Auto-Update: 2025-03-04T17:00:19.916462+00:00

This commit is contained in:
cad-safe-bot 2025-03-04 17:03:49 +00:00
parent cf93a7c90d
commit 3f44f985a3
75 changed files with 2972 additions and 309 deletions

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-38116",
"sourceIdentifier": "security@opentext.com",
"published": "2024-11-22T16:15:18.663",
"lastModified": "2024-11-22T16:15:18.663",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-03-04T14:45:17.807",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microfocus:imanager:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3.2.5",
"matchCriteriaId": "D25C400A-B561-42C0-845D-1F049D74CFDF"
}
]
}
]
}
],
"references": [
{
"url": "https://www.netiq.com/documentation/imanager-32/imanager325_releasenotes/data/imanager325_releasenotes.html",
"source": "security@opentext.com"
"source": "security@opentext.com",
"tags": [
"Release Notes"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-38117",
"sourceIdentifier": "security@opentext.com",
"published": "2024-11-22T16:15:18.823",
"lastModified": "2024-11-22T16:15:18.823",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-03-04T14:45:17.807",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,32 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microfocus:imanager:*:*:*:*:*:*:*:*",
"versionStartIncluding": "3.0",
"versionEndExcluding": "3.2.5",
"matchCriteriaId": "B0E8FCE3-05D5-43EF-BAD0-D6917DAA3154"
}
]
}
]
}
],
"references": [
{
"url": "https://www.netiq.com/documentation/imanager-32/imanager325_releasenotes/data/imanager325_releasenotes.html",
"source": "security@opentext.com"
"source": "security@opentext.com",
"tags": [
"Release Notes"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-38118",
"sourceIdentifier": "security@opentext.com",
"published": "2024-11-22T16:15:18.950",
"lastModified": "2024-11-22T16:15:18.950",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-03-04T14:45:17.807",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
@ -49,12 +69,44 @@
"value": "CWE-250"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microfocus:imanager:*:*:*:*:*:*:*:*",
"versionStartIncluding": "3.0",
"versionEndExcluding": "3.2.5",
"matchCriteriaId": "B0E8FCE3-05D5-43EF-BAD0-D6917DAA3154"
}
]
}
]
}
],
"references": [
{
"url": "https://www.netiq.com/documentation/imanager-32/imanager325_releasenotes/data/imanager325_releasenotes.html",
"source": "security@opentext.com"
"source": "security@opentext.com",
"tags": [
"Release Notes"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-38119",
"sourceIdentifier": "security@opentext.com",
"published": "2024-11-22T16:15:19.073",
"lastModified": "2024-11-22T16:15:19.073",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-03-04T14:45:17.807",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,32 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microfocus:imanager:*:*:*:*:*:*:*:*",
"versionStartIncluding": "3.0",
"versionEndExcluding": "3.2.5",
"matchCriteriaId": "B0E8FCE3-05D5-43EF-BAD0-D6917DAA3154"
}
]
}
]
}
],
"references": [
{
"url": "https://www.netiq.com/documentation/imanager-32/imanager325_releasenotes/data/imanager325_releasenotes.html",
"source": "security@opentext.com"
"source": "security@opentext.com",
"tags": [
"Release Notes"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-38134",
"sourceIdentifier": "security@opentext.com",
"published": "2024-11-22T16:15:19.197",
"lastModified": "2024-11-22T16:15:19.197",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-03-04T14:45:17.807",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,32 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microfocus:imanager:*:*:*:*:*:*:*:*",
"versionStartIncluding": "3.0",
"versionEndExcluding": "3.2.6",
"matchCriteriaId": "E63B08F5-5805-41CE-BE93-63BFE4F9F4DD"
}
]
}
]
}
],
"references": [
{
"url": "https://www.netiq.com/documentation/imanager-32/imanager326_releasenotes/data/imanager326_releasenotes.html",
"source": "security@opentext.com"
"source": "security@opentext.com",
"tags": [
"Release Notes"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-38135",
"sourceIdentifier": "security@opentext.com",
"published": "2024-11-22T16:15:19.327",
"lastModified": "2024-11-22T16:15:19.327",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-03-04T14:45:17.807",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 4.0
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
@ -53,12 +73,49 @@
"value": "CWE-918"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microfocus:imanager:*:*:*:*:*:*:*:*",
"versionStartIncluding": "3.0",
"versionEndIncluding": "3.2.5",
"matchCriteriaId": "DF67FDD9-04A4-4B8E-8458-1994CB6AA8F7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microfocus:imanager:3.2.6:-:*:*:*:*:*:*",
"matchCriteriaId": "9EF246DD-DC88-4C64-903E-79CDC733927A"
}
]
}
]
}
],
"references": [
{
"url": "https://www.netiq.com/documentation/imanager-32/imanager326_releasenotes/data/imanager326_releasenotes.html",
"source": "security@opentext.com"
"source": "security@opentext.com",
"tags": [
"Release Notes"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-26324",
"sourceIdentifier": "security@opentext.com",
"published": "2024-11-22T16:15:19.470",
"lastModified": "2024-11-22T16:15:19.470",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-03-04T14:45:17.807",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,30 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microfocus:imanager:3.2.6:-:*:*:*:*:*:*",
"matchCriteriaId": "9EF246DD-DC88-4C64-903E-79CDC733927A"
}
]
}
]
}
],
"references": [
{
"url": "https://www.netiq.com/documentation/imanager-32/pdfdoc/imanager326_patch1_releasenotes/imanager326_patch1_releasenotes.pdf",
"source": "security@opentext.com"
"source": "security@opentext.com",
"tags": [
"Release Notes"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-4315",
"sourceIdentifier": "cve@gitlab.com",
"published": "2023-03-08T23:15:10.893",
"lastModified": "2024-11-21T07:35:01.163",
"lastModified": "2025-03-04T16:15:33.893",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -65,6 +65,16 @@
"value": "CWE-863"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-863"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-24466",
"sourceIdentifier": "security@opentext.com",
"published": "2024-11-22T16:15:19.673",
"lastModified": "2024-11-22T16:15:19.673",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-03-04T14:45:17.807",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
@ -51,10 +71,47 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microfocus:imanager:*:*:*:*:*:*:*:*",
"versionStartIncluding": "3.0",
"versionEndExcluding": "3.2.6",
"matchCriteriaId": "E63B08F5-5805-41CE-BE93-63BFE4F9F4DD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microfocus:imanager:3.2.6:-:*:*:*:*:*:*",
"matchCriteriaId": "9EF246DD-DC88-4C64-903E-79CDC733927A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microfocus:imanager:3.2.6:patch1:*:*:*:*:*:*",
"matchCriteriaId": "96EDF0C7-9951-4ACD-A1C5-812867CA1294"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microfocus:imanager:3.2.6:patch2:*:*:*:*:*:*",
"matchCriteriaId": "E676C79A-4C37-47DF-A4AF-722AF6AC30A4"
}
]
}
]
}
],
"references": [
{
"url": "https://www.netiq.com/documentation/imanager-32/pdfdoc/imanager326_patch3_releasenotes/imanager326_patch3_releasenotes.pdf",
"source": "security@opentext.com"
"source": "security@opentext.com",
"tags": [
"Release Notes"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-24467",
"sourceIdentifier": "security@opentext.com",
"published": "2024-11-22T16:15:19.810",
"lastModified": "2024-11-22T16:15:19.810",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-03-04T14:45:17.807",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
@ -55,10 +75,47 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microfocus:imanager:*:*:*:*:*:*:*:*",
"versionStartIncluding": "3.0",
"versionEndExcluding": "3.2.6",
"matchCriteriaId": "E63B08F5-5805-41CE-BE93-63BFE4F9F4DD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microfocus:imanager:3.2.6:-:*:*:*:*:*:*",
"matchCriteriaId": "9EF246DD-DC88-4C64-903E-79CDC733927A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microfocus:imanager:3.2.6:patch1:*:*:*:*:*:*",
"matchCriteriaId": "96EDF0C7-9951-4ACD-A1C5-812867CA1294"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microfocus:imanager:3.2.6:patch2:*:*:*:*:*:*",
"matchCriteriaId": "E676C79A-4C37-47DF-A4AF-722AF6AC30A4"
}
]
}
]
}
],
"references": [
{
"url": "https://www.netiq.com/documentation/imanager-32/pdfdoc/imanager326_patch3_releasenotes/imanager326_patch3_releasenotes.pdf",
"source": "security@opentext.com"
"source": "security@opentext.com",
"tags": [
"Release Notes"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-26922",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-03-08T16:15:09.470",
"lastModified": "2024-11-21T07:52:04.360",
"lastModified": "2025-03-04T15:15:17.240",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-89"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-11132",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-02-03T20:15:32.047",
"lastModified": "2025-02-03T20:15:32.047",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-04T14:53:43.637",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
@ -19,7 +19,7 @@
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
@ -36,6 +36,19 @@
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:*/AC:*/PR:*/UI:R/S:*/C:*/I:*/A:*",
"baseScore": 0.0,
"baseSeverity": "NONE",
"userInteraction": "REQUIRED"
},
"exploitabilityScore": 0.0,
"impactScore": 0.0
}
]
},
@ -51,14 +64,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:imithemes:eventer:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "3.9.9",
"matchCriteriaId": "3A1C0C08-1A81-479B-B58D-835C48A01F85"
}
]
}
]
}
],
"references": [
{
"url": "https://codecanyon.net/item/eventer-wordpress-event-manager-plugin/20972534",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/2b747d61-4528-485e-b746-6dddc64485b5?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-11133",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-02-03T20:15:32.203",
"lastModified": "2025-02-03T20:15:32.203",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-04T14:53:43.637",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:imithemes:eventer:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "3.9.9",
"matchCriteriaId": "3A1C0C08-1A81-479B-B58D-835C48A01F85"
}
]
}
]
}
],
"references": [
{
"url": "https://codecanyon.net/item/eventer-wordpress-event-manager-plugin/20972534",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/1d78b823-fdff-41b2-8059-6564e3eb668d?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-11134",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-02-03T20:15:32.373",
"lastModified": "2025-02-03T20:15:32.373",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-04T14:53:43.637",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -19,7 +19,7 @@
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
@ -51,14 +71,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:imithemes:eventer:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "3.9.9.1",
"matchCriteriaId": "C11E43CF-CF13-4AB5-8E9F-3672D6C3EC6D"
}
]
}
]
}
],
"references": [
{
"url": "https://codecanyon.net/item/eventer-wordpress-event-manager-plugin/20972534",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/476bc092-c623-4caf-9676-3036d27c4840?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -0,0 +1,78 @@
{
"id": "CVE-2024-11957",
"sourceIdentifier": "security@eset.com",
"published": "2025-03-04T16:15:34.927",
"lastModified": "2025-03-04T16:15:34.927",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper verification of the digital signature in ksojscore.dll in Kingsoft WPS Office in versions equal or less than 12.1.0.18276\n\n on Windows allows an attacker to load an arbitrary Windows library. The patch released in version 12.2.0.16909 to mitigate CVE-2024-7262 was not restrictive enough."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "security@eset.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:L/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 9.3,
"baseSeverity": "CRITICAL",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnAvailabilityImpact": "LOW",
"subConfidentialityImpact": "HIGH",
"subIntegrityImpact": "HIGH",
"subAvailabilityImpact": "HIGH",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "security@eset.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-347"
}
]
}
],
"references": [
{
"url": "https://www.welivesecurity.com/en/eset-research/analysis-of-two-arbitrary-code-execution-vulnerabilities-affecting-wps-office/",
"source": "security@eset.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-13685",
"sourceIdentifier": "contact@wpscan.com",
"published": "2025-03-04T06:15:27.240",
"lastModified": "2025-03-04T06:15:27.240",
"vulnStatus": "Received",
"lastModified": "2025-03-04T15:15:18.760",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
@ -11,7 +11,30 @@
"value": "The Admin and Site Enhancements (ASE) WordPress plugin before 7.6.10 retrieves client IP addresses from potentially untrusted headers, allowing an attacker to manipulate their value to bypass the login limit feature in the Admin and Site Enhancements (ASE) WordPress plugin before 7.6.10."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"references": [
{
"url": "https://wpscan.com/vulnerability/72c61904-253d-42d1-9edd-7ea2162a2f85/",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-45598",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-01-27T16:15:31.267",
"lastModified": "2025-01-27T16:15:31.267",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-03-04T14:45:17.807",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.2,
"impactScore": 4.7
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.2,
"impactScore": 3.6
}
]
},
@ -51,14 +71,39 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cacti:cacti:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.2.29",
"matchCriteriaId": "C0B80A90-97E0-49C0-A780-695E17B0568C"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/Cacti/cacti/commit/eca52c6bb3e76c55d66b1040baa6dbf37471a0ae",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/Cacti/cacti/security/advisories/GHSA-pv2c-97pp-vxwg",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-48248",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-03-04T08:15:33.550",
"lastModified": "2025-03-04T09:15:10.307",
"vulnStatus": "Received",
"lastModified": "2025-03-04T16:15:35.150",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
@ -55,6 +55,10 @@
{
"url": "https://labs.watchtowr.com/the-best-security-is-when-we-all-agree-to-keep-everything-secret-except-the-secrets-nakivo-backup-replication-cve-2024-48248/",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/watchtowrlabs/nakivo-arbitrary-file-read-poc-CVE-2024-48248/?ref=labs.watchtowr.com",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-50302",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-11-19T02:16:32.320",
"lastModified": "2024-11-27T15:27:00.187",
"vulnStatus": "Analyzed",
"lastModified": "2025-03-04T16:15:35.280",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-908"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-908"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-50656",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-03T19:15:12.370",
"lastModified": "2025-02-18T19:15:17.930",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-04T14:53:43.637",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,15 +15,74 @@
"value": "itsourcecode Placement Management System 1.0 es vulnerable a Cross Site Scripting (XSS) a trav\u00e9s del campo Nombre completo en registration.php."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:angeljudesuarez:placement_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F16A2F97-B41C-433C-B6F1-B14880A5F029"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/riya98241/CVE/blob/main/CVE-2024-50656",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://itsourcecode.com/free-projects/php-project/placement-management-system-project-in-php-with-source-code/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Product"
]
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-50704",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-03-04T16:15:35.480",
"lastModified": "2025-03-04T16:15:35.480",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Unauthenticated remote code execution vulnerability in Uniguest Tripleplay before 24.2.1 allows remote attackers to execute arbitrary code via a specially crafted HTTP POST request."
}
],
"metrics": {},
"references": [
{
"url": "https://uniguest.com/cve-bulletins/",
"source": "cve@mitre.org"
},
{
"url": "https://uniguest.com/wp-content/uploads/2025/02/CVE-2024-50704-Vulnerability-Summary.pdf",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-50705",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-03-04T15:15:19.027",
"lastModified": "2025-03-04T16:15:35.597",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Unauthenticated reflected cross-site scripting (XSS) vulnerability in Uniguest Tripleplay before 24.2.1 allows remote attackers to execute arbitrary scripts via the page parameter."
}
],
"metrics": {},
"references": [
{
"url": "https://uniguest.com/cve-bulletins/",
"source": "cve@mitre.org"
},
{
"url": "https://uniguest.com/wp-content/uploads/2025/02/CVE-2024-50705-Vulnerability-Summary.pdf",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-50706",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-03-04T15:15:19.290",
"lastModified": "2025-03-04T15:15:19.290",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Unauthenticated SQL injection vulnerability in Uniguest Tripleplay before 24.2.1 allows remote attackers to execute arbitrary SQL queries on the backend database."
}
],
"metrics": {},
"references": [
{
"url": "https://uniguest.com/cve-bulletins/",
"source": "cve@mitre.org"
},
{
"url": "https://uniguest.com/wp-content/uploads/2025/02/CVE-2024-50706-Vulnerability-Summary.pdf",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-50707",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-03-04T16:15:35.733",
"lastModified": "2025-03-04T16:15:35.733",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Unauthenticated remote code execution vulnerability in Uniguest Tripleplay before 24.2.1 allows remote attackers to execute arbitrary code via the X-Forwarded-For header in an HTTP GET request."
}
],
"metrics": {},
"references": [
{
"url": "https://uniguest.com/cve-bulletins/",
"source": "cve@mitre.org"
},
{
"url": "https://uniguest.com/wp-content/uploads/2025/02/CVE-2024-50707-Vulnerability-Summary.pdf",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-53944",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-27T20:16:01.887",
"lastModified": "2025-02-27T20:16:01.887",
"vulnStatus": "Received",
"lastModified": "2025-03-04T15:15:19.667",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
@ -15,7 +15,42 @@
"value": "Se descubri\u00f3 un problema en los dispositivos Tuoshi/Dionlink LT15D 4G Wi-Fi a trav\u00e9s de M7628NNxlSPv2xUI_v1.0.1802.10.08_P4 y en los dispositivos LT21B a trav\u00e9s de M7628xUSAxUIv2_v1.0.1481.15.02_P0. Un atacante remoto no autenticado con acceso a la red puede aprovechar una vulnerabilidad de inyecci\u00f3n de comandos. El endpoint /goform/formJsonAjaxReq no pueden depurar los metacaracteres del shell enviados a trav\u00e9s de par\u00e1metros JSON, lo que permite a los atacantes ejecutar comandos arbitrarios del sistema operativo con privilegios de superusuario."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"references": [
{
"url": "http://www.tuoshi.net/productview.asp?id=218",
@ -36,6 +71,10 @@
{
"url": "https://github.com/actuator/cve/blob/main/Tuoshi/Firmware-M7628NNxISPv2xUI_v1.0.1802.10.08_P4-Blind-CMD-Injection-unauth-WAN.gif",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/actuator/cve/blob/main/Tuoshi/CVE-2024-53944-Whitepaper.pdf",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-54145",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-01-27T17:15:16.240",
"lastModified": "2025-01-27T17:15:16.240",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-03-04T14:45:17.807",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
@ -51,14 +71,39 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cacti:cacti:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.2.29",
"matchCriteriaId": "C0B80A90-97E0-49C0-A780-695E17B0568C"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/Cacti/cacti/commit/c7e4ee798d263a3209ae6e7ba182c7b65284d8f0",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/Cacti/cacti/security/advisories/GHSA-fh3x-69rr-qqpp",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-54146",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-01-27T17:15:16.380",
"lastModified": "2025-01-27T17:15:16.380",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-03-04T14:45:17.807",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 4.7
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
@ -51,14 +71,39 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cacti:cacti:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.2.29",
"matchCriteriaId": "C0B80A90-97E0-49C0-A780-695E17B0568C"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/Cacti/cacti/commit/c7e4ee798d263a3209ae6e7ba182c7b65284d8f0",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/Cacti/cacti/security/advisories/GHSA-vj9g-p7f2-4wqj",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-57040",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-26T22:15:14.240",
"lastModified": "2025-02-26T22:15:14.240",
"vulnStatus": "Received",
"lastModified": "2025-03-04T15:15:20.283",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
@ -15,7 +15,42 @@
"value": "Se descubri\u00f3 que TL-WR845N(UN)_V4_200909 y TL-WR845N(UN)_V4_190219 contienen una contrase\u00f1a codificada para la cuenta ra\u00edz que se puede obtener mediante un ataque de fuerza bruta."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-798"
}
]
}
],
"references": [
{
"url": "https://security.iiita.ac.in/iot/hashed_password.pdf",

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-9149",
"sourceIdentifier": "iletisim@usom.gov.tr",
"published": "2025-03-04T15:15:22.530",
"lastModified": "2025-03-04T15:15:22.530",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Wind Media E-Commerce Website Template allows SQL Injection.This issue affects E-Commerce Website Template: before v1.5."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "iletisim@usom.gov.tr",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L",
"baseScore": 8.6,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 3.9,
"impactScore": 4.7
}
]
},
"weaknesses": [
{
"source": "iletisim@usom.gov.tr",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://www.usom.gov.tr/bildirim/tr-25-0051",
"source": "iletisim@usom.gov.tr"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-0285",
"sourceIdentifier": "cret@cert.org",
"published": "2025-03-03T17:15:13.430",
"lastModified": "2025-03-03T17:15:13.430",
"vulnStatus": "Received",
"lastModified": "2025-03-04T16:15:36.020",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
@ -11,7 +11,42 @@
"value": "Paragon Partition Manager version 7.9.1 contains an arbitrary kernel memory mapping vulnerability within biontdrv.sys that is caused by a failure to properly validate the length of user supplied data, which can allow an attacker to perform privilege escalation exploits."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
],
"references": [
{
"url": "https://paragon-software.zendesk.com/hc/en-us/articles/32993902732817-IMPORTANT-Paragon-Driver-Security-Patch-for-All-Products-of-Hard-Disk-Manager-Product-Line-Biontdrv-sys",

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-0286",
"sourceIdentifier": "cret@cert.org",
"published": "2025-03-03T17:15:13.537",
"lastModified": "2025-03-03T17:15:13.537",
"vulnStatus": "Received",
"lastModified": "2025-03-04T16:15:36.167",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
@ -11,7 +11,42 @@
"value": "Paragon Partition Manager version 7.9.1 contains an arbitrary kernel memory write vulnerability within biontdrv.sys that is caused by a failure to properly validate the length of user supplied data, which can allow an attacker to execute arbitrary code on the victim machine."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.4,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.5,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"references": [
{
"url": "https://paragon-software.zendesk.com/hc/en-us/articles/32993902732817-IMPORTANT-Paragon-Driver-Security-Patch-for-All-Products-of-Hard-Disk-Manager-Product-Line-Biontdrv-sys",

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-0288",
"sourceIdentifier": "cret@cert.org",
"published": "2025-03-03T17:15:13.823",
"lastModified": "2025-03-03T17:15:13.823",
"vulnStatus": "Received",
"lastModified": "2025-03-04T16:15:36.317",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
@ -11,7 +11,42 @@
"value": "Paragon Partition Manager version 7.9.1 contains an arbitrary kernel memory vulnerability facilitated by the memmove function, which does not validate or sanitize user controlled input, allowing an attacker the ability to write arbitrary kernel memory and perform privilege escalation."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-131"
}
]
}
],
"references": [
{
"url": "https://paragon-software.zendesk.com/hc/en-us/articles/32993902732817-IMPORTANT-Paragon-Driver-Security-Patch-for-All-Products-of-Hard-Disk-Manager-Product-Line-Biontdrv-sys",

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-0289",
"sourceIdentifier": "cret@cert.org",
"published": "2025-03-03T17:15:13.943",
"lastModified": "2025-03-03T17:15:13.943",
"vulnStatus": "Received",
"lastModified": "2025-03-04T16:15:36.467",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
@ -11,7 +11,42 @@
"value": "Paragon Partition Manager version 17, both community and Business versions, contain an insecure kernel resource access vulnerability facilitated by the driver not validating the MappedSystemVa pointer before passing it to HalReturnToFirmware, which can allows an attacker the ability to compromise the service."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
],
"references": [
{
"url": "https://paragon-software.zendesk.com/hc/en-us/articles/32993902732817-IMPORTANT-Paragon-Driver-Security-Patch-for-All-Products-of-Hard-Disk-Manager-Product-Line-Biontdrv-sys",

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-0840",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-01-29T20:15:35.007",
"lastModified": "2025-01-29T20:15:35.007",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-04T14:53:43.637",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -63,7 +63,7 @@
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L",
@ -80,6 +80,26 @@
},
"exploitabilityScore": 1.6,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.6,
"impactScore": 5.9
}
],
"cvssMetricV2": [
@ -122,36 +142,90 @@
"value": "CWE-121"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:gnu:binutils:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.44",
"matchCriteriaId": "9C3991B6-45EB-4A22-A984-3403405E378D"
}
]
}
]
}
],
"references": [
{
"url": "https://sourceware.org/bugzilla/attachment.cgi?id=15882",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Broken Link"
]
},
{
"url": "https://sourceware.org/bugzilla/show_bug.cgi?id=32560",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking"
]
},
{
"url": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=baac6c221e9d69335bf41366a1c7d87d8ab2f893",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Patch"
]
},
{
"url": "https://vuldb.com/?ctiid.293997",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.293997",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.485255",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://www.gnu.org/",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Product"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-1106",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-02-07T19:15:24.613",
"lastModified": "2025-02-07T19:15:24.613",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-03-04T14:53:43.637",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -63,7 +63,7 @@
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
@ -80,6 +80,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 2.5
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.2
}
],
"cvssMetricV2": [
@ -120,22 +140,55 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cmseasy:cmseasy:7.7.7.9:*:*:*:*:*:*:*",
"matchCriteriaId": "C47FE864-5B8E-428F-80DC-AA29EDB454DA"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/Sinon2003/cve/blob/main/CmsEasy/CmsEasyPathTraversal-2.md",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.294939",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.294939",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.491518",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-1147",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-02-10T14:15:29.643",
"lastModified": "2025-02-10T14:15:29.643",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-04T14:53:43.637",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -63,7 +63,7 @@
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L",
@ -80,6 +80,26 @@
},
"exploitabilityScore": 1.6,
"impactScore": 1.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.6,
"impactScore": 3.6
}
],
"cvssMetricV2": [
@ -122,32 +142,82 @@
"value": "CWE-120"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:gnu:binutils:2.43:*:*:*:*:*:*:*",
"matchCriteriaId": "41E442CC-ADC3-46D7-BC3C-AF5210AA9C04"
}
]
}
]
}
],
"references": [
{
"url": "https://sourceware.org/bugzilla/attachment.cgi?id=15881",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Broken Link"
]
},
{
"url": "https://sourceware.org/bugzilla/show_bug.cgi?id=32556",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking"
]
},
{
"url": "https://vuldb.com/?ctiid.295051",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.295051",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.485254",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry",
"Exploit"
]
},
{
"url": "https://www.gnu.org/",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Product"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-1149",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-02-10T15:15:13.093",
"lastModified": "2025-02-10T15:15:13.093",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-04T14:53:43.637",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -63,6 +63,26 @@
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L",
"baseScore": 3.1,
"baseSeverity": "LOW",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 1.6,
"impactScore": 1.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
@ -124,26 +144,61 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:gnu:binutils:2.43:*:*:*:*:*:*:*",
"matchCriteriaId": "41E442CC-ADC3-46D7-BC3C-AF5210AA9C04"
}
]
}
]
}
],
"references": [
{
"url": "https://sourceware.org/bugzilla/attachment.cgi?id=15887",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Broken Link"
]
},
{
"url": "https://sourceware.org/bugzilla/show_bug.cgi?id=32576",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking"
]
},
{
"url": "https://vuldb.com/?ctiid.295053",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.295053",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://www.gnu.org/",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Product"
]
}
]
}

View File

@ -0,0 +1,78 @@
{
"id": "CVE-2025-1424",
"sourceIdentifier": "vulnerability@ncsc.ch",
"published": "2025-03-04T16:15:36.663",
"lastModified": "2025-03-04T16:15:36.663",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A privilege escalation vulnerability in PocketBook InkPad Color 3 allows attackers to escalate to root privileges if they gain physical access to the device.\nThis issue affects InkPad Color 3 in version U743k3.6.8.3671."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "vulnerability@ncsc.ch",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 8.6,
"baseSeverity": "HIGH",
"attackVector": "PHYSICAL",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnAvailabilityImpact": "HIGH",
"subConfidentialityImpact": "HIGH",
"subIntegrityImpact": "HIGH",
"subAvailabilityImpact": "HIGH",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "vulnerability@ncsc.ch",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-269"
}
]
}
],
"references": [
{
"url": "https://www.redguard.ch/blog/2025/03/04/security-advisory-pocketbook-inkpad-color-3/",
"source": "vulnerability@ncsc.ch"
}
]
}

View File

@ -0,0 +1,78 @@
{
"id": "CVE-2025-1425",
"sourceIdentifier": "vulnerability@ncsc.ch",
"published": "2025-03-04T16:15:36.803",
"lastModified": "2025-03-04T16:15:36.803",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A Sudo privilege misconfiguration vulnerability in PocketBook InkPad Color 3 on Linux, ARM allows attackers to read file contents on the device.This issue affects InkPad Color 3: U743k3.6.8.3671."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "vulnerability@ncsc.ch",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"attackVector": "PHYSICAL",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "NONE",
"vulnAvailabilityImpact": "NONE",
"subConfidentialityImpact": "HIGH",
"subIntegrityImpact": "HIGH",
"subAvailabilityImpact": "HIGH",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "vulnerability@ncsc.ch",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-269"
}
]
}
],
"references": [
{
"url": "https://www.redguard.ch/blog/2025/03/04/security-advisory-pocketbook-inkpad-color-3/",
"source": "vulnerability@ncsc.ch"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-1902",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-03-04T04:15:12.210",
"lastModified": "2025-03-04T04:15:12.210",
"vulnStatus": "Received",
"lastModified": "2025-03-04T16:15:37.450",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
@ -59,7 +59,7 @@
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
@ -107,7 +107,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -140,6 +140,10 @@
{
"url": "https://vuldb.com/?submit.506623",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/panghuanjie/Code-audits/issues/3",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-1903",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-03-04T04:15:12.383",
"lastModified": "2025-03-04T04:15:12.383",
"vulnStatus": "Received",
"lastModified": "2025-03-04T16:15:37.577",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
@ -59,7 +59,7 @@
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
@ -107,7 +107,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -136,6 +136,10 @@
{
"url": "https://vuldb.com/?submit.506667",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/takakie/CVE/blob/main/cve_3.md",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-1904",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-03-04T05:15:14.440",
"lastModified": "2025-03-04T05:15:14.440",
"vulnStatus": "Received",
"lastModified": "2025-03-04T16:15:37.700",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
@ -59,7 +59,7 @@
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
@ -107,7 +107,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -140,6 +140,10 @@
{
"url": "https://vuldb.com/?submit.506868",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/lokihardk/cve/blob/main/xss-2_25.md",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-1905",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-03-04T05:15:14.680",
"lastModified": "2025-03-04T05:15:14.680",
"vulnStatus": "Received",
"lastModified": "2025-03-04T15:15:24.033",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
@ -59,7 +59,7 @@
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
@ -107,7 +107,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -140,6 +140,10 @@
{
"url": "https://www.sourcecodester.com/",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/sorcha-l/cve/blob/main/Employee%20Management%20System%20by%20rems%20has%20xss.md",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-1906",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-03-04T05:15:14.903",
"lastModified": "2025-03-04T05:15:14.903",
"vulnStatus": "Received",
"lastModified": "2025-03-04T15:15:24.233",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
@ -59,7 +59,7 @@
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L",
@ -107,7 +107,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -140,6 +140,10 @@
{
"url": "https://vuldb.com/?submit.508915",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/HaroldFinch-L/CVE/issues/2",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2025-1933",
"sourceIdentifier": "security@mozilla.org",
"published": "2025-03-04T14:15:38.170",
"lastModified": "2025-03-04T14:15:38.170",
"lastModified": "2025-03-04T16:15:37.823",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -11,7 +11,42 @@
"value": "On 64-bit CPUs, when the JIT compiles WASM i32 return values they can pick up bits from left over memory. This can potentially cause them to be treated as a different type. This vulnerability affects Firefox < 136, Firefox ESR < 115.21, and Firefox ESR < 128.8."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-252"
}
]
}
],
"references": [
{
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1946004",

View File

@ -2,7 +2,7 @@
"id": "CVE-2025-1934",
"sourceIdentifier": "security@mozilla.org",
"published": "2025-03-04T14:15:38.273",
"lastModified": "2025-03-04T14:15:38.273",
"lastModified": "2025-03-04T16:15:37.970",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -11,7 +11,42 @@
"value": "It was possible to interrupt the processing of a RegExp bailout and run additional JavaScript, potentially triggering garbage collection when the engine was not expecting it. This vulnerability affects Firefox < 136 and Firefox ESR < 128.8."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-185"
}
]
}
],
"references": [
{
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1942881",

View File

@ -2,7 +2,7 @@
"id": "CVE-2025-1935",
"sourceIdentifier": "security@mozilla.org",
"published": "2025-03-04T14:15:38.390",
"lastModified": "2025-03-04T14:15:38.390",
"lastModified": "2025-03-04T16:15:38.110",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -11,7 +11,42 @@
"value": "A web page could trick a user into setting that site as the default handler for a custom URL protocol. This vulnerability affects Firefox < 136 and Firefox ESR < 128.8."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-451"
}
]
}
],
"references": [
{
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1866661",

View File

@ -2,7 +2,7 @@
"id": "CVE-2025-1940",
"sourceIdentifier": "security@mozilla.org",
"published": "2025-03-04T14:15:38.950",
"lastModified": "2025-03-04T14:15:38.950",
"lastModified": "2025-03-04T16:15:38.310",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -11,7 +11,42 @@
"value": "A select option could partially obscure the confirmation prompt shown before launching external apps. This could be used to trick a user in to launching an external app unexpectedly. \n*This issue only affects Android versions of Firefox.* This vulnerability affects Firefox < 136."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 4.2
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-1021"
}
]
}
],
"references": [
{
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1908488",

View File

@ -2,7 +2,7 @@
"id": "CVE-2025-1941",
"sourceIdentifier": "security@mozilla.org",
"published": "2025-03-04T14:15:39.063",
"lastModified": "2025-03-04T14:15:39.063",
"lastModified": "2025-03-04T16:15:38.457",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -11,7 +11,42 @@
"value": "Under certain circumstances, a user opt-in setting that Focus should require authentication before use could have been be bypassed (distinct from CVE-2025-0245). This vulnerability affects Firefox < 136."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-284"
}
]
}
],
"references": [
{
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1944665",

View File

@ -2,7 +2,7 @@
"id": "CVE-2025-1942",
"sourceIdentifier": "security@mozilla.org",
"published": "2025-03-04T14:15:39.167",
"lastModified": "2025-03-04T14:15:39.167",
"lastModified": "2025-03-04T16:15:38.607",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -11,7 +11,42 @@
"value": "When String.toUpperCase() caused a string to get longer it was possible for uninitialized memory to be incorporated into the result string This vulnerability affects Firefox < 136."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-908"
}
]
}
],
"references": [
{
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1947139",

View File

@ -2,16 +2,55 @@
"id": "CVE-2025-1943",
"sourceIdentifier": "security@mozilla.org",
"published": "2025-03-04T14:15:39.260",
"lastModified": "2025-03-04T14:15:39.260",
"lastModified": "2025-03-04T15:15:24.493",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Memory safety bugs present in Firefox 135 and Thunderbird 135. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 136."
},
{
"lang": "es",
"value": "Vulnerabilidades de seguridad en la gesti\u00f3n de memoria presentes en Firefox 135 y Thunderbird 135. Algunas de estas vulnerabilidades muestran evidencia de corrupci\u00f3n en la memoria y se presume que, con suficiente esfuerzo, algunas de ellas podr\u00edan ser explotadas para ejecutar c\u00f3digo arbitrario. Esta vulnerabilidad afecta a Firefox &lt; 136."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
"baseScore": 8.2,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 4.2
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-122"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1869650%2C1938451%2C1940326%2C1944052%2C1944063%2C1947281",

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-21181",
"sourceIdentifier": "secure@microsoft.com",
"published": "2025-02-11T18:15:29.553",
"lastModified": "2025-02-25T16:58:10.650",
"vulnStatus": "Analyzed",
"lastModified": "2025-03-04T15:15:26.497",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -19,7 +19,7 @@
"cvssMetricV31": [
{
"source": "secure@microsoft.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
@ -202,6 +202,14 @@
"Patch",
"Vendor Advisory"
]
},
{
"url": "https://www.vicarius.io/vsociety/posts/cve-2025-21181-denial-of-service-vulnerability-in-microsoft-message-queuing-detection-script",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://www.vicarius.io/vsociety/posts/cve-2025-21181-denial-of-service-vulnerability-in-microsoft-message-queuing-mitigation-script",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2025-21399",
"sourceIdentifier": "secure@microsoft.com",
"published": "2025-01-17T20:15:46.117",
"lastModified": "2025-01-31T02:15:37.700",
"lastModified": "2025-03-04T15:15:28.007",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -42,7 +42,7 @@
"weaknesses": [
{
"source": "secure@microsoft.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -52,7 +52,7 @@
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -65,6 +65,14 @@
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21399",
"source": "secure@microsoft.com"
},
{
"url": "https://www.vicarius.io/vsociety/posts/elevation-of-privilege-vulnerability-in-microsoft-edge-chromium-based-detection-script",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://www.vicarius.io/vsociety/posts/elevation-of-privilege-vulnerability-in-microsoft-edge-chromium-based-mitigation-script",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-22224",
"sourceIdentifier": "security@vmware.com",
"published": "2025-03-04T12:15:33.687",
"lastModified": "2025-03-04T12:15:33.687",
"vulnStatus": "Received",
"lastModified": "2025-03-04T16:15:38.850",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
@ -35,6 +35,18 @@
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-367"
}
]
}
],
"references": [
{
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25390",

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-22225",
"sourceIdentifier": "security@vmware.com",
"published": "2025-03-04T12:15:33.840",
"lastModified": "2025-03-04T12:15:33.840",
"vulnStatus": "Received",
"lastModified": "2025-03-04T16:15:38.970",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
@ -35,6 +35,18 @@
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-123"
}
]
}
],
"references": [
{
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25390",

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-22226",
"sourceIdentifier": "security@vmware.com",
"published": "2025-03-04T12:15:33.973",
"lastModified": "2025-03-04T12:15:33.973",
"vulnStatus": "Received",
"lastModified": "2025-03-04T16:15:39.097",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
@ -35,6 +35,18 @@
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"references": [
{
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25390",

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-22402",
"sourceIdentifier": "security_alert@emc.com",
"published": "2025-02-07T03:15:12.287",
"lastModified": "2025-02-07T03:15:12.287",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-03-04T14:53:43.637",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,25 +36,77 @@
},
"exploitabilityScore": 1.2,
"impactScore": 1.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "security_alert@emc.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-80"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:dell:update_manager_plugin:*:*:*:*:*:*:*:*",
"versionStartIncluding": "1.5.0",
"versionEndExcluding": "1.7.0",
"matchCriteriaId": "11CA0695-4DAC-42AE-A7FA-E237E198490B"
}
]
}
]
}
],
"references": [
{
"url": "https://www.dell.com/support/kbdoc/en-us/000281885/dsa-2025-047-security-update-for-dell-update-manager-plugin-vulnerability",
"source": "security_alert@emc.com"
"source": "security_alert@emc.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-22604",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-01-27T17:15:17.307",
"lastModified": "2025-01-27T17:15:17.307",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-03-04T14:45:17.807",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.3,
"impactScore": 6.0
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
}
]
},
@ -51,14 +71,39 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cacti:cacti:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.2.29",
"matchCriteriaId": "C0B80A90-97E0-49C0-A780-695E17B0568C"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/Cacti/cacti/commit/c7e4ee798d263a3209ae6e7ba182c7b65284d8f0",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/Cacti/cacti/security/advisories/GHSA-c5j8-jxj3-hh36",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-23208",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-01-17T23:15:13.107",
"lastModified": "2025-01-17T23:15:13.107",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-03-04T14:45:17.807",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
@ -49,20 +69,58 @@
"value": "CWE-269"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zotregistry:zot:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.1.2",
"matchCriteriaId": "60B19393-9C0C-4BF9-98A3-C9E553BCEA48"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/project-zot/zot/blob/5e30fec65c49e3139907e2819ccb39b2e3bd784e/pkg/meta/boltdb/boltdb.go#L1665",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Product"
]
},
{
"url": "https://github.com/project-zot/zot/commit/002ac62d8a15bf0cba010b3ba7bde86f9837b613",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/project-zot/zot/security/advisories/GHSA-c9p4-xwr9-rfhx",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Vendor Advisory"
]
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2025-23368",
"sourceIdentifier": "secalert@redhat.com",
"published": "2025-03-04T16:15:39.270",
"lastModified": "2025-03-04T16:15:39.270",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A flaw was found in Wildfly Elytron integration. The component does not implement sufficient measures to prevent multiple failed authentication attempts within a short time frame, making it more susceptible to brute force attacks via CLI."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "secalert@redhat.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.2,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "secalert@redhat.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-307"
}
]
}
],
"references": [
{
"url": "https://access.redhat.com/security/cve/CVE-2025-23368",
"source": "secalert@redhat.com"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2337621",
"source": "secalert@redhat.com"
}
]
}

View File

@ -2,20 +2,63 @@
"id": "CVE-2025-25379",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-28T23:15:10.790",
"lastModified": "2025-02-28T23:15:10.790",
"vulnStatus": "Received",
"lastModified": "2025-03-04T16:15:39.433",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cross Site Request Forgery vulnerability in 07FLYCMS v.1.3.9 allows a remote attacker to execute arbitrary code via the id parameter of the del.html component."
},
{
"lang": "es",
"value": "La vulnerabilidad de Cross Site Request Forgery en 07FLYCMS v.1.3.9 permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s del par\u00e1metro id del componente del.html."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"baseScore": 9.6,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/R2og/Sun-jialiang/tree/main/9/readme.md",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/R2og/Sun-jialiang/tree/main/9/readme.md",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -2,16 +2,55 @@
"id": "CVE-2025-25428",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-28T19:15:36.773",
"lastModified": "2025-02-28T19:15:36.773",
"vulnStatus": "Received",
"lastModified": "2025-03-04T16:15:39.597",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "TRENDnet TEW-929DRU 1.0.0.10 was discovered to contain a hardcoded password vulnerability in /etc/shadow, which allows attackers to log in as root."
},
{
"lang": "es",
"value": "Se descubri\u00f3 que TRENDnet TEW-929DRU 1.0.0.10 contiene una vulnerabilidad de contrase\u00f1a codificada en /etc/shadow, que permite a los atacantes iniciar sesi\u00f3n como superusuario."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.0,
"baseSeverity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.1,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-259"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://instinctive-acapella-fc7.notion.site/Trendnet-TEW-929DRU-Hardcoded-password-17815d9d4d2680d5a2becf32425d93fd",

View File

@ -2,20 +2,63 @@
"id": "CVE-2025-25430",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-28T18:15:28.263",
"lastModified": "2025-02-28T18:15:28.263",
"vulnStatus": "Received",
"lastModified": "2025-03-04T16:15:39.763",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Trendnet TEW-929DRU 1.0.0.10 contains a Stored Cross-site Scripting (XSS) vulnerability via the configname parameter on the /cbi_addcert.htm page."
},
{
"lang": "es",
"value": "Trendnet TEW-929DRU 1.0.0.10 contiene una vulnerabilidad de Cross-site Scripting (XSS) Almacenado a trav\u00e9s del par\u00e1metro configname en la p\u00e1gina /cbi_addcert.htm."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://instinctive-acapella-fc7.notion.site/Trendnet-TEW-929DRU-XSS-17a15d9d4d2680fbb72ced0a02a64875",
"source": "cve@mitre.org"
},
{
"url": "https://instinctive-acapella-fc7.notion.site/Trendnet-TEW-929DRU-XSS-17a15d9d4d2680fbb72ced0a02a64875",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -2,20 +2,63 @@
"id": "CVE-2025-25431",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-28T18:15:28.407",
"lastModified": "2025-02-28T18:15:28.407",
"vulnStatus": "Received",
"lastModified": "2025-03-04T16:15:39.917",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Trendnet TEW-929DRU 1.0.0.10 contains a Stored Cross-site Scripting (XSS) vulnerability via the The ssid key of wifi_data parameter on the /captive_portal.htm page."
},
{
"lang": "es",
"value": "Trendnet TEW-929DRU 1.0.0.10 contiene una vulnerabilidad de Cross-site Scripting (XSS) Almacenado a trav\u00e9s de la clave ssid del par\u00e1metro wifi_data en la p\u00e1gina /captive_portal.htm."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://instinctive-acapella-fc7.notion.site/Trendnet-TEW-929DRU-XSS-17b15d9d4d26806a90f3d830a6143ebe",
"source": "cve@mitre.org"
},
{
"url": "https://instinctive-acapella-fc7.notion.site/Trendnet-TEW-929DRU-XSS-17b15d9d4d26806a90f3d830a6143ebe",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -2,20 +2,63 @@
"id": "CVE-2025-25476",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-28T23:15:11.063",
"lastModified": "2025-02-28T23:15:11.063",
"vulnStatus": "Received",
"lastModified": "2025-03-04T16:15:40.080",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A stored cross-site scripting (XSS) vulnerability in SysPass 3.2.x allows a malicious user with elevated privileges to execute arbitrary Javascript code by specifying a malicious XSS payload as a notification type or notification component."
},
{
"lang": "es",
"value": "Una vulnerabilidad de cross-site scripting (XSS) almacenado en SysPass 3.2.x permite que un usuario malintencionado con privilegios elevados ejecute c\u00f3digo Javascript arbitrario al especificar un payload XSS malicioso como un tipo de notificaci\u00f3n o un componente de notificaci\u00f3n."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/sysentr0py/CVEs/tree/main/CVE-2025-25476",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/sysentr0py/CVEs/tree/main/CVE-2025-25476",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-25759",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-27T15:15:41.570",
"lastModified": "2025-02-27T15:15:41.570",
"vulnStatus": "Received",
"lastModified": "2025-03-04T15:15:28.353",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
@ -15,7 +15,46 @@
"value": "Un problema en el componente admin_template.php de SUCMS v1.0 permite a los atacantes ejecutar un directory traversal y la eliminaci\u00f3n arbitraria de archivos a trav\u00e9s de una solicitud GET manipulada espec\u00edficamente."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-22"
},
{
"lang": "en",
"value": "CWE-552"
}
]
}
],
"references": [
{
"url": "https://github.com/147536951/Qianyi-learn/blob/main/SUCMS.pdf",

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-25760",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-27T15:15:41.670",
"lastModified": "2025-02-27T15:15:41.670",
"vulnStatus": "Received",
"lastModified": "2025-03-04T15:15:28.590",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
@ -15,7 +15,42 @@
"value": "Server-Side Request Forgery (SSRF) en el componente admin_webgather.php de SUCMS v1.0 permite a los atacantes acceder a datos y servicios internos a trav\u00e9s de una solicitud GET manipulada."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-918"
}
]
}
],
"references": [
{
"url": "https://github.com/147536951/Qianyi-learn/blob/main/SUCMS2.pdf",

View File

@ -0,0 +1,29 @@
{
"id": "CVE-2025-26320",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-03-04T16:15:40.240",
"lastModified": "2025-03-04T16:15:40.240",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "t0mer BroadlinkManager v5.9.1 was discovered to contain an OS command injection vulnerability via the IP Address parameter at /device/ping."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/BaranTeyin1/vulnerability-research/tree/main/CVE-2025-26320",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/t0mer/broadlinkmanager-docker",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/t0mer/broadlinkmanager-docker/blob/master/broadlinkmanager/broadlinkmanager.py#L639-L657",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-26849",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-03-04T09:15:10.917",
"lastModified": "2025-03-04T09:15:10.917",
"vulnStatus": "Received",
"lastModified": "2025-03-04T16:15:40.360",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
@ -55,6 +55,10 @@
{
"url": "https://www.redteam-pentesting.de/en/advisories/rt-sa-2024-012/",
"source": "cve@mitre.org"
},
{
"url": "https://www.redteam-pentesting.de/en/advisories/rt-sa-2024-012/",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -0,0 +1,94 @@
{
"id": "CVE-2025-27111",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-03-04T16:15:40.487",
"lastModified": "2025-03-04T16:15:40.487",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Rack is a modular Ruby web server interface. The Rack::Sendfile middleware logs unsanitised header values from the X-Sendfile-Type header. An attacker can exploit this by injecting escape sequences (such as newline characters) into the header, resulting in log injection. This vulnerability is fixed in 2.2.12, 3.0.13, and 3.1.11."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 6.9,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "NONE",
"vulnIntegrityImpact": "LOW",
"vulnAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-93"
},
{
"lang": "en",
"value": "CWE-117"
}
]
}
],
"references": [
{
"url": "https://github.com/rack/rack/commit/803aa221e8302719715e224f4476e438f2531a53",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/rack/rack/commit/aeac570bb8080ca7b53b7f2e2f67498be7ebd30b",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/rack/rack/commit/b13bc6bfc7506aca3478dc5ac1c2ec6fc53f82a3",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/rack/rack/security/advisories/GHSA-8cgq-6mh2-7j6v",
"source": "security-advisories@github.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2025-27424",
"sourceIdentifier": "security@mozilla.org",
"published": "2025-03-04T14:15:39.397",
"lastModified": "2025-03-04T14:15:39.397",
"lastModified": "2025-03-04T16:15:40.647",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -11,7 +11,42 @@
"value": "Websites redirecting to a non-HTTP scheme URL could allow a website address to be spoofed for a malicious page This vulnerability affects Firefox for iOS < 136."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-601"
}
]
}
],
"references": [
{
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1945392",

View File

@ -2,7 +2,7 @@
"id": "CVE-2025-27425",
"sourceIdentifier": "security@mozilla.org",
"published": "2025-03-04T14:15:39.493",
"lastModified": "2025-03-04T14:15:39.493",
"lastModified": "2025-03-04T16:15:40.797",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -11,7 +11,42 @@
"value": "Scanning certain QR codes that included text with a website URL could allow the URL to be opened without presenting the user with a confirmation alert first This vulnerability affects Firefox for iOS < 136."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-287"
}
]
}
],
"references": [
{
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1941525",

View File

@ -2,16 +2,55 @@
"id": "CVE-2025-27426",
"sourceIdentifier": "security@mozilla.org",
"published": "2025-03-04T14:15:39.593",
"lastModified": "2025-03-04T14:15:39.593",
"lastModified": "2025-03-04T16:15:40.933",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Malicious websites utilizing a server-side redirect to an internal error page could result in a spoofed website URL This vulnerability affects Firefox for iOS < 136."
},
{
"lang": "es",
"value": "Sitios web maliciosos que utilicen una redirecci\u00f3n del lado del servidor a una p\u00e1gina de error interno podr\u00edan permitir mostrar una URL falsa para el sitio web. Esta vulnerabilidad afecta a Firefox para iOS &lt; 136."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-601"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1933079",

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2025-03-04T15:00:20.197668+00:00
2025-03-04T17:00:19.916462+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2025-03-04T14:15:39.593000+00:00
2025-03-04T16:15:40.933000+00:00
```
### Last Data Feed Release
@ -33,42 +33,55 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
284072
284083
```
### CVEs added in the last Commit
Recently added CVEs: `18`
Recently added CVEs: `11`
- [CVE-2025-1925](CVE-2025/CVE-2025-19xx/CVE-2025-1925.json) (`2025-03-04T14:15:36.717`)
- [CVE-2025-1930](CVE-2025/CVE-2025-19xx/CVE-2025-1930.json) (`2025-03-04T14:15:37.850`)
- [CVE-2025-1931](CVE-2025/CVE-2025-19xx/CVE-2025-1931.json) (`2025-03-04T14:15:37.963`)
- [CVE-2025-1932](CVE-2025/CVE-2025-19xx/CVE-2025-1932.json) (`2025-03-04T14:15:38.053`)
- [CVE-2025-1933](CVE-2025/CVE-2025-19xx/CVE-2025-1933.json) (`2025-03-04T14:15:38.170`)
- [CVE-2025-1934](CVE-2025/CVE-2025-19xx/CVE-2025-1934.json) (`2025-03-04T14:15:38.273`)
- [CVE-2025-1935](CVE-2025/CVE-2025-19xx/CVE-2025-1935.json) (`2025-03-04T14:15:38.390`)
- [CVE-2025-1936](CVE-2025/CVE-2025-19xx/CVE-2025-1936.json) (`2025-03-04T14:15:38.500`)
- [CVE-2025-1937](CVE-2025/CVE-2025-19xx/CVE-2025-1937.json) (`2025-03-04T14:15:38.610`)
- [CVE-2025-1938](CVE-2025/CVE-2025-19xx/CVE-2025-1938.json) (`2025-03-04T14:15:38.730`)
- [CVE-2025-1939](CVE-2025/CVE-2025-19xx/CVE-2025-1939.json) (`2025-03-04T14:15:38.837`)
- [CVE-2025-1940](CVE-2025/CVE-2025-19xx/CVE-2025-1940.json) (`2025-03-04T14:15:38.950`)
- [CVE-2025-1941](CVE-2025/CVE-2025-19xx/CVE-2025-1941.json) (`2025-03-04T14:15:39.063`)
- [CVE-2025-1942](CVE-2025/CVE-2025-19xx/CVE-2025-1942.json) (`2025-03-04T14:15:39.167`)
- [CVE-2025-1943](CVE-2025/CVE-2025-19xx/CVE-2025-1943.json) (`2025-03-04T14:15:39.260`)
- [CVE-2025-27424](CVE-2025/CVE-2025-274xx/CVE-2025-27424.json) (`2025-03-04T14:15:39.397`)
- [CVE-2025-27425](CVE-2025/CVE-2025-274xx/CVE-2025-27425.json) (`2025-03-04T14:15:39.493`)
- [CVE-2025-27426](CVE-2025/CVE-2025-274xx/CVE-2025-27426.json) (`2025-03-04T14:15:39.593`)
- [CVE-2024-11957](CVE-2024/CVE-2024-119xx/CVE-2024-11957.json) (`2025-03-04T16:15:34.927`)
- [CVE-2024-50704](CVE-2024/CVE-2024-507xx/CVE-2024-50704.json) (`2025-03-04T16:15:35.480`)
- [CVE-2024-50705](CVE-2024/CVE-2024-507xx/CVE-2024-50705.json) (`2025-03-04T15:15:19.027`)
- [CVE-2024-50706](CVE-2024/CVE-2024-507xx/CVE-2024-50706.json) (`2025-03-04T15:15:19.290`)
- [CVE-2024-50707](CVE-2024/CVE-2024-507xx/CVE-2024-50707.json) (`2025-03-04T16:15:35.733`)
- [CVE-2024-9149](CVE-2024/CVE-2024-91xx/CVE-2024-9149.json) (`2025-03-04T15:15:22.530`)
- [CVE-2025-1424](CVE-2025/CVE-2025-14xx/CVE-2025-1424.json) (`2025-03-04T16:15:36.663`)
- [CVE-2025-1425](CVE-2025/CVE-2025-14xx/CVE-2025-1425.json) (`2025-03-04T16:15:36.803`)
- [CVE-2025-23368](CVE-2025/CVE-2025-233xx/CVE-2025-23368.json) (`2025-03-04T16:15:39.270`)
- [CVE-2025-26320](CVE-2025/CVE-2025-263xx/CVE-2025-26320.json) (`2025-03-04T16:15:40.240`)
- [CVE-2025-27111](CVE-2025/CVE-2025-271xx/CVE-2025-27111.json) (`2025-03-04T16:15:40.487`)
### CVEs modified in the last Commit
Recently modified CVEs: `5`
Recently modified CVEs: `62`
- [CVE-2024-11955](CVE-2024/CVE-2024-119xx/CVE-2024-11955.json) (`2025-03-04T13:49:18.880`)
- [CVE-2025-1893](CVE-2025/CVE-2025-18xx/CVE-2025-1893.json) (`2025-03-04T13:15:10.063`)
- [CVE-2025-21626](CVE-2025/CVE-2025-216xx/CVE-2025-21626.json) (`2025-03-04T13:49:18.880`)
- [CVE-2025-21627](CVE-2025/CVE-2025-216xx/CVE-2025-21627.json) (`2025-03-04T13:49:18.880`)
- [CVE-2025-23024](CVE-2025/CVE-2025-230xx/CVE-2025-23024.json) (`2025-03-04T13:49:18.880`)
- [CVE-2025-1934](CVE-2025/CVE-2025-19xx/CVE-2025-1934.json) (`2025-03-04T16:15:37.970`)
- [CVE-2025-1935](CVE-2025/CVE-2025-19xx/CVE-2025-1935.json) (`2025-03-04T16:15:38.110`)
- [CVE-2025-1940](CVE-2025/CVE-2025-19xx/CVE-2025-1940.json) (`2025-03-04T16:15:38.310`)
- [CVE-2025-1941](CVE-2025/CVE-2025-19xx/CVE-2025-1941.json) (`2025-03-04T16:15:38.457`)
- [CVE-2025-1942](CVE-2025/CVE-2025-19xx/CVE-2025-1942.json) (`2025-03-04T16:15:38.607`)
- [CVE-2025-1943](CVE-2025/CVE-2025-19xx/CVE-2025-1943.json) (`2025-03-04T15:15:24.493`)
- [CVE-2025-21181](CVE-2025/CVE-2025-211xx/CVE-2025-21181.json) (`2025-03-04T15:15:26.497`)
- [CVE-2025-21399](CVE-2025/CVE-2025-213xx/CVE-2025-21399.json) (`2025-03-04T15:15:28.007`)
- [CVE-2025-22224](CVE-2025/CVE-2025-222xx/CVE-2025-22224.json) (`2025-03-04T16:15:38.850`)
- [CVE-2025-22225](CVE-2025/CVE-2025-222xx/CVE-2025-22225.json) (`2025-03-04T16:15:38.970`)
- [CVE-2025-22226](CVE-2025/CVE-2025-222xx/CVE-2025-22226.json) (`2025-03-04T16:15:39.097`)
- [CVE-2025-22402](CVE-2025/CVE-2025-224xx/CVE-2025-22402.json) (`2025-03-04T14:53:43.637`)
- [CVE-2025-22604](CVE-2025/CVE-2025-226xx/CVE-2025-22604.json) (`2025-03-04T14:45:17.807`)
- [CVE-2025-23208](CVE-2025/CVE-2025-232xx/CVE-2025-23208.json) (`2025-03-04T14:45:17.807`)
- [CVE-2025-25379](CVE-2025/CVE-2025-253xx/CVE-2025-25379.json) (`2025-03-04T16:15:39.433`)
- [CVE-2025-25428](CVE-2025/CVE-2025-254xx/CVE-2025-25428.json) (`2025-03-04T16:15:39.597`)
- [CVE-2025-25430](CVE-2025/CVE-2025-254xx/CVE-2025-25430.json) (`2025-03-04T16:15:39.763`)
- [CVE-2025-25431](CVE-2025/CVE-2025-254xx/CVE-2025-25431.json) (`2025-03-04T16:15:39.917`)
- [CVE-2025-25476](CVE-2025/CVE-2025-254xx/CVE-2025-25476.json) (`2025-03-04T16:15:40.080`)
- [CVE-2025-25759](CVE-2025/CVE-2025-257xx/CVE-2025-25759.json) (`2025-03-04T15:15:28.353`)
- [CVE-2025-25760](CVE-2025/CVE-2025-257xx/CVE-2025-25760.json) (`2025-03-04T15:15:28.590`)
- [CVE-2025-26849](CVE-2025/CVE-2025-268xx/CVE-2025-26849.json) (`2025-03-04T16:15:40.360`)
- [CVE-2025-27424](CVE-2025/CVE-2025-274xx/CVE-2025-27424.json) (`2025-03-04T16:15:40.647`)
- [CVE-2025-27425](CVE-2025/CVE-2025-274xx/CVE-2025-27425.json) (`2025-03-04T16:15:40.797`)
- [CVE-2025-27426](CVE-2025/CVE-2025-274xx/CVE-2025-27426.json) (`2025-03-04T16:15:40.933`)
## Download and Usage

View File

@ -180669,10 +180669,10 @@ CVE-2021-38112,0,0,a516ccd688b3159a26d29a0542b1c43f34877df13f43b28ebc723fa181534
CVE-2021-38113,0,0,5d46b02d44dc495677e9944e1d41b326640fa8e6ba7e6607ee011515521389db,2024-11-21T06:16:25.040000
CVE-2021-38114,0,0,dcc34993449335bce7ac164918f8ca13087f09cfe97ee05f1f3c1ffaea5268a6,2024-11-21T06:16:25.210000
CVE-2021-38115,0,0,aac65d670b83c50bb6fdf3dde8ca97dd9df4d7eee0cdf91517338dfa0ded44ba,2024-11-21T06:16:25.407000
CVE-2021-38116,0,0,7605eb54c7a08f7f0a93962ccc4cee27af114f406294e82196371a2dec5c100f,2024-11-22T16:15:18.663000
CVE-2021-38117,0,0,dd6895df3006f09f9170c6284fdca2b4116d45d468635cb6c9ed22067e0948ba,2024-11-22T16:15:18.823000
CVE-2021-38118,0,0,e2a68ed769b0065bfa89affc336db21c384d35a927ded440c1a09b23ff25c9d9,2024-11-22T16:15:18.950000
CVE-2021-38119,0,0,341e8c6f8b6e146cea158ff744aee0b2346a26031ddc96be8e0d7f40fd2c437a,2024-11-22T16:15:19.073000
CVE-2021-38116,0,1,9e2fcb7c454c84f0b73e4d451e4413ed14590e6d837393661712109d6c18a1ca,2025-03-04T14:45:17.807000
CVE-2021-38117,0,1,c738ea68a8ed127f7c256f1f36be5720aae895b5778cdb70d63718b5b689ec05,2025-03-04T14:45:17.807000
CVE-2021-38118,0,1,19afdc159a962568ad4d5ce3a0527049365f3ee9bf24d4050e4a7a28bb6b7674,2025-03-04T14:45:17.807000
CVE-2021-38119,0,1,c51e04931621af9a60c5862276d47e6123773da43400202d3becd6612e750d3d,2025-03-04T14:45:17.807000
CVE-2021-3812,0,0,c5cb3f5b7111b975944866407ce7921fd1756d44d3c707face417fefec9022e0,2024-11-21T06:22:30.810000
CVE-2021-38120,0,0,b60e1861e1b921e1137b6df18349a144506c4be8364c1355e526faee82dc1255,2024-09-13T18:04:28.527000
CVE-2021-38121,0,0,bdeea87570d2aa637690322ce273b1fd44ad6ff765ffafe37b82df033fc08cd3,2024-09-13T18:04:16.260000
@ -180688,8 +180688,8 @@ CVE-2021-38130,0,0,5dd7dd740c971ae448230e2fa7c6fa473ff13dd5ba4fffac83ff3ded78f32
CVE-2021-38131,0,0,980eb492833fef04df71f8c1be96cc90363084ebe94acd61a1b0ddd54c9cf526,2024-09-18T21:00:30.420000
CVE-2021-38132,0,0,cc4e1381a735ddb1e1b2e30ee731f10ac1786d2b08adbdb5c6b1a67d1117697d,2024-09-18T21:04:11.840000
CVE-2021-38133,0,0,0d77afe3c41e217ee49f58798c33ffe693557e4f4c683fac1020b9d1c0576a03,2024-09-18T21:05:17.027000
CVE-2021-38134,0,0,b25046d28e2af5287414a719ab2bcf34666258d99ee50222a162cf63f5a52ac7,2024-11-22T16:15:19.197000
CVE-2021-38135,0,0,8f44911b2b2d5adf734eb900af129c8d1bbfba186feae24358ffcd75a4a0d7ad,2024-11-22T16:15:19.327000
CVE-2021-38134,0,1,41def84a96a3d580650d1c7b11022b92a9312986e0554171cd30a23f3b11fdb8,2025-03-04T14:45:17.807000
CVE-2021-38135,0,1,6d6e41e6bc7b9a1351c2dd4f5bb95b6bf0dd710ff2b709eab83029b5c13588bd,2025-03-04T14:45:17.807000
CVE-2021-38136,0,0,75dccf60c11e25464bc510952d9ccdd379a17e029a4ca730fef234378d74c33b,2024-11-21T06:16:27.247000
CVE-2021-38137,0,0,2ddc1b293c690f5b9d3e7ffefcd4ca372c28380db582fcb89b1014416b90329f,2024-11-21T06:16:27.437000
CVE-2021-38138,0,0,1e14c27b356072692022b0b633e52103df305663f6cc532303cc54463d19ff14,2024-11-21T06:16:27.617000
@ -195539,7 +195539,7 @@ CVE-2022-26318,0,0,07059bedee342f87c82fd403ca9f475724f3e3520a133422d7d146531f355
CVE-2022-26319,0,0,aae94c99a197b8535bde1116c111360146fe08e202aa001adccde9bf2212a6ff,2024-11-21T06:53:44.863000
CVE-2022-26320,0,0,f546cbedbd1df24d241d15972b832f4c24e0d4ba512c0b3e93a69f4b283ef02a,2024-11-21T06:53:44.970000
CVE-2022-26322,0,0,157099110b7fa8e1790850b4d29e23cf6ec05bfe85652c2f81e2885205b91c31,2024-10-02T15:03:41.997000
CVE-2022-26324,0,0,33ccb3efe4469f2fbee00466ef3e2b87185a07fd40d022ba08d8da5ef8f63b98,2024-11-22T16:15:19.470000
CVE-2022-26324,0,1,2cf850d71ebd6ea115d8393bdf5f5fd251b338a6a65536c9dccc8ab5b19b2468,2025-03-04T14:45:17.807000
CVE-2022-26325,0,0,73e03d9338e44fdad4e3d598ad13c3ab5be01b7d6c1a5fb36a34c8c0837e99a4,2024-11-21T06:53:45.253000
CVE-2022-26326,0,0,7198aa067f5918a03bc61451615cd097c2a5738c0a3f83c4ef572143e84f1476,2024-11-21T06:53:45.367000
CVE-2022-26327,0,0,14209176bfddac3742a841a3f635ca4404a584d709335abb6ed62100d8608437,2024-08-21T17:25:08.560000
@ -208920,7 +208920,7 @@ CVE-2022-43143,0,0,868df4c4bb9b71ab79398441260504ea4a2d34397197a776dbb7b3925861a
CVE-2022-43144,0,0,b4d526f2c0777c15dfcdb374db47406c2f99a3af19d967e0e1257848d30d33f4,2024-11-21T07:25:59.257000
CVE-2022-43146,0,0,84fc36b0fa34c0e6ead69551bc9e1f56df82e44d1b7de7fb090389def45d5436,2024-11-21T07:25:59.457000
CVE-2022-43148,0,0,e88598e3e00227e7df01cb914dc1a11f6419c5e39f486159d9588bf142ad77bb,2024-11-21T07:25:59.620000
CVE-2022-4315,0,0,a5cbf0230d4828476dc0d837762d5f9e6c799c34d8051fe5afacc263bf7c1f3f,2024-11-21T07:35:01.163000
CVE-2022-4315,0,1,589cd86586bec174ff140f0732f6950973899f093feb268cbe72598f8fca0d1a,2025-03-04T16:15:33.893000
CVE-2022-43151,0,0,ec89dabd3a8fe8d38444eb7088f65645800c95a944f74fc4a0c9106f179d5e70,2024-11-21T07:25:59.777000
CVE-2022-43152,0,0,7758037884cb4ab135d613748ea4d21af54b5940bb82e54694efe5a64eaf1a18,2024-11-21T07:25:59.940000
CVE-2022-43162,0,0,1ccbaac0bb66d6449309a729c532512bc27611c36ca1d066f10c644d326c69e3,2024-11-21T07:26:00.100000
@ -219610,8 +219610,8 @@ CVE-2023-24461,0,0,fd8bc2abb65aada1d7309949da776fd5d44c92bdea8ca6223fb68c7781454
CVE-2023-24463,0,0,a3c9e4674f772990b219d4f3438aaa2243bf93efafd37788b7290fa8764d44b4,2024-11-21T07:47:54.737000
CVE-2023-24464,0,0,665b2ce4da67a5c0980922d44ffd4566ee548bdd53dead916998f380e0b66119,2025-02-11T17:15:15.437000
CVE-2023-24465,0,0,5448889530988c381c47996b768fed4b61a602e0da0ee13f5efeff6b48fd5bd8,2024-11-21T07:47:54.987000
CVE-2023-24466,0,0,cf734ceccfb5911b5b7e627c53a307368cab7376fb3061da294e5c9aa89cd221,2024-11-22T16:15:19.673000
CVE-2023-24467,0,0,07490941e7ee60ebe008d984f75a4eb57ec217c7a9f6818f2eef6ec413eb2c8a,2024-11-22T16:15:19.810000
CVE-2023-24466,0,1,1531d5aa8037433592fb8ed22ccab6d1519aba55b9991ced01572ffa4bda530c,2025-03-04T14:45:17.807000
CVE-2023-24467,0,1,ab8e076c3763270e0693d9addd66b4b0c5c52ff5f6b3f9268c08789601c6c418,2025-03-04T14:45:17.807000
CVE-2023-24468,0,0,639e71c18e7c077a186e13edd7fabab7022c977c2968a99bddf61b8a74e99700,2025-02-27T15:15:36.287000
CVE-2023-24469,0,0,a9377ea65c9498eaf5d1c4eae744f9e44b65020ab796251fe5a53a3ce5c454f8,2025-01-03T19:15:09.590000
CVE-2023-2447,0,0,4ec809bb328a770bd9ca5946a889993e16b770e9ec04f38adc8310b23274c0c6,2024-11-21T07:58:38.067000
@ -221582,7 +221582,7 @@ CVE-2023-26919,0,0,4852cc825b9bf426194bb68dc7846d6ee8ce33eba0abc35e296663c7cb884
CVE-2023-2692,0,0,ad06513e2f116b8fb6a964da6618fc1d94588cf004f25980806dd3b489093f9f,2024-11-21T07:59:05.780000
CVE-2023-26920,0,0,7032d8fb85b06c0f68b934efb7c1ddc8da00b25992344fdcc0d0ab8b925ca6a8,2024-11-21T07:52:04.053000
CVE-2023-26921,0,0,0f6469eadd7b8eb1f25a21780332e58a4e7f037340a8bae8275d286b01ef63f2,2025-02-13T16:15:40.510000
CVE-2023-26922,0,0,02af78d8a0c587f11e4592b06a8425852d45b4b655dc1315ad9511e2b0477b7e,2024-11-21T07:52:04.360000
CVE-2023-26922,0,1,5257fd53c31086036e10c945e5d64e3cfb29fb098c4fd4c471d83fb6324a5b27,2025-03-04T15:15:17.240000
CVE-2023-26923,0,0,75862e39801fb950c2f14e9f720d435da722d14d0e221faf7dfcb2b0a16c8d5c,2025-02-18T21:15:14.770000
CVE-2023-26924,0,0,7cb11a4c9ca77e95624c2ca9eebda8330e0095c5863e0c412e6b45d03fb2efd1,2024-11-21T07:52:04.640000
CVE-2023-26925,0,0,9909c8c7b93b9251f87152292293ede34c98fb010204ed84730aa6d5bd687892,2025-02-18T16:15:14.530000
@ -245263,9 +245263,9 @@ CVE-2024-11127,0,0,8ab8a7a02ec26c5b2661934596816ed78bd98367b1f4c52ffc4a58bf6fa51
CVE-2024-11128,0,0,3daf53c78cf58dd1f31203728c75baa1e7b77755676f9f011daf94fe4d0761b7,2025-02-11T21:38:28.860000
CVE-2024-1113,0,0,90572d47b15d75a1b5b46414b43b02fcca134882a5755a9a69a3d4ba79038a2d,2024-11-21T08:49:49.557000
CVE-2024-11130,0,0,cf5ea4272974c91c76344000d998fe4730aaf36f216ea2c15de856330a45b0d3,2024-11-15T17:57:53.270000
CVE-2024-11132,0,0,0821914b8713b59a5594a768e713d894977db965864534f7c1570dcf8385b455,2025-02-03T20:15:32.047000
CVE-2024-11133,0,0,ec82007b0a80c7248c9750c974f69dc3d569b8565d47f719c0e652c5a939052f,2025-02-03T20:15:32.203000
CVE-2024-11134,0,0,80669d4c37428b414124ba754353d3b371091e0c0a1f0a0960f4766e9c86ba92,2025-02-03T20:15:32.373000
CVE-2024-11132,0,1,68fd46371ee41c70f11e95e75b6bdb69e2415421dbf3f29a1c70aa4e9b3c7f10,2025-03-04T14:53:43.637000
CVE-2024-11133,0,1,8f58890562989b43d2e66a215d00b78377ebbbdc6422866e1456544ffc629567,2025-03-04T14:53:43.637000
CVE-2024-11134,0,1,bae2f6dde2fbfb5b611852c169ae2232b7003592c0dd496aa1c6559c28822bb4,2025-03-04T14:53:43.637000
CVE-2024-11135,0,0,b1408e944d5859a70fcb19ff485be68a4c4e7184c7ddac3f9101a4c9744f657d,2025-01-30T18:03:45.843000
CVE-2024-11136,0,0,14c34b52e51da32486499993d034c5625233241e56703eeb628fb429016a0b8a,2024-11-15T13:58:08.913000
CVE-2024-11138,0,0,2f34cc7cd067d0c6304b6c652f672298f3f38bc0e02398b29badaf312aaed525,2024-12-10T21:11:45.043000
@ -246054,8 +246054,9 @@ CVE-2024-1195,0,0,3368bf518c27a729a23598a4bc9bc8456794ebbc8ed421e1b9fb54311a27af
CVE-2024-11950,0,0,df36014500ed7b6f7946ef04cfd4a777d6bd62d2ab461c18fe6d382ea2d08354,2024-12-12T01:40:21.820000
CVE-2024-11952,0,0,8be0c69e3107fa6f3273f59b11ff511450df70a157d0236a300dd71a0356b941,2024-12-04T09:15:04.637000
CVE-2024-11954,0,0,4285770ed381cd7f5197033d510494069e724ce14634f9774d473591316f5acd,2025-01-28T15:15:11.130000
CVE-2024-11955,0,1,2af5adda5da26b6323fd1ffc39c86bb8d22bbc8895e47ad587f94331f0b10e55,2025-03-04T13:49:18.880000
CVE-2024-11955,0,0,2af5adda5da26b6323fd1ffc39c86bb8d22bbc8895e47ad587f94331f0b10e55,2025-03-04T13:49:18.880000
CVE-2024-11956,0,0,abf0b1c76c4232559590b835003e8c8289517d48626619c77c54644f8e6e061f,2025-01-28T14:15:29.803000
CVE-2024-11957,1,1,23d8576e512e3c80ad85d162554433db4c1b4585d5aa152e91eeafd20640c099,2025-03-04T16:15:34.927000
CVE-2024-11959,0,0,caab75627422c683cea2d1d2168737e0adff93eab9dcc37814cfa2e800769905,2024-12-04T16:52:55.150000
CVE-2024-1196,0,0,4b0eccfc085f9fcf5d1d563f67df6edef95e40ef1d03548e58cd26db6bec54a2,2024-11-21T08:50:00.883000
CVE-2024-11960,0,0,98cccdbf2a56893ba844e9a27d11d8e19b411cb229a2ffc9fddc1d1b0c64d4ba,2024-12-04T16:52:34.413000
@ -247602,7 +247603,7 @@ CVE-2024-13681,0,0,f9b5888e5600eddb54eab02d107b8219d0a2ff1dd821d3ec69a804f466f47
CVE-2024-13682,0,0,ab7b0f61263b36adc7c9dfee57d17af70806e6267e316ef0b9cb0fc98f41c6fc,2025-03-04T09:15:09.960000
CVE-2024-13683,0,0,60466d727e6596c848a3b384eab039ecd16e7bfc142b0f259b6e51a93695759b,2025-02-05T17:18:36.090000
CVE-2024-13684,0,0,29bd0282adaed7c145caec3d49c703050082025937ad2fcfe46d4b20fa2f4a61,2025-02-21T15:57:57.993000
CVE-2024-13685,0,0,03de3c2f4567b362885b87939b3221f81be18564e943cae2676e8a3616a94948,2025-03-04T06:15:27.240000
CVE-2024-13685,0,1,50ccc6b12c4c95fb069a8c449d3bc8810677414e2a7ace0a2bc79b90508fa4b7,2025-03-04T15:15:18.760000
CVE-2024-13686,0,0,4691e12d5168bb7d67360fcc2a73944d7fa732d6ecc8775af952ebb6f3141b5d,2025-03-04T04:15:11.070000
CVE-2024-13687,0,0,8a954d90e2ecf3e0bfefe90b1ebf331e7dcd9b3ff81bc3892382c9536696e182,2025-02-21T16:00:16.287000
CVE-2024-13689,0,0,41b530aa4ba65a02f514116414a57fc5db58dbb6ffe52efa3c6202ae2808e2eb,2025-02-18T15:15:15.547000
@ -268074,7 +268075,7 @@ CVE-2024-45594,0,0,7a3512bdd289e08930c55958e7a3b82e2f30b26c968886b9e51f5b9001958
CVE-2024-45595,0,0,ed73f265e4cc26a14ea0ef98c1ed160999b148dbe2046a7b8a319cd1ad837073,2024-09-20T19:59:02.963000
CVE-2024-45596,0,0,a620d8302107635d7f8871dcd65118f72878398568927fef8140037a0b256d98,2024-09-11T16:26:11.920000
CVE-2024-45597,0,0,5a68594db914cb6b4d8306c16fbb00f262377974d86e7839e390f218fadb00b1,2024-09-11T16:26:11.920000
CVE-2024-45598,0,0,fb11f2533ae20ca5b770b3e6cfb8400dfd4666b24d9a5d89096f872428905225,2025-01-27T16:15:31.267000
CVE-2024-45598,0,1,7cdad03177052428807302a87d34c2208f361b799b303ac315f9592f8b1310fb,2025-03-04T14:45:17.807000
CVE-2024-45599,0,0,336dcc223b338e03a3d5e62e7e0b320a6d04f231025b64ee6820c74e273fb906,2024-09-26T13:32:02.803000
CVE-2024-4560,0,0,77026720b012435fe27b280a69c912322a6f69fd18d9b68eb4c768a521dc0638,2024-11-21T09:43:06.550000
CVE-2024-45600,0,0,5e421d273aed3e2190a0fe3fca5657a151966ed61665125955352b8401139444,2024-12-26T22:15:13.583000
@ -269963,7 +269964,7 @@ CVE-2024-48239,0,0,0c07796f9941e77d31ea455c930d1849f400f89336e89d408653eccdc74bd
CVE-2024-4824,0,0,99e5c25e3efbae2d6155cb78a769b081c4e63979dfca195378dce1a55688edc2,2024-11-21T09:43:41.940000
CVE-2024-48241,0,0,942b4afc357baeaceadf6e602d4d8e3bfa0474bc4cebfcbfe23fbed098a739b4,2024-11-01T12:57:03.417000
CVE-2024-48245,0,0,aca39816c4fa40e3329fe946417f7ca9849849875505e3b3a53a29b06062021c,2025-01-07T20:15:29.750000
CVE-2024-48248,0,0,ac3fc0f6c8ce3e0223ebe710a67ff2a29a152ed42554d6cf3798d430ad51a664,2025-03-04T09:15:10.307000
CVE-2024-48248,0,1,08696f116983e1deddae7d19e7d15ec089454faaccfbe9c5f21145f8346f74c0,2025-03-04T16:15:35.150000
CVE-2024-48249,0,0,2b7bc564c0f7feefef01fa93cd50d56ca2a93e73b5f3eb01b90321a2b54ebe80,2024-10-15T18:35:15.607000
CVE-2024-4825,0,0,5c1d8ba2e7dfb16ca18af9c563e1590f25a3d396f69347243d31cae6dbf069a9,2024-11-21T09:43:42.050000
CVE-2024-48251,0,0,c80def3e238ed0fab4e8dad7bc06f5b33b90fcccea2cf3bdaafbfe1c7c4fb67e,2024-10-17T18:35:12.280000
@ -271476,7 +271477,7 @@ CVE-2024-50299,0,0,0c281bf670f28202ecab6b493ed49cc5ea5a6c8ca6e18d28c043e1650410b
CVE-2024-5030,0,0,d7a01f140218cc5d3b4d9bb19a90752f3ec5a691714edb3528e20e3690587947,2024-11-18T17:11:17.393000
CVE-2024-50300,0,0,7e61bc5452e3c6bf0816fa7f8abf13f64ca5a49dc8874af50150a20d37ed3a6f,2024-11-21T21:11:32.137000
CVE-2024-50301,0,0,7bf644bb8af063938e3e18dc42072a8ce6618f64a2658105524913b296306adf,2024-11-21T20:53:03.823000
CVE-2024-50302,0,0,c276d48aa253104f6ab94ac380d2127bc623569a115a2b5fb8d69864e82f6893,2024-11-27T15:27:00.187000
CVE-2024-50302,0,1,82eea98db766b4db301e733c34485a9be7ab0356b12c0e8570ec165be8b4c59d,2025-03-04T16:15:35.280000
CVE-2024-50303,0,0,bc6cc55b32c0f00ab508749d7c62fbc3dbe6ae3c9749209c3284b75426b67658,2024-11-27T21:29:30.267000
CVE-2024-50304,0,0,eeeaee5732dfb12e1aae063256882bc4dd20d6bc10a6f629b1d14550d165b8e7,2025-02-02T11:15:11.207000
CVE-2024-50305,0,0,50fd3aee61add01e589f37a9c6d29b7fd91b0375b90c41822a3e9396b3202d7a,2024-11-15T13:58:08.913000
@ -271808,7 +271809,7 @@ CVE-2024-50652,0,0,2f965c69b573d9e115cdae86c6768d0ed1bea347974fb0bbbfc5caeeb795e
CVE-2024-50653,0,0,c3c2eb452e8edda9530908359ecefe1b49303fe46316e9194f74a85e3734220b,2024-11-20T15:36:20.257000
CVE-2024-50654,0,0,5fcda88001562dfee1e6cc60fc3a7e9ed1e6a24d11c939faa9c604dfe739ca92,2024-11-21T19:15:11.113000
CVE-2024-50655,0,0,1459d7257280aa2e8bdcb66b80527b54cff1ac83583af5c95b1d9f4626d5dfc0,2024-11-21T09:44:54.133000
CVE-2024-50656,0,0,e53c92dd40aeb79d431b51fb04bac1f16260e97b7e3acd3a14cd582afd780293,2025-02-18T19:15:17.930000
CVE-2024-50656,0,1,0388b4db16cd9aabe7b5e8e43f14e295a2a569883a92c3216db45e5c95061e17,2025-03-04T14:53:43.637000
CVE-2024-50657,0,0,30b2eb884e7e45c72e97be70bee207473abaa297a2a95565537ba3cd89d0a4dd,2024-11-27T17:15:12.323000
CVE-2024-50658,0,0,dc74515f499285ca9589c261009f1434e39f4df3c1feba74e29bae75532d2d18,2025-01-08T16:15:34.413000
CVE-2024-50659,0,0,070d9cee09db7fd442130a440bc492ee33550ec72e00250b2d953adb8bd85a17,2025-01-08T16:15:34.597000
@ -271841,6 +271842,10 @@ CVE-2024-50699,0,0,b7bfb9ce8d871e66c8bc846d040c669e65be2a2e4a5ca2c2838499d7e0265
CVE-2024-50701,0,0,a80b1dc6acfa0163b2b418f9af2de103abd46652e86be76b69c935d1bde098bf,2024-12-30T16:15:11.387000
CVE-2024-50702,0,0,364da4b19de28c5c7b507be40fbdae2c11e3df8d6828b6df401d4df157b3f54d,2024-12-30T16:15:11.550000
CVE-2024-50703,0,0,e1914095d1b7a0ffe223f333a29d6d8f0777fb87821c72e0f90605f07525e975,2024-12-30T16:15:11.713000
CVE-2024-50704,1,1,9d331c8d6b363d37fff2547f6d76cc65ecf4258701e3633eed0ee80ab60702ca,2025-03-04T16:15:35.480000
CVE-2024-50705,1,1,7f8c9f9cf68b3101f3ba62602ce2f5e6e57e21f3f81bbd324b10b941dd67f273,2025-03-04T16:15:35.597000
CVE-2024-50706,1,1,bdf826c2f0e018abe61028151297292c44083149d42747ce0b23d50c7f191ee6,2025-03-04T15:15:19.290000
CVE-2024-50707,1,1,44896e88bc7dc773fec1e11f006564a397b1d0d8621287ea0206c057d3930403,2025-03-04T16:15:35.733000
CVE-2024-5071,0,0,6dfa056d4abe7e6b37a7311009a7ee0087dcbc392285cd9b9ee51e94d1bed9a4,2024-11-21T09:46:54.120000
CVE-2024-50713,0,0,0aa4de590634689fc06ab979763234a81b3e22004da47f2c72171e7a681edd71,2024-12-31T19:15:46.967000
CVE-2024-50714,0,0,715fa47c5b29e7f074e411097e14ad7eb3de980f9ba46000b7478612148d5076,2024-12-28T18:15:08.193000
@ -273996,7 +274001,7 @@ CVE-2024-53940,0,0,04215bb77d44b273e9849b212da1715e4a88663d0a04d658e8b426292d6b2
CVE-2024-53941,0,0,958fbab1dcd158d91125ecb71056e34e403404760a1ce78a6e1b2e3ede2a0630,2024-12-03T19:15:13.113000
CVE-2024-53942,0,0,a82102ce95ecba9d91a325449993277e8666efd3fba33597504408ca5c2b2e17,2025-02-03T18:15:36.633000
CVE-2024-53943,0,0,437d28c72b812c4593516003fc2aba4b613f671a694938fbad086ef025289004,2025-02-05T19:15:44.257000
CVE-2024-53944,0,0,c9e41084ca96c95464f2cbaa1f2ca069883a8508c18c1b3a9d39831f60e08355,2025-02-27T20:16:01.887000
CVE-2024-53944,0,1,22692dca7fe9bf90c709d562a2f5e57fc8a071e9e5f9d218e87c93a1c791fa71,2025-03-04T15:15:19.667000
CVE-2024-53947,0,0,e2f76f81a7b4b04a6a0933301af0327b41592be00ca6e33f47671fd393eff3dc,2024-12-09T14:15:12.267000
CVE-2024-53948,0,0,d599ead73c1f590fbb2eff6448b7bf9439b2eabd12941877aab993eed63132d0,2025-02-11T16:27:31.023000
CVE-2024-53949,0,0,a7aea508a7c1f88d7575b0e16e3be5a77b1cd694ac35d309754b1488d9891f8c,2025-02-12T10:15:13.790000
@ -274147,8 +274152,8 @@ CVE-2024-54140,0,0,31257e10dae8888bcca62759980c11bff94610e8424d0a991aa232e4e053f
CVE-2024-54141,0,0,03f51d6625a463b05e77ba75622f0e1fc489bf2648bf55da8aa1a94f754ed277,2024-12-06T15:15:09.530000
CVE-2024-54142,0,0,72133cd2497b495f2be9332cda5c9c42b0acf32e880167b6d7b1c949210b9875,2025-01-14T23:15:08.687000
CVE-2024-54143,0,0,8db75f45f675c8e0c94c9f789265e5f7040d3230f01c944775ae37d21a402ba6,2024-12-06T17:15:12.687000
CVE-2024-54145,0,0,d29401c66a345e085157a72c34e12541d999da662af740f11a31d17e1caeb437,2025-01-27T17:15:16.240000
CVE-2024-54146,0,0,8be3afe261f70a34dd94521b64c588c302e6bf746bd01d3a66c8807a54d879ea,2025-01-27T17:15:16.380000
CVE-2024-54145,0,1,0086ede8d33f4c38cf42c46cc6e8e377784b371f7ac491d57a1e89761d1ee349,2025-03-04T14:45:17.807000
CVE-2024-54146,0,1,ec63a6eaa7f42f80e3e3b10f3681a77c87540f5ea9640756664e7e50eb919830,2025-03-04T14:45:17.807000
CVE-2024-54147,0,0,31061631720e65f385fd359d47a289e6f20b86f9fad882040f751c79c06fbc19,2024-12-09T19:15:14.513000
CVE-2024-54148,0,0,1bfb17d4d936ce6a940dfc88f1d38025c4aaaa0bf878ea9058eb2876c8005731,2024-12-24T02:15:06.410000
CVE-2024-54149,0,0,9e6d58019e13dfe4168259b606ef42fa170a7f5d925476003c46ba8914519715,2024-12-09T21:15:08.600000
@ -275757,7 +275762,7 @@ CVE-2024-57034,0,0,e52a39ecd5c7a609e90fa7ae9c35e819ec30d141102d18c5cb8dc9ebebfd4
CVE-2024-57035,0,0,8f647174886ad5489698835d701ee28c5ff6c813395545be8ae09bfd3cde425f,2025-02-28T19:16:13.133000
CVE-2024-57036,0,0,55b7f3d5f4d5a99be083f64a92e65d0a6b625216d85565aff3a03ccb780b5c92,2025-02-04T16:15:39.170000
CVE-2024-5704,0,0,cbccfff62486c3c4f34573a6ffedc788349c4048d54ed4b150463209e5b954e3,2024-11-21T09:48:12.583000
CVE-2024-57040,0,0,4de3ec8520d627412151a285808f07acb55340667ec561d8d5d9eefc71b5b985,2025-02-26T22:15:14.240000
CVE-2024-57040,0,1,5ea2e5622bbc48143f47b14e4e3255cd65f152b262337519628c8107ee7f9aba,2025-03-04T15:15:20.283000
CVE-2024-57041,0,0,0979fe76d9e8316158a2a941acc94a8ef64339b0f6c4a4654fbbd04ce63283cd,2025-02-06T22:15:39
CVE-2024-57045,0,0,9e88193dd5b32a09e508dddb0c4a8c2c596170562f8ae97e69edc85973af8d81,2025-02-19T16:15:40.317000
CVE-2024-57046,0,0,ed4764a2183714deed727de4acb95079ff6351d4a17070f6f3c7fbd3a859097c,2025-02-19T22:15:23.207000
@ -279261,6 +279266,7 @@ CVE-2024-9145,0,0,97a312c1c66b488d02b8e5ae15f80967927307525d089b410f672665e8c386
CVE-2024-9146,0,0,b2bcae27bf136fac98f5cca96bf30e297b145f83fbf374484b4b69bb66a11534,2024-10-07T17:48:28.117000
CVE-2024-9147,0,0,0093d2743a16315fb2395e20e4313d0098c0f4e5a32333383ccd3780d7d6e4a8,2024-11-06T15:53:59.983000
CVE-2024-9148,0,0,a904c9834abceb13922e1cc588509f574c6534f26c7e1a2e5af468520b2fb09c,2024-09-30T17:34:12.760000
CVE-2024-9149,1,1,962efc736bc6124bf9fbe66a3fd731bf8d5e55f0fbe538c9ec08386971ed8d30,2025-03-04T15:15:22.530000
CVE-2024-9150,0,0,a71859d524acf6115eb959ba60ad17bd5abb4a22b920695c51f16760c3126535,2025-02-21T12:15:30.463000
CVE-2024-9154,0,0,10c686be97e780f4f6e6444839c6c04b63fc77477fab652ecfbb9dcc548afff5,2024-12-22T07:15:06.307000
CVE-2024-9155,0,0,6b831cc9815c7982fccb5bb1db903558181a3d9726f2c50e686b372d7d7ea737,2024-09-30T12:46:20.237000
@ -280094,11 +280100,11 @@ CVE-2025-0246,0,0,c39f5bdf37092ddacf9510ed2d75cd9204291d6d9bc9dd6c5bd8168e56e080
CVE-2025-0247,0,0,0125f498ef227ebc436135b5d9339a763bd05ec1f3a6e4d4fb60e8d0a9524607,2025-01-14T17:15:20.547000
CVE-2025-0282,0,0,193a86684d492a70f8035af4d9672f451f74d0f498147e63c150db661e49e756,2025-02-20T23:15:11.950000
CVE-2025-0283,0,0,170559952a9515dd5478b031ee87167014dac9ea49e5e0d222b13defbaf7dddd,2025-01-14T15:58:55.813000
CVE-2025-0285,0,0,bd76a73d88fc72bc10ed44c3117c45016b96684dc519171e4420c8e33e931fd6,2025-03-03T17:15:13.430000
CVE-2025-0286,0,0,c4ec72a9554ec8a756e5843089b16cd508ff7c50c18456a0f96863f5d96c876a,2025-03-03T17:15:13.537000
CVE-2025-0285,0,1,8bef17d3f85cba40ca0c2d7eb2962a0b4098c9c2a2ea291e3924377e2de2a5c0,2025-03-04T16:15:36.020000
CVE-2025-0286,0,1,31a9fcd6eceae0e8ab746102c51a8f90d8bdbebc7d503dcf99fb542761883442,2025-03-04T16:15:36.167000
CVE-2025-0287,0,0,99b2806e0b914384724b92a9eeda355dfeaeb1f153364014a4accbba6bc06de4,2025-03-03T20:15:44.100000
CVE-2025-0288,0,0,a9d3af508f26bc1a8c7748a2db86a46548a895db1c48b9ff7e76f56239bc4552,2025-03-03T17:15:13.823000
CVE-2025-0289,0,0,8d7c88a592ed289173b4a13ae98054285b63c7fbb44bee84e192a3dffe5fdd54,2025-03-03T17:15:13.943000
CVE-2025-0288,0,1,5535019b67c8186a5a2a2f66909842decaee326bbc7e615060a66e0dcdf41d37,2025-03-04T16:15:36.317000
CVE-2025-0289,0,1,bde669fd45186b8a31a5a0375129ab340a8c051d355c15c4807dca5af7b187de,2025-03-04T16:15:36.467000
CVE-2025-0290,0,0,1b0af77f22124c7fd21050a24684089c59772f145263e66a578112620b4a0b4d,2025-01-28T09:15:09.363000
CVE-2025-0291,0,0,c1c3893d4e09f9e0204fc40192dba70b3c3378a020c5622ef22757e5df4fb545,2025-02-11T15:16:03.447000
CVE-2025-0294,0,0,c9b2fc3087b74017273fe9485890135d0ff2bb52c4c2bc9ab42cdccd09c8f44c,2025-01-07T15:15:12.113000
@ -280457,7 +280463,7 @@ CVE-2025-0825,0,0,a0334191040ddd84cf58e374702797f73c6f21c21dcc064c3fd05efc814927
CVE-2025-0834,0,0,239a6f08c2db88ce57ab64c699932d200eff33712703b8a8f00d02b01207348f,2025-01-30T09:15:09.703000
CVE-2025-0837,0,0,edb903a525c34e5db3f70de24ac0ad9bb2158867f6a7f92ca61239987715eef7,2025-02-24T17:08:29.033000
CVE-2025-0838,0,0,5a9fc4e1768f097f2fc50c995427721cfd5a7a3b77299bdbe2955b9299abd536,2025-02-21T15:15:11.890000
CVE-2025-0840,0,0,79ef33a6b34430ee30098d47cac5f4328a851ed337a384616ad40711bf9306bf,2025-01-29T20:15:35.007000
CVE-2025-0840,0,1,582d68c7d01609df8f75b41175c198a68760a9d4af98efb8dd178ec4d57bbaae,2025-03-04T14:53:43.637000
CVE-2025-0841,0,0,b774fca3a24dc7d508cd784f030d5801ea9f63adf71e1a38a09a02a937c41b6d,2025-01-29T21:15:20.973000
CVE-2025-0842,0,0,880989b2076d537c6bb018739fce330a49d894aec3d353193ef18e6fe884c71a,2025-02-25T19:45:04.700000
CVE-2025-0843,0,0,350d60ad76c1f5c9df007c9b8ac9d858c4b3349609463c740dca46afb5143f69,2025-02-04T17:16:08.127000
@ -280616,7 +280622,7 @@ CVE-2025-1102,0,0,0a58fac809cb082841f9122cd183bbcaae0c3230347602227d2b0c09eb06da
CVE-2025-1103,0,0,0e526fd4466d75abc344bf0bd683cde20cd72e5c520f7b078f91058dbcc62271,2025-02-07T16:15:39.973000
CVE-2025-1104,0,0,cd698b7fb9abc7a0e8cf365342427529ce4ee897116a726790abd164b5d7a4e8,2025-02-07T17:15:31.477000
CVE-2025-1105,0,0,3bacdf77291dd429d5a36d299846ec2970e0b6d32e073b87ebe633608b8b63d8,2025-02-07T18:15:28.433000
CVE-2025-1106,0,0,a3b8b89a6d6841c31a035bb06d6cbb743b91b68a5569eb34eac7fb1ed0d7d04b,2025-02-07T19:15:24.613000
CVE-2025-1106,0,1,524d2874116becb8ba796cd93b1a3dfabff51569f8ccd989ff4bae924e49e1aa,2025-03-04T14:53:43.637000
CVE-2025-1107,0,0,88a8719351346afa69c0eb84e5c94d3ac98eeae345d66ccbfb838f179b4a14fd,2025-02-07T14:15:48.343000
CVE-2025-1108,0,0,70b44a68f944b132ac1602e83624e59a01ee9e1d6bf1d641646c3c0fbcfd3886,2025-02-07T14:15:48.530000
CVE-2025-1113,0,0,e1507e6d2bb810ac6657444d8f9429eef67e835f41d00085c329df7f95fe9d83,2025-02-07T23:15:14.727000
@ -280637,9 +280643,9 @@ CVE-2025-1143,0,0,304257e291412914759d8dd1547bfdc8737e5d301b764158390fad46e11d8a
CVE-2025-1144,0,0,c007a9248005240176adbf0d59d7e143608bdb0bc1952b89f1043c4b3e3f4a74,2025-02-11T06:15:20.310000
CVE-2025-1145,0,0,d6e4f6830b1d5bec32355229d5ad379784daf94076f4978b41c854d102fa122e,2025-02-18T18:15:29.940000
CVE-2025-1146,0,0,8867063a2a1a8b5d6fc90063ce8ae3bb4a4d3f7b0a7daaf4b1563e53968a0cb4,2025-02-12T19:15:09.840000
CVE-2025-1147,0,0,a91ddadecd3b5a2c253a89bf4197712aa1818ad0485210aad82264eeb6af62ce,2025-02-10T14:15:29.643000
CVE-2025-1147,0,1,ac9da679a64d0b5e778da5d8925413d5cb4c457abc1332a83096bb26fdbe538f,2025-03-04T14:53:43.637000
CVE-2025-1148,0,0,d1618314ff59009839b509aacbbca99b15c99ccd5fbd1d92e78000fe3994e57c,2025-02-10T14:15:29.927000
CVE-2025-1149,0,0,d8d91fe8a3ea61c4ba8a8728b35b19cb024f17e8929c6b84c98db6467585ef43,2025-02-10T15:15:13.093000
CVE-2025-1149,0,1,7e2298a7d8da8ec94b0957e90f0f05dd4901170f5b4ebcf2e3d1c46417f15a10,2025-03-04T14:53:43.637000
CVE-2025-1150,0,0,ad52c0f26e616344bc9e26433ea525a076361996f0527b54486144825cdc9fc6,2025-02-10T17:15:18.517000
CVE-2025-1151,0,0,6f137cbb7dc8cd66d49b40611be226ac13ffd672475b8994ef22393fe66acf80,2025-02-10T17:15:18.713000
CVE-2025-1152,0,0,ae53d6bc7df1c05ec8db34e17fef35dc2661a6e86edb0d9d93d56afcdd732f31,2025-03-03T16:52:20.953000
@ -280789,6 +280795,8 @@ CVE-2025-1410,0,0,1acd34ee1bf4de50c7bb7990bb2833820ce8a935ac6fe3383da13c0fe4fe3d
CVE-2025-1412,0,0,15006068dde5667dc534d1c6a1b910fc18a441695fc7fe8438811af885c4587d,2025-02-24T08:15:09.890000
CVE-2025-1413,0,0,f96e155e6d851d7d3bb06c9668e0843604deba9a4449bfef780b497cc84830b4,2025-02-28T09:15:11.850000
CVE-2025-1414,0,0,b3b9c3affbe2798ab158992b46088a156edfb77f4ed4319f53d9b7d1a64ef9f9,2025-02-18T21:15:25.440000
CVE-2025-1424,1,1,7bc1486ceca0565cfcc9a2d34ce95560808df7da09f34dab3d4f23862348c153,2025-03-04T16:15:36.663000
CVE-2025-1425,1,1,43fb3b1f1ada208e5c93084c37982591e83549c344ec272dd4837e6ef4cf756b,2025-03-04T16:15:36.803000
CVE-2025-1426,0,0,834f194c9c92d88c2a5fa9395038ff6b865679b1740d05e480244e8e7428755b,2025-02-19T20:15:36.467000
CVE-2025-1441,0,0,a148724949d3a67ddbdb90d03ba8b4c0c01959027f1d8b9da83469468076f49e,2025-02-28T19:47:07.220000
CVE-2025-1447,0,0,b52fc293ec2c8f7276787d8ec4e27a605d8feb40937673c00f5fe8646d83ab92,2025-02-19T01:15:09.407000
@ -280998,7 +281006,7 @@ CVE-2025-1889,0,0,f7cf73293a0ccf1008c443a59d3e7d9e6c3eafe2a69cacf7dd719e71afcc42
CVE-2025-1890,0,0,fb180de0a5553a034ff78b5b5a313fe552ef117fe5eb133cd304c74c41bebb8e,2025-03-04T00:15:31.190000
CVE-2025-1891,0,0,ba5dca5f04b0970d036a786c7821b97cb95f51992163656e2d4e884b26749b04,2025-03-04T00:15:31.377000
CVE-2025-1892,0,0,5f521d1356697805c14d8f756f3eea70794c3f1bece498159531e6576bcea5d0,2025-03-04T01:15:11.147000
CVE-2025-1893,0,1,18b5ea0a0ca62226ded1a72e624165d9371800e39e7d7034899a481cc3d8aa6d,2025-03-04T13:15:10.063000
CVE-2025-1893,0,0,18b5ea0a0ca62226ded1a72e624165d9371800e39e7d7034899a481cc3d8aa6d,2025-03-04T13:15:10.063000
CVE-2025-1894,0,0,164da153e07025ecb72d314d8c9548eaacf5c09d2e168cfb9789d74af94348d8,2025-03-04T02:15:35.380000
CVE-2025-1895,0,0,f7fdb5ea44d811a741cda1ad116677cd04f10a970b0ce5da888f126de44023e4,2025-03-04T02:15:36.163000
CVE-2025-1896,0,0,d6468fd7c73c75a3b36bb29f1c2fee1b2fb32ea5a7c8aea8e3f379d9e7426436,2025-03-04T02:15:36.340000
@ -281007,26 +281015,26 @@ CVE-2025-1898,0,0,6dd4f4dd3867537e2273be7442c60d9cdb3ccf4846f81ef9fd2704d9557f1c
CVE-2025-1899,0,0,24ac0955bb8ab305b10d11752dd11577ff372d3c64c52ac3f3dc346b3a4f860a,2025-03-04T03:15:08.970000
CVE-2025-1900,0,0,56495ed13bfaa437b11956412ae3622f0f7e022503c4516e140801944af10308,2025-03-04T04:15:11.853000
CVE-2025-1901,0,0,f5888ab7c140e56993335d3850c5a603cb408753be3d9e12594cb142bda21c0b,2025-03-04T04:15:12.030000
CVE-2025-1902,0,0,471c441de14373e77348d0bbdc653bd5f8e13826241da34d0938b9485f96b4a8,2025-03-04T04:15:12.210000
CVE-2025-1903,0,0,ad39b59b593243038c6c2b3182d79a3798b1c4d73d43fb52278944b750429807,2025-03-04T04:15:12.383000
CVE-2025-1904,0,0,c3f8c1fa1d9579c4d82bc617eae230933b987e0aaee6ca3786c17750a6074cf8,2025-03-04T05:15:14.440000
CVE-2025-1905,0,0,544d2a978ea2a42a58a9b1374a4628e0334caacaa4fa4d5b01db57902479138d,2025-03-04T05:15:14.680000
CVE-2025-1906,0,0,459dada4012727e3771610e3a7119b7d5a5efce1dfb2febc2be2da9752686a5c,2025-03-04T05:15:14.903000
CVE-2025-1925,1,1,3555443c31b069f7d334eccd429471a153bc502fbca36c5565b567a1b55d2fd9,2025-03-04T14:15:36.717000
CVE-2025-1930,1,1,0af19b309bc3568ec49a2f7143d8beec88c681599fe59a1a151cf4873518a863,2025-03-04T14:15:37.850000
CVE-2025-1931,1,1,07ca8f72840844f1c7bc6e7707368913732bbd4581c32b3edd89096405e1f0b7,2025-03-04T14:15:37.963000
CVE-2025-1932,1,1,685d653318d2c61bc7ab512d43423a62e980f639157cec9154a433bde0a8c89f,2025-03-04T14:15:38.053000
CVE-2025-1933,1,1,af60cb7e54d694102cf1a34b3bf8a3d7b976ad074c5c72afe1edcea9c3030cb9,2025-03-04T14:15:38.170000
CVE-2025-1934,1,1,defda1fa968f2d1f6b4bab5407943d1f18c163966bf3940bc1ce343e2dc494af,2025-03-04T14:15:38.273000
CVE-2025-1935,1,1,628d9831cfde3bf6c1721fb5b4eb6426bb6f2fece608e7b61bb7df00efe8d704,2025-03-04T14:15:38.390000
CVE-2025-1936,1,1,08ee55072dc1440649036276dd782693ec14b6ecbdcc6904219467a7b9af1bb6,2025-03-04T14:15:38.500000
CVE-2025-1937,1,1,fe96f19485f137b7de4930d8a1c319b5b597161e14b41dc56749602d697c21c3,2025-03-04T14:15:38.610000
CVE-2025-1938,1,1,9c67affb79189d97fc730ea5b0f939fba8b816b20045f69c914676a7593d8c17,2025-03-04T14:15:38.730000
CVE-2025-1939,1,1,5423b6d57bde27103afefd0147e6a27b92b6f89c451bc13e8b0c4b336560932e,2025-03-04T14:15:38.837000
CVE-2025-1940,1,1,5dbf44d5cc7ae5e21d3790ba36646b5bedeb9ad84f1c6a4302111774521a8db2,2025-03-04T14:15:38.950000
CVE-2025-1941,1,1,e65f467cf8ffb9224f34a01e5cdb113d9511f46ba9c9c07e683575d280ecf13e,2025-03-04T14:15:39.063000
CVE-2025-1942,1,1,643dcf7b843a42dc9ccb28b7e76a8aa357d034b38c8e0ef0ed7c25ddc2827490,2025-03-04T14:15:39.167000
CVE-2025-1943,1,1,e9f1827e222fe2c9d54915e014c7896e9d0f61d9e34695a6c9e7975aa52b9e5a,2025-03-04T14:15:39.260000
CVE-2025-1902,0,1,4f33e98a96c36f9eb4cbf4c992c7f8a6dde5fe1c6867df23a308ccaf03d2c2be,2025-03-04T16:15:37.450000
CVE-2025-1903,0,1,feb447ed58cefdf61303da7ea43a9121d478203aceeb23851a14b658ab7612c4,2025-03-04T16:15:37.577000
CVE-2025-1904,0,1,67789ecf25a3a069ead16fcfc4d62d28da2bab19c41d0fefbcf5c0a48757e274,2025-03-04T16:15:37.700000
CVE-2025-1905,0,1,96b71a21d0d8fc3a56947eb8c835bfa740c8bb7b678faabc75b6ff6682fc8368,2025-03-04T15:15:24.033000
CVE-2025-1906,0,1,50fb789742a4cb14c8bf4cadc940496288485e869e115b1312bb9ddc6bd1a640,2025-03-04T15:15:24.233000
CVE-2025-1925,0,0,3555443c31b069f7d334eccd429471a153bc502fbca36c5565b567a1b55d2fd9,2025-03-04T14:15:36.717000
CVE-2025-1930,0,0,0af19b309bc3568ec49a2f7143d8beec88c681599fe59a1a151cf4873518a863,2025-03-04T14:15:37.850000
CVE-2025-1931,0,0,07ca8f72840844f1c7bc6e7707368913732bbd4581c32b3edd89096405e1f0b7,2025-03-04T14:15:37.963000
CVE-2025-1932,0,0,685d653318d2c61bc7ab512d43423a62e980f639157cec9154a433bde0a8c89f,2025-03-04T14:15:38.053000
CVE-2025-1933,0,1,013824cf9256af099bc6347ceda0ada705eda8a2cf83be8ba6383655963c9e57,2025-03-04T16:15:37.823000
CVE-2025-1934,0,1,44f25a8902a9b9b95e941d6ccaa26cb7fa6741d2058c14d791dddd487b53c6b0,2025-03-04T16:15:37.970000
CVE-2025-1935,0,1,b1f141814e3f1476674dd592029a8f4ffa3fe6d2fab8a0b0166b44a0a11fb5c0,2025-03-04T16:15:38.110000
CVE-2025-1936,0,0,08ee55072dc1440649036276dd782693ec14b6ecbdcc6904219467a7b9af1bb6,2025-03-04T14:15:38.500000
CVE-2025-1937,0,0,fe96f19485f137b7de4930d8a1c319b5b597161e14b41dc56749602d697c21c3,2025-03-04T14:15:38.610000
CVE-2025-1938,0,0,9c67affb79189d97fc730ea5b0f939fba8b816b20045f69c914676a7593d8c17,2025-03-04T14:15:38.730000
CVE-2025-1939,0,0,5423b6d57bde27103afefd0147e6a27b92b6f89c451bc13e8b0c4b336560932e,2025-03-04T14:15:38.837000
CVE-2025-1940,0,1,2da52b7ef01c0ebae181d033a25f813d405367fc27b9ab2f5ece7671de559246,2025-03-04T16:15:38.310000
CVE-2025-1941,0,1,c755e145fc658d9d2d1958c16a11cb393d3d6769dff8808a148cf5adfb9a5e27,2025-03-04T16:15:38.457000
CVE-2025-1942,0,1,e7e8ffb9220287cc58971bc54a60d82cac4054a1402ceec16ddaf1f2c60d0668,2025-03-04T16:15:38.607000
CVE-2025-1943,0,1,021009f6feffea675fe424b37381aa7740ab1b8c35c7e162f1f5acfa4c41d210,2025-03-04T15:15:24.493000
CVE-2025-20011,0,0,5d2fdc5455e5c161d4353b8b7d096a2e122865a9c5759753d2f12b06ccf9a6a1,2025-03-04T04:15:12.563000
CVE-2025-20014,0,0,f4fd1db051e4652a5d7e7863a21c37faec75062d4b5ce0e4f2c6bffc2f3ee854,2025-01-29T20:15:35.207000
CVE-2025-20016,0,0,6fccb84eb01c2cd66b422e82777f9738bfe5004121e1b551d0ae454724543c0e,2025-01-14T10:15:07.500000
@ -281193,7 +281201,7 @@ CVE-2025-21176,0,0,f683215bf84a27939b829b2fd8bdbd57fb03840af68a0aef95b986216dd89
CVE-2025-21177,0,0,4f903499a658859fcb10826be90a0ea63b63f075823c3150567dddccfd65ed77,2025-02-11T22:19:45.057000
CVE-2025-21178,0,0,dc867944694dd46d8ab835f7a6d78675b67e7454fecfc2784b90a7c98def1ac5,2025-01-27T18:42:39.560000
CVE-2025-21179,0,0,56c99027ad0d41d9c697e46ad29c10aa7c65635cadb6d982db31f0458c99ddfa,2025-02-25T16:56:10.590000
CVE-2025-21181,0,0,71cd8e17f304081f3c6b0247ebefaddfaa4c353fcd560fa012fa60a9c60bf6bd,2025-02-25T16:58:10.650000
CVE-2025-21181,0,1,da3a9934c4290b3b670cda21e1ec49e2e6a47888699680facdd72d5c329d6586,2025-03-04T15:15:26.497000
CVE-2025-21182,0,0,cc183a741d3d0b62fc82a334158a2ca4fdae6dba068e1b2b22a750e1789b8393,2025-02-25T16:59:25.820000
CVE-2025-21183,0,0,97c60133d935bc6f85808e271daf514b07d577c1754cf44ed14ffde224dc4835,2025-02-25T17:00:06.170000
CVE-2025-21184,0,0,5d06730c00c1dc25128c9225e356567d097b85e0f2f5db86ef3a5ca868f045e8,2025-02-28T16:02:50.353000
@ -281393,7 +281401,7 @@ CVE-2025-21394,0,0,4ccc160d26f412d0660db2820673933d53f9e960ede3214b61aa7e3d64874
CVE-2025-21395,0,0,aaa92e83be335ef96c9cd11d7db7db708bd0afd97750ce93e8f75c2b65de7d16,2025-01-17T15:46:01.927000
CVE-2025-21396,0,0,02c0d56bd41ecdabdfe6ce22c5c5e978e70b99d6624ab2be1d0aabfacb417d10,2025-02-12T19:15:20.880000
CVE-2025-21397,0,0,a7500ab2a246bb24c7f6147467f14845cb499ff96d8de9eb946a15acf67323e8,2025-02-14T17:38:29.007000
CVE-2025-21399,0,0,f94f6647dfbca1fa188350cabbc49dc6fa4498708cee05fd2499c6da322431d0,2025-01-31T02:15:37.700000
CVE-2025-21399,0,1,fdb3614139e0c94bbb2c1b0ec6ef458abd1b0f1068fd8bc112a3adb3acfb7db9,2025-03-04T15:15:28.007000
CVE-2025-21400,0,0,37ed4978ea5ff59167ade9649ace31aa58a0e6b82c1ee4595bd48b77955a1c26,2025-02-14T17:37:31.690000
CVE-2025-21401,0,0,e4d9e7c879800da1629474ad618445ce941bd3b909c5b2d4a6d10765a7fe87ae,2025-02-18T17:15:20.057000
CVE-2025-21402,0,0,50bdf907bfb2678b17fcbbcf222749ada785020f895cf01f5f957d6360757277,2025-01-27T18:34:23.127000
@ -281522,8 +281530,8 @@ CVE-2025-21620,0,0,aefab78f4e8b7a931e7536d08b17991e6afef83a4bc3ab5d14fb2e61be094
CVE-2025-21622,0,0,f9b304c8cae09855d048ff95696b50613640a9fdc9c30a5aadd5c3b3ce64c9b7,2025-01-07T18:15:21.703000
CVE-2025-21623,0,0,11a3a4b165ac7ea35d006622a2c31920fdd49ec8509c7c0bc152edfb3b703f1b,2025-01-07T17:15:32.313000
CVE-2025-21624,0,0,67d81661ccc165bcb7a2d55cd4301b8865debac4b78d0af97080ff58ad5f038c,2025-01-07T17:15:32.417000
CVE-2025-21626,0,1,e56409ce0f9770c9f60f64484e01c5dc141e09c125b689fb402783ce7def5acd,2025-03-04T13:49:18.880000
CVE-2025-21627,0,1,a64cbac625de75abb2fb97405740e09eb3c0493dfb277a167ddabd4e32a452ec,2025-03-04T13:49:18.880000
CVE-2025-21626,0,0,e56409ce0f9770c9f60f64484e01c5dc141e09c125b689fb402783ce7def5acd,2025-03-04T13:49:18.880000
CVE-2025-21627,0,0,a64cbac625de75abb2fb97405740e09eb3c0493dfb277a167ddabd4e32a452ec,2025-03-04T13:49:18.880000
CVE-2025-21628,0,0,0075ad45f4e081e6b1d4b87e45ccf38954b3b032c76d5db5fcb797ed5fc6213f,2025-01-09T18:15:30.070000
CVE-2025-21629,0,0,5bd27bb9a82cb5a5f09a5986e4163e86befaea4298f9b54578a62350a29978a7,2025-01-15T13:15:15.220000
CVE-2025-21630,0,0,b687cde38a98e756a80e569a98743dbd03093e3308ce5058c13044fa43b51e41,2025-01-17T09:15:08
@ -281760,9 +281768,9 @@ CVE-2025-22219,0,0,b49955fb2ad7bfd00b8dfa99078cc886448cbbcd0b573429971407c26bc29
CVE-2025-22220,0,0,a00b168f73aec469e4c78128ddc9ae91feb9fbb9ddcfb4c72ca05c1c287f029b,2025-02-06T14:15:30.510000
CVE-2025-22221,0,0,9ab8cb2916b1d2add27df50f24514c36d0740b88ba103377a1c3f59422214b6c,2025-01-30T16:15:31.257000
CVE-2025-22222,0,0,f96218f2ce820065976bcd4294c5a9c60e0f54f4e21cd14eff22d95b2b98eb7e,2025-01-30T16:15:31.367000
CVE-2025-22224,0,0,fd318e5fff77738843cc9b3d3e80d297f64943d387efb764d22c0ea672dc48d8,2025-03-04T12:15:33.687000
CVE-2025-22225,0,0,f4834648c2f6b2494eb42892bf6d82d8181e27a43ce98b17e9726398b9b9f312,2025-03-04T12:15:33.840000
CVE-2025-22226,0,0,d90adfb8715bb1e8dc631ffd086928d68c1066ee4e833d32035e4567da2000ca,2025-03-04T12:15:33.973000
CVE-2025-22224,0,1,e21bec5f866401de662166c9a38834c24983344adc02e4da91a31b9bd3dcd08f,2025-03-04T16:15:38.850000
CVE-2025-22225,0,1,958bcb03393c9157b6f9f2052f0e3673f3a8a9e289593bb7a83203a4421a58c4,2025-03-04T16:15:38.970000
CVE-2025-22226,0,1,a442f734f8505f20ee7da05274b2e61f3c862a1ce05fbeb66184989e568ab230,2025-03-04T16:15:39.097000
CVE-2025-22260,0,0,6bffdd50ff1b9a95889c1f9bea94c0f7f92eb9097aa6e2dd07529a5cbb0d5ce1,2025-02-03T15:15:17.503000
CVE-2025-22261,0,0,cabefa2bbb4850682fa8dc2dd04543561914d58490173d75f62166401d731c68,2025-02-26T15:15:24.877000
CVE-2025-22262,0,0,2a90436047a91b64c9791cff4f6c4190896e3e92637458d2d2ccf25cb4f8537c,2025-01-21T14:15:09.757000
@ -281865,7 +281873,7 @@ CVE-2025-22390,0,0,7d4cd529983da112f2a19a24b746418738cb2927e6e8de52b7de278b35e6a
CVE-2025-22394,0,0,74bb5d327b5fabc5afe5722acba49dd35fe0c1d26a691784f120eb1e4f911ff7,2025-02-04T15:51:11.187000
CVE-2025-22395,0,0,57c4b1d051c16506745f86a05c2206d0865c29f77486f620f2a0dfc5c8b5dd11,2025-02-04T15:49:52.617000
CVE-2025-22399,0,0,c37486f8439a24e18965df381b1fbd8facfe56e4e036c4d759697286660e2568,2025-02-11T17:15:34.453000
CVE-2025-22402,0,0,f76cbab41280a8de72b99de03f7ca0b8e04580815d7e99e01923e9b1697ba28c,2025-02-07T03:15:12.287000
CVE-2025-22402,0,1,18d8506db602a971c9b4f40c756b0b67ce8011a8d95adfb78fd6cdc6121fb772,2025-03-04T14:53:43.637000
CVE-2025-22443,0,0,1c071c52aacf8a22841389b33ab1759d8b0571488fd50df74383b3b5be8316b7,2025-03-04T04:15:14.097000
CVE-2025-22445,0,0,b624e4e02bffb5e86c49cb4f27a7947d07caad44049ae2738e6a5025f36e7b72,2025-01-09T07:15:28.617000
CVE-2025-22449,0,0,bbe6983ada373fe96f2acc3f2babe8a504c2fad76654b8fe6101ea89ee7b3f6f,2025-01-09T07:15:28.777000
@ -281974,7 +281982,7 @@ CVE-2025-22599,0,0,1679c6ac5484b7793289eabf6194cbd25427299caec44c6a27aa8b57d1a02
CVE-2025-22600,0,0,f110ec74413c49b371a01e714512d4c9c7c3871d9aa7d096e2f2f2161dd61f8a,2025-01-10T16:15:30.940000
CVE-2025-22601,0,0,e5a036684b4e6e1204af1b20135d30f3904e4c5af4a80eedecb01794128ea749,2025-02-04T21:15:27.800000
CVE-2025-22602,0,0,c8f7aea9374385130d2049dfea6e2ee228c262f087909008185d3a99dec96d21,2025-02-04T21:15:27.950000
CVE-2025-22604,0,0,f2e2f3e5714493a0587fb09fddd55f91c682225656d2d60d4b600d17f03f7fdd,2025-01-27T17:15:17.307000
CVE-2025-22604,0,1,e77b02e1f62ca8c90b9aef1da0c6c55d8a3e02e8a7f5ed82d610d0ba53646361,2025-03-04T14:45:17.807000
CVE-2025-22605,0,0,e020c4b8ee74d3a7b5ae92905dc162b067bc2ecec9d0c7b4511ad2cc05d6d46e,2025-01-24T15:15:12.330000
CVE-2025-22606,0,0,6897f6b106e13df92057dcf3df4b4ec47dbbfa122118bcfc3d42e2e512504801,2025-01-24T16:15:38.307000
CVE-2025-22607,0,0,7c0a771fa15c2fffda62d633c9927cd84470e8d10f639a2980e7fc8bdf835ab5,2025-01-24T16:15:38.470000
@ -282208,7 +282216,7 @@ CVE-2025-23019,0,0,d086114380d5b72aae48f2dd063fe423ce3274d7a5a6c9dc170a5da44914e
CVE-2025-23020,0,0,ddc02947f0b59a5de6e6a776839dec2cf08c84bac344560dd2b477015ae3c297,2025-02-20T03:15:12.630000
CVE-2025-23022,0,0,bb805305ea96825569d9891ea5d8911d64b95f766e73f0709e01ab6077884661,2025-01-16T21:12:15.537000
CVE-2025-23023,0,0,8d62189672cb787e5081908c4fe2e78759d3475dd1f1ecf661879211c3f1488e,2025-02-04T21:15:28.083000
CVE-2025-23024,0,1,bf0582042501ee44e59b14902a790c188cdc4c2dbc961793adbe006bb8c097af,2025-03-04T13:49:18.880000
CVE-2025-23024,0,0,bf0582042501ee44e59b14902a790c188cdc4c2dbc961793adbe006bb8c097af,2025-03-04T13:49:18.880000
CVE-2025-23025,0,0,a430643fad54c298ac56c82186034eeeea39626036838a2f98e7e7672f4b6ffd,2025-01-14T18:16:05.650000
CVE-2025-23026,0,0,b268119f7916ba3a282a082a7a4e3bccaa70c542061d608ad26e1251c19332fd,2025-01-13T21:15:15.897000
CVE-2025-23027,0,0,3d8a20e7f66f71ebfff4348388587603a6ab48265ca2628da8f07052fa639ed0,2025-01-13T20:15:30.150000
@ -282294,7 +282302,7 @@ CVE-2025-23202,0,0,9cc26d9043bb3e4108331025950b820420267c76da7ed157b3eb776235b83
CVE-2025-23205,0,0,d2ab035ca501b5eab7d4cddec3035fce30102ede9a29be2c285f726d29109cd9,2025-01-17T21:15:11.850000
CVE-2025-23206,0,0,b65a76f2ad595c398703f7f41c44ad516e76d2e163922a710fc577a54a9a2b5f,2025-01-17T21:15:12.003000
CVE-2025-23207,0,0,a61af6f2707ecd45627a7e7ca479f8fbbb333f7f551bc284878a54328b3225b8,2025-01-17T22:15:29.523000
CVE-2025-23208,0,0,0895c6a64980853d0ca71f84de6b0e100f054b96d041a45a6799d08d97b8f9cb,2025-01-17T23:15:13.107000
CVE-2025-23208,0,1,18e8dd4156ff7a971fcd6f122778478e5486080caeaf8f18c2797a06dc02b4cb,2025-03-04T14:45:17.807000
CVE-2025-23209,0,0,5039cc636732004b36d1abe67ffc1f35372cacab530b3970be9516a2d86f22df,2025-02-21T14:48:55.367000
CVE-2025-23210,0,0,65bcfc40caedf4e3c9e8b75bd933193b1248e3166d8ac42679477e8b6066d8bd,2025-02-03T22:15:28.187000
CVE-2025-23211,0,0,a8c3e1a20bc03b6063f45202fba6ba54e6ed0105c48d464f348071f492dc6770,2025-01-28T17:15:26.160000
@ -282321,6 +282329,7 @@ CVE-2025-23362,0,0,f1b04109bb5a53f0fa12693fb841988a838f82d29d11cab82e72412009724
CVE-2025-23363,0,0,9d847654d50480688aa91cb0e62a450466f9daa5cc4a3d346e469c34ce48abe5,2025-02-25T17:15:14.227000
CVE-2025-23366,0,0,19d3d492f06020aadbd27d64e622d5ed1c347260739b5074a05d263b32a748da,2025-01-14T18:16:06.290000
CVE-2025-23367,0,0,7754a5b5a7ef7b20fc4ec39ada85296b1a92f1ca2476a6564c884bf68763656c,2025-01-31T21:15:13.613000
CVE-2025-23368,1,1,339a5dd013648c18d8c9de4be6c08d751322dc82af6128b3b1fb673ee268d8de,2025-03-04T16:15:39.270000
CVE-2025-23369,0,0,74f04427c8261f575e3b46a10e2c572c85dddb2e090b01cedc0f322610f8f68b,2025-02-05T19:15:45.747000
CVE-2025-23374,0,0,dc7fc0938dfddbb9f9d96945d0cf484d16ace6397f0b6d455113dea4502470b2,2025-02-07T20:09:28.717000
CVE-2025-23385,0,0,44f68c3210fdb2f588e2b733b3276d4f924d74ac5df4660c1e28e1d2bd89eca2,2025-01-28T16:15:41.377000
@ -283530,14 +283539,14 @@ CVE-2025-25354,0,0,fd5fd687c6f8251390b2e5e3a768a6ab287fc80bafc324107405456de75d6
CVE-2025-25355,0,0,ec2a794520ae75d22fabcfb38a52ffaf9173963e387059ab2ce0d1d9b5964571,2025-02-14T20:15:37.053000
CVE-2025-25356,0,0,0eaa4c481eace739405e37ac8872e49e25549e9d6fd6ad7ae3b6c02ea89fec17,2025-02-14T19:38:41.850000
CVE-2025-25357,0,0,6ee1cd3a9f7f323b5c37547d52a4c5ca928da63fb7a31ff1e85142032c6e3241,2025-02-14T19:38:15.303000
CVE-2025-25379,0,0,738b03ca4625962dfa89966740701d4df3897a8e4af1f92e80e1cd49976c0c26,2025-02-28T23:15:10.790000
CVE-2025-25379,0,1,10c6b59b7ced1a65c44b725df73613b964204bd8bcc126008f75da9f2d8ec909,2025-03-04T16:15:39.433000
CVE-2025-25387,0,0,8227bd6f57bafc5fc7f8bddfd6ec6a78dcca117ca404c22469842eba5d4e306c,2025-02-14T17:15:20.393000
CVE-2025-25388,0,0,e086cda7e4e5c05ccba48ad30906fb7e59dedc66fc1b83e5645bd434397a431f,2025-02-13T20:15:49.730000
CVE-2025-25389,0,0,c4fa8037812de3d612838c95ec3fcc9b936e3b28bc2aa3e854f709efa62e78c8,2025-02-14T17:15:20.663000
CVE-2025-25428,0,0,7c9e8b5adbcec4172a435bc0445a832224ef2aaebd6fa92be1fbe29fc2ee9ecb,2025-02-28T19:15:36.773000
CVE-2025-25428,0,1,a4039c579030febd59545c017c3c1beb99a5f4778526e73f910acc016f0edd9b,2025-03-04T16:15:39.597000
CVE-2025-25429,0,0,cececf6fd4380f28dd3128e781fd11132f0c103fc594cfd9dd17f0a87d409fc9,2025-02-28T23:15:10.903000
CVE-2025-25430,0,0,94a67adc555362067a515c38cf02aeb84a8bd7c8fa8c3cd90b22df5262795fa8,2025-02-28T18:15:28.263000
CVE-2025-25431,0,0,226362430653b83ef54d39ec1534ee38f2c2c9ca36c02c59252ca3699e225ad2,2025-02-28T18:15:28.407000
CVE-2025-25430,0,1,9163efbf1f16deef9388edc5dfce8619e56506503048f018e2813a808e54d729,2025-03-04T16:15:39.763000
CVE-2025-25431,0,1,b394e7042bdaf0befa6d619f673ec987ef0e6b97c7a283213fbe60ffc2fa9133,2025-03-04T16:15:39.917000
CVE-2025-25460,0,0,82c83de72621855fac95e9c964cfbdf72c297a15a88fc1d2ee5a87f0355f72e3,2025-02-24T17:15:13.900000
CVE-2025-25461,0,0,abefcc4a87fcc99aefa917b36b82be2cf46ec09db32826ad12097cd2c52c8d9d,2025-02-28T16:15:39.387000
CVE-2025-25462,0,0,45409d13594a8c4887589ff11618b5896c12f0d1930079d72248394fe633117c,2025-02-26T16:15:16.933000
@ -283549,7 +283558,7 @@ CVE-2025-25472,0,0,6c6dc9c03a8c0408df3e1a9caeca7e0bfec3e9936d5584756b38960f4938d
CVE-2025-25473,0,0,e8e0a8342346bf2f32dfaaee95898f0b633608ccb1cba92ce43fca3dc31e73b1,2025-02-20T22:15:30.863000
CVE-2025-25474,0,0,664718fe11db0dbfa633cf91e2e531f31edde20febc7bcbbc6390ec05fbc4113,2025-02-20T22:15:31.027000
CVE-2025-25475,0,0,09278089065f0af1184c02f8490e15185f88eb53d92fb93aba844e1509b6e9c5,2025-02-20T22:15:31.190000
CVE-2025-25476,0,0,295ca2449e77c24dfd41b0e6988f848bd5ebe2b3b39dd8048ab6a39488795ccf,2025-02-28T23:15:11.063000
CVE-2025-25476,0,1,dcb05a63fbcff084bcf1c5df3723664abe2b9f2707596be8a1333f910233cd3b,2025-03-04T16:15:40.080000
CVE-2025-25477,0,0,394fe8fbdba802b7903f79579ee44bd6683941d582eaf8039e436a0431983458,2025-02-28T16:15:39.550000
CVE-2025-25478,0,0,12db196fdbdedfe1d57ae93bb18fa9d9c8691821fcbf897c2d62e811de8bb585,2025-02-28T23:15:11.170000
CVE-2025-25505,0,0,11c4c75af440f82d715defaf6782907c0744a464a1a91c9d9aeef14ada87484d,2025-02-21T21:15:23.723000
@ -283603,8 +283612,8 @@ CVE-2025-25743,0,0,65b470adc61c7865b16e040e95e97b019f65181411fb698ca491a4d95f9cd
CVE-2025-25744,0,0,a94e293e8b090a3f233edd8811f540b50467cbc536ca78f870a52d5731bb3874,2025-02-19T19:02:27.687000
CVE-2025-25745,0,0,6954ac06db222a2d53d510e8895c4f26dd1f1d917e56ca97169f9eb9f3840768,2025-02-14T16:15:37.010000
CVE-2025-25746,0,0,cbf058e2dc9833cb4adeac1d2f404166a61c0d96a6ad617dde3893fa4bf6a37d,2025-02-24T16:30:37.200000
CVE-2025-25759,0,0,b72901452c56894af5f21d8b6dd05a44d60e919231ddbb81928df2d768b4767b,2025-02-27T15:15:41.570000
CVE-2025-25760,0,0,b30f302a0d601a35cec14bf52c6cebe6fec99ba9512ba110eec0ce813dd117f2,2025-02-27T15:15:41.670000
CVE-2025-25759,0,1,293b850ebe0a274765acc91f23faade1c53b146b12bb218a57ca1cee0ac51835,2025-03-04T15:15:28.353000
CVE-2025-25760,0,1,963e7e75521960c9620a7affa1021c0ca484b511b623074b9cde550324014cef,2025-03-04T15:15:28.590000
CVE-2025-25761,0,0,3db442c19fbfc76e4afa4e4eacc9350d95fd28b1bf92eb230c9d214105e6b76b,2025-02-27T15:15:41.777000
CVE-2025-25765,0,0,4771a7e87c33cb6b1bf793f3b79e4f059f64eb7778711124d0e26c1a7b4b4033,2025-03-03T20:15:46.433000
CVE-2025-25766,0,0,f39b595117fd6ac0197008d13a65ac6ad37b800d031e5372f4209ffae8413b60,2025-03-03T20:15:46.600000
@ -283694,6 +283703,7 @@ CVE-2025-26308,0,0,69e4926ab121453dd269ecd5c4a1e680c76cfe3a7adc73ca0152c52aac5d4
CVE-2025-26309,0,0,7ae8d8b0652f85e6f8fa255fc222f026973cab38848f066168ff295eb6f4ee31,2025-02-21T18:16:13.790000
CVE-2025-26310,0,0,55b236dbeb9a20179e9b06fa335fdfa1062067456641081301fd898e499e9d2b,2025-02-21T18:16:17.950000
CVE-2025-26311,0,0,8f41ce6db700f92fea4726f2c9198369bec586ae5a386ba2dec789165ea39c8e,2025-02-20T21:15:25.907000
CVE-2025-26320,1,1,5fefe4585825870b6e42a706d5c6a8703dfe4775e609ed2f31b171f050d5485d,2025-03-04T16:15:40.240000
CVE-2025-26325,0,0,4eaa7da6a5e4d1e182731f1781ee5d725571c0a3ec63342fdfe0db1d2f4660fc,2025-02-28T22:15:39.927000
CVE-2025-26326,0,0,f84875e9cdda7cdf32b7a706b3dc63076bc4fd2668c6fb2df857dabcd399807f,2025-02-28T15:15:13.743000
CVE-2025-26339,0,0,7ef9dcda2637eaa8381f0c62a213393a7c2029d066112e960db3e0a470c75e63,2025-02-12T14:15:33.510000
@ -283865,7 +283875,7 @@ CVE-2025-26793,0,0,d30b44911459092c9e08ffe42552727cfd072bd06f4aa8564ac964446a27e
CVE-2025-26794,0,0,fe65001567301b62f9f70becffce46b16ab4f6e8292d604a049482502e1fc499,2025-02-22T01:15:10.670000
CVE-2025-26803,0,0,407dfdf36bb29c1169c55a1bdf56c2857dbd1f6059de4d7853e727c76548a45d,2025-02-28T16:07:41.847000
CVE-2025-26819,0,0,265b05b0b6b085ef27d0e218dd5a0f79b1864b8a6c0004a23e6fa9575a3cdbeb,2025-02-15T00:15:28.510000
CVE-2025-26849,0,0,54decf0050486d8bff18d33a6116f8f7ed807923bef5d3d8bf0649b9106ae882,2025-03-04T09:15:10.917000
CVE-2025-26849,0,1,b13951f979e617745ee5f8ac921a867df9f510109c7775edd0473f90fdd96dd7,2025-03-04T16:15:40.360000
CVE-2025-26856,0,0,7824298cfc11aa81d23219a23487dd842dd5c11d44f90723ef1786188c90cd64,2025-02-20T06:15:21.673000
CVE-2025-26868,0,0,cba4f0d0c27029718e2b50a126041299a77ea3636d837c9614e50e9855b0878b,2025-02-25T15:15:23.903000
CVE-2025-26871,0,0,ab850536250644e42a3ba5d883350c3eff02f87d1e660abd32733c03a6449348,2025-02-25T15:15:24.040000
@ -283959,6 +283969,7 @@ CVE-2025-27106,0,0,26fc58d1f4f645e7be82b82db6f2be52da1c463bb7a3665e75777e66b3edd
CVE-2025-27108,0,0,34d6d1e5e32f01741f013d8e11085ab9652369eb805ee793ac08ed811303f050,2025-02-27T20:18:12.583000
CVE-2025-27109,0,0,10c8f8672c8f3a12b915e1b3ec725c9d1ebfee260a221a5368748fc4851dc756,2025-02-24T17:15:14.850000
CVE-2025-27110,0,0,059d870c313e4a557107b6ae0082199b6395bbcf7d1ddc56d5ab6903b573b570,2025-02-28T13:35:22.340000
CVE-2025-27111,1,1,419c2555e4f7326575f860091396a7a260154f69ba392c4821f681c870261dce,2025-03-04T16:15:40.487000
CVE-2025-27112,0,0,ad3bd22bf68a43e9ef7354153af5bf27543e71ad253b691f1b313d10f702063d,2025-02-27T20:18:12.583000
CVE-2025-27113,0,0,1163a140c7451a5d3ce8342e9e475fc7cc692a5677dca273619df06c0d4a282d,2025-02-27T20:18:12.583000
CVE-2025-27133,0,0,bfde01faa06d9963c59eea543f4fa6168a24602a8639d07c356f8930ec6d4154,2025-02-28T16:07:41.847000
@ -284057,9 +284068,9 @@ CVE-2025-27420,0,0,9d526a7e533e1150de46ca6280cff846925c1fbe0c81b3eaf5526bd6ed1ef
CVE-2025-27421,0,0,c5f8cbb8f9ad5af14f93e4ff38fc97a2222c7110d039eea8083f6d3839df358a,2025-03-03T17:15:15.630000
CVE-2025-27422,0,0,bcd8a473455936a2a24238f0c36bf9a7c4201ca34fa1348e7e22e5b4114dc5b5,2025-03-03T17:15:15.787000
CVE-2025-27423,0,0,88e83c39a3504ab732d13ded688593dc0fb5c684cb5e5c6337b81425bc853482,2025-03-03T17:15:15.943000
CVE-2025-27424,1,1,cc2945756d56b37d88e982abae75015a79e227fff15d34182659ed65557d5d90,2025-03-04T14:15:39.397000
CVE-2025-27425,1,1,fbc4b3118251230ac7c7affcbb0b3e868553e04992c0c3515adecdf42212f11a,2025-03-04T14:15:39.493000
CVE-2025-27426,1,1,860f9cbbdf2d294154d869e5bfa7c5c461d73af2f1e84fe2ef0c26777f1a316e,2025-03-04T14:15:39.593000
CVE-2025-27424,0,1,30d0ccd4da8b3965ccdd64d75913c26c382be899b8dbaed2f7644ddd5e414706,2025-03-04T16:15:40.647000
CVE-2025-27425,0,1,43f7986422b72b569737fcbe0c2ca989629ae4db5bdd877f11b2c4de8f9e5339,2025-03-04T16:15:40.797000
CVE-2025-27426,0,1,3424a995371007e75834114eff317845d6ca8dec201ea4e5a46602f3aae7a610,2025-03-04T16:15:40.933000
CVE-2025-27498,0,0,5abce51fa5a892a16b00a0cc6ce6e1fd8dbe5c06f14b98e0dedb5a5e4ad38ec0,2025-03-03T17:15:16.443000
CVE-2025-27499,0,0,ab06e5a6a9e6a84d5061b8c89a502ae1ba119ec86416a651117e80b7694ffcba,2025-03-03T19:15:36.027000
CVE-2025-27500,0,0,be50dbcb64bc9b0e171440007ce7d77f7cd94b8b10aa18d6f6266491eec37f80,2025-03-03T19:15:36.157000

Can't render this file because it is too large.