Auto-Update: 2025-03-26T15:00:20.481078+00:00

This commit is contained in:
cad-safe-bot 2025-03-26 15:03:51 +00:00
parent f3f776cdb4
commit 516cf684d4
83 changed files with 3200 additions and 280 deletions

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-38674",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-02-12T04:15:15.070",
"lastModified": "2024-11-21T07:16:54.887",
"lastModified": "2025-03-26T14:15:17.500",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-190"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-400"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-38675",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-02-12T04:15:15.143",
"lastModified": "2024-11-21T07:16:55.017",
"lastModified": "2025-03-26T14:15:20.040",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-787"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-38680",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-02-12T04:15:15.200",
"lastModified": "2024-11-21T07:16:55.673",
"lastModified": "2025-03-26T14:15:20.263",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-190"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-190"
}
]
}
],
"configurations": [

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2022-39163",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2025-03-26T14:15:20.793",
"lastModified": "2025-03-26T14:15:20.793",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "IBM Cognos Controller 11.0.0 through 11.1.0 is vulnerable to a Client-Side Desync (CSD) attack where an attacker could exploit a desynchronized browser connection that could lead to further cross-site scripting (XSS) attacks."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.6,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-444"
}
]
}
],
"references": [
{
"url": "https://www.ibm.com/support/pages/node/7192746",
"source": "psirt@us.ibm.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-44447",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-02-12T04:15:16.277",
"lastModified": "2024-11-21T07:28:02.497",
"lastModified": "2025-03-26T14:15:21.223",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-476"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-4459",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-02-06T20:15:11.397",
"lastModified": "2024-11-21T07:35:18.480",
"lastModified": "2025-03-26T14:15:25.590",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-45786",
"sourceIdentifier": "security@apache.org",
"published": "2023-02-04T21:15:09.023",
"lastModified": "2024-11-21T07:29:42.837",
"lastModified": "2025-03-26T14:15:21.453",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,13 +32,33 @@
},
"exploitabilityScore": 2.2,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.2,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "security@apache.org",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-4577",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-02-06T20:15:11.530",
"lastModified": "2024-11-21T07:35:31.770",
"lastModified": "2025-03-26T14:15:25.800",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-4674",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-02-06T20:15:11.860",
"lastModified": "2024-11-21T07:35:42.747",
"lastModified": "2025-03-26T14:15:25.987",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-47326",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-02-12T04:15:17.153",
"lastModified": "2024-11-21T07:31:43.450",
"lastModified": "2025-03-26T14:15:21.730",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 0.5,
"impactScore": 5.9
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-862"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-47328",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-02-12T04:15:17.260",
"lastModified": "2024-11-21T07:31:44.153",
"lastModified": "2025-03-26T14:15:21.953",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 0.5,
"impactScore": 5.9
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-862"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-47329",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-02-12T04:15:17.330",
"lastModified": "2024-11-21T07:31:44.277",
"lastModified": "2025-03-26T14:15:22.157",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 0.5,
"impactScore": 5.9
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-862"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-47331",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-02-12T04:15:17.450",
"lastModified": "2024-11-21T07:31:44.507",
"lastModified": "2025-03-26T14:15:22.347",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 1.0,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.0,
"impactScore": 3.6
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-362"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-362"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-47339",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-02-12T04:15:17.617",
"lastModified": "2024-11-21T07:31:45.440",
"lastModified": "2025-03-26T14:15:22.543",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 0.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 0.8,
"impactScore": 5.9
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-862"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-47341",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-02-12T04:15:17.680",
"lastModified": "2024-11-21T07:31:45.663",
"lastModified": "2025-03-26T14:15:22.737",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 0.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 0.8,
"impactScore": 5.9
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-862"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-47342",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-02-12T04:15:17.730",
"lastModified": "2024-11-21T07:31:45.777",
"lastModified": "2025-03-26T14:15:22.937",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-129"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-129"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-47343",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-02-12T04:15:17.780",
"lastModified": "2024-11-21T07:31:45.887",
"lastModified": "2025-03-26T14:15:23.137",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-129"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-129"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-47344",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-02-12T04:15:17.837",
"lastModified": "2024-11-21T07:31:46.030",
"lastModified": "2025-03-26T14:15:23.320",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-129"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-129"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-47345",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-02-12T04:15:17.897",
"lastModified": "2024-11-21T07:31:46.170",
"lastModified": "2025-03-26T14:15:23.523",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-129"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-129"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-47357",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-02-12T04:15:18.273",
"lastModified": "2024-11-21T07:31:49.133",
"lastModified": "2025-03-26T14:15:23.730",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-862"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-47358",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-02-12T04:15:18.327",
"lastModified": "2024-11-21T07:31:49.263",
"lastModified": "2025-03-26T14:15:23.927",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-862"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-47359",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-02-12T04:15:18.380",
"lastModified": "2024-11-21T07:31:49.393",
"lastModified": "2025-03-26T14:15:24.137",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-862"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-47360",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-02-12T04:15:18.430",
"lastModified": "2024-11-21T07:31:49.530",
"lastModified": "2025-03-26T14:15:24.343",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-862"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-47361",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-02-12T04:15:18.480",
"lastModified": "2024-11-21T07:31:49.657",
"lastModified": "2025-03-26T14:15:24.560",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-862"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-47370",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-02-12T04:15:18.893",
"lastModified": "2024-11-21T07:31:50.653",
"lastModified": "2025-03-26T14:15:24.750",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H",
"baseScore": 5.0,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.3,
"impactScore": 3.6
}
]
},
@ -45,6 +65,16 @@
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-400"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-47371",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-02-12T04:15:18.950",
"lastModified": "2024-11-21T07:31:50.767",
"lastModified": "2025-03-26T14:15:24.940",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-416"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-47452",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-02-12T04:15:19.107",
"lastModified": "2024-11-21T07:31:59.453",
"lastModified": "2025-03-26T14:15:25.120",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-787"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-48311",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-02-06T21:15:09.587",
"lastModified": "2024-11-21T07:33:08.447",
"lastModified": "2025-03-26T14:15:25.310",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.3,
"impactScore": 6.0
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H",
"baseScore": 9.0,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.3,
"impactScore": 6.0
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-79"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-4824",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-02-06T20:15:12.303",
"lastModified": "2024-11-21T07:36:01.127",
"lastModified": "2025-03-26T14:15:26.187",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-0144",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-02-06T20:15:13.183",
"lastModified": "2024-11-21T07:36:38.360",
"lastModified": "2025-03-26T14:15:26.400",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-0178",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-02-06T20:15:13.990",
"lastModified": "2024-11-21T07:36:41.600",
"lastModified": "2025-03-26T14:15:26.580",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-0282",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-02-06T20:15:14.240",
"lastModified": "2024-11-21T07:36:53.393",
"lastModified": "2025-03-26T14:15:26.760",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-20608",
"sourceIdentifier": "security@mediatek.com",
"published": "2023-02-06T20:15:14.673",
"lastModified": "2024-11-21T07:41:13.110",
"lastModified": "2025-03-26T14:15:26.940",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 0.5,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 0.5,
"impactScore": 5.9
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-416"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-20609",
"sourceIdentifier": "security@mediatek.com",
"published": "2023-02-06T20:15:14.720",
"lastModified": "2024-11-21T07:41:13.240",
"lastModified": "2025-03-26T14:15:27.147",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 0.8,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 0.8,
"impactScore": 3.6
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-125"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-20610",
"sourceIdentifier": "security@mediatek.com",
"published": "2023-02-06T20:15:14.767",
"lastModified": "2024-11-21T07:41:13.370",
"lastModified": "2025-03-26T14:15:27.333",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 0.5,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 0.5,
"impactScore": 5.9
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-662"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-662"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-20611",
"sourceIdentifier": "security@mediatek.com",
"published": "2023-02-06T20:15:14.817",
"lastModified": "2024-11-21T07:41:13.470",
"lastModified": "2025-03-26T14:15:27.513",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 0.5,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 0.5,
"impactScore": 5.9
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-662"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-662"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-20612",
"sourceIdentifier": "security@mediatek.com",
"published": "2023-02-06T20:15:14.863",
"lastModified": "2024-11-21T07:41:13.590",
"lastModified": "2025-03-26T14:15:27.683",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 0.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 0.8,
"impactScore": 5.9
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-20"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-20613",
"sourceIdentifier": "security@mediatek.com",
"published": "2023-02-06T20:15:14.910",
"lastModified": "2024-11-21T07:41:13.703",
"lastModified": "2025-03-26T14:15:27.857",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 0.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 0.8,
"impactScore": 5.9
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-20"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-20614",
"sourceIdentifier": "security@mediatek.com",
"published": "2023-02-06T20:15:14.957",
"lastModified": "2024-11-21T07:41:13.817",
"lastModified": "2025-03-26T14:15:28.053",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 0.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 0.8,
"impactScore": 5.9
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-787"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-20854",
"sourceIdentifier": "security@vmware.com",
"published": "2023-02-03T19:15:13.733",
"lastModified": "2024-11-21T07:41:42.060",
"lastModified": "2025-03-26T14:15:28.260",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 2.0,
"impactScore": 5.8
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:H",
"baseScore": 8.4,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.0,
"impactScore": 5.8
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-269"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-269"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-24198",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-02-06T15:15:10.827",
"lastModified": "2024-11-21T07:47:34.100",
"lastModified": "2025-03-26T14:15:28.920",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-89"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-24199",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-02-06T15:15:10.917",
"lastModified": "2024-11-21T07:47:34.253",
"lastModified": "2025-03-26T14:15:29.150",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-89"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-24200",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-02-06T15:15:11.007",
"lastModified": "2024-11-21T07:47:34.410",
"lastModified": "2025-03-26T14:15:29.363",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-89"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-24201",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-02-06T15:15:11.097",
"lastModified": "2024-11-21T07:47:34.573",
"lastModified": "2025-03-26T14:15:29.560",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-89"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-789"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-24202",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-02-06T15:15:11.183",
"lastModified": "2024-11-21T07:47:34.720",
"lastModified": "2025-03-26T14:15:29.760",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-434"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-434"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-21031",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2024-04-16T22:15:18.863",
"lastModified": "2024-11-21T08:53:39.210",
"lastModified": "2025-03-26T14:15:30.167",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -19,7 +19,7 @@
"cvssMetricV31": [
{
"source": "secalert_us@oracle.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
@ -49,6 +49,16 @@
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-285"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-21161",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2024-07-16T23:15:18.930",
"lastModified": "2024-11-21T08:53:54.160",
"lastModified": "2025-03-26T14:15:30.330",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -19,7 +19,7 @@
"cvssMetricV31": [
{
"source": "secalert_us@oracle.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
@ -49,6 +49,16 @@
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-400"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-25413",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-02-16T02:15:51.307",
"lastModified": "2025-01-13T14:34:23.363",
"vulnStatus": "Analyzed",
"lastModified": "2025-03-26T14:15:30.490",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -69,6 +69,16 @@
"value": "CWE-91"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-91"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-27793",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-05-14T15:13:02.777",
"lastModified": "2024-12-09T19:28:03.753",
"vulnStatus": "Analyzed",
"lastModified": "2025-03-26T14:15:30.717",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -69,6 +69,16 @@
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-33305",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-05-02T14:15:10.023",
"lastModified": "2024-11-21T09:16:46.857",
"lastModified": "2025-03-26T14:15:30.893",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,30 @@
"value": "SourceCodester Laboratory Management System 1.0 es vulnerable a Cross Site Scripting (XSS) a trav\u00e9s del par\u00e1metro \"Segundo nombre\" en Crear usuario."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-37118",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-21T14:15:12.477",
"lastModified": "2024-11-21T09:23:13.883",
"lastModified": "2025-03-26T14:15:31.097",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -69,6 +69,16 @@
"value": "CWE-352"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-38276",
"sourceIdentifier": "patrick@puiterwijk.org",
"published": "2024-06-18T20:15:14.093",
"lastModified": "2024-11-21T09:25:14.557",
"lastModified": "2025-03-26T14:15:31.260",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-45351",
"sourceIdentifier": "security@xiaomi.com",
"published": "2025-03-26T14:15:31.457",
"lastModified": "2025-03-26T14:15:31.457",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A code execution vulnerability exists in the Xiaomi Game center application product. The vulnerability is caused by improper input validation and can be exploited by attackers to execute malicious code."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@xiaomi.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "security@xiaomi.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-1284"
}
]
}
],
"references": [
{
"url": "https://trust.mi.com/zh-CN/misrc/bulletins/advisory?cveId=549",
"source": "security@xiaomi.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-5690",
"sourceIdentifier": "security@mozilla.org",
"published": "2024-06-11T13:15:50.553",
"lastModified": "2024-11-21T09:48:10.377",
"lastModified": "2025-03-26T14:15:31.660",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-203"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-203"
}
]
}
],
"configurations": [

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2025-2228",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-03-26T13:15:36.373",
"lastModified": "2025-03-26T13:15:36.373",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Responsive Addons for Elementor \u2013 Free Elementor Addons Plugin and Elementor Templates plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.6.8 the 'register_user' function. This makes it possible for authenticated attackers, with Contributor-level access and above, to extract sensitive data including usernames and passwords of any users who register via the Edit Login | Registration Form widget, as long as that user opens the email notification for successful registration."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N",
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.1,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/responsive-addons-for-elementor/trunk/includes/modules-manager/login-register/class-login-register.php#L369",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3261241/",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/659ef2e8-589c-4901-88ce-1d674c056ece?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,68 @@
{
"id": "CVE-2025-23203",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-03-26T14:15:32.250",
"lastModified": "2025-03-26T14:15:32.250",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Icinga Director is an Icinga config deployment tool. A Security vulnerability has been found starting in version 1.0.0 and prior to 1.10.3 and 1.11.3 on several director endpoints of REST API. To reproduce this vulnerability an authenticated user with permission to access the Director is required (plus api access with regard to the api endpoints). And even though some of these Icinga Director users are restricted from accessing certain objects, are able to retrieve information related to them if their name is known. This makes it possible to change the configuration of these objects by those Icinga Director users restricted from accessing them. This results in further exploitation, data breaches and sensitive information disclosure. Affected endpoints include icingaweb2/director/service, if the host name is left out of the query; icingaweb2/directore/notification; icingaweb2/director/serviceset; and icingaweb2/director/scheduled-downtime. In addition, the endpoint `icingaweb2/director/services?host=filteredHostName` returns a status code 200 even though the services for the host is filtered. This in turn lets the restricted user know that the host `filteredHostName` exists even though the user is restricted from accessing it. This could again result in further exploitation of this information and data breaches. Icinga Director has patches in versions 1.10.3 and 1.11.1. If upgrading is not feasible, disable the director module for the users other than admin role for the time being."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:N",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.2,
"impactScore": 4.2
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-200"
},
{
"lang": "en",
"value": "CWE-284"
}
]
}
],
"references": [
{
"url": "https://github.com/Icinga/icingaweb2-module-director/releases/tag/v1.10.3",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/Icinga/icingaweb2-module-director/releases/tag/v1.11.3",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/Icinga/icingaweb2-module-director/security/advisories/GHSA-3233-ggc5-m3qg",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2025-24808",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-03-26T14:15:32.417",
"lastModified": "2025-03-26T14:15:32.417",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Discourse is an open-source discussion platform. Prior to versions 3.3.4 on the `stable` branch and `3.4.0.beta5` on the `beta` branch, someone who is about to reach the limit of users in a group DM may send requests to add new users in parallel. The requests might all go through ignoring the limit due to a race condition. The patch in versions `3.3.4` and `3.4.0.beta5` uses the `lock` step in service to wrap part of the `add_users_to_channel` service inside a distributed lock/mutex in order to avoid the race condition."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-362"
}
]
}
],
"references": [
{
"url": "https://github.com/discourse/discourse/commit/a16b2f224860f6678f89f5ffa012f0ede17e4095",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/discourse/discourse/security/advisories/GHSA-hfcx-qjw6-573r",
"source": "security-advisories@github.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-25193",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-02-10T22:15:38.450",
"lastModified": "2025-02-21T18:15:37.253",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-26T13:14:32.087",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
@ -51,22 +71,53 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:netty:netty:*:*:*:*:*:*:*:*",
"versionEndExcluding": "4.1.118",
"matchCriteriaId": "A71F5AEF-CB1E-41D1-A0D8-804DCF674542"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/netty/netty/commit/d1fbda62d3a47835d3fb35db8bd42ecc205a5386",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Patch",
"Third Party Advisory"
]
},
{
"url": "https://github.com/netty/netty/security/advisories/GHSA-389x-839f-4rhx",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://security.netapp.com/advisory/ntap-20250221-0006/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://github.com/netty/netty/security/advisories/GHSA-389x-839f-4rhx",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,20 +2,63 @@
"id": "CVE-2025-25371",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-03-25T21:15:41.907",
"lastModified": "2025-03-25T21:15:41.907",
"lastModified": "2025-03-26T14:15:32.570",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "NASA cFS (Core Flight System) Aquila is vulnerable to path traversal in the OSAL module, allowing the override of any arbitrary file on the system."
},
{
"lang": "es",
"value": "NASA cFS (Core Flight System) Aquila es vulnerable a la traves\u00eda de ruta en el m\u00f3dulo OSAL, lo que permite anular cualquier archivo arbitrario en el sistema."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://visionspace.com/nasa-cfs-version-aquila-software-vulnerability-assessment/",
"source": "cve@mitre.org"
},
{
"url": "https://visionspace.com/nasa-cfs-version-aquila-software-vulnerability-assessment/",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -2,20 +2,63 @@
"id": "CVE-2025-25372",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-03-25T21:15:42.027",
"lastModified": "2025-03-25T21:15:42.027",
"lastModified": "2025-03-26T14:15:32.750",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "NASA cFS (Core Flight System) Aquila is vulnerable to segmentation fault via sending a malicious telecommand to the Memory Management Module."
},
{
"lang": "es",
"value": "NASA cFS (Core Flight System) Aquila es vulnerable a una falla de segmentaci\u00f3n al enviar un telecomando malicioso al m\u00f3dulo de administraci\u00f3n de memoria."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://visionspace.com/nasa-cfs-version-aquila-software-vulnerability-assessment/",
"source": "cve@mitre.org"
},
{
"url": "https://visionspace.com/nasa-cfs-version-aquila-software-vulnerability-assessment/",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -2,20 +2,63 @@
"id": "CVE-2025-25374",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-03-25T21:15:42.250",
"lastModified": "2025-03-25T21:15:42.250",
"lastModified": "2025-03-26T14:15:32.930",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In NASA cFS (Core Flight System) Aquila, it is possible to put the onboard software in a state that will prevent the launch of any external application, causing a platform denial of service."
},
{
"lang": "es",
"value": "En NASA cFS (Core Flight System) Aquila, es posible poner el software de a bordo en un estado que impida el lanzamiento de cualquier aplicaci\u00f3n externa, provocando una denegaci\u00f3n de servicio de la plataforma."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-400"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://visionspace.com/nasa-cfs-version-aquila-software-vulnerability-assessment/",
"source": "cve@mitre.org"
},
{
"url": "https://visionspace.com/nasa-cfs-version-aquila-software-vulnerability-assessment/",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-2654",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-03-23T16:15:13.840",
"lastModified": "2025-03-24T13:15:27.943",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-26T14:54:37.560",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in SourceCodester AC Repair and Services System 1.0. It has been classified as critical. This affects an unknown part of the file /admin/services/manage_service.php. The manipulation of the argument ID leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."
},
{
"lang": "es",
"value": "Se encontr\u00f3 una vulnerabilidad en SourceCodester AC Repair and Services System 1.0. Se ha clasificado como cr\u00edtica. Afecta una parte desconocida del archivo /admin/services/manage_service.php. La manipulaci\u00f3n del ID del argumento provoca una inyecci\u00f3n SQL. Es posible iniciar el ataque de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado."
}
],
"metrics": {
@ -76,6 +80,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
@ -120,30 +144,68 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oretnom23:ac_repair_and_services_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "05923259-9480-4FD7-AE20-DCD4D8B79498"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/Colorado-all/cve/blob/main/AC%20Repair%20and%20Services%20System%20using/SQL-4.md",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit"
]
},
{
"url": "https://vuldb.com/?ctiid.300669",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.300669",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"VDB Entry",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?submit.520013",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://www.sourcecodester.com/",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Product"
]
},
{
"url": "https://github.com/Colorado-all/cve/blob/main/AC%20Repair%20and%20Services%20System%20using/SQL-4.md",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit"
]
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-2672",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-03-23T23:15:13.847",
"lastModified": "2025-03-23T23:15:13.847",
"vulnStatus": "Received",
"lastModified": "2025-03-26T14:37:30.087",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in code-projects Payroll Management System 1.0. It has been rated as critical. This issue affects some unknown processing of the file /add_deductions.php. The manipulation of the argument bir leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well."
},
{
"lang": "es",
"value": "Se encontr\u00f3 una vulnerabilidad en code-projects Payroll Management System 1.0. Se ha clasificado como cr\u00edtica. Este problema afecta a un procesamiento desconocido del archivo /add_deductions.php. La manipulaci\u00f3n del argumento bir provoca una inyecci\u00f3n SQL. El ataque puede iniciarse remotamente. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Otros par\u00e1metros tambi\u00e9n podr\u00edan verse afectados."
}
],
"metrics": {
@ -59,7 +63,7 @@
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
@ -76,6 +80,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
],
"cvssMetricV2": [
@ -118,28 +142,74 @@
"value": "CWE-89"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fabianros:employees_payroll_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "87FD87A0-67F0-4820-9BD8-9D950378A28D"
}
]
}
]
}
],
"references": [
{
"url": "https://code-projects.org/",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Product"
]
},
{
"url": "https://github.com/FoLaJJ/cve/blob/main/sqlcve.md",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.300689",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.300689",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.521243",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"VDB Entry",
"Third Party Advisory"
]
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-2673",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-03-24T00:15:12.467",
"lastModified": "2025-03-24T00:15:12.467",
"vulnStatus": "Received",
"lastModified": "2025-03-26T14:15:40.467",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as problematic has been found in code-projects Payroll Management System 1.0. Affected is an unknown function of the file /home_employee.php. The manipulation of the argument division leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well."
},
{
"lang": "es",
"value": "Se ha detectado una vulnerabilidad clasificada como problem\u00e1tica en code-projects Payroll Management System 1.0. Se ve afectada una funci\u00f3n desconocida del archivo /home_employee.php. La manipulaci\u00f3n de la divisi\u00f3n de argumentos provoca ataques de cross site scripting. Es posible ejecutar el ataque de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Otros par\u00e1metros tambi\u00e9n podr\u00edan verse afectados."
}
],
"metrics": {
@ -59,7 +63,7 @@
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
@ -76,6 +80,26 @@
},
"exploitabilityScore": 2.1,
"impactScore": 1.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
],
"cvssMetricV2": [
@ -118,28 +142,74 @@
"value": "CWE-94"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fabianros:employees_payroll_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "87FD87A0-67F0-4820-9BD8-9D950378A28D"
}
]
}
]
}
],
"references": [
{
"url": "https://code-projects.org/",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Product"
]
},
{
"url": "https://github.com/FoLaJJ/cve/blob/main/xsscve.md",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.300690",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.300690",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"VDB Entry",
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?submit.521244",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"VDB Entry",
"Third Party Advisory"
]
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-2674",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-03-24T00:15:13.533",
"lastModified": "2025-03-24T00:15:13.533",
"vulnStatus": "Received",
"lastModified": "2025-03-26T14:09:08.730",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as critical was found in PHPGurukul Bank Locker Management System 1.0. Affected by this vulnerability is an unknown functionality of the file /aboutus.php. The manipulation of the argument pagetitle leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used."
},
{
"lang": "es",
"value": "Se encontr\u00f3 una vulnerabilidad cr\u00edtica en PHPGurukul Bank Locker Management System 1.0. Esta vulnerabilidad afecta a una funcionalidad desconocida del archivo /aboutus.php. La manipulaci\u00f3n del argumento pagetitle provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse remotamente. Se ha hecho p\u00fablico el exploit y puede que sea utilizado."
}
],
"metrics": {
@ -59,7 +63,7 @@
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
@ -76,6 +80,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
@ -120,26 +144,63 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:anujkumar:bank_locker_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A4F17BF8-C378-4CFF-BF8D-9D0F9E642C10"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/ARPANET-cyber/CVE/issues/3",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory",
"Issue Tracking"
]
},
{
"url": "https://phpgurukul.com/",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Product"
]
},
{
"url": "https://vuldb.com/?ctiid.300691",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.300691",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"VDB Entry",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?submit.521441",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"VDB Entry",
"Third Party Advisory"
]
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-2675",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-03-24T01:15:16.490",
"lastModified": "2025-03-24T01:15:16.490",
"vulnStatus": "Received",
"lastModified": "2025-03-26T14:03:31.380",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as critical, has been found in PHPGurukul Bank Locker Management System 1.0. Affected by this issue is some unknown functionality of the file /add-lockertype.php. The manipulation of the argument lockerprice leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used."
},
{
"lang": "es",
"value": "Se ha detectado una vulnerabilidad clasificada como cr\u00edtica en PHPGurukul Bank Locker Management System 1.0. Este problema afecta a una funcionalidad desconocida del archivo /add-lockertype.php. La manipulaci\u00f3n del argumento lockerprice provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse remotamente. Se ha hecho p\u00fablico el exploit y puede que sea utilizado."
}
],
"metrics": {
@ -59,7 +63,7 @@
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
@ -76,6 +80,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
@ -118,28 +142,75 @@
"value": "CWE-89"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:anujkumar:bank_locker_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A4F17BF8-C378-4CFF-BF8D-9D0F9E642C10"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/ARPANET-cyber/CVE/issues/4",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory",
"Issue Tracking"
]
},
{
"url": "https://phpgurukul.com/",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Product"
]
},
{
"url": "https://vuldb.com/?ctiid.300692",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.300692",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"VDB Entry",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?submit.521442",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"VDB Entry",
"Third Party Advisory"
]
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-2676",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-03-24T01:15:17.177",
"lastModified": "2025-03-24T01:15:17.177",
"vulnStatus": "Received",
"lastModified": "2025-03-26T13:55:26.630",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as critical, was found in PHPGurukul Bank Locker Management System 1.0. This affects an unknown part of the file /add-subadmin.php. The manipulation of the argument sadminusername leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."
},
{
"lang": "es",
"value": "Se encontr\u00f3 una vulnerabilidad clasificada como cr\u00edtica en PHPGurukul Bank Locker Management System 1.0. Esta afecta a una parte desconocida del archivo /add-subadmin.php. La manipulaci\u00f3n del argumento sadminusername provoca una inyecci\u00f3n SQL. Es posible iniciar el ataque de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado."
}
],
"metrics": {
@ -59,7 +63,7 @@
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
@ -76,6 +80,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
@ -118,28 +142,74 @@
"value": "CWE-89"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:anujkumar:bank_locker_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A4F17BF8-C378-4CFF-BF8D-9D0F9E642C10"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/ARPANET-cyber/CVE/issues/5",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://phpgurukul.com/",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Product"
]
},
{
"url": "https://vuldb.com/?ctiid.300693",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.300693",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.521443",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"VDB Entry",
"Third Party Advisory"
]
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-2677",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-03-24T02:15:15.540",
"lastModified": "2025-03-24T02:15:15.540",
"vulnStatus": "Received",
"lastModified": "2025-03-26T13:48:38.670",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been found in PHPGurukul Bank Locker Management System 1.0 and classified as critical. This vulnerability affects unknown code of the file /changeidproof.php. The manipulation of the argument editid leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used."
},
{
"lang": "es",
"value": "Se ha encontrado una vulnerabilidad en PHPGurukul Bank Locker Management System 1.0, clasificada como cr\u00edtica. Esta vulnerabilidad afecta al c\u00f3digo desconocido del archivo /changeidproof.php. La manipulaci\u00f3n del argumento editid provoca una inyecci\u00f3n SQL. El ataque puede iniciarse remotamente. Se ha hecho p\u00fablico el exploit y puede que sea utilizado."
}
],
"metrics": {
@ -59,7 +63,7 @@
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
@ -76,6 +80,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
@ -118,28 +142,75 @@
"value": "CWE-89"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:anujkumar:bank_locker_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A4F17BF8-C378-4CFF-BF8D-9D0F9E642C10"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/ARPANET-cyber/CVE/issues/6",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory",
"Issue Tracking"
]
},
{
"url": "https://phpgurukul.com/",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Product"
]
},
{
"url": "https://vuldb.com/?ctiid.300694",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.300694",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"VDB Entry",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?submit.521444",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"VDB Entry",
"Third Party Advisory"
]
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-2678",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-03-24T03:15:14.573",
"lastModified": "2025-03-24T03:15:14.573",
"vulnStatus": "Received",
"lastModified": "2025-03-26T13:42:31.437",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in PHPGurukul Bank Locker Management System 1.0 and classified as critical. This issue affects some unknown processing of the file /changeimage1.php. The manipulation of the argument editid leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used."
},
{
"lang": "es",
"value": "Se encontr\u00f3 una vulnerabilidad en PHPGurukul Bank Locker Management System 1.0, clasificada como cr\u00edtica. Este problema afecta a un procesamiento desconocido del archivo /changeimage1.php. La manipulaci\u00f3n del argumento editid provoca una inyecci\u00f3n SQL. El ataque puede iniciarse remotamente. Se ha hecho p\u00fablico el exploit y puede que sea utilizado."
}
],
"metrics": {
@ -59,7 +63,7 @@
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
@ -76,6 +80,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
@ -118,28 +142,75 @@
"value": "CWE-89"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:anujkumar:bank_locker_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A4F17BF8-C378-4CFF-BF8D-9D0F9E642C10"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/ARPANET-cyber/CVE/issues/7",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory",
"Issue Tracking"
]
},
{
"url": "https://phpgurukul.com/",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Product"
]
},
{
"url": "https://vuldb.com/?ctiid.300695",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.300695",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"VDB Entry",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?submit.521445",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"VDB Entry",
"Third Party Advisory"
]
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-2679",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-03-24T03:15:15.553",
"lastModified": "2025-03-24T03:15:15.553",
"vulnStatus": "Received",
"lastModified": "2025-03-26T13:35:46.297",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in PHPGurukul Bank Locker Management System 1.0. It has been classified as critical. Affected is an unknown function of the file /contact-us.php. The manipulation of the argument pagetitle leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used."
},
{
"lang": "es",
"value": "Se encontr\u00f3 una vulnerabilidad en PHPGurukul Bank Locker Management System 1.0. Se ha clasificado como cr\u00edtica. Se ve afectada una funci\u00f3n desconocida del archivo /contact-us.php. La manipulaci\u00f3n del argumento pagetitle provoca una inyecci\u00f3n SQL. Es posible ejecutar el ataque de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado."
}
],
"metrics": {
@ -59,7 +63,7 @@
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
@ -76,6 +80,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
@ -118,28 +142,74 @@
"value": "CWE-89"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:anujkumar:bank_locker_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A4F17BF8-C378-4CFF-BF8D-9D0F9E642C10"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/ARPANET-cyber/CVE/issues/8",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://phpgurukul.com/",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Product"
]
},
{
"url": "https://vuldb.com/?ctiid.300696",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.300696",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.521447",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"VDB Entry",
"Third Party Advisory"
]
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-2680",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-03-24T03:15:15.727",
"lastModified": "2025-03-24T03:15:15.727",
"vulnStatus": "Received",
"lastModified": "2025-03-26T13:23:41.867",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in PHPGurukul Bank Locker Management System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /edit-assign-locker.php?ltid=1. The manipulation of the argument mobilenumber leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used."
},
{
"lang": "es",
"value": "Se encontr\u00f3 una vulnerabilidad en PHPGurukul Bank Locker Management System 1.0. Se ha declarado cr\u00edtica. Esta vulnerabilidad afecta a una funcionalidad desconocida del archivo /edit-assign-locker.php?ltid=1. La manipulaci\u00f3n del argumento \"mobilenumber\" provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse remotamente. Se ha hecho p\u00fablico el exploit y puede que sea utilizado."
}
],
"metrics": {
@ -59,7 +63,7 @@
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
@ -76,6 +80,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
@ -118,28 +142,75 @@
"value": "CWE-89"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:anujkumar:bank_locker_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A4F17BF8-C378-4CFF-BF8D-9D0F9E642C10"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/ARPANET-cyber/CVE/issues/9",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory",
"Issue Tracking"
]
},
{
"url": "https://phpgurukul.com/",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Product"
]
},
{
"url": "https://vuldb.com/?ctiid.300697",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.300697",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.521448",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"VDB Entry",
"Third Party Advisory"
]
}
]
}

View File

@ -2,16 +2,55 @@
"id": "CVE-2025-27830",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-03-25T21:15:42.353",
"lastModified": "2025-03-25T21:15:42.353",
"lastModified": "2025-03-26T14:15:33.113",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in Artifex Ghostscript before 10.05.0. A buffer overflow occurs during serialization of DollarBlend in a font, for base/write_t1.c and psi/zfapi.c."
},
{
"lang": "es",
"value": "Se detect\u00f3 un problema en Artifex Ghostscript anterior a la versi\u00f3n 10.05.0. Se produce un desbordamiento de b\u00fafer durante la serializaci\u00f3n de DollarBlend en una fuente, para base/write_t1.c y psi/zfapi.c."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://bugs.ghostscript.com/show_bug.cgi?id=708241",

View File

@ -2,16 +2,55 @@
"id": "CVE-2025-27831",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-03-25T21:15:42.467",
"lastModified": "2025-03-25T21:15:42.467",
"lastModified": "2025-03-26T14:15:33.290",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in Artifex Ghostscript before 10.05.0. The DOCXWRITE TXTWRITE device has a text buffer overflow via long characters to devices/vector/doc_common.c."
},
{
"lang": "es",
"value": "Se detect\u00f3 un problema en Artifex Ghostscript anterior a la versi\u00f3n 10.05.0. El dispositivo DOCXWRITE TXTWRITE presenta un desbordamiento del b\u00fafer de texto mediante caracteres largos hacia devices/vector/doc_common.c."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://bugs.ghostscript.com/show_bug.cgi?id=708132",

View File

@ -2,16 +2,55 @@
"id": "CVE-2025-27832",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-03-25T21:15:42.570",
"lastModified": "2025-03-25T21:15:42.570",
"lastModified": "2025-03-26T14:15:33.483",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in Artifex Ghostscript before 10.05.0. The NPDL device has a Compression buffer overflow for contrib/japanese/gdevnpdl.c."
},
{
"lang": "es",
"value": "Se detect\u00f3 un problema en Artifex Ghostscript anterior a la versi\u00f3n 10.05.0. El dispositivo NPDL presenta un desbordamiento del b\u00fafer de compresi\u00f3n para contrib/japanese/gdevnpdl.c."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://bugs.ghostscript.com/show_bug.cgi?id=708133",

View File

@ -2,16 +2,55 @@
"id": "CVE-2025-27833",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-03-25T21:15:42.683",
"lastModified": "2025-03-25T21:15:42.683",
"lastModified": "2025-03-26T14:15:33.680",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in Artifex Ghostscript before 10.05.0. A buffer overflow occurs for a long TTF font name to pdf/pdf_fmap.c."
},
{
"lang": "es",
"value": "Se detect\u00f3 un problema en Artifex Ghostscript anterior a la versi\u00f3n 10.05.0. Se produce un desbordamiento de b\u00fafer para nombres de fuente TTF largos en pdf/pdf_fmap.c."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://bugs.ghostscript.com/show_bug.cgi?id=708259",

View File

@ -2,16 +2,55 @@
"id": "CVE-2025-27834",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-03-25T21:15:42.870",
"lastModified": "2025-03-25T21:15:42.870",
"lastModified": "2025-03-26T14:15:33.867",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in Artifex Ghostscript before 10.05.0. A buffer overflow occurs via an oversized Type 4 function in a PDF document to pdf/pdf_func.c."
},
{
"lang": "es",
"value": "Se detect\u00f3 un problema en Artifex Ghostscript anterior a la versi\u00f3n 10.05.0. Se produce un desbordamiento de b\u00fafer debido a una funci\u00f3n de tipo 4 sobredimensionada en un documento PDF en pdf/pdf_func.c."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://bugs.ghostscript.com/show_bug.cgi?id=708253",

View File

@ -2,16 +2,55 @@
"id": "CVE-2025-27835",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-03-25T21:15:43.013",
"lastModified": "2025-03-25T21:15:43.013",
"lastModified": "2025-03-26T14:15:34.057",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in Artifex Ghostscript before 10.05.0. A buffer overflow occurs when converting glyphs to Unicode in psi/zbfont.c."
},
{
"lang": "es",
"value": "Se detect\u00f3 un problema en Artifex Ghostscript anterior a la versi\u00f3n 10.05.0. Se produce un desbordamiento de b\u00fafer al convertir glifos a Unicode en psi/zbfont.c."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://bugs.ghostscript.com/show_bug.cgi?id=708131",

View File

@ -2,16 +2,55 @@
"id": "CVE-2025-27836",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-03-25T21:15:43.137",
"lastModified": "2025-03-25T21:15:43.137",
"lastModified": "2025-03-26T14:15:34.253",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in Artifex Ghostscript before 10.05.0. The BJ10V device has a Print buffer overflow in contrib/japanese/gdev10v.c."
},
{
"lang": "es",
"value": "Se detect\u00f3 un problema en Artifex Ghostscript anterior a la versi\u00f3n 10.05.0. El dispositivo BJ10V presenta un desbordamiento del b\u00fafer de impresi\u00f3n en contrib/japanese/gdev10v.c."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://bugs.ghostscript.com/show_bug.cgi?id=708192",

View File

@ -2,16 +2,55 @@
"id": "CVE-2025-27837",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-03-25T21:15:43.250",
"lastModified": "2025-03-25T21:15:43.250",
"lastModified": "2025-03-26T14:15:34.440",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in Artifex Ghostscript before 10.05.0. Access to arbitrary files can occur through a truncated path with invalid UTF-8 characters, for base/gp_mswin.c and base/winrtsup.cpp."
},
{
"lang": "es",
"value": "Se detect\u00f3 un problema en Artifex Ghostscript anterior a la versi\u00f3n 10.05.0. Se puede acceder a archivos arbitrarios a trav\u00e9s de una ruta truncada con caracteres UTF-8 no v\u00e1lidos para base/gp_mswin.c y base/winrtsup.cpp."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://bugs.ghostscript.com/show_bug.cgi?id=708238",

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-29806",
"sourceIdentifier": "secure@microsoft.com",
"published": "2025-03-23T17:15:29.450",
"lastModified": "2025-03-24T13:15:26.083",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-26T14:50:45.523",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "No cwe for this issue in Microsoft Edge (Chromium-based) allows an unauthorized attacker to execute code over a network."
},
{
"lang": "es",
"value": "No hay soluci\u00f3n para este problema en Microsoft Edge (basado en Chromium) que permite que un atacante no autorizado ejecute c\u00f3digo a trav\u00e9s de una red."
}
],
"metrics": {
@ -32,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
@ -47,10 +71,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:edge_chromium:*:*:*:*:*:*:*:*",
"versionEndExcluding": "129.0.2792.52",
"matchCriteriaId": "F0BF594F-B1FD-4557-8D75-5FF42CC0E5AA"
}
]
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29806",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-30222",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-03-25T23:15:36.707",
"lastModified": "2025-03-25T23:15:36.707",
"lastModified": "2025-03-26T14:15:34.817",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Shescape is a simple shell escape library for JavaScript. Versions 1.7.2 through 2.1.1 are vulnerable to potential environment variable exposure on Windows with CMD. This impact users of Shescape on Windows that explicitly configure `shell: 'cmd.exe'` or `shell: true` using any of `quote`/`quoteAll`/`escape`/`escapeAll`. An attacker may be able to get read-only access to environment variables. This bug has been patched in v2.1.2. For those who are already using v2 of Shescape, no further changes are required. Those who are are using v1 of Shescape should follow the migration guide to upgrade to v2. There is no plan to release a patch compatible with v1 of Shescape. As a workaround, users can remove all instances of `%` from user input before using Shescape."
},
{
"lang": "es",
"value": "Shescape es una librer\u00eda de escape de shell sencilla para JavaScript. Las versiones 1.7.2 a 2.1.1 son vulnerables a la posible exposici\u00f3n de variables de entorno en Windows con CMD. Esto afecta a los usuarios de Shescape en Windows que configuran expl\u00edcitamente `shell: 'cmd.exe'` o `shell: true` mediante `quote`/`quoteAll`/`escape`/`escapeAll`. Un atacante podr\u00eda obtener acceso de solo lectura a las variables de entorno. Este error se ha corregido en la versi\u00f3n 2.1.2. Quienes ya utilizan la versi\u00f3n 2 de Shescape no requieren cambios adicionales. Quienes utilizan la versi\u00f3n 1 de Shescape deben seguir la gu\u00eda de migraci\u00f3n para actualizar a la versi\u00f3n 2. No se prev\u00e9 publicar un parche compatible con la versi\u00f3n 1 de Shescape. Como workaround, los usuarios pueden eliminar todas las instancias de `%` de la entrada de usuario antes de usar Shescape."
}
],
"metrics": {
@ -60,7 +64,7 @@
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -85,6 +89,10 @@
{
"url": "https://github.com/ericcornelissen/shescape/security/advisories/GHSA-66pp-5p9w-q87j",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/ericcornelissen/shescape/security/advisories/GHSA-66pp-5p9w-q87j",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2025-03-26T13:00:19.445166+00:00
2025-03-26T15:00:20.481078+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2025-03-26T12:15:15.827000+00:00
2025-03-26T14:54:37.560000+00:00
```
### Last Data Feed Release
@ -33,33 +33,49 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
286602
286607
```
### CVEs added in the last Commit
Recently added CVEs: `12`
Recently added CVEs: `5`
- [CVE-2024-13411](CVE-2024/CVE-2024-134xx/CVE-2024-13411.json) (`2025-03-26T12:15:13.880`)
- [CVE-2024-13889](CVE-2024/CVE-2024-138xx/CVE-2024-13889.json) (`2025-03-26T12:15:14.590`)
- [CVE-2025-1312](CVE-2025/CVE-2025-13xx/CVE-2025-1312.json) (`2025-03-26T12:15:14.890`)
- [CVE-2025-1542](CVE-2025/CVE-2025-15xx/CVE-2025-1542.json) (`2025-03-26T11:15:38.240`)
- [CVE-2025-1769](CVE-2025/CVE-2025-17xx/CVE-2025-1769.json) (`2025-03-26T12:15:15.040`)
- [CVE-2025-1911](CVE-2025/CVE-2025-19xx/CVE-2025-1911.json) (`2025-03-26T12:15:15.197`)
- [CVE-2025-1912](CVE-2025/CVE-2025-19xx/CVE-2025-1912.json) (`2025-03-26T12:15:15.353`)
- [CVE-2025-1913](CVE-2025/CVE-2025-19xx/CVE-2025-1913.json) (`2025-03-26T12:15:15.513`)
- [CVE-2025-2110](CVE-2025/CVE-2025-21xx/CVE-2025-2110.json) (`2025-03-26T12:15:15.827`)
- [CVE-2025-2596](CVE-2025/CVE-2025-25xx/CVE-2025-2596.json) (`2025-03-26T11:15:39.183`)
- [CVE-2025-27551](CVE-2025/CVE-2025-275xx/CVE-2025-27551.json) (`2025-03-26T11:15:38.943`)
- [CVE-2025-27552](CVE-2025/CVE-2025-275xx/CVE-2025-27552.json) (`2025-03-26T11:15:39.063`)
- [CVE-2022-39163](CVE-2022/CVE-2022-391xx/CVE-2022-39163.json) (`2025-03-26T14:15:20.793`)
- [CVE-2024-45351](CVE-2024/CVE-2024-453xx/CVE-2024-45351.json) (`2025-03-26T14:15:31.457`)
- [CVE-2025-2228](CVE-2025/CVE-2025-22xx/CVE-2025-2228.json) (`2025-03-26T13:15:36.373`)
- [CVE-2025-23203](CVE-2025/CVE-2025-232xx/CVE-2025-23203.json) (`2025-03-26T14:15:32.250`)
- [CVE-2025-24808](CVE-2025/CVE-2025-248xx/CVE-2025-24808.json) (`2025-03-26T14:15:32.417`)
### CVEs modified in the last Commit
Recently modified CVEs: `2`
Recently modified CVEs: `76`
- [CVE-2023-52461](CVE-2023/CVE-2023-524xx/CVE-2023-52461.json) (`2025-03-26T11:41:07.140`)
- [CVE-2024-27680](CVE-2024/CVE-2024-276xx/CVE-2024-27680.json) (`2025-03-26T11:41:33.737`)
- [CVE-2024-5690](CVE-2024/CVE-2024-56xx/CVE-2024-5690.json) (`2025-03-26T14:15:31.660`)
- [CVE-2025-25193](CVE-2025/CVE-2025-251xx/CVE-2025-25193.json) (`2025-03-26T13:14:32.087`)
- [CVE-2025-25371](CVE-2025/CVE-2025-253xx/CVE-2025-25371.json) (`2025-03-26T14:15:32.570`)
- [CVE-2025-25372](CVE-2025/CVE-2025-253xx/CVE-2025-25372.json) (`2025-03-26T14:15:32.750`)
- [CVE-2025-25374](CVE-2025/CVE-2025-253xx/CVE-2025-25374.json) (`2025-03-26T14:15:32.930`)
- [CVE-2025-2654](CVE-2025/CVE-2025-26xx/CVE-2025-2654.json) (`2025-03-26T14:54:37.560`)
- [CVE-2025-2672](CVE-2025/CVE-2025-26xx/CVE-2025-2672.json) (`2025-03-26T14:37:30.087`)
- [CVE-2025-2673](CVE-2025/CVE-2025-26xx/CVE-2025-2673.json) (`2025-03-26T14:15:40.467`)
- [CVE-2025-2674](CVE-2025/CVE-2025-26xx/CVE-2025-2674.json) (`2025-03-26T14:09:08.730`)
- [CVE-2025-2675](CVE-2025/CVE-2025-26xx/CVE-2025-2675.json) (`2025-03-26T14:03:31.380`)
- [CVE-2025-2676](CVE-2025/CVE-2025-26xx/CVE-2025-2676.json) (`2025-03-26T13:55:26.630`)
- [CVE-2025-2677](CVE-2025/CVE-2025-26xx/CVE-2025-2677.json) (`2025-03-26T13:48:38.670`)
- [CVE-2025-2678](CVE-2025/CVE-2025-26xx/CVE-2025-2678.json) (`2025-03-26T13:42:31.437`)
- [CVE-2025-2679](CVE-2025/CVE-2025-26xx/CVE-2025-2679.json) (`2025-03-26T13:35:46.297`)
- [CVE-2025-2680](CVE-2025/CVE-2025-26xx/CVE-2025-2680.json) (`2025-03-26T13:23:41.867`)
- [CVE-2025-27830](CVE-2025/CVE-2025-278xx/CVE-2025-27830.json) (`2025-03-26T14:15:33.113`)
- [CVE-2025-27831](CVE-2025/CVE-2025-278xx/CVE-2025-27831.json) (`2025-03-26T14:15:33.290`)
- [CVE-2025-27832](CVE-2025/CVE-2025-278xx/CVE-2025-27832.json) (`2025-03-26T14:15:33.483`)
- [CVE-2025-27833](CVE-2025/CVE-2025-278xx/CVE-2025-27833.json) (`2025-03-26T14:15:33.680`)
- [CVE-2025-27834](CVE-2025/CVE-2025-278xx/CVE-2025-27834.json) (`2025-03-26T14:15:33.867`)
- [CVE-2025-27835](CVE-2025/CVE-2025-278xx/CVE-2025-27835.json) (`2025-03-26T14:15:34.057`)
- [CVE-2025-27836](CVE-2025/CVE-2025-278xx/CVE-2025-27836.json) (`2025-03-26T14:15:34.253`)
- [CVE-2025-27837](CVE-2025/CVE-2025-278xx/CVE-2025-27837.json) (`2025-03-26T14:15:34.440`)
- [CVE-2025-29806](CVE-2025/CVE-2025-298xx/CVE-2025-29806.json) (`2025-03-26T14:50:45.523`)
- [CVE-2025-30222](CVE-2025/CVE-2025-302xx/CVE-2025-30222.json) (`2025-03-26T14:15:34.817`)
## Download and Usage

View File

@ -205544,14 +205544,14 @@ CVE-2022-38670,0,0,5f7b07806008480e6849e1ba71ce47e086f1a36c384caaa82a8eb0293bc57
CVE-2022-38671,0,0,00da45e5c9b95a09e97a362533fa83a7e4f8b66f5c7576c2da38712da2c03919,2024-11-21T07:16:54.497000
CVE-2022-38672,0,0,c5e6818f94ccf4dbda30954e70ecb74d737bd066051d8c00b7c93378fb0823fd,2024-11-21T07:16:54.623000
CVE-2022-38673,0,0,bb33c22991ec8d586e95b59015be7f8034faa0fad6446d3cc65a263e457751bb,2024-11-21T07:16:54.757000
CVE-2022-38674,0,0,a8df0cd7f89925096cca35e6867a8e7a5253baf89d4cc7ff23c8a9bd1b4e339b,2024-11-21T07:16:54.887000
CVE-2022-38675,0,0,333f5206edc4b9b8e93f9aa97ef23def8baa5fd960bd8af1d64000764adc6183,2024-11-21T07:16:55.017000
CVE-2022-38674,0,1,e541318932853ebf29d808458e033d00751466e660d106780dc82f1a0bbbee30,2025-03-26T14:15:17.500000
CVE-2022-38675,0,1,da5214fa08a9b851b0507043b84b2b232e1b36f0fa398eed2d5465bb88a8d2d3,2025-03-26T14:15:20.040000
CVE-2022-38676,0,0,c1f86350f1959e1ec6aae69beb2dca62d098c4d6f36fb6ee2a979f1ae98dc6e9,2024-11-21T07:16:55.140000
CVE-2022-38677,0,0,45e5130a06b34d8b4608a6f384a5d6ab0d1220eac163ae219448b1d8eb132509,2024-11-21T07:16:55.270000
CVE-2022-38678,0,0,fcaea2dadc6004c49696084fd0eb919c69612acd0c70841b4191bf93c7ad5ad9,2024-11-21T07:16:55.393000
CVE-2022-38679,0,0,30554966cf7b361a82706593e65f2dc51b7b5e625b9417e785a7e31204ca22fe,2024-11-21T07:16:55.537000
CVE-2022-3868,0,0,36a3001c5865c0f61622978d5fd7c76f7571b4109d9ffde231eed0250308f612,2024-11-21T07:20:24.093000
CVE-2022-38680,0,0,9ccb6fbe36b96fe93732fe0051bfaf2860bd51f8a0caba71cd290178cc8ef4d4,2024-11-21T07:16:55.673000
CVE-2022-38680,0,1,391285d54aa3d2099c05191de903328c164eaf11369e5752e9d9f25ce8c1de75,2025-03-26T14:15:20.263000
CVE-2022-38681,0,0,f6ca4866804420d0840e8e3c0e3fcd1b880332ecb402f7b74717d66c8aafe1fd,2024-11-21T07:16:55.793000
CVE-2022-38682,0,0,d014c0128122867e4b8b4ffb9f4bd2346427fd64d3a70f17c446edd1f10314bf,2024-11-21T07:16:55.923000
CVE-2022-38683,0,0,6c4b1b4fcaebdbe8e527e6b89dddadb02d73e139d5c3924c3c8bb0346c1dd7b7,2024-11-21T07:16:56.050000
@ -205936,6 +205936,7 @@ CVE-2022-39159,0,0,9bab48ae0c7ec6d829fcebbd383c88265471d1b8930e73570a0438b68d4ee
CVE-2022-3916,0,0,4aca84e566526af675a57765ef3d1d206a38f133fdf84532ec163834cff42294,2024-11-21T07:20:31.480000
CVE-2022-39160,0,0,e1c05f7218e8e8c347b91de7f55a473fd143199ecd24c9add0e4d0df07948ae7,2024-11-21T07:17:41.700000
CVE-2022-39161,0,0,374db153ea4a7818f93713bd5ddf1964b7dab3b6fb9e2bcd84c5b50b129436ed,2024-11-21T07:17:41.823000
CVE-2022-39163,1,1,9bfad7812d7fd9be5c5e01267a9e31066d85a677f28ee143424a79620a02b9ac,2025-03-26T14:15:20.793000
CVE-2022-39164,0,0,910c2790ec8cc2e31e30c18869d1a9b96cc73805e1c939b688a6b0f694e0332b,2024-11-21T07:17:41.963000
CVE-2022-39165,0,0,eb42fbb702d7c8841cd5ed9b6b61d837644be9416d74e6640b40197ec0d8edd5,2024-11-21T07:17:42.097000
CVE-2022-39166,0,0,c00a1e6b7adee19072cf36acc9786c3a6960ebaac27b755287ac7dc95805c61a,2024-11-21T07:17:42.233000
@ -209937,7 +209938,7 @@ CVE-2022-44443,0,0,a05afab2a67ff8ae0c921e66ecfb678d555be037d19b899932969fad4b4ac
CVE-2022-44444,0,0,35d79adf7f2a820e18b974141331feba04c2522fdbf1495dc6e20f9e4d2567b9,2024-11-21T07:28:02.133000
CVE-2022-44445,0,0,98b818cfddd55fc9df9ba4c703b45f167d40aae539ac36145317228fd2518d46,2024-11-21T07:28:02.257000
CVE-2022-44446,0,0,b87a075bc11c7bf7879be2b7a0deec8816fbc0db0e5e2cd310c423a22e703df2,2024-11-21T07:28:02.377000
CVE-2022-44447,0,0,e73a8969d29711df776169bb033927b49ccbb795e2efc42f9115fdb39cb05cec,2024-11-21T07:28:02.497000
CVE-2022-44447,0,1,b839b4dbd02b0303d1275d5549321f022cdc6a4738ce0f7eb511d56ba2bbd59a,2025-03-26T14:15:21.223000
CVE-2022-44448,0,0,51991eac5e2bfcde5967a5669578093a73799e3adf2470b634b8c3a9bb0d6931,2024-11-21T07:28:02.607000
CVE-2022-44449,0,0,f001641190f0af734eea3fea990f3ff8177ef18a9d61cb293b8fb9b09bf446fd,2024-11-21T07:28:02.723000
CVE-2022-4445,0,0,cedca36b9b879b049e03157ad890d2870ba90bb1afe63e410a0ea538ec3aa62a,2025-03-21T15:15:38.497000
@ -210038,7 +210039,7 @@ CVE-2022-44586,0,0,2c3de69e1a21c0631cf5f1736061582b06bb6865f225acefb4d279b67bedd
CVE-2022-44587,0,0,6dfaf7b30b3dd518c8baa1531cd49f4d347ed0a847d046b7fe56358fb870412e,2024-11-21T07:28:10.493000
CVE-2022-44588,0,0,c7175322edd9d7ad433ad5234e758084af6f5b6df1c9a6080b20d6e871b59b23,2024-11-21T07:28:10.627000
CVE-2022-44589,0,0,3c2bd6a31443e7ed33d7d7972f625159cb717f110556afbf06ac8d96a6a3039c,2024-11-21T07:28:10.743000
CVE-2022-4459,0,0,91dcc927fedf11470b045a9f315c74f0697c4401eb898de50dccba1291d9fb1b,2024-11-21T07:35:18.480000
CVE-2022-4459,0,1,a0d0ba41de33702ec70b3020ba12862d1aba8958f239c1aa62798e7c0d3d44b5,2025-03-26T14:15:25.590000
CVE-2022-44590,0,0,8419b28e3a0fb49ed6ee057d9814f15968322a8d49125a15e7831fc76db33c2f,2024-11-21T07:28:10.877000
CVE-2022-44591,0,0,c847c79694e4ea0add459ff62a58817005ae0ba77ef3c55979619aef08bd2f9a,2024-11-21T07:28:11
CVE-2022-44593,0,0,90f8ad45672b1e43741913eaec2f22fe4107cda8646e72a10d74cce24b42f4d1,2024-11-21T07:28:11.120000
@ -210811,7 +210812,7 @@ CVE-2022-45760,0,0,0d1a8eb90e8eb8d3f74e550a85785935ddd25217edeabe6882dc4db9e32c1
CVE-2022-45766,0,0,72c36f29c35874580c535822342cd020836969f971dd723babdaa8c49bbc85cf,2025-03-24T18:15:16.197000
CVE-2022-45768,0,0,5a7e71b10745f7171b546446b7eb1beeca8e54d2bd161b17d6d1ae2a2af3a55f,2025-03-25T15:15:16.277000
CVE-2022-45769,0,0,1e8f47f2d9403072669e2f933abb158f13fef15333df9238a51a36c60ca747fe,2024-11-21T07:29:41.063000
CVE-2022-4577,0,0,a6b1dcae0f5f4893cc9f1be55ca09b6cdb76bfc2f503698707d6dfba469dc738,2024-11-21T07:35:31.770000
CVE-2022-4577,0,1,0ee64bdcd89d460efc049aed42aba77caafdf317c23948db93ad4449cf4198e2,2025-03-26T14:15:25.800000
CVE-2022-45770,0,0,02dc41d193d36a9bfc8460eb7435feb6273b7b9f86afc53f0e593727eb5aae1a,2024-11-21T07:29:41.203000
CVE-2022-45771,0,0,187d8b7379b23beda0c4ec7f844878da04db33c0b9e71fb3308e9216031fa00e,2024-11-21T07:29:41.360000
CVE-2022-45778,0,0,ba2c0e56310856b947c1011dc3c1bb60c6e63585e41ef402feb38046d5722fc0,2024-11-21T07:29:41.500000
@ -210819,7 +210820,7 @@ CVE-2022-4578,0,0,d7acb6c771f7a789d19f6484a24a188e3f6503cc9345077d8e8dad2ae76e57
CVE-2022-45781,0,0,af5875681fe2ee1d5531c6d8ee1f3bdb8a6d138970efb5e8ab0f5142c741d481,2024-11-21T07:29:41.657000
CVE-2022-45782,0,0,edab3a553726f0ee865b05fc85e092ff1fd62cca5d7ff093b6e09fd4c8f95a45,2024-11-21T07:29:41.917000
CVE-2022-45783,0,0,99caa90c0c796a457e24fd66341035568c722235e187a3c980a405731656f189,2024-11-21T07:29:42.700000
CVE-2022-45786,0,0,7f2933125b250ce6538e93c7b51f14db7b5edd629a31d8a947c746c90b5d1799,2024-11-21T07:29:42.837000
CVE-2022-45786,0,1,eceab8889b7edb80c20ab4c9d9104ec72f95bf0abb8fe81c682a71a69b413d30,2025-03-26T14:15:21.453000
CVE-2022-45787,0,0,6e575959d3d8da9988e1c9ac769f974584e450a6f0905326025a6c024c86b8bb,2024-11-21T07:29:42.970000
CVE-2022-45788,0,0,f6f79d223f38261b7ad2add378e194245959512d8efa61388e7752de75a0700d,2024-11-21T07:29:43.093000
CVE-2022-45789,0,0,430fa15832d387a29a0389562bd6681c71542a481cef59c3138e1404448b57c3,2024-11-21T07:29:43.287000
@ -211518,7 +211519,7 @@ CVE-2022-4673,0,0,ae81b2d3725dffbb1142722b47d0f8c8c70b094a6f67b615dbce9278734323
CVE-2022-46732,0,0,e14127d804f025884e831ca46adc0de908f852d85b8e4a9e57ee145c2f969bd3,2025-01-17T22:15:27.260000
CVE-2022-46733,0,0,dab6a16ba7aa13baea3e43ae318c71e03ced958ebc4b4f9863afc731ab25e4c2,2024-11-21T07:30:59.350000
CVE-2022-46738,0,0,2bc8d3136674cbb74669d235a37a0dadd4f4f38eb64d7bbc723615e5d78bd0d6,2024-11-21T07:30:59.470000
CVE-2022-4674,0,0,862e8bd2930ad0406eb37b5a5972b8f3d6437e29a1be0060b6860a9f39c31ed5,2024-11-21T07:35:42.747000
CVE-2022-4674,0,1,413cbada43c93f23a08c4a8e3d11800e6b067b16197ad6b531b1a528befa64a5,2025-03-26T14:15:25.987000
CVE-2022-46740,0,0,f5eb759dc52fd36b093e5cabdeed4634e385cb9adaf5f29545728efff1878ccb,2024-11-21T07:30:59.613000
CVE-2022-46741,0,0,dc84b3b96f86b2345d118c63c373a240ac715179dfb5a0744bbe369531b3f27f,2024-11-21T07:30:59.727000
CVE-2022-46742,0,0,7b90f148a7d1ba066a0951b401c337c5055bca6c5a559eba16b90f6d52c77043,2024-11-21T07:30:59.863000
@ -211888,13 +211889,13 @@ CVE-2022-47322,0,0,d87ac8b158f58d19c0a8e2c2b1cff781aa6d51642d3caa9a23f10994a0ee1
CVE-2022-47323,0,0,5764ed6de229bb2a5fe7f58b553e2e56557faabe6ef60399b77d5e22fd615784,2024-11-21T07:31:43.093000
CVE-2022-47324,0,0,6347d37c8ba3bcf7c6c804f9e8776a16aaa9ad0eeb0128925ffa43234012daf0,2024-11-21T07:31:43.207000
CVE-2022-47325,0,0,f1910be6c349906fabbd876fc043f995ed80296d1314d0acf767c899343113d0,2024-11-21T07:31:43.323000
CVE-2022-47326,0,0,de74cdd7d7f2f0e00bf28e012469ef92a6488fce060cf811107473edb3ff2856,2024-11-21T07:31:43.450000
CVE-2022-47326,0,1,5887f05720e53da12671da125e8f66c8fb77d83a1232bb3c4b71136a25ae6b3f,2025-03-26T14:15:21.730000
CVE-2022-47327,0,0,cdda28a735d2510b8cf72f9a30284a33154adc3ef3a38b4576b77f0357c04d1e,2025-03-25T18:15:29.193000
CVE-2022-47328,0,0,94fa0b773d2715e6dc61f4211dd1d7449e6e7474affcd77460b12dd15ffd1453,2024-11-21T07:31:44.153000
CVE-2022-47329,0,0,7e8089acf480642f341b0cfdf3cf0e030ba54caf415147d13b2e46ac6968ab48,2024-11-21T07:31:44.277000
CVE-2022-47328,0,1,75c892b6b03d86d8da70fec3db643b2cf562c7077c3f3958d25f473757aae392,2025-03-26T14:15:21.953000
CVE-2022-47329,0,1,ce26b44ea133b073ed3502604f0f289a0709dd9906e15bb4ef13a2df740bdb91,2025-03-26T14:15:22.157000
CVE-2022-4733,0,0,a20d2ce8ba8643a864765c9df050e349f7e665a20b62ce2ebd9e393a64b63a5d,2024-11-21T07:35:50.087000
CVE-2022-47330,0,0,85a4a57af31008da3df89e202cecb177ab359c603025cd5154f14828cadff588,2024-11-21T07:31:44.390000
CVE-2022-47331,0,0,fefae5473b2a134cbbd47633d54db7948927a072d6bbbcf8c31886a084257835,2024-11-21T07:31:44.507000
CVE-2022-47331,0,1,7cd87437f0571abf6658289de93967ca70a361a85dcb05e7923c53569f8351be,2025-03-26T14:15:22.347000
CVE-2022-47332,0,0,df4a869bc27df4ccc5cdd75a5d42e95190d4d508f368a0952433a428bbbb2fde,2024-11-21T07:31:44.633000
CVE-2022-47333,0,0,85acb4ec1539f5e778d6bc3e7f4a7f82e765434978b41c39b8cb6bc88bad5ee2,2024-11-21T07:31:44.763000
CVE-2022-47334,0,0,79697999df090a6112af4776243e1d4cdac5ba6c9d4bf6c9080c00663bf9e733,2025-01-28T17:15:09.353000
@ -211902,14 +211903,14 @@ CVE-2022-47335,0,0,ffe3fdad4887dcb93fb83432929bc0989af9ac33da71f284c431b8c887b9f
CVE-2022-47336,0,0,4263e5dfa897d200b1472042b9608449760978a147e975bfc23d9ea82473138d,2025-02-10T20:15:40.423000
CVE-2022-47337,0,0,af927ae5afc0fcbfd42348de1a6ecf7a0a3245fd3c8303b538745074da65a295,2025-02-10T19:15:36.133000
CVE-2022-47338,0,0,c3646efcfc2f12a9cdf31bc3d6d12890d9775e7538a13b5ba65c0224b6fd9281,2025-02-10T18:15:24.483000
CVE-2022-47339,0,0,5f9e961fef8454aa61538ef54d66e71c4da6cabbf4aedeea88c027cbdfe52db8,2024-11-21T07:31:45.440000
CVE-2022-47339,0,1,1365086999babaf9d393fb336cd1a7f2703fb5525f4b00a45366ae86254fe814,2025-03-26T14:15:22.543000
CVE-2022-4734,0,0,3e3f895b4ca74c84b0fb151d8268a7f8b991a926d79e2ed84ec0f21e7438c93c,2024-11-21T07:35:50.207000
CVE-2022-47340,0,0,6028ec2b2df7cf335147b50331bfd8125f68753f9e3796dc8e5ffbdd41658212,2025-01-28T18:15:27.967000
CVE-2022-47341,0,0,91090ccb682915a12137a405b12a324109569ab1480bf23881dff52d521b3d1a,2024-11-21T07:31:45.663000
CVE-2022-47342,0,0,c60c630cb85f62e1c030b08a25c7b7c662833e2bae752772a071268f4db3f1cd,2024-11-21T07:31:45.777000
CVE-2022-47343,0,0,0a8e29cd5462a24f61106178417bbea442dc59f90da83ce7c5c12fd324c69fda,2024-11-21T07:31:45.887000
CVE-2022-47344,0,0,36ad72598360644f1036325aa14fc2bfa7595672d94123ab17e86e2aebfa212b,2024-11-21T07:31:46.030000
CVE-2022-47345,0,0,dd174c05db8af8c7cc1d1926e59da502f53a34e81a2a080d4fd43fe4da4d80c7,2024-11-21T07:31:46.170000
CVE-2022-47341,0,1,a6b4d3247802373b3c699ee9f55c7d93efbe578b414192b1632e6595efe9ea0a,2025-03-26T14:15:22.737000
CVE-2022-47342,0,1,9e990179ee47c1b7232e129f591f58931822738a485f0f39a82fa8ad2ae5e4f2,2025-03-26T14:15:22.937000
CVE-2022-47343,0,1,b777196379f504351a50fbe7159ee2ff3539b8fe0f21a3259fb482c1ad1dbd49,2025-03-26T14:15:23.137000
CVE-2022-47344,0,1,03a09cd54a7705bd8115bdc7a602fbc7981f695f4d1bd5483abf4776a38e2d8a,2025-03-26T14:15:23.320000
CVE-2022-47345,0,1,1ee8b863e85602779b5ffd9b021d10ace36200a263dd7087aff50e923119b6f5,2025-03-26T14:15:23.523000
CVE-2022-47346,0,0,0aed09c421cfb42d8f171a4029f4cb7eede4a9c894d88138e6562816efecbc5f,2025-03-25T21:15:38.160000
CVE-2022-47347,0,0,a8989f37873566c87d703841deb58abdd6887396642993be575afbf72dd891e0,2025-03-25T21:15:38.333000
CVE-2022-47348,0,0,2ee4baa94522df07a77505e8c11d3e85f011843707f320782b06d867fe47df8e,2024-11-21T07:31:46.510000
@ -211921,12 +211922,12 @@ CVE-2022-47353,0,0,e15d009f7a026317b30d329ff84e5896f47b1f05750928f849a5e481ff9ea
CVE-2022-47354,0,0,497ad40c11569c29d96883cb3c8a77c36600e11926a8f34354ec23c9205cc61f,2024-11-21T07:31:48.797000
CVE-2022-47355,0,0,046e83fc7fbfb58acbbb97fe4d7b16d767c0b4d88972d249de394e06ed3714fc,2024-11-21T07:31:48.903000
CVE-2022-47356,0,0,e17262981d07a3f89a077b3f1e3532c4ff339d32ca5b6e741635f0c3aafacbd1,2024-11-21T07:31:49.020000
CVE-2022-47357,0,0,f71544700402837457d8cb01a0fce0dec7e6fd1d236f190bd1bca3860452ac77,2024-11-21T07:31:49.133000
CVE-2022-47358,0,0,9f28e43f61b8791b822c140e9f6b5bdba393db0c23ce58bce0952fca96c9c166,2024-11-21T07:31:49.263000
CVE-2022-47359,0,0,33a8956c757531cb4211dd6b69b3a55d985887b96872ac20e03799f8b396f1cc,2024-11-21T07:31:49.393000
CVE-2022-47357,0,1,5e731d6b9b1a18244fa1e65ff0c8429cb87cfe487f4ca770dbb73a01d943aa5b,2025-03-26T14:15:23.730000
CVE-2022-47358,0,1,1743fec564ae245a3a7afda532929b51df0836610a7f50f723dc2596f15bf694,2025-03-26T14:15:23.927000
CVE-2022-47359,0,1,50260233501304e116ee2f03c4b499b69ae0b55af8c04a770df1b913ded26cd4,2025-03-26T14:15:24.137000
CVE-2022-4736,0,0,6966b4fa17aac898e0fbc1c67dd80d966b944b4975b9ce9b8cf3622f5260ac2e,2024-11-21T07:35:50.483000
CVE-2022-47360,0,0,9492e59202ee34fcdc32406f9d126a7a3a3fb0313b89142a58fdc6f7732a68c4,2024-11-21T07:31:49.530000
CVE-2022-47361,0,0,e12885e170e7f14e20d4a99618228aea8b0888d3cad8daf77c46e8cbc052d67c,2024-11-21T07:31:49.657000
CVE-2022-47360,0,1,2080874404fa4668f5fad79680f49517e2f99dfb08e28d10b31722ee3e7029cd,2025-03-26T14:15:24.343000
CVE-2022-47361,0,1,a6febb945aa7b4a8d5cf41e9cecbc99b326c75f2bd13aa9701f473814f0835fa,2025-03-26T14:15:24.560000
CVE-2022-47362,0,0,5c73387549131606f4ccb53ca66b317939741435c862f4715ff17c09104803dd,2025-02-10T18:15:24.720000
CVE-2022-47363,0,0,039f49a2379b03208bfa2f138b8529b2c11a09fe035d9cd144ead718e34eea90,2024-11-21T07:31:49.873000
CVE-2022-47364,0,0,9932d508109eadbf324c3ee2ef48be3b2a469fe92a061f53a718a76ad5ac8412,2024-11-21T07:31:49.983000
@ -211936,8 +211937,8 @@ CVE-2022-47367,0,0,f2cd0dc9b405a34d6b24f23598804fdabc5f6e2995314773675fae5c6eb03
CVE-2022-47368,0,0,864ac8fd67213d7196e2b3ba090186c8e1e1c5fbef627b3fec12655773b07ad9,2024-11-21T07:31:50.430000
CVE-2022-47369,0,0,dac8a4cd2c3921d4d915cd89a3123daef3a97515602ff6bc0021fdbe3e9359d5,2024-11-21T07:31:50.543000
CVE-2022-4737,0,0,dba502a8626959ce6d0880dcba8a3e4a3ed0b45c0d2076ff09fce5fdfdd17219,2024-11-21T07:35:50.610000
CVE-2022-47370,0,0,b94d6c1bded6e45bc215aef946d5aefca288d214876db884828eede9aea0e5cf,2024-11-21T07:31:50.653000
CVE-2022-47371,0,0,f2031cddbcc12dc637170a530a334053a20ac4f5617574ad18efc9543ad7d9fd,2024-11-21T07:31:50.767000
CVE-2022-47370,0,1,31184b9a2366983ce15cb055351d326a425e88ec753f1c69d989d264093d6f33,2025-03-26T14:15:24.750000
CVE-2022-47371,0,1,e3a9adf55786e2a53cf433f71bcae1c3eac23c3bb4c4f0b3d797cd85177cb6b6,2025-03-26T14:15:24.940000
CVE-2022-47372,0,0,dfa77dc4d425c9bf12877c67de0f763eabc9ccacebbcddff67044d9d21c0fc3e,2024-11-21T07:31:50.883000
CVE-2022-47373,0,0,96a907b08b5e21840b5e6f0473ecbf70469d1dc841e707b95ca2af1207a9a256,2024-11-21T07:31:51.007000
CVE-2022-47374,0,0,0fc68a2d2ba75f7fa891da2f570cf59855fee3dac0ed28f98a8e1489bb311d72,2024-11-21T07:31:51.127000
@ -212024,7 +212025,7 @@ CVE-2022-47449,0,0,cc50b6ae48af7d02d6dd04daa7e7790ccc23f748f67344294a359e7883fee
CVE-2022-4745,0,0,e01e0a62109bd4ef8e5f97d29b95ffae6191f45de6a32d7af67013476f6b6e2c,2024-11-21T07:35:51.627000
CVE-2022-47450,0,0,39fb77bfe8251294fa7825fa9caf8b57b402a26a70ce42dd4739b99f948f3b47,2024-11-21T07:31:59.200000
CVE-2022-47451,0,0,d21767685c9e1c48a8f641e6f36b2ecf5b4aec2ebd1b394de1f03253e03895f3,2025-03-25T21:15:38.490000
CVE-2022-47452,0,0,3ae9ab8eafda61f9ef9aef3c99c1b61c98bacde1b583bb4e76f19b4a76cfab61,2024-11-21T07:31:59.453000
CVE-2022-47452,0,1,e58db3a26b36e58e9bbee3a6f857db617877571ea407f71bc52f55ec1c8a7001,2025-03-26T14:15:25.120000
CVE-2022-47453,0,0,16ab4548a934e0f69918832fe307d3cc886b6695da2b3cc8295f8e8bf14fc630,2024-11-21T07:31:59.610000
CVE-2022-47454,0,0,e7b737cb99edf1fdc942511ae649efa0f88637b608618d95b99e53858a5b0cd0,2024-11-21T07:31:59.757000
CVE-2022-47455,0,0,78da122697407476b70af5bb22716c5d16d54cefd750214ba4143eeb45121173,2024-11-21T07:31:59.877000
@ -212453,7 +212454,7 @@ CVE-2022-48236,0,0,850fb4dcd8171cd15cb19c7aac6f7bab1434f0b7f306bad2cd68cf86ae838
CVE-2022-48237,0,0,6c5ca8ecfd414e8897abb5afce28bf8294cd5e71cc28a0415820c17c1ecfef21,2025-01-28T21:15:12.503000
CVE-2022-48238,0,0,e0a3363b05434d90930d72ee63d7cd0f23451e39dd4127f60f3e457acf12474d,2025-01-28T21:15:12.663000
CVE-2022-48239,0,0,c626f4e77adf4ca19a86fc17a78a7a500eaaee17af23726d2dfd15ec4ece9380,2025-01-29T17:15:22.070000
CVE-2022-4824,0,0,cb365ab5076f58d6fea721db695d23f4ab58de5df6a90af86982f551b2e2c2cb,2024-11-21T07:36:01.127000
CVE-2022-4824,0,1,2229504ea8337da25915fe1fd14db3cfdeaca0c0cc51186358b9e7ff62419e8b,2025-03-26T14:15:26.187000
CVE-2022-48240,0,0,b83423ba575e6be2e559f2f6a79613f36da5350453969e7c1b98d66b15908cb8,2025-01-28T19:15:08.860000
CVE-2022-48241,0,0,a632f9d07ce4128422cead40398fa41d5943354be2b7b89da53b23cc8bf4cf53,2025-01-28T19:15:10.233000
CVE-2022-48242,0,0,eaa3bc520a98e7911f4dff06b93742735f3b6cf14f5bffae1782f9ec6e714cc1,2025-01-28T19:15:10.467000
@ -212513,7 +212514,7 @@ CVE-2022-48308,0,0,d82ea45e2ac099dc3c3ecf13551c9dc3ababac68114d8f5415e8c3ff26f91
CVE-2022-48309,0,0,9af53705e87c70c09a62712e5ffa6e8eeb125ade4869b2020319bd5558cc17a4,2025-03-07T21:15:12.900000
CVE-2022-4831,0,0,f3a096c06597b8e18b75ac644035ee7a465b6ea70b28d2895528d5c3f7fcfd7c,2024-11-21T07:36:01.990000
CVE-2022-48310,0,0,ebfed86719c206e34df06d3147715e5d78c6f8ef832d5de22d2b9a682e7e26b5,2025-03-07T21:15:13.047000
CVE-2022-48311,0,0,99eb94960d1d92fd799b3d32286c60d09595170e9d761d77ec69c490c43f1c77,2024-11-21T07:33:08.447000
CVE-2022-48311,0,1,12a0cdfbf5573bb8f87e0c5a0ca3d58f6ae7d8e3c95cf644494fcad7e534123a,2025-03-26T14:15:25.310000
CVE-2022-48312,0,0,bec59e47dfb2e4094906ec17562aba4cdf6be4c4ce63944a8d9e3c8d7d7a58d8,2025-02-06T17:15:14.253000
CVE-2022-48313,0,0,fe9586966c1ecaaeb40ddf7a3e5514f39dc3f74450e5264891e068a90268852f,2025-02-06T17:15:14.450000
CVE-2022-48314,0,0,1b1df12682c8b2f13fcf1ebcbf7e95e664b833fc8341f50a69c9e95111e5ee19,2025-02-06T17:15:14.643000
@ -214126,7 +214127,7 @@ CVE-2023-0140,0,0,df7177faa2d8cb9862c8b50c6cc729872478c2ba0d70361a7bb2e6912f9991
CVE-2023-0141,0,0,85fccfa0835592642082878f04b3ca84af9442273f80cf9aad7f70c91ed83ef3,2025-03-20T21:15:16.407000
CVE-2023-0142,0,0,b7133677787ddbbd1130cc8c143928e5cbd31febaed1bc74027c053535510e61,2025-01-14T19:29:55.853000
CVE-2023-0143,0,0,12e6bcea5a3db8de8256483e07860446df3a2ee1bf6ddb6adaff3df8fc243f4c,2025-03-25T21:15:40.143000
CVE-2023-0144,0,0,04d6adc5e9c8d3d966538b6f377a484e000949368d55f2371a62400361af1881,2024-11-21T07:36:38.360000
CVE-2023-0144,0,1,b0b684392742244710e87e2337db3c5c1d750456d69b57859f7335c71658ec4d,2025-03-26T14:15:26.400000
CVE-2023-0145,0,0,a4cbaa3c26a4250a2dd6b3cd43cec76d7c10d4cce1fc8e2c43fcf34ca91668db,2025-02-26T15:15:17.957000
CVE-2023-0146,0,0,8eb9d90955bdae43de02b5f3b926196cc1bb5521330b52186e58ae08057eea53,2025-03-25T18:15:30.523000
CVE-2023-0147,0,0,d83a6a9cc747578644cdc678d460b719e77c1dcb07d59fbedecd667ef6b22e7b,2025-03-25T20:15:16.930000
@ -214160,7 +214161,7 @@ CVE-2023-0174,0,0,b42528505b72ad99092252a143ae5d7e87893bdee09be93dad54b02238e573
CVE-2023-0175,0,0,f675b36a1edf72fa9629e908e8135656f624b1e3facf4fe662ec8f8ba7f94a2d,2025-02-26T19:15:14.847000
CVE-2023-0176,0,0,1dc2a255a38756fd69b660836918029f220e67fe474010062db4d35f498821a4,2025-03-25T18:15:31.023000
CVE-2023-0177,0,0,96612f0d6acc9356b7bef11758fc6250b99f39292144eec2d89a14d00f6db80e,2025-03-20T20:15:27.907000
CVE-2023-0178,0,0,7591c9272af0ccb8f87129805b1aab079536f995d2b21f00c0a538a499928daf,2024-11-21T07:36:41.600000
CVE-2023-0178,0,1,fc51a3e93e7b20dbf41b1671299d60206e6d82a64feca8e26ee75812eaced7d9,2025-03-26T14:15:26.580000
CVE-2023-0179,0,0,9877146175097de2cfaf24ea6f7e8489c6f5c588d2b6bdbf87553e381b048fdf,2024-11-21T07:36:41.697000
CVE-2023-0180,0,0,874d5347c225b067c1bec87c944f9e77ff0adec74cd6c76e1cda8afd708aa06f,2024-11-21T07:36:41.843000
CVE-2023-0181,0,0,6cc218f9c12dcd68e0f8d4ab80bfa62e629b02864392080e103c64c6a0cbe010,2024-11-21T07:36:41.983000
@ -214259,7 +214260,7 @@ CVE-2023-0278,0,0,c555eb49c5676bfc381ca3e12fd4f0c39327a3475f98576227c38717ad8564
CVE-2023-0279,0,0,07878339ce2c8cee0312df189d6a4014fdc30c693326a20296b9b6e697818c01,2025-03-10T19:15:37.140000
CVE-2023-0280,0,0,692d930de0e5724c61f1163dd938405f66a86900dcfdf0110c3ccf4a10473b8e,2025-02-04T21:15:22.160000
CVE-2023-0281,0,0,8e30a1a5618f0b8fdeb50c2463b4f333a99800a52583fcaae701b5fe34e5aba8,2024-11-21T07:36:53.270000
CVE-2023-0282,0,0,79e3b3ee2574d36ad793a4966e13699bfd1b0009f4ae35ce6961b5a3208d93fe,2024-11-21T07:36:53.393000
CVE-2023-0282,0,1,f2a8105be0180298e4597b68e62b27826503d962ca075ae0ec4e67d5172050ca,2025-03-26T14:15:26.760000
CVE-2023-0283,0,0,230ec949cdfa87f9c743cbda03bee4b4589b701b25482058f27efe88db1a01ea,2024-11-21T07:36:53.493000
CVE-2023-0284,0,0,2ee75b8d52458792893d506f4678003e9f3a4ee3862a0d66ec5a91e2fc2321a7,2024-11-21T07:36:53.613000
CVE-2023-0285,0,0,5cfc15627d85ef00a346f7dfd31b8843c30b6e48b152b2072e5bf24a5e2751ec,2025-03-12T16:15:18.480000
@ -216290,14 +216291,14 @@ CVE-2023-20604,0,0,89104cd6bcd572fcd43d03046cd8de5ff1ea8829d4d0bdd409ede520ee0ad
CVE-2023-20605,0,0,0a50f8aed353e1972580ad9bc80d68446dfb03a26e65506fd8ca3367e802fbdf,2024-11-21T07:41:12.673000
CVE-2023-20606,0,0,3c42dc82be70724cbe7cab6b59ab01aba1f16f44b91a8b568cb49094579a692f,2024-11-21T07:41:12.833000
CVE-2023-20607,0,0,2d2b5b020fbe0b55fb14d869a0d8dcac4d6c2aafeb48626430bf6bafca70499c,2025-03-25T19:15:41.100000
CVE-2023-20608,0,0,084092bc44255d3af240e05492c59fc9416e3893a4c1807a90dd67a1176907c1,2024-11-21T07:41:13.110000
CVE-2023-20609,0,0,6f5f42e218d350da70228f17b341d35270c90eed9cfeae380bf875550438b366,2024-11-21T07:41:13.240000
CVE-2023-20608,0,1,d6f9dbbbac69b93cc0824a47d4df36c65ecda27214abbe1f241989302aa528a2,2025-03-26T14:15:26.940000
CVE-2023-20609,0,1,0afa963dad6ef04212b9672924a803b8c2d17becb20dad9274ecbff4a22dfa5f,2025-03-26T14:15:27.147000
CVE-2023-2061,0,0,b4b807b6ce48cef7d45a0e20c4572bea09af7570d502ad43d494e63723900e46,2024-11-21T07:57:51.733000
CVE-2023-20610,0,0,d2e768fecb6a64a6cd39bf38ca3ae9996f64a1a374e84538c101593639892da9,2024-11-21T07:41:13.370000
CVE-2023-20611,0,0,4f0e65ad942470ce4af5b99a7376cd2a8c0bc6255a442da58271d9b4bcc9d306,2024-11-21T07:41:13.470000
CVE-2023-20612,0,0,f1a7140bdd4b3be3e1eac4f5d2f9fcfe1615637c02ac729e2482cf6431b49f41,2024-11-21T07:41:13.590000
CVE-2023-20613,0,0,36a0f3d223ce63f8939c365d6aae4477c1e2e640a8291a613f294af6ba3a5491,2024-11-21T07:41:13.703000
CVE-2023-20614,0,0,1471447f20c1501a60f63853a73fcb1c0a4aac6aa676eeca83e73265ced434e1,2024-11-21T07:41:13.817000
CVE-2023-20610,0,1,8dab462f84161729dc798bc558aade169f04f6528ebea714a146b1324a0c2eb5,2025-03-26T14:15:27.333000
CVE-2023-20611,0,1,039ba1281f90fbc43b46d5ed4bc7aa045324f58c8b3b21dd09e77c7c28820d8c,2025-03-26T14:15:27.513000
CVE-2023-20612,0,1,8e27291aa342cdf92d574714ca62f01f7fece2ec67dbc63744a0d174086e2ef3,2025-03-26T14:15:27.683000
CVE-2023-20613,0,1,b9e134d2f6217071ced16c061aa8582c2090f2710c978787b549509b90760a94,2025-03-26T14:15:27.857000
CVE-2023-20614,0,1,064e591aea3018d61466ccc9fc7891160572654a0b0f52209773e2a17399f534,2025-03-26T14:15:28.053000
CVE-2023-20615,0,0,883e510daf212c6edc0d1340944a56e2b0521f500d1dbdce172681c6f67ac175,2024-11-21T07:41:13.933000
CVE-2023-20616,0,0,193613a083dd6d1fd7c1386d0403d5ab6ff160f6e29176720343022bc0d9c487,2024-11-21T07:41:14.050000
CVE-2023-20618,0,0,d0d6f837b8b9d73bd167ef73e8985b6891f1aec0f68346c0ecad3d267bce8957,2024-11-21T07:41:14.170000
@ -216532,7 +216533,7 @@ CVE-2023-20850,0,0,2f23c5f1b83f56e918fd896a88f923ade429b0abd6a8450551da87b8ed493
CVE-2023-20851,0,0,ad13295b57c6d045f6eb5dc4d8e635c50dbdb18ee2224071e23fc91368fcce72,2024-11-21T07:41:41.720000
CVE-2023-20852,0,0,63bf381c38655e9014f7b908e57b9815d22848296454412b7071321723df65da,2024-11-21T07:41:41.840000
CVE-2023-20853,0,0,a4a4925bb7d17dc151501c8aa321035678533d7956ae2d1bc1c5ee3469d5d5f4,2024-11-21T07:41:41.950000
CVE-2023-20854,0,0,dacd2e665bd38bf4ba99d80576d86e64bbe079de09ee99a977ca737c5655d81d,2024-11-21T07:41:42.060000
CVE-2023-20854,0,1,3fd21afb922bd56fc008b50800b2495770b5431f7d7f37bcb3c9e76180122b2c,2025-03-26T14:15:28.260000
CVE-2023-20855,0,0,519e80dc39dfb08aa2fab9b00de3391eedce7c0f70caa8dc1169bc7dbbf22801,2025-03-17T19:15:17.593000
CVE-2023-20856,0,0,5ae4aa033dbad19981a07ee21a2a125d884a36c4e68c92f5feffac991dac2d83,2024-11-21T07:41:42.283000
CVE-2023-20857,0,0,fefdaa2c60a821e74991439fecf2049da1cf72f21cbe6bd98ce3ea011f3513ae,2025-03-10T15:15:36.383000
@ -219497,12 +219498,12 @@ CVE-2023-24192,0,0,cd15b721a1def7d2488c8772b14ab5fa194e85c370091b47b7506efb91941
CVE-2023-24194,0,0,e4ccdedec4ff686cdb32380992e795162de0f625f141138e9db34036c57ce026,2024-11-21T07:47:33.660000
CVE-2023-24195,0,0,d3ad145057770126892eae4c8b1942cfaf61bf44e61fe15530355046295d8f8c,2024-11-21T07:47:33.800000
CVE-2023-24197,0,0,59993168d8c8a82128502350a8b2e514e9c3650f951b99db5d8fa52eb29a00da,2024-11-21T07:47:33.953000
CVE-2023-24198,0,0,30dab005574fabb61a1bc64aa123e2f1e90d08f5bcfc5d3ab62af88cb6080f71,2024-11-21T07:47:34.100000
CVE-2023-24199,0,0,47f1c0e57aa0f599e7b37ec6e99c50fd387e184fd3758ef88a3817aed8bed182,2024-11-21T07:47:34.253000
CVE-2023-24198,0,1,59f7b90c591a894063db2a85fd2ad5be45e641826e3abc76bee195169b31b49f,2025-03-26T14:15:28.920000
CVE-2023-24199,0,1,2b6b3876429e4e03fdfcdff4e1f089f07756ad717eeddfb6e0bf1906f64e21b8,2025-03-26T14:15:29.150000
CVE-2023-2420,0,0,21c37b78d486b076af4063a056c9741c917da2c1f0f0cf7cdb87987114ae94f5,2024-11-21T07:58:35.080000
CVE-2023-24200,0,0,82a5920211cc9bb18ca00ac075792b35a5e18b4c92c04a83906a05fff5f39c16,2024-11-21T07:47:34.410000
CVE-2023-24201,0,0,c45c396b513b5431443ae840dfbe67cb7bcb1fcf04d75defd8e21f9e1628fc79,2024-11-21T07:47:34.573000
CVE-2023-24202,0,0,7520b77fa1eab73335806dadf00f6afd88c584679056f1a2eef92ac20e72eb47,2024-11-21T07:47:34.720000
CVE-2023-24200,0,1,76fa4fc4b3d226e3bf87c5c62c7a712186811c0a535cffdcaa1ca3aca3493fb0,2025-03-26T14:15:29.363000
CVE-2023-24201,0,1,41dc720936aedebdeff0452b89478c36368d2d4d2c4991249ec07fcc8952bd94,2025-03-26T14:15:29.560000
CVE-2023-24202,0,1,84e1d9c8252f35ad40b6810498a4f3b7f7cf09b7d4e4e84a42593ef7c0d1e6f0,2025-03-26T14:15:29.760000
CVE-2023-24203,0,0,d214cd8dba2f26d07b8d2405c19634fe1dc920a39a8970fca3b3cb699b52ee5e,2024-11-21T07:47:34.870000
CVE-2023-24204,0,0,8d647f4993aac3259b0cd1cda5d7563be021d0ac208e3e41804e4d3946e9bf3e,2024-11-21T07:47:35.097000
CVE-2023-24205,0,0,c2e505927e2bfefc7dbaeaa0138b9c3c54bd47a7156afc23a5d1a26123de85c6,2025-03-12T17:15:39.053000
@ -241078,7 +241079,7 @@ CVE-2023-52458,0,0,fdc24a051b1b2915fa851fc41d64e4806cb7366ecb0cb857fc4237a1e6d0a
CVE-2023-52459,0,0,7a35fca1697526f74e9c91d9f5f8e0238dd61ff49e157d4a65086dd39a1fa0b5,2024-11-21T08:39:49.080000
CVE-2023-5246,0,0,71b08073507c72303c6218241cd511240cd963b14c859420de2e31a511697365,2024-11-21T08:41:22.023000
CVE-2023-52460,0,0,338eeec63077ab6376c52f951015d601771848b278038c36be56efe838b5e5f8,2024-11-21T08:39:49.213000
CVE-2023-52461,0,1,9379cd65f16a21f34aa2ebc3d448001287f403ee64c4d534b309449f67c6de18,2025-03-26T11:41:07.140000
CVE-2023-52461,0,0,9379cd65f16a21f34aa2ebc3d448001287f403ee64c4d534b309449f67c6de18,2025-03-26T11:41:07.140000
CVE-2023-52462,0,0,b72bf8d417d2d25ff363b15e3e49e57a273650623bc7f75d958db0f0e9c41495,2024-11-21T08:39:49.553000
CVE-2023-52463,0,0,6f9a8191f138a8b8e1ea75cd203eab9eaf73fb4337d789766847b4227d0d61f2,2024-11-21T08:39:49.730000
CVE-2023-52464,0,0,1bbc4461fd8cead2d72950753b8e090d2ca08426254e292cd801b5c5a924dc48,2024-11-21T08:39:49.893000
@ -247727,7 +247728,7 @@ CVE-2024-13408,0,0,e396f32e4dcbb651814f9215fd3a09eb2577d8842a6e7054a1c2694b62332
CVE-2024-13409,0,0,16195c232130678b474ab73526a536d491d9fdbf657fb8a2a79faa0112e2d1e0,2025-02-05T01:36:36.047000
CVE-2024-1341,0,0,18a405c4f3b1670bb4682ce0d2bacf1a2f13ce190629c8c1f1c6d07cc16f0c27,2025-02-27T03:18:02.077000
CVE-2024-13410,0,0,c8efcc0710b923cc6eb60456fcfce89ff0c0c26adea4a60a1c9581e3e6307ba6,2025-03-19T07:15:33.233000
CVE-2024-13411,1,1,0617e2ad1f73fcfa473d519329d89e33b2b5aa81c4ab3d1272c419361b63b393,2025-03-26T12:15:13.880000
CVE-2024-13411,0,0,0617e2ad1f73fcfa473d519329d89e33b2b5aa81c4ab3d1272c419361b63b393,2025-03-26T12:15:13.880000
CVE-2024-13412,0,0,a7c26f2b95654b150dd44aaba7168674e4d0fc6138c51107b5476354f60ef52b,2025-03-19T07:15:33.980000
CVE-2024-13413,0,0,b43ed4643dabc8868dcfa53910d76ce2221751b062cab18595b77b8d890794e4,2025-03-11T05:15:37.083000
CVE-2024-13415,0,0,20f4b651b70587580f805a97274e0650f9bb61a3067aa9a0bda1ff129a051ce4,2025-01-31T06:15:29.287000
@ -248182,7 +248183,7 @@ CVE-2024-13884,0,0,10f7fcc75a4fc204450b358cca600c89abd80738d1e6ea67e85cdd937ea09
CVE-2024-13885,0,0,75264973709d612b700dd0d733855b9e045bfa0ed4f3dd1ed0110e51b91a48a2,2025-03-14T17:15:41.520000
CVE-2024-13887,0,0,89499ff7ff9d73f249e52c3c47699c4b603d353d5a310262686faceeeb325e58,2025-03-13T04:15:18.680000
CVE-2024-13888,0,0,45ea465fd1196bf38b8c341b411c16c5302500649feb2c402e910f2e8aae7f79,2025-02-25T20:39:44.927000
CVE-2024-13889,1,1,75c1940ee7572976bef4ca467ac2dcab37c382f2c4d252f4ba0c5d0520a00cb4,2025-03-26T12:15:14.590000
CVE-2024-13889,0,0,75c1940ee7572976bef4ca467ac2dcab37c382f2c4d252f4ba0c5d0520a00cb4,2025-03-26T12:15:14.590000
CVE-2024-1389,0,0,44c915b89d8f24815db27dcf9521c10fcca5d968291afb2cbd201094aadb9d12,2025-01-27T17:15:51.567000
CVE-2024-13890,0,0,355c25a0b64e2b11b5b17fe1a6fd6a7b791d12ac0c833401d52f3b729f30eb44,2025-03-12T16:48:41.693000
CVE-2024-13891,0,0,15d5f22e16d362bc6aa7f84f23a58b6ec9da45506aa8b9c52e0769c2743f78fd,2025-03-14T17:15:41.717000
@ -249671,7 +249672,7 @@ CVE-2024-21028,0,0,540b79219f5e222f7319884f080746d7f3a0b5d84060a59af31e4a5b500bf
CVE-2024-21029,0,0,a2164eec77648fdd187f7ca3636a9757ed8fcb3385453331e8f9516a022bda95,2024-11-21T08:53:38.967000
CVE-2024-2103,0,0,d75ea97133463dd8923821c5ae7569e4e5c73171dd75a860d96581c3124dd721,2024-11-21T09:09:02.603000
CVE-2024-21030,0,0,7b587cff009995d57bff3e773b4aeffb9079cc2de653785fcb6de0a0ac044979,2024-11-21T08:53:39.080000
CVE-2024-21031,0,0,6c3cb7ea7b8afb34e51c401bd8160eb0eba04fe632c5f4b9ab968943d68c3282,2024-11-21T08:53:39.210000
CVE-2024-21031,0,1,d2c613cce14f1e8d0f65b6d844d15d36e99dd892ccc5bfd2d4f2c4e048d318a7,2025-03-26T14:15:30.167000
CVE-2024-21032,0,0,d866ba7453e451375479bb9ece1d42e7dc9d212a5d44ebbadf8c40772a9012db,2024-12-03T19:15:08.570000
CVE-2024-21033,0,0,a190cf24eefe3df88328553d504518f14ded069c8f92a734e4d65b6b23c47b20,2024-11-27T16:30:57.530000
CVE-2024-21034,0,0,ae9d308a305bca7ec9458e6d1f48c196a478086ae62d814b7be92c36ade87461,2025-02-10T23:15:11.760000
@ -249810,7 +249811,7 @@ CVE-2024-21158,0,0,f78c67c7b7a2a8889d251d744d816fc3970c8c2c9af0b3bdf0fdbc5ec66e1
CVE-2024-21159,0,0,bbe3ce3a0b58a01f71158f43541300b4d6fdb30c4aebae8f8deafd5e31560cb8,2025-03-14T19:15:44.500000
CVE-2024-2116,0,0,8c6b9ce679687e5a6470a6b4b429a15c165f13f61e11f8d91ba5b3772cba32f2,2024-11-21T09:09:03.783000
CVE-2024-21160,0,0,682b113f0ab5e67f54e6f9c1540a647f198391e8c03fe35135f65b3d3e0f3bca,2024-11-21T08:53:54.043000
CVE-2024-21161,0,0,373b5050fd44a995656dcf00f8ca1a8ae44fb30dde422db248bfe709d6c07d21,2024-11-21T08:53:54.160000
CVE-2024-21161,0,1,1c1ccfb94a0118cd8f2f1e59ed4acd84701866eff7c401eaa2b4e60ce17bcfd4,2025-03-26T14:15:30.330000
CVE-2024-21162,0,0,b167ca3f5e6eb1d829a66671152027eba0422ffba46e59b6bf288eebefc30ee8,2024-11-21T08:53:54.277000
CVE-2024-21163,0,0,3f9ff522a7e3208378a5962b8a62ba6fa5d09a853a4c6f834c9415a809343380,2025-03-17T19:15:21.793000
CVE-2024-21164,0,0,60ed2ad5154234319e608909d6aa6b8df5a629e4fa60a5cff387bbe8786b34cc,2025-03-18T19:15:42.340000
@ -253029,7 +253030,7 @@ CVE-2024-2541,0,0,5e4a53f51ba8752f74c9f57c8894c57856dd31a2758293bd1ba5d82829a52e
CVE-2024-25410,0,0,34aa3a5dfa0b461c1402bfc8d040049deed5d9d55f98cca2b67ff82eb7e83a3f,2025-03-25T16:59:21.083000
CVE-2024-25411,0,0,139eeef6edada50361deb7799ace9009bc429357d81e031e0f6ba067fd7f71f4,2024-09-30T12:45:57.823000
CVE-2024-25412,0,0,d5179043597587363b5bafc5d06d1de914933f356a38962f7f4dc9de95c609e3,2025-03-13T17:15:29.430000
CVE-2024-25413,0,0,96d3bada534a680d6b00bd4c8f3d59a6a4398e81ff84049059d6b3b17dff556d,2025-01-13T14:34:23.363000
CVE-2024-25413,0,1,ecb5621bbf7e3e04dceea8d9bde40a127e7c59c84eb6a988c7e0d2d9d20fc18a,2025-03-26T14:15:30.490000
CVE-2024-25414,0,0,7418f702b21691b77dd56f68a3739785d38e6a10ad9224149c829d71e21a2d2e,2025-03-14T19:15:45.353000
CVE-2024-25415,0,0,8f911b9a1d1f98e52fdc9a7145ba7a1f87f3944fc95d6b97a9000411d18ab412,2025-01-13T14:19:37.827000
CVE-2024-25417,0,0,c29b6ab1323bd95346fedf8b44c41ad4566effb574b7f727557255b45f598d68,2024-11-21T09:00:46.457000
@ -254893,7 +254894,7 @@ CVE-2024-2767,0,0,63fb7925e3ed607eb8169902b3e027c065fc9d1cd4958d404a1ac76e9d79ea
CVE-2024-27673,0,0,b827936180312254f56c8c18e1a9e00f4dbc9d441e499ec6aaa928d4b3451535,2024-04-03T16:15:07.173000
CVE-2024-27674,0,0,34ccb3f85191f3225246fe31e6b6aa02ad062724f279521d20a183c721e94258,2024-11-21T09:04:52.927000
CVE-2024-2768,0,0,73606e2fcaa404aa5195b229503329bf796940cee0d4ef224671a9d1016ab40e,2025-02-21T17:07:47.053000
CVE-2024-27680,0,1,045ae7f21a76d8b5dcbb31c4b83eae90c185f080a0865122dfcb71911a8e3350,2025-03-26T11:41:33.737000
CVE-2024-27680,0,0,045ae7f21a76d8b5dcbb31c4b83eae90c185f080a0865122dfcb71911a8e3350,2025-03-26T11:41:33.737000
CVE-2024-27683,0,0,e240f9a72cf4b7568ca46ea6bb64ddcf3a6ec5aa03a9416b260ae22da9008b86,2024-11-21T09:04:53.367000
CVE-2024-27684,0,0,8f9956a4a0b43c906740d1106a32a742a9fcef0903170255a4a05b3de7b55181,2024-11-21T09:04:53.583000
CVE-2024-27689,0,0,b8125c9204d9b7912d4a758cf2a362c6f50eefc46a69eade4a7f53332972070e,2024-11-21T09:04:53.813000
@ -254964,7 +254965,7 @@ CVE-2024-2779,0,0,dacce2c27e96eef096b887cc0a7633872387d792cf54d816daebdb6ca6cf8c
CVE-2024-27790,0,0,19fcb60ab52fe9c379609c39b59142d5014d893a59bae627bebebc5a2412f431,2024-12-09T19:31:56.207000
CVE-2024-27791,0,0,cced26eba1922f922a989a68f8969cd506e95668cebd2d4731d8f0f634e4325a,2024-12-12T14:33:00.640000
CVE-2024-27792,0,0,9250caa2e43a6741d177d6e4ce22631bab55e30376cf1dbde675ce33436694e3,2025-03-13T15:15:42.490000
CVE-2024-27793,0,0,4b0df2c2b74473c2b8ba466a704f8df7dacd244d361ee42c49a6311ab2e4a128,2024-12-09T19:28:03.753000
CVE-2024-27793,0,1,d22abe8412fec76d7b57526eb5dd12ab49cdb6d769471bc72bb4ceb9e255116c,2025-03-26T14:15:30.717000
CVE-2024-27794,0,0,4504b4b825a11a7d65b5081c774372a74748805bca6e18e3905fa44645f60653,2024-12-11T19:56:37.067000
CVE-2024-27795,0,0,bc61503adf68bef3d0b5e26c5cbd2e390ccfc5f4b81aa9046af70ee4c1a76aca,2025-03-25T15:15:20.160000
CVE-2024-27796,0,0,29507f426e53036da7b53c85ed50d31725f49a7e326b571b9bcdf2b6bd7f5686,2024-12-09T19:22:11.867000
@ -259119,7 +259120,7 @@ CVE-2024-33300,0,0,fcfcc67a598fdec5020eaee48abef6ddc9c4f0ced0fdd6058b024ed4c721c
CVE-2024-33302,0,0,57b80549fd8096e59e00a3e7e11124741f0adff181ffcd73a2aeb26a71758fd2,2024-11-21T09:16:46.207000
CVE-2024-33303,0,0,788999d70993e4029560429717cb0a5b52e1c75a670c402df99e894a2e38bb1f,2024-11-21T09:16:46.433000
CVE-2024-33304,0,0,29c021a3880698e20fcd7d239a85eabb88a80ce4d09af7c66815d1b48c062b25,2024-11-21T09:16:46.643000
CVE-2024-33305,0,0,39c22d35e3562bdb79ef9b94d579c5d05f2d13e3849ca8bc054acbb20dec764b,2024-11-21T09:16:46.857000
CVE-2024-33305,0,1,d872ba3229a671ba7898ca454c70b19f41ac4e35e9973c9cddb7f3043c93b4c1,2025-03-26T14:15:30.893000
CVE-2024-33306,0,0,c674ae8e870d8ea7b9496d624021eb490db8e79bf45d8ae6b6305d0dc1c3b509,2024-11-21T09:16:47.003000
CVE-2024-33307,0,0,ac7d56af44afb2c2b4a91577f9c8dba989c4554f34f5f7b59ad656ea25cfee5d,2024-11-21T09:16:47.213000
CVE-2024-33308,0,0,00a8a2c0784c175809445a9a47d85dd5333b912b9bfcfcc130d47e205cafb559,2024-11-21T09:16:47.373000
@ -262071,7 +262072,7 @@ CVE-2024-37114,0,0,0e338f534866d330a95b36232ba1ac57a12c5fc7a905167a67cb049f659de
CVE-2024-37115,0,0,e783651c356206b0d0b31091b1d7fdfd8f50e51711b29e1739f1f53f55192af0,2024-11-21T09:23:13.233000
CVE-2024-37116,0,0,cf2143b54808e0aa7e8042d88b1d855be0847ac1fdf8dbc22640fe116a8cfd55,2024-11-21T09:23:13.350000
CVE-2024-37117,0,0,db6e34898cd1468733f11ea5de79282847ac1f5f907a8cc52b2cc65080ab13fc,2024-11-21T09:23:13.483000
CVE-2024-37118,0,0,fb2b539fa334d7e96ecde036ef99a895ef31afb2c0069848ea82a536967f0937,2024-11-21T09:23:13.883000
CVE-2024-37118,0,1,613312a0488d2b2f2e413fa130dac83c77460fac2193c3c1f1170ceca593a3fb,2025-03-26T14:15:31.097000
CVE-2024-37119,0,0,b33708c838e59527facebb450a717de1c655f54d3e3de992a1177004b7a5ce61,2024-11-01T20:24:53.730000
CVE-2024-37120,0,0,d2171da3b8d523afb143949d3bcb23ff59f6918dac6368d589ddec24b7e960af,2024-11-21T09:23:14.157000
CVE-2024-37121,0,0,a18f9282725a0239063debc58ac94387d74058dfc6c6f36c75c46cdc5c5d0bc9,2024-11-21T09:23:14.317000
@ -263083,7 +263084,7 @@ CVE-2024-38272,0,0,a428282e2328d115eecf027212d7fc44c92f6e65ea02e4ce22f32e52f49e0
CVE-2024-38273,0,0,583e36b17ccf9fd546e6b0c478617c872f29a6e7c94358acfe51e69d63fecdb5,2024-11-21T09:25:12.970000
CVE-2024-38274,0,0,14859913700373232d1af86c32719373e3e620e9eda58d5d2c9a70ab987de6d1,2024-11-21T09:25:13.803000
CVE-2024-38275,0,0,1e0d1b69d41da113a39375d1ef0adf52c5ccf90721d4eac00b4fba35587e90d9,2024-11-21T09:25:14.183000
CVE-2024-38276,0,0,94c0cbf0f09804bab99e38b9e7d30d690011db3de0246b8176ea07ec6802bd60,2024-11-21T09:25:14.557000
CVE-2024-38276,0,1,4eed17c921642b4e32f31f7232bcd28979704d3d93ebd0a1d7775251bc728751,2025-03-26T14:15:31.260000
CVE-2024-38277,0,0,6230d2e29114abb120b6de444e537d1a8333d5585a5b7abfd9c68149afd1cc24,2024-12-04T17:15:13.600000
CVE-2024-38278,0,0,b856e3395f4b8ae00a5aca2db9013fbf8a63a31489f5c2d30d69c2819fbe7a94,2024-11-21T09:25:15.127000
CVE-2024-38279,0,0,eeff22a05d58c637b41c8a0a9d81b68926d0e144c0c12891e0709d171d9db2bf,2024-11-21T09:25:15.470000
@ -268421,6 +268422,7 @@ CVE-2024-45345,0,0,4e5002e5dc81035c1af4e238f5f319df35e1e7454ff3bb9f51dea50624303
CVE-2024-45346,0,0,556b0325369db812da5d3ca351593663eeefcc15146e049af11d00d6b0f23de3,2025-03-14T17:15:47.590000
CVE-2024-45348,0,0,1e1db77a5a16312aa537fb47b5ac485ad4a9ec1edf7b08e9d1addf2cc98471e9,2024-11-25T17:14:11.713000
CVE-2024-4535,0,0,78f0543f36f54882e03e81f0faf12704615c89d5497f070efb8f0b2a49e7c790,2025-03-25T15:15:23.147000
CVE-2024-45351,1,1,9798bc02eb0ba83db1ec479e2565390e6f6e7ab4d219551bf7245075b78bfee8,2025-03-26T14:15:31.457000
CVE-2024-4536,0,0,d554a9fba63153c422b87ae2d4b0219537ca1cbc00fd943074006c5d6a843426,2025-02-06T17:32:48.777000
CVE-2024-45366,0,0,d13f4b03dcbe654ea752888fe69e44580333b063ff67391732408feaba64beb9,2024-11-05T22:35:10.920000
CVE-2024-45367,0,0,64e84bc9ed60e849e1ae71705aae4a59b4ff0cb910f064adb8ff87e0d48d255e,2024-10-04T13:50:43.727000
@ -276349,7 +276351,7 @@ CVE-2024-56889,0,0,5327859a7c5496e1e94f8bb9c02a37e2b8342a40649f534ed6f47845e36ee
CVE-2024-5689,0,0,7954cfa7cab5c9d284e75ff2916a8e3e6c71cab8207a342db66b72c3a9729209,2024-11-21T09:48:10.193000
CVE-2024-56897,0,0,c86a728646b989ba2c34050e6cf558894a483f9e45fac8ad92b270dc1bfac754,2025-03-03T20:15:43.540000
CVE-2024-56898,0,0,8124ee23f832958edf569107c7b288b2df457e1cf5fa891be5bacb4a1456c4c4,2025-03-22T14:15:15.590000
CVE-2024-5690,0,0,d4d62df1fcd0a6ab34cd7e4b18e0510e69dc46e6ad88d84635741631f871b265,2024-11-21T09:48:10.377000
CVE-2024-5690,0,1,14af1e261c62ea8d86b88db2c6193508d93346579e927b833ccae3d6b9c2bcad,2025-03-26T14:15:31.660000
CVE-2024-56901,0,0,64eb0224a857e749243b1bd7bc2761e2c8263ae6819e4c9704a3b8650c9b496e,2025-03-04T22:15:39.143000
CVE-2024-56902,0,0,3ef5942ce98190c5aa70f63a17781c2e2ea98e203a6427a08886aad5d3b44a9f,2025-03-04T22:15:39.340000
CVE-2024-56903,0,0,b897be5c821ce23ff62ebbc786466003154e6577f97fa83d87efcf2c721a7888,2025-03-04T22:15:39.547000
@ -281733,7 +281735,7 @@ CVE-2025-1307,0,0,f5a65a0d70e64918e5c1a7d1d02a502ae3db9a76fffe081c38f2a5d059c1eb
CVE-2025-1309,0,0,5d2b17215fed7de1b66f6e9e5fd86a1c64bff76093266d0c2270f4eeb2161dcf,2025-03-07T08:15:42.017000
CVE-2025-1310,0,0,1c2d4505468bb908c19a864be72e2bdc6591212daaa3ccd957c82c76cf5add42,2025-03-26T10:15:14.653000
CVE-2025-1311,0,0,f6c7853d29144d30e1440fe649502c47ee37834c55b5d3f4a34600897bc61e58,2025-03-22T07:15:24.433000
CVE-2025-1312,1,1,d05a4b623df796da515f6bec12f5c229ea8c9f0dba981198b466e753d000b131,2025-03-26T12:15:14.890000
CVE-2025-1312,0,0,d05a4b623df796da515f6bec12f5c229ea8c9f0dba981198b466e753d000b131,2025-03-26T12:15:14.890000
CVE-2025-1314,0,0,bafad489ff1eadbb41395d6cf3743ce464b25bb7da82ca4e71ee61d8353e849a,2025-03-20T06:15:22.437000
CVE-2025-1315,0,0,b2e5cb43d68af8915879a41f899eac8effc6f5ff149f94a7a5bed3683712a9b7,2025-03-13T15:00:51.697000
CVE-2025-1316,0,0,c2931120323888406b8ead50daf4943444c62f5ffe8d72bd7b5c79484ca09a72,2025-03-25T16:46:07.540000
@ -281877,7 +281879,7 @@ CVE-2025-1537,0,0,861630e1b0372f1f37852ff12813e7a5ac2fa6d179d082cf3113227aa130bf
CVE-2025-1538,0,0,13e428f2e0a70ca29f792d43841bea06ccb32609b695e1ccad7a3e5c918f65a6,2025-02-25T20:54:42.947000
CVE-2025-1539,0,0,5be918eac13b456089d712df20e654187887e4c08708a48e1848fdb356188426,2025-03-03T16:36:49.113000
CVE-2025-1540,0,0,cb4999aaeeb60402765c3628ea219ecf33f2a8090fd69a8d886ff441036aa008,2025-03-06T09:15:26.317000
CVE-2025-1542,1,1,4e2adf2ff25372013a2918c53c097d77c36d83ea6791050655febde2e8aa25a1,2025-03-26T11:15:38.240000
CVE-2025-1542,0,0,4e2adf2ff25372013a2918c53c097d77c36d83ea6791050655febde2e8aa25a1,2025-03-26T11:15:38.240000
CVE-2025-1543,0,0,dfb74998b01a6403cafc6b46cb4c4c78345f8468d3e985eba5ddcbda95801293,2025-02-21T16:15:32.787000
CVE-2025-1544,0,0,2377ad87743f4fe242650024fb03372701542bc42778ab3d19eda86c524de177,2025-02-21T16:15:32.953000
CVE-2025-1546,0,0,51ef3cbc8ac56bb33fe743735a6d072664b6eb44d4e8fe737f496fc69a6fe775,2025-02-21T18:15:21.523000
@ -282018,7 +282020,7 @@ CVE-2025-1764,0,0,13706f4025eae225fc3793a7e7a1fa321df281c8253d66f7993d98f6aa0910
CVE-2025-1766,0,0,598707d3f8b19c5a3ff0b336e9bc39a76f8ffb8a9d939d0b001d5b5f979e7c65,2025-03-20T06:15:22.740000
CVE-2025-1767,0,0,db4a25182003b3801d09638d93655c86fe8651aa60672fd3a6309c07b55e200e,2025-03-13T21:15:43.127000
CVE-2025-1768,0,0,21c4d8708441d636d3d85a241f0a7821ff945f56838f66ee7adb3147ed9da671,2025-03-07T11:15:15.653000
CVE-2025-1769,1,1,bc5badcb36958e1f8f1dd29e22fb474934c2e43fca72c5983c3edb91637d4ceb,2025-03-26T12:15:15.040000
CVE-2025-1769,0,0,bc5badcb36958e1f8f1dd29e22fb474934c2e43fca72c5983c3edb91637d4ceb,2025-03-26T12:15:15.040000
CVE-2025-1770,0,0,dabca41c99283c1e30c784be93a5fbf7941611623d961fbc22d34f6c0b873c34,2025-03-20T06:15:22.903000
CVE-2025-1771,0,0,f941eeb87406f27b32688fc24536403440e01c6f12dad32afe5e745de8f06ad7,2025-03-15T05:15:47.253000
CVE-2025-1773,0,0,8ec8dbded090ba64a07cfd6b14e86950d4c62160e124de793edae4c60a6f92e5,2025-03-15T05:15:47.403000
@ -282125,9 +282127,9 @@ CVE-2025-1903,0,0,6d340e8ed917a821f64df99818d24e210d21c9915d508adde3298f17a8197a
CVE-2025-1904,0,0,f1403f89463521fa6ecf20ea0b63150d28c96f5825eb8230b39ee2a81e24b378,2025-03-06T12:20:33.473000
CVE-2025-1905,0,0,2b4eb6efb4aab05c0b5f79955f2e8fa7379c3a611db1f2d5266246ca15810f0c,2025-03-06T12:21:06.503000
CVE-2025-1906,0,0,25be12853bbdada8a0f0b6f9783f2e12a1ead904ee5fe2efcc8d708d8d5a84e0,2025-03-06T12:17:27.613000
CVE-2025-1911,1,1,fda2ee948a7e9dc10da88e86e64ec48c3e958c0e13e09dddebed25db73a20631,2025-03-26T12:15:15.197000
CVE-2025-1912,1,1,52e94094a51833e8f6daebbbcb34134e997db747948d39dc047a1d5773606455,2025-03-26T12:15:15.353000
CVE-2025-1913,1,1,b97da76f8fdcb485607fc8cacd478099fc4d9428d282394b8b42280342910b19,2025-03-26T12:15:15.513000
CVE-2025-1911,0,0,fda2ee948a7e9dc10da88e86e64ec48c3e958c0e13e09dddebed25db73a20631,2025-03-26T12:15:15.197000
CVE-2025-1912,0,0,52e94094a51833e8f6daebbbcb34134e997db747948d39dc047a1d5773606455,2025-03-26T12:15:15.353000
CVE-2025-1913,0,0,b97da76f8fdcb485607fc8cacd478099fc4d9428d282394b8b42280342910b19,2025-03-26T12:15:15.513000
CVE-2025-1914,0,0,187c21953cf4a3bb0942d3a4ab2c435e7f496e314b9f90d9d30af8457a4151bb,2025-03-05T15:15:15.560000
CVE-2025-1915,0,0,8c5ae217f132591a153953e83bf0fd453c3706a9955aee72137219d75a19a23c,2025-03-05T15:15:15.743000
CVE-2025-1916,0,0,089ca37827fcfe2123f7e680bf24d5eeed87218e78fb702864a4ae52e0027b8e,2025-03-05T15:15:15.900000
@ -282427,7 +282429,7 @@ CVE-2025-21092,0,0,03af17d12271d3564885d10071c53bea8826591d692686e1c0d8803603e1f
CVE-2025-21095,0,0,c386ac503377b743afd9fcbb59e3f9db50d4310fdf761d76706a482de8cda7b5,2025-03-05T16:15:37.487000
CVE-2025-21097,0,0,56c8f54b537437305f22923caf43b164fc28222de6fd60b26bf16c417f5c9c3c,2025-03-06T18:07:39.457000
CVE-2025-21098,0,0,dc52a3f16e39fecc93d1ee27a67287d6db18a4b95402eb98c08a4da2374cbce4,2025-03-06T18:08:03.217000
CVE-2025-2110,1,1,2dc6f3ad983af11b81f9e9f47b8d3392e7d319c21fd83923f4df7d536bfee3e7,2025-03-26T12:15:15.827000
CVE-2025-2110,0,0,2dc6f3ad983af11b81f9e9f47b8d3392e7d319c21fd83923f4df7d536bfee3e7,2025-03-26T12:15:15.827000
CVE-2025-21101,0,0,0410baf8ce887e4bee4e642f5416b4c957a9c2a93d873e61b46c5aa6fe5ccada,2025-02-04T15:50:56.233000
CVE-2025-21102,0,0,933ca72a52260837d55d5545fa75f1f12ce9dc7f55e3f7d4f145fee0707ab4ba,2025-01-24T19:10:11.977000
CVE-2025-21103,0,0,e47eb06001984d8500d168dff51756d65a465cd5cf145d2cfc8ed0911d350714,2025-02-17T14:15:08.597000
@ -283184,6 +283186,7 @@ CVE-2025-22273,0,0,6c9d7725782f958c923a6ea8774468e0170596aa9881023a369fbcc7dbb76
CVE-2025-22274,0,0,9ed113d142012585656c9e3f5258e49cefb29c38570f54e9755e8c339f67d326,2025-03-05T16:15:38.243000
CVE-2025-22275,0,0,dc0905974c721b278910237158fbbf2db7a66a5bd4b529c9d9744ba0c53260f3,2025-01-03T07:15:25.297000
CVE-2025-22276,0,0,5a96987c782440e555f7f8980bf83cb51411fc2fe9b353a8ca4c203659e7b960,2025-01-21T18:15:15.303000
CVE-2025-2228,1,1,7c4dbf9df3e2041d0f72623d538d0cfea3524f59e553085385573320f86576ff,2025-03-26T13:15:36.373000
CVE-2025-22280,0,0,7e887d74f1380d8cf0e36667690a3957b0ae26b7cf636de27c1eae24280ecf11,2025-02-27T14:15:36.033000
CVE-2025-22284,0,0,141756b91553288d6d3b7a6baecfb796de636cfa27171ddd3204c869f7233bc2,2025-02-16T23:15:09.280000
CVE-2025-22286,0,0,a057abc87f895feda50fc222dd31de7ff11581af126698bf58f0b63b8d8dc92a,2025-02-16T23:15:09.427000
@ -283755,6 +283758,7 @@ CVE-2025-2320,0,0,54ae946db1d94a75f9dee3622c14a5b8a38a4658dc5f404d7fbaa5736fae52
CVE-2025-23200,0,0,fcacc2d32c11a77659f45b1c51ab5a2465fad7ac9e692296dea6d4d1e65fa678,2025-03-25T15:12:30.793000
CVE-2025-23201,0,0,4d8c8be7d792ec95ab743052e2d6709ed532d05183a33bd3169c195787cd72a5,2025-03-25T14:57:12.250000
CVE-2025-23202,0,0,9cc26d9043bb3e4108331025950b820420267c76da7ed157b3eb776235b83bb0,2025-01-17T21:15:11.713000
CVE-2025-23203,1,1,779e9fb4b3e6743c7670bff2c8e35aa04cae5b5468ccae62545313736f6b0e82,2025-03-26T14:15:32.250000
CVE-2025-23204,0,0,852563d4629aa8d2f2c033762b9d2f2c48787d0793c09ac0c2cd01bbaa7239d7,2025-03-24T17:15:20.417000
CVE-2025-23205,0,0,d2ab035ca501b5eab7d4cddec3035fce30102ede9a29be2c285f726d29109cd9,2025-01-17T21:15:11.850000
CVE-2025-23206,0,0,b65a76f2ad595c398703f7f41c44ad516e76d2e163922a710fc577a54a9a2b5f,2025-01-17T21:15:12.003000
@ -284897,6 +284901,7 @@ CVE-2025-24804,0,0,f7d104b626bdf579e836087298c08c14a0ce3cc2eea658e65d733074620ff
CVE-2025-24805,0,0,ec139300c8aba94d67e6328d56741782b279b0f8fae86fc167a59b6e24537407,2025-02-05T19:15:46.487000
CVE-2025-24806,0,0,09fa1e87d8fedd5d28ff5cb9bac6bc7267715c2451739d08475197db5a3aa60a,2025-02-19T18:15:24.467000
CVE-2025-24807,0,0,a9342833f23aca9efb5658eaedc615b0791a1b8d97d1be177e79dcc0108d2f91,2025-02-21T15:26:57.507000
CVE-2025-24808,1,1,0aa13ed25a26648a2b5dcde507dfbc4d121d040e062cdf4833c05f1c70d9015e,2025-03-26T14:15:32.417000
CVE-2025-24810,0,0,5dc96a04891b646d8f099d1fa627e0a60065bb9f47866c74211a0f5415867e23,2025-01-28T05:15:11.413000
CVE-2025-24811,0,0,2da7e99907675b0c3b84fff601eb43c4c4c27c662d95c7205901bce5bb8705d8,2025-02-11T11:15:16.907000
CVE-2025-24812,0,0,3542fd62679fcd1754aabe0f38d924c5bd34578dfc13aa46aeaa150dd810a16a,2025-02-11T11:15:17.080000
@ -285138,7 +285143,7 @@ CVE-2025-25189,0,0,f68ee5c586d07dec9a336fb2dbbfd3c5bd132d29662e9c4bc9ff1969295aa
CVE-2025-25190,0,0,96316be3801ea8e34db1f71f151e934e00015e5d1a34196dfd79e3e824fb1a50,2025-02-11T16:15:52.420000
CVE-2025-25191,0,0,ebaa2bdb1f2b2bf394317ef2b89f43fe1aabf1dfa6c9b80b2c9248cedeac6aa0,2025-03-06T19:15:27.113000
CVE-2025-25192,0,0,5783eb8b8890bb3417a87f4556b52876901aba8094dc7d2d3a854512fed49412,2025-03-18T17:15:45.720000
CVE-2025-25193,0,0,9c42e26d0a4f2052fdf43faa73fab75794f787f53e222117d45465e7383dd8fa,2025-02-21T18:15:37.253000
CVE-2025-25193,0,1,613e1ea926b6fdda40afee3d113741ca12354927f3daa951434c4e6e690105ec,2025-03-26T13:14:32.087000
CVE-2025-25194,0,0,278bc98c8a0ffe0e8a7e96acea34ed9bc50825c485f6cab1eaf41889a2da8034,2025-02-10T23:15:16.067000
CVE-2025-25195,0,0,6422ab465e1e4500e1fe77efd7e4b259d61944cface94edb31eac51bdeddd22d,2025-02-13T22:15:13.100000
CVE-2025-25196,0,0,5196aba0be3d543377128b43ddee4b3fe123287a21ab5155a82a956ba8a5209f,2025-02-19T21:15:15.577000
@ -285218,10 +285223,10 @@ CVE-2025-2536,0,0,6c8f59f7c1397de65b62b4e0ffba855ba6e95346e685349bc06dd79321df74
CVE-2025-25361,0,0,9f115844287b15ce6dc125807b19b8e446ec3f37878f01ccb8db0422e8bb780e,2025-03-07T20:15:37.673000
CVE-2025-25362,0,0,c8d9b00ad653f3fefb15ba0fdb75a1597ea822f23192e332e875ad1563a7f537,2025-03-06T15:15:17.277000
CVE-2025-25363,0,0,2ff7284dab4cf6e7dac449878bc4c3befcaefea48f9623fa86a7928dded159ae,2025-03-19T19:15:44.390000
CVE-2025-25371,0,0,88b63a5350e0e602b1196160ea76918c39c74c36267dc493de3c33c8292924a7,2025-03-25T21:15:41.907000
CVE-2025-25372,0,0,d97b90d55cf576c67e4c0bc6a2de4a571c71921f86cf7bba487eb4af33d886d9,2025-03-25T21:15:42.027000
CVE-2025-25371,0,1,801e4b37189c9dad7fb5e2e3396fb3093f554bca1f5d91f21ec9b2ccbd67a971,2025-03-26T14:15:32.570000
CVE-2025-25372,0,1,bd6c798a3d63a7e4b9e6386b41594605579638469d2ad087e0afb7050c816f73,2025-03-26T14:15:32.750000
CVE-2025-25373,0,0,7e04f63e8920527d9c23c4bf431b95c25c533789674eda06c7715d56abc84e7f,2025-03-25T21:15:42.140000
CVE-2025-25374,0,0,4e7418487958e762ae51eab65af43636665c6a65ac15f76ffdafd52dac3286b5,2025-03-25T21:15:42.250000
CVE-2025-25374,0,1,7d8ed1f91d3b52bd8231a49b1c9b1c1eed580edf57511466a9bc5a1b312dc6a8,2025-03-26T14:15:32.930000
CVE-2025-25379,0,0,10c6b59b7ced1a65c44b725df73613b964204bd8bcc126008f75da9f2d8ec909,2025-03-04T16:15:39.433000
CVE-2025-2538,0,0,f2c0784ab082ec7998020fccbee47813e4a5143320b7cba59c05b6b8071d6104,2025-03-25T14:15:29.270000
CVE-2025-25381,0,0,98993479fbad247c0a645016b4d364f3055a4b0ab28a945432dc14f688f0a955,2025-03-12T14:15:15.923000
@ -285442,7 +285447,7 @@ CVE-2025-25952,0,0,733f7d41a569ab0086bde2648edacf6a1480bd27bad80edec358adfce1ddd
CVE-2025-25953,0,0,c63208d17b5abc8d04a1effcfa3f9d2231a0266b3bf41265e2e620c714e3b025,2025-03-05T17:15:15.810000
CVE-2025-25957,0,0,b65136edccab78b78b9c909881827ed1ed034886966746fcab259eb6d692acae,2025-02-21T15:15:13.067000
CVE-2025-25958,0,0,0f8b1b28a95747b988ec24f56374cc73cf997d93ede793e430858c23744338af,2025-02-21T16:15:33.173000
CVE-2025-2596,1,1,4c94c23c20af6ad264e3d4fbadeebf650d242c9fafd94b949253e5235652ab1b,2025-03-26T11:15:39.183000
CVE-2025-2596,0,0,4c94c23c20af6ad264e3d4fbadeebf650d242c9fafd94b949253e5235652ab1b,2025-03-26T11:15:39.183000
CVE-2025-25960,0,0,f81f6a42cc37f50d144da0c1d5b21881b06cbfd074736b0e8bb6bc8c20ba8aa2,2025-02-21T22:15:13.297000
CVE-2025-25967,0,0,989386a4237cbda80018de244f1663bcd7537e8be154d2ce1f656a6eb97ba253,2025-03-06T12:25:50.837000
CVE-2025-25968,0,0,aa03a40375072b5ed2e0cc97eadb8b6a24b2d3fca5df43f3cc84fd5f8cf62db9,2025-02-20T20:15:46.993000
@ -285623,7 +285628,7 @@ CVE-2025-26534,0,0,ab467a5c9c98bcf93d9b7ea4108c47f6694cf2610d3631b8a1fb0fc39b004
CVE-2025-26535,0,0,565367cf0af5ec55fb84aa51b9f3cdbadac3508258cd3a35844455f68691b45e,2025-03-03T14:15:54.900000
CVE-2025-26538,0,0,1b562cf933ca4f85387b9ad113a7e0bff6d82f6dfd74192b752d3543af30d3f6,2025-02-13T14:16:19.100000
CVE-2025-26539,0,0,276f32835753e35ddba03e434efdb4b7cdb02fdf3cdfcf4922e56feaff65d802,2025-02-13T14:16:19.383000
CVE-2025-2654,0,0,58b7251fcb2327098709236979de9e00fe7c93fa7a4a8e55b8e5e5a1ed218067,2025-03-24T13:15:27.943000
CVE-2025-2654,0,1,9e79f29088bbaf11c5508f96c7fac0e9b201880a1d7548c53811e79a32728bf7,2025-03-26T14:54:37.560000
CVE-2025-26540,0,0,08a03edcb3fb5cbf83ab6f143d7641096163430d54f5e1cdf4c07f2284606837,2025-03-03T14:15:55.037000
CVE-2025-26543,0,0,b3dbce2448f1125de716ecbc885f7a4be61adfbd3d23eb6c2c769d8219c9a560,2025-02-18T18:15:36.597000
CVE-2025-26545,0,0,671b62b3ebd6109c7d444305b7bdaf6b06c56d8b40b26f4862f918f454077764,2025-02-13T14:16:20.043000
@ -285726,11 +285731,11 @@ CVE-2025-26706,0,0,b51b241e56d67a82d489bdb9e6cf7f91b77a7162f00bdf295468d48446e74
CVE-2025-26707,0,0,96aa33e65cf78737f84fce85389a49f91137e43bd9dc650590985bf2da9a0450,2025-03-11T04:15:25.093000
CVE-2025-26708,0,0,2f79eae1bf3a9e2cd078bee2e260f7de2077d1f5b314f379e5bf317e129bf549,2025-03-07T03:15:33.307000
CVE-2025-2671,0,0,ff323274946feee978f3035f65d2b13b8471bd80748e845b932a8fcd6a7349f8,2025-03-23T22:15:13.513000
CVE-2025-2672,0,0,e60be056000c3794aeb40f03b1dcc605d5a476eed5bfdaa50ce9047fc277f17a,2025-03-23T23:15:13.847000
CVE-2025-2673,0,0,2ac1749d8d95232b7c846038cd89aa75eea434347b3a8ea44c68691c31d5aef0,2025-03-24T00:15:12.467000
CVE-2025-2674,0,0,95659c8444f57d3f93cedcbe0d2d5c415745fe292281900a5ec3057139e7b063,2025-03-24T00:15:13.533000
CVE-2025-2672,0,1,1ad4f5c720df57a16e54455c07c8ba01830bc9ccd3c6fc6d0f2dc7c0cdc8b322,2025-03-26T14:37:30.087000
CVE-2025-2673,0,1,44164d43dd7a4b78996de070528755e6da7c21ce7c771f342d11af93caf1eb75,2025-03-26T14:15:40.467000
CVE-2025-2674,0,1,234b19a0f4d2045310cc995f98433e6e71ee9c2c3ff27b3472c279a410384106,2025-03-26T14:09:08.730000
CVE-2025-26742,0,0,d153ad3877dccd4a4de0cc8817c1b7a7991210fc5c296b3ca1c8b12dcf86929e,2025-03-25T15:15:24.803000
CVE-2025-2675,0,0,864573dee006d6a0afd7d678790325514acf3894e9839d4ef1138fac8ea9dfbe,2025-03-24T01:15:16.490000
CVE-2025-2675,0,1,a44c23b3c6eb403feede7f07b62a3195c75d0aaf189d379810936f38997636fe,2025-03-26T14:03:31.380000
CVE-2025-26750,0,0,d88bdcd674193a8c592f1b97cbf3fbf882d139c99406f62e08a860c366f790c0,2025-02-22T16:15:31.210000
CVE-2025-26751,0,0,fc2d5649850210570a1c66e7227d2f4e23c5b89d750a00b47264258ce20ebf91,2025-02-25T15:15:23.457000
CVE-2025-26752,0,0,de5f26c0c725b106ce7f39cb1c013f91e7db3ad53711569dd4e04f93f6febcc6,2025-02-25T15:15:23.597000
@ -285741,7 +285746,7 @@ CVE-2025-26756,0,0,a7d018e1af803d931a8df90ebdc612d9159f81541f17aec331fcf30be95f9
CVE-2025-26757,0,0,80d208c1ae63305798dd96e121d883ba1652b7f9f061f31e63f086130d7d717b,2025-02-22T16:15:31.493000
CVE-2025-26758,0,0,25b40533aee409aa2cd331b2ce18cbaf3edeb379df8662b725fd0ff6cbb28f34,2025-02-17T12:15:28.407000
CVE-2025-26759,0,0,711cfe1a3f1e64585c04ae86c12c769c732825e1fb249553e9081d3ae4e51992,2025-02-16T23:15:10.777000
CVE-2025-2676,0,0,94b0ded74705d14e973110e2e49a6cbe6a9f59e1b96c1d37226f2cd248187696,2025-03-24T01:15:17.177000
CVE-2025-2676,0,1,f651abf35c4fd02355a5eedd8dc46ad5582fdbba97477491fd397ab68e7704ef,2025-03-26T13:55:26.630000
CVE-2025-26760,0,0,6ce75bdb24ca7f76541cf2fd588811a129a1da7e93670a47e5e982b0f015f1a0,2025-02-22T16:15:31.633000
CVE-2025-26761,0,0,00fb3a7da1af944660d71a3efffc99fa612b6b6a3bd94f13b9ebbbe6b2a8b567,2025-02-16T23:15:10.920000
CVE-2025-26763,0,0,51c2f2b0f162ff62e0ae405c36d1c1d4c6cd19c1cec4a143ce94453f0be82b6c,2025-02-22T16:15:31.773000
@ -285751,7 +285756,7 @@ CVE-2025-26766,0,0,6fee40560b10bf615ff77815533156ec331161a872ec1edc4de985dac44c7
CVE-2025-26767,0,0,a90bd9c7131cd1561c4ae5dbfe01302d49d2ae2d85536054fa888129574ed5cd,2025-02-16T23:15:11.350000
CVE-2025-26768,0,0,17051f6b50700105d1cdeb1d93490b73181876c37bff4a770dbbca224df2a05b,2025-02-16T23:15:11.487000
CVE-2025-26769,0,0,ce08a6c04d6d9d7cfe6a08cbac2855cb075ac725570fcbdc709512ac38778cfe,2025-02-17T12:15:28.550000
CVE-2025-2677,0,0,90dff24a69e6bd6b85e91ff08f3496e9f1ae8ed6b2c96ddc7e08b5ba2cd649b3,2025-03-24T02:15:15.540000
CVE-2025-2677,0,1,38d8cf48265c9b7e92bbc3a46f3b767ff2a93a7fc7e35c0cd70297734f40d657,2025-03-26T13:48:38.670000
CVE-2025-26770,0,0,58e7c71e0ac873fd5253876cd79624d523c33d6d728641b89a44e8229c67714d,2025-02-17T12:15:28.687000
CVE-2025-26771,0,0,8952cc3a8350893437c94ac8ee3475d38f5ba255ec7617dc59bf75d31e8a37cd,2025-02-17T12:15:28.833000
CVE-2025-26772,0,0,e0253b405d26c0acf4ac037cd41c093db348a26c0d4952d5f6ab78a89abbb9d5,2025-03-20T12:20:45.623000
@ -285761,15 +285766,15 @@ CVE-2025-26775,0,0,52cdf659c6c58d7b65216ee908b2b8b467178ee216ba1f7aae1e466a75c04
CVE-2025-26776,0,0,777b3d6f00f90c4800bb30405923ef1b3111a8007fa8cde8f118fda7de44f9fa,2025-02-22T16:15:32.203000
CVE-2025-26778,0,0,e6495d058014d07c9a16b9a09e04b5b2bc9bd02758320b8fd378f88f985b5aac,2025-02-17T12:15:29.417000
CVE-2025-26779,0,0,9024e341253b64921a65d75d7033e8e5a31f095d10dbb69b59e8edd506733722,2025-02-16T23:15:11.630000
CVE-2025-2678,0,0,3d9b311d89b438e0907180ef397afd1a0490362bb650dc0c77fdd6b6d8fec1d1,2025-03-24T03:15:14.573000
CVE-2025-2678,0,1,7e1a91aed29821d8f3580fde3c82f83b41d6d7459dd9f3cbdc7289217ba1ab54,2025-03-26T13:42:31.437000
CVE-2025-26788,0,0,5fac6b93304aa80bc7a573b7eaa3933fb509b5a737cf70fd7551789f71a19205,2025-02-15T16:15:30.090000
CVE-2025-26789,0,0,ebea494059b94de49b6b520d5766b69e65af5f122cf9ef029bba111909dc2c79,2025-02-14T08:15:31.357000
CVE-2025-2679,0,0,169f41591fb4905806636fc9e7f300f9215918ca1a085683c3b503ecafc3764b,2025-03-24T03:15:15.553000
CVE-2025-2679,0,1,fc23340601b0242e345b387da555239ec620056960eb96b4e1c5fddfa9cab616,2025-03-26T13:35:46.297000
CVE-2025-26791,0,0,a7d63ea0959b4846f11cfb3951f45279f457c98157e5d52d56097a5da007bce1,2025-02-14T16:15:37.350000
CVE-2025-26793,0,0,d30b44911459092c9e08ffe42552727cfd072bd06f4aa8564ac964446a27eec1,2025-02-24T17:15:14.580000
CVE-2025-26794,0,0,fe65001567301b62f9f70becffce46b16ab4f6e8292d604a049482502e1fc499,2025-02-22T01:15:10.670000
CVE-2025-26796,0,0,b75ca789edaf2db40a83c7e39a3f34d24eef54f2ef7ca40bedf7bca90f834758,2025-03-24T14:15:18.500000
CVE-2025-2680,0,0,5b2d82e1da8d4f5b5849755dc0c1154d4196889828cbec1024ab3bf93e06c00a,2025-03-24T03:15:15.727000
CVE-2025-2680,0,1,d89af0b1d5f61ae6f7142eb8ca029333ffc853877a743fe92926b40a93040da0,2025-03-26T13:23:41.867000
CVE-2025-26803,0,0,8c486e737c398ad4bd709101648ff92403877558e051d24af9f92cf436430efd,2025-02-28T17:21:55.827000
CVE-2025-2681,0,0,78ee3ddf825d238c6f883ba830d0eb70659b8c1893a974fe40f8558dd8fa6674,2025-03-24T17:37:02.203000
CVE-2025-26816,0,0,2e6935052c19cf69ca34f2738a206b36dcd75ba847d4d8c06eefb2c65cc33c63,2025-03-25T13:15:40.623000
@ -286136,8 +286141,8 @@ CVE-2025-27521,0,0,238fcbb4ddab85c97db2ebf1a5930f855cf28b2ad902f1b11a70a00fedb15
CVE-2025-2753,0,0,c4f223f01f43a4bc41fb6e6000479abc3fcfdfa8bea381ce5d291229dae4b9e3,2025-03-25T09:15:17.247000
CVE-2025-2754,0,0,a326bc3858285141a99f7245126546f196cdca853219c40a22fbd6bab233bcc7,2025-03-25T09:15:17.730000
CVE-2025-2755,0,0,2be4e1e06353a961288a1ac89a57890790aa2d17e4e656d7cb4215a8ecda9be5,2025-03-25T09:15:17.983000
CVE-2025-27551,1,1,9fbc2489ec80e9de647c2e8ff1734eff43438393501575b7372498c02dea54d9,2025-03-26T11:15:38.943000
CVE-2025-27552,1,1,57a3ef3068d58ee4a0b541b28f35dc104129aded6f6e2313b1880a5379244811,2025-03-26T11:15:39.063000
CVE-2025-27551,0,0,9fbc2489ec80e9de647c2e8ff1734eff43438393501575b7372498c02dea54d9,2025-03-26T11:15:38.943000
CVE-2025-27552,0,0,57a3ef3068d58ee4a0b541b28f35dc104129aded6f6e2313b1880a5379244811,2025-03-26T11:15:39.063000
CVE-2025-27553,0,0,183dc3a86b8b1f61354b767d69fc5cfccf39fac83a814abf975899e48ebf1d50,2025-03-24T14:15:18.687000
CVE-2025-27554,0,0,cf23284196495ef624f6aebb4a495f3e36a6b5bfc39b634f5a2b752d43a7754d,2025-03-01T06:15:34.693000
CVE-2025-2756,0,0,58b5bd5add05519b3703c9867b1ef41f7806d55535cab28fb5b5ea6f68937930,2025-03-25T10:15:16.627000
@ -286264,14 +286269,14 @@ CVE-2025-27823,0,0,ae3d83d8b696c6651ddc09be1ef36d15fa5d89a5eeb42b0a2ba26ad0db25f
CVE-2025-27824,0,0,2d002361cc885b5990daf4c3973db9ef130ec1a7bfde36407db01c4a68cfa628,2025-03-07T22:15:38.220000
CVE-2025-27825,0,0,204298b7de8459d92cd5ca573fe552fd0eb50c7361c94c6261df8c437005a654,2025-03-07T22:15:38.380000
CVE-2025-27826,0,0,1af8c747c5098697d6723ab302d54ea95cbfca134be905c245ce43480244837e,2025-03-07T22:15:38.527000
CVE-2025-27830,0,0,45b45915bc610574d2c272796816f37cd9ca4264142af3c70b776a92b7e6c99f,2025-03-25T21:15:42.353000
CVE-2025-27831,0,0,599b93e020e38fe8b09fe78fc24f93b428861fd2ecb23e85266845352701a8b4,2025-03-25T21:15:42.467000
CVE-2025-27832,0,0,acea1da6f42641f7bfd51f4656d93617e01558eebf4e1a93db99dde751012d92,2025-03-25T21:15:42.570000
CVE-2025-27833,0,0,79093008bec95a39f2dd9a54c903c71e97633a120d365afd5888ba18158fdcf3,2025-03-25T21:15:42.683000
CVE-2025-27834,0,0,30be74f855287a77a94112ee8d783753c9be2a7bca8b5601abce70c053e886d8,2025-03-25T21:15:42.870000
CVE-2025-27835,0,0,60a5f486140c23f117bdc283eaa0352fd406fef7d0adcc349d5e76860f3ebe8c,2025-03-25T21:15:43.013000
CVE-2025-27836,0,0,d773496d750e9b8bf163a6baf12e748b997bdea6865f9bb6dd6af045a1746faa,2025-03-25T21:15:43.137000
CVE-2025-27837,0,0,ff1467d3d2b53490dd0f9767d4e375a427dded62490d067e8bac1ab9606da74d,2025-03-25T21:15:43.250000
CVE-2025-27830,0,1,591d304aa3413454e6c36f403d57e6e7fb68dd3e87c7475e01da8a6cc7ee321c,2025-03-26T14:15:33.113000
CVE-2025-27831,0,1,a856c87addb965c8d40d0fec7d4afbf3a702b291a038c6e068c8005453755f7a,2025-03-26T14:15:33.290000
CVE-2025-27832,0,1,f9356ac13ae89841b48c3557e37745524f648c2c9dd9a4890cf23e515298b004,2025-03-26T14:15:33.483000
CVE-2025-27833,0,1,475cd4728a7a1a1a0747a86c93b884ca8116e42396c94a241c7a930af361307e,2025-03-26T14:15:33.680000
CVE-2025-27834,0,1,89a3f5a622cd820cd9e0d428b7820c2a7c682650c72c84824fec35fd0c9090a4,2025-03-26T14:15:33.867000
CVE-2025-27835,0,1,91cae51ecf99354b5ec210871fc28ef49c2dd1e14b195c8c2246a12caff661ea,2025-03-26T14:15:34.057000
CVE-2025-27836,0,1,14e100902788579e844a415137e5577df44c2a330e72f88e240d32b8e8d8328c,2025-03-26T14:15:34.253000
CVE-2025-27837,0,1,ffcf6acdc5938d9300228367dc8e762a2ebbd0b34f218cd6fb26e12c8e2bf13c,2025-03-26T14:15:34.440000
CVE-2025-27839,0,0,2897e6016e5e328d150ac9e956e1e3698f33d754fabb81cbdb31c6766dbfb22d,2025-03-08T00:15:38.340000
CVE-2025-27840,0,0,4f077c11cd42874f9ea8d03fc4b2dba1a597eef072d62ce316763a23259bd33d,2025-03-12T14:58:54.130000
CVE-2025-27867,0,0,706ccc11683336c438698de97765a7b785ce156810f1f1b352bcbe344a4419e0,2025-03-21T21:15:36.910000
@ -286423,7 +286428,7 @@ CVE-2025-29788,0,0,864c3c65f52e851c38fc6d391e926f348d1c70745c997c79fa8abde39ce5b
CVE-2025-29789,0,0,1c633e11107467992fc71529da9430044de9bd0ee056bad183e53d21d3a98dc7,2025-03-25T21:15:43.363000
CVE-2025-29790,0,0,a917e7f845d5526a877724b56a3ae7cbb2c47c308a32a65b6f3b54e65b4f8c98,2025-03-18T19:15:50.813000
CVE-2025-29795,0,0,6628c110a8ddfa1ddc624b3c8e04a9da92178a53d5d396807fa8edc11e306135,2025-03-23T17:15:28.920000
CVE-2025-29806,0,0,a35a41b55c2532a6a7b5d5365a6e904c2be7b4ba79db1ad5389566415b6789e8,2025-03-24T13:15:26.083000
CVE-2025-29806,0,1,a0731b88c2dc4e18b008ec219ba55467523f3caa42666518a3bc46a169274d95,2025-03-26T14:50:45.523000
CVE-2025-29807,0,0,530d9f651149a8b635edd48694d649666884c8d7e97fd101d5bd23cb34763719,2025-03-21T01:15:17.070000
CVE-2025-29814,0,0,435e9e17285030a77811f9738adb8ece14bf52c5a294fba746e389024996a262,2025-03-21T01:15:17.253000
CVE-2025-29891,0,0,6f656b5325e6e317e0701bf37e32b1fd845a6f162de74687e113855da8de633f,2025-03-19T14:15:39.573000
@ -286500,7 +286505,7 @@ CVE-2025-30213,0,0,07d038b7f8cbba366d7d7089646b379e2d42b8eacb99af017cd5481988eed
CVE-2025-30214,0,0,45af31722af71f686115a72cd03f20a765bbb57d5c106731d43d97862d46ec16,2025-03-25T15:15:26.460000
CVE-2025-30216,0,0,3c250555862a00c85e62f5af912e4703f1addd59a33c81c242c247fcda4637ab,2025-03-25T20:15:22.567000
CVE-2025-30219,0,0,66bcfd7287f996f51dac83b22863b0043a284b85a69d60a646aeb12737a881d2,2025-03-25T23:15:36.560000
CVE-2025-30222,0,0,dc75ff60780411177c40fb28315eb43b7ca3f3d3edeb99386ab4edb0a05d8049,2025-03-25T23:15:36.707000
CVE-2025-30222,0,1,8ac52073be044af5c89f8460a87904edf3bd6e6d29d9ffdf89ef9b568874274d,2025-03-26T14:15:34.817000
CVE-2025-30234,0,0,cf20660d6d37e637116a40ce9b3055465db9a1b9c87663c91728f3bae499e866,2025-03-19T05:15:41.353000
CVE-2025-30235,0,0,9222f9a2278ce550ac692bab27bb8a819d1de8dee62df51cf264df3162d55e58,2025-03-19T06:15:16.043000
CVE-2025-30236,0,0,3f73c2c498a83243d93d66190e1e818a0ccbcdd521592f269afac288686f067a,2025-03-19T07:15:34.313000

Can't render this file because it is too large.