mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-19 17:31:42 +00:00
Auto-Update: 2025-03-04T17:00:19.916462+00:00
This commit is contained in:
parent
cf93a7c90d
commit
3f44f985a3
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-38116",
|
||||
"sourceIdentifier": "security@opentext.com",
|
||||
"published": "2024-11-22T16:15:18.663",
|
||||
"lastModified": "2024-11-22T16:15:18.663",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-03-04T14:45:17.807",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,10 +51,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microfocus:imanager:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "3.2.5",
|
||||
"matchCriteriaId": "D25C400A-B561-42C0-845D-1F049D74CFDF"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.netiq.com/documentation/imanager-32/imanager325_releasenotes/data/imanager325_releasenotes.html",
|
||||
"source": "security@opentext.com"
|
||||
"source": "security@opentext.com",
|
||||
"tags": [
|
||||
"Release Notes"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-38117",
|
||||
"sourceIdentifier": "security@opentext.com",
|
||||
"published": "2024-11-22T16:15:18.823",
|
||||
"lastModified": "2024-11-22T16:15:18.823",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-03-04T14:45:17.807",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,10 +51,32 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microfocus:imanager:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "3.0",
|
||||
"versionEndExcluding": "3.2.5",
|
||||
"matchCriteriaId": "B0E8FCE3-05D5-43EF-BAD0-D6917DAA3154"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.netiq.com/documentation/imanager-32/imanager325_releasenotes/data/imanager325_releasenotes.html",
|
||||
"source": "security@opentext.com"
|
||||
"source": "security@opentext.com",
|
||||
"tags": [
|
||||
"Release Notes"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-38118",
|
||||
"sourceIdentifier": "security@opentext.com",
|
||||
"published": "2024-11-22T16:15:18.950",
|
||||
"lastModified": "2024-11-22T16:15:18.950",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-03-04T14:45:17.807",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,12 +69,44 @@
|
||||
"value": "CWE-250"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-Other"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microfocus:imanager:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "3.0",
|
||||
"versionEndExcluding": "3.2.5",
|
||||
"matchCriteriaId": "B0E8FCE3-05D5-43EF-BAD0-D6917DAA3154"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.netiq.com/documentation/imanager-32/imanager325_releasenotes/data/imanager325_releasenotes.html",
|
||||
"source": "security@opentext.com"
|
||||
"source": "security@opentext.com",
|
||||
"tags": [
|
||||
"Release Notes"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-38119",
|
||||
"sourceIdentifier": "security@opentext.com",
|
||||
"published": "2024-11-22T16:15:19.073",
|
||||
"lastModified": "2024-11-22T16:15:19.073",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-03-04T14:45:17.807",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,10 +51,32 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microfocus:imanager:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "3.0",
|
||||
"versionEndExcluding": "3.2.5",
|
||||
"matchCriteriaId": "B0E8FCE3-05D5-43EF-BAD0-D6917DAA3154"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.netiq.com/documentation/imanager-32/imanager325_releasenotes/data/imanager325_releasenotes.html",
|
||||
"source": "security@opentext.com"
|
||||
"source": "security@opentext.com",
|
||||
"tags": [
|
||||
"Release Notes"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-38134",
|
||||
"sourceIdentifier": "security@opentext.com",
|
||||
"published": "2024-11-22T16:15:19.197",
|
||||
"lastModified": "2024-11-22T16:15:19.197",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-03-04T14:45:17.807",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,10 +51,32 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microfocus:imanager:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "3.0",
|
||||
"versionEndExcluding": "3.2.6",
|
||||
"matchCriteriaId": "E63B08F5-5805-41CE-BE93-63BFE4F9F4DD"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.netiq.com/documentation/imanager-32/imanager326_releasenotes/data/imanager326_releasenotes.html",
|
||||
"source": "security@opentext.com"
|
||||
"source": "security@opentext.com",
|
||||
"tags": [
|
||||
"Release Notes"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-38135",
|
||||
"sourceIdentifier": "security@opentext.com",
|
||||
"published": "2024-11-22T16:15:19.327",
|
||||
"lastModified": "2024-11-22T16:15:19.327",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-03-04T14:45:17.807",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 4.0
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -53,12 +73,49 @@
|
||||
"value": "CWE-918"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microfocus:imanager:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "3.0",
|
||||
"versionEndIncluding": "3.2.5",
|
||||
"matchCriteriaId": "DF67FDD9-04A4-4B8E-8458-1994CB6AA8F7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microfocus:imanager:3.2.6:-:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9EF246DD-DC88-4C64-903E-79CDC733927A"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.netiq.com/documentation/imanager-32/imanager326_releasenotes/data/imanager326_releasenotes.html",
|
||||
"source": "security@opentext.com"
|
||||
"source": "security@opentext.com",
|
||||
"tags": [
|
||||
"Release Notes"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-26324",
|
||||
"sourceIdentifier": "security@opentext.com",
|
||||
"published": "2024-11-22T16:15:19.470",
|
||||
"lastModified": "2024-11-22T16:15:19.470",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-03-04T14:45:17.807",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,10 +51,30 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microfocus:imanager:3.2.6:-:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9EF246DD-DC88-4C64-903E-79CDC733927A"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.netiq.com/documentation/imanager-32/pdfdoc/imanager326_patch1_releasenotes/imanager326_patch1_releasenotes.pdf",
|
||||
"source": "security@opentext.com"
|
||||
"source": "security@opentext.com",
|
||||
"tags": [
|
||||
"Release Notes"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-4315",
|
||||
"sourceIdentifier": "cve@gitlab.com",
|
||||
"published": "2023-03-08T23:15:10.893",
|
||||
"lastModified": "2024-11-21T07:35:01.163",
|
||||
"lastModified": "2025-03-04T16:15:33.893",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -65,6 +65,16 @@
|
||||
"value": "CWE-863"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-863"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-24466",
|
||||
"sourceIdentifier": "security@opentext.com",
|
||||
"published": "2024-11-22T16:15:19.673",
|
||||
"lastModified": "2024-11-22T16:15:19.673",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-03-04T14:45:17.807",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -51,10 +71,47 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microfocus:imanager:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "3.0",
|
||||
"versionEndExcluding": "3.2.6",
|
||||
"matchCriteriaId": "E63B08F5-5805-41CE-BE93-63BFE4F9F4DD"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microfocus:imanager:3.2.6:-:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9EF246DD-DC88-4C64-903E-79CDC733927A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microfocus:imanager:3.2.6:patch1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "96EDF0C7-9951-4ACD-A1C5-812867CA1294"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microfocus:imanager:3.2.6:patch2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E676C79A-4C37-47DF-A4AF-722AF6AC30A4"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.netiq.com/documentation/imanager-32/pdfdoc/imanager326_patch3_releasenotes/imanager326_patch3_releasenotes.pdf",
|
||||
"source": "security@opentext.com"
|
||||
"source": "security@opentext.com",
|
||||
"tags": [
|
||||
"Release Notes"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-24467",
|
||||
"sourceIdentifier": "security@opentext.com",
|
||||
"published": "2024-11-22T16:15:19.810",
|
||||
"lastModified": "2024-11-22T16:15:19.810",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-03-04T14:45:17.807",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -55,10 +75,47 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microfocus:imanager:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "3.0",
|
||||
"versionEndExcluding": "3.2.6",
|
||||
"matchCriteriaId": "E63B08F5-5805-41CE-BE93-63BFE4F9F4DD"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microfocus:imanager:3.2.6:-:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9EF246DD-DC88-4C64-903E-79CDC733927A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microfocus:imanager:3.2.6:patch1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "96EDF0C7-9951-4ACD-A1C5-812867CA1294"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microfocus:imanager:3.2.6:patch2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E676C79A-4C37-47DF-A4AF-722AF6AC30A4"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.netiq.com/documentation/imanager-32/pdfdoc/imanager326_patch3_releasenotes/imanager326_patch3_releasenotes.pdf",
|
||||
"source": "security@opentext.com"
|
||||
"source": "security@opentext.com",
|
||||
"tags": [
|
||||
"Release Notes"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-26922",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-03-08T16:15:09.470",
|
||||
"lastModified": "2024-11-21T07:52:04.360",
|
||||
"lastModified": "2025-03-04T15:15:17.240",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-11132",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2025-02-03T20:15:32.047",
|
||||
"lastModified": "2025-02-03T20:15:32.047",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-03-04T14:53:43.637",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -19,7 +19,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
|
||||
@ -36,6 +36,19 @@
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:*/AC:*/PR:*/UI:R/S:*/C:*/I:*/A:*",
|
||||
"baseScore": 0.0,
|
||||
"baseSeverity": "NONE",
|
||||
"userInteraction": "REQUIRED"
|
||||
},
|
||||
"exploitabilityScore": 0.0,
|
||||
"impactScore": 0.0
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -51,14 +64,38 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:imithemes:eventer:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndIncluding": "3.9.9",
|
||||
"matchCriteriaId": "3A1C0C08-1A81-479B-B58D-835C48A01F85"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://codecanyon.net/item/eventer-wordpress-event-manager-plugin/20972534",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/2b747d61-4528-485e-b746-6dddc64485b5?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-11133",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2025-02-03T20:15:32.203",
|
||||
"lastModified": "2025-02-03T20:15:32.203",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-03-04T14:53:43.637",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,14 +51,38 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:imithemes:eventer:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndIncluding": "3.9.9",
|
||||
"matchCriteriaId": "3A1C0C08-1A81-479B-B58D-835C48A01F85"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://codecanyon.net/item/eventer-wordpress-event-manager-plugin/20972534",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/1d78b823-fdff-41b2-8059-6564e3eb668d?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-11134",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2025-02-03T20:15:32.373",
|
||||
"lastModified": "2025-02-03T20:15:32.373",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-03-04T14:53:43.637",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -19,7 +19,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -51,14 +71,38 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:imithemes:eventer:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "3.9.9.1",
|
||||
"matchCriteriaId": "C11E43CF-CF13-4AB5-8E9F-3672D6C3EC6D"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://codecanyon.net/item/eventer-wordpress-event-manager-plugin/20972534",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/476bc092-c623-4caf-9676-3036d27c4840?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
78
CVE-2024/CVE-2024-119xx/CVE-2024-11957.json
Normal file
78
CVE-2024/CVE-2024-119xx/CVE-2024-11957.json
Normal file
@ -0,0 +1,78 @@
|
||||
{
|
||||
"id": "CVE-2024-11957",
|
||||
"sourceIdentifier": "security@eset.com",
|
||||
"published": "2025-03-04T16:15:34.927",
|
||||
"lastModified": "2025-03-04T16:15:34.927",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper verification of the digital signature in ksojscore.dll in Kingsoft WPS Office in versions equal or less than 12.1.0.18276\n\n on Windows allows an attacker to load an arbitrary Windows library. The patch released in version 12.2.0.16909 to mitigate CVE-2024-7262 was not restrictive enough."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "security@eset.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:L/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 9.3,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "HIGH",
|
||||
"vulnIntegrityImpact": "HIGH",
|
||||
"vulnAvailabilityImpact": "LOW",
|
||||
"subConfidentialityImpact": "HIGH",
|
||||
"subIntegrityImpact": "HIGH",
|
||||
"subAvailabilityImpact": "HIGH",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@eset.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-347"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.welivesecurity.com/en/eset-research/analysis-of-two-arbitrary-code-execution-vulnerabilities-affecting-wps-office/",
|
||||
"source": "security@eset.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-13685",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2025-03-04T06:15:27.240",
|
||||
"lastModified": "2025-03-04T06:15:27.240",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-03-04T15:15:18.760",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -11,7 +11,30 @@
|
||||
"value": "The Admin and Site Enhancements (ASE) WordPress plugin before 7.6.10 retrieves client IP addresses from potentially untrusted headers, allowing an attacker to manipulate their value to bypass the login limit feature in the Admin and Site Enhancements (ASE) WordPress plugin before 7.6.10."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/72c61904-253d-42d1-9edd-7ea2162a2f85/",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-45598",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-01-27T16:15:31.267",
|
||||
"lastModified": "2025-01-27T16:15:31.267",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-03-04T14:45:17.807",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 4.7
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 4.9,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -51,14 +71,39 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cacti:cacti:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "1.2.29",
|
||||
"matchCriteriaId": "C0B80A90-97E0-49C0-A780-695E17B0568C"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Cacti/cacti/commit/eca52c6bb3e76c55d66b1040baa6dbf37471a0ae",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/Cacti/cacti/security/advisories/GHSA-pv2c-97pp-vxwg",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-48248",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-03-04T08:15:33.550",
|
||||
"lastModified": "2025-03-04T09:15:10.307",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-03-04T16:15:35.150",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -55,6 +55,10 @@
|
||||
{
|
||||
"url": "https://labs.watchtowr.com/the-best-security-is-when-we-all-agree-to-keep-everything-secret-except-the-secrets-nakivo-backup-replication-cve-2024-48248/",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/watchtowrlabs/nakivo-arbitrary-file-read-poc-CVE-2024-48248/?ref=labs.watchtowr.com",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-50302",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-11-19T02:16:32.320",
|
||||
"lastModified": "2024-11-27T15:27:00.187",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2025-03-04T16:15:35.280",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-908"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-908"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-50656",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-03T19:15:12.370",
|
||||
"lastModified": "2025-02-18T19:15:17.930",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-03-04T14:53:43.637",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,15 +15,74 @@
|
||||
"value": "itsourcecode Placement Management System 1.0 es vulnerable a Cross Site Scripting (XSS) a trav\u00e9s del campo Nombre completo en registration.php."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:angeljudesuarez:placement_management_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F16A2F97-B41C-433C-B6F1-B14880A5F029"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/riya98241/CVE/blob/main/CVE-2024-50656",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://itsourcecode.com/free-projects/php-project/placement-management-system-project-in-php-with-source-code/",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
25
CVE-2024/CVE-2024-507xx/CVE-2024-50704.json
Normal file
25
CVE-2024/CVE-2024-507xx/CVE-2024-50704.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2024-50704",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-03-04T16:15:35.480",
|
||||
"lastModified": "2025-03-04T16:15:35.480",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Unauthenticated remote code execution vulnerability in Uniguest Tripleplay before 24.2.1 allows remote attackers to execute arbitrary code via a specially crafted HTTP POST request."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://uniguest.com/cve-bulletins/",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://uniguest.com/wp-content/uploads/2025/02/CVE-2024-50704-Vulnerability-Summary.pdf",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
25
CVE-2024/CVE-2024-507xx/CVE-2024-50705.json
Normal file
25
CVE-2024/CVE-2024-507xx/CVE-2024-50705.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2024-50705",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-03-04T15:15:19.027",
|
||||
"lastModified": "2025-03-04T16:15:35.597",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Unauthenticated reflected cross-site scripting (XSS) vulnerability in Uniguest Tripleplay before 24.2.1 allows remote attackers to execute arbitrary scripts via the page parameter."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://uniguest.com/cve-bulletins/",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://uniguest.com/wp-content/uploads/2025/02/CVE-2024-50705-Vulnerability-Summary.pdf",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
25
CVE-2024/CVE-2024-507xx/CVE-2024-50706.json
Normal file
25
CVE-2024/CVE-2024-507xx/CVE-2024-50706.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2024-50706",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-03-04T15:15:19.290",
|
||||
"lastModified": "2025-03-04T15:15:19.290",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Unauthenticated SQL injection vulnerability in Uniguest Tripleplay before 24.2.1 allows remote attackers to execute arbitrary SQL queries on the backend database."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://uniguest.com/cve-bulletins/",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://uniguest.com/wp-content/uploads/2025/02/CVE-2024-50706-Vulnerability-Summary.pdf",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
25
CVE-2024/CVE-2024-507xx/CVE-2024-50707.json
Normal file
25
CVE-2024/CVE-2024-507xx/CVE-2024-50707.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2024-50707",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-03-04T16:15:35.733",
|
||||
"lastModified": "2025-03-04T16:15:35.733",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Unauthenticated remote code execution vulnerability in Uniguest Tripleplay before 24.2.1 allows remote attackers to execute arbitrary code via the X-Forwarded-For header in an HTTP GET request."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://uniguest.com/cve-bulletins/",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://uniguest.com/wp-content/uploads/2025/02/CVE-2024-50707-Vulnerability-Summary.pdf",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-53944",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-27T20:16:01.887",
|
||||
"lastModified": "2025-02-27T20:16:01.887",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-03-04T15:15:19.667",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Se descubri\u00f3 un problema en los dispositivos Tuoshi/Dionlink LT15D 4G Wi-Fi a trav\u00e9s de M7628NNxlSPv2xUI_v1.0.1802.10.08_P4 y en los dispositivos LT21B a trav\u00e9s de M7628xUSAxUIv2_v1.0.1481.15.02_P0. Un atacante remoto no autenticado con acceso a la red puede aprovechar una vulnerabilidad de inyecci\u00f3n de comandos. El endpoint /goform/formJsonAjaxReq no pueden depurar los metacaracteres del shell enviados a trav\u00e9s de par\u00e1metros JSON, lo que permite a los atacantes ejecutar comandos arbitrarios del sistema operativo con privilegios de superusuario."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-94"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://www.tuoshi.net/productview.asp?id=218",
|
||||
@ -36,6 +71,10 @@
|
||||
{
|
||||
"url": "https://github.com/actuator/cve/blob/main/Tuoshi/Firmware-M7628NNxISPv2xUI_v1.0.1802.10.08_P4-Blind-CMD-Injection-unauth-WAN.gif",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/actuator/cve/blob/main/Tuoshi/CVE-2024-53944-Whitepaper.pdf",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-54145",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-01-27T17:15:16.240",
|
||||
"lastModified": "2025-01-27T17:15:16.240",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-03-04T14:45:17.807",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -51,14 +71,39 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cacti:cacti:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "1.2.29",
|
||||
"matchCriteriaId": "C0B80A90-97E0-49C0-A780-695E17B0568C"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Cacti/cacti/commit/c7e4ee798d263a3209ae6e7ba182c7b65284d8f0",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/Cacti/cacti/security/advisories/GHSA-fh3x-69rr-qqpp",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-54146",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-01-27T17:15:16.380",
|
||||
"lastModified": "2025-01-27T17:15:16.380",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-03-04T14:45:17.807",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 4.7
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -51,14 +71,39 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cacti:cacti:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "1.2.29",
|
||||
"matchCriteriaId": "C0B80A90-97E0-49C0-A780-695E17B0568C"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Cacti/cacti/commit/c7e4ee798d263a3209ae6e7ba182c7b65284d8f0",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/Cacti/cacti/security/advisories/GHSA-vj9g-p7f2-4wqj",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-57040",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-26T22:15:14.240",
|
||||
"lastModified": "2025-02-26T22:15:14.240",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-03-04T15:15:20.283",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Se descubri\u00f3 que TL-WR845N(UN)_V4_200909 y TL-WR845N(UN)_V4_190219 contienen una contrase\u00f1a codificada para la cuenta ra\u00edz que se puede obtener mediante un ataque de fuerza bruta."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-798"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://security.iiita.ac.in/iot/hashed_password.pdf",
|
||||
|
56
CVE-2024/CVE-2024-91xx/CVE-2024-9149.json
Normal file
56
CVE-2024/CVE-2024-91xx/CVE-2024-9149.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-9149",
|
||||
"sourceIdentifier": "iletisim@usom.gov.tr",
|
||||
"published": "2025-03-04T15:15:22.530",
|
||||
"lastModified": "2025-03-04T15:15:22.530",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Wind Media E-Commerce Website Template allows SQL Injection.This issue affects E-Commerce Website Template: before v1.5."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "iletisim@usom.gov.tr",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L",
|
||||
"baseScore": 8.6,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 4.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "iletisim@usom.gov.tr",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.usom.gov.tr/bildirim/tr-25-0051",
|
||||
"source": "iletisim@usom.gov.tr"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-0285",
|
||||
"sourceIdentifier": "cret@cert.org",
|
||||
"published": "2025-03-03T17:15:13.430",
|
||||
"lastModified": "2025-03-03T17:15:13.430",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-03-04T16:15:36.020",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "Paragon Partition Manager version 7.9.1 contains an arbitrary kernel memory mapping vulnerability within biontdrv.sys that is caused by a failure to properly validate the length of user supplied data, which can allow an attacker to perform privilege escalation exploits."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-20"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://paragon-software.zendesk.com/hc/en-us/articles/32993902732817-IMPORTANT-Paragon-Driver-Security-Patch-for-All-Products-of-Hard-Disk-Manager-Product-Line-Biontdrv-sys",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-0286",
|
||||
"sourceIdentifier": "cret@cert.org",
|
||||
"published": "2025-03-03T17:15:13.537",
|
||||
"lastModified": "2025-03-03T17:15:13.537",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-03-04T16:15:36.167",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "Paragon Partition Manager version 7.9.1 contains an arbitrary kernel memory write vulnerability within biontdrv.sys that is caused by a failure to properly validate the length of user supplied data, which can allow an attacker to execute arbitrary code on the victim machine."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.4,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.5,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://paragon-software.zendesk.com/hc/en-us/articles/32993902732817-IMPORTANT-Paragon-Driver-Security-Patch-for-All-Products-of-Hard-Disk-Manager-Product-Line-Biontdrv-sys",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-0288",
|
||||
"sourceIdentifier": "cret@cert.org",
|
||||
"published": "2025-03-03T17:15:13.823",
|
||||
"lastModified": "2025-03-03T17:15:13.823",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-03-04T16:15:36.317",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "Paragon Partition Manager version 7.9.1 contains an arbitrary kernel memory vulnerability facilitated by the memmove function, which does not validate or sanitize user controlled input, allowing an attacker the ability to write arbitrary kernel memory and perform privilege escalation."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-131"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://paragon-software.zendesk.com/hc/en-us/articles/32993902732817-IMPORTANT-Paragon-Driver-Security-Patch-for-All-Products-of-Hard-Disk-Manager-Product-Line-Biontdrv-sys",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-0289",
|
||||
"sourceIdentifier": "cret@cert.org",
|
||||
"published": "2025-03-03T17:15:13.943",
|
||||
"lastModified": "2025-03-03T17:15:13.943",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-03-04T16:15:36.467",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "Paragon Partition Manager version 17, both community and Business versions, contain an insecure kernel resource access vulnerability facilitated by the driver not validating the MappedSystemVa pointer before passing it to HalReturnToFirmware, which can allows an attacker the ability to compromise the service."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-20"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://paragon-software.zendesk.com/hc/en-us/articles/32993902732817-IMPORTANT-Paragon-Driver-Security-Patch-for-All-Products-of-Hard-Disk-Manager-Product-Line-Biontdrv-sys",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-0840",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-01-29T20:15:35.007",
|
||||
"lastModified": "2025-01-29T20:15:35.007",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-03-04T14:53:43.637",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -63,7 +63,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L",
|
||||
@ -80,6 +80,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.6,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.6,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -122,36 +142,90 @@
|
||||
"value": "CWE-121"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:binutils:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "2.44",
|
||||
"matchCriteriaId": "9C3991B6-45EB-4A22-A984-3403405E378D"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://sourceware.org/bugzilla/attachment.cgi?id=15882",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://sourceware.org/bugzilla/show_bug.cgi?id=32560",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=baac6c221e9d69335bf41366a1c7d87d8ab2f893",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.293997",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.293997",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.485255",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.gnu.org/",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-1106",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-02-07T19:15:24.613",
|
||||
"lastModified": "2025-02-07T19:15:24.613",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-03-04T14:53:43.637",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -63,7 +63,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
|
||||
@ -80,6 +80,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.5
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -120,22 +140,55 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cmseasy:cmseasy:7.7.7.9:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C47FE864-5B8E-428F-80DC-AA29EDB454DA"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Sinon2003/cve/blob/main/CmsEasy/CmsEasyPathTraversal-2.md",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.294939",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.294939",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.491518",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-1147",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-02-10T14:15:29.643",
|
||||
"lastModified": "2025-02-10T14:15:29.643",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-03-04T14:53:43.637",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -63,7 +63,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L",
|
||||
@ -80,6 +80,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.6,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.6,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -122,32 +142,82 @@
|
||||
"value": "CWE-120"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-120"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:binutils:2.43:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "41E442CC-ADC3-46D7-BC3C-AF5210AA9C04"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://sourceware.org/bugzilla/attachment.cgi?id=15881",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://sourceware.org/bugzilla/show_bug.cgi?id=32556",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.295051",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.295051",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.485254",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry",
|
||||
"Exploit"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.gnu.org/",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-1149",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-02-10T15:15:13.093",
|
||||
"lastModified": "2025-02-10T15:15:13.093",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-03-04T14:53:43.637",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -63,6 +63,26 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L",
|
||||
"baseScore": 3.1,
|
||||
"baseSeverity": "LOW",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 1.6,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
@ -124,26 +144,61 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:binutils:2.43:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "41E442CC-ADC3-46D7-BC3C-AF5210AA9C04"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://sourceware.org/bugzilla/attachment.cgi?id=15887",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://sourceware.org/bugzilla/show_bug.cgi?id=32576",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.295053",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.295053",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.gnu.org/",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
78
CVE-2025/CVE-2025-14xx/CVE-2025-1424.json
Normal file
78
CVE-2025/CVE-2025-14xx/CVE-2025-1424.json
Normal file
@ -0,0 +1,78 @@
|
||||
{
|
||||
"id": "CVE-2025-1424",
|
||||
"sourceIdentifier": "vulnerability@ncsc.ch",
|
||||
"published": "2025-03-04T16:15:36.663",
|
||||
"lastModified": "2025-03-04T16:15:36.663",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A privilege escalation vulnerability in PocketBook InkPad Color 3 allows attackers to escalate to root privileges if they gain physical access to the device.\nThis issue affects InkPad Color 3 in version U743k3.6.8.3671."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "vulnerability@ncsc.ch",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 8.6,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "PHYSICAL",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "HIGH",
|
||||
"vulnIntegrityImpact": "HIGH",
|
||||
"vulnAvailabilityImpact": "HIGH",
|
||||
"subConfidentialityImpact": "HIGH",
|
||||
"subIntegrityImpact": "HIGH",
|
||||
"subAvailabilityImpact": "HIGH",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "vulnerability@ncsc.ch",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-269"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.redguard.ch/blog/2025/03/04/security-advisory-pocketbook-inkpad-color-3/",
|
||||
"source": "vulnerability@ncsc.ch"
|
||||
}
|
||||
]
|
||||
}
|
78
CVE-2025/CVE-2025-14xx/CVE-2025-1425.json
Normal file
78
CVE-2025/CVE-2025-14xx/CVE-2025-1425.json
Normal file
@ -0,0 +1,78 @@
|
||||
{
|
||||
"id": "CVE-2025-1425",
|
||||
"sourceIdentifier": "vulnerability@ncsc.ch",
|
||||
"published": "2025-03-04T16:15:36.803",
|
||||
"lastModified": "2025-03-04T16:15:36.803",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A Sudo privilege misconfiguration vulnerability in PocketBook InkPad Color 3 on Linux, ARM allows attackers to read file contents on the device.This issue affects InkPad Color 3: U743k3.6.8.3671."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "vulnerability@ncsc.ch",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 4.7,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "PHYSICAL",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "LOW",
|
||||
"vulnIntegrityImpact": "NONE",
|
||||
"vulnAvailabilityImpact": "NONE",
|
||||
"subConfidentialityImpact": "HIGH",
|
||||
"subIntegrityImpact": "HIGH",
|
||||
"subAvailabilityImpact": "HIGH",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "vulnerability@ncsc.ch",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-269"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.redguard.ch/blog/2025/03/04/security-advisory-pocketbook-inkpad-color-3/",
|
||||
"source": "vulnerability@ncsc.ch"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-1902",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-03-04T04:15:12.210",
|
||||
"lastModified": "2025-03-04T04:15:12.210",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-03-04T16:15:37.450",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -59,7 +59,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||||
@ -107,7 +107,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -140,6 +140,10 @@
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.506623",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/panghuanjie/Code-audits/issues/3",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-1903",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-03-04T04:15:12.383",
|
||||
"lastModified": "2025-03-04T04:15:12.383",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-03-04T16:15:37.577",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -59,7 +59,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||||
@ -107,7 +107,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -136,6 +136,10 @@
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.506667",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/takakie/CVE/blob/main/cve_3.md",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-1904",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-03-04T05:15:14.440",
|
||||
"lastModified": "2025-03-04T05:15:14.440",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-03-04T16:15:37.700",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -59,7 +59,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
|
||||
@ -107,7 +107,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -140,6 +140,10 @@
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.506868",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/lokihardk/cve/blob/main/xss-2_25.md",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-1905",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-03-04T05:15:14.680",
|
||||
"lastModified": "2025-03-04T05:15:14.680",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-03-04T15:15:24.033",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -59,7 +59,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
|
||||
@ -107,7 +107,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -140,6 +140,10 @@
|
||||
{
|
||||
"url": "https://www.sourcecodester.com/",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/sorcha-l/cve/blob/main/Employee%20Management%20System%20by%20rems%20has%20xss.md",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-1906",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-03-04T05:15:14.903",
|
||||
"lastModified": "2025-03-04T05:15:14.903",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-03-04T15:15:24.233",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -59,7 +59,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L",
|
||||
@ -107,7 +107,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -140,6 +140,10 @@
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.508915",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/HaroldFinch-L/CVE/issues/2",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-1933",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2025-03-04T14:15:38.170",
|
||||
"lastModified": "2025-03-04T14:15:38.170",
|
||||
"lastModified": "2025-03-04T16:15:37.823",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "On 64-bit CPUs, when the JIT compiles WASM i32 return values they can pick up bits from left over memory. This can potentially cause them to be treated as a different type. This vulnerability affects Firefox < 136, Firefox ESR < 115.21, and Firefox ESR < 128.8."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H",
|
||||
"baseScore": 8.1,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-252"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1946004",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-1934",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2025-03-04T14:15:38.273",
|
||||
"lastModified": "2025-03-04T14:15:38.273",
|
||||
"lastModified": "2025-03-04T16:15:37.970",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "It was possible to interrupt the processing of a RegExp bailout and run additional JavaScript, potentially triggering garbage collection when the engine was not expecting it. This vulnerability affects Firefox < 136 and Firefox ESR < 128.8."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 2.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-185"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1942881",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-1935",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2025-03-04T14:15:38.390",
|
||||
"lastModified": "2025-03-04T14:15:38.390",
|
||||
"lastModified": "2025-03-04T16:15:38.110",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "A web page could trick a user into setting that site as the default handler for a custom URL protocol. This vulnerability affects Firefox < 136 and Firefox ESR < 128.8."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-451"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1866661",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-1940",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2025-03-04T14:15:38.950",
|
||||
"lastModified": "2025-03-04T14:15:38.950",
|
||||
"lastModified": "2025-03-04T16:15:38.310",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "A select option could partially obscure the confirmation prompt shown before launching external apps. This could be used to trick a user in to launching an external app unexpectedly. \n*This issue only affects Android versions of Firefox.* This vulnerability affects Firefox < 136."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 4.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-1021"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1908488",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-1941",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2025-03-04T14:15:39.063",
|
||||
"lastModified": "2025-03-04T14:15:39.063",
|
||||
"lastModified": "2025-03-04T16:15:38.457",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "Under certain circumstances, a user opt-in setting that Focus should require authentication before use could have been be bypassed (distinct from CVE-2025-0245). This vulnerability affects Firefox < 136."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
|
||||
"baseScore": 9.1,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-284"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1944665",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-1942",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2025-03-04T14:15:39.167",
|
||||
"lastModified": "2025-03-04T14:15:39.167",
|
||||
"lastModified": "2025-03-04T16:15:38.607",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "When String.toUpperCase() caused a string to get longer it was possible for uninitialized memory to be incorporated into the result string This vulnerability affects Firefox < 136."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 2.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-908"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1947139",
|
||||
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2025-1943",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2025-03-04T14:15:39.260",
|
||||
"lastModified": "2025-03-04T14:15:39.260",
|
||||
"lastModified": "2025-03-04T15:15:24.493",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Memory safety bugs present in Firefox 135 and Thunderbird 135. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 136."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Vulnerabilidades de seguridad en la gesti\u00f3n de memoria presentes en Firefox 135 y Thunderbird 135. Algunas de estas vulnerabilidades muestran evidencia de corrupci\u00f3n en la memoria y se presume que, con suficiente esfuerzo, algunas de ellas podr\u00edan ser explotadas para ejecutar c\u00f3digo arbitrario. Esta vulnerabilidad afecta a Firefox < 136."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
|
||||
"baseScore": 8.2,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 4.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-122"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1869650%2C1938451%2C1940326%2C1944052%2C1944063%2C1947281",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-21181",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2025-02-11T18:15:29.553",
|
||||
"lastModified": "2025-02-25T16:58:10.650",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2025-03-04T15:15:26.497",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -19,7 +19,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "secure@microsoft.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
@ -202,6 +202,14 @@
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.vicarius.io/vsociety/posts/cve-2025-21181-denial-of-service-vulnerability-in-microsoft-message-queuing-detection-script",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
},
|
||||
{
|
||||
"url": "https://www.vicarius.io/vsociety/posts/cve-2025-21181-denial-of-service-vulnerability-in-microsoft-message-queuing-mitigation-script",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-21399",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2025-01-17T20:15:46.117",
|
||||
"lastModified": "2025-01-31T02:15:37.700",
|
||||
"lastModified": "2025-03-04T15:15:28.007",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -42,7 +42,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "secure@microsoft.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -52,7 +52,7 @@
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -65,6 +65,14 @@
|
||||
{
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21399",
|
||||
"source": "secure@microsoft.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.vicarius.io/vsociety/posts/elevation-of-privilege-vulnerability-in-microsoft-edge-chromium-based-detection-script",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
},
|
||||
{
|
||||
"url": "https://www.vicarius.io/vsociety/posts/elevation-of-privilege-vulnerability-in-microsoft-edge-chromium-based-mitigation-script",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-22224",
|
||||
"sourceIdentifier": "security@vmware.com",
|
||||
"published": "2025-03-04T12:15:33.687",
|
||||
"lastModified": "2025-03-04T12:15:33.687",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-03-04T16:15:38.850",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -35,6 +35,18 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-367"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25390",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-22225",
|
||||
"sourceIdentifier": "security@vmware.com",
|
||||
"published": "2025-03-04T12:15:33.840",
|
||||
"lastModified": "2025-03-04T12:15:33.840",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-03-04T16:15:38.970",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -35,6 +35,18 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-123"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25390",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-22226",
|
||||
"sourceIdentifier": "security@vmware.com",
|
||||
"published": "2025-03-04T12:15:33.973",
|
||||
"lastModified": "2025-03-04T12:15:33.973",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-03-04T16:15:39.097",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -35,6 +35,18 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-125"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25390",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-22402",
|
||||
"sourceIdentifier": "security_alert@emc.com",
|
||||
"published": "2025-02-07T03:15:12.287",
|
||||
"lastModified": "2025-02-07T03:15:12.287",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-03-04T14:53:43.637",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,25 +36,77 @@
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security_alert@emc.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-80"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:dell:update_manager_plugin:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "1.5.0",
|
||||
"versionEndExcluding": "1.7.0",
|
||||
"matchCriteriaId": "11CA0695-4DAC-42AE-A7FA-E237E198490B"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.dell.com/support/kbdoc/en-us/000281885/dsa-2025-047-security-update-for-dell-update-manager-plugin-vulnerability",
|
||||
"source": "security_alert@emc.com"
|
||||
"source": "security_alert@emc.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-22604",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-01-27T17:15:17.307",
|
||||
"lastModified": "2025-01-27T17:15:17.307",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-03-04T14:45:17.807",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 6.0
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.2,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -51,14 +71,39 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cacti:cacti:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "1.2.29",
|
||||
"matchCriteriaId": "C0B80A90-97E0-49C0-A780-695E17B0568C"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Cacti/cacti/commit/c7e4ee798d263a3209ae6e7ba182c7b65284d8f0",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/Cacti/cacti/security/advisories/GHSA-c5j8-jxj3-hh36",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-23208",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-01-17T23:15:13.107",
|
||||
"lastModified": "2025-01-17T23:15:13.107",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-03-04T14:45:17.807",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,20 +69,58 @@
|
||||
"value": "CWE-269"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:zotregistry:zot:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "2.1.2",
|
||||
"matchCriteriaId": "60B19393-9C0C-4BF9-98A3-C9E553BCEA48"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/project-zot/zot/blob/5e30fec65c49e3139907e2819ccb39b2e3bd784e/pkg/meta/boltdb/boltdb.go#L1665",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/project-zot/zot/commit/002ac62d8a15bf0cba010b3ba7bde86f9837b613",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/project-zot/zot/security/advisories/GHSA-c9p4-xwr9-rfhx",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2025/CVE-2025-233xx/CVE-2025-23368.json
Normal file
60
CVE-2025/CVE-2025-233xx/CVE-2025-23368.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2025-23368",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2025-03-04T16:15:39.270",
|
||||
"lastModified": "2025-03-04T16:15:39.270",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A flaw was found in Wildfly Elytron integration. The component does not implement sufficient measures to prevent multiple failed authentication attempts within a short time frame, making it more susceptible to brute force attacks via CLI."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "secalert@redhat.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.1,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "secalert@redhat.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-307"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2025-23368",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2337621",
|
||||
"source": "secalert@redhat.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,20 +2,63 @@
|
||||
"id": "CVE-2025-25379",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-28T23:15:10.790",
|
||||
"lastModified": "2025-02-28T23:15:10.790",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-03-04T16:15:39.433",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cross Site Request Forgery vulnerability in 07FLYCMS v.1.3.9 allows a remote attacker to execute arbitrary code via the id parameter of the del.html component."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "La vulnerabilidad de Cross Site Request Forgery en 07FLYCMS v.1.3.9 permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s del par\u00e1metro id del componente del.html."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
|
||||
"baseScore": 9.6,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 6.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/R2og/Sun-jialiang/tree/main/9/readme.md",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/R2og/Sun-jialiang/tree/main/9/readme.md",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2025-25428",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-28T19:15:36.773",
|
||||
"lastModified": "2025-02-28T19:15:36.773",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-03-04T16:15:39.597",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "TRENDnet TEW-929DRU 1.0.0.10 was discovered to contain a hardcoded password vulnerability in /etc/shadow, which allows attackers to log in as root."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se descubri\u00f3 que TRENDnet TEW-929DRU 1.0.0.10 contiene una vulnerabilidad de contrase\u00f1a codificada en /etc/shadow, que permite a los atacantes iniciar sesi\u00f3n como superusuario."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.0,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-259"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://instinctive-acapella-fc7.notion.site/Trendnet-TEW-929DRU-Hardcoded-password-17815d9d4d2680d5a2becf32425d93fd",
|
||||
|
@ -2,20 +2,63 @@
|
||||
"id": "CVE-2025-25430",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-28T18:15:28.263",
|
||||
"lastModified": "2025-02-28T18:15:28.263",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-03-04T16:15:39.763",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Trendnet TEW-929DRU 1.0.0.10 contains a Stored Cross-site Scripting (XSS) vulnerability via the configname parameter on the /cbi_addcert.htm page."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Trendnet TEW-929DRU 1.0.0.10 contiene una vulnerabilidad de Cross-site Scripting (XSS) Almacenado a trav\u00e9s del par\u00e1metro configname en la p\u00e1gina /cbi_addcert.htm."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 4.8,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.7,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://instinctive-acapella-fc7.notion.site/Trendnet-TEW-929DRU-XSS-17a15d9d4d2680fbb72ced0a02a64875",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://instinctive-acapella-fc7.notion.site/Trendnet-TEW-929DRU-XSS-17a15d9d4d2680fbb72ced0a02a64875",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,20 +2,63 @@
|
||||
"id": "CVE-2025-25431",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-28T18:15:28.407",
|
||||
"lastModified": "2025-02-28T18:15:28.407",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-03-04T16:15:39.917",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Trendnet TEW-929DRU 1.0.0.10 contains a Stored Cross-site Scripting (XSS) vulnerability via the The ssid key of wifi_data parameter on the /captive_portal.htm page."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Trendnet TEW-929DRU 1.0.0.10 contiene una vulnerabilidad de Cross-site Scripting (XSS) Almacenado a trav\u00e9s de la clave ssid del par\u00e1metro wifi_data en la p\u00e1gina /captive_portal.htm."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 4.8,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.7,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://instinctive-acapella-fc7.notion.site/Trendnet-TEW-929DRU-XSS-17b15d9d4d26806a90f3d830a6143ebe",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://instinctive-acapella-fc7.notion.site/Trendnet-TEW-929DRU-XSS-17b15d9d4d26806a90f3d830a6143ebe",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,20 +2,63 @@
|
||||
"id": "CVE-2025-25476",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-28T23:15:11.063",
|
||||
"lastModified": "2025-02-28T23:15:11.063",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-03-04T16:15:40.080",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A stored cross-site scripting (XSS) vulnerability in SysPass 3.2.x allows a malicious user with elevated privileges to execute arbitrary Javascript code by specifying a malicious XSS payload as a notification type or notification component."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Una vulnerabilidad de cross-site scripting (XSS) almacenado en SysPass 3.2.x permite que un usuario malintencionado con privilegios elevados ejecute c\u00f3digo Javascript arbitrario al especificar un payload XSS malicioso como un tipo de notificaci\u00f3n o un componente de notificaci\u00f3n."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/sysentr0py/CVEs/tree/main/CVE-2025-25476",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/sysentr0py/CVEs/tree/main/CVE-2025-25476",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-25759",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-27T15:15:41.570",
|
||||
"lastModified": "2025-02-27T15:15:41.570",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-03-04T15:15:28.353",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,7 +15,46 @@
|
||||
"value": "Un problema en el componente admin_template.php de SUCMS v1.0 permite a los atacantes ejecutar un directory traversal y la eliminaci\u00f3n arbitraria de archivos a trav\u00e9s de una solicitud GET manipulada espec\u00edficamente."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-22"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-552"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/147536951/Qianyi-learn/blob/main/SUCMS.pdf",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-25760",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-27T15:15:41.670",
|
||||
"lastModified": "2025-02-27T15:15:41.670",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-03-04T15:15:28.590",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Server-Side Request Forgery (SSRF) en el componente admin_webgather.php de SUCMS v1.0 permite a los atacantes acceder a datos y servicios internos a trav\u00e9s de una solicitud GET manipulada."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-918"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/147536951/Qianyi-learn/blob/main/SUCMS2.pdf",
|
||||
|
29
CVE-2025/CVE-2025-263xx/CVE-2025-26320.json
Normal file
29
CVE-2025/CVE-2025-263xx/CVE-2025-26320.json
Normal file
@ -0,0 +1,29 @@
|
||||
{
|
||||
"id": "CVE-2025-26320",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-03-04T16:15:40.240",
|
||||
"lastModified": "2025-03-04T16:15:40.240",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "t0mer BroadlinkManager v5.9.1 was discovered to contain an OS command injection vulnerability via the IP Address parameter at /device/ping."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/BaranTeyin1/vulnerability-research/tree/main/CVE-2025-26320",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/t0mer/broadlinkmanager-docker",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/t0mer/broadlinkmanager-docker/blob/master/broadlinkmanager/broadlinkmanager.py#L639-L657",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-26849",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-03-04T09:15:10.917",
|
||||
"lastModified": "2025-03-04T09:15:10.917",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-03-04T16:15:40.360",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -55,6 +55,10 @@
|
||||
{
|
||||
"url": "https://www.redteam-pentesting.de/en/advisories/rt-sa-2024-012/",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.redteam-pentesting.de/en/advisories/rt-sa-2024-012/",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
94
CVE-2025/CVE-2025-271xx/CVE-2025-27111.json
Normal file
94
CVE-2025/CVE-2025-271xx/CVE-2025-27111.json
Normal file
@ -0,0 +1,94 @@
|
||||
{
|
||||
"id": "CVE-2025-27111",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-03-04T16:15:40.487",
|
||||
"lastModified": "2025-03-04T16:15:40.487",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Rack is a modular Ruby web server interface. The Rack::Sendfile middleware logs unsanitised header values from the X-Sendfile-Type header. An attacker can exploit this by injecting escape sequences (such as newline characters) into the header, resulting in log injection. This vulnerability is fixed in 2.2.12, 3.0.13, and 3.1.11."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 6.9,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "NONE",
|
||||
"vulnIntegrityImpact": "LOW",
|
||||
"vulnAvailabilityImpact": "NONE",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-93"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-117"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/rack/rack/commit/803aa221e8302719715e224f4476e438f2531a53",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/rack/rack/commit/aeac570bb8080ca7b53b7f2e2f67498be7ebd30b",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/rack/rack/commit/b13bc6bfc7506aca3478dc5ac1c2ec6fc53f82a3",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/rack/rack/security/advisories/GHSA-8cgq-6mh2-7j6v",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-27424",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2025-03-04T14:15:39.397",
|
||||
"lastModified": "2025-03-04T14:15:39.397",
|
||||
"lastModified": "2025-03-04T16:15:40.647",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "Websites redirecting to a non-HTTP scheme URL could allow a website address to be spoofed for a malicious page This vulnerability affects Firefox for iOS < 136."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-601"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1945392",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-27425",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2025-03-04T14:15:39.493",
|
||||
"lastModified": "2025-03-04T14:15:39.493",
|
||||
"lastModified": "2025-03-04T16:15:40.797",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "Scanning certain QR codes that included text with a website URL could allow the URL to be opened without presenting the user with a confirmation alert first This vulnerability affects Firefox for iOS < 136."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-287"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1941525",
|
||||
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2025-27426",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2025-03-04T14:15:39.593",
|
||||
"lastModified": "2025-03-04T14:15:39.593",
|
||||
"lastModified": "2025-03-04T16:15:40.933",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Malicious websites utilizing a server-side redirect to an internal error page could result in a spoofed website URL This vulnerability affects Firefox for iOS < 136."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Sitios web maliciosos que utilicen una redirecci\u00f3n del lado del servidor a una p\u00e1gina de error interno podr\u00edan permitir mostrar una URL falsa para el sitio web. Esta vulnerabilidad afecta a Firefox para iOS < 136."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-601"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1933079",
|
||||
|
69
README.md
69
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2025-03-04T15:00:20.197668+00:00
|
||||
2025-03-04T17:00:19.916462+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2025-03-04T14:15:39.593000+00:00
|
||||
2025-03-04T16:15:40.933000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,42 +33,55 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
284072
|
||||
284083
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `18`
|
||||
Recently added CVEs: `11`
|
||||
|
||||
- [CVE-2025-1925](CVE-2025/CVE-2025-19xx/CVE-2025-1925.json) (`2025-03-04T14:15:36.717`)
|
||||
- [CVE-2025-1930](CVE-2025/CVE-2025-19xx/CVE-2025-1930.json) (`2025-03-04T14:15:37.850`)
|
||||
- [CVE-2025-1931](CVE-2025/CVE-2025-19xx/CVE-2025-1931.json) (`2025-03-04T14:15:37.963`)
|
||||
- [CVE-2025-1932](CVE-2025/CVE-2025-19xx/CVE-2025-1932.json) (`2025-03-04T14:15:38.053`)
|
||||
- [CVE-2025-1933](CVE-2025/CVE-2025-19xx/CVE-2025-1933.json) (`2025-03-04T14:15:38.170`)
|
||||
- [CVE-2025-1934](CVE-2025/CVE-2025-19xx/CVE-2025-1934.json) (`2025-03-04T14:15:38.273`)
|
||||
- [CVE-2025-1935](CVE-2025/CVE-2025-19xx/CVE-2025-1935.json) (`2025-03-04T14:15:38.390`)
|
||||
- [CVE-2025-1936](CVE-2025/CVE-2025-19xx/CVE-2025-1936.json) (`2025-03-04T14:15:38.500`)
|
||||
- [CVE-2025-1937](CVE-2025/CVE-2025-19xx/CVE-2025-1937.json) (`2025-03-04T14:15:38.610`)
|
||||
- [CVE-2025-1938](CVE-2025/CVE-2025-19xx/CVE-2025-1938.json) (`2025-03-04T14:15:38.730`)
|
||||
- [CVE-2025-1939](CVE-2025/CVE-2025-19xx/CVE-2025-1939.json) (`2025-03-04T14:15:38.837`)
|
||||
- [CVE-2025-1940](CVE-2025/CVE-2025-19xx/CVE-2025-1940.json) (`2025-03-04T14:15:38.950`)
|
||||
- [CVE-2025-1941](CVE-2025/CVE-2025-19xx/CVE-2025-1941.json) (`2025-03-04T14:15:39.063`)
|
||||
- [CVE-2025-1942](CVE-2025/CVE-2025-19xx/CVE-2025-1942.json) (`2025-03-04T14:15:39.167`)
|
||||
- [CVE-2025-1943](CVE-2025/CVE-2025-19xx/CVE-2025-1943.json) (`2025-03-04T14:15:39.260`)
|
||||
- [CVE-2025-27424](CVE-2025/CVE-2025-274xx/CVE-2025-27424.json) (`2025-03-04T14:15:39.397`)
|
||||
- [CVE-2025-27425](CVE-2025/CVE-2025-274xx/CVE-2025-27425.json) (`2025-03-04T14:15:39.493`)
|
||||
- [CVE-2025-27426](CVE-2025/CVE-2025-274xx/CVE-2025-27426.json) (`2025-03-04T14:15:39.593`)
|
||||
- [CVE-2024-11957](CVE-2024/CVE-2024-119xx/CVE-2024-11957.json) (`2025-03-04T16:15:34.927`)
|
||||
- [CVE-2024-50704](CVE-2024/CVE-2024-507xx/CVE-2024-50704.json) (`2025-03-04T16:15:35.480`)
|
||||
- [CVE-2024-50705](CVE-2024/CVE-2024-507xx/CVE-2024-50705.json) (`2025-03-04T15:15:19.027`)
|
||||
- [CVE-2024-50706](CVE-2024/CVE-2024-507xx/CVE-2024-50706.json) (`2025-03-04T15:15:19.290`)
|
||||
- [CVE-2024-50707](CVE-2024/CVE-2024-507xx/CVE-2024-50707.json) (`2025-03-04T16:15:35.733`)
|
||||
- [CVE-2024-9149](CVE-2024/CVE-2024-91xx/CVE-2024-9149.json) (`2025-03-04T15:15:22.530`)
|
||||
- [CVE-2025-1424](CVE-2025/CVE-2025-14xx/CVE-2025-1424.json) (`2025-03-04T16:15:36.663`)
|
||||
- [CVE-2025-1425](CVE-2025/CVE-2025-14xx/CVE-2025-1425.json) (`2025-03-04T16:15:36.803`)
|
||||
- [CVE-2025-23368](CVE-2025/CVE-2025-233xx/CVE-2025-23368.json) (`2025-03-04T16:15:39.270`)
|
||||
- [CVE-2025-26320](CVE-2025/CVE-2025-263xx/CVE-2025-26320.json) (`2025-03-04T16:15:40.240`)
|
||||
- [CVE-2025-27111](CVE-2025/CVE-2025-271xx/CVE-2025-27111.json) (`2025-03-04T16:15:40.487`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `5`
|
||||
Recently modified CVEs: `62`
|
||||
|
||||
- [CVE-2024-11955](CVE-2024/CVE-2024-119xx/CVE-2024-11955.json) (`2025-03-04T13:49:18.880`)
|
||||
- [CVE-2025-1893](CVE-2025/CVE-2025-18xx/CVE-2025-1893.json) (`2025-03-04T13:15:10.063`)
|
||||
- [CVE-2025-21626](CVE-2025/CVE-2025-216xx/CVE-2025-21626.json) (`2025-03-04T13:49:18.880`)
|
||||
- [CVE-2025-21627](CVE-2025/CVE-2025-216xx/CVE-2025-21627.json) (`2025-03-04T13:49:18.880`)
|
||||
- [CVE-2025-23024](CVE-2025/CVE-2025-230xx/CVE-2025-23024.json) (`2025-03-04T13:49:18.880`)
|
||||
- [CVE-2025-1934](CVE-2025/CVE-2025-19xx/CVE-2025-1934.json) (`2025-03-04T16:15:37.970`)
|
||||
- [CVE-2025-1935](CVE-2025/CVE-2025-19xx/CVE-2025-1935.json) (`2025-03-04T16:15:38.110`)
|
||||
- [CVE-2025-1940](CVE-2025/CVE-2025-19xx/CVE-2025-1940.json) (`2025-03-04T16:15:38.310`)
|
||||
- [CVE-2025-1941](CVE-2025/CVE-2025-19xx/CVE-2025-1941.json) (`2025-03-04T16:15:38.457`)
|
||||
- [CVE-2025-1942](CVE-2025/CVE-2025-19xx/CVE-2025-1942.json) (`2025-03-04T16:15:38.607`)
|
||||
- [CVE-2025-1943](CVE-2025/CVE-2025-19xx/CVE-2025-1943.json) (`2025-03-04T15:15:24.493`)
|
||||
- [CVE-2025-21181](CVE-2025/CVE-2025-211xx/CVE-2025-21181.json) (`2025-03-04T15:15:26.497`)
|
||||
- [CVE-2025-21399](CVE-2025/CVE-2025-213xx/CVE-2025-21399.json) (`2025-03-04T15:15:28.007`)
|
||||
- [CVE-2025-22224](CVE-2025/CVE-2025-222xx/CVE-2025-22224.json) (`2025-03-04T16:15:38.850`)
|
||||
- [CVE-2025-22225](CVE-2025/CVE-2025-222xx/CVE-2025-22225.json) (`2025-03-04T16:15:38.970`)
|
||||
- [CVE-2025-22226](CVE-2025/CVE-2025-222xx/CVE-2025-22226.json) (`2025-03-04T16:15:39.097`)
|
||||
- [CVE-2025-22402](CVE-2025/CVE-2025-224xx/CVE-2025-22402.json) (`2025-03-04T14:53:43.637`)
|
||||
- [CVE-2025-22604](CVE-2025/CVE-2025-226xx/CVE-2025-22604.json) (`2025-03-04T14:45:17.807`)
|
||||
- [CVE-2025-23208](CVE-2025/CVE-2025-232xx/CVE-2025-23208.json) (`2025-03-04T14:45:17.807`)
|
||||
- [CVE-2025-25379](CVE-2025/CVE-2025-253xx/CVE-2025-25379.json) (`2025-03-04T16:15:39.433`)
|
||||
- [CVE-2025-25428](CVE-2025/CVE-2025-254xx/CVE-2025-25428.json) (`2025-03-04T16:15:39.597`)
|
||||
- [CVE-2025-25430](CVE-2025/CVE-2025-254xx/CVE-2025-25430.json) (`2025-03-04T16:15:39.763`)
|
||||
- [CVE-2025-25431](CVE-2025/CVE-2025-254xx/CVE-2025-25431.json) (`2025-03-04T16:15:39.917`)
|
||||
- [CVE-2025-25476](CVE-2025/CVE-2025-254xx/CVE-2025-25476.json) (`2025-03-04T16:15:40.080`)
|
||||
- [CVE-2025-25759](CVE-2025/CVE-2025-257xx/CVE-2025-25759.json) (`2025-03-04T15:15:28.353`)
|
||||
- [CVE-2025-25760](CVE-2025/CVE-2025-257xx/CVE-2025-25760.json) (`2025-03-04T15:15:28.590`)
|
||||
- [CVE-2025-26849](CVE-2025/CVE-2025-268xx/CVE-2025-26849.json) (`2025-03-04T16:15:40.360`)
|
||||
- [CVE-2025-27424](CVE-2025/CVE-2025-274xx/CVE-2025-27424.json) (`2025-03-04T16:15:40.647`)
|
||||
- [CVE-2025-27425](CVE-2025/CVE-2025-274xx/CVE-2025-27425.json) (`2025-03-04T16:15:40.797`)
|
||||
- [CVE-2025-27426](CVE-2025/CVE-2025-274xx/CVE-2025-27426.json) (`2025-03-04T16:15:40.933`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
161
_state.csv
161
_state.csv
@ -180669,10 +180669,10 @@ CVE-2021-38112,0,0,a516ccd688b3159a26d29a0542b1c43f34877df13f43b28ebc723fa181534
|
||||
CVE-2021-38113,0,0,5d46b02d44dc495677e9944e1d41b326640fa8e6ba7e6607ee011515521389db,2024-11-21T06:16:25.040000
|
||||
CVE-2021-38114,0,0,dcc34993449335bce7ac164918f8ca13087f09cfe97ee05f1f3c1ffaea5268a6,2024-11-21T06:16:25.210000
|
||||
CVE-2021-38115,0,0,aac65d670b83c50bb6fdf3dde8ca97dd9df4d7eee0cdf91517338dfa0ded44ba,2024-11-21T06:16:25.407000
|
||||
CVE-2021-38116,0,0,7605eb54c7a08f7f0a93962ccc4cee27af114f406294e82196371a2dec5c100f,2024-11-22T16:15:18.663000
|
||||
CVE-2021-38117,0,0,dd6895df3006f09f9170c6284fdca2b4116d45d468635cb6c9ed22067e0948ba,2024-11-22T16:15:18.823000
|
||||
CVE-2021-38118,0,0,e2a68ed769b0065bfa89affc336db21c384d35a927ded440c1a09b23ff25c9d9,2024-11-22T16:15:18.950000
|
||||
CVE-2021-38119,0,0,341e8c6f8b6e146cea158ff744aee0b2346a26031ddc96be8e0d7f40fd2c437a,2024-11-22T16:15:19.073000
|
||||
CVE-2021-38116,0,1,9e2fcb7c454c84f0b73e4d451e4413ed14590e6d837393661712109d6c18a1ca,2025-03-04T14:45:17.807000
|
||||
CVE-2021-38117,0,1,c738ea68a8ed127f7c256f1f36be5720aae895b5778cdb70d63718b5b689ec05,2025-03-04T14:45:17.807000
|
||||
CVE-2021-38118,0,1,19afdc159a962568ad4d5ce3a0527049365f3ee9bf24d4050e4a7a28bb6b7674,2025-03-04T14:45:17.807000
|
||||
CVE-2021-38119,0,1,c51e04931621af9a60c5862276d47e6123773da43400202d3becd6612e750d3d,2025-03-04T14:45:17.807000
|
||||
CVE-2021-3812,0,0,c5cb3f5b7111b975944866407ce7921fd1756d44d3c707face417fefec9022e0,2024-11-21T06:22:30.810000
|
||||
CVE-2021-38120,0,0,b60e1861e1b921e1137b6df18349a144506c4be8364c1355e526faee82dc1255,2024-09-13T18:04:28.527000
|
||||
CVE-2021-38121,0,0,bdeea87570d2aa637690322ce273b1fd44ad6ff765ffafe37b82df033fc08cd3,2024-09-13T18:04:16.260000
|
||||
@ -180688,8 +180688,8 @@ CVE-2021-38130,0,0,5dd7dd740c971ae448230e2fa7c6fa473ff13dd5ba4fffac83ff3ded78f32
|
||||
CVE-2021-38131,0,0,980eb492833fef04df71f8c1be96cc90363084ebe94acd61a1b0ddd54c9cf526,2024-09-18T21:00:30.420000
|
||||
CVE-2021-38132,0,0,cc4e1381a735ddb1e1b2e30ee731f10ac1786d2b08adbdb5c6b1a67d1117697d,2024-09-18T21:04:11.840000
|
||||
CVE-2021-38133,0,0,0d77afe3c41e217ee49f58798c33ffe693557e4f4c683fac1020b9d1c0576a03,2024-09-18T21:05:17.027000
|
||||
CVE-2021-38134,0,0,b25046d28e2af5287414a719ab2bcf34666258d99ee50222a162cf63f5a52ac7,2024-11-22T16:15:19.197000
|
||||
CVE-2021-38135,0,0,8f44911b2b2d5adf734eb900af129c8d1bbfba186feae24358ffcd75a4a0d7ad,2024-11-22T16:15:19.327000
|
||||
CVE-2021-38134,0,1,41def84a96a3d580650d1c7b11022b92a9312986e0554171cd30a23f3b11fdb8,2025-03-04T14:45:17.807000
|
||||
CVE-2021-38135,0,1,6d6e41e6bc7b9a1351c2dd4f5bb95b6bf0dd710ff2b709eab83029b5c13588bd,2025-03-04T14:45:17.807000
|
||||
CVE-2021-38136,0,0,75dccf60c11e25464bc510952d9ccdd379a17e029a4ca730fef234378d74c33b,2024-11-21T06:16:27.247000
|
||||
CVE-2021-38137,0,0,2ddc1b293c690f5b9d3e7ffefcd4ca372c28380db582fcb89b1014416b90329f,2024-11-21T06:16:27.437000
|
||||
CVE-2021-38138,0,0,1e14c27b356072692022b0b633e52103df305663f6cc532303cc54463d19ff14,2024-11-21T06:16:27.617000
|
||||
@ -195539,7 +195539,7 @@ CVE-2022-26318,0,0,07059bedee342f87c82fd403ca9f475724f3e3520a133422d7d146531f355
|
||||
CVE-2022-26319,0,0,aae94c99a197b8535bde1116c111360146fe08e202aa001adccde9bf2212a6ff,2024-11-21T06:53:44.863000
|
||||
CVE-2022-26320,0,0,f546cbedbd1df24d241d15972b832f4c24e0d4ba512c0b3e93a69f4b283ef02a,2024-11-21T06:53:44.970000
|
||||
CVE-2022-26322,0,0,157099110b7fa8e1790850b4d29e23cf6ec05bfe85652c2f81e2885205b91c31,2024-10-02T15:03:41.997000
|
||||
CVE-2022-26324,0,0,33ccb3efe4469f2fbee00466ef3e2b87185a07fd40d022ba08d8da5ef8f63b98,2024-11-22T16:15:19.470000
|
||||
CVE-2022-26324,0,1,2cf850d71ebd6ea115d8393bdf5f5fd251b338a6a65536c9dccc8ab5b19b2468,2025-03-04T14:45:17.807000
|
||||
CVE-2022-26325,0,0,73e03d9338e44fdad4e3d598ad13c3ab5be01b7d6c1a5fb36a34c8c0837e99a4,2024-11-21T06:53:45.253000
|
||||
CVE-2022-26326,0,0,7198aa067f5918a03bc61451615cd097c2a5738c0a3f83c4ef572143e84f1476,2024-11-21T06:53:45.367000
|
||||
CVE-2022-26327,0,0,14209176bfddac3742a841a3f635ca4404a584d709335abb6ed62100d8608437,2024-08-21T17:25:08.560000
|
||||
@ -208920,7 +208920,7 @@ CVE-2022-43143,0,0,868df4c4bb9b71ab79398441260504ea4a2d34397197a776dbb7b3925861a
|
||||
CVE-2022-43144,0,0,b4d526f2c0777c15dfcdb374db47406c2f99a3af19d967e0e1257848d30d33f4,2024-11-21T07:25:59.257000
|
||||
CVE-2022-43146,0,0,84fc36b0fa34c0e6ead69551bc9e1f56df82e44d1b7de7fb090389def45d5436,2024-11-21T07:25:59.457000
|
||||
CVE-2022-43148,0,0,e88598e3e00227e7df01cb914dc1a11f6419c5e39f486159d9588bf142ad77bb,2024-11-21T07:25:59.620000
|
||||
CVE-2022-4315,0,0,a5cbf0230d4828476dc0d837762d5f9e6c799c34d8051fe5afacc263bf7c1f3f,2024-11-21T07:35:01.163000
|
||||
CVE-2022-4315,0,1,589cd86586bec174ff140f0732f6950973899f093feb268cbe72598f8fca0d1a,2025-03-04T16:15:33.893000
|
||||
CVE-2022-43151,0,0,ec89dabd3a8fe8d38444eb7088f65645800c95a944f74fc4a0c9106f179d5e70,2024-11-21T07:25:59.777000
|
||||
CVE-2022-43152,0,0,7758037884cb4ab135d613748ea4d21af54b5940bb82e54694efe5a64eaf1a18,2024-11-21T07:25:59.940000
|
||||
CVE-2022-43162,0,0,1ccbaac0bb66d6449309a729c532512bc27611c36ca1d066f10c644d326c69e3,2024-11-21T07:26:00.100000
|
||||
@ -219610,8 +219610,8 @@ CVE-2023-24461,0,0,fd8bc2abb65aada1d7309949da776fd5d44c92bdea8ca6223fb68c7781454
|
||||
CVE-2023-24463,0,0,a3c9e4674f772990b219d4f3438aaa2243bf93efafd37788b7290fa8764d44b4,2024-11-21T07:47:54.737000
|
||||
CVE-2023-24464,0,0,665b2ce4da67a5c0980922d44ffd4566ee548bdd53dead916998f380e0b66119,2025-02-11T17:15:15.437000
|
||||
CVE-2023-24465,0,0,5448889530988c381c47996b768fed4b61a602e0da0ee13f5efeff6b48fd5bd8,2024-11-21T07:47:54.987000
|
||||
CVE-2023-24466,0,0,cf734ceccfb5911b5b7e627c53a307368cab7376fb3061da294e5c9aa89cd221,2024-11-22T16:15:19.673000
|
||||
CVE-2023-24467,0,0,07490941e7ee60ebe008d984f75a4eb57ec217c7a9f6818f2eef6ec413eb2c8a,2024-11-22T16:15:19.810000
|
||||
CVE-2023-24466,0,1,1531d5aa8037433592fb8ed22ccab6d1519aba55b9991ced01572ffa4bda530c,2025-03-04T14:45:17.807000
|
||||
CVE-2023-24467,0,1,ab8e076c3763270e0693d9addd66b4b0c5c52ff5f6b3f9268c08789601c6c418,2025-03-04T14:45:17.807000
|
||||
CVE-2023-24468,0,0,639e71c18e7c077a186e13edd7fabab7022c977c2968a99bddf61b8a74e99700,2025-02-27T15:15:36.287000
|
||||
CVE-2023-24469,0,0,a9377ea65c9498eaf5d1c4eae744f9e44b65020ab796251fe5a53a3ce5c454f8,2025-01-03T19:15:09.590000
|
||||
CVE-2023-2447,0,0,4ec809bb328a770bd9ca5946a889993e16b770e9ec04f38adc8310b23274c0c6,2024-11-21T07:58:38.067000
|
||||
@ -221582,7 +221582,7 @@ CVE-2023-26919,0,0,4852cc825b9bf426194bb68dc7846d6ee8ce33eba0abc35e296663c7cb884
|
||||
CVE-2023-2692,0,0,ad06513e2f116b8fb6a964da6618fc1d94588cf004f25980806dd3b489093f9f,2024-11-21T07:59:05.780000
|
||||
CVE-2023-26920,0,0,7032d8fb85b06c0f68b934efb7c1ddc8da00b25992344fdcc0d0ab8b925ca6a8,2024-11-21T07:52:04.053000
|
||||
CVE-2023-26921,0,0,0f6469eadd7b8eb1f25a21780332e58a4e7f037340a8bae8275d286b01ef63f2,2025-02-13T16:15:40.510000
|
||||
CVE-2023-26922,0,0,02af78d8a0c587f11e4592b06a8425852d45b4b655dc1315ad9511e2b0477b7e,2024-11-21T07:52:04.360000
|
||||
CVE-2023-26922,0,1,5257fd53c31086036e10c945e5d64e3cfb29fb098c4fd4c471d83fb6324a5b27,2025-03-04T15:15:17.240000
|
||||
CVE-2023-26923,0,0,75862e39801fb950c2f14e9f720d435da722d14d0e221faf7dfcb2b0a16c8d5c,2025-02-18T21:15:14.770000
|
||||
CVE-2023-26924,0,0,7cb11a4c9ca77e95624c2ca9eebda8330e0095c5863e0c412e6b45d03fb2efd1,2024-11-21T07:52:04.640000
|
||||
CVE-2023-26925,0,0,9909c8c7b93b9251f87152292293ede34c98fb010204ed84730aa6d5bd687892,2025-02-18T16:15:14.530000
|
||||
@ -245263,9 +245263,9 @@ CVE-2024-11127,0,0,8ab8a7a02ec26c5b2661934596816ed78bd98367b1f4c52ffc4a58bf6fa51
|
||||
CVE-2024-11128,0,0,3daf53c78cf58dd1f31203728c75baa1e7b77755676f9f011daf94fe4d0761b7,2025-02-11T21:38:28.860000
|
||||
CVE-2024-1113,0,0,90572d47b15d75a1b5b46414b43b02fcca134882a5755a9a69a3d4ba79038a2d,2024-11-21T08:49:49.557000
|
||||
CVE-2024-11130,0,0,cf5ea4272974c91c76344000d998fe4730aaf36f216ea2c15de856330a45b0d3,2024-11-15T17:57:53.270000
|
||||
CVE-2024-11132,0,0,0821914b8713b59a5594a768e713d894977db965864534f7c1570dcf8385b455,2025-02-03T20:15:32.047000
|
||||
CVE-2024-11133,0,0,ec82007b0a80c7248c9750c974f69dc3d569b8565d47f719c0e652c5a939052f,2025-02-03T20:15:32.203000
|
||||
CVE-2024-11134,0,0,80669d4c37428b414124ba754353d3b371091e0c0a1f0a0960f4766e9c86ba92,2025-02-03T20:15:32.373000
|
||||
CVE-2024-11132,0,1,68fd46371ee41c70f11e95e75b6bdb69e2415421dbf3f29a1c70aa4e9b3c7f10,2025-03-04T14:53:43.637000
|
||||
CVE-2024-11133,0,1,8f58890562989b43d2e66a215d00b78377ebbbdc6422866e1456544ffc629567,2025-03-04T14:53:43.637000
|
||||
CVE-2024-11134,0,1,bae2f6dde2fbfb5b611852c169ae2232b7003592c0dd496aa1c6559c28822bb4,2025-03-04T14:53:43.637000
|
||||
CVE-2024-11135,0,0,b1408e944d5859a70fcb19ff485be68a4c4e7184c7ddac3f9101a4c9744f657d,2025-01-30T18:03:45.843000
|
||||
CVE-2024-11136,0,0,14c34b52e51da32486499993d034c5625233241e56703eeb628fb429016a0b8a,2024-11-15T13:58:08.913000
|
||||
CVE-2024-11138,0,0,2f34cc7cd067d0c6304b6c652f672298f3f38bc0e02398b29badaf312aaed525,2024-12-10T21:11:45.043000
|
||||
@ -246054,8 +246054,9 @@ CVE-2024-1195,0,0,3368bf518c27a729a23598a4bc9bc8456794ebbc8ed421e1b9fb54311a27af
|
||||
CVE-2024-11950,0,0,df36014500ed7b6f7946ef04cfd4a777d6bd62d2ab461c18fe6d382ea2d08354,2024-12-12T01:40:21.820000
|
||||
CVE-2024-11952,0,0,8be0c69e3107fa6f3273f59b11ff511450df70a157d0236a300dd71a0356b941,2024-12-04T09:15:04.637000
|
||||
CVE-2024-11954,0,0,4285770ed381cd7f5197033d510494069e724ce14634f9774d473591316f5acd,2025-01-28T15:15:11.130000
|
||||
CVE-2024-11955,0,1,2af5adda5da26b6323fd1ffc39c86bb8d22bbc8895e47ad587f94331f0b10e55,2025-03-04T13:49:18.880000
|
||||
CVE-2024-11955,0,0,2af5adda5da26b6323fd1ffc39c86bb8d22bbc8895e47ad587f94331f0b10e55,2025-03-04T13:49:18.880000
|
||||
CVE-2024-11956,0,0,abf0b1c76c4232559590b835003e8c8289517d48626619c77c54644f8e6e061f,2025-01-28T14:15:29.803000
|
||||
CVE-2024-11957,1,1,23d8576e512e3c80ad85d162554433db4c1b4585d5aa152e91eeafd20640c099,2025-03-04T16:15:34.927000
|
||||
CVE-2024-11959,0,0,caab75627422c683cea2d1d2168737e0adff93eab9dcc37814cfa2e800769905,2024-12-04T16:52:55.150000
|
||||
CVE-2024-1196,0,0,4b0eccfc085f9fcf5d1d563f67df6edef95e40ef1d03548e58cd26db6bec54a2,2024-11-21T08:50:00.883000
|
||||
CVE-2024-11960,0,0,98cccdbf2a56893ba844e9a27d11d8e19b411cb229a2ffc9fddc1d1b0c64d4ba,2024-12-04T16:52:34.413000
|
||||
@ -247602,7 +247603,7 @@ CVE-2024-13681,0,0,f9b5888e5600eddb54eab02d107b8219d0a2ff1dd821d3ec69a804f466f47
|
||||
CVE-2024-13682,0,0,ab7b0f61263b36adc7c9dfee57d17af70806e6267e316ef0b9cb0fc98f41c6fc,2025-03-04T09:15:09.960000
|
||||
CVE-2024-13683,0,0,60466d727e6596c848a3b384eab039ecd16e7bfc142b0f259b6e51a93695759b,2025-02-05T17:18:36.090000
|
||||
CVE-2024-13684,0,0,29bd0282adaed7c145caec3d49c703050082025937ad2fcfe46d4b20fa2f4a61,2025-02-21T15:57:57.993000
|
||||
CVE-2024-13685,0,0,03de3c2f4567b362885b87939b3221f81be18564e943cae2676e8a3616a94948,2025-03-04T06:15:27.240000
|
||||
CVE-2024-13685,0,1,50ccc6b12c4c95fb069a8c449d3bc8810677414e2a7ace0a2bc79b90508fa4b7,2025-03-04T15:15:18.760000
|
||||
CVE-2024-13686,0,0,4691e12d5168bb7d67360fcc2a73944d7fa732d6ecc8775af952ebb6f3141b5d,2025-03-04T04:15:11.070000
|
||||
CVE-2024-13687,0,0,8a954d90e2ecf3e0bfefe90b1ebf331e7dcd9b3ff81bc3892382c9536696e182,2025-02-21T16:00:16.287000
|
||||
CVE-2024-13689,0,0,41b530aa4ba65a02f514116414a57fc5db58dbb6ffe52efa3c6202ae2808e2eb,2025-02-18T15:15:15.547000
|
||||
@ -268074,7 +268075,7 @@ CVE-2024-45594,0,0,7a3512bdd289e08930c55958e7a3b82e2f30b26c968886b9e51f5b9001958
|
||||
CVE-2024-45595,0,0,ed73f265e4cc26a14ea0ef98c1ed160999b148dbe2046a7b8a319cd1ad837073,2024-09-20T19:59:02.963000
|
||||
CVE-2024-45596,0,0,a620d8302107635d7f8871dcd65118f72878398568927fef8140037a0b256d98,2024-09-11T16:26:11.920000
|
||||
CVE-2024-45597,0,0,5a68594db914cb6b4d8306c16fbb00f262377974d86e7839e390f218fadb00b1,2024-09-11T16:26:11.920000
|
||||
CVE-2024-45598,0,0,fb11f2533ae20ca5b770b3e6cfb8400dfd4666b24d9a5d89096f872428905225,2025-01-27T16:15:31.267000
|
||||
CVE-2024-45598,0,1,7cdad03177052428807302a87d34c2208f361b799b303ac315f9592f8b1310fb,2025-03-04T14:45:17.807000
|
||||
CVE-2024-45599,0,0,336dcc223b338e03a3d5e62e7e0b320a6d04f231025b64ee6820c74e273fb906,2024-09-26T13:32:02.803000
|
||||
CVE-2024-4560,0,0,77026720b012435fe27b280a69c912322a6f69fd18d9b68eb4c768a521dc0638,2024-11-21T09:43:06.550000
|
||||
CVE-2024-45600,0,0,5e421d273aed3e2190a0fe3fca5657a151966ed61665125955352b8401139444,2024-12-26T22:15:13.583000
|
||||
@ -269963,7 +269964,7 @@ CVE-2024-48239,0,0,0c07796f9941e77d31ea455c930d1849f400f89336e89d408653eccdc74bd
|
||||
CVE-2024-4824,0,0,99e5c25e3efbae2d6155cb78a769b081c4e63979dfca195378dce1a55688edc2,2024-11-21T09:43:41.940000
|
||||
CVE-2024-48241,0,0,942b4afc357baeaceadf6e602d4d8e3bfa0474bc4cebfcbfe23fbed098a739b4,2024-11-01T12:57:03.417000
|
||||
CVE-2024-48245,0,0,aca39816c4fa40e3329fe946417f7ca9849849875505e3b3a53a29b06062021c,2025-01-07T20:15:29.750000
|
||||
CVE-2024-48248,0,0,ac3fc0f6c8ce3e0223ebe710a67ff2a29a152ed42554d6cf3798d430ad51a664,2025-03-04T09:15:10.307000
|
||||
CVE-2024-48248,0,1,08696f116983e1deddae7d19e7d15ec089454faaccfbe9c5f21145f8346f74c0,2025-03-04T16:15:35.150000
|
||||
CVE-2024-48249,0,0,2b7bc564c0f7feefef01fa93cd50d56ca2a93e73b5f3eb01b90321a2b54ebe80,2024-10-15T18:35:15.607000
|
||||
CVE-2024-4825,0,0,5c1d8ba2e7dfb16ca18af9c563e1590f25a3d396f69347243d31cae6dbf069a9,2024-11-21T09:43:42.050000
|
||||
CVE-2024-48251,0,0,c80def3e238ed0fab4e8dad7bc06f5b33b90fcccea2cf3bdaafbfe1c7c4fb67e,2024-10-17T18:35:12.280000
|
||||
@ -271476,7 +271477,7 @@ CVE-2024-50299,0,0,0c281bf670f28202ecab6b493ed49cc5ea5a6c8ca6e18d28c043e1650410b
|
||||
CVE-2024-5030,0,0,d7a01f140218cc5d3b4d9bb19a90752f3ec5a691714edb3528e20e3690587947,2024-11-18T17:11:17.393000
|
||||
CVE-2024-50300,0,0,7e61bc5452e3c6bf0816fa7f8abf13f64ca5a49dc8874af50150a20d37ed3a6f,2024-11-21T21:11:32.137000
|
||||
CVE-2024-50301,0,0,7bf644bb8af063938e3e18dc42072a8ce6618f64a2658105524913b296306adf,2024-11-21T20:53:03.823000
|
||||
CVE-2024-50302,0,0,c276d48aa253104f6ab94ac380d2127bc623569a115a2b5fb8d69864e82f6893,2024-11-27T15:27:00.187000
|
||||
CVE-2024-50302,0,1,82eea98db766b4db301e733c34485a9be7ab0356b12c0e8570ec165be8b4c59d,2025-03-04T16:15:35.280000
|
||||
CVE-2024-50303,0,0,bc6cc55b32c0f00ab508749d7c62fbc3dbe6ae3c9749209c3284b75426b67658,2024-11-27T21:29:30.267000
|
||||
CVE-2024-50304,0,0,eeeaee5732dfb12e1aae063256882bc4dd20d6bc10a6f629b1d14550d165b8e7,2025-02-02T11:15:11.207000
|
||||
CVE-2024-50305,0,0,50fd3aee61add01e589f37a9c6d29b7fd91b0375b90c41822a3e9396b3202d7a,2024-11-15T13:58:08.913000
|
||||
@ -271808,7 +271809,7 @@ CVE-2024-50652,0,0,2f965c69b573d9e115cdae86c6768d0ed1bea347974fb0bbbfc5caeeb795e
|
||||
CVE-2024-50653,0,0,c3c2eb452e8edda9530908359ecefe1b49303fe46316e9194f74a85e3734220b,2024-11-20T15:36:20.257000
|
||||
CVE-2024-50654,0,0,5fcda88001562dfee1e6cc60fc3a7e9ed1e6a24d11c939faa9c604dfe739ca92,2024-11-21T19:15:11.113000
|
||||
CVE-2024-50655,0,0,1459d7257280aa2e8bdcb66b80527b54cff1ac83583af5c95b1d9f4626d5dfc0,2024-11-21T09:44:54.133000
|
||||
CVE-2024-50656,0,0,e53c92dd40aeb79d431b51fb04bac1f16260e97b7e3acd3a14cd582afd780293,2025-02-18T19:15:17.930000
|
||||
CVE-2024-50656,0,1,0388b4db16cd9aabe7b5e8e43f14e295a2a569883a92c3216db45e5c95061e17,2025-03-04T14:53:43.637000
|
||||
CVE-2024-50657,0,0,30b2eb884e7e45c72e97be70bee207473abaa297a2a95565537ba3cd89d0a4dd,2024-11-27T17:15:12.323000
|
||||
CVE-2024-50658,0,0,dc74515f499285ca9589c261009f1434e39f4df3c1feba74e29bae75532d2d18,2025-01-08T16:15:34.413000
|
||||
CVE-2024-50659,0,0,070d9cee09db7fd442130a440bc492ee33550ec72e00250b2d953adb8bd85a17,2025-01-08T16:15:34.597000
|
||||
@ -271841,6 +271842,10 @@ CVE-2024-50699,0,0,b7bfb9ce8d871e66c8bc846d040c669e65be2a2e4a5ca2c2838499d7e0265
|
||||
CVE-2024-50701,0,0,a80b1dc6acfa0163b2b418f9af2de103abd46652e86be76b69c935d1bde098bf,2024-12-30T16:15:11.387000
|
||||
CVE-2024-50702,0,0,364da4b19de28c5c7b507be40fbdae2c11e3df8d6828b6df401d4df157b3f54d,2024-12-30T16:15:11.550000
|
||||
CVE-2024-50703,0,0,e1914095d1b7a0ffe223f333a29d6d8f0777fb87821c72e0f90605f07525e975,2024-12-30T16:15:11.713000
|
||||
CVE-2024-50704,1,1,9d331c8d6b363d37fff2547f6d76cc65ecf4258701e3633eed0ee80ab60702ca,2025-03-04T16:15:35.480000
|
||||
CVE-2024-50705,1,1,7f8c9f9cf68b3101f3ba62602ce2f5e6e57e21f3f81bbd324b10b941dd67f273,2025-03-04T16:15:35.597000
|
||||
CVE-2024-50706,1,1,bdf826c2f0e018abe61028151297292c44083149d42747ce0b23d50c7f191ee6,2025-03-04T15:15:19.290000
|
||||
CVE-2024-50707,1,1,44896e88bc7dc773fec1e11f006564a397b1d0d8621287ea0206c057d3930403,2025-03-04T16:15:35.733000
|
||||
CVE-2024-5071,0,0,6dfa056d4abe7e6b37a7311009a7ee0087dcbc392285cd9b9ee51e94d1bed9a4,2024-11-21T09:46:54.120000
|
||||
CVE-2024-50713,0,0,0aa4de590634689fc06ab979763234a81b3e22004da47f2c72171e7a681edd71,2024-12-31T19:15:46.967000
|
||||
CVE-2024-50714,0,0,715fa47c5b29e7f074e411097e14ad7eb3de980f9ba46000b7478612148d5076,2024-12-28T18:15:08.193000
|
||||
@ -273996,7 +274001,7 @@ CVE-2024-53940,0,0,04215bb77d44b273e9849b212da1715e4a88663d0a04d658e8b426292d6b2
|
||||
CVE-2024-53941,0,0,958fbab1dcd158d91125ecb71056e34e403404760a1ce78a6e1b2e3ede2a0630,2024-12-03T19:15:13.113000
|
||||
CVE-2024-53942,0,0,a82102ce95ecba9d91a325449993277e8666efd3fba33597504408ca5c2b2e17,2025-02-03T18:15:36.633000
|
||||
CVE-2024-53943,0,0,437d28c72b812c4593516003fc2aba4b613f671a694938fbad086ef025289004,2025-02-05T19:15:44.257000
|
||||
CVE-2024-53944,0,0,c9e41084ca96c95464f2cbaa1f2ca069883a8508c18c1b3a9d39831f60e08355,2025-02-27T20:16:01.887000
|
||||
CVE-2024-53944,0,1,22692dca7fe9bf90c709d562a2f5e57fc8a071e9e5f9d218e87c93a1c791fa71,2025-03-04T15:15:19.667000
|
||||
CVE-2024-53947,0,0,e2f76f81a7b4b04a6a0933301af0327b41592be00ca6e33f47671fd393eff3dc,2024-12-09T14:15:12.267000
|
||||
CVE-2024-53948,0,0,d599ead73c1f590fbb2eff6448b7bf9439b2eabd12941877aab993eed63132d0,2025-02-11T16:27:31.023000
|
||||
CVE-2024-53949,0,0,a7aea508a7c1f88d7575b0e16e3be5a77b1cd694ac35d309754b1488d9891f8c,2025-02-12T10:15:13.790000
|
||||
@ -274147,8 +274152,8 @@ CVE-2024-54140,0,0,31257e10dae8888bcca62759980c11bff94610e8424d0a991aa232e4e053f
|
||||
CVE-2024-54141,0,0,03f51d6625a463b05e77ba75622f0e1fc489bf2648bf55da8aa1a94f754ed277,2024-12-06T15:15:09.530000
|
||||
CVE-2024-54142,0,0,72133cd2497b495f2be9332cda5c9c42b0acf32e880167b6d7b1c949210b9875,2025-01-14T23:15:08.687000
|
||||
CVE-2024-54143,0,0,8db75f45f675c8e0c94c9f789265e5f7040d3230f01c944775ae37d21a402ba6,2024-12-06T17:15:12.687000
|
||||
CVE-2024-54145,0,0,d29401c66a345e085157a72c34e12541d999da662af740f11a31d17e1caeb437,2025-01-27T17:15:16.240000
|
||||
CVE-2024-54146,0,0,8be3afe261f70a34dd94521b64c588c302e6bf746bd01d3a66c8807a54d879ea,2025-01-27T17:15:16.380000
|
||||
CVE-2024-54145,0,1,0086ede8d33f4c38cf42c46cc6e8e377784b371f7ac491d57a1e89761d1ee349,2025-03-04T14:45:17.807000
|
||||
CVE-2024-54146,0,1,ec63a6eaa7f42f80e3e3b10f3681a77c87540f5ea9640756664e7e50eb919830,2025-03-04T14:45:17.807000
|
||||
CVE-2024-54147,0,0,31061631720e65f385fd359d47a289e6f20b86f9fad882040f751c79c06fbc19,2024-12-09T19:15:14.513000
|
||||
CVE-2024-54148,0,0,1bfb17d4d936ce6a940dfc88f1d38025c4aaaa0bf878ea9058eb2876c8005731,2024-12-24T02:15:06.410000
|
||||
CVE-2024-54149,0,0,9e6d58019e13dfe4168259b606ef42fa170a7f5d925476003c46ba8914519715,2024-12-09T21:15:08.600000
|
||||
@ -275757,7 +275762,7 @@ CVE-2024-57034,0,0,e52a39ecd5c7a609e90fa7ae9c35e819ec30d141102d18c5cb8dc9ebebfd4
|
||||
CVE-2024-57035,0,0,8f647174886ad5489698835d701ee28c5ff6c813395545be8ae09bfd3cde425f,2025-02-28T19:16:13.133000
|
||||
CVE-2024-57036,0,0,55b7f3d5f4d5a99be083f64a92e65d0a6b625216d85565aff3a03ccb780b5c92,2025-02-04T16:15:39.170000
|
||||
CVE-2024-5704,0,0,cbccfff62486c3c4f34573a6ffedc788349c4048d54ed4b150463209e5b954e3,2024-11-21T09:48:12.583000
|
||||
CVE-2024-57040,0,0,4de3ec8520d627412151a285808f07acb55340667ec561d8d5d9eefc71b5b985,2025-02-26T22:15:14.240000
|
||||
CVE-2024-57040,0,1,5ea2e5622bbc48143f47b14e4e3255cd65f152b262337519628c8107ee7f9aba,2025-03-04T15:15:20.283000
|
||||
CVE-2024-57041,0,0,0979fe76d9e8316158a2a941acc94a8ef64339b0f6c4a4654fbbd04ce63283cd,2025-02-06T22:15:39
|
||||
CVE-2024-57045,0,0,9e88193dd5b32a09e508dddb0c4a8c2c596170562f8ae97e69edc85973af8d81,2025-02-19T16:15:40.317000
|
||||
CVE-2024-57046,0,0,ed4764a2183714deed727de4acb95079ff6351d4a17070f6f3c7fbd3a859097c,2025-02-19T22:15:23.207000
|
||||
@ -279261,6 +279266,7 @@ CVE-2024-9145,0,0,97a312c1c66b488d02b8e5ae15f80967927307525d089b410f672665e8c386
|
||||
CVE-2024-9146,0,0,b2bcae27bf136fac98f5cca96bf30e297b145f83fbf374484b4b69bb66a11534,2024-10-07T17:48:28.117000
|
||||
CVE-2024-9147,0,0,0093d2743a16315fb2395e20e4313d0098c0f4e5a32333383ccd3780d7d6e4a8,2024-11-06T15:53:59.983000
|
||||
CVE-2024-9148,0,0,a904c9834abceb13922e1cc588509f574c6534f26c7e1a2e5af468520b2fb09c,2024-09-30T17:34:12.760000
|
||||
CVE-2024-9149,1,1,962efc736bc6124bf9fbe66a3fd731bf8d5e55f0fbe538c9ec08386971ed8d30,2025-03-04T15:15:22.530000
|
||||
CVE-2024-9150,0,0,a71859d524acf6115eb959ba60ad17bd5abb4a22b920695c51f16760c3126535,2025-02-21T12:15:30.463000
|
||||
CVE-2024-9154,0,0,10c686be97e780f4f6e6444839c6c04b63fc77477fab652ecfbb9dcc548afff5,2024-12-22T07:15:06.307000
|
||||
CVE-2024-9155,0,0,6b831cc9815c7982fccb5bb1db903558181a3d9726f2c50e686b372d7d7ea737,2024-09-30T12:46:20.237000
|
||||
@ -280094,11 +280100,11 @@ CVE-2025-0246,0,0,c39f5bdf37092ddacf9510ed2d75cd9204291d6d9bc9dd6c5bd8168e56e080
|
||||
CVE-2025-0247,0,0,0125f498ef227ebc436135b5d9339a763bd05ec1f3a6e4d4fb60e8d0a9524607,2025-01-14T17:15:20.547000
|
||||
CVE-2025-0282,0,0,193a86684d492a70f8035af4d9672f451f74d0f498147e63c150db661e49e756,2025-02-20T23:15:11.950000
|
||||
CVE-2025-0283,0,0,170559952a9515dd5478b031ee87167014dac9ea49e5e0d222b13defbaf7dddd,2025-01-14T15:58:55.813000
|
||||
CVE-2025-0285,0,0,bd76a73d88fc72bc10ed44c3117c45016b96684dc519171e4420c8e33e931fd6,2025-03-03T17:15:13.430000
|
||||
CVE-2025-0286,0,0,c4ec72a9554ec8a756e5843089b16cd508ff7c50c18456a0f96863f5d96c876a,2025-03-03T17:15:13.537000
|
||||
CVE-2025-0285,0,1,8bef17d3f85cba40ca0c2d7eb2962a0b4098c9c2a2ea291e3924377e2de2a5c0,2025-03-04T16:15:36.020000
|
||||
CVE-2025-0286,0,1,31a9fcd6eceae0e8ab746102c51a8f90d8bdbebc7d503dcf99fb542761883442,2025-03-04T16:15:36.167000
|
||||
CVE-2025-0287,0,0,99b2806e0b914384724b92a9eeda355dfeaeb1f153364014a4accbba6bc06de4,2025-03-03T20:15:44.100000
|
||||
CVE-2025-0288,0,0,a9d3af508f26bc1a8c7748a2db86a46548a895db1c48b9ff7e76f56239bc4552,2025-03-03T17:15:13.823000
|
||||
CVE-2025-0289,0,0,8d7c88a592ed289173b4a13ae98054285b63c7fbb44bee84e192a3dffe5fdd54,2025-03-03T17:15:13.943000
|
||||
CVE-2025-0288,0,1,5535019b67c8186a5a2a2f66909842decaee326bbc7e615060a66e0dcdf41d37,2025-03-04T16:15:36.317000
|
||||
CVE-2025-0289,0,1,bde669fd45186b8a31a5a0375129ab340a8c051d355c15c4807dca5af7b187de,2025-03-04T16:15:36.467000
|
||||
CVE-2025-0290,0,0,1b0af77f22124c7fd21050a24684089c59772f145263e66a578112620b4a0b4d,2025-01-28T09:15:09.363000
|
||||
CVE-2025-0291,0,0,c1c3893d4e09f9e0204fc40192dba70b3c3378a020c5622ef22757e5df4fb545,2025-02-11T15:16:03.447000
|
||||
CVE-2025-0294,0,0,c9b2fc3087b74017273fe9485890135d0ff2bb52c4c2bc9ab42cdccd09c8f44c,2025-01-07T15:15:12.113000
|
||||
@ -280457,7 +280463,7 @@ CVE-2025-0825,0,0,a0334191040ddd84cf58e374702797f73c6f21c21dcc064c3fd05efc814927
|
||||
CVE-2025-0834,0,0,239a6f08c2db88ce57ab64c699932d200eff33712703b8a8f00d02b01207348f,2025-01-30T09:15:09.703000
|
||||
CVE-2025-0837,0,0,edb903a525c34e5db3f70de24ac0ad9bb2158867f6a7f92ca61239987715eef7,2025-02-24T17:08:29.033000
|
||||
CVE-2025-0838,0,0,5a9fc4e1768f097f2fc50c995427721cfd5a7a3b77299bdbe2955b9299abd536,2025-02-21T15:15:11.890000
|
||||
CVE-2025-0840,0,0,79ef33a6b34430ee30098d47cac5f4328a851ed337a384616ad40711bf9306bf,2025-01-29T20:15:35.007000
|
||||
CVE-2025-0840,0,1,582d68c7d01609df8f75b41175c198a68760a9d4af98efb8dd178ec4d57bbaae,2025-03-04T14:53:43.637000
|
||||
CVE-2025-0841,0,0,b774fca3a24dc7d508cd784f030d5801ea9f63adf71e1a38a09a02a937c41b6d,2025-01-29T21:15:20.973000
|
||||
CVE-2025-0842,0,0,880989b2076d537c6bb018739fce330a49d894aec3d353193ef18e6fe884c71a,2025-02-25T19:45:04.700000
|
||||
CVE-2025-0843,0,0,350d60ad76c1f5c9df007c9b8ac9d858c4b3349609463c740dca46afb5143f69,2025-02-04T17:16:08.127000
|
||||
@ -280616,7 +280622,7 @@ CVE-2025-1102,0,0,0a58fac809cb082841f9122cd183bbcaae0c3230347602227d2b0c09eb06da
|
||||
CVE-2025-1103,0,0,0e526fd4466d75abc344bf0bd683cde20cd72e5c520f7b078f91058dbcc62271,2025-02-07T16:15:39.973000
|
||||
CVE-2025-1104,0,0,cd698b7fb9abc7a0e8cf365342427529ce4ee897116a726790abd164b5d7a4e8,2025-02-07T17:15:31.477000
|
||||
CVE-2025-1105,0,0,3bacdf77291dd429d5a36d299846ec2970e0b6d32e073b87ebe633608b8b63d8,2025-02-07T18:15:28.433000
|
||||
CVE-2025-1106,0,0,a3b8b89a6d6841c31a035bb06d6cbb743b91b68a5569eb34eac7fb1ed0d7d04b,2025-02-07T19:15:24.613000
|
||||
CVE-2025-1106,0,1,524d2874116becb8ba796cd93b1a3dfabff51569f8ccd989ff4bae924e49e1aa,2025-03-04T14:53:43.637000
|
||||
CVE-2025-1107,0,0,88a8719351346afa69c0eb84e5c94d3ac98eeae345d66ccbfb838f179b4a14fd,2025-02-07T14:15:48.343000
|
||||
CVE-2025-1108,0,0,70b44a68f944b132ac1602e83624e59a01ee9e1d6bf1d641646c3c0fbcfd3886,2025-02-07T14:15:48.530000
|
||||
CVE-2025-1113,0,0,e1507e6d2bb810ac6657444d8f9429eef67e835f41d00085c329df7f95fe9d83,2025-02-07T23:15:14.727000
|
||||
@ -280637,9 +280643,9 @@ CVE-2025-1143,0,0,304257e291412914759d8dd1547bfdc8737e5d301b764158390fad46e11d8a
|
||||
CVE-2025-1144,0,0,c007a9248005240176adbf0d59d7e143608bdb0bc1952b89f1043c4b3e3f4a74,2025-02-11T06:15:20.310000
|
||||
CVE-2025-1145,0,0,d6e4f6830b1d5bec32355229d5ad379784daf94076f4978b41c854d102fa122e,2025-02-18T18:15:29.940000
|
||||
CVE-2025-1146,0,0,8867063a2a1a8b5d6fc90063ce8ae3bb4a4d3f7b0a7daaf4b1563e53968a0cb4,2025-02-12T19:15:09.840000
|
||||
CVE-2025-1147,0,0,a91ddadecd3b5a2c253a89bf4197712aa1818ad0485210aad82264eeb6af62ce,2025-02-10T14:15:29.643000
|
||||
CVE-2025-1147,0,1,ac9da679a64d0b5e778da5d8925413d5cb4c457abc1332a83096bb26fdbe538f,2025-03-04T14:53:43.637000
|
||||
CVE-2025-1148,0,0,d1618314ff59009839b509aacbbca99b15c99ccd5fbd1d92e78000fe3994e57c,2025-02-10T14:15:29.927000
|
||||
CVE-2025-1149,0,0,d8d91fe8a3ea61c4ba8a8728b35b19cb024f17e8929c6b84c98db6467585ef43,2025-02-10T15:15:13.093000
|
||||
CVE-2025-1149,0,1,7e2298a7d8da8ec94b0957e90f0f05dd4901170f5b4ebcf2e3d1c46417f15a10,2025-03-04T14:53:43.637000
|
||||
CVE-2025-1150,0,0,ad52c0f26e616344bc9e26433ea525a076361996f0527b54486144825cdc9fc6,2025-02-10T17:15:18.517000
|
||||
CVE-2025-1151,0,0,6f137cbb7dc8cd66d49b40611be226ac13ffd672475b8994ef22393fe66acf80,2025-02-10T17:15:18.713000
|
||||
CVE-2025-1152,0,0,ae53d6bc7df1c05ec8db34e17fef35dc2661a6e86edb0d9d93d56afcdd732f31,2025-03-03T16:52:20.953000
|
||||
@ -280789,6 +280795,8 @@ CVE-2025-1410,0,0,1acd34ee1bf4de50c7bb7990bb2833820ce8a935ac6fe3383da13c0fe4fe3d
|
||||
CVE-2025-1412,0,0,15006068dde5667dc534d1c6a1b910fc18a441695fc7fe8438811af885c4587d,2025-02-24T08:15:09.890000
|
||||
CVE-2025-1413,0,0,f96e155e6d851d7d3bb06c9668e0843604deba9a4449bfef780b497cc84830b4,2025-02-28T09:15:11.850000
|
||||
CVE-2025-1414,0,0,b3b9c3affbe2798ab158992b46088a156edfb77f4ed4319f53d9b7d1a64ef9f9,2025-02-18T21:15:25.440000
|
||||
CVE-2025-1424,1,1,7bc1486ceca0565cfcc9a2d34ce95560808df7da09f34dab3d4f23862348c153,2025-03-04T16:15:36.663000
|
||||
CVE-2025-1425,1,1,43fb3b1f1ada208e5c93084c37982591e83549c344ec272dd4837e6ef4cf756b,2025-03-04T16:15:36.803000
|
||||
CVE-2025-1426,0,0,834f194c9c92d88c2a5fa9395038ff6b865679b1740d05e480244e8e7428755b,2025-02-19T20:15:36.467000
|
||||
CVE-2025-1441,0,0,a148724949d3a67ddbdb90d03ba8b4c0c01959027f1d8b9da83469468076f49e,2025-02-28T19:47:07.220000
|
||||
CVE-2025-1447,0,0,b52fc293ec2c8f7276787d8ec4e27a605d8feb40937673c00f5fe8646d83ab92,2025-02-19T01:15:09.407000
|
||||
@ -280998,7 +281006,7 @@ CVE-2025-1889,0,0,f7cf73293a0ccf1008c443a59d3e7d9e6c3eafe2a69cacf7dd719e71afcc42
|
||||
CVE-2025-1890,0,0,fb180de0a5553a034ff78b5b5a313fe552ef117fe5eb133cd304c74c41bebb8e,2025-03-04T00:15:31.190000
|
||||
CVE-2025-1891,0,0,ba5dca5f04b0970d036a786c7821b97cb95f51992163656e2d4e884b26749b04,2025-03-04T00:15:31.377000
|
||||
CVE-2025-1892,0,0,5f521d1356697805c14d8f756f3eea70794c3f1bece498159531e6576bcea5d0,2025-03-04T01:15:11.147000
|
||||
CVE-2025-1893,0,1,18b5ea0a0ca62226ded1a72e624165d9371800e39e7d7034899a481cc3d8aa6d,2025-03-04T13:15:10.063000
|
||||
CVE-2025-1893,0,0,18b5ea0a0ca62226ded1a72e624165d9371800e39e7d7034899a481cc3d8aa6d,2025-03-04T13:15:10.063000
|
||||
CVE-2025-1894,0,0,164da153e07025ecb72d314d8c9548eaacf5c09d2e168cfb9789d74af94348d8,2025-03-04T02:15:35.380000
|
||||
CVE-2025-1895,0,0,f7fdb5ea44d811a741cda1ad116677cd04f10a970b0ce5da888f126de44023e4,2025-03-04T02:15:36.163000
|
||||
CVE-2025-1896,0,0,d6468fd7c73c75a3b36bb29f1c2fee1b2fb32ea5a7c8aea8e3f379d9e7426436,2025-03-04T02:15:36.340000
|
||||
@ -281007,26 +281015,26 @@ CVE-2025-1898,0,0,6dd4f4dd3867537e2273be7442c60d9cdb3ccf4846f81ef9fd2704d9557f1c
|
||||
CVE-2025-1899,0,0,24ac0955bb8ab305b10d11752dd11577ff372d3c64c52ac3f3dc346b3a4f860a,2025-03-04T03:15:08.970000
|
||||
CVE-2025-1900,0,0,56495ed13bfaa437b11956412ae3622f0f7e022503c4516e140801944af10308,2025-03-04T04:15:11.853000
|
||||
CVE-2025-1901,0,0,f5888ab7c140e56993335d3850c5a603cb408753be3d9e12594cb142bda21c0b,2025-03-04T04:15:12.030000
|
||||
CVE-2025-1902,0,0,471c441de14373e77348d0bbdc653bd5f8e13826241da34d0938b9485f96b4a8,2025-03-04T04:15:12.210000
|
||||
CVE-2025-1903,0,0,ad39b59b593243038c6c2b3182d79a3798b1c4d73d43fb52278944b750429807,2025-03-04T04:15:12.383000
|
||||
CVE-2025-1904,0,0,c3f8c1fa1d9579c4d82bc617eae230933b987e0aaee6ca3786c17750a6074cf8,2025-03-04T05:15:14.440000
|
||||
CVE-2025-1905,0,0,544d2a978ea2a42a58a9b1374a4628e0334caacaa4fa4d5b01db57902479138d,2025-03-04T05:15:14.680000
|
||||
CVE-2025-1906,0,0,459dada4012727e3771610e3a7119b7d5a5efce1dfb2febc2be2da9752686a5c,2025-03-04T05:15:14.903000
|
||||
CVE-2025-1925,1,1,3555443c31b069f7d334eccd429471a153bc502fbca36c5565b567a1b55d2fd9,2025-03-04T14:15:36.717000
|
||||
CVE-2025-1930,1,1,0af19b309bc3568ec49a2f7143d8beec88c681599fe59a1a151cf4873518a863,2025-03-04T14:15:37.850000
|
||||
CVE-2025-1931,1,1,07ca8f72840844f1c7bc6e7707368913732bbd4581c32b3edd89096405e1f0b7,2025-03-04T14:15:37.963000
|
||||
CVE-2025-1932,1,1,685d653318d2c61bc7ab512d43423a62e980f639157cec9154a433bde0a8c89f,2025-03-04T14:15:38.053000
|
||||
CVE-2025-1933,1,1,af60cb7e54d694102cf1a34b3bf8a3d7b976ad074c5c72afe1edcea9c3030cb9,2025-03-04T14:15:38.170000
|
||||
CVE-2025-1934,1,1,defda1fa968f2d1f6b4bab5407943d1f18c163966bf3940bc1ce343e2dc494af,2025-03-04T14:15:38.273000
|
||||
CVE-2025-1935,1,1,628d9831cfde3bf6c1721fb5b4eb6426bb6f2fece608e7b61bb7df00efe8d704,2025-03-04T14:15:38.390000
|
||||
CVE-2025-1936,1,1,08ee55072dc1440649036276dd782693ec14b6ecbdcc6904219467a7b9af1bb6,2025-03-04T14:15:38.500000
|
||||
CVE-2025-1937,1,1,fe96f19485f137b7de4930d8a1c319b5b597161e14b41dc56749602d697c21c3,2025-03-04T14:15:38.610000
|
||||
CVE-2025-1938,1,1,9c67affb79189d97fc730ea5b0f939fba8b816b20045f69c914676a7593d8c17,2025-03-04T14:15:38.730000
|
||||
CVE-2025-1939,1,1,5423b6d57bde27103afefd0147e6a27b92b6f89c451bc13e8b0c4b336560932e,2025-03-04T14:15:38.837000
|
||||
CVE-2025-1940,1,1,5dbf44d5cc7ae5e21d3790ba36646b5bedeb9ad84f1c6a4302111774521a8db2,2025-03-04T14:15:38.950000
|
||||
CVE-2025-1941,1,1,e65f467cf8ffb9224f34a01e5cdb113d9511f46ba9c9c07e683575d280ecf13e,2025-03-04T14:15:39.063000
|
||||
CVE-2025-1942,1,1,643dcf7b843a42dc9ccb28b7e76a8aa357d034b38c8e0ef0ed7c25ddc2827490,2025-03-04T14:15:39.167000
|
||||
CVE-2025-1943,1,1,e9f1827e222fe2c9d54915e014c7896e9d0f61d9e34695a6c9e7975aa52b9e5a,2025-03-04T14:15:39.260000
|
||||
CVE-2025-1902,0,1,4f33e98a96c36f9eb4cbf4c992c7f8a6dde5fe1c6867df23a308ccaf03d2c2be,2025-03-04T16:15:37.450000
|
||||
CVE-2025-1903,0,1,feb447ed58cefdf61303da7ea43a9121d478203aceeb23851a14b658ab7612c4,2025-03-04T16:15:37.577000
|
||||
CVE-2025-1904,0,1,67789ecf25a3a069ead16fcfc4d62d28da2bab19c41d0fefbcf5c0a48757e274,2025-03-04T16:15:37.700000
|
||||
CVE-2025-1905,0,1,96b71a21d0d8fc3a56947eb8c835bfa740c8bb7b678faabc75b6ff6682fc8368,2025-03-04T15:15:24.033000
|
||||
CVE-2025-1906,0,1,50fb789742a4cb14c8bf4cadc940496288485e869e115b1312bb9ddc6bd1a640,2025-03-04T15:15:24.233000
|
||||
CVE-2025-1925,0,0,3555443c31b069f7d334eccd429471a153bc502fbca36c5565b567a1b55d2fd9,2025-03-04T14:15:36.717000
|
||||
CVE-2025-1930,0,0,0af19b309bc3568ec49a2f7143d8beec88c681599fe59a1a151cf4873518a863,2025-03-04T14:15:37.850000
|
||||
CVE-2025-1931,0,0,07ca8f72840844f1c7bc6e7707368913732bbd4581c32b3edd89096405e1f0b7,2025-03-04T14:15:37.963000
|
||||
CVE-2025-1932,0,0,685d653318d2c61bc7ab512d43423a62e980f639157cec9154a433bde0a8c89f,2025-03-04T14:15:38.053000
|
||||
CVE-2025-1933,0,1,013824cf9256af099bc6347ceda0ada705eda8a2cf83be8ba6383655963c9e57,2025-03-04T16:15:37.823000
|
||||
CVE-2025-1934,0,1,44f25a8902a9b9b95e941d6ccaa26cb7fa6741d2058c14d791dddd487b53c6b0,2025-03-04T16:15:37.970000
|
||||
CVE-2025-1935,0,1,b1f141814e3f1476674dd592029a8f4ffa3fe6d2fab8a0b0166b44a0a11fb5c0,2025-03-04T16:15:38.110000
|
||||
CVE-2025-1936,0,0,08ee55072dc1440649036276dd782693ec14b6ecbdcc6904219467a7b9af1bb6,2025-03-04T14:15:38.500000
|
||||
CVE-2025-1937,0,0,fe96f19485f137b7de4930d8a1c319b5b597161e14b41dc56749602d697c21c3,2025-03-04T14:15:38.610000
|
||||
CVE-2025-1938,0,0,9c67affb79189d97fc730ea5b0f939fba8b816b20045f69c914676a7593d8c17,2025-03-04T14:15:38.730000
|
||||
CVE-2025-1939,0,0,5423b6d57bde27103afefd0147e6a27b92b6f89c451bc13e8b0c4b336560932e,2025-03-04T14:15:38.837000
|
||||
CVE-2025-1940,0,1,2da52b7ef01c0ebae181d033a25f813d405367fc27b9ab2f5ece7671de559246,2025-03-04T16:15:38.310000
|
||||
CVE-2025-1941,0,1,c755e145fc658d9d2d1958c16a11cb393d3d6769dff8808a148cf5adfb9a5e27,2025-03-04T16:15:38.457000
|
||||
CVE-2025-1942,0,1,e7e8ffb9220287cc58971bc54a60d82cac4054a1402ceec16ddaf1f2c60d0668,2025-03-04T16:15:38.607000
|
||||
CVE-2025-1943,0,1,021009f6feffea675fe424b37381aa7740ab1b8c35c7e162f1f5acfa4c41d210,2025-03-04T15:15:24.493000
|
||||
CVE-2025-20011,0,0,5d2fdc5455e5c161d4353b8b7d096a2e122865a9c5759753d2f12b06ccf9a6a1,2025-03-04T04:15:12.563000
|
||||
CVE-2025-20014,0,0,f4fd1db051e4652a5d7e7863a21c37faec75062d4b5ce0e4f2c6bffc2f3ee854,2025-01-29T20:15:35.207000
|
||||
CVE-2025-20016,0,0,6fccb84eb01c2cd66b422e82777f9738bfe5004121e1b551d0ae454724543c0e,2025-01-14T10:15:07.500000
|
||||
@ -281193,7 +281201,7 @@ CVE-2025-21176,0,0,f683215bf84a27939b829b2fd8bdbd57fb03840af68a0aef95b986216dd89
|
||||
CVE-2025-21177,0,0,4f903499a658859fcb10826be90a0ea63b63f075823c3150567dddccfd65ed77,2025-02-11T22:19:45.057000
|
||||
CVE-2025-21178,0,0,dc867944694dd46d8ab835f7a6d78675b67e7454fecfc2784b90a7c98def1ac5,2025-01-27T18:42:39.560000
|
||||
CVE-2025-21179,0,0,56c99027ad0d41d9c697e46ad29c10aa7c65635cadb6d982db31f0458c99ddfa,2025-02-25T16:56:10.590000
|
||||
CVE-2025-21181,0,0,71cd8e17f304081f3c6b0247ebefaddfaa4c353fcd560fa012fa60a9c60bf6bd,2025-02-25T16:58:10.650000
|
||||
CVE-2025-21181,0,1,da3a9934c4290b3b670cda21e1ec49e2e6a47888699680facdd72d5c329d6586,2025-03-04T15:15:26.497000
|
||||
CVE-2025-21182,0,0,cc183a741d3d0b62fc82a334158a2ca4fdae6dba068e1b2b22a750e1789b8393,2025-02-25T16:59:25.820000
|
||||
CVE-2025-21183,0,0,97c60133d935bc6f85808e271daf514b07d577c1754cf44ed14ffde224dc4835,2025-02-25T17:00:06.170000
|
||||
CVE-2025-21184,0,0,5d06730c00c1dc25128c9225e356567d097b85e0f2f5db86ef3a5ca868f045e8,2025-02-28T16:02:50.353000
|
||||
@ -281393,7 +281401,7 @@ CVE-2025-21394,0,0,4ccc160d26f412d0660db2820673933d53f9e960ede3214b61aa7e3d64874
|
||||
CVE-2025-21395,0,0,aaa92e83be335ef96c9cd11d7db7db708bd0afd97750ce93e8f75c2b65de7d16,2025-01-17T15:46:01.927000
|
||||
CVE-2025-21396,0,0,02c0d56bd41ecdabdfe6ce22c5c5e978e70b99d6624ab2be1d0aabfacb417d10,2025-02-12T19:15:20.880000
|
||||
CVE-2025-21397,0,0,a7500ab2a246bb24c7f6147467f14845cb499ff96d8de9eb946a15acf67323e8,2025-02-14T17:38:29.007000
|
||||
CVE-2025-21399,0,0,f94f6647dfbca1fa188350cabbc49dc6fa4498708cee05fd2499c6da322431d0,2025-01-31T02:15:37.700000
|
||||
CVE-2025-21399,0,1,fdb3614139e0c94bbb2c1b0ec6ef458abd1b0f1068fd8bc112a3adb3acfb7db9,2025-03-04T15:15:28.007000
|
||||
CVE-2025-21400,0,0,37ed4978ea5ff59167ade9649ace31aa58a0e6b82c1ee4595bd48b77955a1c26,2025-02-14T17:37:31.690000
|
||||
CVE-2025-21401,0,0,e4d9e7c879800da1629474ad618445ce941bd3b909c5b2d4a6d10765a7fe87ae,2025-02-18T17:15:20.057000
|
||||
CVE-2025-21402,0,0,50bdf907bfb2678b17fcbbcf222749ada785020f895cf01f5f957d6360757277,2025-01-27T18:34:23.127000
|
||||
@ -281522,8 +281530,8 @@ CVE-2025-21620,0,0,aefab78f4e8b7a931e7536d08b17991e6afef83a4bc3ab5d14fb2e61be094
|
||||
CVE-2025-21622,0,0,f9b304c8cae09855d048ff95696b50613640a9fdc9c30a5aadd5c3b3ce64c9b7,2025-01-07T18:15:21.703000
|
||||
CVE-2025-21623,0,0,11a3a4b165ac7ea35d006622a2c31920fdd49ec8509c7c0bc152edfb3b703f1b,2025-01-07T17:15:32.313000
|
||||
CVE-2025-21624,0,0,67d81661ccc165bcb7a2d55cd4301b8865debac4b78d0af97080ff58ad5f038c,2025-01-07T17:15:32.417000
|
||||
CVE-2025-21626,0,1,e56409ce0f9770c9f60f64484e01c5dc141e09c125b689fb402783ce7def5acd,2025-03-04T13:49:18.880000
|
||||
CVE-2025-21627,0,1,a64cbac625de75abb2fb97405740e09eb3c0493dfb277a167ddabd4e32a452ec,2025-03-04T13:49:18.880000
|
||||
CVE-2025-21626,0,0,e56409ce0f9770c9f60f64484e01c5dc141e09c125b689fb402783ce7def5acd,2025-03-04T13:49:18.880000
|
||||
CVE-2025-21627,0,0,a64cbac625de75abb2fb97405740e09eb3c0493dfb277a167ddabd4e32a452ec,2025-03-04T13:49:18.880000
|
||||
CVE-2025-21628,0,0,0075ad45f4e081e6b1d4b87e45ccf38954b3b032c76d5db5fcb797ed5fc6213f,2025-01-09T18:15:30.070000
|
||||
CVE-2025-21629,0,0,5bd27bb9a82cb5a5f09a5986e4163e86befaea4298f9b54578a62350a29978a7,2025-01-15T13:15:15.220000
|
||||
CVE-2025-21630,0,0,b687cde38a98e756a80e569a98743dbd03093e3308ce5058c13044fa43b51e41,2025-01-17T09:15:08
|
||||
@ -281760,9 +281768,9 @@ CVE-2025-22219,0,0,b49955fb2ad7bfd00b8dfa99078cc886448cbbcd0b573429971407c26bc29
|
||||
CVE-2025-22220,0,0,a00b168f73aec469e4c78128ddc9ae91feb9fbb9ddcfb4c72ca05c1c287f029b,2025-02-06T14:15:30.510000
|
||||
CVE-2025-22221,0,0,9ab8cb2916b1d2add27df50f24514c36d0740b88ba103377a1c3f59422214b6c,2025-01-30T16:15:31.257000
|
||||
CVE-2025-22222,0,0,f96218f2ce820065976bcd4294c5a9c60e0f54f4e21cd14eff22d95b2b98eb7e,2025-01-30T16:15:31.367000
|
||||
CVE-2025-22224,0,0,fd318e5fff77738843cc9b3d3e80d297f64943d387efb764d22c0ea672dc48d8,2025-03-04T12:15:33.687000
|
||||
CVE-2025-22225,0,0,f4834648c2f6b2494eb42892bf6d82d8181e27a43ce98b17e9726398b9b9f312,2025-03-04T12:15:33.840000
|
||||
CVE-2025-22226,0,0,d90adfb8715bb1e8dc631ffd086928d68c1066ee4e833d32035e4567da2000ca,2025-03-04T12:15:33.973000
|
||||
CVE-2025-22224,0,1,e21bec5f866401de662166c9a38834c24983344adc02e4da91a31b9bd3dcd08f,2025-03-04T16:15:38.850000
|
||||
CVE-2025-22225,0,1,958bcb03393c9157b6f9f2052f0e3673f3a8a9e289593bb7a83203a4421a58c4,2025-03-04T16:15:38.970000
|
||||
CVE-2025-22226,0,1,a442f734f8505f20ee7da05274b2e61f3c862a1ce05fbeb66184989e568ab230,2025-03-04T16:15:39.097000
|
||||
CVE-2025-22260,0,0,6bffdd50ff1b9a95889c1f9bea94c0f7f92eb9097aa6e2dd07529a5cbb0d5ce1,2025-02-03T15:15:17.503000
|
||||
CVE-2025-22261,0,0,cabefa2bbb4850682fa8dc2dd04543561914d58490173d75f62166401d731c68,2025-02-26T15:15:24.877000
|
||||
CVE-2025-22262,0,0,2a90436047a91b64c9791cff4f6c4190896e3e92637458d2d2ccf25cb4f8537c,2025-01-21T14:15:09.757000
|
||||
@ -281865,7 +281873,7 @@ CVE-2025-22390,0,0,7d4cd529983da112f2a19a24b746418738cb2927e6e8de52b7de278b35e6a
|
||||
CVE-2025-22394,0,0,74bb5d327b5fabc5afe5722acba49dd35fe0c1d26a691784f120eb1e4f911ff7,2025-02-04T15:51:11.187000
|
||||
CVE-2025-22395,0,0,57c4b1d051c16506745f86a05c2206d0865c29f77486f620f2a0dfc5c8b5dd11,2025-02-04T15:49:52.617000
|
||||
CVE-2025-22399,0,0,c37486f8439a24e18965df381b1fbd8facfe56e4e036c4d759697286660e2568,2025-02-11T17:15:34.453000
|
||||
CVE-2025-22402,0,0,f76cbab41280a8de72b99de03f7ca0b8e04580815d7e99e01923e9b1697ba28c,2025-02-07T03:15:12.287000
|
||||
CVE-2025-22402,0,1,18d8506db602a971c9b4f40c756b0b67ce8011a8d95adfb78fd6cdc6121fb772,2025-03-04T14:53:43.637000
|
||||
CVE-2025-22443,0,0,1c071c52aacf8a22841389b33ab1759d8b0571488fd50df74383b3b5be8316b7,2025-03-04T04:15:14.097000
|
||||
CVE-2025-22445,0,0,b624e4e02bffb5e86c49cb4f27a7947d07caad44049ae2738e6a5025f36e7b72,2025-01-09T07:15:28.617000
|
||||
CVE-2025-22449,0,0,bbe6983ada373fe96f2acc3f2babe8a504c2fad76654b8fe6101ea89ee7b3f6f,2025-01-09T07:15:28.777000
|
||||
@ -281974,7 +281982,7 @@ CVE-2025-22599,0,0,1679c6ac5484b7793289eabf6194cbd25427299caec44c6a27aa8b57d1a02
|
||||
CVE-2025-22600,0,0,f110ec74413c49b371a01e714512d4c9c7c3871d9aa7d096e2f2f2161dd61f8a,2025-01-10T16:15:30.940000
|
||||
CVE-2025-22601,0,0,e5a036684b4e6e1204af1b20135d30f3904e4c5af4a80eedecb01794128ea749,2025-02-04T21:15:27.800000
|
||||
CVE-2025-22602,0,0,c8f7aea9374385130d2049dfea6e2ee228c262f087909008185d3a99dec96d21,2025-02-04T21:15:27.950000
|
||||
CVE-2025-22604,0,0,f2e2f3e5714493a0587fb09fddd55f91c682225656d2d60d4b600d17f03f7fdd,2025-01-27T17:15:17.307000
|
||||
CVE-2025-22604,0,1,e77b02e1f62ca8c90b9aef1da0c6c55d8a3e02e8a7f5ed82d610d0ba53646361,2025-03-04T14:45:17.807000
|
||||
CVE-2025-22605,0,0,e020c4b8ee74d3a7b5ae92905dc162b067bc2ecec9d0c7b4511ad2cc05d6d46e,2025-01-24T15:15:12.330000
|
||||
CVE-2025-22606,0,0,6897f6b106e13df92057dcf3df4b4ec47dbbfa122118bcfc3d42e2e512504801,2025-01-24T16:15:38.307000
|
||||
CVE-2025-22607,0,0,7c0a771fa15c2fffda62d633c9927cd84470e8d10f639a2980e7fc8bdf835ab5,2025-01-24T16:15:38.470000
|
||||
@ -282208,7 +282216,7 @@ CVE-2025-23019,0,0,d086114380d5b72aae48f2dd063fe423ce3274d7a5a6c9dc170a5da44914e
|
||||
CVE-2025-23020,0,0,ddc02947f0b59a5de6e6a776839dec2cf08c84bac344560dd2b477015ae3c297,2025-02-20T03:15:12.630000
|
||||
CVE-2025-23022,0,0,bb805305ea96825569d9891ea5d8911d64b95f766e73f0709e01ab6077884661,2025-01-16T21:12:15.537000
|
||||
CVE-2025-23023,0,0,8d62189672cb787e5081908c4fe2e78759d3475dd1f1ecf661879211c3f1488e,2025-02-04T21:15:28.083000
|
||||
CVE-2025-23024,0,1,bf0582042501ee44e59b14902a790c188cdc4c2dbc961793adbe006bb8c097af,2025-03-04T13:49:18.880000
|
||||
CVE-2025-23024,0,0,bf0582042501ee44e59b14902a790c188cdc4c2dbc961793adbe006bb8c097af,2025-03-04T13:49:18.880000
|
||||
CVE-2025-23025,0,0,a430643fad54c298ac56c82186034eeeea39626036838a2f98e7e7672f4b6ffd,2025-01-14T18:16:05.650000
|
||||
CVE-2025-23026,0,0,b268119f7916ba3a282a082a7a4e3bccaa70c542061d608ad26e1251c19332fd,2025-01-13T21:15:15.897000
|
||||
CVE-2025-23027,0,0,3d8a20e7f66f71ebfff4348388587603a6ab48265ca2628da8f07052fa639ed0,2025-01-13T20:15:30.150000
|
||||
@ -282294,7 +282302,7 @@ CVE-2025-23202,0,0,9cc26d9043bb3e4108331025950b820420267c76da7ed157b3eb776235b83
|
||||
CVE-2025-23205,0,0,d2ab035ca501b5eab7d4cddec3035fce30102ede9a29be2c285f726d29109cd9,2025-01-17T21:15:11.850000
|
||||
CVE-2025-23206,0,0,b65a76f2ad595c398703f7f41c44ad516e76d2e163922a710fc577a54a9a2b5f,2025-01-17T21:15:12.003000
|
||||
CVE-2025-23207,0,0,a61af6f2707ecd45627a7e7ca479f8fbbb333f7f551bc284878a54328b3225b8,2025-01-17T22:15:29.523000
|
||||
CVE-2025-23208,0,0,0895c6a64980853d0ca71f84de6b0e100f054b96d041a45a6799d08d97b8f9cb,2025-01-17T23:15:13.107000
|
||||
CVE-2025-23208,0,1,18e8dd4156ff7a971fcd6f122778478e5486080caeaf8f18c2797a06dc02b4cb,2025-03-04T14:45:17.807000
|
||||
CVE-2025-23209,0,0,5039cc636732004b36d1abe67ffc1f35372cacab530b3970be9516a2d86f22df,2025-02-21T14:48:55.367000
|
||||
CVE-2025-23210,0,0,65bcfc40caedf4e3c9e8b75bd933193b1248e3166d8ac42679477e8b6066d8bd,2025-02-03T22:15:28.187000
|
||||
CVE-2025-23211,0,0,a8c3e1a20bc03b6063f45202fba6ba54e6ed0105c48d464f348071f492dc6770,2025-01-28T17:15:26.160000
|
||||
@ -282321,6 +282329,7 @@ CVE-2025-23362,0,0,f1b04109bb5a53f0fa12693fb841988a838f82d29d11cab82e72412009724
|
||||
CVE-2025-23363,0,0,9d847654d50480688aa91cb0e62a450466f9daa5cc4a3d346e469c34ce48abe5,2025-02-25T17:15:14.227000
|
||||
CVE-2025-23366,0,0,19d3d492f06020aadbd27d64e622d5ed1c347260739b5074a05d263b32a748da,2025-01-14T18:16:06.290000
|
||||
CVE-2025-23367,0,0,7754a5b5a7ef7b20fc4ec39ada85296b1a92f1ca2476a6564c884bf68763656c,2025-01-31T21:15:13.613000
|
||||
CVE-2025-23368,1,1,339a5dd013648c18d8c9de4be6c08d751322dc82af6128b3b1fb673ee268d8de,2025-03-04T16:15:39.270000
|
||||
CVE-2025-23369,0,0,74f04427c8261f575e3b46a10e2c572c85dddb2e090b01cedc0f322610f8f68b,2025-02-05T19:15:45.747000
|
||||
CVE-2025-23374,0,0,dc7fc0938dfddbb9f9d96945d0cf484d16ace6397f0b6d455113dea4502470b2,2025-02-07T20:09:28.717000
|
||||
CVE-2025-23385,0,0,44f68c3210fdb2f588e2b733b3276d4f924d74ac5df4660c1e28e1d2bd89eca2,2025-01-28T16:15:41.377000
|
||||
@ -283530,14 +283539,14 @@ CVE-2025-25354,0,0,fd5fd687c6f8251390b2e5e3a768a6ab287fc80bafc324107405456de75d6
|
||||
CVE-2025-25355,0,0,ec2a794520ae75d22fabcfb38a52ffaf9173963e387059ab2ce0d1d9b5964571,2025-02-14T20:15:37.053000
|
||||
CVE-2025-25356,0,0,0eaa4c481eace739405e37ac8872e49e25549e9d6fd6ad7ae3b6c02ea89fec17,2025-02-14T19:38:41.850000
|
||||
CVE-2025-25357,0,0,6ee1cd3a9f7f323b5c37547d52a4c5ca928da63fb7a31ff1e85142032c6e3241,2025-02-14T19:38:15.303000
|
||||
CVE-2025-25379,0,0,738b03ca4625962dfa89966740701d4df3897a8e4af1f92e80e1cd49976c0c26,2025-02-28T23:15:10.790000
|
||||
CVE-2025-25379,0,1,10c6b59b7ced1a65c44b725df73613b964204bd8bcc126008f75da9f2d8ec909,2025-03-04T16:15:39.433000
|
||||
CVE-2025-25387,0,0,8227bd6f57bafc5fc7f8bddfd6ec6a78dcca117ca404c22469842eba5d4e306c,2025-02-14T17:15:20.393000
|
||||
CVE-2025-25388,0,0,e086cda7e4e5c05ccba48ad30906fb7e59dedc66fc1b83e5645bd434397a431f,2025-02-13T20:15:49.730000
|
||||
CVE-2025-25389,0,0,c4fa8037812de3d612838c95ec3fcc9b936e3b28bc2aa3e854f709efa62e78c8,2025-02-14T17:15:20.663000
|
||||
CVE-2025-25428,0,0,7c9e8b5adbcec4172a435bc0445a832224ef2aaebd6fa92be1fbe29fc2ee9ecb,2025-02-28T19:15:36.773000
|
||||
CVE-2025-25428,0,1,a4039c579030febd59545c017c3c1beb99a5f4778526e73f910acc016f0edd9b,2025-03-04T16:15:39.597000
|
||||
CVE-2025-25429,0,0,cececf6fd4380f28dd3128e781fd11132f0c103fc594cfd9dd17f0a87d409fc9,2025-02-28T23:15:10.903000
|
||||
CVE-2025-25430,0,0,94a67adc555362067a515c38cf02aeb84a8bd7c8fa8c3cd90b22df5262795fa8,2025-02-28T18:15:28.263000
|
||||
CVE-2025-25431,0,0,226362430653b83ef54d39ec1534ee38f2c2c9ca36c02c59252ca3699e225ad2,2025-02-28T18:15:28.407000
|
||||
CVE-2025-25430,0,1,9163efbf1f16deef9388edc5dfce8619e56506503048f018e2813a808e54d729,2025-03-04T16:15:39.763000
|
||||
CVE-2025-25431,0,1,b394e7042bdaf0befa6d619f673ec987ef0e6b97c7a283213fbe60ffc2fa9133,2025-03-04T16:15:39.917000
|
||||
CVE-2025-25460,0,0,82c83de72621855fac95e9c964cfbdf72c297a15a88fc1d2ee5a87f0355f72e3,2025-02-24T17:15:13.900000
|
||||
CVE-2025-25461,0,0,abefcc4a87fcc99aefa917b36b82be2cf46ec09db32826ad12097cd2c52c8d9d,2025-02-28T16:15:39.387000
|
||||
CVE-2025-25462,0,0,45409d13594a8c4887589ff11618b5896c12f0d1930079d72248394fe633117c,2025-02-26T16:15:16.933000
|
||||
@ -283549,7 +283558,7 @@ CVE-2025-25472,0,0,6c6dc9c03a8c0408df3e1a9caeca7e0bfec3e9936d5584756b38960f4938d
|
||||
CVE-2025-25473,0,0,e8e0a8342346bf2f32dfaaee95898f0b633608ccb1cba92ce43fca3dc31e73b1,2025-02-20T22:15:30.863000
|
||||
CVE-2025-25474,0,0,664718fe11db0dbfa633cf91e2e531f31edde20febc7bcbbc6390ec05fbc4113,2025-02-20T22:15:31.027000
|
||||
CVE-2025-25475,0,0,09278089065f0af1184c02f8490e15185f88eb53d92fb93aba844e1509b6e9c5,2025-02-20T22:15:31.190000
|
||||
CVE-2025-25476,0,0,295ca2449e77c24dfd41b0e6988f848bd5ebe2b3b39dd8048ab6a39488795ccf,2025-02-28T23:15:11.063000
|
||||
CVE-2025-25476,0,1,dcb05a63fbcff084bcf1c5df3723664abe2b9f2707596be8a1333f910233cd3b,2025-03-04T16:15:40.080000
|
||||
CVE-2025-25477,0,0,394fe8fbdba802b7903f79579ee44bd6683941d582eaf8039e436a0431983458,2025-02-28T16:15:39.550000
|
||||
CVE-2025-25478,0,0,12db196fdbdedfe1d57ae93bb18fa9d9c8691821fcbf897c2d62e811de8bb585,2025-02-28T23:15:11.170000
|
||||
CVE-2025-25505,0,0,11c4c75af440f82d715defaf6782907c0744a464a1a91c9d9aeef14ada87484d,2025-02-21T21:15:23.723000
|
||||
@ -283603,8 +283612,8 @@ CVE-2025-25743,0,0,65b470adc61c7865b16e040e95e97b019f65181411fb698ca491a4d95f9cd
|
||||
CVE-2025-25744,0,0,a94e293e8b090a3f233edd8811f540b50467cbc536ca78f870a52d5731bb3874,2025-02-19T19:02:27.687000
|
||||
CVE-2025-25745,0,0,6954ac06db222a2d53d510e8895c4f26dd1f1d917e56ca97169f9eb9f3840768,2025-02-14T16:15:37.010000
|
||||
CVE-2025-25746,0,0,cbf058e2dc9833cb4adeac1d2f404166a61c0d96a6ad617dde3893fa4bf6a37d,2025-02-24T16:30:37.200000
|
||||
CVE-2025-25759,0,0,b72901452c56894af5f21d8b6dd05a44d60e919231ddbb81928df2d768b4767b,2025-02-27T15:15:41.570000
|
||||
CVE-2025-25760,0,0,b30f302a0d601a35cec14bf52c6cebe6fec99ba9512ba110eec0ce813dd117f2,2025-02-27T15:15:41.670000
|
||||
CVE-2025-25759,0,1,293b850ebe0a274765acc91f23faade1c53b146b12bb218a57ca1cee0ac51835,2025-03-04T15:15:28.353000
|
||||
CVE-2025-25760,0,1,963e7e75521960c9620a7affa1021c0ca484b511b623074b9cde550324014cef,2025-03-04T15:15:28.590000
|
||||
CVE-2025-25761,0,0,3db442c19fbfc76e4afa4e4eacc9350d95fd28b1bf92eb230c9d214105e6b76b,2025-02-27T15:15:41.777000
|
||||
CVE-2025-25765,0,0,4771a7e87c33cb6b1bf793f3b79e4f059f64eb7778711124d0e26c1a7b4b4033,2025-03-03T20:15:46.433000
|
||||
CVE-2025-25766,0,0,f39b595117fd6ac0197008d13a65ac6ad37b800d031e5372f4209ffae8413b60,2025-03-03T20:15:46.600000
|
||||
@ -283694,6 +283703,7 @@ CVE-2025-26308,0,0,69e4926ab121453dd269ecd5c4a1e680c76cfe3a7adc73ca0152c52aac5d4
|
||||
CVE-2025-26309,0,0,7ae8d8b0652f85e6f8fa255fc222f026973cab38848f066168ff295eb6f4ee31,2025-02-21T18:16:13.790000
|
||||
CVE-2025-26310,0,0,55b236dbeb9a20179e9b06fa335fdfa1062067456641081301fd898e499e9d2b,2025-02-21T18:16:17.950000
|
||||
CVE-2025-26311,0,0,8f41ce6db700f92fea4726f2c9198369bec586ae5a386ba2dec789165ea39c8e,2025-02-20T21:15:25.907000
|
||||
CVE-2025-26320,1,1,5fefe4585825870b6e42a706d5c6a8703dfe4775e609ed2f31b171f050d5485d,2025-03-04T16:15:40.240000
|
||||
CVE-2025-26325,0,0,4eaa7da6a5e4d1e182731f1781ee5d725571c0a3ec63342fdfe0db1d2f4660fc,2025-02-28T22:15:39.927000
|
||||
CVE-2025-26326,0,0,f84875e9cdda7cdf32b7a706b3dc63076bc4fd2668c6fb2df857dabcd399807f,2025-02-28T15:15:13.743000
|
||||
CVE-2025-26339,0,0,7ef9dcda2637eaa8381f0c62a213393a7c2029d066112e960db3e0a470c75e63,2025-02-12T14:15:33.510000
|
||||
@ -283865,7 +283875,7 @@ CVE-2025-26793,0,0,d30b44911459092c9e08ffe42552727cfd072bd06f4aa8564ac964446a27e
|
||||
CVE-2025-26794,0,0,fe65001567301b62f9f70becffce46b16ab4f6e8292d604a049482502e1fc499,2025-02-22T01:15:10.670000
|
||||
CVE-2025-26803,0,0,407dfdf36bb29c1169c55a1bdf56c2857dbd1f6059de4d7853e727c76548a45d,2025-02-28T16:07:41.847000
|
||||
CVE-2025-26819,0,0,265b05b0b6b085ef27d0e218dd5a0f79b1864b8a6c0004a23e6fa9575a3cdbeb,2025-02-15T00:15:28.510000
|
||||
CVE-2025-26849,0,0,54decf0050486d8bff18d33a6116f8f7ed807923bef5d3d8bf0649b9106ae882,2025-03-04T09:15:10.917000
|
||||
CVE-2025-26849,0,1,b13951f979e617745ee5f8ac921a867df9f510109c7775edd0473f90fdd96dd7,2025-03-04T16:15:40.360000
|
||||
CVE-2025-26856,0,0,7824298cfc11aa81d23219a23487dd842dd5c11d44f90723ef1786188c90cd64,2025-02-20T06:15:21.673000
|
||||
CVE-2025-26868,0,0,cba4f0d0c27029718e2b50a126041299a77ea3636d837c9614e50e9855b0878b,2025-02-25T15:15:23.903000
|
||||
CVE-2025-26871,0,0,ab850536250644e42a3ba5d883350c3eff02f87d1e660abd32733c03a6449348,2025-02-25T15:15:24.040000
|
||||
@ -283959,6 +283969,7 @@ CVE-2025-27106,0,0,26fc58d1f4f645e7be82b82db6f2be52da1c463bb7a3665e75777e66b3edd
|
||||
CVE-2025-27108,0,0,34d6d1e5e32f01741f013d8e11085ab9652369eb805ee793ac08ed811303f050,2025-02-27T20:18:12.583000
|
||||
CVE-2025-27109,0,0,10c8f8672c8f3a12b915e1b3ec725c9d1ebfee260a221a5368748fc4851dc756,2025-02-24T17:15:14.850000
|
||||
CVE-2025-27110,0,0,059d870c313e4a557107b6ae0082199b6395bbcf7d1ddc56d5ab6903b573b570,2025-02-28T13:35:22.340000
|
||||
CVE-2025-27111,1,1,419c2555e4f7326575f860091396a7a260154f69ba392c4821f681c870261dce,2025-03-04T16:15:40.487000
|
||||
CVE-2025-27112,0,0,ad3bd22bf68a43e9ef7354153af5bf27543e71ad253b691f1b313d10f702063d,2025-02-27T20:18:12.583000
|
||||
CVE-2025-27113,0,0,1163a140c7451a5d3ce8342e9e475fc7cc692a5677dca273619df06c0d4a282d,2025-02-27T20:18:12.583000
|
||||
CVE-2025-27133,0,0,bfde01faa06d9963c59eea543f4fa6168a24602a8639d07c356f8930ec6d4154,2025-02-28T16:07:41.847000
|
||||
@ -284057,9 +284068,9 @@ CVE-2025-27420,0,0,9d526a7e533e1150de46ca6280cff846925c1fbe0c81b3eaf5526bd6ed1ef
|
||||
CVE-2025-27421,0,0,c5f8cbb8f9ad5af14f93e4ff38fc97a2222c7110d039eea8083f6d3839df358a,2025-03-03T17:15:15.630000
|
||||
CVE-2025-27422,0,0,bcd8a473455936a2a24238f0c36bf9a7c4201ca34fa1348e7e22e5b4114dc5b5,2025-03-03T17:15:15.787000
|
||||
CVE-2025-27423,0,0,88e83c39a3504ab732d13ded688593dc0fb5c684cb5e5c6337b81425bc853482,2025-03-03T17:15:15.943000
|
||||
CVE-2025-27424,1,1,cc2945756d56b37d88e982abae75015a79e227fff15d34182659ed65557d5d90,2025-03-04T14:15:39.397000
|
||||
CVE-2025-27425,1,1,fbc4b3118251230ac7c7affcbb0b3e868553e04992c0c3515adecdf42212f11a,2025-03-04T14:15:39.493000
|
||||
CVE-2025-27426,1,1,860f9cbbdf2d294154d869e5bfa7c5c461d73af2f1e84fe2ef0c26777f1a316e,2025-03-04T14:15:39.593000
|
||||
CVE-2025-27424,0,1,30d0ccd4da8b3965ccdd64d75913c26c382be899b8dbaed2f7644ddd5e414706,2025-03-04T16:15:40.647000
|
||||
CVE-2025-27425,0,1,43f7986422b72b569737fcbe0c2ca989629ae4db5bdd877f11b2c4de8f9e5339,2025-03-04T16:15:40.797000
|
||||
CVE-2025-27426,0,1,3424a995371007e75834114eff317845d6ca8dec201ea4e5a46602f3aae7a610,2025-03-04T16:15:40.933000
|
||||
CVE-2025-27498,0,0,5abce51fa5a892a16b00a0cc6ce6e1fd8dbe5c06f14b98e0dedb5a5e4ad38ec0,2025-03-03T17:15:16.443000
|
||||
CVE-2025-27499,0,0,ab06e5a6a9e6a84d5061b8c89a502ae1ba119ec86416a651117e80b7694ffcba,2025-03-03T19:15:36.027000
|
||||
CVE-2025-27500,0,0,be50dbcb64bc9b0e171440007ce7d77f7cd94b8b10aa18d6f6266491eec37f80,2025-03-03T19:15:36.157000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user