Auto-Update: 2025-03-11T15:00:20.452422+00:00

This commit is contained in:
cad-safe-bot 2025-03-11 15:03:50 +00:00
parent c391a86582
commit 505a797c64
63 changed files with 3352 additions and 248 deletions

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-46723",
"sourceIdentifier": "product-security@apple.com",
"published": "2023-02-27T20:15:13.020",
"lastModified": "2024-11-21T07:30:58.763",
"lastModified": "2025-03-11T14:15:16.430",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -45,6 +45,16 @@
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-22491",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-01-13T19:15:12.407",
"lastModified": "2024-11-21T07:44:54.943",
"lastModified": "2025-03-11T14:15:16.767",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -124,6 +124,14 @@
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://github.com/gatsbyjs/gatsby/security/advisories/GHSA-7ch4-rr99-cqcw",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-22752",
"sourceIdentifier": "security-alert@hpe.com",
"published": "2023-03-01T08:15:12.760",
"lastModified": "2024-11-21T07:45:21.440",
"lastModified": "2025-03-11T14:15:17.410",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -65,6 +65,16 @@
"value": "CWE-787"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-22753",
"sourceIdentifier": "security-alert@hpe.com",
"published": "2023-03-01T08:15:12.823",
"lastModified": "2024-11-21T07:45:21.560",
"lastModified": "2025-03-11T14:15:17.590",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -65,6 +65,16 @@
"value": "CWE-120"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-22763",
"sourceIdentifier": "security-alert@hpe.com",
"published": "2023-03-01T08:15:13.500",
"lastModified": "2024-11-21T07:45:22.727",
"lastModified": "2025-03-11T14:15:17.760",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -65,6 +65,16 @@
"value": "CWE-77"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-77"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-22764",
"sourceIdentifier": "security-alert@hpe.com",
"published": "2023-03-01T08:15:13.573",
"lastModified": "2024-11-21T07:45:22.847",
"lastModified": "2025-03-11T14:15:17.920",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -65,6 +65,16 @@
"value": "CWE-77"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-77"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-22765",
"sourceIdentifier": "security-alert@hpe.com",
"published": "2023-03-01T08:15:13.637",
"lastModified": "2024-11-21T07:45:22.970",
"lastModified": "2025-03-11T14:15:18.077",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -65,6 +65,16 @@
"value": "CWE-77"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-77"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-23496",
"sourceIdentifier": "product-security@apple.com",
"published": "2023-02-27T20:15:13.157",
"lastModified": "2024-11-21T07:46:18.143",
"lastModified": "2025-03-11T14:15:18.513",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -45,6 +45,16 @@
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-23497",
"sourceIdentifier": "product-security@apple.com",
"published": "2023-02-27T20:15:13.220",
"lastModified": "2024-11-21T07:46:18.280",
"lastModified": "2025-03-11T14:15:18.680",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -45,6 +45,16 @@
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-269"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-23499",
"sourceIdentifier": "product-security@apple.com",
"published": "2023-02-27T20:15:13.353",
"lastModified": "2024-11-21T07:46:18.507",
"lastModified": "2025-03-11T14:15:18.913",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -45,6 +45,16 @@
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-23500",
"sourceIdentifier": "product-security@apple.com",
"published": "2023-02-27T20:15:13.423",
"lastModified": "2024-11-21T07:46:18.620",
"lastModified": "2025-03-11T14:15:19.060",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -45,6 +45,16 @@
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-3317",
"sourceIdentifier": "secalert@redhat.com",
"published": "2023-06-23T18:15:14.047",
"lastModified": "2024-11-21T08:16:59.953",
"lastModified": "2025-03-11T14:15:19.697",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 5.2
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.2
}
]
},

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-0681",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-03-13T16:15:12.767",
"lastModified": "2024-11-21T08:47:08.380",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-03-11T13:33:45.277",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -39,22 +39,64 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:miniorange:page_restriction:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "1.3.5",
"matchCriteriaId": "BF7830C6-9B48-4520-9699-DC99B77486DD"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3034414%40page-and-post-restriction&new=3034414%40page-and-post-restriction&sfp_email=&sfph_mail=",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Patch"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/a3e33a5c-df7c-4ef5-a59c-1c31abcda6d1?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3034414%40page-and-post-restriction&new=3034414%40page-and-post-restriction&sfp_email=&sfph_mail=",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/a3e33a5c-df7c-4ef5-a59c-1c31abcda6d1?source=cve",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-0687",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-03-13T16:15:13.203",
"lastModified": "2024-11-21T08:47:08.990",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-03-11T13:32:08.780",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -39,22 +39,64 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:dev.institute:restrict_user_access:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "2.6",
"matchCriteriaId": "93CDB255-CFCE-4B2B-A8C1-8CEA459A2649"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3037773%40restrict-user-access%2Ftrunk&old=3010745%40restrict-user-access%2Ftrunk&sfp_email=&sfph_mail=",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Patch"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/f67684cd-3e0f-48bb-967a-16ea2b027843?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3037773%40restrict-user-access%2Ftrunk&old=3010745%40restrict-user-access%2Ftrunk&sfp_email=&sfph_mail=",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/f67684cd-3e0f-48bb-967a-16ea2b027843?source=cve",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-0700",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-03-13T16:15:13.403",
"lastModified": "2024-11-21T08:47:10.523",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-03-11T13:30:56.303",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,33 +36,101 @@
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wokamoto:simple_tweet:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "1.4.0.2",
"matchCriteriaId": "FC9F67DE-35E1-467A-9161-5D3E95CE19C9"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/wTeBwAA/PoC-SimpleTweet/blob/main/POST-request",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Broken Link"
]
},
{
"url": "https://wordpress.org/plugins/simple-tweet/",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/a5da021c-3835-4251-a3e5-3b5aaa11ea14?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://github.com/wTeBwAA/PoC-SimpleTweet/blob/main/POST-request",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
]
},
{
"url": "https://wordpress.org/plugins/simple-tweet/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/a5da021c-3835-4251-a3e5-3b5aaa11ea14?source=cve",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-0827",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-03-13T16:15:13.610",
"lastModified": "2024-11-21T08:47:27.590",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-03-11T13:30:12.340",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,25 +36,87 @@
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hammadh:play.ht:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "3.6.4",
"matchCriteriaId": "4392A740-4FCA-4174-B266-A3F2BAB9DD14"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/play-ht/trunk/includes/class-ajax-handler.php",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/de112e5a-4b92-4389-8c6e-b2bfeb6f6cd4?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://plugins.trac.wordpress.org/browser/play-ht/trunk/includes/class-ajax-handler.php",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/de112e5a-4b92-4389-8c6e-b2bfeb6f6cd4?source=cve",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-0828",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-03-13T16:15:13.833",
"lastModified": "2024-11-21T08:47:27.710",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-03-11T13:29:49.430",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,25 +36,87 @@
},
"exploitabilityScore": 2.8,
"impactScore": 2.5
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hammadh:play.ht:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "3.6.4",
"matchCriteriaId": "4392A740-4FCA-4174-B266-A3F2BAB9DD14"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/play-ht/trunk/includes/class-ajax-handler.php",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/5708a414-7cd8-4926-8871-3248ebf4c39d?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://plugins.trac.wordpress.org/browser/play-ht/trunk/includes/class-ajax-handler.php",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/5708a414-7cd8-4926-8871-3248ebf4c39d?source=cve",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-0829",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-03-13T16:15:14.067",
"lastModified": "2024-11-21T08:47:27.827",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-03-11T13:28:57.287",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -39,30 +39,78 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:najeebmedia:comments_extra_fields:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "5.1",
"matchCriteriaId": "2CA28999-E655-4FA8-8B27-C49629560044"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/wp-comment-fields/trunk/classes/admin.class.php",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3040734%40wp-comment-fields%2Ftrunk&old=3039523%40wp-comment-fields%2Ftrunk&sfp_email=&sfph_mail=",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Patch"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/cc5754c2-a052-41ac-af19-7c4f55860f95?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://plugins.trac.wordpress.org/browser/wp-comment-fields/trunk/classes/admin.class.php",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
]
},
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3040734%40wp-comment-fields%2Ftrunk&old=3039523%40wp-comment-fields%2Ftrunk&sfp_email=&sfph_mail=",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/cc5754c2-a052-41ac-af19-7c4f55860f95?source=cve",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-0830",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-03-13T16:15:14.307",
"lastModified": "2024-11-21T08:47:27.947",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-03-11T13:28:31.400",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,33 +36,101 @@
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:najeebmedia:comments_extra_fields:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "5.1",
"matchCriteriaId": "2CA28999-E655-4FA8-8B27-C49629560044"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/wp-comment-fields/trunk/classes/admin.class.php",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3040734%40wp-comment-fields%2Ftrunk&old=3039523%40wp-comment-fields%2Ftrunk&sfp_email=&sfph_mail=",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Patch"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/8ea53b11-37fa-4c45-a158-5a7709b842fc?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://plugins.trac.wordpress.org/browser/wp-comment-fields/trunk/classes/admin.class.php",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
]
},
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3040734%40wp-comment-fields%2Ftrunk&old=3039523%40wp-comment-fields%2Ftrunk&sfp_email=&sfph_mail=",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/8ea53b11-37fa-4c45-a158-5a7709b842fc?source=cve",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-0839",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-03-13T16:15:14.537",
"lastModified": "2024-11-21T08:47:29.143",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-03-11T13:25:38.507",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -39,22 +39,64 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-639"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:feedwordpress_project:feedwordpress:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "2024.0428",
"matchCriteriaId": "A18FF440-C6F6-4646-8D82-2902526CC456"
}
]
}
]
}
],
"references": [
{
"url": "https://wordpress.org/plugins/feedwordpress/",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/1ead46fd-5744-4fbb-9efd-980f9216abbc?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://wordpress.org/plugins/feedwordpress/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/1ead46fd-5744-4fbb-9efd-980f9216abbc?source=cve",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-0898",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-03-13T16:15:15.593",
"lastModified": "2024-11-21T08:47:38.930",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-03-11T13:21:21.240",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,25 +36,87 @@
},
"exploitabilityScore": 1.3,
"impactScore": 2.7
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:bluecoral:chat_bubble:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "2.3",
"matchCriteriaId": "7382E975-FE03-4C45-8797-F03BD864E606"
}
]
}
]
}
],
"references": [
{
"url": "https://wordpress.org/plugins/chat-bubble/",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/a56772fd-f77f-4ba5-b5c4-79ac8204b599?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://wordpress.org/plugins/chat-bubble/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/a56772fd-f77f-4ba5-b5c4-79ac8204b599?source=cve",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-1083",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-03-13T16:15:16.940",
"lastModified": "2024-11-21T08:49:45.600",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-03-11T13:20:23.640",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -39,22 +39,64 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wpchill:simple_restrict:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "1.2.7",
"matchCriteriaId": "633864E5-0CDF-440B-9B83-915F0B56899B"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3035727%40simple-restrict&new=3035727%40simple-restrict&sfp_email=&sfph_mail=",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Patch"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/65963ce0-6589-4753-837c-14ef37a1a9e3?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3035727%40simple-restrict&new=3035727%40simple-restrict&sfp_email=&sfph_mail=",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/65963ce0-6589-4753-837c-14ef37a1a9e3?source=cve",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-1158",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-03-13T16:15:17.740",
"lastModified": "2024-11-21T08:49:55.723",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-03-11T13:18:18.670",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -39,30 +39,78 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:themekraft:buddyforms:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "2.8.8",
"matchCriteriaId": "4BEF66A8-FC6E-4771-95A0-C692068FB670"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/buddyforms/trunk/includes/admin/admin-ajax.php?rev=2820257#L80",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3046092%40buddyforms%2Ftrunk&old=3031945%40buddyforms%2Ftrunk&sfp_email=&sfph_mail=",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Patch"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/198cb3bb-73fe-45ae-b8e0-b7ee8dda9547?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://plugins.trac.wordpress.org/browser/buddyforms/trunk/includes/admin/admin-ajax.php?rev=2820257#L80",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
]
},
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3046092%40buddyforms%2Ftrunk&old=3031945%40buddyforms%2Ftrunk&sfp_email=&sfph_mail=",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/198cb3bb-73fe-45ae-b8e0-b7ee8dda9547?source=cve",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-12546",
"sourceIdentifier": "infosec@edk2.groups.io",
"published": "2025-03-11T14:15:20.210",
"lastModified": "2025-03-11T14:15:20.210",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "EDK2 contains a vulnerability in BIOS where a user may cause an Integer Overflow or Wraparound by network means. A successful exploitation of this vulnerability may lead to denial of service."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "infosec@edk2.groups.io",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:L",
"baseScore": 3.5,
"baseSeverity": "LOW",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 0.9,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "infosec@edk2.groups.io",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-190"
}
]
}
],
"references": [
{
"url": "https://9443417.fs1.hubspotusercontent-na1.net/hubfs/9443417/Security%20Advisories/2025/AMI-SA-2025003.pdf",
"source": "infosec@edk2.groups.io"
}
]
}

View File

@ -2,16 +2,55 @@
"id": "CVE-2024-13853",
"sourceIdentifier": "contact@wpscan.com",
"published": "2025-03-11T06:15:26.177",
"lastModified": "2025-03-11T06:15:26.177",
"lastModified": "2025-03-11T14:15:20.417",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The SEO Tools WordPress plugin through 4.0.7 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin"
},
{
"lang": "es",
"value": "El complemento SEO Tools WordPress hasta la versi\u00f3n 4.0.7 no depura ni escapa un par\u00e1metro antes de mostrarlo nuevamente en la p\u00e1gina, lo que genera un Cross-Site Scripting reflejado que podr\u00eda usarse contra usuarios con privilegios elevados, como el administrador."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://wpscan.com/vulnerability/52991dd9-41f7-4cf8-b8c9-56dd4e62bf0c/",

View File

@ -2,20 +2,51 @@
"id": "CVE-2024-13864",
"sourceIdentifier": "contact@wpscan.com",
"published": "2025-03-11T06:15:26.407",
"lastModified": "2025-03-11T06:15:26.407",
"lastModified": "2025-03-11T14:15:20.570",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Countdown Timer WordPress plugin through 1.0 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin"
},
{
"lang": "es",
"value": "El complemento Countdown Timer de WordPress hasta la versi\u00f3n 1.0 no depura ni escapa un par\u00e1metro antes de mostrarlo nuevamente en la p\u00e1gina, lo que genera un Cross-Site Scripting reflejado que podr\u00eda usarse contra usuarios con privilegios altos, como el administrador."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.7
}
]
},
"references": [
{
"url": "https://wpscan.com/vulnerability/b95b32b6-218a-4d02-b294-ab13458006b2/",
"source": "contact@wpscan.com"
},
{
"url": "https://wpscan.com/vulnerability/b95b32b6-218a-4d02-b294-ab13458006b2/",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-13873",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-02-22T04:15:09.567",
"lastModified": "2025-02-22T04:15:09.567",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-03-11T13:32:22.040",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -19,6 +19,26 @@
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
@ -51,14 +71,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wpjobportal:wp_job_portal:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "2.2.9",
"matchCriteriaId": "30FC05A7-99B6-45E6-AD44-D0767612D35D"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/changeset/3242653/wp-job-portal/tags/2.2.9/includes/classes/uploads.php?old=3238353&old_path=wp-job-portal%2Ftags%2F2.2.8%2Fincludes%2Fclasses%2Fuploads.php",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Patch"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/5fdba3c5-382e-4d2b-83d8-0e0cebf2e63c?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-13899",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-02-22T04:15:09.720",
"lastModified": "2025-02-22T04:15:09.720",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-03-11T13:26:57.550",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -49,16 +49,49 @@
"value": "CWE-502"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-502"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:misterpah:mambo_joomla_importer:1.0:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "24192B97-AB2C-4712-B126-906AE92BD57D"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/mambo-joomla-importer/trunk/mamboImporter.php#L45",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/b6d448c2-5acc-47f8-8e86-9ef10fa01513?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-1889",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2024-02-26T16:27:55.130",
"lastModified": "2025-02-27T22:03:40.670",
"lastModified": "2025-03-11T14:51:56.797",
"vulnStatus": "Analyzed",
"cveTags": [
{
@ -43,6 +43,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
@ -68,8 +88,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:sma:cluster_controller_firmware:01.05.01.r:*:*:*:*:*:*:*",
"matchCriteriaId": "6E2BB85F-7076-4D12-8CBF-0E8650AAB57F"
"criteria": "cpe:2.3:o:sma:clcon-10_firmware:01.05.01.r:*:*:*:*:*:*:*",
"matchCriteriaId": "6B8081E6-3552-4C2E-9516-E7B36C187E8F"
}
]
},
@ -79,8 +99,8 @@
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:sma:cluster_controller:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E1500ED2-1170-47D6-AF56-81B2A5777EEC"
"criteria": "cpe:2.3:h:sma:clcon-10:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EFF09E8B-0A45-4D7C-8358-63DB482FFDB5"
}
]
}
@ -95,9 +115,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:sma:sunny_webbox_firmware:*:*:*:*:*:*:*:*",
"versionEndIncluding": "1.61",
"matchCriteriaId": "8AA41F6C-CC24-497B-99E5-F6F4205D0364"
"criteria": "cpe:2.3:o:sma:clcon-s-10_firmware:01.05.01.r:*:*:*:*:*:*:*",
"matchCriteriaId": "9FD528CC-B088-439A-84BE-1BA137094459"
}
]
},
@ -107,8 +126,8 @@
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:sma:sunny_webbox:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0E1D0797-846A-436A-BBEA-EA222E826CBF"
"criteria": "cpe:2.3:h:sma:clcon-s-10:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6660909E-9E7C-4BB6-B470-D6AA9376AF58"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-1890",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2024-02-26T16:27:55.340",
"lastModified": "2025-02-27T22:03:40.670",
"lastModified": "2025-03-11T14:51:33.223",
"vulnStatus": "Analyzed",
"cveTags": [
{
@ -79,33 +79,6 @@
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:sma:cluster_controller_firmware:01.05.01.r:*:*:*:*:*:*:*",
"matchCriteriaId": "6E2BB85F-7076-4D12-8CBF-0E8650AAB57F"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:sma:cluster_controller:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E1500ED2-1170-47D6-AF56-81B2A5777EEC"
}
]
}
]
},
{
"operator": "AND",
"nodes": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-2546",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-03-17T02:15:06.190",
"lastModified": "2025-01-27T17:05:46.703",
"lastModified": "2025-03-11T14:07:31.350",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@ -42,19 +42,19 @@
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
@ -116,8 +116,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:tenda:ac18_firmware:15.03.07.09:*:*:*:*:*:*:*",
"matchCriteriaId": "7F318BF3-E1D1-4FDF-8016-8B8E1790BD1C"
"criteria": "cpe:2.3:o:tenda:ac18_firmware:15.13.07.09:*:*:*:*:*:*:*",
"matchCriteriaId": "B8C468F9-C992-49D5-84D8-F64CE4AF4D3F"
}
]
},

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-43196",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2025-02-20T04:15:09.630",
"lastModified": "2025-02-20T04:15:09.630",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-11T14:57:13.920",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -49,12 +49,68 @@
"value": "CWE-296"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:openpages_with_watson:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.3",
"versionEndExcluding": "8.3.0.3",
"matchCriteriaId": "2F71A33D-AF4E-4480-A4C2-2C73DBA1B967"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:openpages_with_watson:*:*:*:*:*:*:*:*",
"versionStartIncluding": "9.0",
"versionEndExcluding": "9.0.0.5",
"matchCriteriaId": "C36C16B7-9740-4060-BCF4-3270CE3176B1"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
}
]
}
]
}
],
"references": [
{
"url": "https://www.ibm.com/support/pages/node/7183541",
"source": "psirt@us.ibm.com"
"source": "psirt@us.ibm.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,16 +2,55 @@
"id": "CVE-2024-44192",
"sourceIdentifier": "product-security@apple.com",
"published": "2025-03-10T19:15:38.080",
"lastModified": "2025-03-10T19:15:38.080",
"lastModified": "2025-03-11T14:15:22.503",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The issue was addressed with improved checks. This issue is fixed in watchOS 11, macOS Sequoia 15, Safari 18, visionOS 2, iOS 18 and iPadOS 18, tvOS 18. Processing maliciously crafted web content may lead to an unexpected process crash."
},
{
"lang": "es",
"value": "El problema se solucion\u00f3 con comprobaciones mejoradas. Este problema se solucion\u00f3 en watchOS 11, macOS Sequoia 15, Safari 18, visionOS 2, iOS 18, iPadOS 18 y tvOS 18. El procesamiento de contenido web manipulado con fines malintencionados puede provocar un bloqueo inesperado del proceso."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-400"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/121238",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-49337",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2025-02-20T12:15:09.293",
"lastModified": "2025-02-20T12:15:09.293",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-11T14:06:18.787",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -19,6 +19,26 @@
"cvssMetricV31": [
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
@ -49,12 +69,68 @@
"value": "CWE-80"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:openpages_with_watson:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.3",
"versionEndExcluding": "8.3.0.3",
"matchCriteriaId": "2F71A33D-AF4E-4480-A4C2-2C73DBA1B967"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:openpages_with_watson:*:*:*:*:*:*:*:*",
"versionStartIncluding": "9.0",
"versionEndExcluding": "9.0.0.5",
"matchCriteriaId": "C36C16B7-9740-4060-BCF4-3270CE3176B1"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
}
]
}
]
}
],
"references": [
{
"url": "https://www.ibm.com/support/pages/node/7183541",
"source": "psirt@us.ibm.com"
"source": "psirt@us.ibm.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-49344",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2025-02-20T12:15:10.377",
"lastModified": "2025-02-20T12:15:10.377",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-11T14:02:39.433",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -19,6 +19,26 @@
"cvssMetricV31": [
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
@ -51,10 +71,56 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:openpages_with_watson:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.3",
"versionEndExcluding": "8.3.0.3",
"matchCriteriaId": "2F71A33D-AF4E-4480-A4C2-2C73DBA1B967"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:openpages_with_watson:*:*:*:*:*:*:*:*",
"versionStartIncluding": "9.0",
"versionEndExcluding": "9.0.0.5",
"matchCriteriaId": "C36C16B7-9740-4060-BCF4-3270CE3176B1"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
}
]
}
]
}
],
"references": [
{
"url": "https://www.ibm.com/support/pages/node/7183541",
"source": "psirt@us.ibm.com"
"source": "psirt@us.ibm.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-49355",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2025-02-20T04:15:10.670",
"lastModified": "2025-02-20T04:15:10.670",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-11T14:51:01.153",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -19,7 +19,7 @@
"cvssMetricV31": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N",
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.6,
"impactScore": 3.6
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
@ -49,12 +69,68 @@
"value": "CWE-117"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-116"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:openpages_with_watson:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.3",
"versionEndExcluding": "8.3.0.3",
"matchCriteriaId": "2F71A33D-AF4E-4480-A4C2-2C73DBA1B967"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:openpages_with_watson:*:*:*:*:*:*:*:*",
"versionStartIncluding": "9.0",
"versionEndExcluding": "9.0.0.5",
"matchCriteriaId": "C36C16B7-9740-4060-BCF4-3270CE3176B1"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
}
]
}
]
}
],
"references": [
{
"url": "https://www.ibm.com/support/pages/node/7183541",
"source": "psirt@us.ibm.com"
"source": "psirt@us.ibm.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-49779",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2025-02-20T12:15:10.527",
"lastModified": "2025-02-20T12:15:10.527",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-11T13:55:21.797",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -19,7 +19,7 @@
"cvssMetricV31": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
@ -51,10 +71,56 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:openpages_with_watson:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.3",
"versionEndExcluding": "8.3.0.3",
"matchCriteriaId": "2F71A33D-AF4E-4480-A4C2-2C73DBA1B967"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:openpages_with_watson:*:*:*:*:*:*:*:*",
"versionStartIncluding": "9.0",
"versionEndExcluding": "9.0.0.5",
"matchCriteriaId": "C36C16B7-9740-4060-BCF4-3270CE3176B1"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
}
]
}
]
}
],
"references": [
{
"url": "https://www.ibm.com/support/pages/node/7183541",
"source": "psirt@us.ibm.com"
"source": "psirt@us.ibm.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-49780",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2025-02-20T04:15:10.827",
"lastModified": "2025-02-20T12:15:10.657",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-11T14:37:00.743",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.6,
"impactScore": 3.6
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
@ -51,10 +71,56 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:openpages_with_watson:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.3",
"versionEndExcluding": "8.3.0.3",
"matchCriteriaId": "2F71A33D-AF4E-4480-A4C2-2C73DBA1B967"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:openpages_with_watson:*:*:*:*:*:*:*:*",
"versionStartIncluding": "9.0",
"versionEndExcluding": "9.0.0.5",
"matchCriteriaId": "C36C16B7-9740-4060-BCF4-3270CE3176B1"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
}
]
}
]
}
],
"references": [
{
"url": "https://www.ibm.com/support/pages/node/7183541",
"source": "psirt@us.ibm.com"
"source": "psirt@us.ibm.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-49781",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2025-02-20T12:15:10.747",
"lastModified": "2025-02-20T12:15:10.747",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-11T13:45:47.917",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,56 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:openpages_with_watson:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.3",
"versionEndExcluding": "8.3.0.3",
"matchCriteriaId": "2F71A33D-AF4E-4480-A4C2-2C73DBA1B967"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:openpages_with_watson:*:*:*:*:*:*:*:*",
"versionStartIncluding": "9.0",
"versionEndExcluding": "9.0.0.5",
"matchCriteriaId": "C36C16B7-9740-4060-BCF4-3270CE3176B1"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
}
]
}
]
}
],
"references": [
{
"url": "https://www.ibm.com/support/pages/node/7183541",
"source": "psirt@us.ibm.com"
"source": "psirt@us.ibm.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-49782",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2025-02-20T04:15:10.973",
"lastModified": "2025-02-20T04:15:10.973",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-11T14:19:11.780",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -19,7 +19,7 @@
"cvssMetricV31": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H",
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.6,
"impactScore": 5.2
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L",
"baseScore": 8.2,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 3.9,
"impactScore": 4.2
}
]
},
@ -49,12 +69,68 @@
"value": "CWE-297"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-295"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:openpages_with_watson:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.3",
"versionEndExcluding": "8.3.0.3",
"matchCriteriaId": "2F71A33D-AF4E-4480-A4C2-2C73DBA1B967"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:openpages_with_watson:*:*:*:*:*:*:*:*",
"versionStartIncluding": "9.0",
"versionEndExcluding": "9.0.0.5",
"matchCriteriaId": "C36C16B7-9740-4060-BCF4-3270CE3176B1"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
}
]
}
]
}
],
"references": [
{
"url": "https://www.ibm.com/support/pages/node/7183541",
"source": "psirt@us.ibm.com"
"source": "psirt@us.ibm.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-54084",
"sourceIdentifier": "biossecurity@ami.com",
"published": "2025-03-11T14:15:22.730",
"lastModified": "2025-03-11T14:15:22.730",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "APTIOV contains a vulnerability in BIOS where an attacker may cause a Time-of-check Time-of-use (TOCTOU) Race Condition by local means. Successful exploitation of this vulnerability may lead to arbitrary code execution."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "biossecurity@ami.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 0.8,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "biossecurity@ami.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-367"
}
]
}
],
"references": [
{
"url": "https://go.ami.com/hubfs/Security%20Advisories/2025/AMI-SA-2025003.pdf",
"source": "biossecurity@ami.com"
}
]
}

View File

@ -0,0 +1,78 @@
{
"id": "CVE-2024-54085",
"sourceIdentifier": "biossecurity@ami.com",
"published": "2025-03-11T14:15:22.893",
"lastModified": "2025-03-11T14:15:22.893",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "AMI\u2019s SPx contains\na vulnerability in the BMC where an Attacker may bypass authentication remotely through the Redfish Host Interface. A successful exploitation\nof this vulnerability may lead to a loss of confidentiality, integrity, and/or\navailability."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "biossecurity@ami.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 10.0,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnAvailabilityImpact": "HIGH",
"subConfidentialityImpact": "HIGH",
"subIntegrityImpact": "HIGH",
"subAvailabilityImpact": "HIGH",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "biossecurity@ami.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-290"
}
]
}
],
"references": [
{
"url": "https://go.ami.com/hubfs/Security%20Advisories/2025/AMI-SA-2025003.pdf",
"source": "biossecurity@ami.com"
}
]
}

View File

@ -2,16 +2,55 @@
"id": "CVE-2024-54469",
"sourceIdentifier": "product-security@apple.com",
"published": "2025-03-10T19:15:38.493",
"lastModified": "2025-03-10T19:15:38.493",
"lastModified": "2025-03-11T14:15:23.030",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The issue was addressed with improved checks. This issue is fixed in macOS Ventura 13.7, macOS Sequoia 15, macOS Sonoma 14.7, visionOS 2, iOS 18 and iPadOS 18. A local user may be able to leak sensitive user information."
},
{
"lang": "es",
"value": "El problema se solucion\u00f3 con comprobaciones mejoradas. Este problema se solucion\u00f3 en macOS Ventura 13.7, macOS Sequoia 15, macOS Sonoma 14.7, visionOS 2, iOS 18 y iPadOS 18. Un usuario local podr\u00eda filtrar informaci\u00f3n confidencial del usuario."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/121234",

View File

@ -2,16 +2,55 @@
"id": "CVE-2024-54473",
"sourceIdentifier": "product-security@apple.com",
"published": "2025-03-10T19:15:38.600",
"lastModified": "2025-03-10T19:15:38.600",
"lastModified": "2025-03-11T14:15:23.210",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "This issue was addressed with improved redaction of sensitive information. This issue is fixed in macOS Sequoia 15. An app may be able to access user-sensitive data."
},
{
"lang": "es",
"value": "Este problema se solucion\u00f3 con una redacci\u00f3n mejorada de informaci\u00f3n confidencial. Este problema se solucion\u00f3 en macOS Sequoia 15. Una aplicaci\u00f3n puede tener acceso a datos confidenciales del usuario."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/121238",

View File

@ -2,16 +2,55 @@
"id": "CVE-2024-54560",
"sourceIdentifier": "product-security@apple.com",
"published": "2025-03-10T19:15:38.883",
"lastModified": "2025-03-10T19:15:38.883",
"lastModified": "2025-03-11T14:15:23.417",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A logic issue was addressed with improved checks. This issue is fixed in iOS 18 and iPadOS 18, watchOS 11, tvOS 18, macOS Sequoia 15. A malicious app may be able to modify other apps without having App Management permission."
},
{
"lang": "es",
"value": "Se solucion\u00f3 un problema de l\u00f3gica con comprobaciones mejoradas. Este problema se solucion\u00f3 en iOS 18 y iPadOS 18, watchOS 11, tvOS 18 y macOS Sequoia 15. Una aplicaci\u00f3n malintencionada podr\u00eda modificar otras aplicaciones sin tener permiso de Administraci\u00f3n de aplicaciones."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-269"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/121238",

View File

@ -2,20 +2,51 @@
"id": "CVE-2025-0629",
"sourceIdentifier": "contact@wpscan.com",
"published": "2025-03-11T06:15:26.513",
"lastModified": "2025-03-11T06:15:26.513",
"lastModified": "2025-03-11T14:15:24.090",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Coronavirus (COVID-19) Notice Message WordPress plugin through 1.1.2 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)."
},
{
"lang": "es",
"value": "El complemento Coronavirus (COVID-19) Notice Message de WordPress hasta la versi\u00f3n 1.1.2 no depura ni escapa a algunas de sus configuraciones, lo que podr\u00eda permitir que usuarios con altos privilegios como el administrador realicen ataques de cross-site scripting almacenado incluso cuando la capacidad unfiltered_html no est\u00e1 permitida (por ejemplo, en una configuraci\u00f3n de varios sitios)."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
}
]
},
"references": [
{
"url": "https://wpscan.com/vulnerability/39c36d6d-5522-422b-b890-524e27e67f7c/",
"source": "contact@wpscan.com"
},
{
"url": "https://wpscan.com/vulnerability/39c36d6d-5522-422b-b890-524e27e67f7c/",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -2,20 +2,47 @@
"id": "CVE-2025-2136",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2025-03-10T21:15:40.730",
"lastModified": "2025-03-10T21:15:40.730",
"lastModified": "2025-03-11T14:15:26.553",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Use after free in Inspector in Google Chrome prior to 134.0.6998.88 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)"
},
{
"lang": "es",
"value": "El uso posterior a la liberaci\u00f3n en Inspector en Google Chrome anterior a la versi\u00f3n 134.0.6998.88 permit\u00eda a un atacante remoto explotar potencialmente la corrupci\u00f3n del mont\u00f3n a trav\u00e9s de una p\u00e1gina HTML manipulada. (Gravedad de seguridad de Chromium: media)"
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "chrome-cve-admin@google.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",

View File

@ -2,20 +2,47 @@
"id": "CVE-2025-2137",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2025-03-10T21:15:40.857",
"lastModified": "2025-03-10T21:15:40.857",
"lastModified": "2025-03-11T14:15:26.737",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Out of bounds read in V8 in Google Chrome prior to 134.0.6998.88 allowed a remote attacker to perform out of bounds memory access via a crafted HTML page. (Chromium security severity: Medium)"
},
{
"lang": "es",
"value": "La lectura fuera de los l\u00edmites en la versi\u00f3n 8 de Google Chrome anterior a la 134.0.6998.88 permit\u00eda a un atacante remoto realizar un acceso a la memoria fuera de los l\u00edmites a trav\u00e9s de una p\u00e1gina HTML manipulada. (Gravedad de seguridad de Chromium: media)"
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "chrome-cve-admin@google.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",

View File

@ -2,16 +2,43 @@
"id": "CVE-2025-2190",
"sourceIdentifier": "907edf6c-bf03-423e-ab1a-8da27e1aa1ea",
"published": "2025-03-11T07:15:37.950",
"lastModified": "2025-03-11T07:15:37.950",
"lastModified": "2025-03-11T14:15:27.163",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The mobile application (com.transsnet.store) has a man-in-the-middle attack vulnerability, which may lead to code injection risks."
},
{
"lang": "es",
"value": "La aplicaci\u00f3n m\u00f3vil (com.transsnet.store) tiene una vulnerabilidad de ataque man-in-the-middle, que puede generar riesgos de inyecci\u00f3n de c\u00f3digo."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.2,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "907edf6c-bf03-423e-ab1a-8da27e1aa1ea",

View File

@ -0,0 +1,137 @@
{
"id": "CVE-2025-2192",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-03-11T13:15:43.780",
"lastModified": "2025-03-11T14:15:27.443",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as problematic, was found in Stoque Zeev.it 4.24. This affects an unknown part of the file /Login?inpLostSession=1 of the component Login Page. The manipulation of the argument inpRedirectURL leads to server-side request forgery. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "PASSIVE",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "NONE",
"vulnAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"baseScore": 4.3,
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-918"
}
]
}
],
"references": [
{
"url": "https://drive.google.com/file/d/17QAEbzVIjTUj8FDOVMwfl9-7j8LRcK4V/view?usp=sharing",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.299217",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.299217",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.511708",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,141 @@
{
"id": "CVE-2025-2193",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-03-11T13:15:43.997",
"lastModified": "2025-03-11T14:15:27.630",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been found in MRCMS 3.1.2 and classified as critical. This vulnerability affects the function delete of the file /admin/file/delete.do of the component org.marker.mushroom.controller.FileController. The manipulation of the argument path/name leads to path traversal. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "NONE",
"vulnIntegrityImpact": "LOW",
"vulnAvailabilityImpact": "LOW",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 2.5
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:P",
"baseScore": 5.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 4.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"references": [
{
"url": "https://github.com/IceFoxH/VULN/issues/1",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.299218",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.299218",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.511724",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/IceFoxH/VULN/issues/1",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -0,0 +1,145 @@
{
"id": "CVE-2025-2194",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-03-11T14:15:27.753",
"lastModified": "2025-03-11T14:15:27.753",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in MRCMS 3.1.2 and classified as problematic. This issue affects the function list of the file /admin/file/list.do of the component org.marker.mushroom.controller.FileController. The manipulation of the argument path leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "PASSIVE",
"vulnConfidentialityImpact": "NONE",
"vulnIntegrityImpact": "LOW",
"vulnAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
"baseScore": 3.5,
"baseSeverity": "LOW",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.1,
"impactScore": 1.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
"baseScore": 4.0,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
},
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"references": [
{
"url": "https://github.com/IceFoxH/VULN/issues/3",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.299219",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.299219",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.511732",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/IceFoxH/VULN/issues/3",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -0,0 +1,145 @@
{
"id": "CVE-2025-2195",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-03-11T14:15:27.937",
"lastModified": "2025-03-11T14:15:27.937",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in MRCMS 3.1.2. It has been classified as problematic. Affected is the function rename of the file /admin/file/rename.do of the component org.marker.mushroom.controller.FileController. The manipulation of the argument name/path leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "PASSIVE",
"vulnConfidentialityImpact": "NONE",
"vulnIntegrityImpact": "LOW",
"vulnAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
"baseScore": 3.5,
"baseSeverity": "LOW",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.1,
"impactScore": 1.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
"baseScore": 4.0,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
},
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"references": [
{
"url": "https://github.com/IceFoxH/VULN/issues/4",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.299220",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.299220",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.511733",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/IceFoxH/VULN/issues/4",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -0,0 +1,141 @@
{
"id": "CVE-2025-2196",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-03-11T14:15:28.123",
"lastModified": "2025-03-11T14:15:28.123",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in MRCMS 3.1.2. It has been declared as problematic. Affected by this vulnerability is the function upload of the file /admin/file/upload.do of the component org.marker.mushroom.controller.FileController. The manipulation of the argument path leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "PASSIVE",
"vulnConfidentialityImpact": "NONE",
"vulnIntegrityImpact": "LOW",
"vulnAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
"baseScore": 3.5,
"baseSeverity": "LOW",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.1,
"impactScore": 1.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
"baseScore": 4.0,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
},
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"references": [
{
"url": "https://github.com/IceFoxH/VULN/issues/5",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.299221",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.299221",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.511735",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,90 @@
{
"id": "CVE-2025-22366",
"sourceIdentifier": "csirt@divd.nl",
"published": "2025-03-11T14:15:24.313",
"lastModified": "2025-03-11T14:15:24.313",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The authenticated firmware update capability of the firmware for Mennekes Smart / Premium Chargingpoints can be abused for command execution because OS command are improperly neutralized when certain fields are passed to the underlying OS."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "csirt@divd.nl",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:L/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:N/AU:Y/R:X/V:X/RE:X/U:X",
"baseScore": 8.7,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnAvailabilityImpact": "HIGH",
"subConfidentialityImpact": "LOW",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NEGLIGIBLE",
"Automatable": "YES",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "csirt@divd.nl",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-78"
},
{
"lang": "en",
"value": "CWE-250"
}
]
}
],
"references": [
{
"url": "https://csirt.divd.nl/CVE-2025-22366",
"source": "csirt@divd.nl"
},
{
"url": "https://csirt.divd.nl/DIVD-2025-00003",
"source": "csirt@divd.nl"
},
{
"url": "https://www.mennekes.nl/fileadmin/MEN-Deutschland/emobility/04_software/06_smart_premium/Release_Notes_for_2.15_06.03.2025.pdf",
"source": "csirt@divd.nl"
}
]
}

View File

@ -0,0 +1,90 @@
{
"id": "CVE-2025-22367",
"sourceIdentifier": "csirt@divd.nl",
"published": "2025-03-11T14:15:24.480",
"lastModified": "2025-03-11T14:15:24.480",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The authenticated time setting capability of the firmware for Mennekes Smart / Premium Chargingpoints can be abused for command execution because OS command are improperly neutralized when certain fields are passed to the underlying OS."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "csirt@divd.nl",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:L/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:N/AU:Y/R:X/V:X/RE:X/U:X",
"baseScore": 8.7,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnAvailabilityImpact": "HIGH",
"subConfidentialityImpact": "LOW",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NEGLIGIBLE",
"Automatable": "YES",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "csirt@divd.nl",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-78"
},
{
"lang": "en",
"value": "CWE-250"
}
]
}
],
"references": [
{
"url": "https://csirt.divd.nl/CVE-2025-22367",
"source": "csirt@divd.nl"
},
{
"url": "https://csirt.divd.nl/DIVD-2025-00003",
"source": "csirt@divd.nl"
},
{
"url": "https://www.mennekes.nl/fileadmin/MEN-Deutschland/emobility/04_software/06_smart_premium/Release_Notes_for_2.15_06.03.2025.pdf",
"source": "csirt@divd.nl"
}
]
}

View File

@ -0,0 +1,90 @@
{
"id": "CVE-2025-22368",
"sourceIdentifier": "csirt@divd.nl",
"published": "2025-03-11T14:15:24.627",
"lastModified": "2025-03-11T14:15:24.627",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The authenticated SCU firmware command of the firmware for Mennekes Smart / Premium Chargingpoints can be abused for command execution because OS commands are improperly neutralized when certain fields are passed to the underlying OS."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "csirt@divd.nl",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:L/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:N/AU:Y/R:X/V:X/RE:X/U:X",
"baseScore": 8.7,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnAvailabilityImpact": "HIGH",
"subConfidentialityImpact": "LOW",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NEGLIGIBLE",
"Automatable": "YES",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "csirt@divd.nl",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-78"
},
{
"lang": "en",
"value": "CWE-250"
}
]
}
],
"references": [
{
"url": "https://csirt.divd.nl/CVE-2025-22368",
"source": "csirt@divd.nl"
},
{
"url": "https://csirt.divd.nl/DIVD-2025-00003",
"source": "csirt@divd.nl"
},
{
"url": "https://www.mennekes.nl/fileadmin/MEN-Deutschland/emobility/04_software/06_smart_premium/Release_Notes_for_2.15_06.03.2025.pdf",
"source": "csirt@divd.nl"
}
]
}

View File

@ -0,0 +1,86 @@
{
"id": "CVE-2025-22369",
"sourceIdentifier": "csirt@divd.nl",
"published": "2025-03-11T14:15:24.767",
"lastModified": "2025-03-11T14:15:24.767",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The ReadFile endpoint of the firmware for Mennekes Smart / Premium Chargingpoints can be abused to read arbitrary files from the underlying OS."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "csirt@divd.nl",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:N/AU:Y/R:X/V:X/RE:X/U:X",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "NONE",
"vulnAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NEGLIGIBLE",
"Automatable": "YES",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "csirt@divd.nl",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-552"
}
]
}
],
"references": [
{
"url": "https://csirt.divd.nl/CVE-2025-22369",
"source": "csirt@divd.nl"
},
{
"url": "https://csirt.divd.nl/DIVD-2025-00003",
"source": "csirt@divd.nl"
},
{
"url": "https://www.mennekes.nl/fileadmin/MEN-Deutschland/emobility/04_software/06_smart_premium/Release_Notes_for_2.15_06.03.2025.pdf",
"source": "csirt@divd.nl"
}
]
}

View File

@ -0,0 +1,86 @@
{
"id": "CVE-2025-22370",
"sourceIdentifier": "csirt@divd.nl",
"published": "2025-03-11T14:15:24.917",
"lastModified": "2025-03-11T14:15:24.917",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Many fields for the web configuration interface of the firmware for Mennekes Smart / Premium Chargingpoints can be abused to execute arbitrary SQL commands because the values are insufficiently neutralized."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "csirt@divd.nl",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:N/AU:Y/R:X/V:X/RE:X/U:X",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NEGLIGIBLE",
"Automatable": "YES",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "csirt@divd.nl",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://csirt.divd.nl/CVE-2025-22370",
"source": "csirt@divd.nl"
},
{
"url": "https://csirt.divd.nl/DIVD-2025-00003",
"source": "csirt@divd.nl"
},
{
"url": "https://www.mennekes.nl/fileadmin/MEN-Deutschland/emobility/04_software/06_smart_premium/Release_Notes_for_2.15_06.03.2025.pdf",
"source": "csirt@divd.nl"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-27363",
"sourceIdentifier": "cve-assign@fb.com",
"published": "2025-03-11T14:15:25.427",
"lastModified": "2025-03-11T14:15:25.427",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An out of bounds write exists in FreeType versions 2.13.0 and below when attempting to parse font subglyph structures related to TrueType GX and variable font files. The vulnerable code assigns a signed short value to an unsigned long and then adds a static value causing it to wrap around and allocate too small of a heap buffer. The code then writes up to 6 signed long integers out of bounds relative to this buffer. This may result in arbitrary code execution. This vulnerability may have been exploited in the wild."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve-assign@fb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.2,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"references": [
{
"url": "https://www.facebook.com/security/advisories/cve-2025-27363",
"source": "cve-assign@fb.com"
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-27893",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-03-11T09:15:25.457",
"lastModified": "2025-03-11T09:15:25.457",
"lastModified": "2025-03-11T14:15:26.033",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In Archer Platform 6 through 6.14.00202.10024, an authenticated user with record creation privileges can manipulate immutable fields, such as the creation date, by intercepting and modifying a Copy request via a GenericContent/Record.aspx?id= URI. This enables unauthorized modification of system-generated metadata, compromising data integrity and potentially impacting auditing, compliance, and security controls."
},
{
"lang": "es",
"value": "En Archer Platform 6 a 6.14.00202.10024, un usuario autenticado con privilegios de creaci\u00f3n de registros puede manipular campos inmutables, como la fecha de creaci\u00f3n, interceptando y modificando una solicitud de copia a trav\u00e9s de un URI GenericContent/Record.aspx?id=. Esto permite la modificaci\u00f3n no autorizada de metadatos generados por el sistema, lo que compromete la integridad de los datos y potencialmente afecta los controles de auditor\u00eda, cumplimiento y seguridad."
}
],
"metrics": {
@ -55,6 +59,10 @@
{
"url": "https://github.com/NastyCrow/CVE-2025-27893",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/NastyCrow/CVE-2025-27893",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2025-03-11T13:00:19.228097+00:00
2025-03-11T15:00:20.452422+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2025-03-11T12:15:12.277000+00:00
2025-03-11T14:57:13.920000+00:00
```
### Last Data Feed Release
@ -33,22 +33,58 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
284751
284765
```
### CVEs added in the last Commit
Recently added CVEs: `2`
Recently added CVEs: `14`
- [CVE-2025-2189](CVE-2025/CVE-2025-21xx/CVE-2025-2189.json) (`2025-03-11T12:15:12.057`)
- [CVE-2025-2191](CVE-2025/CVE-2025-21xx/CVE-2025-2191.json) (`2025-03-11T12:15:12.277`)
- [CVE-2024-12546](CVE-2024/CVE-2024-125xx/CVE-2024-12546.json) (`2025-03-11T14:15:20.210`)
- [CVE-2024-54084](CVE-2024/CVE-2024-540xx/CVE-2024-54084.json) (`2025-03-11T14:15:22.730`)
- [CVE-2024-54085](CVE-2024/CVE-2024-540xx/CVE-2024-54085.json) (`2025-03-11T14:15:22.893`)
- [CVE-2025-2192](CVE-2025/CVE-2025-21xx/CVE-2025-2192.json) (`2025-03-11T13:15:43.780`)
- [CVE-2025-2193](CVE-2025/CVE-2025-21xx/CVE-2025-2193.json) (`2025-03-11T13:15:43.997`)
- [CVE-2025-2194](CVE-2025/CVE-2025-21xx/CVE-2025-2194.json) (`2025-03-11T14:15:27.753`)
- [CVE-2025-2195](CVE-2025/CVE-2025-21xx/CVE-2025-2195.json) (`2025-03-11T14:15:27.937`)
- [CVE-2025-2196](CVE-2025/CVE-2025-21xx/CVE-2025-2196.json) (`2025-03-11T14:15:28.123`)
- [CVE-2025-22366](CVE-2025/CVE-2025-223xx/CVE-2025-22366.json) (`2025-03-11T14:15:24.313`)
- [CVE-2025-22367](CVE-2025/CVE-2025-223xx/CVE-2025-22367.json) (`2025-03-11T14:15:24.480`)
- [CVE-2025-22368](CVE-2025/CVE-2025-223xx/CVE-2025-22368.json) (`2025-03-11T14:15:24.627`)
- [CVE-2025-22369](CVE-2025/CVE-2025-223xx/CVE-2025-22369.json) (`2025-03-11T14:15:24.767`)
- [CVE-2025-22370](CVE-2025/CVE-2025-223xx/CVE-2025-22370.json) (`2025-03-11T14:15:24.917`)
- [CVE-2025-27363](CVE-2025/CVE-2025-273xx/CVE-2025-27363.json) (`2025-03-11T14:15:25.427`)
### CVEs modified in the last Commit
Recently modified CVEs: `1`
Recently modified CVEs: `47`
- [CVE-2025-0624](CVE-2025/CVE-2025-06xx/CVE-2025-0624.json) (`2025-03-11T12:15:11.820`)
- [CVE-2024-1158](CVE-2024/CVE-2024-11xx/CVE-2024-1158.json) (`2025-03-11T13:18:18.670`)
- [CVE-2024-13853](CVE-2024/CVE-2024-138xx/CVE-2024-13853.json) (`2025-03-11T14:15:20.417`)
- [CVE-2024-13864](CVE-2024/CVE-2024-138xx/CVE-2024-13864.json) (`2025-03-11T14:15:20.570`)
- [CVE-2024-13873](CVE-2024/CVE-2024-138xx/CVE-2024-13873.json) (`2025-03-11T13:32:22.040`)
- [CVE-2024-13899](CVE-2024/CVE-2024-138xx/CVE-2024-13899.json) (`2025-03-11T13:26:57.550`)
- [CVE-2024-1889](CVE-2024/CVE-2024-18xx/CVE-2024-1889.json) (`2025-03-11T14:51:56.797`)
- [CVE-2024-1890](CVE-2024/CVE-2024-18xx/CVE-2024-1890.json) (`2025-03-11T14:51:33.223`)
- [CVE-2024-2546](CVE-2024/CVE-2024-25xx/CVE-2024-2546.json) (`2025-03-11T14:07:31.350`)
- [CVE-2024-43196](CVE-2024/CVE-2024-431xx/CVE-2024-43196.json) (`2025-03-11T14:57:13.920`)
- [CVE-2024-44192](CVE-2024/CVE-2024-441xx/CVE-2024-44192.json) (`2025-03-11T14:15:22.503`)
- [CVE-2024-49337](CVE-2024/CVE-2024-493xx/CVE-2024-49337.json) (`2025-03-11T14:06:18.787`)
- [CVE-2024-49344](CVE-2024/CVE-2024-493xx/CVE-2024-49344.json) (`2025-03-11T14:02:39.433`)
- [CVE-2024-49355](CVE-2024/CVE-2024-493xx/CVE-2024-49355.json) (`2025-03-11T14:51:01.153`)
- [CVE-2024-49779](CVE-2024/CVE-2024-497xx/CVE-2024-49779.json) (`2025-03-11T13:55:21.797`)
- [CVE-2024-49780](CVE-2024/CVE-2024-497xx/CVE-2024-49780.json) (`2025-03-11T14:37:00.743`)
- [CVE-2024-49781](CVE-2024/CVE-2024-497xx/CVE-2024-49781.json) (`2025-03-11T13:45:47.917`)
- [CVE-2024-49782](CVE-2024/CVE-2024-497xx/CVE-2024-49782.json) (`2025-03-11T14:19:11.780`)
- [CVE-2024-54469](CVE-2024/CVE-2024-544xx/CVE-2024-54469.json) (`2025-03-11T14:15:23.030`)
- [CVE-2024-54473](CVE-2024/CVE-2024-544xx/CVE-2024-54473.json) (`2025-03-11T14:15:23.210`)
- [CVE-2024-54560](CVE-2024/CVE-2024-545xx/CVE-2024-54560.json) (`2025-03-11T14:15:23.417`)
- [CVE-2025-0629](CVE-2025/CVE-2025-06xx/CVE-2025-0629.json) (`2025-03-11T14:15:24.090`)
- [CVE-2025-2136](CVE-2025/CVE-2025-21xx/CVE-2025-2136.json) (`2025-03-11T14:15:26.553`)
- [CVE-2025-2137](CVE-2025/CVE-2025-21xx/CVE-2025-2137.json) (`2025-03-11T14:15:26.737`)
- [CVE-2025-2190](CVE-2025/CVE-2025-21xx/CVE-2025-2190.json) (`2025-03-11T14:15:27.163`)
- [CVE-2025-27893](CVE-2025/CVE-2025-278xx/CVE-2025-27893.json) (`2025-03-11T14:15:26.033`)
## Download and Usage

View File

@ -211457,7 +211457,7 @@ CVE-2022-4672,0,0,3da0ab4af959d0d56059ed0a777501b4f92187b9acb6980457fef52c63560f
CVE-2022-46720,0,0,1aff9e296be2c7360275923f63a9473ec9c4608eeb328da9f2e7b7a3179b8930,2025-01-29T17:15:21.870000
CVE-2022-46721,0,0,8318128d0ba4bff58f94270f143b28f70980ff84aff2d4472f3b162624e6b8cf,2024-11-21T07:30:58.433000
CVE-2022-46722,0,0,a591827a471ef172cdc7ea3213d24c36327e4324a3fcf908e339b4ed1ec02731,2024-11-21T07:30:58.570000
CVE-2022-46723,0,0,21271aa41cfe7d1eecb2df8cbff28dff4ae52ddd305c0eef5b0ef67f56e7f43c,2024-11-21T07:30:58.763000
CVE-2022-46723,0,1,5854e10daf9c8ea09d765ccb9052b38f043b226c593a8f993ca66681f53a0780,2025-03-11T14:15:16.430000
CVE-2022-46724,0,0,ca3545b43dee2aff601e6fadb2f37abbc6cbd50bafffa6af812c5d7997b2a9d9,2024-11-21T07:30:58.877000
CVE-2022-46725,0,0,7fff6feb41ccaa3f67f4c9f0e48196fb81f9abdb42c8d2f41f770e073c8ac1e0,2024-11-21T07:30:59.087000
CVE-2022-46727,0,0,af8e313bca217b93c3f2672bb55870facfee6375d281bc0c07e1351e04696f99,2023-11-07T03:55:51.580000
@ -218075,7 +218075,7 @@ CVE-2023-22488,0,0,0aaf54ba6aaa396e5eeed906e25dc3eb9cf8d78bd4004aaf6fe7cfeb792ac
CVE-2023-22489,0,0,9c9547fa170d053fbca3d7181cdbd1e0c3535f411cb57337b5b16f201aa554ac,2024-11-21T07:44:54.680000
CVE-2023-2249,0,0,63a29d22605a00439eacb33c1c6b7d1746c04ead98096c136c7a6481a13c73ed,2024-11-21T07:58:14.220000
CVE-2023-22490,0,0,ed5f2905d88eafeb26979ef7c749f6290e1eda0d44711c688d45aad06c77c872,2024-11-21T07:44:54.803000
CVE-2023-22491,0,0,6634f80ae040bc7b08ba4beb028108a2ff8452c29178c902c90708269a64dfc3,2024-11-21T07:44:54.943000
CVE-2023-22491,0,1,7345e40cfe3db4db1eceb5e02fd4ef0cd8f1c29e41985d50fdc0a3a9eb32901b,2025-03-11T14:15:16.767000
CVE-2023-22492,0,0,ae118f101a4fe1e807325ff70fedbcc3df7eea84abc7620e0c79a3ab014b1511,2024-11-21T07:44:55.083000
CVE-2023-22493,0,0,39d2f9e6e1979b6b4b55cd726c6ef3a89c9dadb34d873b0dc61bd47123f2cdf2,2024-11-21T07:44:55.237000
CVE-2023-22494,0,0,b40d286f3bc4e252b6afdfc190ddef7304795723952fc8afe944dab9c75f718c,2023-11-07T04:07:01.537000
@ -218296,8 +218296,8 @@ CVE-2023-22749,0,0,9d960d5703beed2bf0592f7ac0dbb480b4ded3a968ccb41c8362a54de4de5
CVE-2023-2275,0,0,56517d0348d7c740f69577e29159469d6fb152eb4ba3fc163164f0855a45527b,2024-11-21T07:58:17.400000
CVE-2023-22750,0,0,d8383d1547ae1feceb6124db8362c373b05ed5c0420fd20a0897ed19801b6262,2025-03-07T21:15:13.743000
CVE-2023-22751,0,0,f7e87665eeb2eb0a4dcf6e191ed8cdc98123add986fb6cc06fd44685fe64405d,2025-03-07T21:15:13.880000
CVE-2023-22752,0,0,01119cf3f2ade5d14e2214357d7a91d0e54d36e26c8908b7f5730ea75c68e1b8,2024-11-21T07:45:21.440000
CVE-2023-22753,0,0,acc0fd192a8331b5b7371e3977ae7d7d9b20b6aab22671ada345b8e874154239,2024-11-21T07:45:21.560000
CVE-2023-22752,0,1,46046de35ca109be006d9c7177ae1e1c3a85fa9577cd24dde03d0231bdf17f40,2025-03-11T14:15:17.410000
CVE-2023-22753,0,1,c77ba1d63415188a3342302c18382d1af48bbccf54b43597efc5ab59183d4e73,2025-03-11T14:15:17.590000
CVE-2023-22754,0,0,d247d5cbce15ee17f89d7a1d2f020e8cd8c63d5271ea83bcac456d0585ace59d,2024-11-21T07:45:21.670000
CVE-2023-22755,0,0,bb0164b8d65556ee8753b0c4fcb1b74aba62639cb1aa74a811209f73c27d7b58,2024-11-21T07:45:21.787000
CVE-2023-22756,0,0,665db7f1d4f1e5b5058362b508c1d8d6ae02944bf6898c0f728e7fe8bdfcff45,2024-11-21T07:45:21.917000
@ -218308,9 +218308,9 @@ CVE-2023-2276,0,0,2a89d36eee46d6c101100028368db05883bc5be65d5b25d57a5e3d361c3f71
CVE-2023-22760,0,0,c20cbdcc3ca1f1e1d99a22f3a8e790bc215a4554f34f5525f1bd43f8a1fb8326,2024-11-21T07:45:22.380000
CVE-2023-22761,0,0,88affdebebb6129d5a9f029f881b936f7b41c3f5b68e64709c61b1cf4201c69b,2024-11-21T07:45:22.497000
CVE-2023-22762,0,0,b07dfc0b47a2408fcde297b1bc8a829eecd9afda96ba7c198bc41a94c20032e7,2024-11-21T07:45:22.603000
CVE-2023-22763,0,0,a5c31e6188f03546dd6ee88a2e5d85ca0e3076f445fc034cfd958e90d98e1838,2024-11-21T07:45:22.727000
CVE-2023-22764,0,0,bf719ab1f22aa2cd387d7dca2190a85fc105bbf50566d696ca7a5eeba41f6836,2024-11-21T07:45:22.847000
CVE-2023-22765,0,0,6a660dc0329d4c6b90e9a98b46cfac1b4010d4fe1c6579a51a237190475e662d,2024-11-21T07:45:22.970000
CVE-2023-22763,0,1,3a9891131fe9deb02cfa5915fb791e483d5a4fc43253be5a2e5a8bf996ca071e,2025-03-11T14:15:17.760000
CVE-2023-22764,0,1,b6cc0016c0e44ba4a1810f02c6dc61ba95bd06368744149ef374f58f084c99bb,2025-03-11T14:15:17.920000
CVE-2023-22765,0,1,81d730e3d36604067067fdd743d8a08de4193a93491f9e1416d01121f83678c4,2025-03-11T14:15:18.077000
CVE-2023-22766,0,0,7e51c6cb7cb4c6561a8b5425f2ce81ac4a0018eacbd6b8d98d67c97f25044bb3,2024-11-21T07:45:23.100000
CVE-2023-22767,0,0,eebde94414de0c875144de433fd8f130e403655d62c51870b1b620408665bbc3,2024-11-21T07:45:23.220000
CVE-2023-22768,0,0,20fba87f4a634593f7c18e62b486cef19fc32a3c2e2a4561295d283e0126cf30,2024-11-21T07:45:23.337000
@ -218774,12 +218774,12 @@ CVE-2023-23492,0,0,d3c38acc77917892389fdd545f549877fb15040a71f8907acff4a8b80fd43
CVE-2023-23493,0,0,261176f2a8b26b025b4dfd56e376abfbea7817062586d08aed72ae11d87b555a,2024-11-21T07:46:17.760000
CVE-2023-23494,0,0,14def5db7a6104b9fee33c787ac4992cd1ab30ea0223e674fef6f7e54618099b,2025-01-29T16:15:35.420000
CVE-2023-23495,0,0,8215e6a092a185f9bdcd7c8ad67231f563ca20654f36aa181da2f172dcf6b7f9,2024-11-21T07:46:18.017000
CVE-2023-23496,0,0,dafb3f4725b70154a6e53f67b672fb292718a764b2e880110ac1f3bf5d9e212a,2024-11-21T07:46:18.143000
CVE-2023-23497,0,0,0eac8f137473676bea54f2e11923e3c9090ba30ff46320e35f376068b557bd56,2024-11-21T07:46:18.280000
CVE-2023-23496,0,1,7fa960b37bd9892fa2fae4ae5a9f035033c0d321a562af39000d72584f1ea99f,2025-03-11T14:15:18.513000
CVE-2023-23497,0,1,2dbad634c3f00416275fc95939328c4541bd0fe1b81f9c7a8ddb93930c733799,2025-03-11T14:15:18.680000
CVE-2023-23498,0,0,f442edc9784c104bfeadbb1509163412061ba508855f94680a31a05d88cad5d4,2024-11-21T07:46:18.397000
CVE-2023-23499,0,0,a4a292e17748d068cfac1e5e7bd68bca751b1def0e1e07b6d0e260c9bf77ca77,2024-11-21T07:46:18.507000
CVE-2023-23499,0,1,23d8093b12aff16a352f868b89ae7a61b0dd2c8d2a0735a48298aa05a8543033,2025-03-11T14:15:18.913000
CVE-2023-2350,0,0,ab0224f444bfb05a0e5106420c128d54872f8e269cc5105af8f88e475b877f69,2024-11-21T07:58:26.260000
CVE-2023-23500,0,0,e85eb6b6c5c962cfeb7e7e7b7e2bc4d345105a05cfcc9fe06bce7dc92e613721,2024-11-21T07:46:18.620000
CVE-2023-23500,0,1,b38eacc8268db0bb21cd43991a81b9795834287efa37f0b4f1a1782ab3ccdf5f,2025-03-11T14:15:19.060000
CVE-2023-23501,0,0,08283ed5e7e3035476dea06dba88443e0f4832d2487f02f048e6b7378eee7195,2024-11-21T07:46:18.740000
CVE-2023-23502,0,0,c90d8a177146bffe329c2557cff3e63b8c00ec94d13a5803e018464a2b30c0ba,2024-11-21T07:46:18.847000
CVE-2023-23503,0,0,2da9240a4403b00e4a15023cb8324d757463d3c79f96555e931dded2cb36fa1f,2024-11-21T07:46:18.963000
@ -226676,7 +226676,7 @@ CVE-2023-33166,0,0,fc5e669407323aacb94b4eb443ff4eb247ac383d2f497736606be2e5df627
CVE-2023-33167,0,0,65961ffe8131c25aac2b3f553b81fafddab9a6fd559f0114ebdce0f087773193,2024-11-21T08:05:01.640000
CVE-2023-33168,0,0,07044c818c72aac62abe2732395c444fd1b037729139bab2dae0cd3b65b36418,2024-11-21T08:05:01.803000
CVE-2023-33169,0,0,5f7ddbe87df22202390df4e9f76089de0e3ecd8e7a2e91c834aafa11f8bf01f2,2024-11-21T08:05:01.977000
CVE-2023-3317,0,0,a809aef9c1ae7b0e78356e31d72e1338c0c053ed2f52c542e4e4a7721824a99f,2024-11-21T08:16:59.953000
CVE-2023-3317,0,1,998c7194391572d465007a4c6e113dc1110ef1dedf28a8c7e4613e6e7a50a5e9,2025-03-11T14:15:19.697000
CVE-2023-33170,0,0,4740fdc1650bd08609ec03a3acc7df1767c51bc386a704677bc0d493ad016b9e,2025-01-01T02:15:49.803000
CVE-2023-33171,0,0,1e3a87325870a0adb4c2a3210560f6a055d1e803c99efb6a10bb0547de89d341,2024-11-21T08:05:02.320000
CVE-2023-33172,0,0,cc229436a781d727cc8b2e22ecb008a3f1031f9e3accfb65eee1bcdc2932eeee,2024-11-21T08:05:02.460000
@ -243967,13 +243967,13 @@ CVE-2024-0677,0,0,b4c560c44727f9fe5276cdcda87d504c928ad1eaf14102e32eb183b929a3ff
CVE-2024-0678,0,0,43e537611bc5b5d189fcbe022a7433f6dd35e16a8d10cfc0840dff499dd5c5f9,2024-11-21T08:47:08
CVE-2024-0679,0,0,61e0d9c8766a5ecfcd68948a8bff1790dbda73e7ca286c7816ef777adbbab7b0,2024-11-21T08:47:08.137000
CVE-2024-0680,0,0,a0668df1b5089627ca4a88c86111e9531108e2bd157fb56cee2218188a426e3d,2025-02-07T01:27:25.297000
CVE-2024-0681,0,0,f645422d5607df145d2f13ec1fde9bcc05e65e868187ec4712f7463c2b7296a7,2024-11-21T08:47:08.380000
CVE-2024-0681,0,1,87b2adbd7715ef0c6f7e3fc22b44e178c33c40b6f7c29347a759ebf613b9f7be,2025-03-11T13:33:45.277000
CVE-2024-0682,0,0,0d610781e138a825a4958396671c33b7f8a7fbba61d41cf7c6c5ed681606439a,2025-02-07T01:26:17.227000
CVE-2024-0683,0,0,0b61242f72deccafdccabf6b8c0e4833c3a60dae01a34ab1083f8aefc6994287,2025-02-13T20:14:10.457000
CVE-2024-0684,0,0,4389372bb76766ff46732933ea0f1b8d1d950513125b7fa6117c7f956f196fa2,2024-11-21T08:47:08.707000
CVE-2024-0685,0,0,820940c6f5e950a8bb00a1b68f4aff647e2b8f8fd886bf1804f89b56b8262392,2024-11-21T08:47:08.837000
CVE-2024-0686,0,0,58a4f8086c8930fbb51616d8278e615e925236d70a39e255af4cb3fd24172830,2024-03-04T15:15:07.050000
CVE-2024-0687,0,0,534bfeb19e6ba9869a11b31a1ca1a982071d11c9ca518a7d172a828a4300754f,2024-11-21T08:47:08.990000
CVE-2024-0687,0,1,4bc75288efc332cd39928a1531984d4878dcfa80318eb330531ab2ed67d80283,2025-03-11T13:32:08.780000
CVE-2024-0688,0,0,f3ebd7023a060a28d0cc78dc0ec429c8687e890a387ec0156df94427106c910b,2024-11-21T08:47:09.103000
CVE-2024-0689,0,0,51815c77ca446acfd6f183f7f81fd9dc1c1522df0d3ed6185cbb6bbfeda66522,2025-02-05T18:11:53.127000
CVE-2024-0690,0,0,9ce0b3460699ff11c8b8b32adfe31c63d3dde9fd17062e5d0bc7d944978c5a30,2025-01-17T20:15:27.403000
@ -243986,7 +243986,7 @@ CVE-2024-0696,0,0,34d00cb254f7cf4a7093a585c54d9d7f30888019d67c8e153525039a02e0b8
CVE-2024-0697,0,0,e9919142a54436f19fc761fdb7f668d20ed1451c051d4c52306aa6fd1fc674aa,2024-11-21T08:47:10.177000
CVE-2024-0698,0,0,a01ed5dc7b9347205ead50276d5f53c378c03afb7285b2a0d01a27119979e7cd,2024-11-21T08:47:10.293000
CVE-2024-0699,0,0,76e0d4ff7a6c7cec726bb9d0f8dcd611b263184fdcc42117ab04d2112edec24d,2024-11-21T08:47:10.410000
CVE-2024-0700,0,0,bfabb4efa6fdf9f50f68320c2d044f053fedad17789b2542e360155a24cbd155,2024-11-21T08:47:10.523000
CVE-2024-0700,0,1,ac3e3621778b65e996092479935d35d5822a5b6777807eb3a41da8381759c32c,2025-03-11T13:30:56.303000
CVE-2024-0701,0,0,1676b6dada46706acbed70af8cd91d936d02f269f1a280f9961571f79de427ca,2024-11-21T08:47:10.637000
CVE-2024-0702,0,0,350df7245d7a8ec7d5bfd7a7abcb59e4b6713c6e1dc19c91c960db18519e03f3,2025-03-04T12:24:19.653000
CVE-2024-0703,0,0,2bdd6368afe49b73347586b7dff865ce242ed66459569d92da90bc646df4d49a,2024-11-21T08:47:10.867000
@ -244109,10 +244109,10 @@ CVE-2024-0823,0,0,21edb93883c10572ce3fc6543a7117ab2546576231087fc0efeac50fff9d09
CVE-2024-0824,0,0,ab0f1a06d03ea9246da6993faa29a4153ae4f70daba1ec82239bb8b33042024a,2024-11-21T08:47:27.227000
CVE-2024-0825,0,0,8368c0b2d935747c4416145f93f1c58e0c8789147efa665f75b7d372823dcb87,2024-11-21T08:47:27.350000
CVE-2024-0826,0,0,182eb30be7fa0f586f4634f649452c117748e8eb01ef17d62588eb48812ccf8c,2025-02-07T17:54:42.907000
CVE-2024-0827,0,0,b8d473bae80c3786e457c5f783fedf263c8e674dd54031a1e24f4324c8dcd46d,2024-11-21T08:47:27.590000
CVE-2024-0828,0,0,ba93b2394e0f54da2d83908a611a0c569bc1e1721bd856d1be4c756b613e20be,2024-11-21T08:47:27.710000
CVE-2024-0829,0,0,dfb75e76094313d0c7f20b8821d20ba5cb2f5a375032f4535dee50287735b733,2024-11-21T08:47:27.827000
CVE-2024-0830,0,0,f3f28bf82ea176a81ed1bccad42ef59ad4aaefe36de7d06fc80fd37f620a7454,2024-11-21T08:47:27.947000
CVE-2024-0827,0,1,1c1c2a437ddf2e263a0e16738a9b7c32ed2f6c7126fe4c0a5b85b2f22331fe95,2025-03-11T13:30:12.340000
CVE-2024-0828,0,1,08ed1c566231bfe152239416f88b685f1e730719acab616dcb31b166494b4f68,2025-03-11T13:29:49.430000
CVE-2024-0829,0,1,5bb2157175e5250f2e2e093d4d7b216d7ae80006642d5db874613bc95830711e,2025-03-11T13:28:57.287000
CVE-2024-0830,0,1,2537d26da3d0f537279ff6cad22123677c09daf01747ce2451bc4871679ca23b,2025-03-11T13:28:31.400000
CVE-2024-0831,0,0,6baee579993cbeecaeb7cee0d0b13caae035ddda995acb36d260dde4d948fb10,2024-11-21T08:47:28.063000
CVE-2024-0832,0,0,1b423f590b65fdd178420c761d7331c78ddff8dcb7f56481b4bdab36868e37da,2024-11-21T08:47:28.210000
CVE-2024-0833,0,0,db4819518cb18b8e54473fd58f5324fec270a35183944967d2c342881ebc738e,2024-11-21T08:47:28.357000
@ -244121,7 +244121,7 @@ CVE-2024-0835,0,0,9af51f6890e6470dad21ae7757ef0efed2c1f2e67204635a479a146277d866
CVE-2024-0836,0,0,cd82249cdfcb5ab173c90bf4120548bfdb723d07f1e7b14e20f0d32f1d9c1e6a,2024-11-21T08:47:28.770000
CVE-2024-0837,0,0,458cffc92e81f947eb35db9c7d429f14a4acc2bc97686886fbd06698e9828d72,2025-01-17T17:47:27.833000
CVE-2024-0838,0,0,65c3c84015040543239e3e8dfad6fe5d4d6702f7df313f51a124b3b4f9fdd8a5,2024-12-27T15:57:28.327000
CVE-2024-0839,0,0,7140f6314accc17b94e194d6f89d0691ad19ff9958d076096c8fdaebd4f845ed,2024-11-21T08:47:29.143000
CVE-2024-0839,0,1,7419611ff80e53e758c8cd80aa20c0012d18c6529423bd11ea8736de6294e56b,2025-03-11T13:25:38.507000
CVE-2024-0840,0,0,ca8aa458c2576a35731bcb5034c90e7663554fbe2d4d8fb60f218a463413d155,2024-11-21T08:47:29.257000
CVE-2024-0841,0,0,3a05f459f3a8d83064b8e1099ecdeed027bd751dc61114ac0cf64a122e6ab390,2024-11-21T08:47:29.387000
CVE-2024-0842,0,0,a21addff431b6495eec5619acafe2703ab2ab97c3043e7de1d5167d73e837833,2024-11-21T08:47:29.533000
@ -244171,7 +244171,7 @@ CVE-2024-0893,0,0,2170c9e0100ff8148342649596480f9f43610161d24258e2101ab822f42ebb
CVE-2024-0895,0,0,58c1bfbdedc7520b1b4b816bdf4e4c17ad39e5dd3321c15ae1cfdf8d5f2cfc42,2024-11-21T08:47:38.400000
CVE-2024-0896,0,0,50bc494bccf14a5e7be91859c9b4550fa927c34acf01e96b6deb15e4d86525ed,2025-01-02T17:15:39.220000
CVE-2024-0897,0,0,72a30bc0c93e8d051fe6ef3a2130ed86d55a5842537e30205f254ddfcbc1de65,2025-01-02T17:15:24.673000
CVE-2024-0898,0,0,37fe6f69a0f959f2e8b7339b10784223f09060868383c6ffa044458e6391fea0,2024-11-21T08:47:38.930000
CVE-2024-0898,0,1,8394f20dfcf20cca218c60caab8e8921405eec0f2b750b799f6bc4997bfe3c7c,2025-03-11T13:21:21.240000
CVE-2024-0899,0,0,a110e9f41ce990bfe1a198af240cb876084cc0ba17fbf9b582555362d79d9879,2024-11-21T08:47:39.107000
CVE-2024-0900,0,0,8202c920d6c43ef0b5a2c52aa397318230bfae8c49053d10854949a25e693c69,2024-11-21T08:47:39.290000
CVE-2024-0901,0,0,2210b93f65eb90421a29d4729ea1ab6abfd7f7109fce840b55b9802048721199,2024-11-21T08:47:39.493000
@ -245016,7 +245016,7 @@ CVE-2024-10825,0,0,54ed301e324cdb7db6d0e88be13790fdaf11976da44d29c7e3fa072661bfb
CVE-2024-10826,0,0,8483a84ab9e71d0ea73bc9e4319fdfbff8435867ca387f9a4e6773e9ea829486,2025-01-02T18:07:57.863000
CVE-2024-10827,0,0,a81852c84499a448113e0c7be334c3f9aa68b76a583e8d33dd8ef2cc355a6e7f,2025-01-02T18:07:41.333000
CVE-2024-10828,0,0,f50bf6cc23072807a8490498df27e8cf2141e8f43fa5a851246088f1addc0cef,2024-11-19T17:41:59.290000
CVE-2024-1083,0,0,79156d1367776f4d20d6384b4d457002d1339967a843ba4dca88dafc27af4287,2024-11-21T08:49:45.600000
CVE-2024-1083,0,1,0b85acc3c9cd326498cec9694b41b8eed1802c759f536404a786f6e3a92c9c19,2025-03-11T13:20:23.640000
CVE-2024-10832,0,0,7120a3ddd993e3ab9c00284bc31e67657daa016574a4c41a7d739be14f96b64d,2024-12-04T03:15:04.427000
CVE-2024-10836,0,0,5c16ff94bdcb3d8da8a7ce3912c47b3ac593666fb37c5010a5b9f5a82863bed2,2024-12-06T04:15:05.037000
CVE-2024-10837,0,0,45b62909fcac6857769ac65c543bedb380cd04ee29f9d476294873378d0f2da9,2024-11-12T13:56:24.513000
@ -245704,7 +245704,7 @@ CVE-2024-11576,0,0,a8e0825213ef4c9c0f1c6d5ae79fb6ce1feb72964e892a902e8877ef0fbe7
CVE-2024-11577,0,0,efb2567cb5c51db073457c6007c99b46c942618b2803d597011c7d051ef31b73,2024-12-20T17:36:00.887000
CVE-2024-11578,0,0,3949bbadfcf8e803d9af59cc77849a55a262b9e95c93b371e5299de46c360cc1,2025-01-03T17:42:27.113000
CVE-2024-11579,0,0,a0e8ebe7e9d438299b2b08bfdc182fcceaa66df7c647d83ef69f75c20555837a,2024-12-20T17:35:51.253000
CVE-2024-1158,0,0,ad9d5682c34a625ef9ba2b2db44b1ff292a1ce3bf02e19968ef34d4e9784a17b,2024-11-21T08:49:55.723000
CVE-2024-1158,0,1,ddc5ced1956eeb64e48a779f8daaf13c9a158192a2be6ca09b38cb90d29393c7,2025-03-11T13:18:18.670000
CVE-2024-11580,0,0,2902a2896d70a09162eab174719b1f937a00063abe723be1bb8861e8aaeb5891,2024-12-20T17:35:39.513000
CVE-2024-11581,0,0,54519437e00f96c23a8c70641ca6b3fe6fa4bcc79e1443a9a5c2a0ca7b114449,2024-12-20T17:32:03.967000
CVE-2024-11582,0,0,5e500d72782f3c6c9cfe57a8b04f3c73a0d08c89d5d781f1ea62d59a2f770b01,2025-02-19T04:15:10.200000
@ -246633,6 +246633,7 @@ CVE-2024-12541,0,0,385c32a941f81d7511af495bf3f4a826789a0d8e4c91de10d32c3c91b10da
CVE-2024-12542,0,0,90711ddee5ff9893a7ce0cd38bbc7f3f75598e4dbe4af03512315507d947e910,2025-01-09T11:15:14.550000
CVE-2024-12544,0,0,1f922a477e2d69a4ac7542d9141b74ae4ec5dce380319f3540946ad13911e768,2025-03-01T08:15:33.367000
CVE-2024-12545,0,0,6a7eb673c2bd6339a922da465bf51ae458a826273537fb084388303f81560e28,2025-01-04T08:15:06.363000
CVE-2024-12546,1,1,b678f39d6f830fe2fa66f4d8801b922ae1606fc5b519756ecdaf2f0f344a535f,2025-03-11T14:15:20.210000
CVE-2024-12547,0,0,3f0e92c84a89218e43c1a9ba1cd6f8c12d84a71973f4849c6aa0fb3a0a5533de,2025-02-19T15:24:27.477000
CVE-2024-12548,0,0,77922e1cebb9b12b642cb156e302118664c3413919f6206c7ce46499ef18a017,2025-02-19T15:24:20.273000
CVE-2024-12549,0,0,786bf1f405686730a3eda8c40e91a1ca05e30b496bcc97442c1d6d89e74a2f49,2025-02-19T15:24:10.513000
@ -247813,19 +247814,19 @@ CVE-2024-1385,0,0,8d44f2ddcfbec761b90cec48d83e59f97d1a3c53ec848ed4ca09c1c2ed0050
CVE-2024-13850,0,0,21374982a6b82adc74612a8ed4ca91538e192f9010fe0e837b933250ab0049eb,2025-02-24T17:36:09.667000
CVE-2024-13851,0,0,592a591d98f0f1b719f907e8ef0e6cf89b3d77cf86e303183778d5c89e82d5cb,2025-03-06T16:36:54.387000
CVE-2024-13852,0,0,dd2c33f18b8ccbee6b646903a658fcb7af55315e978ebdb8f9c794cc0b1e0482,2025-02-21T15:50:45.813000
CVE-2024-13853,0,0,d34bbd5bd3f86a655fce1c22ada75cd2ce7bf4f4617c25eaa377aed2c9f982a0,2025-03-11T06:15:26.177000
CVE-2024-13853,0,1,afe74d73e4f34b373f4881fea9ab4c7b95eb8da3977e592a4fd669c68326ff5f,2025-03-11T14:15:20.417000
CVE-2024-13854,0,0,183a2c601c3fd979d79a24b06fa3cbfa973155a4b804ec2de6206e0f22615048,2025-03-06T12:42:22.567000
CVE-2024-13855,0,0,9aad1f9df577d823156d8f799c672a44111ca2c006ede84d8cbdc8cff07c1227,2025-02-25T18:23:31.507000
CVE-2024-13857,0,0,62c21b594570822db9f726e0947e55bc1e6ac977159c9c8adce0532ccfd1f3c4,2025-03-07T10:15:16.293000
CVE-2024-1386,0,0,0e88f4287d62ff6aff092302a9322ab713c8f07c6df5c6bed70e82252a8c824b,2024-11-21T08:50:28.063000
CVE-2024-13862,0,0,6a0babfd6f76f244174771c4c3bca176635075b85528805a413dee6669b8f0a4,2025-03-11T06:15:26.303000
CVE-2024-13864,0,0,7d429872f41fcdbfec23e809b2625f752ecf05f7b1470e0e2d0cb4dd30d985c9,2025-03-11T06:15:26.407000
CVE-2024-13864,0,1,f647edd0adb05ef5de412b885151977c97c8ed39f0f14946834eb242ea7c1983,2025-03-11T14:15:20.570000
CVE-2024-13866,0,0,7d9c8d2b250d9bc5b19eef56e97d885c4cc053e0a99371616549569976a9e91e,2025-03-05T09:15:09.587000
CVE-2024-13867,0,0,d1ccd3c88095b1998a7fe8f4f64aebb963278c8b08e66fe2014f445cd5f48e2a,2025-02-18T18:41:21.660000
CVE-2024-13868,0,0,892bab8e346a933d5fd6b056fc8d7270c97a096d31581e4b311d92d8c397205c,2025-03-06T15:15:15.297000
CVE-2024-13869,0,0,c77419cef6121e679e8e638d5bb725353463651ff74190e6dc66952341bcdf5d,2025-03-05T21:28:15.293000
CVE-2024-1387,0,0,8e6bcbdaec79085616e17d0cff8f7e9074033b4370339ebb2fb375231d6ccb3f,2025-01-07T18:19:26.400000
CVE-2024-13873,0,0,6c96e990e2774245ef5b434d5e9fd883c701128558fbe3a5272bb275ffb354b4,2025-02-22T04:15:09.567000
CVE-2024-13873,0,1,55e5174b0343fd72e7abadc33d2c5cbba17148439d124d339cc41ecc820eadf2,2025-03-11T13:32:22.040000
CVE-2024-13879,0,0,840cef42e99ba3012c3b31f8bded69776814665d9c25d0869b7b55ae4acecc40,2025-02-17T16:15:15.950000
CVE-2024-1388,0,0,4055ac29f5fc98e5c697dde8e9fd854a4a3e80aad935e1d1af922e2721330e53,2025-01-16T15:18:18.140000
CVE-2024-13882,0,0,d23d49c98387f6442c8f9aba1e2405a91c54af6f21f17367597a68563af5b8f3,2025-03-08T09:15:31.250000
@ -247838,7 +247839,7 @@ CVE-2024-13893,0,0,3c191b019ad8bca41c9ceeb2c69d9c8d113c5eb0e064d21fcad8c74b69588
CVE-2024-13894,0,0,ab63312fe14c13f84248948fb7e1cbd71d43e934157dafc13d81e8ce97c05349,2025-03-06T14:15:35.777000
CVE-2024-13895,0,0,4492bc2ee257d18bca9953df9b8cac0c39e553a0becf0650f5a076f780c0075e,2025-03-08T03:15:37.073000
CVE-2024-13897,0,0,2b3f7eacba585b88f33d4479c2c59b1496c7bd3c646dfd79c58ddcf5446cb9a9,2025-03-06T09:15:25.787000
CVE-2024-13899,0,0,870bc582b4e5e54ec271b834ba532de1ec152c1fd74f806dea51cde0522fe6e3,2025-02-22T04:15:09.720000
CVE-2024-13899,0,1,e4edc715220452fd07e6220b5cb8d42a824a7066c35204e88b1bc8bd671b1f9d,2025-03-11T13:26:57.550000
CVE-2024-1390,0,0,ffdeb8cc4a3b1077717739c1e237f842eedff68b0ec02858887f3acd549f9f88,2025-01-22T16:49:11.553000
CVE-2024-13900,0,0,a36f38c86f625b2f6c78f95d04b10fcda1c4c7dcd50cfc141d8c356f3933fb59,2025-02-25T04:02:36.137000
CVE-2024-13901,0,0,eae64dcc2a1b4a359bdfacf8ac3e5ceaa3388c11896901d76eda175625edfbfb,2025-03-01T06:15:33.827000
@ -248323,8 +248324,8 @@ CVE-2024-1885,0,0,7ea3ed176519e2703621ca997a7c0e104a14942fddc42c5f1878f52916751d
CVE-2024-1886,0,0,34e830dda137490c30a7bd9991c0e47aa55f4dae681659115cad098a32c8ad40,2024-11-21T08:51:31.620000
CVE-2024-1887,0,0,07427fe43adcc87e1ed287ebb70ad8434035bface1f49d7d6d6ee5c166f8d81a,2024-11-21T08:51:31.743000
CVE-2024-1888,0,0,2e83865db88ed6ed7d86140820c0a0e9367a53c83075660506e138a739819dc6,2024-11-21T08:51:31.867000
CVE-2024-1889,0,0,6f1c394355d61fd3dfd86d4099249eb53a2f4907f747ba36a260148264b84ed8,2025-02-27T22:03:40.670000
CVE-2024-1890,0,0,04472b515f8f4dd3f0362d8c1884d3ae0c78171c034b7a407836288f05db8e0e,2025-02-27T22:03:40.670000
CVE-2024-1889,0,1,ce255133a881fe52df9bbc7416dccbfa58f22187bfa04959d323dcc69fe7614b,2025-03-11T14:51:56.797000
CVE-2024-1890,0,1,9132dde10838f92d09c0a5b98d997a9ff884ec07b13957a64dacf09d8005b8b6,2025-03-11T14:51:33.223000
CVE-2024-1891,0,0,dcda7dbd0536cad9a123f74188eb37534068ccd38871f23683261bf2dbf9ff5c,2024-11-21T08:51:32.257000
CVE-2024-1892,0,0,7bf07694f57218e5cc93fa30b51bcec6621f09f9ba13357f3993185914d5961c,2025-01-10T14:49:33.690000
CVE-2024-1893,0,0,0ec8c49fd71ae75323e3eb052e6c32aa986dbf45b2fbc40f25b1de1b4b42a104,2025-02-05T15:47:12.477000
@ -252695,7 +252696,7 @@ CVE-2024-25452,0,0,ca5bee31974256da7e8e4d63f15ae6123aa17a8b01bebea28e4fe8e2fbc3d
CVE-2024-25453,0,0,70fb504352781ce397aa4364fe3b34ab3e4604c900948fb24593de6edb56ed28,2024-11-21T09:00:50.560000
CVE-2024-25454,0,0,eb0f60de174dc4a9651449d926569e95570750cdd71cce33c01236df21d8f22c,2024-11-21T09:00:50.730000
CVE-2024-25458,0,0,9ec13dc1734eb500e887f66744313cf44032a2e1f460e1aa11c6be649259eb7e,2024-11-21T09:00:50.897000
CVE-2024-2546,0,0,8cb295d8ab81570954347714079e5875b99b5e3e86e85d39f0c1833ed2a0a1cd,2025-01-27T17:05:46.703000
CVE-2024-2546,0,1,61804463bcd98d480ed37784327d8061c47253639826c7fd157b5366bcf93c66,2025-03-11T14:07:31.350000
CVE-2024-25461,0,0,beec46596f13e96701a918f7afd544b33f42667338f9bf1eea5911daccd8d140,2024-11-21T09:00:51.113000
CVE-2024-25466,0,0,2a08590dfd2bd6ae60347acbb99520233bbf6aaba3312cc669867e73fbe0b290,2024-11-21T09:00:51.330000
CVE-2024-25468,0,0,cb5aee55e71ce49f56a046712ac1820d937431364648488dc2293cc0e2ab59f0,2024-12-16T23:04:51.047000
@ -266323,7 +266324,7 @@ CVE-2024-43188,0,0,35ee6e8501322911378089524ec540a5a184dc89828aed8181b5a2e26a216
CVE-2024-43189,0,0,4329b1ae56560813f03b2e4daf88ebd148985b5623906e90c7a82cb945637938,2024-11-18T17:11:56.587000
CVE-2024-4319,0,0,e167e76473e812074495ec236ec0a27727cfd54ad2188a3f78327f54417068db,2024-11-21T09:42:37.037000
CVE-2024-43191,0,0,d5199499d5a91eb79af242e34e3162c18fd6ecd91ff3af4ecfe818744df5d4b8,2024-09-30T12:46:20.237000
CVE-2024-43196,0,0,8b2a836cbbe6658eba7cefd495a0d5c3f6f241a2ada1aa215976ab8247b3a542,2025-02-20T04:15:09.630000
CVE-2024-43196,0,1,3289563bfba313d1a658d9221f9b742518d70cfef918039fc44e6c379e3519f4,2025-03-11T14:57:13.920000
CVE-2024-43199,0,0,fcee5ba70074f223c6f2288517860f0fd6af7cbe4c5e3f3003c072f968a17261,2024-11-21T09:35:07.337000
CVE-2024-4320,0,0,66936457ccf92d087f54d9a7056c5f1c270eaa9e639ccc366ce51fdb54afa27d,2024-11-21T09:42:37.150000
CVE-2024-43201,0,0,453483b258239daf1448f7e5203b69017bb10ecdf3ec4f3974614dfa66c011ca,2025-02-28T18:15:27.813000
@ -267312,7 +267313,7 @@ CVE-2024-44189,0,0,74bae7e0ea0e127ff0dd8bcfea5ffa0e13e07892dd1a7bf2df17de4205cd8
CVE-2024-4419,0,0,ba2477d3286ec6ab4ab62bfd9b86b02d79b23b6497b6c9703950ad337d472a29,2024-11-21T09:42:47.617000
CVE-2024-44190,0,0,ec036b1f60dea569eef287561200a33a41aeefcf64eef3b61618ae6ebfbc5800,2024-09-24T18:02:25.313000
CVE-2024-44191,0,0,d240f1b8433a5ce6dbe87e65698049b28e8c35859d01c776684fda07dd899ed0,2024-12-02T15:00:03.333000
CVE-2024-44192,0,0,a65508e33916ca678af577c7aa7ef55b7cc3c8e543f48c093bc860c047a01f5c,2025-03-10T19:15:38.080000
CVE-2024-44192,0,1,4922d90e9ac0b62848d829438bd2dce6363151c2b61fc5a7d0793c9f6072cb72,2025-03-11T14:15:22.503000
CVE-2024-44193,0,0,e8cd317fa1c1f489397fd49c4be8f85204f966e9fa00998149de32c25c4e3ea8,2024-12-11T02:53:58.413000
CVE-2024-44194,0,0,789113f0658a6ddde1f6417d93be90ede379c24f3199a65cf3b83f7069f1c9c3,2024-12-06T15:15:08.690000
CVE-2024-44195,0,0,793ae5f7226dd15cb3926acd88ee4934145dd1a5d78b00b744cd556289693063,2025-01-23T20:38:14.517000
@ -270756,19 +270757,19 @@ CVE-2024-49333,0,0,e40cf35196ca18dee45163c0748fc145e27ae20ad0111de97528d70fea881
CVE-2024-49334,0,0,c834d2b3cc4ff6e9dea6658a6f1e0bf3ee35911e84a97a8c123fb548c9607113,2024-10-23T16:08:01.277000
CVE-2024-49335,0,0,3160ec720c602cc52406d525d62eec9c1419d94d6b3a852f9810bce5470fe4e2,2024-10-24T14:50:16.557000
CVE-2024-49336,0,0,539510d6e23e902df6d4e3e95547a312e71b12d932a3c561f3bb392c366417be,2025-02-25T12:15:30.257000
CVE-2024-49337,0,0,c94a8992a3019786bdcd4878609c71de57805da8b6a6c804be0db4d3d61ffa65,2025-02-20T12:15:09.293000
CVE-2024-49337,0,1,621ee91fb29666d3ce85f7dee78867edeac1e5dd4cc61ef0e36c5f3869d73023,2025-03-11T14:06:18.787000
CVE-2024-49338,0,0,089f0961a6c5fcf1312af989afac1f42747fad3dccba1132721dce2e32b4ec33,2025-01-18T15:15:07.433000
CVE-2024-49339,0,0,9425fb5c81f6dff392aaa0664ff1617cf111ffa2e6ae53225c22b9e873bc9df4,2025-01-31T17:15:15.260000
CVE-2024-4934,0,0,c48302b0b85313af5a6e75f2285d80b1e442db3b1b019c52648c5cb5dff0b2d3,2024-11-21T09:43:54.343000
CVE-2024-49340,0,0,121e4a69718b7eafa91c4d48c066b6562f54cd89bd7dd643eed0f1ac402e3c12,2024-11-08T15:06:21.730000
CVE-2024-49344,0,0,9e0687ee0ea9f1fd5f04cb21dbca91cbc677688bf0b1cd9b6ad399260cb28371,2025-02-20T12:15:10.377000
CVE-2024-49344,0,1,347784b34265f8b719b2af5b861570ef0177fd877a75f8c8b31285ef2dd3bfb4,2025-03-11T14:02:39.433000
CVE-2024-49348,0,0,3f0061500b4dd4e17045ad16baa9e311ee1ac03ef6339695bbc97d441fd8b3c3,2025-02-05T12:15:28.570000
CVE-2024-49349,0,0,ffc8da5d31c0a7888ad36cdc475b5ebfda5cfed0e4d2d3c1c13edb178b03d3f1,2025-01-31T17:15:15.410000
CVE-2024-49351,0,0,9d2fc2a435b61fd62d7b18f4f752bd55144b2c0d48ce521b6a020db1fccb6d13,2024-11-26T04:15:05.457000
CVE-2024-49352,0,0,f24ee2d0b214fc07a70235001ceb8e4d8491919596338c7e2ff1739a0221b03f,2025-02-05T11:15:14.540000
CVE-2024-49353,0,0,9a47fbcd7bb71cb815723fc7b290a5c5cc22a3729566f5b695bfbad427fe41cb,2024-11-26T04:15:05.690000
CVE-2024-49354,0,0,9932955dc8f1f42bc5bd9552d18c452e3eba49c8f646b04262c7f057d2eb1053,2025-01-18T16:15:39.040000
CVE-2024-49355,0,0,186776d570fdfec970f861699b80810dbdc70bd53f23355d5b199311a5b2f90d,2025-02-20T04:15:10.670000
CVE-2024-49355,0,1,cdb3030866a9a32f64528f4f82648ae2e6c29c66313443a1a997d09c50e59a15,2025-03-11T14:51:01.153000
CVE-2024-49357,0,0,60dd20801e0d688d79febf6ddf905b7a0f6bb6d52339368c8c03007d3568ef2f,2024-11-06T15:28:38.160000
CVE-2024-49358,0,0,9b3087a9abf7bda8601a66a382dce9cb35757f55c0440ca46162af784c9d23d1,2024-11-06T15:27:26.637000
CVE-2024-49359,0,0,f7b8bcd2f4e26f53c20b7ffd38bd81c3325d7981bb7902337d9402d860e0b277,2024-11-06T15:27:02.347000
@ -271084,11 +271085,11 @@ CVE-2024-49775,0,0,80561302864ea58e0b8a0928ce56db4a412fa4e922f0595e7642f4c103198
CVE-2024-49776,0,0,b329b9bb81d9728287170b18d3b168a17467bbe39eccc58affb8da9d8a750f4a,2024-11-15T18:35:34.550000
CVE-2024-49777,0,0,2267bc9ff93ef330d0a1f69ee1d413cb1459de2363d63c74f1eb9f77896870cc,2024-11-15T18:35:35.413000
CVE-2024-49778,0,0,ce01f58133a3eca198de9ca85c44a1634d3ab246b582a1e70ee7b9bae211ce29,2024-11-15T18:35:36.260000
CVE-2024-49779,0,0,ee5133546983a60a3acab2f18a8ecfc963b831a46e120464a0614632bc57ef21,2025-02-20T12:15:10.527000
CVE-2024-49779,0,1,11d9faeca8efac548a54dd7061c5352db691c8008a0a29eedad545ec098243af,2025-03-11T13:55:21.797000
CVE-2024-4978,0,0,a40a3231ffed7fdeffbb505af558ff22b05804a78c72232543ed223d8f93c370,2025-01-27T21:42:09.123000
CVE-2024-49780,0,0,490307f593047424f4c7c23dc48b5795cc2f2aee84d770c500f0b4a8f6bf3499,2025-02-20T12:15:10.657000
CVE-2024-49781,0,0,bd6cb8ef4203ad5b05c7f45eb9fc358902fba622f544c93da6a5c26c2f399df1,2025-02-20T12:15:10.747000
CVE-2024-49782,0,0,7ebf6eadab5e8506e34106adeb5616ef7773ec0635152435a2ffcd54d1329cf8,2025-02-20T04:15:10.973000
CVE-2024-49780,0,1,a5eeb5c953f31f22f904b9f32603ea26eb58551c6c880e6e71e38fa58f3218fc,2025-03-11T14:37:00.743000
CVE-2024-49781,0,1,7a7c5230f82df168630b4ee346fadce1932798b13bc7966e7f02bdcac534483d,2025-03-11T13:45:47.917000
CVE-2024-49782,0,1,eb1b325660d089297b139ebb8b35100ee9bf0dd503067300e105da1e368055be,2025-03-11T14:19:11.780000
CVE-2024-49785,0,0,dcbbdbf2606fdedeb39b6a5ca475a1ee2b528c61106132a119120d628a37dbeb,2025-01-12T02:15:18.973000
CVE-2024-49791,0,0,96d737340062d391dc8d2ec65a3cf5814cdc712ae532abc47d5246ff31fb5b9d,2025-02-12T18:59:58.627000
CVE-2024-49792,0,0,a0e4ddf61c9d96412e29678542a33e746e861ad48c587ec37ecef9eff3dcd9cb,2025-02-12T19:00:51.357000
@ -274251,6 +274252,8 @@ CVE-2024-5407,0,0,e082637321598f3dc8c3c9e1760b81a1e1197c4d13cd58fed3245c37f0bb71
CVE-2024-5408,0,0,0b23a712a85d13fef48f02294d854672174790bd624dfee1416450ccef66434a,2024-11-21T09:47:35.690000
CVE-2024-54082,0,0,65aa9ae45e1268a98d7772f17453032df41f59a165b23f820cdeaede4b477a68,2024-12-23T01:15:07.840000
CVE-2024-54083,0,0,5fd9cfa9d541ec1d140263f1195469b624b1e1b6173ea5643199f37a0fe69372,2024-12-16T08:15:05.317000
CVE-2024-54084,1,1,4f0e210377467adee92f82d52ddf648b0c3cd7ee62f68ddad2a0ed9c569d6caf,2025-03-11T14:15:22.730000
CVE-2024-54085,1,1,92258a2f99aac6276b664e2659d44d3ca335dbf093ccda66d6489065aa3fa75c,2025-03-11T14:15:22.893000
CVE-2024-54089,0,0,efd2198ce361ea992eb01ea5caf6a93dad81fb83e8cf416236617bce8d42af11,2025-02-11T11:15:15.423000
CVE-2024-5409,0,0,f7df79bf8c405f523130badde3800a80499e2a2f05cefac143617aad785ef5de,2024-11-21T09:47:35.810000
CVE-2024-54090,0,0,66ce7fba27ae90aef333be57d6145501dc74f76ec68d084b34f2e2ffb0d19de5,2025-02-11T11:15:15.647000
@ -274619,11 +274622,11 @@ CVE-2024-54465,0,0,3f87a539a20fcac13fcbeaaced058bbe0bd71776e4b4a361d00304853bb61
CVE-2024-54466,0,0,cde2c633b064403c3330cf4e329fab2afdda24c70189b50f9e401743db80aa51,2024-12-18T17:59:28.667000
CVE-2024-54467,0,0,97704c6eb8f9e282ec369ceef019385d9c2a941658cdbd5dc27bd31fa074ab07,2025-03-11T03:15:37.643000
CVE-2024-54468,0,0,a830975289ea24b4b020a52bcfcc38a9f682d3ea938ccb481221a83a22c3f0ba,2025-03-03T22:45:38.540000
CVE-2024-54469,0,0,4e760dca4376bf64d9f2986d2f1ef7bec295203a0efd3d37b57656a39bcbfbff,2025-03-10T19:15:38.493000
CVE-2024-54469,0,1,3641e76c72428a7525ac727ea5c6cdba619173e4ff3bb6de12a5bea5ce9e77fe,2025-03-11T14:15:23.030000
CVE-2024-5447,0,0,b60e0535b73a6be4da90a7fc1432b0141afa78596c3a5ade6408fe521639c5d0,2024-11-21T09:47:42.057000
CVE-2024-54470,0,0,fe219ee429ae9d3c4f4ad02abbcafd7f018f3e8df8603d9d5274597d26ba2e87,2025-01-16T17:15:12.433000
CVE-2024-54471,0,0,9114b466fc34414fa4a572e7f670091682a604ed9fad8d4333c1e0a423973c24,2024-12-19T15:25:31.960000
CVE-2024-54473,0,0,304e836f8d4cc8cc4b6bf28c90e798400bbdf32f3b68fe0da887f4773dd8fb17,2025-03-10T19:15:38.600000
CVE-2024-54473,0,1,47a4f84a552b7dc517b0045992037231e1dd2a8cc0db1415d8d2465f1f3980e2,2025-03-11T14:15:23.210000
CVE-2024-54474,0,0,46020811ce34dbfd650ffc7999c45871747b6fff681a5d6cbaf390708806a517,2024-12-16T22:15:07.160000
CVE-2024-54475,0,0,a64bd081c6112afb87121e755186f1170b928c354a4f743bbaba93305cdbdc46,2025-03-03T22:45:38.540000
CVE-2024-54476,0,0,c3a2d50ed82696e409e8a6d9ada543e48ecc4ebf5b11c3b3ae34dd603b3df108,2024-12-19T15:26:43.340000
@ -274697,7 +274700,7 @@ CVE-2024-54550,0,0,37e7e19b86f585f36721504b7c8a72258806c5ed7bd0186e279c332d1969c
CVE-2024-54557,0,0,3d0baeae19a93d052c3842b20411bb1817950b16584194ccb52fef0fc3d214c6,2025-01-31T22:15:10.300000
CVE-2024-54558,0,0,8ee580f8e9a0224e09fdd9d69c6d762673dea49f7a4c7d321411c375ce2a0993,2025-03-11T03:15:37.937000
CVE-2024-5456,0,0,3a1546469deeff993eb12e81bd13a91014bb8b4c59bc306c05d9d1bfeb03ccf5,2024-11-21T09:47:43.173000
CVE-2024-54560,0,0,37d4be383b235d8334353bd9ec26340c9800fe3298056531158b97c0a724ed99,2025-03-10T19:15:38.883000
CVE-2024-54560,0,1,330f8313dba017e5c7e6fbdb6b21385c83134fb8fe797e7729ceffadf52cb115,2025-03-11T14:15:23.417000
CVE-2024-5457,0,0,5c67880d08a73805d7cd1c17b384d326fd43c5a8887de09123f9750f9092dc92,2024-11-21T09:47:43.290000
CVE-2024-5458,0,0,8dbafb99fb85c57a2766bb8c0351967563ad88f8cfa7b660abd7c7ec5db25669,2024-11-21T09:47:43.413000
CVE-2024-5459,0,0,b7a22fae8a0174b7cca0e1147f2ed714677dfde4089a65746f06fba0f29d7308,2024-11-21T09:47:43.570000
@ -280573,10 +280576,10 @@ CVE-2025-0617,0,0,f628b1ad73170d04122e24ddb3e888ab06e1591d9b8c499515e522c90868af
CVE-2025-0619,0,0,d6798daeef3d7924598dddc8037e69d4ae3bc1784ffc6b426878fbbb52aa2ee9,2025-01-23T11:15:10.700000
CVE-2025-0622,0,0,e47fbbd3a3a716f89e6a5dc5e99d39a7414dccef8758c28db6b0464c5f5b2e87,2025-02-18T20:15:23.570000
CVE-2025-0623,0,0,341d910d0f0f4575e107592c92f38288f68e01fe716af21df488a6d82193e481,2025-01-21T17:15:16.817000
CVE-2025-0624,0,1,de78027bd9a8f6ac534b385e2815e6bcb51a3409fcc39fc14002d87fba9f3f6c,2025-03-11T12:15:11.820000
CVE-2025-0624,0,0,de78027bd9a8f6ac534b385e2815e6bcb51a3409fcc39fc14002d87fba9f3f6c,2025-03-11T12:15:11.820000
CVE-2025-0625,0,0,9d9d3d8170b51d99a85dfc09422efdaffda47b5baadb8c85253715ce0dc062af,2025-01-22T19:15:10.397000
CVE-2025-0626,0,0,16ee263c85f3aad6f9b7c5ed60390a064032d53adec3f9f8437b4c73151fb8c7,2025-03-01T18:15:34.140000
CVE-2025-0629,0,0,684072a6698eff7a3081e9f638cb3dbf320c35eb66cb0b4475230767ce44b0ad,2025-03-11T06:15:26.513000
CVE-2025-0629,0,1,24ead6902cb92b995d21c528547a6763c08e6185f38a728255a287cde487cd29,2025-03-11T14:15:24.090000
CVE-2025-0630,0,0,bb04cf8ef857d76c3a37bf8a5fa23865f63bacce52c7cbeba321e37955a961c9,2025-02-04T20:15:49.940000
CVE-2025-0631,0,0,f678fe6dd09f7e9ac50fdb058244ff83ef796d29890119e12d088befc24858a0,2025-01-28T19:15:14.270000
CVE-2025-0633,0,0,d99126f9166a4e84d3e57050e6aafa26d9cc8a19aa8e9fa3be65f2f9a812f3e1,2025-02-19T07:15:33.537000
@ -281786,7 +281789,7 @@ CVE-2025-21356,0,0,f7ea5cba60a230879dca18c3ee9d0c02c15b08e12f56fbab6a571232794a0
CVE-2025-21357,0,0,f113e4301bd00fab146fb1b2c2663099f0920807897ab88a84dd70d6d7ccbaa8,2025-01-21T19:40:05.823000
CVE-2025-21358,0,0,dab5145a40f866bd6dc784e58f5b52a4233c1ecc2ba83c4c10bd60eb1e0cf109,2025-02-14T22:53:11.470000
CVE-2025-21359,0,0,b08a0e3b95bd80411438de60c10b9f10ab424a6c433a2a5fc5fbadceddca0f2d,2025-02-14T22:50:04.610000
CVE-2025-2136,0,0,6f7b0d27733ecd5995b75026a215f5a404b68c1ef1ebb012b469dc667f933f0e,2025-03-10T21:15:40.730000
CVE-2025-2136,0,1,d012d42881f746e4b57a0feb33815a1f38da62d7d60a89c360eb127e93347a3a,2025-03-11T14:15:26.553000
CVE-2025-21360,0,0,1b890933152e0ad6c56f74976ff5f8eaba0ff19a3ed4db064fae08186acb8dc8,2025-01-17T20:40:22.527000
CVE-2025-21361,0,0,15333b9f9e4e095e5eb0227b45a3d79a56875bc396c0df556b7a044756c81d2f,2025-01-17T20:39:49.017000
CVE-2025-21362,0,0,2902d63a2e75a1ecbc123770588d73eec93458274a31a234a8cbf1bc4f8d0b31,2025-01-17T20:38:30.560000
@ -281797,7 +281800,7 @@ CVE-2025-21366,0,0,a59588c0dfff3655b9552370538e4464b57213529c36230194728bdd056ea
CVE-2025-21367,0,0,ee574f31e150644922f442d6f99c433b14b4fc5cc545ddcec754dd048735da70,2025-02-14T22:46:58.147000
CVE-2025-21368,0,0,6c0f601be861c16b3bf5acbace3cefe9363096c39f16a1f2cff45abb52cfb9f0,2025-02-26T15:23:31.897000
CVE-2025-21369,0,0,d0f7f9a542e9386cee8bc2fe054aad034a1d34994bfe93b9978ffac49c3bff63,2025-02-26T15:23:31.897000
CVE-2025-2137,0,0,574f8116782e68fbf81613d426d526d5951a69f54af0f3511fb6eb1e9bdb0a9c,2025-03-10T21:15:40.857000
CVE-2025-2137,0,1,4d22a395a343341660bc79a88076d9ca305f30018cbfccf713e4af1159d19a0c,2025-03-11T14:15:26.737000
CVE-2025-21370,0,0,4f2d9ad677d80f1448cc8df24916a78dc10d6e491dbdc144c8692d9ee5b64fb9,2025-01-17T15:33:41.967000
CVE-2025-21371,0,0,f41819969d65dc6998fb17f05a6a2ed4a10ad2f05a6bab1e2a1104b97d6ce0fd,2025-03-03T22:15:37.820000
CVE-2025-21372,0,0,3a043b222986f0210a248c5eb2603857944565822a2729da3fb2f989508cf536,2025-01-17T15:36:24.423000
@ -282184,9 +282187,14 @@ CVE-2025-21840,0,0,79e0fdabfbd29cc80f75cdf397a49e5d1ecc594978efa8294abd14922129d
CVE-2025-21841,0,0,0dca55d80fff9bcd7a7d9ca27998b88ddb1e3e910c9ef6e7f9773a1db067d787,2025-03-07T09:15:17.137000
CVE-2025-21842,0,0,3341f3038ecf404014e00b515c1bfa146525327fcf880829bca5a72d8d6579f7,2025-03-07T09:15:17.237000
CVE-2025-21843,0,0,3c861851a6a9ed333443a3318029811e8258a3287563151b71a94780dd7552ce,2025-03-07T09:15:17.343000
CVE-2025-2189,1,1,0f0485d6b72522c6026e55cc9bfa123cea29477bef4292e09a4550e88c1b0506,2025-03-11T12:15:12.057000
CVE-2025-2190,0,0,839caafb3eeab456c5f4b886150312f72b739a240b7a1e49c7f3e07e0a4dd95e,2025-03-11T07:15:37.950000
CVE-2025-2191,1,1,3cf8cad58124b509a1a514bc0c337544536183b60b4c73508e7eca625ca9d4ab,2025-03-11T12:15:12.277000
CVE-2025-2189,0,0,0f0485d6b72522c6026e55cc9bfa123cea29477bef4292e09a4550e88c1b0506,2025-03-11T12:15:12.057000
CVE-2025-2190,0,1,16b1a05c84b9c153f0c21b975460283193f2f077bc77e69b6f4d369ddd154f19,2025-03-11T14:15:27.163000
CVE-2025-2191,0,0,3cf8cad58124b509a1a514bc0c337544536183b60b4c73508e7eca625ca9d4ab,2025-03-11T12:15:12.277000
CVE-2025-2192,1,1,2f112aaf25fe0e137e21c5adbc7b1661b6634fd3b1bcf8c17de2bb81f707ee96,2025-03-11T14:15:27.443000
CVE-2025-2193,1,1,dbb88f82f459ba010cbc51df271b53627184df972115671971d575e549527184,2025-03-11T14:15:27.630000
CVE-2025-2194,1,1,e1aa96e726cf539676cb80ef975737c88c94790ed00a89f75cdf680a8e3413dc,2025-03-11T14:15:27.753000
CVE-2025-2195,1,1,e292a4558d2ed8851de21bc82f067e4484772946d40eaa7eddec3f6225a02ee5,2025-03-11T14:15:27.937000
CVE-2025-2196,1,1,59e5a21c779c1b597e73c1ddba8e0655dec15010418379179d66140aea5d4385,2025-03-11T14:15:28.123000
CVE-2025-22129,0,0,d84466451eb5813ecdb45d579943a91ad86a0d891b836c8fd8053b0ece067119,2025-02-04T19:15:33.360000
CVE-2025-22130,0,0,fe16d9f63e9545f97bce7adcca434385cbaf054f6f17003be6f1b5abf3fc1663,2025-01-08T16:15:38.543000
CVE-2025-22131,0,0,6176cb6449a6745057b5584cc8bde5826af6d54b0e60fda45ed3c6106ba08f4b,2025-03-06T13:30:34.893000
@ -282320,6 +282328,11 @@ CVE-2025-22362,0,0,9877c63a6160c0c338a7dcb00929c3a65bc9baa6fcce8ad8cada6e19670cf
CVE-2025-22363,0,0,34e2db3f81fd7a3e94ee4111d69bd101fd65058f31cf66551a8678163c9bff7f,2025-01-07T17:15:33.377000
CVE-2025-22364,0,0,02d6b470672aaccdb63d99c6862a47c68775bfe3d3e9c9816eef4305afe53ac6,2025-01-07T11:15:19.600000
CVE-2025-22365,0,0,4c3451815a0a11b5acf2693a92329835d8e81c7866963277c1b209d8a8847915,2025-01-07T17:15:33.510000
CVE-2025-22366,1,1,49af6ad49f00f1b612f67fb10b6b7ef3b1df897488f85d0b19cc24457a4d6da2,2025-03-11T14:15:24.313000
CVE-2025-22367,1,1,7b16dfd7874d4e8011943d8912e54683aefa7fee306071fb6e1baf0b74dece4b,2025-03-11T14:15:24.480000
CVE-2025-22368,1,1,0b73a0a5bdd93900ca4da33140761cf6e68b8a7dbd80d8ed9741111f05f6a91c,2025-03-11T14:15:24.627000
CVE-2025-22369,1,1,3547a766c1f44b0b25d5915538b1ac4bd7520b7de4c5cfcd55236561bd2f432d,2025-03-11T14:15:24.767000
CVE-2025-22370,1,1,d256625e076d8518b6f293d565068cb744a8504faf610a3e0544f7e67df6efb2,2025-03-11T14:15:24.917000
CVE-2025-22376,0,0,0b599d4fbe0b053f67328db02ad6a56c3b1af5acbc775b8d4fa33614fa96b0bf,2025-01-21T18:15:15.473000
CVE-2025-22383,0,0,971c2012aab2f3f792cbdd2c68df4004dd1217088db2d92a7bb003d39ddd9443,2025-01-06T15:15:16.103000
CVE-2025-22384,0,0,cce93b0fc1a45d09b2ac82e610ea925820e4793a4749701feb605ea07db42a77,2025-01-06T17:15:47.820000
@ -284606,6 +284619,7 @@ CVE-2025-27353,0,0,24ac6ebce3848378b1344a6468f91efd03d707d9d99a1f55a994a6db165de
CVE-2025-27355,0,0,caa62ce9bbf1bb76cf121e6e89f446abe3d40a89991436a920bab478df84b04e,2025-02-24T15:15:20.917000
CVE-2025-27356,0,0,c6532ae1cc5e3e40abfb75187df6e9c621394ebd78da8fba75994511b24c76a9,2025-02-24T15:15:21.077000
CVE-2025-27357,0,0,e2381e6c407b4287d4d33f07c25d73cafce07e3f2901d8a47889678f366841e0,2025-02-24T15:15:21.233000
CVE-2025-27363,1,1,09f9fb825caea6d57e7cffd59254354664df495b52672380cd8ff2dc022bb320,2025-03-11T14:15:25.427000
CVE-2025-27364,0,0,9286c5546baa0d62309d5b0261f0843f04abf72743b73d703ec5236da175e8e1,2025-02-24T20:15:34.180000
CVE-2025-27370,0,0,301bcdda9004e5b7c615787be8261d29f372b1c6dad0d66a3ec48ed006a51eb2,2025-03-07T17:15:22.083000
CVE-2025-27371,0,0,31b005538dedaada9447bbdc44fad86b917b948837ed08d1d87a7d4ac7d8bec8,2025-03-07T17:15:22.190000
@ -284742,7 +284756,7 @@ CVE-2025-27825,0,0,99e9b9d3befd54cbb55880416607fbc7e5d90c9fee9cdc2881cb2480979fe
CVE-2025-27826,0,0,83fe28f5c1c38336a328c924367a016f575cf3bedee9c6070949943b515ded3d,2025-03-07T22:15:38.527000
CVE-2025-27839,0,0,212b3d30d2c1f53f372c7e143c6e03922deeb9da14f018db14d5749815db8000,2025-03-08T00:15:38.340000
CVE-2025-27840,0,0,31b43659fdf50a1c837def79b3ff8549c2485895c251972e0cf021cb5a031b4d,2025-03-10T14:15:25.943000
CVE-2025-27893,0,0,dbf8992f02cfd0901930576b77bdc424b78b7f410ce35e6828c7e6c7bc393fb1,2025-03-11T09:15:25.457000
CVE-2025-27893,0,1,a7d9d5e7e8d9c3f5b258ec55eeef037e0e84dc16b4d2b284979eeb2051048448,2025-03-11T14:15:26.033000
CVE-2025-27910,0,0,563dfaf4a98237987ed986f935d53295ee6e1d7704cf33b760a3d1b009fcbb36,2025-03-10T22:15:27.287000
CVE-2025-27911,0,0,a0c6ccdc879c82f419af984764f8bbd745b8c7dbfe537741e5c7db439b43c1d8,2025-03-11T08:15:11.500000
CVE-2025-27912,0,0,67c4abc4012a58019561c5dfd64461436dcdb5654152f5b2e4d5067de3236377,2025-03-11T08:15:11.727000

Can't render this file because it is too large.