mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-06 10:42:17 +00:00
Auto-Update: 2025-04-10T04:00:19.534441+00:00
This commit is contained in:
parent
b00d136630
commit
474cc5d6b8
72
CVE-2024/CVE-2024-581xx/CVE-2024-58136.json
Normal file
72
CVE-2024/CVE-2024-581xx/CVE-2024-58136.json
Normal file
@ -0,0 +1,72 @@
|
||||
{
|
||||
"id": "CVE-2024-58136",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-04-10T03:15:17.767",
|
||||
"lastModified": "2025-04-10T03:15:17.767",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Yii 2 before 2.0.52 mishandles the attaching of behavior that is defined by an __class array key, a CVE-2024-4990 regression, as exploited in the wild in February through April 2025."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cve@mitre.org",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
|
||||
"baseScore": 9.0,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 6.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cve@mitre.org",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-424"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/yiisoft/yii2/commit/40fe496eda529fd1d933b56a1022ec32d3cd0b12",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/yiisoft/yii2/compare/2.0.51...2.0.52",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/yiisoft/yii2/pull/20232",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/yiisoft/yii2/pull/20232#issuecomment-2252459709",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.yiiframework.com/news/709/please-upgrade-to-yii-2-0-52",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2025/CVE-2025-224xx/CVE-2025-22471.json
Normal file
56
CVE-2025/CVE-2025-224xx/CVE-2025-22471.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-22471",
|
||||
"sourceIdentifier": "security_alert@emc.com",
|
||||
"published": "2025-04-10T03:15:18.430",
|
||||
"lastModified": "2025-04-10T03:15:18.430",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Dell PowerScale OneFS, versions 9.4.0.0 through 9.10.0.1, contains an integer overflow or wraparound vulnerability. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to denial of service."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security_alert@emc.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security_alert@emc.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-190"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.dell.com/support/kbdoc/en-us/000300860/dsa-2025-119-security-update-for-dell-powerscale-onefs-for-multiple-security-vulnerabilities",
|
||||
"source": "security_alert@emc.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2025/CVE-2025-233xx/CVE-2025-23378.json
Normal file
56
CVE-2025/CVE-2025-233xx/CVE-2025-23378.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-23378",
|
||||
"sourceIdentifier": "security_alert@emc.com",
|
||||
"published": "2025-04-10T03:15:18.577",
|
||||
"lastModified": "2025-04-10T03:15:18.577",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Dell PowerScale OneFS, versions 9.4.0.0 through 9.10.0.0, contains an exposure of information through directory listing vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to information disclosure."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security_alert@emc.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
||||
"baseScore": 3.3,
|
||||
"baseSeverity": "LOW",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security_alert@emc.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-548"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.dell.com/support/kbdoc/en-us/000300860/dsa-2025-119-security-update-for-dell-powerscale-onefs-for-multiple-security-vulnerabilities",
|
||||
"source": "security_alert@emc.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2025/CVE-2025-263xx/CVE-2025-26330.json
Normal file
56
CVE-2025/CVE-2025-263xx/CVE-2025-26330.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-26330",
|
||||
"sourceIdentifier": "security_alert@emc.com",
|
||||
"published": "2025-04-10T03:15:18.727",
|
||||
"lastModified": "2025-04-10T03:15:18.727",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Dell PowerScale OneFS, versions 9.4.0.0 through 9.10.0.1, contains an incorrect authorization vulnerability. An unauthenticated attacker with local access could potentially exploit this vulnerability to access the cluster with previous privileges of a disabled user account."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security_alert@emc.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.0,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.0,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security_alert@emc.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-863"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.dell.com/support/kbdoc/en-us/000300860/dsa-2025-119-security-update-for-dell-powerscale-onefs-for-multiple-security-vulnerabilities",
|
||||
"source": "security_alert@emc.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2025/CVE-2025-264xx/CVE-2025-26479.json
Normal file
56
CVE-2025/CVE-2025-264xx/CVE-2025-26479.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-26479",
|
||||
"sourceIdentifier": "security_alert@emc.com",
|
||||
"published": "2025-04-10T03:15:18.893",
|
||||
"lastModified": "2025-04-10T03:15:18.893",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Dell PowerScale OneFS, versions 9.4.0.0 through 9.10.0.0, contains an out-of-bounds write vulnerability. An attacker could potentially exploit this vulnerability in NFS workflows, leading to data integrity issues."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security_alert@emc.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N",
|
||||
"baseScore": 3.1,
|
||||
"baseSeverity": "LOW",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.6,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security_alert@emc.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.dell.com/support/kbdoc/en-us/000300860/dsa-2025-119-security-update-for-dell-powerscale-onefs-for-multiple-security-vulnerabilities",
|
||||
"source": "security_alert@emc.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2025/CVE-2025-264xx/CVE-2025-26480.json
Normal file
56
CVE-2025/CVE-2025-264xx/CVE-2025-26480.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-26480",
|
||||
"sourceIdentifier": "security_alert@emc.com",
|
||||
"published": "2025-04-10T03:15:19.060",
|
||||
"lastModified": "2025-04-10T03:15:19.060",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Dell PowerScale OneFS, versions 9.5.0.0 through 9.10.0.0, contains an uncontrolled resource consumption vulnerability. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to denial of service."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security_alert@emc.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security_alert@emc.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-770"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.dell.com/support/kbdoc/en-us/000300860/dsa-2025-119-security-update-for-dell-powerscale-onefs-for-multiple-security-vulnerabilities",
|
||||
"source": "security_alert@emc.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2025/CVE-2025-276xx/CVE-2025-27690.json
Normal file
56
CVE-2025/CVE-2025-276xx/CVE-2025-27690.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-27690",
|
||||
"sourceIdentifier": "security_alert@emc.com",
|
||||
"published": "2025-04-10T03:15:19.210",
|
||||
"lastModified": "2025-04-10T03:15:19.210",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Dell PowerScale OneFS, versions 9.5.0.0 through 9.10.1.0, contains a use of default password vulnerability. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to the takeover of a high privileged user account."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security_alert@emc.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security_alert@emc.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-1393"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.dell.com/support/kbdoc/en-us/000300860/dsa-2025-119-security-update-for-dell-powerscale-onefs-for-multiple-security-vulnerabilities",
|
||||
"source": "security_alert@emc.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2025/CVE-2025-299xx/CVE-2025-29989.json
Normal file
56
CVE-2025/CVE-2025-299xx/CVE-2025-29989.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-29989",
|
||||
"sourceIdentifier": "security_alert@emc.com",
|
||||
"published": "2025-04-10T02:15:30.680",
|
||||
"lastModified": "2025-04-10T02:15:30.680",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Dell Client Platform BIOS contains a Security Version Number Mutable to Older Versions vulnerability. A high privileged attacker with local access could potentially exploit this vulnerability, leading to BIOS upgrade denial."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security_alert@emc.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:L",
|
||||
"baseScore": 3.1,
|
||||
"baseSeverity": "LOW",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 0.6,
|
||||
"impactScore": 2.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security_alert@emc.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-1328"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.dell.com/support/kbdoc/en-us/000250131/dsa-2025-016",
|
||||
"source": "security_alert@emc.com"
|
||||
}
|
||||
]
|
||||
}
|
72
CVE-2025/CVE-2025-327xx/CVE-2025-32728.json
Normal file
72
CVE-2025/CVE-2025-327xx/CVE-2025-32728.json
Normal file
@ -0,0 +1,72 @@
|
||||
{
|
||||
"id": "CVE-2025-32728",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-04-10T02:15:30.873",
|
||||
"lastModified": "2025-04-10T02:15:30.873",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In sshd in OpenSSH before 10.0, the DisableForwarding directive does not adhere to the documentation stating that it disables X11 and agent forwarding."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cve@mitre.org",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.5,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cve@mitre.org",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-440"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://ftp.openbsd.org/pub/OpenBSD/patches/7.6/common/013_ssh.patch.sig",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/openssh/openssh-portable/commit/fc86875e6acb36401dfc1dfb6b628a9d1460f367",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://lists.mindrot.org/pipermail/openssh-unix-dev/2025-April/041879.html",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.openssh.com/txt/release-10.0",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.openssh.com/txt/release-7.4",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
22
README.md
22
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2025-04-10T02:00:19.468177+00:00
|
||||
2025-04-10T04:00:19.534441+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2025-04-10T01:00:02.327000+00:00
|
||||
2025-04-10T03:15:19.210000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,22 +33,28 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
289450
|
||||
289459
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `0`
|
||||
Recently added CVEs: `9`
|
||||
|
||||
- [CVE-2024-58136](CVE-2024/CVE-2024-581xx/CVE-2024-58136.json) (`2025-04-10T03:15:17.767`)
|
||||
- [CVE-2025-22471](CVE-2025/CVE-2025-224xx/CVE-2025-22471.json) (`2025-04-10T03:15:18.430`)
|
||||
- [CVE-2025-23378](CVE-2025/CVE-2025-233xx/CVE-2025-23378.json) (`2025-04-10T03:15:18.577`)
|
||||
- [CVE-2025-26330](CVE-2025/CVE-2025-263xx/CVE-2025-26330.json) (`2025-04-10T03:15:18.727`)
|
||||
- [CVE-2025-26479](CVE-2025/CVE-2025-264xx/CVE-2025-26479.json) (`2025-04-10T03:15:18.893`)
|
||||
- [CVE-2025-26480](CVE-2025/CVE-2025-264xx/CVE-2025-26480.json) (`2025-04-10T03:15:19.060`)
|
||||
- [CVE-2025-27690](CVE-2025/CVE-2025-276xx/CVE-2025-27690.json) (`2025-04-10T03:15:19.210`)
|
||||
- [CVE-2025-29989](CVE-2025/CVE-2025-299xx/CVE-2025-29989.json) (`2025-04-10T02:15:30.680`)
|
||||
- [CVE-2025-32728](CVE-2025/CVE-2025-327xx/CVE-2025-32728.json) (`2025-04-10T02:15:30.873`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `3`
|
||||
Recently modified CVEs: `0`
|
||||
|
||||
- [CVE-2024-53150](CVE-2024/CVE-2024-531xx/CVE-2024-53150.json) (`2025-04-10T01:00:02.327`)
|
||||
- [CVE-2024-53197](CVE-2024/CVE-2024-531xx/CVE-2024-53197.json) (`2025-04-10T01:00:02.327`)
|
||||
- [CVE-2024-55354](CVE-2024/CVE-2024-553xx/CVE-2024-55354.json) (`2025-04-10T00:15:17.633`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
15
_state.csv
15
_state.csv
@ -274297,7 +274297,7 @@ CVE-2024-53147,0,0,a5545dbb75e1ea0355592ea9c5cbed6b78973df74296885178a65e66e3108
|
||||
CVE-2024-53148,0,0,4b9d4dc07b7bfc2792b42b5f67199b390604698146ea12cfd91f1c4f238361d1,2024-12-24T12:15:22.887000
|
||||
CVE-2024-53149,0,0,871a7de0af2c5f9581bb879b9201e108fc0359e1ac44fcd43474c16daa7bbc52,2025-01-09T16:16:21.097000
|
||||
CVE-2024-5315,0,0,de62440cce89ad88de968ec49c9b880f18005db9db6b2251d35eda1462970f6b,2025-03-04T17:03:49.377000
|
||||
CVE-2024-53150,0,1,a7b310b02490acfbae4d1e03befa9b7b1d499ca30746693cac9ae9505e9b7011,2025-04-10T01:00:02.327000
|
||||
CVE-2024-53150,0,0,a7b310b02490acfbae4d1e03befa9b7b1d499ca30746693cac9ae9505e9b7011,2025-04-10T01:00:02.327000
|
||||
CVE-2024-53151,0,0,9bcf302f86c516b6c3a19dba6dc2acf65ba01a50be814d57fdb94bd0b36b3601,2025-01-07T16:41:42.637000
|
||||
CVE-2024-53152,0,0,8c8f4f476264eba0a73ea6d3f2f2e87f1734a052b6ac9dc8cfbd62726a584cb9,2024-12-24T12:15:23.353000
|
||||
CVE-2024-53153,0,0,9da752cadb1a825f791ff9d8397e2b649ec7c58eaee650a673532728edacefc9,2024-12-24T12:15:23.467000
|
||||
@ -274346,7 +274346,7 @@ CVE-2024-53193,0,0,b333bf0a1ebcc5426b07d57cfd07b6541896ac5e32b864e7f63c26ca6841d
|
||||
CVE-2024-53194,0,0,537420a5dcc7a25d910b889c787ee26598d9e64505c29a9583444df6539bb260,2025-03-24T17:34:24.853000
|
||||
CVE-2024-53195,0,0,40822fada027fbaf05987cc9ce8f2e124b2f2431fd5b4c0d0b70ffbb4d2daafa,2024-12-27T14:15:27.137000
|
||||
CVE-2024-53196,0,0,669eac4dafb6edf221cee20cd1683d2b1f89e85f60c1d2407e34dd687651f534,2024-12-27T14:15:27.267000
|
||||
CVE-2024-53197,0,1,25a8015c8050f443250ca1592e4c7ea8e6ed77a4cd093343684eda943cac630e,2025-04-10T01:00:02.327000
|
||||
CVE-2024-53197,0,0,25a8015c8050f443250ca1592e4c7ea8e6ed77a4cd093343684eda943cac630e,2025-04-10T01:00:02.327000
|
||||
CVE-2024-53198,0,0,f76e0b82729683820652f1234ba21a690c649007ef042099a42d2c297481fc8c,2024-12-27T14:15:27.497000
|
||||
CVE-2024-53199,0,0,b7d164e48aa05e3c01fb8207aa331e220207154288cf87cf44ac3ccbb8685b3a,2025-01-08T21:29:46.280000
|
||||
CVE-2024-53200,0,0,382e2ed7c91ff816c9972e95788547d617ab94e25d45361504cd38a28e7c4e1f,2025-01-08T21:29:35.877000
|
||||
@ -275641,7 +275641,7 @@ CVE-2024-5533,0,0,6ea3c0edbbc0effb3cedc69539f40670649944720fc318b090494d3e8d8cf1
|
||||
CVE-2024-55341,0,0,32b88ffcace04987952e76982ddb2fabb1fdef0b8350ead9c1b3cbef3f8f04c7,2024-12-20T20:15:23.343000
|
||||
CVE-2024-55342,0,0,c1006192a9d35507b8ad981a4c836150dcbcd1afe702b76f0696b97fbea16a5c,2024-12-20T20:15:23.660000
|
||||
CVE-2024-5535,0,0,b70b433a28b7d7ab0e1d2beceba590e517cc88af55d524db84cbd7ff3afa5ee3,2024-11-21T09:47:53.090000
|
||||
CVE-2024-55354,0,1,24b1f2429bda7247ef87d74efe9fac09085c98cbd5de35fd2c7f2d75de2b93c9,2025-04-10T00:15:17.633000
|
||||
CVE-2024-55354,0,0,24b1f2429bda7247ef87d74efe9fac09085c98cbd5de35fd2c7f2d75de2b93c9,2025-04-10T00:15:17.633000
|
||||
CVE-2024-55355,0,0,2bb36a027cfc17a18c27f2dfa7ccd1dd7e44d92fe7cc55df027cf0c874369fc4,2025-01-08T01:15:07.297000
|
||||
CVE-2024-55356,0,0,24a1f90c25942035af99f5d3d7ecc4294dd5cf67c67caa2d1d5b1544ce44efca,2025-01-08T01:15:07.370000
|
||||
CVE-2024-5536,0,0,1f54d5f4d84e17ea150621a726d470a096ebe102b1b2c9727888baf5a5215c0e,2024-11-21T09:47:53.307000
|
||||
@ -277339,6 +277339,7 @@ CVE-2024-58130,0,0,b1da61426890522f6374bed5d854c2d8adfdac7556fa6282fde3bf2122dc7
|
||||
CVE-2024-58131,0,0,bc4908e979254be0dc1e1176cc36e7e2691904c3630b2abae16ce8f2a4516d81,2025-04-08T16:45:17.107000
|
||||
CVE-2024-58132,0,0,87fc99e96492ae47f7ae88aebc39cca10a37119d96d5c66e6cef7cf588ab7762,2025-04-07T14:17:50.220000
|
||||
CVE-2024-58133,0,0,4511afb6f4930bee53375abc516811f9928c158d8decf5ac029097e07f67929b,2025-04-07T14:17:50.220000
|
||||
CVE-2024-58136,1,1,c97d56961f170ef3b207f1eed51f0a2eff16c6f6e9a0a2d40f87ae30d7cd8370,2025-04-10T03:15:17.767000
|
||||
CVE-2024-5814,0,0,409f119643711fe465e9fd028af3caf838fd31e85495ee2ac73938edab3d7b3e,2024-08-28T12:57:39.090000
|
||||
CVE-2024-5815,0,0,aa6c60bd870ff05880c843bf9053a612a42ac0af7385b9bf8cbbf1b2da2f2182,2024-11-21T09:48:23.203000
|
||||
CVE-2024-5816,0,0,c490583764d2ee04b708da0ed821af6513ea115f0c316a2acec1e6bc5b69b75a,2024-11-21T09:48:23.347000
|
||||
@ -283914,6 +283915,7 @@ CVE-2025-22464,0,0,c7424f72b2f96418913aad9be4d15eb4eede55a90794f0ba18faa47df393f
|
||||
CVE-2025-22465,0,0,59af6a83f339492193c42e44605376f3bda5aed7d0edfb5b53dc78af273645e2,2025-04-08T18:13:53.347000
|
||||
CVE-2025-22466,0,0,022f7c654cc1d5121d6b3bf4597e41fb8ac9a9cb85997e032207daf34545cade,2025-04-08T18:13:53.347000
|
||||
CVE-2025-22467,0,0,8bd8bd517db848742ab03a7d28d508822057ab7be14ae3f2dcda13c476e2f133,2025-02-20T15:53:06.133000
|
||||
CVE-2025-22471,1,1,cbdd9e2556e650901b89f8a74ac4268eb176ef2406afa5af4a26d60b290ae954,2025-04-10T03:15:18.430000
|
||||
CVE-2025-22472,0,0,da7c2c2731a1940c60b4ae6c1edcbbf175ca5a2d3964a03701282be7a86cbe41,2025-03-17T18:15:20.930000
|
||||
CVE-2025-22473,0,0,24aeaee52dbfb2b3f71ea7cd4512b20455b60139bbfda5acf051e65598986ddc,2025-03-17T18:15:21.077000
|
||||
CVE-2025-22474,0,0,7b533493bb2abc45b140007b331f8e070e0d340fb26cfdfa2e4140f3e95b0dc2,2025-03-17T17:15:39.170000
|
||||
@ -284500,6 +284502,7 @@ CVE-2025-23368,0,0,3fba7751170fbf245919938130180b8631c2c01153566e23c5e60aa4599df
|
||||
CVE-2025-23369,0,0,74f04427c8261f575e3b46a10e2c572c85dddb2e090b01cedc0f322610f8f68b,2025-02-05T19:15:45.747000
|
||||
CVE-2025-2337,0,0,7d9e5607ad2b02dfc242a3305f849e66226e5392d822e3a7a605b0e9bacb542e,2025-03-17T15:15:44.983000
|
||||
CVE-2025-23374,0,0,dc7fc0938dfddbb9f9d96945d0cf484d16ace6397f0b6d455113dea4502470b2,2025-02-07T20:09:28.717000
|
||||
CVE-2025-23378,1,1,5792f1ed2441aba568a302b90913d64cf5452b36c951fa66dbe78656b90e7794,2025-04-10T03:15:18.577000
|
||||
CVE-2025-2338,0,0,d6a145ee9d99f0b331d4e327057f954207c4362f81df3d1dbf4d76a1b480aa57,2025-03-17T15:15:45.113000
|
||||
CVE-2025-23382,0,0,607dd91845211bbafd299e41a03d19f4efc365f4aee35f49c34ca976065bd66b,2025-03-19T16:15:30.787000
|
||||
CVE-2025-23383,0,0,05837481956a127d4906ec34da8ec9db5e9ce66a3b24e855c1d9d4962621e69f,2025-03-28T18:11:40.180000
|
||||
@ -286417,6 +286420,7 @@ CVE-2025-2632,0,0,96f0f9f4f7f851eba1c0fd78ad82e450d139d9699664c69c5779555eb96604
|
||||
CVE-2025-26320,0,0,2c7c4543047844dc51d38a0e0844ae377a705f600f7e38264bf4c89a9fa42fbb,2025-03-05T19:15:39.173000
|
||||
CVE-2025-26325,0,0,f233a1914d47e95e53a6a85e3edce01b96b7b4e30f0938bdbc0790a0c40f83bd,2025-02-28T22:15:39.927000
|
||||
CVE-2025-26326,0,0,a7b5315d9a8f318981baa1be6e3a967fc5e7b504545fab3a9d502474f652f3cd,2025-03-13T16:15:27.473000
|
||||
CVE-2025-26330,1,1,0f0c686d329d13961ef4d11ecbc9556ff0dd325101729167e4bd7d1e784ead5a,2025-04-10T03:15:18.727000
|
||||
CVE-2025-26331,0,0,40fd15c24d286e6245c507cb84784a759d8af1e37d77f53bdfddd636b05ec98b,2025-03-07T16:15:38.650000
|
||||
CVE-2025-26336,0,0,5827fed404bc6787282cb8dcdbd40edc21c9efeeca08da01ad215ced87cfa2ee,2025-03-27T16:08:17.900000
|
||||
CVE-2025-26339,0,0,7ef9dcda2637eaa8381f0c62a213393a7c2029d066112e960db3e0a470c75e63,2025-02-12T14:15:33.510000
|
||||
@ -286481,7 +286485,9 @@ CVE-2025-26466,0,0,7e41d5cb0f04df9b23d47e085939285815b80db61162a3634dbd18c39c71e
|
||||
CVE-2025-2647,0,0,31fe515a44f11cf9569f888e0a91d0a688196caf010a5ad274bf1696fe7f4f4e,2025-03-27T16:26:36.977000
|
||||
CVE-2025-26473,0,0,41b0bd46f32c6729eefb29a2666cce546dde395dd2362800539aebed7d4bc19a,2025-03-19T10:34:55.550000
|
||||
CVE-2025-26475,0,0,4c11595a9f53aaa25545570dfec450fa96951cf66b685488bd2989725dd8947f,2025-03-19T16:15:31.030000
|
||||
CVE-2025-26479,1,1,ce0bb1ef8fd890af2b3e0482a59c4605e2d57c8a9e041c3cfdff4d3dcbfd9c16,2025-04-10T03:15:18.893000
|
||||
CVE-2025-2648,0,0,1e0b04231e02c958d1daf764427fee60f2d862b5e2a1ea0533e27d2313cf49b2,2025-03-27T16:27:24.183000
|
||||
CVE-2025-26480,1,1,1b8ab2bfc1b880b8f03e164af03a1426065e1de2480afd0142d1cc9eb4eedae8,2025-04-10T03:15:19.060000
|
||||
CVE-2025-26485,0,0,1606c27211335fac5bd91d62ee9c69aaf84877e83ad554d60c27495ea9c75e60,2025-03-19T16:15:31.257000
|
||||
CVE-2025-26486,0,0,840914b82b00c0f3670423b9968b421b887ef974d79fc9288bc628a5718ff5ce,2025-03-19T16:15:31.457000
|
||||
CVE-2025-2649,0,0,191c49bce019fb615b89082bea79c0c05d302c1656bab7bb247fafa5eff783a5,2025-03-27T16:28:22.013000
|
||||
@ -287288,6 +287294,7 @@ CVE-2025-27684,0,0,240682932b2a460f603a664c7d08c6697d3ad68db39d84d7af33037bb7ea9
|
||||
CVE-2025-27685,0,0,f1cd2113ab987f8aa8854222629b62161d79f2c62b06433ec39fa30503650db2,2025-04-01T20:44:56.343000
|
||||
CVE-2025-27686,0,0,635054223b0053353c230dc9d9e43223ab0f82ff6e550632be15716e5de0310b,2025-04-07T14:17:50.220000
|
||||
CVE-2025-27688,0,0,37bfd097838352d3a2c81f7e24a7a0eef1d098aec6c34d136894861caf071b8f,2025-03-18T16:15:27.980000
|
||||
CVE-2025-27690,1,1,754e9d8b5230add83b48ff3510b8cdf34bd2749d8533b8460f427ab2ffa4abec,2025-04-10T03:15:19.210000
|
||||
CVE-2025-27692,0,0,1dbf11e4211dccb6352d5d29bb123fafd55385761259fd27d49ab92a879f0c91,2025-04-02T14:58:07.527000
|
||||
CVE-2025-27693,0,0,16d105cbb32fb801d6cf5e5dfc90ae8e01c7128a7f6a55fef4f354062bf75d26,2025-04-02T14:58:07.527000
|
||||
CVE-2025-27694,0,0,869d06c60976454eaafaca8c8a4d8339219d8edd8cae5f4fb37b5a87fc50e33e,2025-04-02T14:58:07.527000
|
||||
@ -287826,6 +287833,7 @@ CVE-2025-29985,0,0,2aeb5a8f8ec35aa18845c0d4af21956a36a7c943d3b098b90b6c6bf8f695e
|
||||
CVE-2025-29986,0,0,99c178153f6bbbad7e209292a65a7c4e43cf8706f8ea6bc3168202624c16c250,2025-04-08T18:13:53.347000
|
||||
CVE-2025-29987,0,0,962644397d15823d289c2ad8de7be5eae2dfe8787c0957eaa9f9d8409e9ed1a4,2025-04-07T14:18:34.453000
|
||||
CVE-2025-29988,0,0,fffff8af5716bb267ee4d5abcd24a0f0916ef33883d34ffbf12f21ae885514a4,2025-04-09T20:02:41.860000
|
||||
CVE-2025-29989,1,1,8dade0cc16afcfb65953bed646d1846d7a2490ba7c8d34ed699c8021955c56f0,2025-04-10T02:15:30.680000
|
||||
CVE-2025-2999,0,0,81444588dd7906e6c8cac51c6c8e57e7e231b44db369bc45695ecb3a2d560ed4,2025-04-01T20:26:22.890000
|
||||
CVE-2025-29991,0,0,40bf08e0cf4babdcbf62be0cd1c52dbd14323391ac7d7ab9cf689de3abb126a1,2025-04-07T14:18:34.453000
|
||||
CVE-2025-29993,0,0,5a3aa3d216416e2fe2b892d0a3793dacda985a3191a3f3e25b8b0846fab45986,2025-03-27T16:45:27.850000
|
||||
@ -289330,6 +289338,7 @@ CVE-2025-32692,0,0,c5377d751270c75bb15d28fe8902897bceed087aac59fc72b43d33627d156
|
||||
CVE-2025-32693,0,0,8b4c3ca6e5f78d8e905f61115dad2c0f8bfcead7073e277a4dfe0246c8f181ec,2025-04-09T20:02:41.860000
|
||||
CVE-2025-32694,0,0,c5323b32f99e8c9fc8ccc9989da14785a02c4cec59717fdc95787034e559d1d1,2025-04-09T20:02:41.860000
|
||||
CVE-2025-32695,0,0,d37a7a3802052ba2b179b04e772474f69fbfbf6cedd0f20f3383706ffa54c144,2025-04-09T20:02:41.860000
|
||||
CVE-2025-32728,1,1,9923765068f28ee8d641fe9ebffdc724554e8390950f0688a8c20af34af4f682,2025-04-10T02:15:30.873000
|
||||
CVE-2025-3285,0,0,e28a4e88da7ffb77ad01de08bcfd2b4a71d41180820a080f587b6350c35f9e48,2025-04-08T18:13:53.347000
|
||||
CVE-2025-3286,0,0,c247e4e94cc04e66afe391d63c6254a128435a66f18dde665fe78a6cdb0ab317,2025-04-08T18:13:53.347000
|
||||
CVE-2025-3287,0,0,bff258a343cd08a61757791ae0246a98daa5f12cd52be7d2e4f1314c24254af2,2025-04-08T18:13:53.347000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user