-01-30T20:15:51.010000
|
||||
CVE-2025-24803,0,0,74eab822b1c3e68557671b88128107e72ab93a3fd5a52a629fe3462c9de889ad,2025-02-05T19:15:46.207000
|
||||
@ -283691,6 +283698,7 @@ CVE-2025-25187,0,0,2ca61614d958811964bebe01178416385840d15966b28619da4a847cdf1ef
|
||||
CVE-2025-25188,0,0,2461474c8c359fbc15a8610b387ef0ac657a3108436b2e05cbe126ccfb2936c2,2025-02-10T18:15:35.827000
|
||||
CVE-2025-25189,0,0,f68ee5c586d07dec9a336fb2dbbfd3c5bd132d29662e9c4bc9ff1969295aaac8,2025-02-11T16:15:52.313000
|
||||
CVE-2025-25190,0,0,96316be3801ea8e34db1f71f151e934e00015e5d1a34196dfd79e3e824fb1a50,2025-02-11T16:15:52.420000
|
||||
CVE-2025-25191,1,1,302b5aac007977359a73b10b37e4d3c5bcd86bee77fbf1555ca03127afb731e1,2025-03-06T19:15:27.113000
|
||||
CVE-2025-25192,0,0,f74cd9479b2f16f1fb0994f5462818f67695100b0ab32ad2fce87051c690df90,2025-02-28T13:35:22.340000
|
||||
CVE-2025-25193,0,0,9c42e26d0a4f2052fdf43faa73fab75794f787f53e222117d45465e7383dd8fa,2025-02-21T18:15:37.253000
|
||||
CVE-2025-25194,0,0,278bc98c8a0ffe0e8a7e96acea34ed9bc50825c485f6cab1eaf41889a2da8034,2025-02-10T23:15:16.067000
|
||||
@ -283725,6 +283733,7 @@ CVE-2025-25287,0,0,664f4953e1c6d1d3e1a32984d655969f7d6cbc9013ea11bc88e87bbf7e0a4
|
||||
CVE-2025-25288,0,0,0584d712e57f52bee8eae9744431d7edb4ff073c5208efea9ba9d4aad69105ee,2025-02-14T20:15:34.737000
|
||||
CVE-2025-25289,0,0,9f524d670b2ea0e928c8409b5f46ea35f805bd4f11134f0dcb16ef0bb77ce771,2025-02-14T20:15:35.100000
|
||||
CVE-2025-25290,0,0,927339a6905b50f325cf414d0d0e7fad53929abe8412c231085b72dda312b675,2025-02-14T20:15:35.593000
|
||||
CVE-2025-25294,1,1,1933530b178b384d9cb739cfd3cbc94c93474d3a796340837a5ed643e2c3fa82,2025-03-06T19:15:27.267000
|
||||
CVE-2025-25295,0,0,ab7cbec386eec3a44bf55fb5a8d6852f900324ec8d3c216c21202391f71c954b,2025-02-14T17:15:20.230000
|
||||
CVE-2025-25296,0,0,9e79c5fad11a03b5a2666c57a0c1edbda7d102bfbc1a9f3cdfefb4bac3905071,2025-02-14T20:15:36.103000
|
||||
CVE-2025-25297,0,0,ddf94cfbbc189ce93f241ea6683b88ac35f83102b385ee87dcdb33fc29a231fe,2025-02-14T20:15:36.627000
|
||||
@ -283752,8 +283761,10 @@ CVE-2025-25354,0,0,fd5fd687c6f8251390b2e5e3a768a6ab287fc80bafc324107405456de75d6
|
||||
CVE-2025-25355,0,0,ec2a794520ae75d22fabcfb38a52ffaf9173963e387059ab2ce0d1d9b5964571,2025-02-14T20:15:37.053000
|
||||
CVE-2025-25356,0,0,0eaa4c481eace739405e37ac8872e49e25549e9d6fd6ad7ae3b6c02ea89fec17,2025-02-14T19:38:41.850000
|
||||
CVE-2025-25357,0,0,6ee1cd3a9f7f323b5c37547d52a4c5ca928da63fb7a31ff1e85142032c6e3241,2025-02-14T19:38:15.303000
|
||||
CVE-2025-25361,1,1,e0f476aaa2f05291ed47e23d31cfde6d18e9b27fef40505bea38173c48f01dca,2025-03-06T19:15:27.410000
|
||||
CVE-2025-25362,0,0,42d98817ecbf18ddccabd4b792aadf3e08587d530c768960c95c682806a1813b,2025-03-06T15:15:17.277000
|
||||
CVE-2025-25379,0,0,10c6b59b7ced1a65c44b725df73613b964204bd8bcc126008f75da9f2d8ec909,2025-03-04T16:15:39.433000
|
||||
CVE-2025-25381,1,1,c79c8dd2c841911e48de72de3fe2b8c9ef2218169fa7474f3f8eace5bfaa1095,2025-03-06T19:15:27.500000
|
||||
CVE-2025-25387,0,0,8227bd6f57bafc5fc7f8bddfd6ec6a78dcca117ca404c22469842eba5d4e306c,2025-02-14T17:15:20.393000
|
||||
CVE-2025-25388,0,0,e086cda7e4e5c05ccba48ad30906fb7e59dedc66fc1b83e5645bd434397a431f,2025-02-13T20:15:49.730000
|
||||
CVE-2025-25389,0,0,c4fa8037812de3d612838c95ec3fcc9b936e3b28bc2aa3e854f709efa62e78c8,2025-02-14T17:15:20.663000
|
||||
@ -283779,6 +283790,7 @@ CVE-2025-25475,0,0,09278089065f0af1184c02f8490e15185f88eb53d92fb93aba844e1509b6e
|
||||
CVE-2025-25476,0,0,dcb05a63fbcff084bcf1c5df3723664abe2b9f2707596be8a1333f910233cd3b,2025-03-04T16:15:40.080000
|
||||
CVE-2025-25477,0,0,394fe8fbdba802b7903f79579ee44bd6683941d582eaf8039e436a0431983458,2025-02-28T16:15:39.550000
|
||||
CVE-2025-25478,0,0,5d678bf64fff284866af822721a081473e94720053a6940e94e8607a25812368,2025-03-05T16:15:39.297000
|
||||
CVE-2025-25497,1,1,366739a1f305ada2ab196586b0d04c0ef4aed3e67f510916f4bc3569814a0273,2025-03-06T20:15:38.290000
|
||||
CVE-2025-25505,0,0,11c4c75af440f82d715defaf6782907c0744a464a1a91c9d9aeef14ada87484d,2025-02-21T21:15:23.723000
|
||||
CVE-2025-25507,0,0,aaa8b5a00bc14c6200ce4ada5e546d091bf3632fba77c66b3ac71c873b2a184e,2025-02-21T21:15:23.870000
|
||||
CVE-2025-25510,0,0,80b49d96f8cfea96d2e40e1145bf347e93013db39579b2b941514912fbfd558e,2025-02-21T21:15:24.023000
|
||||
@ -283849,14 +283861,14 @@ CVE-2025-25789,0,0,0f14c3f4531a98890710e1a14e26e29c794c8daab8f347fb89e415279f670
|
||||
CVE-2025-25790,0,0,7f4ba42ac1fa0ded64af2d9c6fa1b05caa67d4b689df7ce81d6f0841ed6a91ca,2025-03-05T15:15:18.287000
|
||||
CVE-2025-25791,0,0,8f427a5814c6955913fad1f85d24fb9e4344b742b4f09e2e17f073d51f11daaf,2025-03-03T18:15:40.030000
|
||||
CVE-2025-25792,0,0,8ed8e898e77ccb511a21f5618850617bafb38b135aa1ceeb89c7273480778843,2025-03-03T21:15:18.863000
|
||||
CVE-2025-25793,0,1,06fda905cb5d366b2dea7114751b25efc66045f1d1efc5dda933bb838933dcab,2025-03-06T18:15:41.480000
|
||||
CVE-2025-25794,0,1,0998585ca8b4d1c33b7e8f931090b2805dd26430daee7449f23e43ab4da36dc0,2025-03-06T18:15:41.883000
|
||||
CVE-2025-25796,0,1,55b92943226ba1df7d1079492bfa786eeb07d68abd2ff61cb507b6fe778a3f45,2025-03-06T18:15:42.103000
|
||||
CVE-2025-25797,0,1,f1c9d0289c48d14cd4761a88c42f5574d41d53f72261c5d690874bbdc19cbc26,2025-03-06T18:15:42.377000
|
||||
CVE-2025-25799,0,1,7e0e2b34e97de373b74e8a2a2d7160b9193cc9608515f6e42c488533a534cf1c,2025-03-06T18:15:42.587000
|
||||
CVE-2025-25793,0,0,06fda905cb5d366b2dea7114751b25efc66045f1d1efc5dda933bb838933dcab,2025-03-06T18:15:41.480000
|
||||
CVE-2025-25794,0,0,0998585ca8b4d1c33b7e8f931090b2805dd26430daee7449f23e43ab4da36dc0,2025-03-06T18:15:41.883000
|
||||
CVE-2025-25796,0,0,55b92943226ba1df7d1079492bfa786eeb07d68abd2ff61cb507b6fe778a3f45,2025-03-06T18:15:42.103000
|
||||
CVE-2025-25797,0,0,f1c9d0289c48d14cd4761a88c42f5574d41d53f72261c5d690874bbdc19cbc26,2025-03-06T18:15:42.377000
|
||||
CVE-2025-25799,0,0,7e0e2b34e97de373b74e8a2a2d7160b9193cc9608515f6e42c488533a534cf1c,2025-03-06T18:15:42.587000
|
||||
CVE-2025-25800,0,0,522fb65d58ed245411f19820e000d842e65fe1759af2fa4ffd4c03c8bb5f4592,2025-02-26T16:15:17.053000
|
||||
CVE-2025-25802,0,1,d97088e007851ab933ca944783447ce692cfbd40d40b16934f0a6aa482cb1db0,2025-03-06T18:15:42.800000
|
||||
CVE-2025-25813,0,1,29785da07b8f111218d1b9b58c66081665210db526a21defc9e5491fcec4ad0a,2025-03-06T18:15:43.027000
|
||||
CVE-2025-25802,0,0,d97088e007851ab933ca944783447ce692cfbd40d40b16934f0a6aa482cb1db0,2025-03-06T18:15:42.800000
|
||||
CVE-2025-25813,0,0,29785da07b8f111218d1b9b58c66081665210db526a21defc9e5491fcec4ad0a,2025-03-06T18:15:43.027000
|
||||
CVE-2025-25818,0,0,bb1057156f76c0ba13313437f2d9a42516b0d209ee43b6f684c1131ad31b9b9f,2025-03-03T17:15:15.230000
|
||||
CVE-2025-25823,0,0,b4ac477f9ed173d267e81d0f4893b0290a15dbbbbe65cdc4bb9bf3c2ae71bff2,2025-02-26T15:15:28.497000
|
||||
CVE-2025-25825,0,0,ce66997893510daddbe1bb264e5808f6942b14e7fc8599212cadc079ecb5ab46,2025-02-26T15:15:28.620000
|
||||
@ -283912,6 +283924,7 @@ CVE-2025-26136,0,0,cc9be51dd4a6fa53d78893d7c6c4eaa6e7ab050c825b80ec7f0340f9116ec
|
||||
CVE-2025-26156,0,0,3c070f48ae01803cf4deab6e20453c0715f07513428e1a7ccf93241deeb274fe,2025-02-14T19:15:15.033000
|
||||
CVE-2025-26157,0,0,59b5a4f935b691a0cfae6c8ea0b4bbb0d47e4814d1aa791e95c7dd113790e9fc,2025-02-14T20:15:37.543000
|
||||
CVE-2025-26158,0,0,b94398759aa4427b7dc090483f4f088a5c44388e38d183da6dc19ae9b872cf91,2025-02-14T20:15:37.677000
|
||||
CVE-2025-26167,1,1,17d7d485efef18154474322cad4f5da05f12b5473644aeee0433fa6a3a8daa07,2025-03-06T19:15:27.593000
|
||||
CVE-2025-26182,0,0,0ffb3bea03992b9174a29a5d31a319557b17fde19454fc28292cbf9e09cbcf6e,2025-03-05T19:15:39.023000
|
||||
CVE-2025-26200,0,0,07971a3db98f9cfae341b32901f42b0af32b82b7b85e8efc840488c86eda257e,2025-02-24T17:15:14.273000
|
||||
CVE-2025-26201,0,0,19cc0d8c975fa49352fb9ad1f8db6737d71edae986faba1d37ba48d4a441cec4,2025-02-24T18:15:21.047000
|
||||
@ -284065,6 +284078,7 @@ CVE-2025-26622,0,0,c1b7d21410dfbb6fcbf2a06b2b329547947b3063e917e17430eb0992177b0
|
||||
CVE-2025-26623,0,0,d192a090780b2dcdc669e9e692f962aa45c7b001bdc2d92981daf17d836bb16f,2025-02-18T20:15:33.153000
|
||||
CVE-2025-26624,0,0,933774cf8883da910c74db2937793adaa8c4da49496d875f26d7c862a7576875,2025-02-18T23:15:10.810000
|
||||
CVE-2025-26698,0,0,a84e642c8171fd04684ed37215c90775ce47055c0db39dea2bf9e7638329b9fb,2025-02-26T13:15:41.983000
|
||||
CVE-2025-26699,1,1,87cf95ca9a4284692cb3c070ce904e940ed4f976fad521177b72ff58a22d0261,2025-03-06T19:15:27.683000
|
||||
CVE-2025-26700,0,0,6e3b394d53337ab4fe903b88ec563a5f9fa1519ac62684b203abb3bd4f953337,2025-02-17T03:15:09.750000
|
||||
CVE-2025-26750,0,0,d88bdcd674193a8c592f1b97cbf3fbf882d139c99406f62e08a860c366f790c0,2025-02-22T16:15:31.210000
|
||||
CVE-2025-26751,0,0,fc2d5649850210570a1c66e7227d2f4e23c5b89d750a00b47264258ce20ebf91,2025-02-25T15:15:23.457000
|
||||
@ -284309,8 +284323,10 @@ CVE-2025-27498,0,0,5abce51fa5a892a16b00a0cc6ce6e1fd8dbe5c06f14b98e0dedb5a5e4ad38
|
||||
CVE-2025-27499,0,0,2a0981b70298c8422dcc388fd2e38e8ce3aebafeb3f8ba21e6fc5b4555397cd3,2025-03-06T12:21:35.360000
|
||||
CVE-2025-27500,0,0,cb6df3c7837dc5abc6c6f0695bd5500abd68f8bbec81fe765a02e55411ae2f90,2025-03-05T20:16:46.363000
|
||||
CVE-2025-27501,0,0,53b5f824b786b51b76ab4a2d3f0a9e775ebc9b9bbcc03d086c0bdf69f6ac7cb6,2025-03-05T20:16:46.363000
|
||||
CVE-2025-27506,1,1,8313f9e93dd55499421f598ef258d63dd49365e5994019d7f3a4774aaadb291a,2025-03-06T19:15:27.833000
|
||||
CVE-2025-27507,0,0,ac222d7a76e525c1f46cf22a467332d1ebeead1ea6a6b94fad24e3b75b3e24ea,2025-03-04T17:15:20.360000
|
||||
CVE-2025-27508,0,0,021b134ab746fdb21c1b6afba20d8b4449f142dd50a7aeaf2a0e333d5dbea12b,2025-03-05T22:15:35.867000
|
||||
CVE-2025-27509,1,1,717db0d8d3de1a389b101d9ff9200fdda3ba763adad4feb3ab4fe65755010e9d,2025-03-06T19:15:27.973000
|
||||
CVE-2025-27510,0,0,dc7a87badb2ca035e9841d13c4f1e364578b0b8e46fd5fdce098b8579729a794,2025-03-05T17:15:16.597000
|
||||
CVE-2025-27513,0,0,945b87e56ce714da5ded3f23905cd9f14824b7b9bbf87aceddb05e0dbf39c7fd,2025-03-05T19:15:39.337000
|
||||
CVE-2025-27515,0,0,98cdf4cd26a05761b75483ff1a87fabed6b957ce327fe955ef14f37b2394dc69,2025-03-05T19:15:39.483000
|
||||
@ -284323,10 +284339,11 @@ CVE-2025-27583,0,0,0323a5ab9427edc3fc5fcf52b07bbd68cd541b31029bf0b1077e85dabad17
|
||||
CVE-2025-27584,0,0,7c36caae7b88889d70bacae0c47b7b1525e549e4aea51dfda3fa9c2476496e88,2025-03-04T17:15:20.527000
|
||||
CVE-2025-27585,0,0,e4743bb908476490b966e1bc83c4b96f68ead94a4d392d96480e7b58a960cb94,2025-03-04T17:15:20.690000
|
||||
CVE-2025-27590,0,0,8f529b7a611aa7d0497c9571b53ac8f03ea946efbb8deff8b1efa4972d889bb1,2025-03-03T04:15:09.020000
|
||||
CVE-2025-27622,0,1,aab424c81f70efb6c2294313600d100f64e720f683885d3b6918b7e0d0c95ce5,2025-03-06T17:15:23.497000
|
||||
CVE-2025-27623,0,1,a7729605ea601dac947d3c9e9dda3f4cf0fc759f67e3d847999a08d4d426400f,2025-03-06T17:15:23.647000
|
||||
CVE-2025-27624,0,1,386e769fd54c9c9e387001be90fa20a8140740d08fb61eb8c2dc8cbb750364f8,2025-03-06T17:15:23.797000
|
||||
CVE-2025-27625,0,1,85889be78be476b146c5fda687cdd2b7a01a613eea674a60ada7a9651223e2d5,2025-03-06T17:15:23.960000
|
||||
CVE-2025-27600,1,1,d29c2cb873c016286f190957a5b6532c0d0c395b3e963b8687f8d007f8f66573,2025-03-06T19:15:28.117000
|
||||
CVE-2025-27622,0,0,aab424c81f70efb6c2294313600d100f64e720f683885d3b6918b7e0d0c95ce5,2025-03-06T17:15:23.497000
|
||||
CVE-2025-27623,0,0,a7729605ea601dac947d3c9e9dda3f4cf0fc759f67e3d847999a08d4d426400f,2025-03-06T17:15:23.647000
|
||||
CVE-2025-27624,0,0,386e769fd54c9c9e387001be90fa20a8140740d08fb61eb8c2dc8cbb750364f8,2025-03-06T17:15:23.797000
|
||||
CVE-2025-27625,0,0,85889be78be476b146c5fda687cdd2b7a01a613eea674a60ada7a9651223e2d5,2025-03-06T17:15:23.960000
|
||||
CVE-2025-27637,0,0,9c062615c8ec6a3ced4ee678ddb923b6d263f273f4e63f5f7bf9a46985accf21,2025-03-05T16:15:40.713000
|
||||
CVE-2025-27638,0,0,799c839b25e9819e4ec80c30ab7682e659f557f1c902bc7211099cb508098b42,2025-03-05T17:15:16.853000
|
||||
CVE-2025-27639,0,0,a0477d98f560583497b6432bc3e9038f2aa7b8df2110514ba2e616c075cb3f66,2025-03-05T17:15:17.027000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user