mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-07 11:07:05 +00:00
Auto-Update: 2025-04-07T14:00:27.941453+00:00
This commit is contained in:
parent
7e2d548fc5
commit
449b33ff4a
@ -3,7 +3,7 @@
|
||||
"sourceIdentifier": "psirt@cisco.com",
|
||||
"published": "2023-01-20T07:15:14.490",
|
||||
"lastModified": "2025-03-12T17:15:38.057",
|
||||
"vulnStatus": "Modified",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -3,7 +3,7 @@
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2023-07-17T21:15:09.653",
|
||||
"lastModified": "2024-12-12T21:15:07.420",
|
||||
"vulnStatus": "Modified",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -3,7 +3,7 @@
|
||||
"sourceIdentifier": "security@synology.com",
|
||||
"published": "2024-06-04T10:15:12.747",
|
||||
"lastModified": "2025-03-04T18:43:31.607",
|
||||
"vulnStatus": "Analyzed",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
33
CVE-2025/CVE-2025-00xx/CVE-2025-0050.json
Normal file
33
CVE-2025/CVE-2025-00xx/CVE-2025-0050.json
Normal file
@ -0,0 +1,33 @@
|
||||
{
|
||||
"id": "CVE-2025-0050",
|
||||
"sourceIdentifier": "arm-security@arm.com",
|
||||
"published": "2025-04-07T12:15:15.360",
|
||||
"lastModified": "2025-04-07T12:15:15.360",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Arm Ltd Bifrost GPU Userspace Driver, Arm Ltd Valhall GPU Userspace Driver, Arm Ltd Arm 5th Gen GPU Architecture Userspace Driver allows a non-privileged user process to make valid GPU processing operations, including via WebGL or WebGPU, to access a limited amount outside of buffer bounds.This issue affects Bifrost GPU Userspace Driver: from r0p0 through r49p2, from r50p0 through r51p0; Valhall GPU Userspace Driver: from r19p0 through r49p2, from r50p0 through r53p0; Arm 5th Gen GPU Architecture Userspace Driver: from r41p0 through r49p2, from r50p0 through r53p0."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "arm-security@arm.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-119"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://developer.arm.com/documentation/110435/latest/",
|
||||
"source": "arm-security@arm.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -3,12 +3,16 @@
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-03-31T23:15:17.567",
|
||||
"lastModified": "2025-04-01T20:26:22.890",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A script imports issue was addressed with improved isolation. This issue is fixed in Safari 18.4, visionOS 2.4, iOS 18.4 and iPadOS 18.4, macOS Sequoia 15.4. Visiting a website may leak sensitive data."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se solucion\u00f3 un problema con la importaci\u00f3n de scripts mejorando el aislamiento. Este problema est\u00e1 corregido en Safari 18.4, visionOS 2.4, iOS 18.4, iPadOS 18.4 y macOS Sequoia 15.4. Visitar un sitio web puede filtrar datos confidenciales."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -3,12 +3,16 @@
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-03-31T23:15:17.703",
|
||||
"lastModified": "2025-04-01T20:26:22.890",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "This issue was addressed with improved authentication. This issue is fixed in iOS 18.4 and iPadOS 18.4. An attacker with a USB-C connection to an unlocked device may be able to programmatically access photos."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Este problema se solucion\u00f3 mejorando la autenticaci\u00f3n. Este problema se solucion\u00f3 en iOS 18.4 y iPadOS 18.4. Un atacante con una conexi\u00f3n USB-C a un dispositivo desbloqueado podr\u00eda acceder a las fotos mediante programaci\u00f3n."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -3,7 +3,7 @@
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-03-31T23:15:17.807",
|
||||
"lastModified": "2025-04-02T16:17:41.203",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -3,12 +3,16 @@
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-03-31T23:15:17.903",
|
||||
"lastModified": "2025-04-01T20:26:22.890",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An integer overflow was addressed with improved input validation. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. A user may be able to elevate privileges."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se solucion\u00f3 un desbordamiento de enteros mejorando la validaci\u00f3n de entrada. Este problema se solucion\u00f3 en macOS Ventura 13.7.5, macOS Sequoia 15.4 y macOS Sonoma 14.7.5. Es posible que un usuario pueda elevar privilegios."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -3,12 +3,16 @@
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-03-31T23:15:18.007",
|
||||
"lastModified": "2025-04-01T21:15:42.420",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A type confusion issue was addressed with improved memory handling. This issue is fixed in macOS Sequoia 15.4, macOS Sonoma 14.7.5. An attacker with user privileges may be able to read kernel memory."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se solucion\u00f3 un problema de confusi\u00f3n de tipos mejorando la gesti\u00f3n de memoria. Este problema se solucion\u00f3 en macOS Sequoia 15.4 y macOS Sonoma 14.7.5. Un atacante con privilegios de usuario podr\u00eda leer la memoria del kernel."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -3,12 +3,16 @@
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-03-31T23:15:18.103",
|
||||
"lastModified": "2025-04-01T20:26:22.890",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "This issue was addressed by restricting options offered on a locked device. This issue is fixed in macOS Ventura 13.7.5, iOS 18.4 and iPadOS 18.4, iPadOS 17.7.6, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An attacker with physical access may be able to use Siri to access sensitive user data."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Este problema se solucion\u00f3 restringiendo las opciones disponibles en un dispositivo bloqueado. Este problema se solucion\u00f3 en macOS Ventura 13.7.5, iOS 18.4 y iPadOS 18.4, iPadOS 17.7.6, macOS Sequoia 15.4 y macOS Sonoma 14.7.5. Un atacante con acceso f\u00edsico podr\u00eda usar Siri para acceder a datos confidenciales del usuario."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -3,12 +3,16 @@
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-03-31T23:15:18.193",
|
||||
"lastModified": "2025-04-01T20:26:22.890",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An uncontrolled format string issue was addressed with improved input validation. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An app may be able to cause a denial-of-service."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se solucion\u00f3 un problema de formato no controlado con una validaci\u00f3n de entrada mejorada. Este problema se solucion\u00f3 en macOS Ventura 13.7.5, macOS Sequoia 15.4 y macOS Sonoma 14.7.5. Una aplicaci\u00f3n podr\u00eda causar una denegaci\u00f3n de servicio."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -3,12 +3,16 @@
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-03-31T23:15:18.293",
|
||||
"lastModified": "2025-04-01T20:26:22.890",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A logging issue was addressed with improved data redaction. This issue is fixed in iOS 18.4 and iPadOS 18.4, macOS Sequoia 15.4. An app may be able to access sensitive user data."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se solucion\u00f3 un problema de registro mejorando la redacci\u00f3n de datos. Este problema se solucion\u00f3 en iOS 18.4, iPadOS 18.4 y macOS Sequoia 15.4. Una aplicaci\u00f3n podr\u00eda acceder a datos confidenciales del usuario."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -3,12 +3,16 @@
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-03-31T23:15:18.383",
|
||||
"lastModified": "2025-04-01T20:26:22.890",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The issue was addressed with improved checks. This issue is fixed in macOS Ventura 13.7.5, iPadOS 17.7.6, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An app may be able to modify protected parts of the file system."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El problema se solucion\u00f3 mejorando las comprobaciones. Este problema est\u00e1 corregido en macOS Ventura 13.7.5, iPadOS 17.7.6, macOS Sequoia 15.4 y macOS Sonoma 14.7.5. Una aplicaci\u00f3n podr\u00eda modificar partes protegidas del sistema de archivos."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -3,7 +3,7 @@
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-03-31T23:15:18.580",
|
||||
"lastModified": "2025-04-02T16:17:41.380",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -3,12 +3,16 @@
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-03-31T23:15:18.680",
|
||||
"lastModified": "2025-04-01T21:15:42.580",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A permissions issue was addressed with additional restrictions. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An app may be able to enable iCloud storage features without user consent."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se solucion\u00f3 un problema de permisos con restricciones adicionales. Este problema est\u00e1 corregido en macOS Ventura 13.7.5, macOS Sequoia 15.4 y macOS Sonoma 14.7.5. Es posible que una aplicaci\u00f3n pueda habilitar funciones de almacenamiento de iCloud sin el consentimiento del usuario."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -3,12 +3,16 @@
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-03-31T23:15:18.773",
|
||||
"lastModified": "2025-04-01T21:15:42.757",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A permissions issue was addressed with additional restrictions. This issue is fixed in Safari 18.4, iOS 18.4 and iPadOS 18.4. Loading a malicious iframe may lead to a cross-site scripting attack."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se solucion\u00f3 un problema de permisos con restricciones adicionales. Este problema est\u00e1 corregido en Safari 18.4, iOS 18.4 y iPadOS 18.4. Cargar un iframe malicioso puede provocar un ataque de cross-site scripting."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -3,12 +3,16 @@
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-03-31T23:15:18.870",
|
||||
"lastModified": "2025-04-01T20:26:22.890",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A buffer overflow issue was addressed with improved memory handling. This issue is fixed in tvOS 18.4, Safari 18.4, iPadOS 17.7.6, iOS 18.4 and iPadOS 18.4, macOS Sequoia 15.4. Processing maliciously crafted web content may lead to an unexpected process crash."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se solucion\u00f3 un problema de desbordamiento de b\u00fafer mejorando la gesti\u00f3n de memoria. Este problema se solucion\u00f3 en tvOS 18.4, Safari 18.4, iPadOS 17.7.6, iOS 18.4 y iPadOS 18.4, y macOS Sequoia 15.4. El procesamiento de contenido web malintencionado puede provocar un bloqueo inesperado del proceso."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -3,12 +3,16 @@
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-03-31T23:15:18.963",
|
||||
"lastModified": "2025-04-01T20:26:22.890",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A logic error was addressed with improved error handling. This issue is fixed in visionOS 2.4, macOS Ventura 13.7.5, tvOS 18.4, iPadOS 17.7.6, iOS 18.4 and iPadOS 18.4, macOS Sequoia 15.4, macOS Sonoma 14.7.5. Parsing an image may lead to disclosure of user information."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se solucion\u00f3 un error l\u00f3gico mejorando la gesti\u00f3n de errores. Este problema se solucion\u00f3 en visionOS 2.4, macOS Ventura 13.7.5, tvOS 18.4, iPadOS 17.7.6, iOS 18.4 y iPadOS 18.4, macOS Sequoia 15.4 y macOS Sonoma 14.7.5. El an\u00e1lisis de una imagen puede provocar la divulgaci\u00f3n de informaci\u00f3n del usuario."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -3,12 +3,16 @@
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-03-31T23:15:19.087",
|
||||
"lastModified": "2025-04-01T21:15:42.897",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "This issue was addressed with improved memory handling. This issue is fixed in visionOS 2.4, macOS Ventura 13.7.5, tvOS 18.4, iPadOS 17.7.6, iOS 18.4 and iPadOS 18.4, macOS Sequoia 15.4, macOS Sonoma 14.7.5. Processing a maliciously crafted video file may lead to unexpected app termination or corrupt process memory."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Este problema se solucion\u00f3 mejorando la gesti\u00f3n de la memoria. Este problema se solucion\u00f3 en visionOS 2.4, macOS Ventura 13.7.5, tvOS 18.4, iPadOS 17.7.6, iOS 18.4 y iPadOS 18.4, macOS Sequoia 15.4 y macOS Sonoma 14.7.5. Procesar un archivo de v\u00eddeo manipulado con fines maliciosos puede provocar el cierre inesperado de la aplicaci\u00f3n o la corrupci\u00f3n de la memoria del proceso."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -3,7 +3,7 @@
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-03-31T23:15:19.203",
|
||||
"lastModified": "2025-04-02T14:16:04.270",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -3,7 +3,7 @@
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-03-31T23:15:19.300",
|
||||
"lastModified": "2025-04-03T18:15:44.770",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -3,12 +3,16 @@
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-03-31T23:15:19.400",
|
||||
"lastModified": "2025-04-01T20:26:22.890",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A privacy issue was addressed by not logging contents of text fields. This issue is fixed in visionOS 2.4, iOS 18.4 and iPadOS 18.4, tvOS 18.4, macOS Sequoia 15.4. An app may be able to access sensitive user data."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se solucion\u00f3 un problema de privacidad al no registrar el contenido de los campos de texto. Este problema se solucion\u00f3 en visionOS 2.4, iOS 18.4, iPadOS 18.4, tvOS 18.4 y macOS Sequoia 15.4. Una aplicaci\u00f3n podr\u00eda acceder a datos confidenciales del usuario."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -3,12 +3,16 @@
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-03-31T23:15:19.490",
|
||||
"lastModified": "2025-04-01T20:26:22.890",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The issue was addressed with improved checks. This issue is fixed in macOS Ventura 13.7.5, iPadOS 17.7.6, macOS Sequoia 15.4, macOS Sonoma 14.7.5. A malicious app may be able to access private information."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El problema se solucion\u00f3 mejorando las comprobaciones. Este problema est\u00e1 corregido en macOS Ventura 13.7.5, iPadOS 17.7.6, macOS Sequoia 15.4 y macOS Sonoma 14.7.5. Una aplicaci\u00f3n maliciosa podr\u00eda acceder a informaci\u00f3n privada."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -3,7 +3,7 @@
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-03-31T23:15:19.593",
|
||||
"lastModified": "2025-04-03T21:15:39.373",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -3,12 +3,16 @@
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-03-31T23:15:19.697",
|
||||
"lastModified": "2025-04-01T20:26:22.890",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "This issue was addressed with improved redaction of sensitive information. This issue is fixed in iOS 18.4 and iPadOS 18.4, tvOS 18.4, macOS Sequoia 15.4. An app may be able to access sensitive user data."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Este problema se solucion\u00f3 mejorando la redacci\u00f3n de informaci\u00f3n confidencial. Este problema est\u00e1 corregido en iOS 18.4, iPadOS 18.4, tvOS 18.4 y macOS Sequoia 15.4. Una aplicaci\u00f3n podr\u00eda acceder a datos confidenciales del usuario."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -3,12 +3,16 @@
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-03-31T23:15:19.793",
|
||||
"lastModified": "2025-04-01T20:26:22.890",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A privacy issue was addressed with improved private data redaction for log entries. This issue is fixed in macOS Sequoia 15.4. An app may be able to access information about a user's contacts."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se solucion\u00f3 un problema de privacidad mejorando la redacci\u00f3n de datos privados en las entradas del registro. Este problema se solucion\u00f3 en macOS Sequoia 15.4. Una aplicaci\u00f3n podr\u00eda acceder a la informaci\u00f3n de los contactos de un usuario."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -3,12 +3,16 @@
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-03-31T23:15:19.893",
|
||||
"lastModified": "2025-04-02T14:16:04.507",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "This issue was addressed with improved data access restriction. This issue is fixed in visionOS 2.4, iOS 18.4 and iPadOS 18.4, iPadOS 17.7.6. Sensitive keychain data may be accessible from an iOS backup."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Este problema se solucion\u00f3 mejorando la restricci\u00f3n de acceso a datos. Este problema se solucion\u00f3 en visionOS 2.4, iOS 18.4, iPadOS 18.4 y iPadOS 17.7.6. Es posible acceder a datos confidenciales del llavero desde una copia de seguridad de iOS."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -3,12 +3,16 @@
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-03-31T23:15:20.080",
|
||||
"lastModified": "2025-04-01T20:26:22.890",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A buffer overflow issue was addressed with improved memory handling. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An app may be able to execute arbitrary code with kernel privileges."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se solucion\u00f3 un problema de desbordamiento de b\u00fafer mejorando la gesti\u00f3n de memoria. Este problema se solucion\u00f3 en macOS Ventura 13.7.5, macOS Sequoia 15.4 y macOS Sonoma 14.7.5. Una aplicaci\u00f3n podr\u00eda ejecutar c\u00f3digo arbitrario con privilegios de kernel."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -3,12 +3,16 @@
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-03-31T23:15:20.180",
|
||||
"lastModified": "2025-04-01T20:26:22.890",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A logic issue was addressed with improved checks. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. A sandboxed app may be able to access sensitive user data."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se solucion\u00f3 un problema l\u00f3gico mejorando las comprobaciones. Este problema se solucion\u00f3 en macOS Ventura 13.7.5, macOS Sequoia 15.4 y macOS Sonoma 14.7.5. Una aplicaci\u00f3n en un entorno aislado podr\u00eda acceder a datos confidenciales del usuario."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -3,12 +3,16 @@
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-03-31T23:15:20.770",
|
||||
"lastModified": "2025-04-01T20:26:22.890",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A memory initialization issue was addressed with improved memory handling. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. A remote attacker may be able to cause unexpected app termination or heap corruption."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se solucion\u00f3 un problema de inicializaci\u00f3n de memoria mejorando su gesti\u00f3n. Este problema se solucion\u00f3 en macOS Ventura 13.7.5, macOS Sequoia 15.4 y macOS Sonoma 14.7.5. Un atacante remoto podr\u00eda provocar la finalizaci\u00f3n inesperada de la aplicaci\u00f3n o la corrupci\u00f3n del mont\u00f3n."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -3,7 +3,7 @@
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-03-31T23:15:21.620",
|
||||
"lastModified": "2025-04-02T16:17:41.717",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -3,12 +3,16 @@
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-03-31T23:15:21.820",
|
||||
"lastModified": "2025-04-01T21:15:43.040",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An injection issue was addressed with improved validation. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An app may be able to access user-sensitive data."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se solucion\u00f3 un problema de inyecci\u00f3n mejorando la validaci\u00f3n. Este problema se solucion\u00f3 en macOS Ventura 13.7.5, macOS Sequoia 15.4 y macOS Sonoma 14.7.5. Una aplicaci\u00f3n podr\u00eda acceder a datos confidenciales del usuario."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -3,12 +3,16 @@
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-03-31T23:15:21.917",
|
||||
"lastModified": "2025-04-01T20:26:22.890",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A type confusion issue was addressed with improved checks. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An attacker may be able to cause unexpected app termination."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se solucion\u00f3 un problema de confusi\u00f3n de tipos mejorando las comprobaciones. Este problema se solucion\u00f3 en macOS Ventura 13.7.5, macOS Sequoia 15.4 y macOS Sonoma 14.7.5. Un atacante podr\u00eda provocar el cierre inesperado de la aplicaci\u00f3n."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -3,12 +3,16 @@
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-03-31T23:15:22.090",
|
||||
"lastModified": "2025-04-01T21:15:43.183",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A permissions issue was addressed with additional sandbox restrictions. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An app may be able to check the existence of an arbitrary path on the file system."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se solucion\u00f3 un problema de permisos con restricciones de la sandbox adicionales.. Este problema se solucion\u00f3 en macOS Ventura 13.7.5, macOS Sequoia 15.4 y macOS Sonoma 14.7.5. Una aplicaci\u00f3n podr\u00eda comprobar la existencia de una ruta arbitraria en el sistema de archivos."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -3,12 +3,16 @@
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-03-31T23:15:22.187",
|
||||
"lastModified": "2025-04-01T21:15:43.330",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "This issue was addressed with improved access restrictions. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. A malicious app acting as a HTTPS proxy could get access to sensitive user data."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Este problema se solucion\u00f3 mejorando las restricciones de acceso. Este problema est\u00e1 corregido en macOS Ventura 13.7.5, macOS Sequoia 15.4 y macOS Sonoma 14.7.5. Una aplicaci\u00f3n maliciosa que act\u00fae como proxy HTTPS podr\u00eda acceder a datos confidenciales del usuario."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -3,12 +3,16 @@
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-03-31T23:15:22.283",
|
||||
"lastModified": "2025-04-01T20:26:22.890",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "This issue was addressed with improved handling of symlinks. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An app may be able to access protected user data."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Este problema se solucion\u00f3 mejorando la gesti\u00f3n de enlaces simb\u00f3licos. Este problema est\u00e1 corregido en macOS Ventura 13.7.5, macOS Sequoia 15.4 y macOS Sonoma 14.7.5. Una aplicaci\u00f3n podr\u00eda acceder a datos protegidos del usuario."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -3,12 +3,16 @@
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-03-31T23:15:22.380",
|
||||
"lastModified": "2025-04-01T20:26:22.890",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "This issue was addressed with improved validation of symlinks. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. A user may be able to elevate privileges."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Este problema se solucion\u00f3 mejorando la validaci\u00f3n de enlaces simb\u00f3licos. Este problema est\u00e1 corregido en macOS Ventura 13.7.5, macOS Sequoia 15.4 y macOS Sonoma 14.7.5. Es posible que un usuario pueda elevar privilegios."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -3,12 +3,16 @@
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-03-31T23:15:22.477",
|
||||
"lastModified": "2025-04-01T20:26:22.890",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A file access issue was addressed with improved input validation. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An app may be able to break out of its sandbox."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se solucion\u00f3 un problema de acceso a archivos mejorando la validaci\u00f3n de entrada. Este problema se solucion\u00f3 en macOS Ventura 13.7.5, macOS Sequoia 15.4 y macOS Sonoma 14.7.5. Es posible que una aplicaci\u00f3n pueda salir de su zona de pruebas."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -3,12 +3,16 @@
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-03-31T23:15:22.570",
|
||||
"lastModified": "2025-04-01T20:26:22.890",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The issue was addressed with improved bounds checks. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An app may be able to disclose kernel memory."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El problema se solucion\u00f3 mejorando las comprobaciones de los l\u00edmites. Este problema est\u00e1 corregido en macOS Ventura 13.7.5, macOS Sequoia 15.4 y macOS Sonoma 14.7.5. Una aplicaci\u00f3n podr\u00eda revelar memoria del kernel."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -3,7 +3,7 @@
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-03-31T23:15:22.673",
|
||||
"lastModified": "2025-04-03T14:15:31.043",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -3,12 +3,16 @@
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-03-31T23:15:22.820",
|
||||
"lastModified": "2025-04-01T20:26:22.890",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "This issue was addressed with additional entitlement checks. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An app may be able to retrieve Safari bookmarks without an entitlement check."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Este problema se solucion\u00f3 con comprobaciones de derechos adicionales. Este problema est\u00e1 corregido en macOS Ventura 13.7.5, macOS Sequoia 15.4 y macOS Sonoma 14.7.5. Es posible que una aplicaci\u00f3n pueda recuperar marcadores de Safari sin una comprobaci\u00f3n de derechos."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -3,12 +3,16 @@
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-03-31T23:15:22.960",
|
||||
"lastModified": "2025-04-01T20:26:22.890",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The issue was addressed with improved memory handling. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An attacker in a privileged position may be able to perform a denial-of-service."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El problema se solucion\u00f3 mejorando la gesti\u00f3n de la memoria. Este problema est\u00e1 corregido en macOS Ventura 13.7.5, macOS Sequoia 15.4 y macOS Sonoma 14.7.5. Un atacante con privilegios podr\u00eda realizar una denegaci\u00f3n de servicio."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -3,7 +3,7 @@
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-03-31T23:15:23.060",
|
||||
"lastModified": "2025-04-02T16:17:41.877",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -3,12 +3,16 @@
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-03-31T23:15:23.807",
|
||||
"lastModified": "2025-04-01T20:26:22.890",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The issue was addressed with improved checks. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An app may be able to modify protected parts of the file system."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El problema se solucion\u00f3 mejorando las comprobaciones. Este problema est\u00e1 corregido en macOS Ventura 13.7.5, macOS Sequoia 15.4 y macOS Sonoma 14.7.5. Una aplicaci\u00f3n podr\u00eda modificar partes protegidas del sistema de archivos."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -3,12 +3,16 @@
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-03-31T23:15:23.910",
|
||||
"lastModified": "2025-04-01T20:26:22.890",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An app may be able to cause unexpected system termination or corrupt kernel memory."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se solucion\u00f3 un problema de escritura fuera de los l\u00edmites mejorando la comprobaci\u00f3n de los l\u00edmites. Este problema se solucion\u00f3 en macOS Ventura 13.7.5, macOS Sequoia 15.4 y macOS Sonoma 14.7.5. Una aplicaci\u00f3n podr\u00eda provocar la finalizaci\u00f3n inesperada del sistema o da\u00f1ar la memoria del kernel."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -3,7 +3,7 @@
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-03-31T23:15:24.003",
|
||||
"lastModified": "2025-04-02T16:17:42.060",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -3,7 +3,7 @@
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-03-31T23:15:25.887",
|
||||
"lastModified": "2025-04-02T16:17:42.927",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -3,12 +3,16 @@
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-03-31T23:15:25.987",
|
||||
"lastModified": "2025-04-01T20:26:22.890",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The issue was addressed with improved checks. This issue is fixed in visionOS 2.4, iOS 18.4 and iPadOS 18.4, macOS Sequoia 15.4. An attacker with physical access to a locked device may be able to view sensitive user information."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El problema se solucion\u00f3 mejorando las comprobaciones. Este problema se solucion\u00f3 en visionOS 2.4, iOS 18.4 y iPadOS 18.4, y macOS Sequoia 15.4. Un atacante con acceso f\u00edsico a un dispositivo bloqueado podr\u00eda acceder a informaci\u00f3n confidencial del usuario."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -3,12 +3,16 @@
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-03-31T23:15:26.173",
|
||||
"lastModified": "2025-04-01T20:26:22.890",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A privacy issue was addressed by removing the vulnerable code. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An app may be able to access user-sensitive data."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se solucion\u00f3 un problema de privacidad eliminando el c\u00f3digo vulnerable. Este problema est\u00e1 corregido en macOS Ventura 13.7.5, macOS Sequoia 15.4 y macOS Sonoma 14.7.5. Una aplicaci\u00f3n podr\u00eda acceder a datos confidenciales del usuario."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -3,12 +3,16 @@
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-03-31T23:15:26.260",
|
||||
"lastModified": "2025-04-02T14:16:13.203",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A race condition was addressed with improved locking. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. Mounting a maliciously crafted SMB network share may lead to system termination."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se solucion\u00f3 una condici\u00f3n de ejecuci\u00f3n mejorando el bloqueo. Este problema se solucion\u00f3 en macOS Ventura 13.7.5, macOS Sequoia 15.4 y macOS Sonoma 14.7.5. Montar un recurso compartido de red SMB manipulado con fines maliciosos puede provocar la interrupci\u00f3n del sistema."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -3,12 +3,16 @@
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-03-31T23:15:26.360",
|
||||
"lastModified": "2025-04-01T20:26:22.890",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A permissions issue was addressed with additional restrictions. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. A malicious app with root privileges may be able to modify the contents of system files."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se solucion\u00f3 un problema de permisos con restricciones adicionales. Este problema se solucion\u00f3 en macOS Ventura 13.7.5, macOS Sequoia 15.4 y macOS Sonoma 14.7.5. Una aplicaci\u00f3n maliciosa con privilegios de root podr\u00eda modificar el contenido de los archivos del sistema."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -3,12 +3,16 @@
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-03-31T23:15:26.450",
|
||||
"lastModified": "2025-04-01T20:26:22.890",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The issue was resolved by sanitizing logging This issue is fixed in visionOS 2.4, macOS Ventura 13.7.5, tvOS 18.4, iPadOS 17.7.6, iOS 18.4 and iPadOS 18.4, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An app may be able to access sensitive user data."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El problema se resolvi\u00f3 depurando el registro. Este problema est\u00e1 corregido en visionOS 2.4, macOS Ventura 13.7.5, tvOS 18.4, iPadOS 17.7.6, iOS 18.4 y iPadOS 18.4, macOS Sequoia 15.4 y macOS Sonoma 14.7.5. Una aplicaci\u00f3n podr\u00eda acceder a datos confidenciales del usuario."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -3,7 +3,7 @@
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-03-31T23:15:26.553",
|
||||
"lastModified": "2025-04-03T18:15:45.357",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -3,12 +3,16 @@
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-03-31T23:15:26.643",
|
||||
"lastModified": "2025-04-01T20:26:22.890",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "This issue was addressed with improved validation of symlinks. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An app may be able to access sensitive user data."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Este problema se solucion\u00f3 mejorando la validaci\u00f3n de enlaces simb\u00f3licos. Este problema est\u00e1 corregido en macOS Ventura 13.7.5, macOS Sequoia 15.4 y macOS Sonoma 14.7.5. Una aplicaci\u00f3n podr\u00eda acceder a datos confidenciales del usuario."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -3,12 +3,16 @@
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-03-31T23:15:26.830",
|
||||
"lastModified": "2025-04-02T14:16:13.400",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The issue was addressed with improved checks. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An input validation issue was addressed."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El problema se solucion\u00f3 mejorando las comprobaciones. Este problema est\u00e1 corregido en macOS Ventura 13.7.5, macOS Sequoia 15.4 y macOS Sonoma 14.7.5. Se solucion\u00f3 un problema de validaci\u00f3n de entrada."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -3,12 +3,16 @@
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-03-31T23:15:26.930",
|
||||
"lastModified": "2025-04-01T20:26:11.547",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A path handling issue was addressed with improved validation. This issue is fixed in macOS Sonoma 14.7.5, iOS 18.4 and iPadOS 18.4, tvOS 18.4, macOS Sequoia 15.4. A malicious app may be able to access private information."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se solucion\u00f3 un problema de gesti\u00f3n de rutas mejorando la validaci\u00f3n. Este problema se solucion\u00f3 en macOS Sonoma 14.7.5, iOS 18.4 y iPadOS 18.4, tvOS 18.4 y macOS Sequoia 15.4. Una aplicaci\u00f3n maliciosa podr\u00eda acceder a informaci\u00f3n privada."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -3,12 +3,16 @@
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-03-31T23:15:27.033",
|
||||
"lastModified": "2025-04-01T20:26:11.547",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The issue was addressed with improved checks. This issue is fixed in macOS Sequoia 15.4, macOS Sonoma 14.7.5. A malicious app may be able to access private information."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El problema se solucion\u00f3 mejorando las comprobaciones. Este problema est\u00e1 corregido en macOS Sequoia 15.4 y macOS Sonoma 14.7.5. Una aplicaci\u00f3n maliciosa podr\u00eda acceder a informaci\u00f3n privada."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -9,6 +9,10 @@
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "JavaScript code running while transforming a document with the XSLTProcessor could lead to a use-after-free. This vulnerability affects Firefox < 137, Firefox ESR < 115.22, Firefox ESR < 128.9, Thunderbird < 137, and Thunderbird < 128.9."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "La ejecuci\u00f3n de c\u00f3digo JavaScript al transformar un documento con XSLTProcessor podr\u00eda provocar un use-after-free. Esta vulnerabilidad afecta a Firefox < 137, Firefox ESR < 115.22, Firefox ESR < 128.9, Thunderbird < 137 y Thunderbird < 128.9."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -9,6 +9,10 @@
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A crafted URL containing specific Unicode characters could have hidden the true origin of the page, resulting in a potential spoofing attack. This vulnerability affects Firefox < 137, Firefox ESR < 128.9, Thunderbird < 137, and Thunderbird < 128.9."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Una URL manipulada que contiene caracteres Unicode espec\u00edficos podr\u00eda haber ocultado el verdadero origen de la p\u00e1gina, lo que podr\u00eda dar lugar a un ataque de suplantaci\u00f3n de identidad. Esta vulnerabilidad afecta a Firefox < 137, Firefox ESR < 128.9, Thunderbird < 137 y Thunderbird < 128.9."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -9,6 +9,10 @@
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Memory safety bugs present in Firefox 136, Thunderbird 136, Firefox ESR 128.8, and Thunderbird 128.8. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 137, Firefox ESR < 128.9, Thunderbird < 137, and Thunderbird < 128.9."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Errores de seguridad de memoria presentes en Firefox 136, Thunderbird 136, Firefox ESR 128.8 y Thunderbird 128.8. Algunos de estos errores mostraron evidencia de corrupci\u00f3n de memoria y presumimos que, con suficiente esfuerzo, algunos de ellos podr\u00edan haberse explotado para ejecutar c\u00f3digo arbitrario. Esta vulnerabilidad afecta a Firefox < 137, Firefox ESR < 128.9, Thunderbird < 137 y Thunderbird < 128.9."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -9,6 +9,10 @@
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An attacker could read 32 bits of values spilled onto the stack in a JIT compiled function. This vulnerability affects Firefox < 137 and Thunderbird < 137."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Un atacante podr\u00eda leer 32 bits de valores vertidos en la pila en una funci\u00f3n compilada JIT. Esta vulnerabilidad afecta a Firefox (versi\u00f3n anterior a la 137) y Thunderbird (versi\u00f3n anterior a la 137)."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -9,6 +9,10 @@
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Leaking of file descriptors from the fork server to web content processes could allow for privilege escalation attacks. This vulnerability affects Firefox < 137 and Thunderbird < 137."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "La filtraci\u00f3n de descriptores de archivos del servidor de bifurcaci\u00f3n a los procesos de contenido web podr\u00eda permitir ataques de escalada de privilegios. Esta vulnerabilidad afecta a Firefox (versi\u00f3n anterior a la 137) y Thunderbird (versi\u00f3n anterior a la 137)."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -9,6 +9,10 @@
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "After selecting a malicious Windows `.url` shortcut from the local filesystem, an unexpected file could be uploaded. \n*This bug only affects Firefox on Windows. Other operating systems are unaffected.* This vulnerability affects Firefox < 137 and Thunderbird < 137."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Tras seleccionar un acceso directo malicioso de Windows `.url` desde el sistema de archivos local, podr\u00eda cargarse un archivo inesperado. *Este error solo afecta a Firefox en Windows. Otros sistemas operativos no se ven afectados.* Esta vulnerabilidad afecta a Firefox (versi\u00f3n anterior a la 137) y Thunderbird (versi\u00f3n anterior a la 137)."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -3,12 +3,16 @@
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2025-04-02T01:15:37.873",
|
||||
"lastModified": "2025-04-02T14:58:07.527",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Use after free in Navigations in Google Chrome prior to 135.0.7049.52 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El use-after-free en las navegaciones de Google Chrome anteriores a la versi\u00f3n 135.0.7049.52 permit\u00eda a un atacante remoto explotar la corrupci\u00f3n del mont\u00f3n mediante una p\u00e1gina HTML manipulada. (Gravedad de seguridad de Chromium: Alta)"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -3,7 +3,7 @@
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2025-04-02T01:15:38.093",
|
||||
"lastModified": "2025-04-03T14:15:44.400",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -3,7 +3,7 @@
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2025-04-02T01:15:38.187",
|
||||
"lastModified": "2025-04-03T14:15:44.560",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -3,7 +3,7 @@
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2025-04-02T01:15:38.283",
|
||||
"lastModified": "2025-04-03T18:15:48.053",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -3,7 +3,7 @@
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-03-31T23:15:29.230",
|
||||
"lastModified": "2025-04-03T21:15:40.627",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
145
CVE-2025/CVE-2025-33xx/CVE-2025-3350.json
Normal file
145
CVE-2025/CVE-2025-33xx/CVE-2025-3350.json
Normal file
@ -0,0 +1,145 @@
|
||||
{
|
||||
"id": "CVE-2025-3350",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-04-07T12:15:16.100",
|
||||
"lastModified": "2025-04-07T12:15:16.100",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability, which was classified as critical, was found in PHPGurukul Old Age Home Management System 1.0. Affected is an unknown function of the file /admin/view-enquiry.php. The manipulation of the argument viewid leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 6.9,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "LOW",
|
||||
"vulnIntegrityImpact": "LOW",
|
||||
"vulnAvailabilityImpact": "LOW",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||||
"baseScore": 7.3,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||||
"baseScore": 7.5,
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "NONE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL"
|
||||
},
|
||||
"baseSeverity": "HIGH",
|
||||
"exploitabilityScore": 10.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-74"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/n0name-yang/myCVE/issues/1",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://phpgurukul.com/",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.303564",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.303564",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.552051",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
145
CVE-2025/CVE-2025-33xx/CVE-2025-3351.json
Normal file
145
CVE-2025/CVE-2025-33xx/CVE-2025-3351.json
Normal file
@ -0,0 +1,145 @@
|
||||
{
|
||||
"id": "CVE-2025-3351",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-04-07T12:15:16.380",
|
||||
"lastModified": "2025-04-07T12:15:16.380",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability has been found in PHPGurukul Old Age Home Management System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /admin/login.php. The manipulation of the argument Username leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 6.9,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "LOW",
|
||||
"vulnIntegrityImpact": "LOW",
|
||||
"vulnAvailabilityImpact": "LOW",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||||
"baseScore": 7.3,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||||
"baseScore": 7.5,
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "NONE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL"
|
||||
},
|
||||
"baseSeverity": "HIGH",
|
||||
"exploitabilityScore": 10.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-74"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/n0name-yang/myCVE/issues/2",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://phpgurukul.com/",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.303565",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.303565",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.552130",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
145
CVE-2025/CVE-2025-33xx/CVE-2025-3352.json
Normal file
145
CVE-2025/CVE-2025-33xx/CVE-2025-3352.json
Normal file
@ -0,0 +1,145 @@
|
||||
{
|
||||
"id": "CVE-2025-3352",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-04-07T13:15:42.643",
|
||||
"lastModified": "2025-04-07T13:15:42.643",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in PHPGurukul Old Age Home Management System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /admin/edit-scdetails.php. The manipulation of the argument contnum leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 6.9,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "LOW",
|
||||
"vulnIntegrityImpact": "LOW",
|
||||
"vulnAvailabilityImpact": "LOW",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||||
"baseScore": 7.3,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||||
"baseScore": 7.5,
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "NONE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL"
|
||||
},
|
||||
"baseSeverity": "HIGH",
|
||||
"exploitabilityScore": 10.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-74"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/n0name-yang/myCVE/issues/3",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://phpgurukul.com/",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.303566",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.303566",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.552171",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
145
CVE-2025/CVE-2025-33xx/CVE-2025-3353.json
Normal file
145
CVE-2025/CVE-2025-33xx/CVE-2025-3353.json
Normal file
@ -0,0 +1,145 @@
|
||||
{
|
||||
"id": "CVE-2025-3353",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-04-07T13:15:43.313",
|
||||
"lastModified": "2025-04-07T13:15:43.313",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in PHPGurukul Men Salon Management System 1.0. It has been classified as critical. This affects an unknown part of the file /admin/add-services.php. The manipulation of the argument cost leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 6.9,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "LOW",
|
||||
"vulnIntegrityImpact": "LOW",
|
||||
"vulnAvailabilityImpact": "LOW",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||||
"baseScore": 7.3,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||||
"baseScore": 7.5,
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "NONE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL"
|
||||
},
|
||||
"baseSeverity": "HIGH",
|
||||
"exploitabilityScore": 10.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-74"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/LaneyYu/cve/issues/3",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://phpgurukul.com/",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.303567",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.303567",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.552239",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2025/CVE-2025-33xx/CVE-2025-3359.json
Normal file
60
CVE-2025/CVE-2025-33xx/CVE-2025-3359.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2025-3359",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2025-04-07T13:15:43.510",
|
||||
"lastModified": "2025-04-07T13:15:43.510",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A flaw was found in GNUPlot. A segmentation fault via IO_str_init_static_internal may jeopardize the environment."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "secalert@redhat.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 6.2,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.5,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "secalert@redhat.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-754"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2025-3359",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2357749",
|
||||
"source": "secalert@redhat.com"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2025/CVE-2025-33xx/CVE-2025-3360.json
Normal file
60
CVE-2025/CVE-2025-33xx/CVE-2025-3360.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2025-3360",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2025-04-07T13:15:43.687",
|
||||
"lastModified": "2025-04-07T13:15:43.687",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A flaw was found in GLib. An integer overflow and buffer under-read occur when parsing a long invalid ISO 8601 timestamp with the g_date_time_new_from_iso8601() function."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "secalert@redhat.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
|
||||
"baseScore": 3.7,
|
||||
"baseSeverity": "LOW",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "secalert@redhat.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-190"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2025-3360",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2357754",
|
||||
"source": "secalert@redhat.com"
|
||||
}
|
||||
]
|
||||
}
|
67
README.md
67
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2025-04-07T12:00:26.598863+00:00
|
||||
2025-04-07T14:00:27.941453+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2025-04-07T11:15:53.807000+00:00
|
||||
2025-04-07T13:15:43.687000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,44 +33,51 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
288831
|
||||
288838
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `38`
|
||||
Recently added CVEs: `7`
|
||||
|
||||
- [CVE-2024-45557](CVE-2024/CVE-2024-455xx/CVE-2024-45557.json) (`2025-04-07T11:15:50.020`)
|
||||
- [CVE-2024-49848](CVE-2024/CVE-2024-498xx/CVE-2024-49848.json) (`2025-04-07T11:15:50.183`)
|
||||
- [CVE-2025-21421](CVE-2025/CVE-2025-214xx/CVE-2025-21421.json) (`2025-04-07T11:15:50.360`)
|
||||
- [CVE-2025-21423](CVE-2025/CVE-2025-214xx/CVE-2025-21423.json) (`2025-04-07T11:15:50.533`)
|
||||
- [CVE-2025-21425](CVE-2025/CVE-2025-214xx/CVE-2025-21425.json) (`2025-04-07T11:15:50.697`)
|
||||
- [CVE-2025-21428](CVE-2025/CVE-2025-214xx/CVE-2025-21428.json) (`2025-04-07T11:15:50.870`)
|
||||
- [CVE-2025-21429](CVE-2025/CVE-2025-214xx/CVE-2025-21429.json) (`2025-04-07T11:15:51.047`)
|
||||
- [CVE-2025-21430](CVE-2025/CVE-2025-214xx/CVE-2025-21430.json) (`2025-04-07T11:15:51.220`)
|
||||
- [CVE-2025-21431](CVE-2025/CVE-2025-214xx/CVE-2025-21431.json) (`2025-04-07T11:15:51.440`)
|
||||
- [CVE-2025-21434](CVE-2025/CVE-2025-214xx/CVE-2025-21434.json) (`2025-04-07T11:15:51.600`)
|
||||
- [CVE-2025-21435](CVE-2025/CVE-2025-214xx/CVE-2025-21435.json) (`2025-04-07T11:15:51.783`)
|
||||
- [CVE-2025-21436](CVE-2025/CVE-2025-214xx/CVE-2025-21436.json) (`2025-04-07T11:15:51.970`)
|
||||
- [CVE-2025-21437](CVE-2025/CVE-2025-214xx/CVE-2025-21437.json) (`2025-04-07T11:15:52.123`)
|
||||
- [CVE-2025-21438](CVE-2025/CVE-2025-214xx/CVE-2025-21438.json) (`2025-04-07T11:15:52.290`)
|
||||
- [CVE-2025-21439](CVE-2025/CVE-2025-214xx/CVE-2025-21439.json) (`2025-04-07T11:15:52.457`)
|
||||
- [CVE-2025-21440](CVE-2025/CVE-2025-214xx/CVE-2025-21440.json) (`2025-04-07T11:15:52.613`)
|
||||
- [CVE-2025-21441](CVE-2025/CVE-2025-214xx/CVE-2025-21441.json) (`2025-04-07T11:15:52.777`)
|
||||
- [CVE-2025-21442](CVE-2025/CVE-2025-214xx/CVE-2025-21442.json) (`2025-04-07T11:15:52.933`)
|
||||
- [CVE-2025-21443](CVE-2025/CVE-2025-214xx/CVE-2025-21443.json) (`2025-04-07T11:15:53.087`)
|
||||
- [CVE-2025-21447](CVE-2025/CVE-2025-214xx/CVE-2025-21447.json) (`2025-04-07T11:15:53.243`)
|
||||
- [CVE-2025-21448](CVE-2025/CVE-2025-214xx/CVE-2025-21448.json) (`2025-04-07T11:15:53.397`)
|
||||
- [CVE-2025-3346](CVE-2025/CVE-2025-33xx/CVE-2025-3346.json) (`2025-04-07T10:15:15.153`)
|
||||
- [CVE-2025-3347](CVE-2025/CVE-2025-33xx/CVE-2025-3347.json) (`2025-04-07T10:15:16.700`)
|
||||
- [CVE-2025-3348](CVE-2025/CVE-2025-33xx/CVE-2025-3348.json) (`2025-04-07T11:15:53.607`)
|
||||
- [CVE-2025-3349](CVE-2025/CVE-2025-33xx/CVE-2025-3349.json) (`2025-04-07T11:15:53.807`)
|
||||
- [CVE-2025-0050](CVE-2025/CVE-2025-00xx/CVE-2025-0050.json) (`2025-04-07T12:15:15.360`)
|
||||
- [CVE-2025-3350](CVE-2025/CVE-2025-33xx/CVE-2025-3350.json) (`2025-04-07T12:15:16.100`)
|
||||
- [CVE-2025-3351](CVE-2025/CVE-2025-33xx/CVE-2025-3351.json) (`2025-04-07T12:15:16.380`)
|
||||
- [CVE-2025-3352](CVE-2025/CVE-2025-33xx/CVE-2025-3352.json) (`2025-04-07T13:15:42.643`)
|
||||
- [CVE-2025-3353](CVE-2025/CVE-2025-33xx/CVE-2025-3353.json) (`2025-04-07T13:15:43.313`)
|
||||
- [CVE-2025-3359](CVE-2025/CVE-2025-33xx/CVE-2025-3359.json) (`2025-04-07T13:15:43.510`)
|
||||
- [CVE-2025-3360](CVE-2025/CVE-2025-33xx/CVE-2025-3360.json) (`2025-04-07T13:15:43.687`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `0`
|
||||
Recently modified CVEs: `67`
|
||||
|
||||
- [CVE-2025-24272](CVE-2025/CVE-2025-242xx/CVE-2025-24272.json) (`2025-04-01T20:26:22.890`)
|
||||
- [CVE-2025-24273](CVE-2025/CVE-2025-242xx/CVE-2025-24273.json) (`2025-04-01T20:26:22.890`)
|
||||
- [CVE-2025-24276](CVE-2025/CVE-2025-242xx/CVE-2025-24276.json) (`2025-04-02T16:17:42.060`)
|
||||
- [CVE-2025-3028](CVE-2025/CVE-2025-30xx/CVE-2025-3028.json) (`2025-04-02T07:15:42.047`)
|
||||
- [CVE-2025-3029](CVE-2025/CVE-2025-30xx/CVE-2025-3029.json) (`2025-04-02T07:15:42.240`)
|
||||
- [CVE-2025-3030](CVE-2025/CVE-2025-30xx/CVE-2025-3030.json) (`2025-04-02T07:15:42.400`)
|
||||
- [CVE-2025-3031](CVE-2025/CVE-2025-30xx/CVE-2025-3031.json) (`2025-04-01T20:26:11.547`)
|
||||
- [CVE-2025-3032](CVE-2025/CVE-2025-30xx/CVE-2025-3032.json) (`2025-04-01T20:26:11.547`)
|
||||
- [CVE-2025-3033](CVE-2025/CVE-2025-30xx/CVE-2025-3033.json) (`2025-04-01T20:26:11.547`)
|
||||
- [CVE-2025-30438](CVE-2025/CVE-2025-304xx/CVE-2025-30438.json) (`2025-04-02T16:17:42.927`)
|
||||
- [CVE-2025-30439](CVE-2025/CVE-2025-304xx/CVE-2025-30439.json) (`2025-04-01T20:26:22.890`)
|
||||
- [CVE-2025-30443](CVE-2025/CVE-2025-304xx/CVE-2025-30443.json) (`2025-04-01T20:26:22.890`)
|
||||
- [CVE-2025-30444](CVE-2025/CVE-2025-304xx/CVE-2025-30444.json) (`2025-04-02T14:16:13.203`)
|
||||
- [CVE-2025-30446](CVE-2025/CVE-2025-304xx/CVE-2025-30446.json) (`2025-04-01T20:26:22.890`)
|
||||
- [CVE-2025-30447](CVE-2025/CVE-2025-304xx/CVE-2025-30447.json) (`2025-04-01T20:26:22.890`)
|
||||
- [CVE-2025-30449](CVE-2025/CVE-2025-304xx/CVE-2025-30449.json) (`2025-04-03T18:15:45.357`)
|
||||
- [CVE-2025-30450](CVE-2025/CVE-2025-304xx/CVE-2025-30450.json) (`2025-04-01T20:26:22.890`)
|
||||
- [CVE-2025-30452](CVE-2025/CVE-2025-304xx/CVE-2025-30452.json) (`2025-04-02T14:16:13.400`)
|
||||
- [CVE-2025-30454](CVE-2025/CVE-2025-304xx/CVE-2025-30454.json) (`2025-04-01T20:26:11.547`)
|
||||
- [CVE-2025-30455](CVE-2025/CVE-2025-304xx/CVE-2025-30455.json) (`2025-04-01T20:26:11.547`)
|
||||
- [CVE-2025-3066](CVE-2025/CVE-2025-30xx/CVE-2025-3066.json) (`2025-04-02T14:58:07.527`)
|
||||
- [CVE-2025-3068](CVE-2025/CVE-2025-30xx/CVE-2025-3068.json) (`2025-04-03T14:15:44.400`)
|
||||
- [CVE-2025-3069](CVE-2025/CVE-2025-30xx/CVE-2025-3069.json) (`2025-04-03T14:15:44.560`)
|
||||
- [CVE-2025-3070](CVE-2025/CVE-2025-30xx/CVE-2025-3070.json) (`2025-04-03T18:15:48.053`)
|
||||
- [CVE-2025-31192](CVE-2025/CVE-2025-311xx/CVE-2025-31192.json) (`2025-04-03T21:15:40.627`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
217
_state.csv
217
_state.csv
@ -215958,7 +215958,7 @@ CVE-2023-20021,0,0,6a2ead76fe3b5fece57fab974d3dca57ab9246b1314eab0aca14a39bca71f
|
||||
CVE-2023-20022,0,0,d267e0083fa8403d8442c1bf3ac09340316446610d4d9e217c496ffce4b54016,2024-11-21T07:40:22.303000
|
||||
CVE-2023-20023,0,0,95a83439fbba19b6c21fbdc0ee9b15f3bc03f36ffb8301951be300882be1433a,2024-11-21T07:40:22.423000
|
||||
CVE-2023-20024,0,0,aa588e3440809485fc0865169fec554102a73a44873c6d779aa0ba291a537e5a,2024-11-21T07:40:22.540000
|
||||
CVE-2023-20025,0,0,7b708217288967d1f049583a0ad1765fc1005217df4064d5a16a8ec9b6f695b3,2025-03-12T17:15:38.057000
|
||||
CVE-2023-20025,0,1,4104603099ef1c5aedbec6932919518c007b1230bf8b0c2eac697a6975ce6a23,2025-03-12T17:15:38.057000
|
||||
CVE-2023-20026,0,0,272df819d8802e4491b01fa5debaff60c45bbda833969382da3ea7ac9da6879a,2025-03-12T17:15:38.390000
|
||||
CVE-2023-20027,0,0,643e4bd75b063b0079399886a3cd15f103694e59618950e3fd9d839bb6b1e293,2024-11-21T07:40:23.213000
|
||||
CVE-2023-20028,0,0,8e75e4e2dea98ed8067b7183e305b57df6b136b6188b420e71399619665060df,2024-11-21T07:40:23.390000
|
||||
@ -229724,7 +229724,7 @@ CVE-2023-37261,0,0,0239f7b5360086a6d5bc0e4bbc33e050f686758daf9d69a5a7063701324cc
|
||||
CVE-2023-37262,0,0,6d3b52f2eb1b40d52ae791a848feb328ff228ebb60f1fc4a76188e241b5b927c,2024-11-21T08:11:20.197000
|
||||
CVE-2023-37263,0,0,c815ae44858c527a06287982052d6180bed851f52d34cfd67a6498874f228f57,2024-11-21T08:11:20.737000
|
||||
CVE-2023-37264,0,0,aaa6fff09681995d412b88925e6417eb3bab56465dfce9dc5a493e556c4c596d,2024-11-21T08:11:20.890000
|
||||
CVE-2023-37265,0,0,1d3cf2dc629f4d59c7a9fc5db58856dbc5bc762c8a713a96e3c97543e695785f,2024-12-12T21:15:07.420000
|
||||
CVE-2023-37265,0,1,f9b476d8ebbccff55574c5079322c589fb6466a8f3b2522e58ce544fc738da59,2024-12-12T21:15:07.420000
|
||||
CVE-2023-37266,0,0,60e1eb97fa2dab45ec4d14f6b5a8d8aa62950dcc6baed85afc6d096e93e94d2f,2024-12-12T21:15:07.550000
|
||||
CVE-2023-37267,0,0,e8b2b8f21ed54d8265017da786122811bfa578be8da741f117061f9ac2c0c3f6,2024-11-21T08:11:21.350000
|
||||
CVE-2023-37268,0,0,8251e774de8aa0dd28ebf2412c57bee6323818051c9af992b22ef6110dfa4739,2024-11-21T08:11:21.493000
|
||||
@ -259155,7 +259155,7 @@ CVE-2024-33054,0,0,eb35959fe5046cee87f0e8375744b9b7bc2ba82e7db4c375d7ced8537946b
|
||||
CVE-2024-33055,0,0,7c9e78356ea47dcbc89353ee30ccd5e6cfb6bfa32a09ff7878bb6085bcfa6ee7,2025-01-10T17:01:45.937000
|
||||
CVE-2024-33056,0,0,0b7f547ee3c89f47ebb165988f3996dbfd5d0b368f985cca939e232e93a6befa,2024-12-12T15:25:15.440000
|
||||
CVE-2024-33057,0,0,1c92c61ecb7a8765b124d1e703614674040ea44a90e7d048beb7b1c44c6de717,2024-09-04T17:06:24.843000
|
||||
CVE-2024-33058,1,1,71119cf68c85528a945accff14afb3102a2a739e3f9dfc46b23d1bcb9e44a841,2025-04-07T11:15:47.723000
|
||||
CVE-2024-33058,0,0,71119cf68c85528a945accff14afb3102a2a739e3f9dfc46b23d1bcb9e44a841,2025-04-07T11:15:47.723000
|
||||
CVE-2024-33059,0,0,b9157366e9b41bb8006e58246e65f5bdeba75ea2269f83b299649471535ea483,2025-01-10T16:53:02.590000
|
||||
CVE-2024-3306,0,0,b1314b7809f51d374a0b9fae0657d8eb066c2cd2b31a15a930e406526126c0e9,2024-09-19T14:43:51.830000
|
||||
CVE-2024-33060,0,0,d63fb9907aa3cb0bc7501efbfaa4a069641c9b88fabbf41becf835cca562c14e,2024-09-04T17:06:08.407000
|
||||
@ -266747,7 +266747,7 @@ CVE-2024-43040,0,0,24c7fc00bcabba765361dc058df000d90f1495a06d1cc7d23caabc1efe8ac
|
||||
CVE-2024-43042,0,0,7a4652f9042c3f41111ed646c3bc80b0acd0b77a5c21df60dcb23d137df071e0,2025-03-19T21:15:36.690000
|
||||
CVE-2024-43044,0,0,c4209c28206f9930924ad89b590b0214e2b8c592601a3113522972c0c3512431,2025-03-14T20:15:13.470000
|
||||
CVE-2024-43045,0,0,e1d9d7cac2404f2fa69e6a0d5951f7e836ae37782e145990d14492651417b2da,2025-03-25T17:16:05.413000
|
||||
CVE-2024-43046,1,1,59b30c6c64f67b276c4a2380c7f308ef28e8710bde99a9f0bd16d8bc31c6b77c,2025-04-07T11:15:47.930000
|
||||
CVE-2024-43046,0,0,59b30c6c64f67b276c4a2380c7f308ef28e8710bde99a9f0bd16d8bc31c6b77c,2025-04-07T11:15:47.930000
|
||||
CVE-2024-43047,0,0,2c5673a0391a31abbf47c1d000c3d121e6564230b66ed0524b815e5850f22723,2024-10-09T14:39:06.540000
|
||||
CVE-2024-43048,0,0,aa462510e6501f1c68792d4463cb05868dde51c2c7f830d9a1911363c50be659,2024-12-12T15:27:48.080000
|
||||
CVE-2024-43049,0,0,396d2f1d473f42654eb07e32ffbaf51737e64004525269d29bf446d276b04cfd,2024-12-12T15:28:13.420000
|
||||
@ -266759,7 +266759,7 @@ CVE-2024-43053,0,0,557eafb2a972c600f8cd1195cb2a7ab112336dd759ccf7035648b847cc40a
|
||||
CVE-2024-43055,0,0,7e68211c963d2ff760c24658730a611fc46626d88b11ffcade7ed8bb42df2da0,2025-03-06T21:10:26.277000
|
||||
CVE-2024-43056,0,0,c709d99a9c57195719219014d58cf5e642c2b7965166d3a5f70846b24eb1e019,2025-03-06T17:45:19.570000
|
||||
CVE-2024-43057,0,0,5538ac0e54d78c3c5f43cc7d8d3e67e9f64cfefd871834bfb39f91c51faf6afc,2025-03-06T17:45:06.040000
|
||||
CVE-2024-43058,1,1,735ec971d35e89f052ab970fc6b9410dd77f15f69ff7e74154d75377c7d41085,2025-04-07T11:15:48.127000
|
||||
CVE-2024-43058,0,0,735ec971d35e89f052ab970fc6b9410dd77f15f69ff7e74154d75377c7d41085,2025-04-07T11:15:48.127000
|
||||
CVE-2024-43059,0,0,d22b29979bbbb30378d68440ca3150b1ca88ccf70d8d61f49a1a1b7c0bcabc6c,2025-03-06T17:44:58.433000
|
||||
CVE-2024-4306,0,0,a9d1ef0236802bb22bfceddb930f35a94054088f067df2c4e92b7fc4f2d8e7ec,2024-11-21T09:42:35.350000
|
||||
CVE-2024-43060,0,0,e41eb30c9c993454ca734a3f293648983ebcd9ebaa7031f549a74814e1ef3eef,2025-03-06T17:44:50.600000
|
||||
@ -266767,9 +266767,9 @@ CVE-2024-43061,0,0,fb182e78e0995c70b127000883dbbc7ed4ab09a8eb85c1eb852bc4e1d3c9a
|
||||
CVE-2024-43062,0,0,36f03b47d147510dd25f7b8f8bf05b284295e8006754a49f54a555f3c2ad2fa0,2025-03-06T17:44:32.433000
|
||||
CVE-2024-43063,0,0,8753ed6cced2789acaf67947f81e20495a0bebb4d20a1a7648ba9c44702bfc30,2025-01-10T15:37:33.340000
|
||||
CVE-2024-43064,0,0,3bca3804c5d22727d53d3aebc24210f9425875c9c0a366159e62b07b6f538d51,2025-01-13T21:50:35.483000
|
||||
CVE-2024-43065,1,1,8a8e9a6f5aed60bb35bd1b4708dcbddc60300b20e976adf7717d20edbc33bf5e,2025-04-07T11:15:48.287000
|
||||
CVE-2024-43066,1,1,5ab52e69593d91b751dde043cd6e5a03f5a70b514c1b17f24fba0a1cc3eda39f,2025-04-07T11:15:48.460000
|
||||
CVE-2024-43067,1,1,b51e194079dd7f17fb75e6e0c5219b5959b4264ff60415b573e57b69f234f8d6,2025-04-07T11:15:48.637000
|
||||
CVE-2024-43065,0,0,8a8e9a6f5aed60bb35bd1b4708dcbddc60300b20e976adf7717d20edbc33bf5e,2025-04-07T11:15:48.287000
|
||||
CVE-2024-43066,0,0,5ab52e69593d91b751dde043cd6e5a03f5a70b514c1b17f24fba0a1cc3eda39f,2025-04-07T11:15:48.460000
|
||||
CVE-2024-43067,0,0,b51e194079dd7f17fb75e6e0c5219b5959b4264ff60415b573e57b69f234f8d6,2025-04-07T11:15:48.637000
|
||||
CVE-2024-4307,0,0,e22b3a2ddde6a1bbbef551e8119df90fb59ea5e219b25194ed74d47d12720593,2024-11-21T09:42:35.467000
|
||||
CVE-2024-43077,0,0,436199c7bc78c426e053544ac533eb5f0842ec0f88a5221b5654c71a46ceb900,2025-01-03T22:15:07.360000
|
||||
CVE-2024-4308,0,0,0e250664b04e28b54467b76d750ca3dcd8282c1064f64a7674928da95814f098,2024-11-21T09:42:35.590000
|
||||
@ -268748,23 +268748,23 @@ CVE-2024-45528,0,0,2b62a46ad6721df273bf579b352dfc41d4b63f87803bbdffe8980da05bd0c
|
||||
CVE-2024-4553,0,0,fb93ea8b9b15d40065d6ae14704246d0707e85e61c82926c0504e92275e39cb7,2025-01-24T14:42:56.390000
|
||||
CVE-2024-45537,0,0,e4991fccb3abdc03f0d41abc273d14fb886e4c1626430be204dd2dbbe1a63e8d,2025-03-14T15:15:42.430000
|
||||
CVE-2024-4554,0,0,29103eb4d0b8fc6eb1c1a81b44a6bbfd0c979fea9590f8c8dd85408f98483465,2024-09-19T18:15:10.433000
|
||||
CVE-2024-45540,1,1,3b439f2cae01051944a5f696ba0864d4b974ea9419a29927960f84dc28dac98f,2025-04-07T11:15:48.793000
|
||||
CVE-2024-45540,0,0,3b439f2cae01051944a5f696ba0864d4b974ea9419a29927960f84dc28dac98f,2025-04-07T11:15:48.793000
|
||||
CVE-2024-45541,0,0,7bc24c44f4f9bd7697d862f7d910f24b6bebcc62d1e5328093c22ff5b5ee1516,2025-01-13T21:50:41.947000
|
||||
CVE-2024-45542,0,0,544927305ba1aba828ea865286fa34c1bb838eb7cbfd7cf386021b4578f770cc,2025-01-13T21:50:54.197000
|
||||
CVE-2024-45543,1,1,c29c7521755eac6af60510beeb533ba6a2036a2da32296b0560ae29df7bcd769,2025-04-07T11:15:48.967000
|
||||
CVE-2024-45544,1,1,7b53fc2454d632c88af471d3574c34886813f32f6c5d7fbb04c218143e5c64f7,2025-04-07T11:15:49.127000
|
||||
CVE-2024-45543,0,0,c29c7521755eac6af60510beeb533ba6a2036a2da32296b0560ae29df7bcd769,2025-04-07T11:15:48.967000
|
||||
CVE-2024-45544,0,0,7b53fc2454d632c88af471d3574c34886813f32f6c5d7fbb04c218143e5c64f7,2025-04-07T11:15:49.127000
|
||||
CVE-2024-45546,0,0,45d0e78965279e2527d9fac31d804a2ad5a6404ea1571336157308334b299190,2025-01-13T21:50:47.413000
|
||||
CVE-2024-45547,0,0,5d512f519ac50af5c2d2303fdbfb1d0aab0102e735aa75e851d06b0043ee4734,2025-01-13T21:51:01.123000
|
||||
CVE-2024-45548,0,0,1ab6b9cb5f94b9efb2c033a1ed336c76093923588ef73962d79be6376d1d64da,2025-01-13T21:51:07.337000
|
||||
CVE-2024-45549,1,1,9543b5d3c84677b26e6fb03ce6d4bfd3aa3981c087c588eb5469b3575d86f837,2025-04-07T11:15:49.290000
|
||||
CVE-2024-45549,0,0,9543b5d3c84677b26e6fb03ce6d4bfd3aa3981c087c588eb5469b3575d86f837,2025-04-07T11:15:49.290000
|
||||
CVE-2024-4555,0,0,42addb69d2a25e76680bd75ca9680f4458507a72790c92c0c02ea27cb2860a95,2024-09-12T15:13:25.520000
|
||||
CVE-2024-45550,0,0,a4972bc0de06d20bcb20a737d9e8c081db8380caa2905028e2db10cf8468771f,2025-01-13T21:51:13.887000
|
||||
CVE-2024-45551,1,1,489aee46175586f4c3c953ec980854a62174a10c0dfeafd975924b9b6e655877,2025-04-07T11:15:49.477000
|
||||
CVE-2024-45552,1,1,ab21c33debc8771ecc50f95617730e4c42273119d7248351f4a415d045eed3bc,2025-04-07T11:15:49.667000
|
||||
CVE-2024-45551,0,0,489aee46175586f4c3c953ec980854a62174a10c0dfeafd975924b9b6e655877,2025-04-07T11:15:49.477000
|
||||
CVE-2024-45552,0,0,ab21c33debc8771ecc50f95617730e4c42273119d7248351f4a415d045eed3bc,2025-04-07T11:15:49.667000
|
||||
CVE-2024-45553,0,0,7fc1115fcc4cbae9ef381abdf5e17528d41d4f9e9e105e72ca41b105ea39f881,2025-01-13T21:51:19.557000
|
||||
CVE-2024-45555,0,0,37d9964aa5a5598b86f51c3b20f7264cb39cb234f7fce44f158d3bfa241e58c9,2025-01-13T21:51:26.350000
|
||||
CVE-2024-45556,1,1,159ebb5ae7d033cfedf9c37f95e869e48a0ebaa761a6000559109fa6fd1dcde0,2025-04-07T11:15:49.850000
|
||||
CVE-2024-45557,1,1,660ba3f7864485f44611fa0c53c94be6fa35313fdb3bfa34922044ec2431fb96,2025-04-07T11:15:50.020000
|
||||
CVE-2024-45556,0,0,159ebb5ae7d033cfedf9c37f95e869e48a0ebaa761a6000559109fa6fd1dcde0,2025-04-07T11:15:49.850000
|
||||
CVE-2024-45557,0,0,660ba3f7864485f44611fa0c53c94be6fa35313fdb3bfa34922044ec2431fb96,2025-04-07T11:15:50.020000
|
||||
CVE-2024-45558,0,0,b9999ea78a1f11bf4fc1fe70871249484c10ee1e56b900705f3a520779ba736c,2025-01-13T21:26:05.320000
|
||||
CVE-2024-45559,0,0,cc245f066c5b0f42456e436b7037643fb918a30c87be08fac8ad402ca0ee763c,2025-01-13T21:26:24.027000
|
||||
CVE-2024-4556,0,0,d3c0d9c7da9d7922d293ea55522a02a915493dd034ff9fc52c8d9c8976cd2d90,2024-09-12T15:09:55.107000
|
||||
@ -271741,7 +271741,7 @@ CVE-2024-49839,0,0,e4adae2e6a6fd99d4a1ef07f5bb8c358f7fb67c7e6ba84888990afb4dab67
|
||||
CVE-2024-4984,0,0,40ebe34593a184b2b9329b2374e9578e3a0bebaa278e1231c45c34e446e4dc36,2024-11-21T09:44:00.193000
|
||||
CVE-2024-49840,0,0,052415f7244c1013f825344c4809807def2c067feeabb1b1cf5faec319fcef68,2025-02-05T16:02:18.927000
|
||||
CVE-2024-49843,0,0,9b68fa5c3475ce67325f4140b70e30137faf7f9305d06abaad2366991e2a645e,2025-02-05T16:02:11.837000
|
||||
CVE-2024-49848,1,1,c8ad58059fa2b91169cc99a0c4b77bbe3e2b3d4ddf4fc7c0525d59410b443ea4,2025-04-07T11:15:50.183000
|
||||
CVE-2024-49848,0,0,c8ad58059fa2b91169cc99a0c4b77bbe3e2b3d4ddf4fc7c0525d59410b443ea4,2025-04-07T11:15:50.183000
|
||||
CVE-2024-49849,0,0,4c197046e42110980b5301c4c35d8eb0ed58e6313d8c00bfbed7bed4a77a071a,2024-12-10T14:30:44.780000
|
||||
CVE-2024-4985,0,0,fc8c0365ee2b64c353c64b1a67bd27d7de7a0e1e77bbc681619c3fe31e9edf60,2024-11-21T09:44:00.330000
|
||||
CVE-2024-49850,0,0,b081475e1ca3af47ff915ab2d360bfee7d39229960d37f8c28496a17f22b8519,2024-10-22T16:12:14.193000
|
||||
@ -275376,7 +275376,7 @@ CVE-2024-5459,0,0,b7a22fae8a0174b7cca0e1147f2ed714677dfde4089a65746f06fba0f29d73
|
||||
CVE-2024-5460,0,0,d1df8428a10a618dacc511f1783e341e208a5618919dfcb93f031b38621f5972,2025-02-04T15:24:36.480000
|
||||
CVE-2024-5461,0,0,0e5c35015ef9c17a01014ad8587e8a058a39ac46cc767abd7817343a80dc0b2e,2025-02-15T00:15:13.513000
|
||||
CVE-2024-5462,0,0,d4f147823b82222903b9d9bf51249493cafff25daa3597a42629662406d9f68b,2025-02-15T00:15:13.650000
|
||||
CVE-2024-5463,0,0,113aff91033cb1cb7c353ce7e22b0cbd622856846d0128375c498a441530fd0a,2025-03-04T18:43:31.607000
|
||||
CVE-2024-5463,0,1,b24b8d78523e42c0a180af4d8a43e8593c6b5e1f71c3c301d74d6192884c071f,2025-03-04T18:43:31.607000
|
||||
CVE-2024-5464,0,0,255f781a5f94f0faf95d7c73d6b2015838426915e8e0274a4b6257e37377ce5d,2024-11-21T09:47:43.990000
|
||||
CVE-2024-5465,0,0,d854caa252ac359088449fa3628f1e50a198f1dced6d951af90835f292847339,2024-11-21T09:47:44.140000
|
||||
CVE-2024-54658,0,0,2ae5e1e473d9853fb3d9a8ce3b95078d5f42520f037bb2207ff10526f7c0240a,2025-03-19T18:15:23.533000
|
||||
@ -281153,6 +281153,7 @@ CVE-2024-9999,0,0,cad7c92a380ae514b71a1dd06f3b79a139ea65cb773110d32be2b942d72ae5
|
||||
CVE-2025-0001,0,0,0b53097bff1778de9231713dab9a655e96b466d52a15df3f132fe8a8a77a7f52,2025-02-17T10:15:08.550000
|
||||
CVE-2025-0014,0,0,5c97a8ddbb8633a344f6dd9b44735740d1415560a2ebca2945d027989fbee2c7,2025-04-02T17:15:41.183000
|
||||
CVE-2025-0015,0,0,321b388b66a6f24115764aad9373a5b4540cea827bc5f4a9ec4c99c3ab51602a,2025-02-03T16:15:33.770000
|
||||
CVE-2025-0050,1,1,7f6626770e0950243a41e91e8473e458a114045f56ef7e8dd8b2d6082147a644,2025-04-07T12:15:15.360000
|
||||
CVE-2025-0053,0,0,b8373307f8e7839c7035660b5035e0ad8594f9f834cb4c64706371a8c3a2ce31,2025-01-14T01:15:15.403000
|
||||
CVE-2025-0054,0,0,b8bc9804913976424582a72964eb068b4365d1e22607e5b0c46a2e77e3b25525,2025-02-18T18:15:28.260000
|
||||
CVE-2025-0055,0,0,0e89795bc87c51adbc679d78b37bf974fd01b97679ad0635934ee83322d4b078,2025-01-14T01:15:15.570000
|
||||
@ -283073,26 +283074,26 @@ CVE-2025-21417,0,0,2747c56c84381d3763059eec5080d6fa07a433b2e87fb1f1180b0a0554555
|
||||
CVE-2025-21418,0,0,286c461de95fba525ffd95fe19188a97b0613df56bf1afe14ca9be4aa494d718,2025-02-12T18:14:34.870000
|
||||
CVE-2025-21419,0,0,acdb4d37a32faa1cb0f65f0fbb7358475e2deb811438263e59eb8f6bcbeca8e1,2025-02-14T17:32:53.087000
|
||||
CVE-2025-21420,0,0,32a7e46f27d290c0e9a5b92e079c0424752a30e3cfa9e5d424062d7af6a66d41,2025-02-14T17:36:09.683000
|
||||
CVE-2025-21421,1,1,1a46ed7cf07f9de4724f071bb37dbb4e1550f91a3632631fd962b71f25d16ffe,2025-04-07T11:15:50.360000
|
||||
CVE-2025-21423,1,1,dedf91ac6986422add6113c12c7e5a4d806b88a2a00cca492dcfa56cca368ae2,2025-04-07T11:15:50.533000
|
||||
CVE-2025-21421,0,0,1a46ed7cf07f9de4724f071bb37dbb4e1550f91a3632631fd962b71f25d16ffe,2025-04-07T11:15:50.360000
|
||||
CVE-2025-21423,0,0,dedf91ac6986422add6113c12c7e5a4d806b88a2a00cca492dcfa56cca368ae2,2025-04-07T11:15:50.533000
|
||||
CVE-2025-21424,0,0,3a83225b8d2edd7b934464a21b7f49bd35353b067d8247c64049e806cfc35f96,2025-03-07T14:12:17.933000
|
||||
CVE-2025-21425,1,1,6f0d5fb1c50cd307365da059dba6aca3d875166dd617d5e7bbb17fd1532dc336,2025-04-07T11:15:50.697000
|
||||
CVE-2025-21428,1,1,8c26d198e24ea5b609d7bdbc3e4d45b736836578fec0a01cdda276546e5dc31b,2025-04-07T11:15:50.870000
|
||||
CVE-2025-21429,1,1,8573dff694ea2a4f98448779e43dac41635fbc7720e245dab3282b51d0939754,2025-04-07T11:15:51.047000
|
||||
CVE-2025-21430,1,1,6a8a047f38812c42d770761b756fafdbe98abe1bf7ecdf71558385df444ed029,2025-04-07T11:15:51.220000
|
||||
CVE-2025-21431,1,1,648e005d741d450e848b9310483c0ebe1250f9bd8b1fa41de87bbebfbd110c42,2025-04-07T11:15:51.440000
|
||||
CVE-2025-21434,1,1,635174305db6afcee37cef7fcc7af374cdfb03a0db0e353b457ad392ff531ab9,2025-04-07T11:15:51.600000
|
||||
CVE-2025-21435,1,1,0ceaaa23e2ab6fc99ed59c3651ea0bd3af26d4472f6e464da9891f1ecde20258,2025-04-07T11:15:51.783000
|
||||
CVE-2025-21436,1,1,79d419af1611043f95fbcb5adb4ee5127098dd02d8ce40f9ac775d3a9a2d8fb1,2025-04-07T11:15:51.970000
|
||||
CVE-2025-21437,1,1,b855710238f265a838c007c4e5fb426d6f3579d501d0a7ec413f577ab097922c,2025-04-07T11:15:52.123000
|
||||
CVE-2025-21438,1,1,9b420b8ad14340f0c0819330dacb4d92d2c77c319bc0ceafff9878463ccf4cbc,2025-04-07T11:15:52.290000
|
||||
CVE-2025-21439,1,1,6e6203aea263f99523af1c4fcf2019a42bfbabb92f3dced4725180734a958293,2025-04-07T11:15:52.457000
|
||||
CVE-2025-21440,1,1,bcaaacbf58306a490c300ae3e9c65f4dbcd0505db259126c0f0f42af75a62e20,2025-04-07T11:15:52.613000
|
||||
CVE-2025-21441,1,1,24004244400868cf299ed4860573968dd367a12d79eaad13ec9dee6c4f9a05be,2025-04-07T11:15:52.777000
|
||||
CVE-2025-21442,1,1,4035b9edc609f89c255c31e809ab5b219913d53114b2012078d979018db00a68,2025-04-07T11:15:52.933000
|
||||
CVE-2025-21443,1,1,722d70108e38beaa2973edd82097cd0c9da8ed023d32a9c269a043cee455dd62,2025-04-07T11:15:53.087000
|
||||
CVE-2025-21447,1,1,5a8882d174d3df5b74061e596133503ed451acb5ad60dc1a3367bf81f45766c3,2025-04-07T11:15:53.243000
|
||||
CVE-2025-21448,1,1,06c61c0ee17a661d1b5ffb46efd93f30314c79757cc37fc82e2e965a2c203658,2025-04-07T11:15:53.397000
|
||||
CVE-2025-21425,0,0,6f0d5fb1c50cd307365da059dba6aca3d875166dd617d5e7bbb17fd1532dc336,2025-04-07T11:15:50.697000
|
||||
CVE-2025-21428,0,0,8c26d198e24ea5b609d7bdbc3e4d45b736836578fec0a01cdda276546e5dc31b,2025-04-07T11:15:50.870000
|
||||
CVE-2025-21429,0,0,8573dff694ea2a4f98448779e43dac41635fbc7720e245dab3282b51d0939754,2025-04-07T11:15:51.047000
|
||||
CVE-2025-21430,0,0,6a8a047f38812c42d770761b756fafdbe98abe1bf7ecdf71558385df444ed029,2025-04-07T11:15:51.220000
|
||||
CVE-2025-21431,0,0,648e005d741d450e848b9310483c0ebe1250f9bd8b1fa41de87bbebfbd110c42,2025-04-07T11:15:51.440000
|
||||
CVE-2025-21434,0,0,635174305db6afcee37cef7fcc7af374cdfb03a0db0e353b457ad392ff531ab9,2025-04-07T11:15:51.600000
|
||||
CVE-2025-21435,0,0,0ceaaa23e2ab6fc99ed59c3651ea0bd3af26d4472f6e464da9891f1ecde20258,2025-04-07T11:15:51.783000
|
||||
CVE-2025-21436,0,0,79d419af1611043f95fbcb5adb4ee5127098dd02d8ce40f9ac775d3a9a2d8fb1,2025-04-07T11:15:51.970000
|
||||
CVE-2025-21437,0,0,b855710238f265a838c007c4e5fb426d6f3579d501d0a7ec413f577ab097922c,2025-04-07T11:15:52.123000
|
||||
CVE-2025-21438,0,0,9b420b8ad14340f0c0819330dacb4d92d2c77c319bc0ceafff9878463ccf4cbc,2025-04-07T11:15:52.290000
|
||||
CVE-2025-21439,0,0,6e6203aea263f99523af1c4fcf2019a42bfbabb92f3dced4725180734a958293,2025-04-07T11:15:52.457000
|
||||
CVE-2025-21440,0,0,bcaaacbf58306a490c300ae3e9c65f4dbcd0505db259126c0f0f42af75a62e20,2025-04-07T11:15:52.613000
|
||||
CVE-2025-21441,0,0,24004244400868cf299ed4860573968dd367a12d79eaad13ec9dee6c4f9a05be,2025-04-07T11:15:52.777000
|
||||
CVE-2025-21442,0,0,4035b9edc609f89c255c31e809ab5b219913d53114b2012078d979018db00a68,2025-04-07T11:15:52.933000
|
||||
CVE-2025-21443,0,0,722d70108e38beaa2973edd82097cd0c9da8ed023d32a9c269a043cee455dd62,2025-04-07T11:15:53.087000
|
||||
CVE-2025-21447,0,0,5a8882d174d3df5b74061e596133503ed451acb5ad60dc1a3367bf81f45766c3,2025-04-07T11:15:53.243000
|
||||
CVE-2025-21448,0,0,06c61c0ee17a661d1b5ffb46efd93f30314c79757cc37fc82e2e965a2c203658,2025-04-07T11:15:53.397000
|
||||
CVE-2025-2147,0,0,8d64955bcd54c9e90fd3d983c30c955ed78fbb149aa1e8a8da2ca80431331131,2025-03-24T14:30:40.943000
|
||||
CVE-2025-2148,0,0,d4190a3f054e2420a8d60bda0390077417613c29dc75da593352ca97816f8b9e,2025-03-10T14:15:26.130000
|
||||
CVE-2025-21489,0,0,5d30c3b0acc3ddba1057df1a4f29e61d74be0ae611271efb1a2a3c05a60a8cda,2025-01-23T20:15:31.630000
|
||||
@ -285172,42 +285173,42 @@ CVE-2025-24185,0,0,4871c0df3d7d219e1401394d7ec6a4eaa7d737d02980f30e101a34eb820fd
|
||||
CVE-2025-2419,0,0,153707543e9bc32e5fdb338510a7c29ac05b7b4717e1a9871d5ed8414730714f,2025-03-18T14:15:45.067000
|
||||
CVE-2025-24190,0,0,909fc3fcab3f56a4a6e43129ca56781207bfb76ef21dcaa28ac91490f6b231a6,2025-04-01T20:26:22.890000
|
||||
CVE-2025-24191,0,0,70b077b59fb6872846684df55d5bb8024ad6bab473a53621155ca2da3a09c8f5,2025-04-04T18:24:52.147000
|
||||
CVE-2025-24192,0,0,a58f0bd0dcc29dcea121e843f6744c606af12c56b92420490b4424c02e8f81ce,2025-04-01T20:26:22.890000
|
||||
CVE-2025-24193,0,0,85d86826046c74a3a92df4109acf5fd80a776edd0c5c6152fb7ab85f1ff5ffcc,2025-04-01T20:26:22.890000
|
||||
CVE-2025-24194,0,0,3d9037f6c65de8bb0f966f71cedc343022bb007d10b1fdc2bf7d155439482ea0,2025-04-02T16:17:41.203000
|
||||
CVE-2025-24195,0,0,de39b9444b85c0c8de39f44ef1e56980eb68aa475d664a2cefc4170992452043,2025-04-01T20:26:22.890000
|
||||
CVE-2025-24196,0,0,dd8bfac1a128d80c0de5d6835408224affa1112c8a7ccdb5e2803b6062998d2d,2025-04-01T21:15:42.420000
|
||||
CVE-2025-24198,0,0,9a8e2c8e559db7901f4b442db0db49d42bc559027854a720df732a16c592ed0b,2025-04-01T20:26:22.890000
|
||||
CVE-2025-24199,0,0,b7b1539130c664dd05fc859f7b9f82f8e4b4c249803ce983db5205b76b388908,2025-04-01T20:26:22.890000
|
||||
CVE-2025-24192,0,1,ee1f07d2cba952304df25437faae60feabf9716560146378b8f5618aee1073ec,2025-04-01T20:26:22.890000
|
||||
CVE-2025-24193,0,1,ba576c453996d0b4d5fde71404eef4705c98b870947ba1c05c65f42287193054,2025-04-01T20:26:22.890000
|
||||
CVE-2025-24194,0,1,a0b361883e351a53ee4c04c87f642b54d27a5a7a1c2018dc1527e9c80cab1f22,2025-04-02T16:17:41.203000
|
||||
CVE-2025-24195,0,1,81583b5bf12388481e86c8fd25067312015d41ae1703d6e8bba5d756dfbbd036,2025-04-01T20:26:22.890000
|
||||
CVE-2025-24196,0,1,34c463723f4a052669a1ac9b40ad43efbfe4fd4e1f6c21db1dd10d588fa6da91,2025-04-01T21:15:42.420000
|
||||
CVE-2025-24198,0,1,4227721e88630e21162e18a11e5282e19ce032cd386f5ada78c23201dc850161,2025-04-01T20:26:22.890000
|
||||
CVE-2025-24199,0,1,3f7bb3dd70f62322776c640125327f5e42f891f077dc1d5c3f758b62bef5bcff,2025-04-01T20:26:22.890000
|
||||
CVE-2025-2420,0,0,759a643dd7e1d79c15a36f7d4a45610b663ab71ad52795fbc850f2e2b83fa384,2025-03-18T13:15:37.770000
|
||||
CVE-2025-24200,0,0,749aa357d1c7f24174764de48a9dbb69fce15ac4bc539d3a8708e99314c3972a,2025-04-02T20:33:13.233000
|
||||
CVE-2025-24201,0,0,1cb6d0eda651a05a5a43d80c0ce591daf0b58117cc08a1188cab7f3b5f75f28d,2025-04-02T20:33:42.653000
|
||||
CVE-2025-24202,0,0,2b7cb2221cdb2ba8dece8d61f82f6424a5b42c3021ee727b637bcd14cdeb7863,2025-04-01T20:26:22.890000
|
||||
CVE-2025-24203,0,0,da3868a701feefefd8c7741ed5d8fc5d414a41762accf68d3589a32766abfc6b,2025-04-01T20:26:22.890000
|
||||
CVE-2025-24202,0,1,eb647c5434609802c9e978ec9af9da9889a5d2230d53ebe85671424826242c28,2025-04-01T20:26:22.890000
|
||||
CVE-2025-24203,0,1,a3f9a09baf0eac88681fdc4a67973b3c8bfd4f9d7ff9ab90f66f1b9dfb2bd4ac,2025-04-01T20:26:22.890000
|
||||
CVE-2025-24204,0,0,5dcbcc8f0f20f44f386df15e8a1c1dce75589cb456c483a8817eed9932ff4f6e,2025-04-04T18:20:38.460000
|
||||
CVE-2025-24205,0,0,6fadd3e3676e6553f6aeed265ad38233d9709b8725a61efd3c17bd53e0c0923a,2025-04-02T16:17:41.380000
|
||||
CVE-2025-24207,0,0,e9d1c8f85e36821a0fb77d6184054c419339063ef36079af9ab74844c3476cd2,2025-04-01T21:15:42.580000
|
||||
CVE-2025-24208,0,0,3480dece639c840210d6cbb8eb531059de4983c5b4ebef5bbcd8a491c8144454,2025-04-01T21:15:42.757000
|
||||
CVE-2025-24209,0,0,67b8a01b4412124d49959fe7bb9b12a30ed4c7ba4bb0968a2edd523005eb59cb,2025-04-01T20:26:22.890000
|
||||
CVE-2025-24210,0,0,04833cd1d2dcdd85f6f46f3728e6c1582ef1098dc19c3a292b137e43fc0bb0c2,2025-04-01T20:26:22.890000
|
||||
CVE-2025-24211,0,0,0771157bcb8b39267a175858c8148b45b4b1085d576b2f3f713ae339231075a0,2025-04-01T21:15:42.897000
|
||||
CVE-2025-24212,0,0,26157d0780f0499b511892c79aa4643a37ae73b832a4f3b5c499fa3b3aab941b,2025-04-02T14:16:04.270000
|
||||
CVE-2025-24213,0,0,1ead9077438f3f1867df4a01fae0cd260fd37df069a38051957fc95e0d1cb6ea,2025-04-03T18:15:44.770000
|
||||
CVE-2025-24214,0,0,0f1fcc3f4a137f76a1dc58373cfaaedd9071618d2c0daed70f15d43a0f6d1e45,2025-04-01T20:26:22.890000
|
||||
CVE-2025-24215,0,0,07fb76ffc84035e69bcf83a4df22ac8203df7845a1d736d7e6b232124f0f86e8,2025-04-01T20:26:22.890000
|
||||
CVE-2025-24216,0,0,44b71cf285f8648b2dd5f9805be94e6eb5bb137559fefdfc87774c1520c0ebb3,2025-04-03T21:15:39.373000
|
||||
CVE-2025-24217,0,0,5b60946ff61cf2080385fa0b1989e613a251700fbe8f7d875adc4c496ccbe901,2025-04-01T20:26:22.890000
|
||||
CVE-2025-24218,0,0,1eae9e32ce19500bc6747aae15178826c25f975aae907cf59eb7c346c329b7bd,2025-04-01T20:26:22.890000
|
||||
CVE-2025-24221,0,0,fe2a7be171b044a18b7aad5da0148fcd4e1fa54fba59f6221bb4404a606c1279,2025-04-02T14:16:04.507000
|
||||
CVE-2025-24205,0,1,d98bf4fae997b11cb871b381746d059aeb2efd160d26a3cad925c91161b031c5,2025-04-02T16:17:41.380000
|
||||
CVE-2025-24207,0,1,c7bfaef550d4996315704a0633d0f495d6bd0e0f46b1a1c9a0a393cb650bcadb,2025-04-01T21:15:42.580000
|
||||
CVE-2025-24208,0,1,7b896dfa2c976de0ffbc003c67f622881a7a33edddbdd68d88aed0f66cc63453,2025-04-01T21:15:42.757000
|
||||
CVE-2025-24209,0,1,0d590fd9cb7d930fcd886de1ab46db778151cfcfc74035a94b7ed1d030113052,2025-04-01T20:26:22.890000
|
||||
CVE-2025-24210,0,1,7355814d761e2e75a569b3b8148f037b4e2ff3934e2ee5322b3debee0d554ed2,2025-04-01T20:26:22.890000
|
||||
CVE-2025-24211,0,1,1299e3955e08a53d45c216c23b8e10e03c0bdc5943eae5fdbd3b4e8404306e46,2025-04-01T21:15:42.897000
|
||||
CVE-2025-24212,0,1,e1be1010f74290c2f2c6df69604b037971a5976bedbcdfad4f484982883d36e8,2025-04-02T14:16:04.270000
|
||||
CVE-2025-24213,0,1,886ccb4f1523610698ada21bc020a8ee6b81aedca4511434b560aee099cfe004,2025-04-03T18:15:44.770000
|
||||
CVE-2025-24214,0,1,c086cc19c98c32370055c38c5134d8f3080e9df5b0418ae88a31783911fb0ab3,2025-04-01T20:26:22.890000
|
||||
CVE-2025-24215,0,1,65428943713be8a005337b33e5c1309d72acd2346a337b0b42541fcfc77792cf,2025-04-01T20:26:22.890000
|
||||
CVE-2025-24216,0,1,bd2834e73891ab74bfa09311800e8ebaaa54e1e04e0126eb6a4dd1b019ece5dd,2025-04-03T21:15:39.373000
|
||||
CVE-2025-24217,0,1,8a0924d07d1f86250963e5000cee22db0390a13bd36a0e6c4a49a06fc26e7f63,2025-04-01T20:26:22.890000
|
||||
CVE-2025-24218,0,1,9f5704f2f444444c03a7337084f0a271d4c4faf757d7a9254cbfb3d990dcd0ad,2025-04-01T20:26:22.890000
|
||||
CVE-2025-24221,0,1,a24e74d49d5681e81a91f0aedbb72c222b04d20454153e341951a42ea59e8df8,2025-04-02T14:16:04.507000
|
||||
CVE-2025-24226,0,0,b30ef21852bbf23b107ad0db09b90bb3e97ca9a52198eebb15d52a72752f0f26,2025-04-04T18:21:46.567000
|
||||
CVE-2025-24228,0,0,0682ea9cc8d158874891386ed6f236a448b44a58a7432ca800fb49bba4f8ae66,2025-04-01T20:26:22.890000
|
||||
CVE-2025-24229,0,0,e80f8313d932b2359cc47d30731c55191722d487b8bc17c5824ac86e7e1af040,2025-04-01T20:26:22.890000
|
||||
CVE-2025-24228,0,1,4b7d66061e7715a52ec6e22041d149d69dfad757964e97ff7a76bc247673181b,2025-04-01T20:26:22.890000
|
||||
CVE-2025-24229,0,1,4095c1a5305e2509985724ab171d929dc46d25d8e1a858263974f12daddd4ece,2025-04-01T20:26:22.890000
|
||||
CVE-2025-24230,0,0,c6f238a0a3b7d00915209ed792ddeafea71970bf3b666bc266a73753e585b00c,2025-04-02T14:16:04.680000
|
||||
CVE-2025-24231,0,0,e812ae93ea0802283d6f151efcce81026a85e391ca5cb344078f9d404ac5936f,2025-04-01T20:26:22.890000
|
||||
CVE-2025-24232,0,0,c930ff70002faf4f8d8359df165f92ec18b3c6c1c258e6463c792b9bb9b34325,2025-04-01T20:26:22.890000
|
||||
CVE-2025-24233,0,0,c49a8d10414fb99c6f94c7c63aee6102f698e2c458dcdfe8a93be4bb7447a0ef,2025-04-01T20:26:22.890000
|
||||
CVE-2025-24234,0,0,00319238de00a6841774394cdb4e95500b63f71cb14160650f343f81875ecbec,2025-04-01T20:26:22.890000
|
||||
CVE-2025-24235,0,0,6b09348a77477dd81f798405383da8e5e4a0cf914e73d5de207d45c86653a813,2025-04-01T20:26:22.890000
|
||||
CVE-2025-24235,0,1,5eabd07812f933eef8a1453948e29bf15c3eecaba86449598f61f5b9fa100278,2025-04-01T20:26:22.890000
|
||||
CVE-2025-24236,0,0,6f35aae8e5b2275b2c69183ab7776a716442e803a5454ae85f2994d6ce98630e,2025-04-04T17:11:53.263000
|
||||
CVE-2025-24237,0,0,27bd8aec1cacbdda457d4c54321da7772780a885b84dc379b0850dfb4a03a57f,2025-04-04T17:11:50.760000
|
||||
CVE-2025-24238,0,0,eb385efe8cda4bf9f1c35756a77fb4af48f89427c693cc6ce5f1501ae0be4d28,2025-04-04T17:12:14.453000
|
||||
@ -285216,21 +285217,21 @@ CVE-2025-24240,0,0,31e1fbc4a9906522b59d5426cc41c13b0cc9baa11bbcd68e50f13950436aa
|
||||
CVE-2025-24241,0,0,a279cf4c641bb9c3ca243836a9cfff64caa6f150180c868bc752ebe35d2580ea,2025-04-04T17:12:47.040000
|
||||
CVE-2025-24242,0,0,7198a4ff47a69ba0a9fd45b2c507b49c3ac18f25e906b0f7d0919752e8bf374f,2025-04-04T17:13:00.923000
|
||||
CVE-2025-24243,0,0,5bf36f24ae0ea02424f9ce04bcb14c5dbe8f60f4ca7ebf1e755395b0487a5c5e,2025-04-04T17:13:15.023000
|
||||
CVE-2025-24244,0,0,aa8216b7c526d909646287a678f19eb0a4c74f63dbedb6e3f9816bce9375d8e0,2025-04-02T16:17:41.717000
|
||||
CVE-2025-24244,0,1,35fdd1fc29044bec0e234744d0b34f378e5fa7ec39165412d9a4e2e05b72bbbd,2025-04-02T16:17:41.717000
|
||||
CVE-2025-24245,0,0,726bb616fd36c53c5e8e1d9a6405098822a15a2e9f18cf06a92a2b835cd77581,2025-04-04T18:24:35.563000
|
||||
CVE-2025-24246,0,0,4c1c877540723e60e5944458a5aa9e39161e712e8a3a8067e2a1e5e25957ec64,2025-04-01T21:15:43.040000
|
||||
CVE-2025-24247,0,0,59555ba19abf57fce5ae14db87534c22e381c032a8ea5b1a4f5b2e84c6d6b721,2025-04-01T20:26:22.890000
|
||||
CVE-2025-24246,0,1,843a424cd1888295fe208cbd1ad01be127a6ba8f27dfab2f9a1af5142677e146,2025-04-01T21:15:43.040000
|
||||
CVE-2025-24247,0,1,cd43def14d19ddb3c6d3c9d05bc5cbfdc51f8131002a95fdc01db942bd421e6f,2025-04-01T20:26:22.890000
|
||||
CVE-2025-24248,0,0,2888532025229541b660a3aeb97018da3b2d5f4bd38a2cee849343873235a5dc,2025-04-04T18:24:20.717000
|
||||
CVE-2025-24249,0,0,ef5a9945cb5f5987170c3c49a5b54d37f318974a0224d422b7f0b9154ecd3027,2025-04-01T21:15:43.183000
|
||||
CVE-2025-24250,0,0,c28f0f56c48215e5b6b839bd92835127561679d27bd6236d3986a54a4fd03d0e,2025-04-01T21:15:43.330000
|
||||
CVE-2025-24253,0,0,78470b1727e3850c13a71f527dcdf5a48a8655399b205341b702ac31f4ac8e9c,2025-04-01T20:26:22.890000
|
||||
CVE-2025-24254,0,0,1c4f96c6f6d7d4db098d580e58b9ac31a68428ff32af6a8b3c66753efb7f7dfd,2025-04-01T20:26:22.890000
|
||||
CVE-2025-24255,0,0,1d1807c301eb4918f313c995b93c1e89af4b7f820beff779c931323107b52d99,2025-04-01T20:26:22.890000
|
||||
CVE-2025-24256,0,0,0696ca57a40bd0a1f0928e4113c998421f4baa2c2e5bb33f2b58b0c9d96decd9,2025-04-01T20:26:22.890000
|
||||
CVE-2025-24257,0,0,822a2912608e4be54fc31d8140f141172378fcf97c0b590e45b75ba4cf4c850b,2025-04-03T14:15:31.043000
|
||||
CVE-2025-24259,0,0,e9e8ae34c0f6727f275f333ca2e4d4790f4b758b0b79515495a7bd7071b86a0b,2025-04-01T20:26:22.890000
|
||||
CVE-2025-24260,0,0,fc9cd5cbfdc0102679c8bb8134a8ae9e4c7e485c0efafc726e6182386e7de118,2025-04-01T20:26:22.890000
|
||||
CVE-2025-24261,0,0,afa9c10ebbdee1cca43489bd0f5b742d2cf9b184fd96737bc0185a2d69682a16,2025-04-02T16:17:41.877000
|
||||
CVE-2025-24249,0,1,3dd1f2c2d36235f90a5b011ad0ed2127e4a4b2555eabaa586d558edfc966694e,2025-04-01T21:15:43.183000
|
||||
CVE-2025-24250,0,1,d7efbec8af4c0ad0a81bc8e24058ec435454a01ad4909974edffa1197a9199dd,2025-04-01T21:15:43.330000
|
||||
CVE-2025-24253,0,1,1687cffcaca9e116d2e250affba56fb788a0cc6108b0cd333405c621460018df,2025-04-01T20:26:22.890000
|
||||
CVE-2025-24254,0,1,3e956fa57fc33eee1b8249561afff1a505c12d0fb65e680ad09e9ce18b950642,2025-04-01T20:26:22.890000
|
||||
CVE-2025-24255,0,1,c769c760b71db36aa4a16720f8a976775c8a1e54d16149d69d38bafbf1249861,2025-04-01T20:26:22.890000
|
||||
CVE-2025-24256,0,1,6f4ca649299f5569759801053203dd6e1a2c0f53e6774df6fbda137455042e43,2025-04-01T20:26:22.890000
|
||||
CVE-2025-24257,0,1,be67cdf99ec630632db172354940607fd65cdda4926bb5432c1c771b5eab02b6,2025-04-03T14:15:31.043000
|
||||
CVE-2025-24259,0,1,cc006e3941dfe709a11fc1faebf6ece5087f0389ccf9801cc14c4eea2aa96d4a,2025-04-01T20:26:22.890000
|
||||
CVE-2025-24260,0,1,934a7a9b01ba2e0ac8a59aa2ba9aecd5c2ff58057ea62198a81bba5c4ef18ef1,2025-04-01T20:26:22.890000
|
||||
CVE-2025-24261,0,1,51d607cc95611ecfba003ac720c144da943978caa3ae3b2f71763652cfa3aa5d,2025-04-02T16:17:41.877000
|
||||
CVE-2025-24262,0,0,3d76917582097604a5e634bf4f71c6df69377b602f1a36e0845ed48fc225e030,2025-04-04T18:24:08.693000
|
||||
CVE-2025-24263,0,0,b22d00ad9123f8055683c07743d9bd481ce65ffc5d5b226b870bbaf0cb77b38d,2025-04-04T18:23:52.100000
|
||||
CVE-2025-24264,0,0,48a4bb0d460b0ba3e4c4820397b4c8b4813fe0b28dd3f3b1daa4c999448c1e0d,2025-04-04T19:00:46.457000
|
||||
@ -285238,9 +285239,9 @@ CVE-2025-24265,0,0,69e5233604d5626850611ee64abbaaf7e43306a91789780d2aab9e6168a4a
|
||||
CVE-2025-24266,0,0,d850a68869d3e8c7d48709e8220153768350f47108844d206efa6027d68e51c9,2025-04-04T18:55:25.553000
|
||||
CVE-2025-24267,0,0,f3504fb660b96f886533b6b2e39b198d92d097550e50f76d44bfd982b4c91cd8,2025-04-04T18:53:03.830000
|
||||
CVE-2025-24269,0,0,8938854dd4ab200eefc4b8f05d044fb8e4cd629a1cddad03c13bb26be51b09ca,2025-04-04T18:23:37.283000
|
||||
CVE-2025-24272,0,0,6e7e1dd0d722c49b12d24c4853bcf8efc9355e71ae39e60c1ddb1f46d2df215d,2025-04-01T20:26:22.890000
|
||||
CVE-2025-24273,0,0,099ac16a257666b591c09313cf9602fd4bfbc2418df4164aeda80445197c05d9,2025-04-01T20:26:22.890000
|
||||
CVE-2025-24276,0,0,a6ab3f5ffdac6bf043bc3904fce8c7221c117d06f2a4b22ec361b6029ce1190e,2025-04-02T16:17:42.060000
|
||||
CVE-2025-24272,0,1,99c4e0b6977542546981b29d4b215aa567e1b559e40b70534e81a738969733ce,2025-04-01T20:26:22.890000
|
||||
CVE-2025-24273,0,1,8c725f6a9b36d4445a267be45be33c2d56efeb22a0aa54cfc6635d79e5e674d7,2025-04-01T20:26:22.890000
|
||||
CVE-2025-24276,0,1,70f5e8b091e809ba0b19011470f784595d949b4947979d2823a1ebc36fac3ffa,2025-04-02T16:17:42.060000
|
||||
CVE-2025-24277,0,0,7689e916ab1daf1bd3b71f7ef5284681f9c9f49bd75eaa1a34b5098f93a9668a,2025-04-04T19:49:08.933000
|
||||
CVE-2025-24278,0,0,6e2eacf3052e7cbc2055495d37c9c6d7068989be97cae8da3a79685df107e734,2025-04-04T19:47:33.687000
|
||||
CVE-2025-24279,0,0,cad0432a42d451ad48511ef95f7a14eb3e143fa7dc7f59c67bedf18885f1ce98,2025-04-01T20:26:22.890000
|
||||
@ -287623,12 +287624,12 @@ CVE-2025-30258,0,0,cc431d0d4fe6a8b6881434ff2ad3ef316269606a3845b529c54a958324c9a
|
||||
CVE-2025-30259,0,0,e7ad748a07d97a3ed7d8fd479d0bd66cf98f38cbfee97910d52cd90aa0d3bed9,2025-03-20T00:15:13.780000
|
||||
CVE-2025-3026,0,0,1ccfc3db3fa998e9ff1cdb0d3328ce5e8b50ad41edf4870aec75e9db46dbd3f7,2025-04-01T20:26:30.593000
|
||||
CVE-2025-3027,0,0,9355f1632bf438848aed82af6cf484da7a1ad46dac5db96331cc9a677136537c,2025-04-01T20:26:30.593000
|
||||
CVE-2025-3028,0,0,2836ef929d4821633b0ea2bb7d61c3adc81a27d4c1f1d06ba6fb1f8ba0c8b2ad,2025-04-02T07:15:42.047000
|
||||
CVE-2025-3029,0,0,6a8bed066885dbede7cebe7b38c5f85e4b07028eb69f4d86e67d8073a57fe4dd,2025-04-02T07:15:42.240000
|
||||
CVE-2025-3030,0,0,99eaef6196b742210bdb375cd8045db0258b795aa60511a40f19649c201270d5,2025-04-02T07:15:42.400000
|
||||
CVE-2025-3031,0,0,913d2091a71730e7191c7b914490dbb44547e01007c2aa0204514225f9840ca6,2025-04-01T20:26:11.547000
|
||||
CVE-2025-3032,0,0,45018c0e8539d05ecbf4f536c0883c5aa5339f46f07ebf0a4e6b283b2be56925,2025-04-01T20:26:11.547000
|
||||
CVE-2025-3033,0,0,f974a5cb11a299558b6f070e0d59ac1bbdced04ddcb4e0bd404cb65a1dfbacd9,2025-04-01T20:26:11.547000
|
||||
CVE-2025-3028,0,1,4fa719e2ecab3ec0a17d5dab7733cc44842b5a90a53bb60beaa490223042a9fb,2025-04-02T07:15:42.047000
|
||||
CVE-2025-3029,0,1,18abc968db62f00f40022bf813ceca55e3dc01aee6e85385d247612be2fb51b5,2025-04-02T07:15:42.240000
|
||||
CVE-2025-3030,0,1,11cb8886f3602275f86bba62db4e84a08fa34829bc5640ac507014c78b38df68,2025-04-02T07:15:42.400000
|
||||
CVE-2025-3031,0,1,e031b00d61b98a574554177de72dbe5455ec4cca96a2b5c9ce56307fe9205938,2025-04-01T20:26:11.547000
|
||||
CVE-2025-3032,0,1,a5506c914af4be63643a889c84f960832c1c89a3a908aad1c72be0345666d7e2,2025-04-01T20:26:11.547000
|
||||
CVE-2025-3033,0,1,3c01d2b3c979e86b4f438d6a9f2fbeef7453125a07046469079cd3c15c5e1201,2025-04-01T20:26:11.547000
|
||||
CVE-2025-30334,0,0,caf534fd1627734422d4cc985cab7fc3cb378766099fee597920edabdedb5eb9,2025-03-20T22:15:14.453000
|
||||
CVE-2025-3034,0,0,164cc1c1ef87ef60f97d94cfd24d9b02daad52a01dfca2eb60d64c35646670eb,2025-04-02T15:16:00.490000
|
||||
CVE-2025-30342,0,0,a82c09d47a90d84f34fb1e813a5c0fac2da3bb3c52e4eebc7be6b04000e23625,2025-03-27T13:35:33.940000
|
||||
@ -287683,20 +287684,20 @@ CVE-2025-30433,0,0,6f71c17f77a95a33ebb1e94d3dfef9c6f08286c2d2c9237283ca7fab79b9e
|
||||
CVE-2025-30434,0,0,ebc68e7f01445dc8310b399489dc90a6f8fac5463d58eec28218ed8f44833277,2025-04-01T20:26:22.890000
|
||||
CVE-2025-30435,0,0,a819fd3bc536b06d31e66f2dba46f170a8a82060c4083d1602e4468ee70f613f,2025-04-04T19:28:07.327000
|
||||
CVE-2025-30437,0,0,0c24503326977574ab0f815363d5d51518a36fd46250ca4580863efffe2ff229,2025-04-04T19:33:46.400000
|
||||
CVE-2025-30438,0,0,5e37b091eda5acd779838ef05fdda74196e7142c912dcdf0eb307fc4f5de6b74,2025-04-02T16:17:42.927000
|
||||
CVE-2025-30439,0,0,73a82254afce220f4c6d9661a5990bcbdde677704ab0cf77b47fd1c6511d584c,2025-04-01T20:26:22.890000
|
||||
CVE-2025-30438,0,1,81b2609c87d7967d6e60e6f5472d1d0fc467392bdf52a7b3d8413a194c75226f,2025-04-02T16:17:42.927000
|
||||
CVE-2025-30439,0,1,fcdb88b54a0cf3f64699998998ea8cf5cf2ccaefc5de2c6c4f34db6617ff682c,2025-04-01T20:26:22.890000
|
||||
CVE-2025-30441,0,0,0c04a93a6f174bf42d94b9b28150654c6cdebea87baad1c1bed2a17317c45cac,2025-04-04T19:40:24.640000
|
||||
CVE-2025-30443,0,0,932b3b18ec745c2b2a792c286f1e8af256bc23e89d29fbb215bd590e88ff171d,2025-04-01T20:26:22.890000
|
||||
CVE-2025-30444,0,0,d34d2c46b7cc42bfd15ee553b3d0a274cd034241b6bbc862e4e516372cd13022,2025-04-02T14:16:13.203000
|
||||
CVE-2025-30446,0,0,8790b6eb4e57b8db9f3d86b2b6b7d83a1a5104f925a43c9ec939c8c6995882a4,2025-04-01T20:26:22.890000
|
||||
CVE-2025-30447,0,0,237dbe9402f62a7486f16b1d09b7e4786ec6fdf28414a466fde6c687314bb0e5,2025-04-01T20:26:22.890000
|
||||
CVE-2025-30449,0,0,9508fcfb3134f072500474d4eb13734d9ef2b119129d96bcac9b8fac5ebf5a05,2025-04-03T18:15:45.357000
|
||||
CVE-2025-30443,0,1,b83ff3b6d97b7b26e8e596dd682b1363434bb839dbce2f4738ba273bcf3c8e50,2025-04-01T20:26:22.890000
|
||||
CVE-2025-30444,0,1,5fb147016e236cabb48b47cbbfd70a9e8b05c504934db59775ee819b48949b5d,2025-04-02T14:16:13.203000
|
||||
CVE-2025-30446,0,1,fad4d26b5d4ae94812fd466886b763c48fd7e22c60b658669925c241ad6d69a5,2025-04-01T20:26:22.890000
|
||||
CVE-2025-30447,0,1,224c249cbee75db0bac000ce6316b7cbc430caf4f96b51dbc25b7e0331e9d8ab,2025-04-01T20:26:22.890000
|
||||
CVE-2025-30449,0,1,210ffa9dedb9127f4cf06550241e08b952ffb40a1ffaccfd71d274287b32fd7e,2025-04-03T18:15:45.357000
|
||||
CVE-2025-3045,0,0,d1bb69c29a142292c5068648f022094677578a135ca579006924bfb19a4ea68a,2025-04-01T20:26:11.547000
|
||||
CVE-2025-30450,0,0,eb6ccf232b67c24883a0d3a839bee58ad5ab048c533d6cb6cd99c6f9851e4aca,2025-04-01T20:26:22.890000
|
||||
CVE-2025-30450,0,1,a82e950626eebfd524755275e586bbd396e85abae8fbd3bec837ff9127bfcfb8,2025-04-01T20:26:22.890000
|
||||
CVE-2025-30451,0,0,a58165541c3f501bbc882a86fac75fc8ba8f191c9a6326ff9e9bcbfeb1b29f2f,2025-04-04T19:41:29.893000
|
||||
CVE-2025-30452,0,0,1efd239c821d515f19f352abde330ebff233606e55b12bb9ebf573ccfdc85938,2025-04-02T14:16:13.400000
|
||||
CVE-2025-30454,0,0,47c09e5bc46b9edf4e1f5c1c4e1e4a1d9da94a40ad41215b663ab07539d05720,2025-04-01T20:26:11.547000
|
||||
CVE-2025-30455,0,0,c047560985dc14264d844d7220e69242357f952dfe9c411f36f032f55b9ad4be,2025-04-01T20:26:11.547000
|
||||
CVE-2025-30452,0,1,77fbe4ced45b46f4111689abf8ae3fb93c1d49a0898dc167a84391fd4453a149,2025-04-02T14:16:13.400000
|
||||
CVE-2025-30454,0,1,08b3e2921685bedea4ac7b893176a1b5006b2e346683c09cd6faaacf38a4ac51,2025-04-01T20:26:11.547000
|
||||
CVE-2025-30455,0,1,5ac415298edc3bac9e768212f8345cfefeebbf0333fc9470055a8cc811912842,2025-04-01T20:26:11.547000
|
||||
CVE-2025-30456,0,0,a4adbf3fb3bfda6c1ff7ac3e59f722d6890d88837b4dfbbcb9888cc15a9a477a,2025-04-04T18:13:02.067000
|
||||
CVE-2025-30457,0,0,9931b57801603e5171d9b9131e7fbe4120bea818d45e3d4b53b5782cd0d5fd9e,2025-04-04T18:12:47.103000
|
||||
CVE-2025-30458,0,0,d44cd0a8f35468ff3b2dcecdff85e9434b31c8f37fa6b8dfb1a82259a2d7a917,2025-04-04T18:12:42.757000
|
||||
@ -287824,14 +287825,14 @@ CVE-2025-30621,0,0,8c6a6eedc9f943375208fa96aeb0d151078d5fa54598208cfb233511cfe9b
|
||||
CVE-2025-30622,0,0,797c397d49f77f00a276d4088c4e3466e59efa0b6ce4fa17d94546d3a32ca074,2025-04-01T20:26:11.547000
|
||||
CVE-2025-30623,0,0,a8e0620fa0eff69e53f34c91bac6562d90d04f91188fb9d1c9bfa47d4c96dabd,2025-03-27T16:44:44.143000
|
||||
CVE-2025-3063,0,0,2e45f7e85b76c34e4c90c66b657feb85dadfe8fb2002194cf56059b20b804015,2025-04-02T14:58:07.527000
|
||||
CVE-2025-3066,0,0,fd31618ea0039bc1c76fc5f0ad8ea6fffdb369063d756e38fca0aff4a40ff1d6,2025-04-02T14:58:07.527000
|
||||
CVE-2025-3066,0,1,03f9a1bb2c29153c0948aa39cce060627d444aaf0a825fca34c07c32a4c6319c,2025-04-02T14:58:07.527000
|
||||
CVE-2025-3067,0,0,137654232245c02adb3b6bc4a9fe4453e793714623555640c944c49ca758c0bb,2025-04-02T14:58:07.527000
|
||||
CVE-2025-30672,0,0,3ded266990ba9009f55577f3f5d04302a5c6b8450014b92c80b83398ad23d15e,2025-04-01T20:26:11.547000
|
||||
CVE-2025-30673,0,0,1cf76211fcfa10ad4c1393e8c6dafbf3bed92def83ca793b34e5eea95c528365,2025-04-01T20:26:11.547000
|
||||
CVE-2025-30676,0,0,708f03a86f4c884ecda3f7ec1e5552de291778e3e25b801a6e5af963ebcc884a,2025-04-02T22:15:20.260000
|
||||
CVE-2025-3068,0,0,f9a39222b61453a29b2f1a4069016bca54bcc8b63aad375ae49396e14d902dd4,2025-04-03T14:15:44.400000
|
||||
CVE-2025-3069,0,0,4e389991d0ef74c06433469fc9e023b9359cbeab2c1e7d5be193ba6024cb2402,2025-04-03T14:15:44.560000
|
||||
CVE-2025-3070,0,0,a4ab7f6eaf5d1ec4cd8c416cae299fae525aeec5fa932d5ba990523b9e8fa991,2025-04-03T18:15:48.053000
|
||||
CVE-2025-3068,0,1,4267c1d7610ab6ed7b6514ce611c17809d366e0f57c5db370b8001fd5d0cc4bd,2025-04-03T14:15:44.400000
|
||||
CVE-2025-3069,0,1,f0cdb34667db22fe3443f98ac92e43d019c02ffd04c5a9caf026e3efa3db1654,2025-04-03T14:15:44.560000
|
||||
CVE-2025-3070,0,1,e9fb90d1e66be86869705d3447aa52711dbdd16a7f9894abe14e212149c50d01,2025-04-03T18:15:48.053000
|
||||
CVE-2025-3071,0,0,0a9205c6ee6066c46b5ec0edfa27f1d3973a7cf68687532cc9e9610b04e77b91,2025-04-02T14:58:07.527000
|
||||
CVE-2025-3072,0,0,ddcbaf040f317e06ba30451dfe0d6f628f558eec148a6cd6a3694b67994c1b8f,2025-04-02T14:58:07.527000
|
||||
CVE-2025-3073,0,0,5b3691858a5f3f8c9fda3b40e4cc2efc5d5a3f5c797da0dcb3d227256f0347ec,2025-04-02T14:58:07.527000
|
||||
@ -288105,7 +288106,7 @@ CVE-2025-31187,0,0,a6105b8146b15b371ec11e675e56d0f333e59f34cafc14af70a8938c57646
|
||||
CVE-2025-31188,0,0,2fb0e110c15582ab5d864f4ce86dbfdd024f43772415d4f0943e5f687dee52d2,2025-04-01T20:26:11.547000
|
||||
CVE-2025-3119,0,0,c1a8882c407babd47aa6ac07c5d341bee78441b1227c61448a35af71afb68fda,2025-04-03T14:15:44.840000
|
||||
CVE-2025-31191,0,0,5c887fe6f1a981b5941578aba17f50355dc847fd896dda368980895a9fb92d49,2025-04-04T18:14:34.590000
|
||||
CVE-2025-31192,0,0,3e73dd7a26b33015ce76fd174b2a3346c3d188eb35507b4e68c2ae4f7c78b869,2025-04-03T21:15:40.627000
|
||||
CVE-2025-31192,0,1,b1f1b9e68e803aec075d3f9471c96040f99aa3ea79cd4218735ae19baeff3193,2025-04-03T21:15:40.627000
|
||||
CVE-2025-31194,0,0,03f4d110302543c66a4fd7a7b9480fc20da220403b3309cb642a2155d37d36c6,2025-04-04T18:14:27.780000
|
||||
CVE-2025-3120,0,0,e50a4b8e9f4394c1a251e1a65f13e688519ceb35f1a621650ebad35571a5f10d,2025-04-02T22:15:21.047000
|
||||
CVE-2025-3121,0,0,94fccc916e2dadc05e6605b448acb94c41bf58e0b31c3affc5840a6a10c4cb07,2025-04-02T22:15:21.220000
|
||||
@ -288826,7 +288827,13 @@ CVE-2025-3342,0,0,deace936bd60dab082139939254e85c98ae9e697787a0f1baa37e9158485a6
|
||||
CVE-2025-3343,0,0,eec621cc7fe6a834a2f443ec38ca943ffb9f3e3f01ffec434c2062a598b3969b,2025-04-07T08:15:14.120000
|
||||
CVE-2025-3344,0,0,a58b3ce2e11b8f4240a7e00280e9001b2c4df020b273799feb5c2d07e9000bd9,2025-04-07T09:15:16.850000
|
||||
CVE-2025-3345,0,0,41b232ef3d896e76634b3ffd0199594e52e88bc75d9bb547cb22c6d0c760ff8c,2025-04-07T09:15:17.047000
|
||||
CVE-2025-3346,1,1,91b87c156c3acc53e3d2e97a2510549b5bdcb338bcff8ae02b0d33c710dbacfe,2025-04-07T10:15:15.153000
|
||||
CVE-2025-3347,1,1,362ac1f703b7d41342bb62308cd1097739438db98e2245f8c9a1492ed28b769b,2025-04-07T10:15:16.700000
|
||||
CVE-2025-3348,1,1,b3a2aa9a4be182400caa9dc164d393014997f1a700768c39263c961ccfc43328,2025-04-07T11:15:53.607000
|
||||
CVE-2025-3349,1,1,f8424661986fedd880e8b841d16614e03a25147f7bd69d554f7ac4698ce6d44b,2025-04-07T11:15:53.807000
|
||||
CVE-2025-3346,0,0,91b87c156c3acc53e3d2e97a2510549b5bdcb338bcff8ae02b0d33c710dbacfe,2025-04-07T10:15:15.153000
|
||||
CVE-2025-3347,0,0,362ac1f703b7d41342bb62308cd1097739438db98e2245f8c9a1492ed28b769b,2025-04-07T10:15:16.700000
|
||||
CVE-2025-3348,0,0,b3a2aa9a4be182400caa9dc164d393014997f1a700768c39263c961ccfc43328,2025-04-07T11:15:53.607000
|
||||
CVE-2025-3349,0,0,f8424661986fedd880e8b841d16614e03a25147f7bd69d554f7ac4698ce6d44b,2025-04-07T11:15:53.807000
|
||||
CVE-2025-3350,1,1,af2523ec11c224fe7346105c887be7c9fa5c7ae52c770622f8bdfc3aed10d7d3,2025-04-07T12:15:16.100000
|
||||
CVE-2025-3351,1,1,51f855cf0c07ae294f7361db699fe786559140b507918edea926b7204ea6cc22,2025-04-07T12:15:16.380000
|
||||
CVE-2025-3352,1,1,ab19b1179b0591a0016ba0efd218ec53fb3572f4b619b32135d67b25a30c507c,2025-04-07T13:15:42.643000
|
||||
CVE-2025-3353,1,1,4ace4eeb1ef063d06d60a9773d3100c62384c517ba90d14208bb351f0ea1ff5d,2025-04-07T13:15:43.313000
|
||||
CVE-2025-3359,1,1,b3521ddf5292c867465e30bfbc36644565520aebd912672a9af17753cb6fe59b,2025-04-07T13:15:43.510000
|
||||
CVE-2025-3360,1,1,5cc0539618dcb78f13c0ebba8f54f038b422ef247232ef2be9eaa6c12b8ea0d7,2025-04-07T13:15:43.687000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user