Auto-Update: 2025-03-04T23:00:20.031352+00:00

This commit is contained in:
cad-safe-bot 2025-03-04 23:03:49 +00:00
parent b31291e1a7
commit 60e65d1cb1
58 changed files with 2720 additions and 315 deletions

View File

@ -2,13 +2,13 @@
"id": "CVE-2019-20171",
"sourceIdentifier": "cve@mitre.org",
"published": "2019-12-31T00:15:13.307",
"lastModified": "2024-11-21T04:38:09.203",
"lastModified": "2025-03-04T22:15:34.720",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in GPAC version 0.8.0 and 0.9.0-development-20191109. There are memory leaks in metx_New in isomedia/box_code_base.c and abst_Read in isomedia/box_code_adobe.c."
"value": "An issue was discovered in GPAC version 0.5.2 and 0.9.0-development-20191109. There are memory leaks in metx_New in isomedia/box_code_base.c and abst_Read in isomedia/box_code_adobe.c."
},
{
"lang": "es",
@ -114,6 +114,10 @@
}
],
"references": [
{
"url": "https://github.com/gpac/gpac/blob/v0.5.2/src/isomedia/box_code_adobe.c",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/gpac/gpac/issues/1337",
"source": "cve@mitre.org",

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2020-23438",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-03-04T21:15:10.907",
"lastModified": "2025-03-04T21:15:10.907",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Wondershare filmora 9.2.11 is affected by Trojan Dll hijacking leading to privilege escalation."
}
],
"metrics": {},
"references": [
{
"url": "https://cvewalkthrough.com/cve-2020-23438-wondershare-filmora-9-2-11-trojan-dll-hijacking-leading-to-privilege-escalation/",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-33353",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-03-08T22:15:09.593",
"lastModified": "2024-11-21T06:08:44.643",
"lastModified": "2025-03-04T22:15:34.960",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-22"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-33639",
"sourceIdentifier": "securities@openeuler.org",
"published": "2023-03-08T23:15:10.713",
"lastModified": "2024-11-21T06:09:15.307",
"lastModified": "2025-03-04T21:15:11.043",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2021-41719",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-03-04T21:15:11.237",
"lastModified": "2025-03-04T21:15:11.237",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Maharashtra State Electricity Distribution Company Limited Mahavitran IOS Application 16.1 application till version 16.1 communicates using the GET method to process requests that contain sensitive information such as user account name and password, which can expose that information through the browser's history, referrers, web logs, and other sources."
}
],
"metrics": {},
"references": [
{
"url": "https://cvewalkthrough.com/cve-2021-41719-mseb-ios-application-sensitive-information-exposure/",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-46875",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-03-12T05:15:11.190",
"lastModified": "2024-11-21T06:34:49.867",
"lastModified": "2025-03-04T22:15:35.267",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-79"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-48365",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-03-12T05:15:11.917",
"lastModified": "2024-11-21T07:33:15.613",
"lastModified": "2025-03-04T21:15:11.377",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-269"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-269"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-22892",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-03-08T21:15:10.820",
"lastModified": "2024-11-21T07:45:35.793",
"lastModified": "2025-03-04T21:15:11.610",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-668"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-668"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-23328",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-03-10T22:15:10.377",
"lastModified": "2024-11-21T07:46:00.090",
"lastModified": "2025-03-04T22:15:35.720",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-434"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-434"
}
]
}
],
"configurations": [

View File

@ -2,13 +2,13 @@
"id": "CVE-2023-30630",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-04-13T16:15:07.930",
"lastModified": "2025-02-07T17:15:28.740",
"lastModified": "2025-03-04T22:15:36.017",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Dmidecode before 3.5 allows -dump-bin to overwrite a local file. This has security relevance because, for example, execution of Dmidecode via Sudo is plausible."
"value": "Dmidecode before 3.5 allows -dump-bin to overwrite a local file. This has security relevance because, for example, execution of Dmidecode via Sudo is plausible. NOTE: Some third parties have indicated the fix in 3.5 does not adequately address the vulnerability. The argument is that the proposed patch prevents dmidecode from writing to an existing file. However, there are multiple attack vectors that would not require overwriting an existing file that would provide the same level of unauthorized privilege escalation (e.g. creating a new file in /etc/cron.hourly)."
}
],
"metrics": {

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-32340",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2025-01-23T03:15:08.290",
"lastModified": "2025-01-23T03:15:08.290",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-04T21:36:47.970",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -19,7 +19,7 @@
"cvssMetricV31": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N",
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.1,
"impactScore": 2.5
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
@ -51,10 +71,37 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:sterling_b2b_integrator:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.0.0.0",
"versionEndIncluding": "6.1.2.5",
"matchCriteriaId": "E2DD03C2-67D3-4BA5-8109-10C84538AC3B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:sterling_b2b_integrator:6.2.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F0302972-715D-4926-AC67-E2E84DA403CD"
}
]
}
]
}
],
"references": [
{
"url": "https://www.ibm.com/support/pages/node/7176082",
"source": "psirt@us.ibm.com"
"source": "psirt@us.ibm.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-33838",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2025-01-29T02:15:26.640",
"lastModified": "2025-01-29T02:15:26.640",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-04T21:58:37.043",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -19,7 +19,7 @@
"cvssMetricV31": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N",
@ -36,6 +36,26 @@
},
"exploitabilityScore": 0.7,
"impactScore": 3.6
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.2,
"impactScore": 3.6
}
]
},
@ -49,12 +69,42 @@
"value": "CWE-759"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-916"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:security_verify_governance:10.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "A0412C4E-CCDF-4DAE-88B2-1D006F696ED7"
}
]
}
]
}
],
"references": [
{
"url": "https://www.ibm.com/support/pages/node/7172200",
"source": "psirt@us.ibm.com"
"source": "psirt@us.ibm.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-35017",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2025-01-29T00:15:07.333",
"lastModified": "2025-01-29T01:15:07.667",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-04T21:58:37.043",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,30 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:security_verify_governance:10.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "A0412C4E-CCDF-4DAE-88B2-1D006F696ED7"
}
]
}
]
}
],
"references": [
{
"url": "https://www.ibm.com/support/pages/node/7172423",
"source": "psirt@us.ibm.com"
"source": "psirt@us.ibm.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-37412",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2025-01-29T17:15:26.657",
"lastModified": "2025-01-29T17:15:26.657",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-04T21:43:48.913",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -19,7 +19,7 @@
"cvssMetricV31": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:N",
@ -36,6 +36,26 @@
},
"exploitabilityScore": 0.7,
"impactScore": 3.6
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N",
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.2,
"impactScore": 3.6
}
]
},
@ -49,12 +69,44 @@
"value": "CWE-250"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:aspera_faspex:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.0.0",
"versionEndIncluding": "5.0.10",
"matchCriteriaId": "A9FCEC50-B898-4268-964D-F81A02E15F27"
}
]
}
]
}
],
"references": [
{
"url": "https://www.ibm.com/support/pages/node/7181814",
"source": "psirt@us.ibm.com"
"source": "psirt@us.ibm.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-37413",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2025-01-29T17:15:26.800",
"lastModified": "2025-01-29T17:15:26.800",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-04T21:43:48.913",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -19,6 +19,26 @@
"cvssMetricV31": [
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
@ -49,12 +69,44 @@
"value": "CWE-204"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-203"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:aspera_faspex:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.0.0",
"versionEndIncluding": "5.0.10",
"matchCriteriaId": "A9FCEC50-B898-4268-964D-F81A02E15F27"
}
]
}
]
}
],
"references": [
{
"url": "https://www.ibm.com/support/pages/node/7181814",
"source": "psirt@us.ibm.com"
"source": "psirt@us.ibm.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-50309",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2025-01-23T03:15:08.573",
"lastModified": "2025-01-23T03:15:08.573",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-04T21:36:47.970",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -19,7 +19,7 @@
"cvssMetricV31": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
@ -51,10 +71,37 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:sterling_b2b_integrator:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.0.0.0",
"versionEndIncluding": "6.1.2.5",
"matchCriteriaId": "E2DD03C2-67D3-4BA5-8109-10C84538AC3B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:sterling_b2b_integrator:6.2.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F0302972-715D-4926-AC67-E2E84DA403CD"
}
]
}
]
}
],
"references": [
{
"url": "https://www.ibm.com/support/pages/node/7176082",
"source": "psirt@us.ibm.com"
"source": "psirt@us.ibm.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-6948",
"sourceIdentifier": "prodsec@nozominetworks.com",
"published": "2024-04-02T11:15:50.890",
"lastModified": "2024-11-21T08:44:53.957",
"lastModified": "2025-03-04T22:15:36.313",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -36,13 +36,43 @@
},
"exploitabilityScore": 1.5,
"impactScore": 1.4
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L",
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 1.5,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "prodsec@nozominetworks.com",
"type": "Secondary",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Primary",
"description": [
{
"lang": "en",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-2931",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-04-02T09:15:07.567",
"lastModified": "2024-11-21T09:10:52.123",
"lastModified": "2025-03-04T22:15:36.563",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -36,9 +36,41 @@
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
],
"references": [
{
"url": "https://inky-knuckle-2c2.notion.site/WPFront-User-Role-Editor-Information-disclosure-7435b8340a004f5f8485cad375326b2c",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-50685",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-26T21:15:17.373",
"lastModified": "2025-02-26T21:15:17.373",
"vulnStatus": "Received",
"lastModified": "2025-03-04T22:15:36.813",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
@ -15,7 +15,42 @@
"value": "SunGrow iSolarCloud antes de la correcci\u00f3n del 31 de octubre de 2024, es vulnerable a referencias de objetos directos (IDOR) inseguras a trav\u00e9s del modelo de API powerStationService."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-639"
}
]
}
],
"references": [
{
"url": "https://en.sungrowpower.com/security-notice-detail-2/6118",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-50686",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-26T21:15:17.470",
"lastModified": "2025-02-26T21:15:17.470",
"vulnStatus": "Received",
"lastModified": "2025-03-04T22:15:37.017",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
@ -15,7 +15,42 @@
"value": "SunGrow iSolarCloud antes de la correcci\u00f3n del 31 de octubre de 2024 es vulnerable a referencias de objetos directos (IDOR) inseguras a trav\u00e9s del modelo de API commonService."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-639"
}
]
}
],
"references": [
{
"url": "https://en.sungrowpower.com/security-notice-detail-2/6112",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-50687",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-26T21:15:17.557",
"lastModified": "2025-02-26T21:15:17.557",
"vulnStatus": "Received",
"lastModified": "2025-03-04T22:15:37.213",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
@ -15,7 +15,42 @@
"value": "SunGrow iSolarCloud antes de la correcci\u00f3n del 31 de octubre de 2024 es vulnerable a referencias de objetos directos (IDOR) inseguras a trav\u00e9s del modelo de API devService."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-639"
}
]
}
],
"references": [
{
"url": "https://en.sungrowpower.com/security-notice-detail-2/6114",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-50688",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-26T21:15:17.647",
"lastModified": "2025-02-26T21:15:17.647",
"vulnStatus": "Received",
"lastModified": "2025-03-04T22:15:37.413",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
@ -15,7 +15,42 @@
"value": "La aplicaci\u00f3n SunGrow iSolarCloud para Android V2.1.6.20241017 y versiones anteriores contienen credenciales codificadas. La aplicaci\u00f3n (independientemente de la cuenta de usuario) y la nube utilizan las mismas credenciales MQTT para intercambiar la telemetr\u00eda del dispositivo."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-798"
}
]
}
],
"references": [
{
"url": "https://en.sungrowpower.com/security-notice-detail-2/6122",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-50689",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-26T21:15:17.737",
"lastModified": "2025-02-26T21:15:17.737",
"vulnStatus": "Received",
"lastModified": "2025-03-04T22:15:37.630",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
@ -15,7 +15,42 @@
"value": "SunGrow iSolarCloud antes de la correcci\u00f3n del 31 de octubre de 2024 es vulnerable a referencias de objetos directos (IDOR) inseguras a trav\u00e9s del modelo de API orgService."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-639"
}
]
}
],
"references": [
{
"url": "https://en.sungrowpower.com/security-notice-detail-2/6116",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-50691",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-26T21:15:17.823",
"lastModified": "2025-02-26T21:15:17.823",
"vulnStatus": "Received",
"lastModified": "2025-03-04T22:15:37.823",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
@ -15,7 +15,42 @@
"value": "La aplicaci\u00f3n SunGrow iSolarCloud para Android V2.1.6.20241104 y versiones anteriores presentan un problema de falta de validaci\u00f3n del certificado SSL. La aplicaci\u00f3n ignora expl\u00edcitamente los errores de certificado y es vulnerable a ataques MiTM. Los atacantes pueden hacerse pasar por el servidor iSolarCloud y comunicarse con la aplicaci\u00f3n para Android."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.2,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-295"
}
]
}
],
"references": [
{
"url": "https://en.sungrowpower.com/security-notice-detail-2/6124",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-50693",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-26T21:15:17.910",
"lastModified": "2025-02-26T21:15:17.910",
"vulnStatus": "Received",
"lastModified": "2025-03-04T22:15:38.023",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
@ -15,7 +15,42 @@
"value": "SunGrow iSolarCloud antes de la correcci\u00f3n del 31 de octubre de 2024 es vulnerable a referencias de objetos directos (IDOR) inseguras a trav\u00e9s del modelo de API userService."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-639"
}
]
}
],
"references": [
{
"url": "https://en.sungrowpower.com/security-notice-detail-2/6120",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-50696",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-26T21:15:17.997",
"lastModified": "2025-02-26T21:15:17.997",
"vulnStatus": "Received",
"lastModified": "2025-03-04T22:15:38.213",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
@ -15,7 +15,42 @@
"value": "SunGrow WiNet-S V200.001.00.P025 y las versiones anteriores les faltan comprobaciones de integridad para las actualizaciones de firmware. El env\u00edo de un mensaje MQTT espec\u00edfico permite una actualizaci\u00f3n de un inversor o un dispositivo de conectividad WiNet con un archivo de firmware falso que se encuentra en un servidor controlado por el atacante."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-494"
}
]
}
],
"references": [
{
"url": "https://en.sungrowpower.com/security-notice-detail-2/6140",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-50706",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-03-04T15:15:19.290",
"lastModified": "2025-03-04T15:15:19.290",
"lastModified": "2025-03-04T22:15:38.420",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -11,7 +11,42 @@
"value": "Unauthenticated SQL injection vulnerability in Uniguest Tripleplay before 24.2.1 allows remote attackers to execute arbitrary SQL queries on the backend database."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://uniguest.com/cve-bulletins/",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-53573",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-26T22:15:14.043",
"lastModified": "2025-02-26T22:15:14.043",
"vulnStatus": "Received",
"lastModified": "2025-03-04T21:15:11.833",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
@ -15,7 +15,42 @@
"value": "Unifiedtransform v2.X es vulnerable a un control de acceso incorrecto. Los usuarios no autorizados pueden acceder y manipular endpoints destinados exclusivamente para uso administrativo. Este problema afecta espec\u00edficamente a teacher/edit/{id}."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-284"
}
]
}
],
"references": [
{
"url": "https://drive.google.com/file/d/14Or6QIpOeLEqdFm1mwxdE_NNCOwMmcFc/view",
@ -24,6 +59,10 @@
{
"url": "https://www.getastra.com/blog/vulnerability/improper-access-control-in-school-management-system-unifiedtransform/",
"source": "cve@mitre.org"
},
{
"url": "https://drive.google.com/file/d/14Or6QIpOeLEqdFm1mwxdE_NNCOwMmcFc/view",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-53920",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-27T15:15:26.837",
"lastModified": "2025-03-01T06:15:34.350",
"lastModified": "2025-03-04T22:15:38.610",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,42 +15,7 @@
"value": "En elisp-mode.el de GNU Emacs hasta la versi\u00f3n 30.0.92, un usuario que elija invocar elisp-completion-at-point (para completar el c\u00f3digo) en c\u00f3digo fuente de Emacs Lisp que no sea de confianza puede desencadenar una expansi\u00f3n de macros de Lisp no segura que permita a los atacantes ejecutar c\u00f3digo arbitrario. (Esta expansi\u00f3n no segura tambi\u00e9n ocurre si un usuario elige habilitar el diagn\u00f3stico sobre la marcha de que byte compila c\u00f3digo fuente de Emacs Lisp que no es de confianza)."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://eshelyaron.com/posts/2024-11-27-emacs-aritrary-code-execution-and-how-to-avoid-it.html",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-55563",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-12-09T01:15:06.313",
"lastModified": "2024-12-09T01:15:06.313",
"lastModified": "2025-03-04T22:15:38.777",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Bitcoin Core hasta la versi\u00f3n 27.2 permite el bloqueo de la retransmisi\u00f3n de transacciones mediante un ataque de protocolo fuera de la cadena, un problema relacionado con CVE-2024-52913. Por ejemplo, el resultado de un HTLC (contrato de bloqueo de tiempo hash) puede modificarse porque una inundaci\u00f3n de tr\u00e1fico de transacciones impide la propagaci\u00f3n de ciertas transacciones del canal Lightning."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-770"
}
]
}
],
"references": [
{
"url": "https://ariard.github.io",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-56898",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-03T21:15:14.047",
"lastModified": "2025-03-03T22:15:36.810",
"lastModified": "2025-03-04T22:15:38.990",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,42 +15,7 @@
"value": "El control de acceso incorrecto en Geovision GV-ASWeb versi\u00f3n 6.1.0.0 o anterior permite que atacantes no autorizados con privilegios de bajo nivel administren y creen nuevas cuentas de usuario mediante el suministro de una solicitud HTTP manipulada."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/DRAGOWN/CVE-2024-56898",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-56901",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-03T21:15:14.157",
"lastModified": "2025-03-03T22:15:36.967",
"lastModified": "2025-03-04T22:15:39.143",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Cross-Site Request Forgery (CSRF) en Account Management component of Geovision GV-ASWeb version 6.1.1.0 o anterior permite a los atacantes crear arbitrariamente cuentas de administrador a trav\u00e9s de un m\u00e9todo de solicitud GET manipulado."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://github.com/DRAGOWN/CVE-2024-56901",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-56902",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-03T21:15:14.270",
"lastModified": "2025-03-03T22:15:37.063",
"lastModified": "2025-03-04T22:15:39.340",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Un problema en Geovision GV-ASWeb con la versi\u00f3n 6.1.0.0 o anterior permite que atacantes no autorizados con privilegios de bajo nivel puedan solicitar informaci\u00f3n sobre otras cuentas a trav\u00e9s de una solicitud HTTP manipulado."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
],
"references": [
{
"url": "https://github.com/DRAGOWN/CVE-2024-56902",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-56903",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-03T21:15:14.357",
"lastModified": "2025-03-03T22:15:37.173",
"lastModified": "2025-03-04T22:15:39.547",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Cross-Site Request Forgery (CSRF) en Geovision GV-ASWeb con la versi\u00f3n 6.1.1.0 o menos permite a los atacantes ejecutar operaciones arbitrarias mediante el suministro de una solicitud HTTP manipulado."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://github.com/DRAGOWN/CVE-2024-56903",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-57423",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-26T21:15:18.093",
"lastModified": "2025-02-26T21:15:18.093",
"vulnStatus": "Received",
"lastModified": "2025-03-04T21:15:12.020",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
@ -15,11 +15,50 @@
"value": "Una vulnerabilidad de cross site scripting en CloudClassroom-PHP Project v1.0 permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s del par\u00e1metro exid de la funci\u00f3n de evaluaci\u00f3n."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://github.com/harshad-alt/CVE/blob/main/CVE-2024-57423.md",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/harshad-alt/CVE/blob/main/CVE-2024-57423.md",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-8000",
"sourceIdentifier": "psirt@arista.com",
"published": "2025-03-04T21:15:12.220",
"lastModified": "2025-03-04T21:15:12.220",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "On affected platforms running Arista EOS with 802.1X configured, certain conditions may occur where a dynamic ACL is received from the AAA server resulting in only the first line of the ACL being installed after an Accelerated Software Upgrade (ASU) restart. \n\nNote: supplicants with pending captive-portal authentication during ASU would be impacted with this bug."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@arista.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.6,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "psirt@arista.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-1284"
}
]
}
],
"references": [
{
"url": "https://www.arista.com/en/support/advisories-notices/security-advisory/21086-security-advisory-0109",
"source": "psirt@arista.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-9135",
"sourceIdentifier": "psirt@arista.com",
"published": "2025-03-04T21:15:12.360",
"lastModified": "2025-03-04T21:15:12.360",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "On affected platforms running Arista EOS with BGP Link State configured, BGP peer flap can cause the BGP agent to leak memory. This may result in BGP routing processing being terminated and route flapping."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@arista.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "psirt@arista.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-401"
}
]
}
],
"references": [
{
"url": "https://www.arista.com/en/support/advisories-notices/security-advisory/21092-security-advisory-0110",
"source": "psirt@arista.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-1283",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2025-02-13T22:15:11.413",
"lastModified": "2025-02-13T22:15:11.413",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-04T20:59:05.417",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -93,16 +93,143 @@
"value": "CWE-288"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-306"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dingtian-tech:dt-r002_firmware:3.1.3044a:*:*:*:*:*:*:*",
"matchCriteriaId": "FCDD272A-AB68-41C7-8F84-1353263EDB83"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dingtian-tech:dt-r002:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A66EBB54-A7E6-4627-9A00-AB11A5AF632B"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dingtian-tech:dt-r008_firmware:3.1.1759a:*:*:*:*:*:*:*",
"matchCriteriaId": "7BAF5AD2-D97D-4AD3-AD81-3D7650383E13"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dingtian-tech:dt-r008:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DE107C89-F002-4E31-8DED-D342207152DF"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dingtian-tech:dt-r016_firmware:3.1.2776a:*:*:*:*:*:*:*",
"matchCriteriaId": "7050E734-415B-4A61-94B4-BF70721C2F38"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dingtian-tech:dt-r016:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4870512F-79B8-486C-9F4A-4215733C89AD"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dingtian-tech:dt-r032_firmware:3.1.3826a:*:*:*:*:*:*:*",
"matchCriteriaId": "3B2902EB-490A-41DB-B198-E6A614F77B56"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dingtian-tech:dt-r032:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7443447D-5BA5-4B70-952F-E33BB0043139"
}
]
}
]
}
],
"references": [
{
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-044-18",
"source": "ics-cert@hq.dhs.gov"
"source": "ics-cert@hq.dhs.gov",
"tags": [
"US Government Resource",
"Third Party Advisory"
]
},
{
"url": "https://www.dingtian-tech.com/en_us/aboutus.html?tab=contact_us",
"source": "ics-cert@hq.dhs.gov"
"source": "ics-cert@hq.dhs.gov",
"tags": [
"Product"
]
}
]
}

View File

@ -0,0 +1,145 @@
{
"id": "CVE-2025-1954",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-03-04T21:15:12.750",
"lastModified": "2025-03-04T21:15:12.750",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in PHPGurukul Human Metapneumovirus Testing Management System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /login.php. The manipulation of the argument username leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 6.9,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnAvailabilityImpact": "LOW",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"baseScore": 7.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-74"
},
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://github.com/sorcha-l/cve/blob/main/Human%20Metapneumovirus%20(HMPV)%20%E2%80%93%20Testing%20Management%20System%20%20SQL%20Injection%20Vulnerability.md",
"source": "cna@vuldb.com"
},
{
"url": "https://phpgurukul.com/",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.298555",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.298555",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.510360",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,145 @@
{
"id": "CVE-2025-1955",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-03-04T21:15:12.940",
"lastModified": "2025-03-04T21:15:12.940",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in code-projects Online Class and Exam Scheduling System 1.0. It has been rated as problematic. Affected by this issue is some unknown functionality of the file /Scheduling/scheduling/pages/profile.php. The manipulation of the argument username leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "PASSIVE",
"vulnConfidentialityImpact": "NONE",
"vulnIntegrityImpact": "LOW",
"vulnAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
"baseScore": 3.5,
"baseSeverity": "LOW",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.1,
"impactScore": 1.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
"baseScore": 4.0,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
},
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"references": [
{
"url": "https://code-projects.org/",
"source": "cna@vuldb.com"
},
{
"url": "https://hexotion.notion.site/Online-Class-and-Exam-Scheduling-System-in-PHP-has-Stored-Cross-Site-Scripting-vulnerability-in-prof-1a7bb766cf32809b9f0be980e90d83f7?pvs=73",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.298556",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.298556",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.510689",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,145 @@
{
"id": "CVE-2025-1956",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-03-04T22:15:39.867",
"lastModified": "2025-03-04T22:15:39.867",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as critical has been found in code-projects Shopping Portal 1.0. This affects an unknown part of the file /Shopping/Admin/index.php of the component Login. The manipulation of the argument password leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 6.9,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnAvailabilityImpact": "LOW",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"baseScore": 7.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-74"
},
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://code-projects.org/",
"source": "cna@vuldb.com"
},
{
"url": "https://hexotion.notion.site/Shopping-Portal-in-PHP-has-Stored-SQL-injection-vulnerability-in-admin-index-php-1a7bb766cf3280e8bb81eaa59c4c2b74",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.298557",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.298557",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.510696",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,145 @@
{
"id": "CVE-2025-1957",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-03-04T22:15:40.040",
"lastModified": "2025-03-04T22:15:40.040",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as problematic was found in code-projects Blood Bank System 1.0. This vulnerability affects unknown code of the file /BBfile/Blood/o+.php. The manipulation of the argument Bloodname leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "PASSIVE",
"vulnConfidentialityImpact": "NONE",
"vulnIntegrityImpact": "LOW",
"vulnAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
"baseScore": 3.5,
"baseSeverity": "LOW",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.1,
"impactScore": 1.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
"baseScore": 4.0,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
},
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"references": [
{
"url": "https://code-projects.org/",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/Corgile/cve/blob/main/cve.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.298558",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.298558",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.510705",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,141 @@
{
"id": "CVE-2025-1958",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-03-04T22:15:40.210",
"lastModified": "2025-03-04T22:15:40.210",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as critical, has been found in aaluoxiang oa_system 1.0. This issue affects some unknown processing of the file src/main/resources/mappers/address-mapper.xml. The manipulation of the argument outtype leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnAvailabilityImpact": "LOW",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"baseScore": 6.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-74"
},
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://github.com/qkdjksfkeg/cve_article/blob/main/oasys/SQL%20injection.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.298559",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.298559",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.510750",
"source": "cna@vuldb.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-22896",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2025-02-13T22:15:11.737",
"lastModified": "2025-02-13T22:15:11.737",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-04T20:59:05.417",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -80,6 +80,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 4.0
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
@ -95,18 +115,46 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:myscada:mypro:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.4",
"matchCriteriaId": "ED7FC18F-6415-4B32-9420-E5D9663BFF49"
}
]
}
]
}
],
"references": [
{
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-044-16",
"source": "ics-cert@hq.dhs.gov"
"source": "ics-cert@hq.dhs.gov",
"tags": [
"US Government Resource",
"Third Party Advisory"
]
},
{
"url": "https://www.myscada.org/contacts/",
"source": "ics-cert@hq.dhs.gov"
"source": "ics-cert@hq.dhs.gov",
"tags": [
"Product"
]
},
{
"url": "https://www.myscada.org/downloads/mySCADAPROManager/",
"source": "ics-cert@hq.dhs.gov"
"source": "ics-cert@hq.dhs.gov",
"tags": [
"Product"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-23411",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2025-02-13T22:15:11.913",
"lastModified": "2025-02-13T22:15:11.913",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-04T20:59:05.417",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -80,6 +80,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
@ -95,18 +115,46 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:myscada:mypro:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.4",
"matchCriteriaId": "ED7FC18F-6415-4B32-9420-E5D9663BFF49"
}
]
}
]
}
],
"references": [
{
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-044-16",
"source": "ics-cert@hq.dhs.gov"
"source": "ics-cert@hq.dhs.gov",
"tags": [
"US Government Resource",
"Third Party Advisory"
]
},
{
"url": "https://www.myscada.org/contacts/",
"source": "ics-cert@hq.dhs.gov"
"source": "ics-cert@hq.dhs.gov",
"tags": [
"Product"
]
},
{
"url": "https://www.myscada.org/downloads/mySCADAPROManager/",
"source": "ics-cert@hq.dhs.gov"
"source": "ics-cert@hq.dhs.gov",
"tags": [
"Product"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-24865",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2025-02-13T22:15:12.613",
"lastModified": "2025-02-13T22:15:12.613",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-04T20:59:05.417",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -80,6 +80,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 6.0
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
@ -95,18 +115,46 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:myscada:mypro:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.4",
"matchCriteriaId": "ED7FC18F-6415-4B32-9420-E5D9663BFF49"
}
]
}
]
}
],
"references": [
{
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-044-16",
"source": "ics-cert@hq.dhs.gov"
"source": "ics-cert@hq.dhs.gov",
"tags": [
"US Government Resource",
"Third Party Advisory"
]
},
{
"url": "https://www.myscada.org/contacts/",
"source": "ics-cert@hq.dhs.gov"
"source": "ics-cert@hq.dhs.gov",
"tags": [
"Product"
]
},
{
"url": "https://www.myscada.org/downloads/mySCADAPROManager/",
"source": "ics-cert@hq.dhs.gov"
"source": "ics-cert@hq.dhs.gov",
"tags": [
"Product"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-25067",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2025-02-13T22:15:12.780",
"lastModified": "2025-02-13T22:15:12.780",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-04T20:59:05.417",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -95,18 +95,46 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:myscada:mypro:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.4",
"matchCriteriaId": "ED7FC18F-6415-4B32-9420-E5D9663BFF49"
}
]
}
]
}
],
"references": [
{
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-044-16",
"source": "ics-cert@hq.dhs.gov"
"source": "ics-cert@hq.dhs.gov",
"tags": [
"US Government Resource",
"Third Party Advisory"
]
},
{
"url": "https://www.myscada.org/contacts/",
"source": "ics-cert@hq.dhs.gov"
"source": "ics-cert@hq.dhs.gov",
"tags": [
"Product"
]
},
{
"url": "https://www.myscada.org/downloads/mySCADAPROManager/",
"source": "ics-cert@hq.dhs.gov"
"source": "ics-cert@hq.dhs.gov",
"tags": [
"Product"
]
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2025-25426",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-03-04T22:15:40.633",
"lastModified": "2025-03-04T22:15:40.633",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "yshopmall <=v1.9.0 is vulnerable to SQL Injection in the image listing interface."
}
],
"metrics": {},
"references": [
{
"url": "https://gist.github.com/Catherines77/79e6b69490b085d9c2d96c99e72c3579",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/guchengwuyue/yshopmall/issues/34",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-25783",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-26T15:15:26.440",
"lastModified": "2025-02-26T15:15:26.440",
"vulnStatus": "Received",
"lastModified": "2025-03-04T22:15:40.787",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
@ -15,7 +15,42 @@
"value": "Una vulnerabilidad de carga de archivos arbitrarios en el componente admin\\plugin.php de Emlog Pro v2.5.3 permite a los atacantes ejecutar c\u00f3digo arbitrario mediante la carga de un archivo Zip manipulado espec\u00edficamente para ello."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-434"
}
]
}
],
"references": [
{
"url": "http://emlogpro.com",
@ -28,6 +63,10 @@
{
"url": "https://www.emlog.net/",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/Ka7arotto/emlog/blob/main/emlog-3.md",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2025-26136",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-03-04T21:15:13.770",
"lastModified": "2025-03-04T21:15:13.770",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A SQL injection vulnerability exists in mysiteforme versions prior to 2025.01.1."
}
],
"metrics": {},
"references": [
{
"url": "https://gist.github.com/xiadmin6/6d664692d31a04eb59096a488b9f3712",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2025-26318",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-03-04T21:15:13.897",
"lastModified": "2025-03-04T21:15:13.897",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Insecure permissions in TSplus Remote Access v17.30 allow attackers to retrieve a list of all domain accounts currently connected to the application."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/Frozenka/CVE-2025-26318",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2025-26319",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-03-04T22:15:40.993",
"lastModified": "2025-03-04T22:15:40.993",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "FlowiseAI Flowise v2.2.6 was discovered to contain an arbitrary file upload vulnerability in /api/v1/attachments."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/dorattias/CVE-2025-26319",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2025-26495",
"sourceIdentifier": "security@salesforce.com",
"published": "2025-02-11T18:15:47.237",
"lastModified": "2025-02-11T18:15:47.237",
"lastModified": "2025-03-04T21:15:14.020",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,30 @@
"value": "La vulnerabilidad de almacenamiento de informaci\u00f3n confidencial en texto plano en Salesforce Tableau Server puede registrar el token de acceso personal (PAT) en repositorios de registro. Este problema afecta a Tableau Server: antes de 2022.1.3, antes de 2021.4.8, antes de 2021.3.13, antes de 2021.2.14, antes de 2021.1.16, antes de 2020.4.19."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "security@salesforce.com",

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-27410",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-02-28T21:15:27.677",
"lastModified": "2025-02-28T21:15:27.677",
"vulnStatus": "Received",
"lastModified": "2025-03-04T21:15:14.197",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "PwnDoc is a penetration test reporting application. Prior to version 1.2.0, the backup restore functionality is vulnerable to path traversal in the TAR entry's name, allowing an attacker to overwrite any file on the system with their content. By overwriting an included `.js` file and restarting the container, this allows for Remote Code Execution as an administrator. The remote code execution occurs because any user with the `backups:create` and `backups:update` (only administrators by default) is able to overwrite any file on the system. Version 1.2.0 fixes the issue."
},
{
"lang": "es",
"value": "PwnDoc es una aplicaci\u00f3n de informes de pruebas de penetraci\u00f3n. Antes de la versi\u00f3n 1.2.0, la funci\u00f3n de restauraci\u00f3n de copias de seguridad era vulnerable a la navegaci\u00f3n por rutas en el nombre de la entrada TAR, lo que permit\u00eda a un atacante sobrescribir cualquier archivo del sistema con su contenido. Al sobrescribir un archivo `.js` incluido y reiniciar el contenedor, se permite la ejecuci\u00f3n remota de c\u00f3digo como administrador. La ejecuci\u00f3n remota de c\u00f3digo se produce porque cualquier usuario con `backups:create` y `backups:update` (solo administradores de forma predeterminada) puede sobrescribir cualquier archivo del sistema. La versi\u00f3n 1.2.0 soluciona el problema."
}
],
"metrics": {
@ -38,7 +42,7 @@
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -67,6 +71,10 @@
{
"url": "https://github.com/pwndoc/pwndoc/security/advisories/GHSA-mxw8-vgvx-89hx",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/pwndoc/pwndoc/security/advisories/GHSA-mxw8-vgvx-89hx",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-27413",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-02-28T21:15:27.820",
"lastModified": "2025-02-28T21:15:27.820",
"vulnStatus": "Received",
"lastModified": "2025-03-04T21:15:14.303",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "PwnDoc is a penetration test reporting application. Prior to version 1.2.0, the backup restore functionality allows an administrator to import raw data into the database, including Path Traversal (`../`) sequences. This is problematic for the template update functionality as it uses the path from the database to write arbitrary content to, potentially overwriting source code to achieve Remote Code Execution. Any user with the `backups:create`, `backups:update` and `templates:update` permissions (only administrators by default) can write arbitrary content to anywhere on the filesystem. By overwriting source code, it is possible to achieve Remote Code Execution. Version 1.2.0 fixes the issue."
},
{
"lang": "es",
"value": "PwnDoc es una aplicaci\u00f3n de informes de pruebas de penetraci\u00f3n. Antes de la versi\u00f3n 1.2.0, la funci\u00f3n de restauraci\u00f3n de copias de seguridad permite a un administrador importar datos sin procesar a la base de datos, incluidas las secuencias Path Traversal (`../`). Esto es problem\u00e1tico para la funci\u00f3n de actualizaci\u00f3n de plantillas, ya que utiliza la ruta de la base de datos para escribir contenido arbitrario, lo que podr\u00eda sobrescribir el c\u00f3digo fuente para lograr la ejecuci\u00f3n remota de c\u00f3digo. Cualquier usuario con los permisos `backups:create`, `backups:update` y `templates:update` (solo administradores de forma predeterminada) puede escribir contenido arbitrario en cualquier lugar del sistema de archivos. Al sobrescribir el c\u00f3digo fuente, es posible lograr la ejecuci\u00f3n remota de c\u00f3digo. La versi\u00f3n 1.2.0 soluciona el problema."
}
],
"metrics": {
@ -38,7 +42,7 @@
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -71,6 +75,10 @@
{
"url": "https://github.com/pwndoc/pwndoc/security/advisories/GHSA-r3vj-47cf-4672",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/pwndoc/pwndoc/security/advisories/GHSA-r3vj-47cf-4672",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -0,0 +1,82 @@
{
"id": "CVE-2025-27510",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-03-04T22:15:41.147",
"lastModified": "2025-03-04T22:15:41.147",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "conda-forge-metadata provides programatic access to conda-forge's metadata. conda-forge-metadata uses an optional dependency - \"conda-oci-mirror\" which was neither present on the PyPi repository nor registered by any entity. If conda-oci-mirror is taken over by a threat actor, it can result in remote code execution."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 9.3,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnAvailabilityImpact": "HIGH",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-829"
}
]
}
],
"references": [
{
"url": "https://github.com/conda-forge/conda-forge-metadata/blob/799aee36b21ee06289d73d57838b28201f5a57af/pyproject.toml#L28",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/conda-forge/conda-forge-metadata/security/advisories/GHSA-vwfh-m3q7-9jpw",
"source": "security-advisories@github.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2025-03-04T21:00:20.048667+00:00
2025-03-04T23:00:20.031352+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2025-03-04T20:42:55.570000+00:00
2025-03-04T22:15:41.147000+00:00
```
### Last Data Feed Release
@ -33,56 +33,58 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
284105
284119
```
### CVEs added in the last Commit
Recently added CVEs: `12`
Recently added CVEs: `14`
- [CVE-2019-1815](CVE-2019/CVE-2019-18xx/CVE-2019-1815.json) (`2025-03-04T19:15:36.177`)
- [CVE-2020-3122](CVE-2020/CVE-2020-31xx/CVE-2020-3122.json) (`2025-03-04T19:15:36.890`)
- [CVE-2025-1080](CVE-2025/CVE-2025-10xx/CVE-2025-1080.json) (`2025-03-04T20:15:36.867`)
- [CVE-2025-1259](CVE-2025/CVE-2025-12xx/CVE-2025-1259.json) (`2025-03-04T20:15:37.003`)
- [CVE-2025-1260](CVE-2025/CVE-2025-12xx/CVE-2025-1260.json) (`2025-03-04T20:15:37.133`)
- [CVE-2025-1946](CVE-2025/CVE-2025-19xx/CVE-2025-1946.json) (`2025-03-04T19:15:37.583`)
- [CVE-2025-1947](CVE-2025/CVE-2025-19xx/CVE-2025-1947.json) (`2025-03-04T19:15:37.760`)
- [CVE-2025-1949](CVE-2025/CVE-2025-19xx/CVE-2025-1949.json) (`2025-03-04T19:15:37.943`)
- [CVE-2025-1952](CVE-2025/CVE-2025-19xx/CVE-2025-1952.json) (`2025-03-04T19:15:38.117`)
- [CVE-2025-1953](CVE-2025/CVE-2025-19xx/CVE-2025-1953.json) (`2025-03-04T20:15:37.657`)
- [CVE-2025-1969](CVE-2025/CVE-2025-19xx/CVE-2025-1969.json) (`2025-03-04T19:15:38.290`)
- [CVE-2025-26202](CVE-2025/CVE-2025-262xx/CVE-2025-26202.json) (`2025-03-04T19:15:38.640`)
- [CVE-2020-23438](CVE-2020/CVE-2020-234xx/CVE-2020-23438.json) (`2025-03-04T21:15:10.907`)
- [CVE-2021-41719](CVE-2021/CVE-2021-417xx/CVE-2021-41719.json) (`2025-03-04T21:15:11.237`)
- [CVE-2024-8000](CVE-2024/CVE-2024-80xx/CVE-2024-8000.json) (`2025-03-04T21:15:12.220`)
- [CVE-2024-9135](CVE-2024/CVE-2024-91xx/CVE-2024-9135.json) (`2025-03-04T21:15:12.360`)
- [CVE-2025-1954](CVE-2025/CVE-2025-19xx/CVE-2025-1954.json) (`2025-03-04T21:15:12.750`)
- [CVE-2025-1955](CVE-2025/CVE-2025-19xx/CVE-2025-1955.json) (`2025-03-04T21:15:12.940`)
- [CVE-2025-1956](CVE-2025/CVE-2025-19xx/CVE-2025-1956.json) (`2025-03-04T22:15:39.867`)
- [CVE-2025-1957](CVE-2025/CVE-2025-19xx/CVE-2025-1957.json) (`2025-03-04T22:15:40.040`)
- [CVE-2025-1958](CVE-2025/CVE-2025-19xx/CVE-2025-1958.json) (`2025-03-04T22:15:40.210`)
- [CVE-2025-25426](CVE-2025/CVE-2025-254xx/CVE-2025-25426.json) (`2025-03-04T22:15:40.633`)
- [CVE-2025-26136](CVE-2025/CVE-2025-261xx/CVE-2025-26136.json) (`2025-03-04T21:15:13.770`)
- [CVE-2025-26318](CVE-2025/CVE-2025-263xx/CVE-2025-26318.json) (`2025-03-04T21:15:13.897`)
- [CVE-2025-26319](CVE-2025/CVE-2025-263xx/CVE-2025-26319.json) (`2025-03-04T22:15:40.993`)
- [CVE-2025-27510](CVE-2025/CVE-2025-275xx/CVE-2025-27510.json) (`2025-03-04T22:15:41.147`)
### CVEs modified in the last Commit
Recently modified CVEs: `35`
Recently modified CVEs: `42`
- [CVE-2024-41147](CVE-2024/CVE-2024-411xx/CVE-2024-41147.json) (`2025-03-04T19:15:37.117`)
- [CVE-2024-45426](CVE-2024/CVE-2024-454xx/CVE-2024-45426.json) (`2025-03-04T20:42:55.570`)
- [CVE-2024-52366](CVE-2024/CVE-2024-523xx/CVE-2024-52366.json) (`2025-03-04T19:30:24.047`)
- [CVE-2024-52367](CVE-2024/CVE-2024-523xx/CVE-2024-52367.json) (`2025-03-04T19:30:24.047`)
- [CVE-2024-52891](CVE-2024/CVE-2024-528xx/CVE-2024-52891.json) (`2025-03-04T19:30:24.047`)
- [CVE-2024-52893](CVE-2024/CVE-2024-528xx/CVE-2024-52893.json) (`2025-03-04T19:30:24.047`)
- [CVE-2024-55581](CVE-2024/CVE-2024-555xx/CVE-2024-55581.json) (`2025-03-04T20:15:36.677`)
- [CVE-2024-56285](CVE-2024/CVE-2024-562xx/CVE-2024-56285.json) (`2025-03-04T19:30:24.047`)
- [CVE-2024-8676](CVE-2024/CVE-2024-86xx/CVE-2024-8676.json) (`2025-03-04T19:15:37.457`)
- [CVE-2024-9618](CVE-2024/CVE-2024-96xx/CVE-2024-9618.json) (`2025-03-04T20:34:08.907`)
- [CVE-2025-0341](CVE-2025/CVE-2025-03xx/CVE-2025-0341.json) (`2025-03-04T19:30:24.047`)
- [CVE-2025-0433](CVE-2025/CVE-2025-04xx/CVE-2025-0433.json) (`2025-03-04T20:34:08.907`)
- [CVE-2025-1938](CVE-2025/CVE-2025-19xx/CVE-2025-1938.json) (`2025-03-04T20:15:37.257`)
- [CVE-2025-20021](CVE-2025/CVE-2025-200xx/CVE-2025-20021.json) (`2025-03-04T19:08:18.957`)
- [CVE-2025-20024](CVE-2025/CVE-2025-200xx/CVE-2025-20024.json) (`2025-03-04T19:08:18.957`)
- [CVE-2025-20042](CVE-2025/CVE-2025-200xx/CVE-2025-20042.json) (`2025-03-04T19:08:18.957`)
- [CVE-2025-20081](CVE-2025/CVE-2025-200xx/CVE-2025-20081.json) (`2025-03-04T19:08:18.957`)
- [CVE-2025-22316](CVE-2025/CVE-2025-223xx/CVE-2025-22316.json) (`2025-03-04T19:30:24.047`)
- [CVE-2025-23116](CVE-2025/CVE-2025-231xx/CVE-2025-23116.json) (`2025-03-04T20:15:37.840`)
- [CVE-2025-23118](CVE-2025/CVE-2025-231xx/CVE-2025-23118.json) (`2025-03-04T20:15:37.960`)
- [CVE-2025-23119](CVE-2025/CVE-2025-231xx/CVE-2025-23119.json) (`2025-03-04T20:15:38.060`)
- [CVE-2025-24861](CVE-2025/CVE-2025-248xx/CVE-2025-24861.json) (`2025-03-04T19:24:05.917`)
- [CVE-2025-26466](CVE-2025/CVE-2025-264xx/CVE-2025-26466.json) (`2025-03-04T20:15:38.167`)
- [CVE-2025-27146](CVE-2025/CVE-2025-271xx/CVE-2025-27146.json) (`2025-03-04T20:42:55.570`)
- [CVE-2025-27579](CVE-2025/CVE-2025-275xx/CVE-2025-27579.json) (`2025-03-04T19:15:38.800`)
- [CVE-2024-50686](CVE-2024/CVE-2024-506xx/CVE-2024-50686.json) (`2025-03-04T22:15:37.017`)
- [CVE-2024-50687](CVE-2024/CVE-2024-506xx/CVE-2024-50687.json) (`2025-03-04T22:15:37.213`)
- [CVE-2024-50688](CVE-2024/CVE-2024-506xx/CVE-2024-50688.json) (`2025-03-04T22:15:37.413`)
- [CVE-2024-50689](CVE-2024/CVE-2024-506xx/CVE-2024-50689.json) (`2025-03-04T22:15:37.630`)
- [CVE-2024-50691](CVE-2024/CVE-2024-506xx/CVE-2024-50691.json) (`2025-03-04T22:15:37.823`)
- [CVE-2024-50693](CVE-2024/CVE-2024-506xx/CVE-2024-50693.json) (`2025-03-04T22:15:38.023`)
- [CVE-2024-50696](CVE-2024/CVE-2024-506xx/CVE-2024-50696.json) (`2025-03-04T22:15:38.213`)
- [CVE-2024-50706](CVE-2024/CVE-2024-507xx/CVE-2024-50706.json) (`2025-03-04T22:15:38.420`)
- [CVE-2024-53573](CVE-2024/CVE-2024-535xx/CVE-2024-53573.json) (`2025-03-04T21:15:11.833`)
- [CVE-2024-53920](CVE-2024/CVE-2024-539xx/CVE-2024-53920.json) (`2025-03-04T22:15:38.610`)
- [CVE-2024-55563](CVE-2024/CVE-2024-555xx/CVE-2024-55563.json) (`2025-03-04T22:15:38.777`)
- [CVE-2024-56898](CVE-2024/CVE-2024-568xx/CVE-2024-56898.json) (`2025-03-04T22:15:38.990`)
- [CVE-2024-56901](CVE-2024/CVE-2024-569xx/CVE-2024-56901.json) (`2025-03-04T22:15:39.143`)
- [CVE-2024-56902](CVE-2024/CVE-2024-569xx/CVE-2024-56902.json) (`2025-03-04T22:15:39.340`)
- [CVE-2024-56903](CVE-2024/CVE-2024-569xx/CVE-2024-56903.json) (`2025-03-04T22:15:39.547`)
- [CVE-2024-57423](CVE-2024/CVE-2024-574xx/CVE-2024-57423.json) (`2025-03-04T21:15:12.020`)
- [CVE-2025-1283](CVE-2025/CVE-2025-12xx/CVE-2025-1283.json) (`2025-03-04T20:59:05.417`)
- [CVE-2025-22896](CVE-2025/CVE-2025-228xx/CVE-2025-22896.json) (`2025-03-04T20:59:05.417`)
- [CVE-2025-23411](CVE-2025/CVE-2025-234xx/CVE-2025-23411.json) (`2025-03-04T20:59:05.417`)
- [CVE-2025-24865](CVE-2025/CVE-2025-248xx/CVE-2025-24865.json) (`2025-03-04T20:59:05.417`)
- [CVE-2025-25067](CVE-2025/CVE-2025-250xx/CVE-2025-25067.json) (`2025-03-04T20:59:05.417`)
- [CVE-2025-25783](CVE-2025/CVE-2025-257xx/CVE-2025-25783.json) (`2025-03-04T22:15:40.787`)
- [CVE-2025-26495](CVE-2025/CVE-2025-264xx/CVE-2025-26495.json) (`2025-03-04T21:15:14.020`)
- [CVE-2025-27410](CVE-2025/CVE-2025-274xx/CVE-2025-27410.json) (`2025-03-04T21:15:14.197`)
- [CVE-2025-27413](CVE-2025/CVE-2025-274xx/CVE-2025-27413.json) (`2025-03-04T21:15:14.303`)
## Download and Usage

View File

@ -61107,8 +61107,8 @@ CVE-2013-3685,0,0,205af49c3267581953b684138c8dad1b16fe11f6f312f61a87e337fabc2b4f
CVE-2013-3686,0,0,eebbd81728fb6e4840384b2a0ec02516f591236d57bcbe773d57a1aac38bf2c1,2024-11-21T01:54:07.490000
CVE-2013-3687,0,0,dcceeef4a61c59dd935e1e9e1f694aa223ee49d782e52381f29bcf8281c29cbc,2024-11-21T01:54:07.620000
CVE-2013-3688,0,0,e3e01dfe96912715778028dfc8112f2a3a5678c1b57bf96f61a394d7177a1d5c,2024-11-21T01:54:07.773000
CVE-2013-3689,0,1,572f2b19cbb2daabecb9c730012f4d95238c73bd57569342a052607db54c2977,2025-03-04T19:48:23.663000
CVE-2013-3690,0,1,6c42d09499428df1db5c9e5df580a05ba328156f82cc3c0d6f3a1d92ce4a4a30,2025-03-04T19:48:23.663000
CVE-2013-3689,0,0,572f2b19cbb2daabecb9c730012f4d95238c73bd57569342a052607db54c2977,2025-03-04T19:48:23.663000
CVE-2013-3690,0,0,6c42d09499428df1db5c9e5df580a05ba328156f82cc3c0d6f3a1d92ce4a4a30,2025-03-04T19:48:23.663000
CVE-2013-3691,0,0,662300d1019eefc9a9b554f6ce1c622a77217ce84734ae1f41a221e8f353fdbc,2024-11-21T01:54:08.207000
CVE-2013-3692,0,0,96af6f014c3da794a77f58caaf588053402063804ab3da06b73ae0aa46837e0b,2024-11-21T01:54:08.357000
CVE-2013-3693,0,0,3c504d7e088cc147e215a12ec53997de2a794bf4498d6d967572688fef0531b5,2024-11-21T01:54:08.503000
@ -131626,7 +131626,7 @@ CVE-2019-13450,0,0,a19e6500b825532ded42e48c09641afd14ca1b35c58867d8ba26866674127
CVE-2019-13451,0,0,a1fd8e06dc636f583339bab277b9f7ce88aa543c45b062540e9367260bbb806d,2024-11-21T04:24:55.753000
CVE-2019-13452,0,0,a260a130de3aa51cdf61f28a916d5f1159f8284885f00dd938827bf731f11b36,2024-11-21T04:24:55.907000
CVE-2019-13453,0,0,0a82515d8a4330d6d2485f5b2b503bad3f6405e5a6ac8bfc09e7278bf358ee47,2024-11-21T04:24:56.063000
CVE-2019-13454,0,1,6165dbac71b781f66799a9751a43e6e34669598ccffccc15a0efe04affe03de0,2025-03-04T19:15:35.237000
CVE-2019-13454,0,0,6165dbac71b781f66799a9751a43e6e34669598ccffccc15a0efe04affe03de0,2025-03-04T19:15:35.237000
CVE-2019-13455,0,0,6c267d56c3f12b2088e8ad265b320ed1f0e0fafbc01e189497ba888523a3e7ff,2024-11-21T04:24:56.373000
CVE-2019-13456,0,0,e24c18d2aadb56f50a2a595db10eb544ef765f5486aa5ad442830fe8c5c8b128,2024-11-21T04:24:56.510000
CVE-2019-13457,0,0,27b2d170c9f7bbb6311b529cb2e86cb68d5a06d40e8e6c74a29dfd36a9e1ffcc,2024-11-21T04:24:56.660000
@ -135468,7 +135468,7 @@ CVE-2019-1811,0,0,7257fa9318dbfbb906f8172322d1a6dcf0026ac87e97127a618142b9ce820f
CVE-2019-1812,0,0,f39f3180939fe0866f9a91a0e0e9b95e0612f700f79a209a057b2b8cb0dacbf2,2024-11-21T04:37:26.070000
CVE-2019-1813,0,0,72bcb700ab78583c44bd818d08ef976f5a57e0b08f0d9981270962c1cc81ecea,2024-11-21T04:37:26.217000
CVE-2019-1814,0,0,6b482a1984164225f91a406f53c4f46d9a97fe53faff00d70635949504734401,2024-11-21T04:37:26.363000
CVE-2019-1815,1,1,4871e5779746f975ac6ff42d79d909a08b58b5f74c8290525e657fd4eb18ff46,2025-03-04T19:15:36.177000
CVE-2019-1815,0,0,4871e5779746f975ac6ff42d79d909a08b58b5f74c8290525e657fd4eb18ff46,2025-03-04T19:15:36.177000
CVE-2019-1816,0,0,bc1b96179ad9e6dc3efe1c98de6af983824c419aa24897dd76fe2ae3535bf76d,2024-11-21T04:37:26.523000
CVE-2019-1817,0,0,b37f886c116df24d0ef11fd8cd0180a420714c8f2b41e09b3f99177374f69a57,2024-11-21T04:37:26.647000
CVE-2019-18177,0,0,997596f59e0036f91e0b923e8d3cab2e9e3873b57aa1cfd4f381e2447e82c231,2024-11-21T04:32:46.273000
@ -137250,7 +137250,7 @@ CVE-2019-20168,0,0,37aa92c44d287a73d1bbcd0bc0e1a0de137f9ef1deec178ea372539e9bc3e
CVE-2019-20169,0,0,0834c829596733cc28648d69230760f9fd56e1b084607b5879e3fd7169e74b4c,2024-11-21T04:38:08.910000
CVE-2019-2017,0,0,dd99c9e35699c1da10971d23090ea37db3dc2e833b76635592ac5ad9265a3c4c,2024-11-21T04:40:04.483000
CVE-2019-20170,0,0,4a5899be0944d37ef7af687241fed4014abc8bda769c157fb80cca27cc9dad49,2024-11-21T04:38:09.050000
CVE-2019-20171,0,0,8ca833683ad278bbe92ef63068658ad5ee3d131d18f051cea4f06f682a2ce36b,2024-11-21T04:38:09.203000
CVE-2019-20171,0,1,b1fd71db647b6d6b511f0603e259e07d03e362c706880074de1320ae50069d80,2025-03-04T22:15:34.720000
CVE-2019-20172,0,0,ea9e7933bbea8b62583f952f956336f7b5101259e8906f6ecc439a86a02acd19,2024-11-21T04:38:09.343000
CVE-2019-20173,0,0,ece132ae4647a13553a7a5216838e1012c3570585ad3f2eacb2af6c2f76c2c4f,2024-11-21T04:38:09.487000
CVE-2019-20174,0,0,c12f3a2a97851901aea175acd388ffa21babf69083506dae1d15b5ac2d92c989,2024-11-21T04:38:09.627000
@ -151171,13 +151171,13 @@ CVE-2020-16288,0,0,d5c85cf050877eac16ac8f0a8c75310ee25449c708fc9bccdd60160a5b61e
CVE-2020-16289,0,0,67430e37588268a04064328cb09968e412328b3738f03759e0839be6b9ca0512,2024-11-21T05:07:06.313000
CVE-2020-1629,0,0,6b2792cdaa36dac6a55d7d64f0615393e4000e33e8edf3329f3e16c110035a88,2024-11-21T05:11:02.143000
CVE-2020-16290,0,0,e80db55365f51a00c0dabbacc1b82bb802c435ea9768018b9a868ce2b6f47018,2024-11-21T05:07:06.480000
CVE-2020-16291,0,1,0c6b6f6af22139f9fbcfed9821ae7eb35bb8659249745a8f811e18926eeb7a48,2025-03-04T19:15:36.420000
CVE-2020-16291,0,0,0c6b6f6af22139f9fbcfed9821ae7eb35bb8659249745a8f811e18926eeb7a48,2025-03-04T19:15:36.420000
CVE-2020-16292,0,0,7a601c2d8cac81f5f64da0942c11dda7fd07665897264f7a9660a4aec99ee0c2,2024-11-21T05:07:06.803000
CVE-2020-16293,0,0,8bf4d6b7b3cd01d4d68ec7cdc6c807e18da7791704bce6aa13c5b369543816c0,2024-11-21T05:07:06.963000
CVE-2020-16294,0,0,730ad86bc9f044428f72830dbd6577c72f23e23613e4f836d84d893142d6a39f,2024-11-21T05:07:07.123000
CVE-2020-16295,0,0,277b0569456b5ee990a95a66ef959372dc8bd258ef48635800915a1285c4c997,2024-11-21T05:07:07.280000
CVE-2020-16296,0,0,16ce964ec3ad178950659680ce17d2559b452c257c07c4bfdbe1c5f34f293ac9,2024-11-21T05:07:07.440000
CVE-2020-16297,0,1,21742a8527410c4173e5463a9715935b6e79258186c0b38250e4486717057ed5,2025-03-04T19:15:36.597000
CVE-2020-16297,0,0,21742a8527410c4173e5463a9715935b6e79258186c0b38250e4486717057ed5,2025-03-04T19:15:36.597000
CVE-2020-16298,0,0,7fb0cec13cbdba3c8a7cb7650986cc836cdc89f6d665f07282e2b62746258cb9,2024-11-21T05:07:07.773000
CVE-2020-16299,0,0,494bec4da61991784c1f8f627af330c2c2c4729e77aed4a9a1c41485a049eb90,2024-11-21T05:07:07.940000
CVE-2020-1630,0,0,d445e46b239bb9262f6403e0518dc2597f4c384b64c96baeb0b77baa0b2af3a9,2024-11-21T05:11:02.310000
@ -151185,7 +151185,7 @@ CVE-2020-16300,0,0,e9b9f6b73e7cb846cffd9ee48a5253d903ba306bad0b1d28187ac2999bd13
CVE-2020-16301,0,0,6ffde003eeffc9a85f36a12711a38c94fefdd516ccfb5707ee4dcee30a503910,2024-11-21T05:07:08.273000
CVE-2020-16302,0,0,faaa0dda2ed3b1abe9333508b9636216916c723b268967a7135baeadcd24c708,2024-11-21T05:07:08.433000
CVE-2020-16303,0,0,5eb1abe08b6db2147b1c8bb4e98ed1549d73f423a65c72d32a7e25777347df3f,2024-11-21T05:07:08.593000
CVE-2020-16304,0,1,206b79ea3314eb0486e9546111d3522a5ed2e027a28ac94eb9d2bbdef3f34d56,2025-03-04T19:15:36.743000
CVE-2020-16304,0,0,206b79ea3314eb0486e9546111d3522a5ed2e027a28ac94eb9d2bbdef3f34d56,2025-03-04T19:15:36.743000
CVE-2020-16305,0,0,6468629a138a100ef0d4aa666d0809ce0a36ac011f139131f3b503c0568d41c7,2024-11-21T05:07:08.920000
CVE-2020-16306,0,0,3233b6147a505da27746f4a780af25be6c5775b185dccf805f17869c6d486bf7,2024-11-21T05:07:09.080000
CVE-2020-16307,0,0,906010918ff0850051577978de90c20a14d44237732b35efca66371c292d3a7f,2024-11-21T05:07:09.237000
@ -153807,6 +153807,7 @@ CVE-2020-23373,0,0,ed95f6883c9020ba20f58ea5ed2953056429f5cc89ca616baddbc57021583
CVE-2020-23374,0,0,41c64d027245d5760e9f742909427e53700585c6136d9359480945611a6d8a47,2024-11-21T05:13:48.020000
CVE-2020-23376,0,0,93992f78343dd8910c81b004ae2ad3ae891bccaecf9cf5c8e3b17e8c361bc8c9,2024-11-21T05:13:48.153000
CVE-2020-23426,0,0,f62b0e6a732a94edac59175929696cde44032328f771832d17ebff4ad24c8fb9,2024-11-21T05:13:48.287000
CVE-2020-23438,1,1,216fc9451b476383265a839ed63b17b80eefca8578be4f89961e5debba9a0231,2025-03-04T21:15:10.907000
CVE-2020-23446,0,0,88c29f2746008a01e89a0c729df4d9a3bc7511c7606776d5c75fb09952cd46ef,2024-11-21T05:13:48.437000
CVE-2020-23447,0,0,be30263ff308de1c9539ba998de3bb8fac1bd9ca26faf8500d512518f9b6ec41,2024-11-21T05:13:48.580000
CVE-2020-23448,0,0,d45d7e57b1e4d75c3161a8ef8a6ed6a2836024eec5e66035a556c9012745fd01,2024-11-21T05:13:48.720000
@ -157840,7 +157841,7 @@ CVE-2020-3118,0,0,ab3d8ab3aa505c2c0d05ad5df043a25ffb5a170413595648bcabb8b1b1d972
CVE-2020-3119,0,0,0870dee6bca2f4249667243d4049273e03b842939953ccfd2796129499d443d1,2024-11-21T05:30:21.903000
CVE-2020-3120,0,0,97360dafe2754942cbbb79bf509a7de595d46c19be8f6643a32688ca08cac22b,2024-11-21T05:30:22.057000
CVE-2020-3121,0,0,ed15543005c12fde1ae863fa626214726d57ca2a6dce777d35eccc784c07b467,2024-11-21T05:30:22.217000
CVE-2020-3122,1,1,f9bc9a2e14b010199ab8d7c332f1e52a64e4c6e6b6c73fc2d429c1f705cfda13,2025-03-04T19:15:36.890000
CVE-2020-3122,0,0,f9bc9a2e14b010199ab8d7c332f1e52a64e4c6e6b6c73fc2d429c1f705cfda13,2025-03-04T19:15:36.890000
CVE-2020-3123,0,0,df70284a76d5d85ce7336281e6eeb89c860eb74aca7c21d31d73f769e601aefb,2024-11-21T05:30:22.373000
CVE-2020-3124,0,0,bd5bdfd427a38f4aeec68de1a9cfb55f706a375f16cf469eb125e2cdfe5e414f,2024-11-21T05:30:22.513000
CVE-2020-3125,0,0,583946cdbeffea277d4142f6145ecc184f2fb93acdb5403daef2d93670740b6e,2024-11-21T05:30:22.623000
@ -177213,7 +177214,7 @@ CVE-2021-33347,0,0,d57feb5106894bb611a650a977511367b0102014ebb93bb500c067f5b68d8
CVE-2021-33348,0,0,8bdc260900608e8d82c45b0b21fecdd8e10188f492e8d2615bdc1dfb29eb15b0,2024-11-21T06:08:44.213000
CVE-2021-33351,0,0,f370fe0d6a8289ccc56296db68d4e0bc5ce18771846d15f045f9b4c4b723e2d7,2024-11-21T06:08:44.347000
CVE-2021-33352,0,0,e3342c76a0f6b98a2e94354e252afbca2b229d9c481d909a1d86aecfd13b5f7e,2024-11-21T06:08:44.500000
CVE-2021-33353,0,0,6951e8203079c58a35dbe0304da17768307462a20c915722af4d010194176a41,2024-11-21T06:08:44.643000
CVE-2021-33353,0,1,7c2c4b7896620124533885d6bd3de4e33e6d14b0e7ac5f792a930ee530eb7192,2025-03-04T22:15:34.960000
CVE-2021-33354,0,0,c809b0d19ab7f7969b4f1de78dc5b988bff2c1c93cea1c82f6d27d58f0f657ab,2024-11-21T06:08:44.790000
CVE-2021-33356,0,0,2e117bb974dabca13136cd4702ccf7267b60e0545c77f5bd84e8d8cf5896c37c,2024-11-21T06:08:44.957000
CVE-2021-33357,0,0,6ce59078ced6558e26a0b267e0080720480f04604b93a17274c1b3c9e4eec51b,2024-11-21T06:08:45.140000
@ -177424,7 +177425,7 @@ CVE-2021-33635,0,0,1b1ad1f50ba5a3158e4c287d7f43d905e1f46c19119b8cd62d0915a9d4cbc
CVE-2021-33636,0,0,03d6025bda1a836ebebddc121f16e2f8bcb94e228b71af69f387e2f387aeee32,2024-11-21T06:09:14.883000
CVE-2021-33637,0,0,3672fcc36c71d2a5aac94b1c62030a1c55cb16ccb63697545c5c8a85466eb567,2024-11-21T06:09:15.040000
CVE-2021-33638,0,0,41eae936d9cea6bd09226ef4f14971fe145986524633bb507d17a2d31077087c,2024-11-21T06:09:15.173000
CVE-2021-33639,0,0,14a8f852652c9dee6a1897342b1c4848b5ea4cf8c5383f97cd5849fa895351e8,2024-11-21T06:09:15.307000
CVE-2021-33639,0,1,1ff6a9f2cf1a524d0b2ed023dee8175f550111065a18244476c891f5c77049c2,2025-03-04T21:15:11.043000
CVE-2021-33640,0,0,960eea859801957bdecf92c8ce9a368f9c2c5b29dd3e3701ea0473fbdff1ffc9,2024-11-21T06:09:15.430000
CVE-2021-33641,0,0,736448e83dfbd3e140b2921a3e26eafc4bf84852038e91c846ab54d019770f60,2024-11-21T06:09:15.587000
CVE-2021-33642,0,0,4a30b814e330987a203593889177ca0d4efcaf1b36cbd5214570cd7aa57d5939,2024-11-21T06:09:15.707000
@ -183611,6 +183612,7 @@ CVE-2021-4171,0,0,d6973b89eda8573f0cc77737b23b712a87bd9e9baf6501828b75ab17d50f2c
CVE-2021-41714,0,0,e48756d244dee85ea57debac32e4d12267f4eda2b8e124373427985b69ebcaad,2024-11-21T06:26:39.217000
CVE-2021-41715,0,0,db879839d02c790808ec1a011ea57dfd852a0f1c316a65ebea370d2db32e0b3a,2024-11-21T06:26:39.383000
CVE-2021-41716,0,0,d34bb8fb71dd2027fe9e5668ef7fdcc1793fc7e22897bb2b84d6e0b5904561bd,2024-11-21T06:26:39.543000
CVE-2021-41719,1,1,b916032008ccf43406d636af25ba4f943ae3db0f0daa6c0e01de662b7db596f0,2025-03-04T21:15:11.237000
CVE-2021-4172,0,0,e96e216ec67c77f4d12066b034c9783c3a8dfe54a2298c3700ee210d6d4468a8,2024-11-21T06:37:03.893000
CVE-2021-41720,0,0,80ff269557dafca1f62fd75c530f1f3954044fc80a2b1af1977e3aae370d8856,2023-11-07T03:38:59.713000
CVE-2021-41728,0,0,ad5a0dd3cfbdea3c0e75417edb410657010dbedf6d45fb8c3988fe77fa9dcf34,2024-11-21T06:26:39.710000
@ -187121,7 +187123,7 @@ CVE-2021-46868,0,0,f0ef3dd45f64ad741bb81b50cf78f63c19bd438fd32124d2f17de81f953a6
CVE-2021-46871,0,0,05c2919904c965d0b69570703d46258f27345788e02af9d544a23baf7cc1224f,2024-11-21T06:34:49.383000
CVE-2021-46872,0,0,fd01e6b4d7cf956efd9d67ee9685007e549687974e41eefa9b4ee93344bfe2ff,2024-11-21T06:34:49.547000
CVE-2021-46873,0,0,bd696af11164da0889d93481e3bf2473217e799ee3de555882260a6e2f73ec72,2024-11-21T06:34:49.717000
CVE-2021-46875,0,0,f78f3d704204f75728e25a4d5fa2b64bf612c39bae6e7636864b1d0cddf98817,2024-11-21T06:34:49.867000
CVE-2021-46875,0,1,cd128e15ae16beb3eef5e9c0528dea9bb7a3bcbe28dc60234951f81ea8a515de,2025-03-04T22:15:35.267000
CVE-2021-46876,0,0,55d623b0fa818c0b029b6a0df44287071e00d9c5b9308c4393d59d6487a3bc62,2024-11-21T06:34:50.013000
CVE-2021-46877,0,0,d38d83f8552fd712480fd15b31c69fae523b8d5890dcdafac1ebd8aa441c7eef,2025-02-26T19:15:12.823000
CVE-2021-46878,0,0,78f663683c9ae191c79be4d598f09b9b821005339cc94153cd9666f6c0ac2049,2025-02-11T21:15:08.843000
@ -209000,7 +209002,7 @@ CVE-2022-43276,0,0,5d85c76de9f88d50bdcdd31ba939101c5863a3950667e27b370b33c9c9b0d
CVE-2022-43277,0,0,225f1afe59053822a21f0aa0a5279acbabf65c95787f162876d9a2fa96159cea,2024-11-21T07:26:11.033000
CVE-2022-43278,0,0,b7e2aa9a730bbdedac5a203acea323799e54d098c81f5e1f7b8370971fb0b9b3,2024-11-21T07:26:11.190000
CVE-2022-43279,0,0,b9806c379fdb337f3a815999e8a7364d89f8bcc2f957d21959960d8ef89b3b53,2024-11-21T07:26:11.347000
CVE-2022-4328,0,1,c7890d21e9935f0470f840b31f6d736decff1a85abf42fdd20b3e761967beab7,2025-03-04T20:15:35.163000
CVE-2022-4328,0,0,c7890d21e9935f0470f840b31f6d736decff1a85abf42fdd20b3e761967beab7,2025-03-04T20:15:35.163000
CVE-2022-43280,0,0,0a8cdb3da0a3d98dccf1325b5796453b879146d561a247f5c67a0c04b850a9c3,2024-11-21T07:26:11.593000
CVE-2022-43281,0,0,9fdf1c3d16ce3685ff656df7152ad22a2b823909c73efe39786aa51e101e5700,2024-11-21T07:26:11.757000
CVE-2022-43282,0,0,57af2ac3594ef0651718107bf670bf9ba3df981b4ed846cf8a2a5c9d1f4e39d6,2024-11-21T07:26:11.930000
@ -212505,7 +212507,7 @@ CVE-2022-48361,0,0,6b034f2ccbabb2b0b4002568b86f68ea980901a49de34e86421633d13aeef
CVE-2022-48362,0,0,a38eaad973d052fb8eacb61a27cb037ec8505981e43cf64cdd466cc188539039,2024-11-21T07:33:15.157000
CVE-2022-48363,0,0,ae4c901f61cd4343186e6d40e9f444a91647523881c8c467f0d831123ad34cf8,2024-11-21T07:33:15.307000
CVE-2022-48364,0,0,389a006950dbd3156debcd5c772205d3b42a4dd07de138f247cf906a4a434f6b,2024-11-21T07:33:15.467000
CVE-2022-48365,0,0,b935554843b9537d40e30b971626a708eb32cc0a7c1c7683e5ed169f2896d8ea,2024-11-21T07:33:15.613000
CVE-2022-48365,0,1,eae53272272059ee540fa751ff72ac0ef2f33a7f485342c55fa20e700679c0da,2025-03-04T21:15:11.377000
CVE-2022-48366,0,0,40b8dcee156b44165a66a59dac89249a9f52ab12258de1e17f30c4c54cdff5b5,2025-03-04T17:15:10.980000
CVE-2022-48367,0,0,d82067646b346a8279d79bfe5c8a110a939fc1772a639bf1a5605ff44510a41c,2025-03-04T17:15:11.203000
CVE-2022-48368,0,0,cfdf0fb927519fcc4fbf933573497ea0bbcaa6b18dba88de4bcc45d5ac302c81,2025-01-28T20:15:28.660000
@ -218417,7 +218419,7 @@ CVE-2023-22889,0,0,6716b509ed5c405bd04ae933068b80977723c43438fbe0730e49946a4c10f
CVE-2023-2289,0,0,6013867f705d189ecb694a4c75caacb35ccfe1ab1779a608673144f0d10ca3f4,2024-11-21T07:58:19.060000
CVE-2023-22890,0,0,594c803ebe43843c407dd09796d90846ed3fbf28e4010f104f3e4bc11928c0ed,2024-11-21T07:45:35.493000
CVE-2023-22891,0,0,6b960d5609fef2c7e51785d1776f82b9a9dc1c19fcf013319b8201924bfe16d4,2024-11-21T07:45:35.647000
CVE-2023-22892,0,0,bed5e7f25e629ecc89f6e80195ccbc99ade99e8eb19a2d0ed5a2c1e0b3697bee,2024-11-21T07:45:35.793000
CVE-2023-22892,0,1,c963711bf8dff126d953038745e504027e8bd2d954a24cb7a184225e893f5abe,2025-03-04T21:15:11.610000
CVE-2023-22893,0,0,c3342eb32834df651051500937183e326b6ea2c855ec70350295dbe77a89ad74,2025-02-05T17:15:18.133000
CVE-2023-22894,0,0,83a9bc4d6f652a5da819c8e1af0fc9a362d82f490b3fc0d16b028bb916c464fe,2025-02-05T17:15:18.590000
CVE-2023-22895,0,0,56d189325d26815b5c06ca899e2abcb81a36620a30974be41b02b29e9483f523,2024-11-21T07:45:36.257000
@ -218616,7 +218618,7 @@ CVE-2023-23324,0,0,5d48828077c8be90528b04711cd87bf712a72c1a2913ba049bb8d673723ba
CVE-2023-23325,0,0,518dcf9a2af100841b84c73e77aead56932b04d21c668e4e673d1b9b408ecbdb,2024-11-21T07:45:59.640000
CVE-2023-23326,0,0,1a4e39362f1c8791076d367fc23df696eb59e6884fa5b2335a9fcfd232e3f37d,2025-02-27T19:15:47.783000
CVE-2023-23327,0,0,6da2ce2cc26156b13a1b95f743a9753609f58547ad519cbf4c93b3a27b663a72,2024-11-21T07:45:59.933000
CVE-2023-23328,0,0,8b7f9244b0915a9b56758c5e614f7cb7fe95d9dce3a04a7593556df54a35d4ba,2024-11-21T07:46:00.090000
CVE-2023-23328,0,1,93bd54281b2a6b33993da36fd1ee5c9aba3043faf08f089dbbd35a213677db25,2025-03-04T22:15:35.720000
CVE-2023-2333,0,0,49815d35ba5652045e1256f3d4e37c7e202552cb53ecfa1b0d6fb27fcb89f551,2024-11-21T07:58:24.400000
CVE-2023-23330,0,0,4d49459152c00a8d0e982eb0ce8f3681dcb11541a12b5dcd275f47bba39075ba,2025-02-18T21:15:14.247000
CVE-2023-23331,0,0,b84a1a7634d01037bc3f1c88ee1e839a2ef2a60e14da401de106f78681906d84,2024-11-21T07:46:00.377000
@ -221606,7 +221608,7 @@ CVE-2023-2695,0,0,1a03e6ccf425b7efab4b2b3d34d6ccd4c483f382d13af42c5c783fbc5e3e28
CVE-2023-26950,0,0,776d2f7b141aebc20febebface8c5cc1214b6003cf0611b92d93d7ca6b16e7ba,2024-11-21T07:52:05.960000
CVE-2023-26951,0,0,e1adc49b9103f912e0f2aa00fe9d939d9cab78c809f7f4a57db4e408eaae3d8c,2024-11-21T07:52:06.123000
CVE-2023-26952,0,0,9a77e11b71d30a33fc14ddb60eb3c430a4af1c5011ff90903a5c4573a4441c86,2025-03-03T16:15:37.590000
CVE-2023-26953,0,1,df116039a3d5e2187601aea238f6a2dc84108655cb925d05b197fe653c3aa647,2025-03-04T20:15:36.217000
CVE-2023-26953,0,0,df116039a3d5e2187601aea238f6a2dc84108655cb925d05b197fe653c3aa647,2025-03-04T20:15:36.217000
CVE-2023-26954,0,0,25be800d2a27b5a2697c9d918f8a2349a547ae4f9a78abb00c6ceaad8c48b070,2024-11-21T07:52:06.593000
CVE-2023-26955,0,0,b8f41864dbe1598322641771160d9e7a2e547f6259bb94db906df77dcc968550,2024-11-21T07:52:06.740000
CVE-2023-26956,0,0,357b2a07c4dff39d60a75c8ab45811278d23b3855aa28ce615f60743efe78a52,2024-11-21T07:52:06.880000
@ -224557,7 +224559,7 @@ CVE-2023-30627,0,0,b179551ac2b2aec7f243ff1595f134b80bdcf8367ebe0ab868616ab5fe5c6
CVE-2023-30628,0,0,acdb1a51d868c185cef5580412bfd3a1adac8efeb23d4e4d62dab4098c169b96,2024-11-21T08:00:32.690000
CVE-2023-30629,0,0,db8d47acde7b3fee691ae50fd114be204f5537a7a6a8f106752ff53ee0b6dbcc,2024-11-21T08:00:32.820000
CVE-2023-3063,0,0,cd7fb32daee65efff903827a32e072d7912d2ff2abce0c6d7779ba3dd71b4c62,2024-11-21T08:16:21.533000
CVE-2023-30630,0,0,358a6893f9457f664e23c612f9d096976ea338a84921b14ae754ff90f00238ce,2025-02-07T17:15:28.740000
CVE-2023-30630,0,1,e9d5c7c15e40c974939f85897f47959e11abda8a12f7e2deba572dfe47747548,2025-03-04T22:15:36.017000
CVE-2023-30631,0,0,bfc0d3beeb5e32392077de35a24d682dc59521e8c032d8e7696231220add5d78,2025-02-13T17:16:25.470000
CVE-2023-30633,0,0,74099a59b3b177109852946fc25b65f30a6716f2451544a4a77fa813ae4ce4f7,2024-11-21T08:00:33.987000
CVE-2023-30635,0,0,ab8703ab2fe3f8b696f825d26e2348963d273f0de2940555f66172cfe52d1f89,2025-02-07T17:15:28.943000
@ -225887,7 +225889,7 @@ CVE-2023-32337,0,0,a01aa4bebe213f4039138b0eb96d92b230dde3cc35fc23554071c5e999080
CVE-2023-32338,0,0,8dea335f01070595c6ec59a7d3c53171b9fb9fbff328f6bd4351efdab3957994,2024-11-21T08:03:08.703000
CVE-2023-32339,0,0,56e5e5057225790255da00ffb858773794e855ce0038d02d9bcb9ad217984b74,2024-11-21T08:03:08.850000
CVE-2023-3234,0,0,0fa1466c040a99f283157c1612582306e508dc74f92b2c2292dbaa2cbe7e5460,2024-11-21T08:16:45.660000
CVE-2023-32340,0,0,f0c449ea23d7ad1f8248413bf0940f60153e0bf8bddb719986298e3bfed480a5,2025-01-23T03:15:08.290000
CVE-2023-32340,0,1,d324af44d4f9440a5f091bfa20e1025ba656c02cea3fd8022695f9a982e24666,2025-03-04T21:36:47.970000
CVE-2023-32341,0,0,d38b9ebaa1a9c25da70da76b9a1cefb48113ed83bfcd9e5e955b91cec0095134,2024-11-21T08:03:08.987000
CVE-2023-32342,0,0,cb80571e1573bb95c1a667148885dc625dc45a1310587dac64fa32bf27bd1e3f,2024-11-21T08:03:09.113000
CVE-2023-32344,0,0,7bc8b77d90defd48ee4bb5a1611c065560350060add6413ed28dc594c84c459d,2024-12-17T18:55:38.543000
@ -227109,7 +227111,7 @@ CVE-2023-33834,0,0,338462881466f026d06fb0a898a81c64748a20178a06738e4a164f6a84447
CVE-2023-33835,0,0,432bdcbfe47f544f7e44c279aa8783e94976046ffda41560fd11ed4500d9a992,2024-11-21T08:06:03.170000
CVE-2023-33836,0,0,8e6bae324546cbe4044fe7403966767062ff69440e841f8fdf3251d5b7aff7cf,2024-11-21T08:06:03.297000
CVE-2023-33837,0,0,3e72af0b5778583b8a5be70ca04b487c7ba841372620c26c1dd17212a1bc0b68,2024-11-21T08:06:03.417000
CVE-2023-33838,0,0,8add7de0dd859f608c535f12d4a3f26571c1c5dceb418af141c3d977ba8e3bc0,2025-01-29T02:15:26.640000
CVE-2023-33838,0,1,b8bbac79bea1a0bbf9b0f3d05e4d76e8fcb59f6fa1104442f613e229ab8cf466,2025-03-04T21:58:37.043000
CVE-2023-33839,0,0,55118ac57814892c7a86cc7191590c87f7473353289e127fe908a59566e253fb,2024-11-21T08:06:03.540000
CVE-2023-3384,0,0,43976c80ef1dd4016470fbdde9d42c2f2727e9da019d45b7389b90b07d63defc,2024-11-21T08:17:09.093000
CVE-2023-33840,0,0,24c35b3cfd8bae5bbdb3a25483622775cad57e6faaeebf192f416134d4238003,2024-11-21T08:06:03.657000
@ -228002,7 +228004,7 @@ CVE-2023-35011,0,0,595611a84f9ba8a89ca02487067584cc7500bae92cad139dfc4bf7e0af400
CVE-2023-35012,0,0,be4d3ebe65d22f0da5142f18515ee073275ab0ff192c73473ba47b80d829de5c,2024-11-21T08:07:49.463000
CVE-2023-35013,0,0,3c60a648d2b0bc01d2542f4e2a303e707c86c7b8e21e66a227569ec81a62646b,2024-11-21T08:07:49.620000
CVE-2023-35016,0,0,7d3b091b2dd76f99668f6df38b8be61e97d884e5c88c73d95ac35cad3586a7c5,2024-11-21T08:07:49.753000
CVE-2023-35017,0,0,c305b900f25af3be568ba6084a99f154f424196e4c77d6021676685e00da2135,2025-01-29T01:15:07.667000
CVE-2023-35017,0,1,d0ab0e61fdb3c9ec84c06431069e353d8a4d90610baa0b659c41e66e268d7d2a,2025-03-04T21:58:37.043000
CVE-2023-35018,0,0,0316c36a9fe4f0d9da4560d3103a2672e6aa994f14ca6f76a90253e57ae24d01,2024-11-21T08:07:49.880000
CVE-2023-35019,0,0,c4da68ced56941d8f8f54680af70cc154d4ac5d54e9158020c5a33b32fce9f82,2024-11-21T08:07:50.013000
CVE-2023-3502,0,0,79a130f0fcdd8a169bdb9aef276575323be3ab9e99f90f043f6135ec6e5d2b45,2024-11-21T08:17:24.263000
@ -229764,8 +229766,8 @@ CVE-2023-37407,0,0,4d11a36e41fa3acc5f564431e82d0f4e97124ab39df0cb5f293ada9821e2c
CVE-2023-3741,0,0,1ddd4fff44ed6da7a38f77e1cd87d0e1a51a839bcb171f62bcdf113f89dbd961,2024-11-21T08:17:57.493000
CVE-2023-37410,0,0,4259c5a1111c28363272e35fbab32b984c617cae11efedba0dfffe4bceca6df3,2024-11-21T08:11:39.267000
CVE-2023-37411,0,0,1663df42344987669b4b5f3ae2bb86174a111a736d50fa35c86aaf557197896b,2025-01-14T20:22:28.020000
CVE-2023-37412,0,0,7b8c0d9cd93118c36420dd8041f2e89d7ef5cb77a92421f8d6f1b10f5ba80d3e,2025-01-29T17:15:26.657000
CVE-2023-37413,0,0,9c84c5c5127b762322cad097019a1b26e0c795e205cc1ffb3ed7b1d30d3ce2e8,2025-01-29T17:15:26.800000
CVE-2023-37412,0,1,b75d27f7a63464dd1a1216b50732f3987589667e580083e9b8e1caa97582cdcc,2025-03-04T21:43:48.913000
CVE-2023-37413,0,1,e2af5cd1c6f2062e3c083c737025d14fcd4fee20317a281ed29dc1f5f39dc370,2025-03-04T21:43:48.913000
CVE-2023-37415,0,0,fbd26b9efa145d7333ca6605a4c1d9c7b340d5ef61e72854c29f2472607ffb19,2025-02-13T17:16:44.760000
CVE-2023-37416,0,0,6181a6944222013b0541f2f7c4616297cf8227fdaa1404a19c28e419e3a98a69,2024-11-21T08:11:39.767000
CVE-2023-37417,0,0,289ff2c2e0a474d67ae1359d72b3dbd2d6b12d7fe05b46c2cd25b415e5c0ebe1,2024-11-21T08:11:39.897000
@ -239485,7 +239487,7 @@ CVE-2023-50305,0,0,dabf8219efdb3dd68521f2a5ca58bceb1db63561a1224bc65ebbdd00bf414
CVE-2023-50306,0,0,232289e12c03f60066803c3276293eaf16ca3d82db14d055689f581ac2e8d3f5,2025-02-12T17:01:45.710000
CVE-2023-50307,0,0,54dcb069378ef7ce7cf1e378a429a1153c8dcdc770f8f93df646b7251911e08b,2024-11-21T08:36:49.880000
CVE-2023-50308,0,0,f0daddfcaa94c1b3e4528be72f010ad2604cb01fd116e7d24805892a037010cf,2024-11-21T08:36:50.020000
CVE-2023-50309,0,0,3710913107524245e5271ccebac144284551995d27b55911d0ad98d408e701f7,2025-01-23T03:15:08.573000
CVE-2023-50309,0,1,df1f5d6e8f6471be7fd38838dbaf45480066146485da40bf66433fbbc237d6fb,2025-03-04T21:36:47.970000
CVE-2023-5031,0,0,c15eb3bf24311ad5ba1ff97f455276e30339f2370acbcbb30160cc9662735c68,2024-11-21T08:40:55.833000
CVE-2023-50310,0,0,ee63583edc72c7bb2dd2fbd446b3bacc51b87b3209164901da3eca6b0c813dde,2024-11-05T16:40:57.533000
CVE-2023-50311,0,0,bfcc9d072f5a2d893dd33392360fe36f36ce6d9885fb951e98233624c4f9ba2b,2024-11-21T08:36:50.263000
@ -243013,7 +243015,7 @@ CVE-2023-6944,0,0,df2b7229c517209019fce35466d5ffbbde525fb676023ff8b16393577f2b89
CVE-2023-6945,0,0,eee61cdc8cecbbaa6c3be1b94704de1a8c4d868a06c2b4c07233fbc728fc898a,2024-11-21T08:44:53.660000
CVE-2023-6946,0,0,d11da4da13dc038beb075b5af1213743f8b40d251e7b7ea3b52df4c6657ce74d,2024-11-21T08:44:53.810000
CVE-2023-6947,0,0,681ae83ea96dd1197213cace9f29ac2d9a0cee2cf919317601ee722b94cb412c,2025-02-24T18:22:30.857000
CVE-2023-6948,0,0,fe5733c12b0ee41b32ac32792a9499fb1c2fbb29abf274a6083757f7f49e4eea,2024-11-21T08:44:53.957000
CVE-2023-6948,0,1,9cc65931cf8a0e00e25f08e7233eac963d62013a0e18fcf910075a0fbc9942d6,2025-03-04T22:15:36.313000
CVE-2023-6949,0,0,078850d39f1204331fbc98d392a0469ded8443843d8a5c473dc39bd1460bfcd6,2024-11-21T08:44:54.107000
CVE-2023-6950,0,0,abe9e2e0d7383949fcddc1e9a1bdb75c1a66b8207ce4e95629fab56a059c4d2f,2024-11-21T08:44:54.263000
CVE-2023-6951,0,0,5cf81bbb22b08bd5b560463dd9595ff1b504507f72343e9bcf9ea7dcc9ded4e0,2024-11-21T08:44:54.380000
@ -247603,7 +247605,7 @@ CVE-2024-13679,0,0,86229dc69131243d51d94ef8cb1d9ef15ccbc5bcaa679afb8c5258e078722
CVE-2024-1368,0,0,bdafec7323bf6060c2602bb232f81dd53afd410b7ab713f1778c3940b8b89a37,2025-02-11T19:44:46.867000
CVE-2024-13680,0,0,74b46f50e9e8190b451f914492933fe4a5d6196724bd1fb0611ec5e03b0be866,2025-02-05T17:37:37.827000
CVE-2024-13681,0,0,f9b5888e5600eddb54eab02d107b8219d0a2ff1dd821d3ec69a804f466f47fda,2025-02-21T14:22:38.737000
CVE-2024-13682,0,1,8aaf6dfc2318ffbd59ab18bd7982cb8a58fedb73e001992aa6ad754b2c953bb8,2025-03-04T20:34:08.907000
CVE-2024-13682,0,0,8aaf6dfc2318ffbd59ab18bd7982cb8a58fedb73e001992aa6ad754b2c953bb8,2025-03-04T20:34:08.907000
CVE-2024-13683,0,0,60466d727e6596c848a3b384eab039ecd16e7bfc142b0f259b6e51a93695759b,2025-02-05T17:18:36.090000
CVE-2024-13684,0,0,29bd0282adaed7c145caec3d49c703050082025937ad2fcfe46d4b20fa2f4a61,2025-02-21T15:57:57.993000
CVE-2024-13685,0,0,50ccc6b12c4c95fb069a8c449d3bc8810677414e2a7ace0a2bc79b90508fa4b7,2025-03-04T15:15:18.760000
@ -247643,7 +247645,7 @@ CVE-2024-13720,0,0,b870b55deaed62451c7cb49e48fdc621ee68a35c7c8a7750776cbfa21cdbd
CVE-2024-13721,0,0,7853af92862fbd0b23333c3c99089ce31ef5cb7b10d0753f382c5079c3e0f6ec,2025-01-25T06:15:27.860000
CVE-2024-13722,0,0,fac6574297fad520484336a8f32a80c91be5643d31918d246727bb21994df2e7,2025-02-06T15:15:12.867000
CVE-2024-13723,0,0,f977680e0d30dc0600d1d9cea9477509ddf62122fdeae5be3fea5ec8d4e5f870,2025-02-06T15:15:13.050000
CVE-2024-13724,0,1,2b3eede8759ae6c30590769eb9aab05e1a7b386a27c7e1b434fa46e7c9b63efe,2025-03-04T20:34:08.907000
CVE-2024-13724,0,0,2b3eede8759ae6c30590769eb9aab05e1a7b386a27c7e1b434fa46e7c9b63efe,2025-03-04T20:34:08.907000
CVE-2024-13725,0,0,3ae67647de598849d6499031064f2ab84aae12fe373705e9378e4edd2b924528,2025-02-21T15:56:24.220000
CVE-2024-13726,0,0,6f933b5330ba37986acbe4c29892bcb7173ac142380eeae5f3195ee1c4836999,2025-02-19T22:15:23.043000
CVE-2024-13728,0,0,fc3600c0f61ce7085e8da7204bc76ef6f37fa32ad9251533dccbbb08ac5789f5,2025-02-23T06:15:08.710000
@ -255633,7 +255635,7 @@ CVE-2024-29301,0,0,0b8fa97e724a0f2d24e37ca1a4df5c4ca78204e3fd2679571d5516d23f066
CVE-2024-29302,0,0,a396970a1bfb9e586dae33dbbabcbcf0c71d859b9e4ecbbb9f7753a6e28b7a9f,2024-11-21T09:07:55.880000
CVE-2024-29303,0,0,d06549f14e9cda2e75b85b1c6ae9ba33f16a0dcc3d18f7cf7ea9a575fe2c0e15,2024-11-21T09:07:56.093000
CVE-2024-29309,0,0,0082805f5fd607b4a8b696afc756ce0148248a6498a1ac3f5f6f79133d44ca30,2024-11-21T09:07:56.297000
CVE-2024-2931,0,0,06ccc2dcd781809116ebbd74f9b3f6ebb8a8544b117075c949793d8040784fc5,2024-11-21T09:10:52.123000
CVE-2024-2931,0,1,f5154698ded0d52412d5cb7de1344da17cba1944b851f5064ce758547d008c30,2025-03-04T22:15:36.563000
CVE-2024-29316,0,0,fcf08fc934238242be85211e527308a25a1845e213d3df0567dedd77f3e73990,2024-11-21T09:07:56.540000
CVE-2024-29318,0,0,6b7a8de3b5f73b6e00b5cb422aecae397836bdfb0435783acd4fb94fb5e7b3ca,2024-11-21T09:07:56.760000
CVE-2024-29319,0,0,69fb3b2cb652eb32dd1d717d0873133a6783ff4c6e6a16c234669dea86327af7,2024-11-21T09:07:56.937000
@ -264725,7 +264727,7 @@ CVE-2024-41143,0,0,8799e9b8f93d667e7053f384d3b50025554822f122dd37c394e433231808c
CVE-2024-41144,0,0,d705e4f77b5a2c06974e9e65f896eaf4fba04d31882cccffe75db10bb34113df,2024-09-04T17:25:48.123000
CVE-2024-41145,0,0,e583948039235f072af443025bc0ea6bb5630b5a84bc37fad1ee2b5dbca5d3b0,2024-12-18T23:15:07.970000
CVE-2024-41146,0,0,b94819261ed093bad14667a8628fb4c8e2f7195a09c74edaba0fc803a2fc4bd7,2024-12-12T02:15:22.880000
CVE-2024-41147,0,1,df440930f10dc8dcb645681a9cf98ce9032e5f5ab6a204ead504e28df31f6121,2025-03-04T19:15:37.117000
CVE-2024-41147,0,0,df440930f10dc8dcb645681a9cf98ce9032e5f5ab6a204ead504e28df31f6121,2025-03-04T19:15:37.117000
CVE-2024-41149,0,0,a971cf0aedf9cee5d8fa4c27e9a50e30f9e939e67806350993a8176bbcd4f77c,2025-02-11T16:15:40.073000
CVE-2024-4115,0,0,ffb5f36fbe2984a7256aff205f47c39ef178d82820690299ed15db732f03d6a7,2025-01-15T18:42:08.110000
CVE-2024-41150,0,0,b3fa487187a6e523624f7e09b49e1bcf30bc22e86ed50f81eb7ef85655bb3043,2024-08-27T14:35:09.013000
@ -267956,7 +267958,7 @@ CVE-2024-45421,0,0,b71c44d8233793d60baaa2910b35613747d6bdecc2b9f60906a3406edc38d
CVE-2024-45422,0,0,852733e0a4a28635312204f04762ccb7170e0a34bd9b9b76b76475e8b074cc76,2024-11-19T21:56:45.533000
CVE-2024-45424,0,0,73b37c04e0e6176b52b3857a0ea15264132a1aac6e0190535b955d4e369170f2,2025-02-25T20:15:35.570000
CVE-2024-45425,0,0,6df3a853980c91f9b85f63bed74a9f5f0999718133ed38c82f2ef7ebdcead281,2025-02-25T20:15:35.753000
CVE-2024-45426,0,1,608533929bad9a9fc0c50fabf9bdc8dc68202d6474456aa729268902afc736c5,2025-03-04T20:42:55.570000
CVE-2024-45426,0,0,608533929bad9a9fc0c50fabf9bdc8dc68202d6474456aa729268902afc736c5,2025-03-04T20:42:55.570000
CVE-2024-45429,0,0,b23bb94fab5b564541d550cee389f2e1055de24c768b6da2dee7d47222a5cd9a,2024-09-13T20:48:05.387000
CVE-2024-4543,0,0,9bce683dcafed21194de784f36310cf5dc5033963875cc73daa2b50b23cbbe10,2024-11-21T09:43:04.340000
CVE-2024-45435,0,0,37f0d591070e12a5a02e0dabd27d209725a2e9e84d47f1671760e29b19f30212,2024-09-03T17:23:36.073000
@ -271827,19 +271829,19 @@ CVE-2024-50671,0,0,99782c17088a8d91d172d01f5a082085329526fd6f7189288ae0f91a8aaa1
CVE-2024-50672,0,0,a506f4d2b4e62571040ff3dd4b935bbaea397a7aabe2668687c8152c3cc151d7,2024-11-27T17:15:12.563000
CVE-2024-50677,0,0,41d5addef3c1d4fcaf4d23ee7f34aa0575b53eb368f3af05bd4b5c5da2166101,2024-12-06T17:15:10.180000
CVE-2024-50684,0,0,5a61a50d007de96e358b48a746bcc4b0ab7bfc7b760a2f7b5136cfc32170c3a6,2025-02-26T21:15:17.267000
CVE-2024-50685,0,0,8bd1206fab701fc7387096fbdf4dca94fcec7a23cb892665fc6488169883273e,2025-02-26T21:15:17.373000
CVE-2024-50686,0,0,44ec82b78dbce016d58e0e2c71c1d132325498e47fe5eaa1803905854b57b557,2025-02-26T21:15:17.470000
CVE-2024-50687,0,0,960c0756bb9648a789e406e7a051b9355a5aba5dc4487964588cc54a78726986,2025-02-26T21:15:17.557000
CVE-2024-50688,0,0,ba987f5447a5e43fd6a73c884338ed64ae301837df386f86f17f3bc11ad07a20,2025-02-26T21:15:17.647000
CVE-2024-50689,0,0,38f280fdbdf7956ff2c033ca7cd9deef79d621c86980c4f51a8e75a28ab6be1a,2025-02-26T21:15:17.737000
CVE-2024-50685,0,1,59e9595e40a823d9905fea8d75a88e2fb2c63033537cbd78efe9d391fbfb163c,2025-03-04T22:15:36.813000
CVE-2024-50686,0,1,0171ebeb1b945891d00c815a65f69b73d47e2ab2940d7c6aed13c26fe5622bea,2025-03-04T22:15:37.017000
CVE-2024-50687,0,1,f99c76c74640587e351d9ae9128e2b3ddbc7b6f5fac68e17f56141a62e1ebe8f,2025-03-04T22:15:37.213000
CVE-2024-50688,0,1,ebb3cbac65642e4e45cf19c2e84a0958da1d8bca13b5eb44adfa4736383f63eb,2025-03-04T22:15:37.413000
CVE-2024-50689,0,1,f478ed3c5b5e41ef747ba618605ced4afbca0e040632bebe3ac8f0d1ebfe7040,2025-03-04T22:15:37.630000
CVE-2024-5069,0,0,cb203d2fbd25b3fb824d6eb3c18b6672404d2707479da947f8f686d32b78e229,2025-02-11T15:25:17.363000
CVE-2024-50690,0,0,ff35d9179c06042a7dad20271b2fa37f4aa6b5d7892a2883702507182dc897fc,2025-02-06T22:15:38.033000
CVE-2024-50691,0,0,ab130a0aeae9b4b84741a5675d2341974d91a8d1ea1d7aa7de0b4ef516e8051e,2025-02-26T21:15:17.823000
CVE-2024-50691,0,1,38cb1cb6ef39a0677c6fd4a6d88fb5e8c11ea09c8c2f8777d02eeefd15a98a20,2025-03-04T22:15:37.823000
CVE-2024-50692,0,0,b4b232b8fd20cfc83ca910c8b78001cb2d8096ac3932e97d2b610a65820b9588,2025-02-06T17:15:19.313000
CVE-2024-50693,0,0,fb95a2bd15b7d351e5d74d6d4b28ac193e88eda7b022e5625ea83f5917eac6af,2025-02-26T21:15:17.910000
CVE-2024-50693,0,1,972928eb76fd2b21326eab1c6fec2b24cbca464c838f8b320dfc2a560f318d7f,2025-03-04T22:15:38.023000
CVE-2024-50694,0,0,b192cf8569bb942756ad1070033fb5b23a0338a219f3f58bb390a97c9a59335f,2025-02-05T15:15:20.463000
CVE-2024-50695,0,0,9bf1b957244a59b772ead8b2f70e41a1650386c01d6d5befeea804e2a8547f40,2025-02-05T15:15:20.633000
CVE-2024-50696,0,0,e98a7a56ad10f593ecbe49afcaac03c72ff4a44be28a5f4f8ee006f9cf54e925,2025-02-26T21:15:17.997000
CVE-2024-50696,0,1,a98a623e23313d99d71e3bdfbcde8d19741ecc17b52798129d9a57cd69d5e194,2025-03-04T22:15:38.213000
CVE-2024-50697,0,0,e7f5e58656f67ebe9a367b387e0e9c827dd57c742ddc3361887e61032ad4a459,2025-01-27T16:15:31.423000
CVE-2024-50698,0,0,6d0bafa41ec7a5b3fc381b0a13e0e4535aa28369bc46836a66f0b19857db9b1a,2025-02-05T15:15:20.790000
CVE-2024-50699,0,0,b7bfb9ce8d871e66c8bc846d040c669e65be2a2e4a5ca2c2838499d7e02651cc,2024-12-11T16:15:12.720000
@ -271848,7 +271850,7 @@ CVE-2024-50702,0,0,364da4b19de28c5c7b507be40fbdae2c11e3df8d6828b6df401d4df157b3f
CVE-2024-50703,0,0,e1914095d1b7a0ffe223f333a29d6d8f0777fb87821c72e0f90605f07525e975,2024-12-30T16:15:11.713000
CVE-2024-50704,0,0,33de55037448a6030b29028b7c032e00bcd17665a8884aeb1bb01713ccfcdcbc,2025-03-04T17:15:12.323000
CVE-2024-50705,0,0,5fba789015dc4730dfd900eb12ed13b5d6925a0038226a440b770e2b421e3a62,2025-03-04T17:15:12.523000
CVE-2024-50706,0,0,bdf826c2f0e018abe61028151297292c44083149d42747ce0b23d50c7f191ee6,2025-03-04T15:15:19.290000
CVE-2024-50706,0,1,16ec6377302e1ac2758312752b9c9339ce67b853de406aa22e5e048065820580,2025-03-04T22:15:38.420000
CVE-2024-50707,0,0,b4c98511e68eadc38c0eaad86845af9d03870972465b2ad348462d5ec825f76d,2025-03-04T17:15:12.700000
CVE-2024-5071,0,0,6dfa056d4abe7e6b37a7311009a7ee0087dcbc392285cd9b9ee51e94d1bed9a4,2024-11-21T09:46:54.120000
CVE-2024-50713,0,0,0aa4de590634689fc06ab979763234a81b3e22004da47f2c72171e7a681edd71,2024-12-31T19:15:46.967000
@ -272870,8 +272872,8 @@ CVE-2024-52361,0,0,0f590da84310a3a70b1ce4708563ee9a1181dbd1f95752797a9808951be26
CVE-2024-52363,0,0,7dd69c3ad4a5bb3fc6e21b529185fceaea70503e2ac84d08e88882dbccbc4fa2,2025-01-17T02:15:25.060000
CVE-2024-52364,0,0,82606ab35773dfde3fb3002f292688c503168f9c71015cb6232e593a409c127a,2025-02-05T12:15:28.743000
CVE-2024-52365,0,0,67d0593b9ab22b3d0e70ebc54cc166e413b2572e8cebaba6bf7845898f27108c,2025-02-05T12:15:28.917000
CVE-2024-52366,0,1,8d4807b7da1551c2337cd8fbb0f4960a85f72dc7f8084a3578c5eac6aee2fa69,2025-03-04T19:30:24.047000
CVE-2024-52367,0,1,ae8b6491f41e72866c9422a738f1a3ffb4c0221b3ad0be9cfdf3bb19754340ce,2025-03-04T19:30:24.047000
CVE-2024-52366,0,0,8d4807b7da1551c2337cd8fbb0f4960a85f72dc7f8084a3578c5eac6aee2fa69,2025-03-04T19:30:24.047000
CVE-2024-52367,0,0,ae8b6491f41e72866c9422a738f1a3ffb4c0221b3ad0be9cfdf3bb19754340ce,2025-03-04T19:30:24.047000
CVE-2024-52369,0,0,e081cda06af085b69b5cce5744190264c91cd87aef2aa4d459e7fe8f2ad5e6bb,2024-11-15T13:58:08.913000
CVE-2024-5237,0,0,220865d5e6e44ad392451e3ec0d33ff0c63d7a2d2cdc2f08c10036b961cbca46,2025-02-27T13:30:57.937000
CVE-2024-52370,0,0,d2931a84b2cf7b14e018c99dc708ce275e6f773b3432c9c5f476dcff0fb41c95,2024-11-15T13:58:08.913000
@ -273260,9 +273262,9 @@ CVE-2024-52882,0,0,0e9b7e7fc9ff7df204d4c4669c35379bdd8bdf36506c56aa49c6db64563e7
CVE-2024-52883,0,0,52d7ad1ab3055f670faacd58028c9ee893ca0da51fa82feaca7a6e676a1b1814,2025-02-10T17:15:18.027000
CVE-2024-52884,0,0,3227498fd6659af285064d680f971c699a66d023f187f44698185a705cf44c56,2025-02-10T17:15:18.190000
CVE-2024-5289,0,0,45ad6e1c3a8134226122bea6b70bcd4aeb55721ddc7a695e24fb24c5dc173e1b,2024-11-21T09:47:21.990000
CVE-2024-52891,0,1,f2b2af1a35dbe934810199d02f0b646087a3d951b4f9f0b479c7a912999f5ba5,2025-03-04T19:30:24.047000
CVE-2024-52891,0,0,f2b2af1a35dbe934810199d02f0b646087a3d951b4f9f0b479c7a912999f5ba5,2025-03-04T19:30:24.047000
CVE-2024-52892,0,0,9eba69a4b423ab3b0faed8136763965b521ef23cc8c0984c63b5b975c522a8cc,2025-02-06T20:15:39.763000
CVE-2024-52893,0,1,49c7c77019f10ed75dd3db11195e80deb1ed15b96d8f33f23ac4e1472b7b811e,2025-03-04T19:30:24.047000
CVE-2024-52893,0,0,49c7c77019f10ed75dd3db11195e80deb1ed15b96d8f33f23ac4e1472b7b811e,2025-03-04T19:30:24.047000
CVE-2024-52895,0,0,776381c39f26d27f642d71ec1be88368d50de1a99de3a3998fc1acb8e968c6e5,2025-02-14T15:15:09.210000
CVE-2024-52896,0,0,4f05d5756387a4a38056c43617cd5bc7f4b71fd12d45391dd4bd8326aa374d5f,2025-01-10T15:15:15.633000
CVE-2024-52897,0,0,81ad80051d1322a8bfb61db68a23039003246d955567fed9fc0a8a2a809d5fdf,2025-01-10T15:15:15.777000
@ -273727,7 +273729,7 @@ CVE-2024-53563,0,0,f6ed2a0477f6a476013c53a3a4876f7b2e47b331802caf434b1ccfe2bfebf
CVE-2024-53564,0,0,9ab937f1953e956617795aaf18dddda75dd03cf95a1ae2a6d6ee23cedb4ba889,2025-01-09T17:15:15.423000
CVE-2024-53566,0,0,5169befd7db7ebb5725344c6b1622ae4de4cab71c37cd96a53ae5495bb145b4d,2025-02-06T02:15:10.167000
CVE-2024-5357,0,0,bf437ffa18c198ccaa3bc6e70504e8b6ba04e5dffa35498f1c778a6c476f4cda,2025-02-21T19:48:37.280000
CVE-2024-53573,0,0,ddbe4e88059e3e2f78f7bb3bd93b636a2c10c45a5afa9f86dc3386597b661130,2025-02-26T22:15:14.043000
CVE-2024-53573,0,1,c3e20d8447ccfff87f007a16c3e4b4b7293cce35a180bc230bee89e192db70cd,2025-03-04T21:15:11.833000
CVE-2024-5358,0,0,83e445e1bb1013b59cd13c6236f1ab370fff5556d9976328321efe50ae33b70a,2025-02-21T19:47:18.300000
CVE-2024-53580,0,0,017091ad6343956d021513aaff57df30e0f57917f14c0dad11fd7549b9689d6e,2024-12-31T20:16:06.953000
CVE-2024-53582,0,0,cce1965e7b4052e02c06570940ab4f482ad0e70a57583dab150a15faf0f215a2,2025-02-18T19:15:18.237000
@ -273986,7 +273988,7 @@ CVE-2024-53915,0,0,4605c52b83221ae0e3cdd10a9aad63d660542ba26783410343eed38f4ba2e
CVE-2024-53916,0,0,b4be14b34e457d9e45c1c40d47ab72826003c5ec84913feddaf103f9ff837586,2025-01-06T18:15:21.627000
CVE-2024-53919,0,0,276cab16a69dd8abd191858092e087c05871f9a8d5d2b89d95f580d07d640fa6,2024-12-10T16:15:23.817000
CVE-2024-5392,0,0,3bd578a4b87004c861758caab532f09486d9bd47476ed81e956985706fb24772,2025-02-10T16:24:01.917000
CVE-2024-53920,0,0,f9be964c217505ee655444d7c7fd49f71901e1036830d416bc8e1164e583d036,2025-03-01T06:15:34.350000
CVE-2024-53920,0,1,317c16d0f3d17bbbfb72792dce5e0d1c10a56e02f54b956ecfe8399855e800ac,2025-03-04T22:15:38.610000
CVE-2024-53921,0,0,80ba8805361036f43b4514262b685ccd25900644ea805da6dca5ed5b14f2db17,2024-12-03T20:15:16.153000
CVE-2024-53923,0,0,555f40f110f5cc9cc3044cd555d315fd962ceb2a9297b9a92037b2bcd868c9b6,2025-01-24T19:15:12.777000
CVE-2024-5393,0,0,113ce1b27b2fdacd4ecfb463e30a2b29428b5308f45f45e127c5f710983003a2,2025-02-10T16:23:40.037000
@ -274833,7 +274835,7 @@ CVE-2024-55556,0,0,36ef2f008ce211b77e0b5750d7d4b803fcde3fc58fe847ba118d22617dc7c
CVE-2024-55557,0,0,1c44f970be9c9162e2fd5fa3f9e1778bc69c31c3d5707dcbd0caa2e430754ba4,2024-12-17T16:15:25.900000
CVE-2024-5556,0,0,f573f07f74091c9ef49ab63e55c790d8f661c071a22a95c82ecfdf6c6886287c,2024-08-27T14:36:53.273000
CVE-2024-55560,0,0,34631484c4ac18e7385d5b08b3c8f4829d4f28112bef5e467e27e8892a961b13,2024-12-09T16:15:22.750000
CVE-2024-55563,0,0,18204ee9bcd7a443817ede90b4af782476bfed51d18ddfae7057258f3016b43a,2024-12-09T01:15:06.313000
CVE-2024-55563,0,1,2b9003e8272d684081f7653be3aa0dc76a00fa35a71d84bdac507f3193e1df6a,2025-03-04T22:15:38.777000
CVE-2024-55564,0,0,0ed737f325f7d691c0861d9b182294d3bfcbaeec43b5fc3c9c74a4f890349c8b,2024-12-09T16:15:22.907000
CVE-2024-55565,0,0,41a9edd709fcc5c920649312806312f16fb139e829113bdded78cdd6366005ad,2024-12-12T19:15:13.670000
CVE-2024-55566,0,0,498f1e4e837f8ad9758e1df3de86aaaf6f7c709a5bad66d4383c3066d4682f26,2024-12-17T21:15:08.777000
@ -274845,7 +274847,7 @@ CVE-2024-55578,0,0,5c3fcc77d09324042ddbdfd728ad5e7386e7d5896fd6497db19ee19fc8c81
CVE-2024-55579,0,0,eb7b97c3360bce570eb740843f88f428eb8ed07ac934bdc24aaa75a35aac660f,2024-12-10T15:15:08.163000
CVE-2024-5558,0,0,27c470fd7893b831fc84cdde276205428cb613b4f465921ca99eb64316442434,2024-11-21T09:47:55.700000
CVE-2024-55580,0,0,d0db8db8caa9064b5ccfd1ebfcb70a56a05a77720b165abb2a708efdd1b5b12c,2024-12-10T15:15:08.300000
CVE-2024-55581,0,1,f7ccdb67ff7739fea17993b33fa4724556778bda84016d6b56841f0a4bde8e1e,2025-03-04T20:15:36.677000
CVE-2024-55581,0,0,f7ccdb67ff7739fea17993b33fa4724556778bda84016d6b56841f0a4bde8e1e,2025-03-04T20:15:36.677000
CVE-2024-55582,0,0,8c7e64bb3acec7a473c6e65040db0fdec814405cb32a2dc0c98b336fe36f3523,2024-12-11T17:15:21.103000
CVE-2024-55586,0,0,925f554fe1c6418481a3cd536be7ee8d09491d59c7f2a3844aeb8009a61c81a3,2024-12-12T02:08:22.247000
CVE-2024-55587,0,0,043360c021c66dd2c5a5e7aa976c02dd7134a3fcd9d370dcc05a2b2b78d778ba,2024-12-12T17:15:11.197000
@ -275222,7 +275224,7 @@ CVE-2024-56281,0,0,9c3b69f0b2ecf520353b529a17ca8ad701ab8ccc15815f99ab295cf335f2f
CVE-2024-56282,0,0,04e98b81565a63c3e74733082f2cc2f0ed2a15a497ac9549579e47435edda923,2025-01-07T11:15:10.177000
CVE-2024-56283,0,0,79c5f86507c9307f4fac74ade5445eeb172dfbdd1b5e4dbc1039aad6b3560ebc,2025-01-07T11:15:10.357000
CVE-2024-56284,0,0,4ad097c30327cf6a2ce2177a9faeb87676a0ecdd2e832e7ad533b282007e7b30,2025-01-07T11:15:10.537000
CVE-2024-56285,0,1,213f45370c7048d8f209a6acb42c1ddacd426bf074da8ac228f5cfc17cbcd372,2025-03-04T19:30:24.047000
CVE-2024-56285,0,0,213f45370c7048d8f209a6acb42c1ddacd426bf074da8ac228f5cfc17cbcd372,2025-03-04T19:30:24.047000
CVE-2024-56286,0,0,3d01d551bef5feb8be0f9be642aae2e234cddde808c71a0a3e0451071855abff,2025-01-07T11:15:10.883000
CVE-2024-56287,0,0,cc75ffcc84b4adae7c76dcb39d27a677e443f14ce8e73dc6845fc0bfc2f5ccc2,2025-01-07T11:15:11.060000
CVE-2024-56288,0,0,dcd521313c9aef718b4b18425644739ec165cf5b19320f13dca71eb67c6c4766,2025-02-25T22:50:07.927000
@ -275687,11 +275689,11 @@ CVE-2024-56883,0,0,f99cbbbe44810ecf20ee9a822aaeeb39d677436c7acf1f70c821dc9769f4f
CVE-2024-56889,0,0,4693f62751a5a06c0b0a9e5d42dd6535c82427b71471993dfffea8ef941252b1,2025-02-18T19:15:19.770000
CVE-2024-5689,0,0,7954cfa7cab5c9d284e75ff2916a8e3e6c71cab8207a342db66b72c3a9729209,2024-11-21T09:48:10.193000
CVE-2024-56897,0,0,c86a728646b989ba2c34050e6cf558894a483f9e45fac8ad92b270dc1bfac754,2025-03-03T20:15:43.540000
CVE-2024-56898,0,0,1dc9e1e69ffde40039f3a045587255d291a578f1b2bd4fc573e6b1f0aa92e0bf,2025-03-03T22:15:36.810000
CVE-2024-56898,0,1,6acb612a6a6d6abd3f207db73f49bdae4c033cc146d6a92b4e551f8b5a4c516d,2025-03-04T22:15:38.990000
CVE-2024-5690,0,0,d4d62df1fcd0a6ab34cd7e4b18e0510e69dc46e6ad88d84635741631f871b265,2024-11-21T09:48:10.377000
CVE-2024-56901,0,0,0b1282e90dd49deb61c3e27fcb27940be2b6dc7e484ece844aee0fff3ae360d9,2025-03-03T22:15:36.967000
CVE-2024-56902,0,0,3d48040cfcc0f825f27fd8087ce8988537f3393239912705fac909e5d5b2e3e5,2025-03-03T22:15:37.063000
CVE-2024-56903,0,0,c0f6909007c90dd33f84b400ce83c37ba8db2d0d8c4c18cd39c31a1c80624d5e,2025-03-03T22:15:37.173000
CVE-2024-56901,0,1,64eb0224a857e749243b1bd7bc2761e2c8263ae6819e4c9704a3b8650c9b496e,2025-03-04T22:15:39.143000
CVE-2024-56902,0,1,3ef5942ce98190c5aa70f63a17781c2e2ea98e203a6427a08886aad5d3b44a9f,2025-03-04T22:15:39.340000
CVE-2024-56903,0,1,b897be5c821ce23ff62ebbc786466003154e6577f97fa83d87efcf2c721a7888,2025-03-04T22:15:39.547000
CVE-2024-56908,0,0,f64d990eb4134bd422c919a00cf8c479aef7a2437cb86021ed293eaffacfc981,2025-02-13T23:15:10.773000
CVE-2024-5691,0,0,0824a888e7eb71279259f37f9283a4aa7c8605aa9b71698472cf4ea15ee83b3c,2024-11-21T09:48:10.503000
CVE-2024-56914,0,0,76cdd8d94ae11c2780ca41310bed1eae7879520cc428bb077f1f775e8c7b9036,2025-01-23T17:15:16.230000
@ -275895,7 +275897,7 @@ CVE-2024-57408,0,0,175db0428293ce57c99d60d486d8cbd43e580b93d14f299c67a8f76d88381
CVE-2024-57409,0,0,0b05f5863a283decb12d24250619815c0ec7b2696059e21578dc2420bbab0e60,2025-02-11T00:15:28.863000
CVE-2024-5741,0,0,055094e9aabecf080e8eb2a3d882a04f3fba90f18ee04ead7d8cff271ac3f02a,2024-11-21T09:48:15.963000
CVE-2024-5742,0,0,3d67a98aab4ea452eccb3180d74817d102c8dc01405b893ad9d75b571593ba72,2024-11-21T09:48:16.117000
CVE-2024-57423,0,0,5ed9c80d6cc25b9ae2067bdaab5be046563125cef4266fb7d4fe6b8de12210b9,2025-02-26T21:15:18.093000
CVE-2024-57423,0,1,a7b051d61ca19ed8d2d5c4de9fbb62c050c109b6ada2a11e3e6bd12976298986,2025-03-04T21:15:12.020000
CVE-2024-57426,0,0,ba87cb306cce9c7c1734003f734ff798cd387a60923d8c8325abd2c359c44417,2025-02-11T22:15:29.347000
CVE-2024-57427,0,0,ebce508e94de8a5b34edd05d80160e23d0760d35cafac1cba9fd80ea5c5ca427,2025-02-06T17:15:20.357000
CVE-2024-57428,0,0,e0169033f613e35f231693e2a1697e2420f5895d248e9f0db6358d748665ae3b,2025-02-06T22:15:39.223000
@ -278303,6 +278305,7 @@ CVE-2024-7993,0,0,07965c83eccb4d0c1d02c4c0f63f174d1471ffa40acc41fbcf0de6e84ca8ce
CVE-2024-7994,0,0,677bb0d3a07210a7d5902c83c522b3beb4ddf65c53dfa15f4ee3e8a6eb5c8b23,2024-10-21T18:35:55.397000
CVE-2024-7995,0,0,a8b278e923ed83ab90058edd8bf9d51cbec9eb8e7e1669b64ad19e97359b7962,2024-11-06T18:17:17.287000
CVE-2024-7998,0,0,5a96b2d058d8fa22c17d15139fb41166f629052179fc1be6b8add20fbdc8bcac,2024-12-03T19:15:13.330000
CVE-2024-8000,1,1,20d17ea2c760ae936afb73caf17f54bd136cfbcd975e64763d63d4fbfcc0cb6f,2025-03-04T21:15:12.220000
CVE-2024-8001,0,0,7aeba4a4d15e98a48f9b2362095933d475040fffec8531b1bbd417b6eade812e,2025-01-08T07:15:27.463000
CVE-2024-8002,0,0,0cb7909b5f1f4d7c5244de591889203d2577aae5ba268c7618f858bb8db772fa,2025-01-08T07:15:27.773000
CVE-2024-8003,0,0,badc57814940a87be012bad00d6c0167779253eead22504dd18a460d7e0be4df,2024-08-21T15:51:28.397000
@ -278866,7 +278869,7 @@ CVE-2024-8671,0,0,a99020099b190237ec4ed79dd02fe23a02e4fa3467857b7d700af772ffd6ad
CVE-2024-8672,0,0,a15444b342cb51704c6035355a8239e8b1581fa22931a6c667330f1628aeb3b2,2024-11-28T10:15:08.870000
CVE-2024-8674,0,0,346b5859dd79895a03165d24e9b602a990cf40990eacbe9188550aceade5c799,2025-02-11T02:15:36.413000
CVE-2024-8675,0,0,d4603b0787f1359762182dfd0b6464a7217287d096015439ee3a45da5ea12b68,2024-10-04T13:51:25.567000
CVE-2024-8676,0,1,2a95943b3136648d4b179cad6ee44c250ecd1d864fada3c3a1fdaaed8a8663ae,2025-03-04T19:15:37.457000
CVE-2024-8676,0,0,2a95943b3136648d4b179cad6ee44c250ecd1d864fada3c3a1fdaaed8a8663ae,2025-03-04T19:15:37.457000
CVE-2024-8677,0,0,60f0fdd7af95bdac2c0e1884d42dbe76c9ab4cea5844c97ea5bb9aa452948afc,2025-02-11T02:15:36.463000
CVE-2024-8678,0,0,c9f19131bded613da0c19c1444b8e8a8b9cc51fc5c1cf15447ee67809c6ea12c,2024-10-02T19:06:48.983000
CVE-2024-8679,0,0,2b814e408085282aa43a44f419617020b8c9c8c614fcd1f864e869f9853d89cd,2024-12-07T02:15:19.457000
@ -279258,6 +279261,7 @@ CVE-2024-9131,0,0,50107691d6f8995fe8a6b7113df12747d01b199eb120271aa41cc0db383461
CVE-2024-9132,0,0,4c377ed325e14fd1af892554c7d35507ad3abf8234e1ac3ab54429e427bcc737,2025-01-10T22:15:26.783000
CVE-2024-9133,0,0,fcbfbc2bd4127e72a9aa3ddc848c573d78bc72fa9ddd322a5be2ae12167a11d5,2025-01-10T22:15:26.907000
CVE-2024-9134,0,0,25a903436b6d7d769fb834ac188d1e6735193281626409ff9b8726ccf7896b79,2025-01-10T22:15:27.033000
CVE-2024-9135,1,1,25c0ddda2344b7699adc016b7a6ae907ad30123b99641511f7c6dabb4ad1cdec,2025-03-04T21:15:12.360000
CVE-2024-9136,0,0,440b3409a14907c29d57b03ac063b5d398f0722a11dac00ea875af9fd1c6005e,2024-10-01T14:28:31.027000
CVE-2024-9137,0,0,f01ddd62d94a1f3860b505f4ee6768f2cc665b82d44b256f042250b9599b8b79,2025-01-17T08:15:24.690000
CVE-2024-9138,0,0,94a5768e7e73f1fbef0aa543085c8f51b1c4781f2d47badd1a3c54651a536d60,2025-01-03T09:15:06.370000
@ -279660,7 +279664,7 @@ CVE-2024-9613,0,0,f7f019a18c9e01f36efde66dfbb10d6eba11ff87ade2b8efd8a79811ebe631
CVE-2024-9614,0,0,89d6ad4791713c9131b15fd858d4bd9404ef7090c81b08570775178f0867f84e,2024-11-13T17:01:16.850000
CVE-2024-9615,0,0,c9468917c9754e631849fcee424e37c3bdfdc0ce7baf1874e3cbc9e2bb677dcd,2024-11-18T17:11:17.393000
CVE-2024-9616,0,0,6ef77d38c3e8284229b9cc30b59e98636261a63c660e6b9ccf97deb77695f71d,2024-10-15T12:58:51.050000
CVE-2024-9618,0,1,3229a4a9edba9afa8437c03cb7fbe098a5fb834064e988929d93898486da8753,2025-03-04T20:34:08.907000
CVE-2024-9618,0,0,3229a4a9edba9afa8437c03cb7fbe098a5fb834064e988929d93898486da8753,2025-03-04T20:34:08.907000
CVE-2024-9619,0,0,a7bf5db408a5ec4a6f2bb2b3418fdbfda580c42a8671077d531fc4eac03bc58f,2024-12-20T07:15:12.977000
CVE-2024-9620,0,0,5f4d387a05e8c7d787dc78c4da6b8994737bf87f4aa2585e1708a37b135ad3b4,2024-10-10T12:56:30.817000
CVE-2024-9621,0,0,d01febf4917d7e254a80be80939f9dbe78ca0c8507d48f25eb8390335c29a3af,2024-12-06T10:15:06.327000
@ -280140,7 +280144,7 @@ CVE-2025-0335,0,0,d5fa0c487675ca616e7ff135ad8a970ffdd4ae08b32ac07ee07443b3a83ed6
CVE-2025-0336,0,0,795ad1de1d64b863b23a9ee9f1f8e965a4f5ae1458793c278520d16970dab18d,2025-01-09T07:15:27.860000
CVE-2025-0339,0,0,56d80730bd4432f993e46d3759d1fe5c37d850c2923afcadbbf473db701d571e,2025-03-03T16:25:24.627000
CVE-2025-0340,0,0,d2643790c5408b8656f83d48122b2edd0443b492b102add5cec114f36ec3d251,2025-02-27T02:05:55.703000
CVE-2025-0341,0,1,b0cebaf9b276af573888ac34520a7b93ce4fdf91461ce7b89f083d81a4f7efff,2025-03-04T19:30:24.047000
CVE-2025-0341,0,0,b0cebaf9b276af573888ac34520a7b93ce4fdf91461ce7b89f083d81a4f7efff,2025-03-04T19:30:24.047000
CVE-2025-0342,0,0,3dbfe8ec26cd89c8d358aa4179b87636b3a72d2e0b33768a4263c0b8cd9e88dc,2025-01-09T08:15:30.310000
CVE-2025-0343,0,0,2f07750fbab5848d7fd769193ff51e5044832fbe65109094687a56b43364aa58,2025-02-18T22:15:16.350000
CVE-2025-0344,0,0,fa9cdc375de2a99e7299b1ccdc9be76ceb7ad16da8244b21c453c84a18a28efa,2025-01-09T08:15:30.517000
@ -280203,7 +280207,7 @@ CVE-2025-0428,0,0,53ca33b8751cace74b1767e06da6e1ef57d9382b6c96eab72106c311721ef6
CVE-2025-0429,0,0,78859fcdeaa45b49773faf4a287c5acdb235628b0cbfb95e3aa51c974c22a44b,2025-01-24T20:51:18.657000
CVE-2025-0430,0,0,4e18cb7de447c14e34b06241818bd17d9db4853e01a4fdf6d152f010ee011658,2025-01-17T18:15:30.920000
CVE-2025-0432,0,0,be1a96ec1a155389d359c137e77a07190805d57ba524277b7183ba768a401b9a,2025-01-28T16:15:40.183000
CVE-2025-0433,0,1,b1fd9922f5ddbc31e769695d80dcb91e7be80c9c026715a84649cc27bf0f22aa,2025-03-04T20:34:08.907000
CVE-2025-0433,0,0,b1fd9922f5ddbc31e769695d80dcb91e7be80c9c026715a84649cc27bf0f22aa,2025-03-04T20:34:08.907000
CVE-2025-0434,0,0,80805d1fc694dbf391f864cbd97ec8a7e48ef050c445c249811ef890ae257b48,2025-02-18T22:15:16.447000
CVE-2025-0435,0,0,604058ef793e33435759746d46c23b90cc51452de4822b6472440608e3ab5958,2025-02-18T22:15:16.540000
CVE-2025-0436,0,0,72789f2cd8147d5a86876c7b0b79e40e25dcd2c9396b81691e6fd199d1206765,2025-02-18T22:15:16.627000
@ -280610,7 +280614,7 @@ CVE-2025-1075,0,0,797c9475355694050b39edcabe9ae24db6febfe58de9ae04f1e1ad1e92e5ba
CVE-2025-1076,0,0,0fb5ade089952c20fae90954aaa2f08206a3bcb696af25bbf4ec969a8662af5f,2025-02-06T14:15:30.287000
CVE-2025-1077,0,0,88be144d908f74868edd4d84609ed66b73f57b9c8388994c4810420e7c62d244,2025-02-07T09:15:08.380000
CVE-2025-1078,0,0,27fb4b341e8da1a1de98d2672d440ce3475e4637ab1dc7078358dba9618f5194,2025-02-06T17:15:21.040000
CVE-2025-1080,1,1,ade976fc0557fdb6c1cb869623868c205f052811cd96335b0e4c11a47ef03c1e,2025-03-04T20:15:36.867000
CVE-2025-1080,0,0,ade976fc0557fdb6c1cb869623868c205f052811cd96335b0e4c11a47ef03c1e,2025-03-04T20:15:36.867000
CVE-2025-1081,0,0,2ed1c232468718cca0ffefebc7a9616f01188f5ebdfff7d66afc4bbe1846689f,2025-02-06T21:15:23.120000
CVE-2025-1082,0,0,fce3a76bcdd4192df493e2cdecb45710022efa3172953cd17ae4bb75681720fa,2025-02-06T23:15:08.140000
CVE-2025-1083,0,0,24575cc196a809327eac507956b0cfbef268c827f0bdead2d6d6395339f4414c,2025-02-06T23:15:08.350000
@ -280731,15 +280735,15 @@ CVE-2025-1244,0,0,7e59a5cfd949661bef29f7dcf50cf62d10c20d0e220dba94bf5fd512d2e887
CVE-2025-1247,0,0,413d4bcd6e00b55487b15f2b541fa31d8a6169438afa6345f0107f85b8ddc727,2025-03-03T14:15:34.120000
CVE-2025-1249,0,0,f9cf8228939f75e3961b7ce63e2e103ee292f920596572fc4d2ff4b8583fc869,2025-02-26T15:15:24.470000
CVE-2025-1258,0,0,e60d49e74992453b0cd2d8b93f0bc7a60901e2447adb1d6d0cde7627e3bb44f5,2025-02-20T18:15:26.217000
CVE-2025-1259,1,1,975ae5ff97cd191d701987d3d89a49ef9f149b61d794323b6064e28c5ee88adc,2025-03-04T20:15:37.003000
CVE-2025-1260,1,1,33abe94e0faf572da8b0a7cf9ff4b66ed5eb9cd32ed8fc580ecfd4b9b555e933,2025-03-04T20:15:37.133000
CVE-2025-1259,0,0,975ae5ff97cd191d701987d3d89a49ef9f149b61d794323b6064e28c5ee88adc,2025-03-04T20:15:37.003000
CVE-2025-1260,0,0,33abe94e0faf572da8b0a7cf9ff4b66ed5eb9cd32ed8fc580ecfd4b9b555e933,2025-03-04T20:15:37.133000
CVE-2025-1262,0,0,b2387eb6dd825b4bc22b3213ef83d0e48b91556ac3dffc3cb635c9915a53a643,2025-02-28T01:30:32.830000
CVE-2025-1265,0,0,bc018ef071fadf7e153cbb8aa96a03eb4bac560d27730ea77e8eae7baedae9e8,2025-02-20T20:15:46.537000
CVE-2025-1269,0,0,3d8990f3f321bb84afc5ce31cc37206b4dfeae7b9639d4320eceb6f39d26cfbc,2025-02-18T14:15:28.513000
CVE-2025-1270,0,0,a0fba4bca59afda304bf8335640266a3acf6a1624640bee675db51d94e9fc436,2025-02-13T13:15:09.273000
CVE-2025-1271,0,0,0359319eae8a142a0720b34e58c3d3808902c47ddd06a524c0e8a18f2f2f366a,2025-02-13T13:15:09.433000
CVE-2025-1282,0,0,135e0d0f84484b53270653b79f9e366f1c0baa627fbaf4af3fe538f7cdb33c50,2025-02-27T09:15:10.160000
CVE-2025-1283,0,0,df55d03ddd7425597bd6e50218384d5f9d05b634ac49322453c2c29091aeb539,2025-02-13T22:15:11.413000
CVE-2025-1283,0,1,4175667403ef8488e39c5e8c2dd94a274e533a8ac41a5d588031878a218b6b1e,2025-03-04T20:59:05.417000
CVE-2025-1291,0,0,bb482c13e6ea46eaa51479ea468a757d12dfa1292b1f2ec778322441cd52e4d5,2025-03-01T09:15:09.710000
CVE-2025-1293,0,0,60a11b51b89461cf0f7c120de5ab3c93294ee5f6a5e19d6ba8d0bb06e8828d44,2025-02-20T01:15:09.950000
CVE-2025-1295,0,0,24bdaaeb758634ffe52b87573cb2760c08e1a07ac9682ba1ed20b65d22033cf6,2025-02-27T06:15:21.990000
@ -281036,27 +281040,32 @@ CVE-2025-1934,0,0,44f25a8902a9b9b95e941d6ccaa26cb7fa6741d2058c14d791dddd487b53c6
CVE-2025-1935,0,0,b1f141814e3f1476674dd592029a8f4ffa3fe6d2fab8a0b0166b44a0a11fb5c0,2025-03-04T16:15:38.110000
CVE-2025-1936,0,0,08ee55072dc1440649036276dd782693ec14b6ecbdcc6904219467a7b9af1bb6,2025-03-04T14:15:38.500000
CVE-2025-1937,0,0,fe96f19485f137b7de4930d8a1c319b5b597161e14b41dc56749602d697c21c3,2025-03-04T14:15:38.610000
CVE-2025-1938,0,1,c04d49fe6542d4bcfc1b767d90b0f1370a91b37a3110914f070bfcfde24f27ab,2025-03-04T20:15:37.257000
CVE-2025-1938,0,0,c04d49fe6542d4bcfc1b767d90b0f1370a91b37a3110914f070bfcfde24f27ab,2025-03-04T20:15:37.257000
CVE-2025-1939,0,0,5423b6d57bde27103afefd0147e6a27b92b6f89c451bc13e8b0c4b336560932e,2025-03-04T14:15:38.837000
CVE-2025-1940,0,0,2da52b7ef01c0ebae181d033a25f813d405367fc27b9ab2f5ece7671de559246,2025-03-04T16:15:38.310000
CVE-2025-1941,0,0,c755e145fc658d9d2d1958c16a11cb393d3d6769dff8808a148cf5adfb9a5e27,2025-03-04T16:15:38.457000
CVE-2025-1942,0,0,e7e8ffb9220287cc58971bc54a60d82cac4054a1402ceec16ddaf1f2c60d0668,2025-03-04T16:15:38.607000
CVE-2025-1943,0,0,021009f6feffea675fe424b37381aa7740ab1b8c35c7e162f1f5acfa4c41d210,2025-03-04T15:15:24.493000
CVE-2025-1946,1,1,b26757e80aca8a4f5ec7f4ff9aaba5088b8b42ad89c42ebb5651e188ffb3ed38,2025-03-04T19:15:37.583000
CVE-2025-1947,1,1,9d8514f993785be2f20f4da03dfcd4529cbec458d034f07a472d77128df9bea8,2025-03-04T19:15:37.760000
CVE-2025-1949,1,1,593191d98ebb76e2b2ee9726e4b95d01280d2edb66962598c34919bd2cddb8f0,2025-03-04T20:15:37.410000
CVE-2025-1952,1,1,11517103cff7deac11d9e49c32ff578cab86f2816dcafea50edd1d34472f438a,2025-03-04T20:15:37.533000
CVE-2025-1953,1,1,45ef3a02db093c2bb45f9969c271af59913dbcadda1cc5988f4fc79ee77774f7,2025-03-04T20:15:37.657000
CVE-2025-1969,1,1,06a782c53158bfcfa719a54832f6c914b6b8cf10ad0fb557e3dedb429cf5a384,2025-03-04T19:15:38.290000
CVE-2025-1946,0,0,b26757e80aca8a4f5ec7f4ff9aaba5088b8b42ad89c42ebb5651e188ffb3ed38,2025-03-04T19:15:37.583000
CVE-2025-1947,0,0,9d8514f993785be2f20f4da03dfcd4529cbec458d034f07a472d77128df9bea8,2025-03-04T19:15:37.760000
CVE-2025-1949,0,0,593191d98ebb76e2b2ee9726e4b95d01280d2edb66962598c34919bd2cddb8f0,2025-03-04T20:15:37.410000
CVE-2025-1952,0,0,11517103cff7deac11d9e49c32ff578cab86f2816dcafea50edd1d34472f438a,2025-03-04T20:15:37.533000
CVE-2025-1953,0,0,45ef3a02db093c2bb45f9969c271af59913dbcadda1cc5988f4fc79ee77774f7,2025-03-04T20:15:37.657000
CVE-2025-1954,1,1,3f34d4e968cd36d80c9294c76386f7fccfdd6b744481da9a458dbc8dc7f57722,2025-03-04T21:15:12.750000
CVE-2025-1955,1,1,37a5842ab02dcbdf807bbf6b0629cfaa7bc44f4f542caddab49f2045e2592b24,2025-03-04T21:15:12.940000
CVE-2025-1956,1,1,aabfb638f3cdf7e7d2199087c7d972926788b7e97818ee83eac85710d242b360,2025-03-04T22:15:39.867000
CVE-2025-1957,1,1,7f6f3b45364dccaebd986ed12f67b5d7457c4295eb866cfa685a6fc446d6afb2,2025-03-04T22:15:40.040000
CVE-2025-1958,1,1,619bed4d75a15053f3aac5475d86341822d0cd5f222710eba99a248d83ce8b5d,2025-03-04T22:15:40.210000
CVE-2025-1969,0,0,06a782c53158bfcfa719a54832f6c914b6b8cf10ad0fb557e3dedb429cf5a384,2025-03-04T19:15:38.290000
CVE-2025-20011,0,0,5d2fdc5455e5c161d4353b8b7d096a2e122865a9c5759753d2f12b06ccf9a6a1,2025-03-04T04:15:12.563000
CVE-2025-20014,0,0,f4fd1db051e4652a5d7e7863a21c37faec75062d4b5ce0e4f2c6bffc2f3ee854,2025-01-29T20:15:35.207000
CVE-2025-20016,0,0,6fccb84eb01c2cd66b422e82777f9738bfe5004121e1b551d0ae454724543c0e,2025-01-14T10:15:07.500000
CVE-2025-20021,0,1,66bbc144baff2127af309ad8a7a835483b6f43145cdf2cad0f2af891111788f6,2025-03-04T19:08:18.957000
CVE-2025-20024,0,1,3569f88c16f615c3878055fd05c1e1469b606d33e585945aff8e7ba95671e8ea,2025-03-04T19:08:18.957000
CVE-2025-20021,0,0,66bbc144baff2127af309ad8a7a835483b6f43145cdf2cad0f2af891111788f6,2025-03-04T19:08:18.957000
CVE-2025-20024,0,0,3569f88c16f615c3878055fd05c1e1469b606d33e585945aff8e7ba95671e8ea,2025-03-04T19:08:18.957000
CVE-2025-20029,0,0,d9e3ca63dc18f9436b5043ebae0bcb543cc6452f75921963fed59e1df065c2d7,2025-02-05T18:15:29.573000
CVE-2025-20033,0,0,6c60c85e451f1d6db70378d678ddf83dacc7c823ecfb493748ed6d94114eff49,2025-01-09T07:15:28.450000
CVE-2025-20036,0,0,a1d7639f0e568c5953a2962f5a2be630b5737d729f8c4f565a3eec7e4bf19549,2025-01-15T17:15:18.950000
CVE-2025-20042,0,1,c3c58b2b5b175f4587092daf43b30878507483fb024449b4009843d0f9203a27,2025-03-04T19:08:18.957000
CVE-2025-20042,0,0,c3c58b2b5b175f4587092daf43b30878507483fb024449b4009843d0f9203a27,2025-03-04T19:08:18.957000
CVE-2025-20045,0,0,415d73f9fa018669b6b7896f4e36fdab92f13949bd42dccb63d15f65c73eedf3,2025-02-05T18:15:29.760000
CVE-2025-20049,0,0,3911b8c375043e4ad147832fc3846511b3247cf229746da0a50bbc3da242183c,2025-02-28T17:15:16.277000
CVE-2025-20051,0,0,f5960a6a14861956075cfae09439ba801517edcedfe4aa263146ae0b9ad313be,2025-02-24T08:15:10.087000
@ -281067,7 +281076,7 @@ CVE-2025-20060,0,0,693c96187fad6559d71e047a6bc8c0d698d09cdfad790284793c6000b73c5
CVE-2025-20061,0,0,6979d6e76b2847064c2a9b7a24215846556b4a731cf1290fe0f120404af6a611,2025-01-29T20:15:35.363000
CVE-2025-20072,0,0,b9e9cb3d894db8c29d56585c14d2cf06ce7800f36f472c346f2184b6fcf02e0f,2025-01-16T18:15:28.517000
CVE-2025-20075,0,0,d1a101f734614c5c8c3625d1b34c0ffc62ba95c1554396b4b462975c1a68bfc3,2025-02-18T00:15:21.107000
CVE-2025-20081,0,1,5ed57b6d9702389a4c481cb0e2de09aaa2b16ad08213a3133d046dfff5a5061a,2025-03-04T19:08:18.957000
CVE-2025-20081,0,0,5ed57b6d9702389a4c481cb0e2de09aaa2b16ad08213a3133d046dfff5a5061a,2025-03-04T19:08:18.957000
CVE-2025-20086,0,0,c718ee138c5d706935ee7319c465eb1db60c32a8ee92f074be268892106cc0d1,2025-01-15T17:15:19.107000
CVE-2025-20088,0,0,d069a0a8d0e55448ae448cb2d1bba620f97cc6785542779fdc1ef2f2206cb89e,2025-01-15T17:15:19.243000
CVE-2025-20091,0,0,b9d1dce1ed45549e77916a09d472eab7dad5c2ee97791200be71edbb8dfee1dd,2025-03-04T04:15:13.253000
@ -281827,7 +281836,7 @@ CVE-2025-22312,0,0,a7bf6287b60e0e496be523a78cca84a7ead7f5ce4262b249df941bdb26960
CVE-2025-22313,0,0,5a053d272a7f80827a28d46605edf286de3cc07b2584d481167046830126dd01,2025-01-09T16:16:25.653000
CVE-2025-22314,0,0,b9054b96be0754de8c0a6cb596862922b24d4794887f456f87dfd0bb880d2088,2025-01-13T14:15:10.270000
CVE-2025-22315,0,0,a72855198b7b6c3f24eb2b601132daa754b13da0204b23fceae9c014a71d07ff,2025-01-07T11:15:15.627000
CVE-2025-22316,0,1,c96c2f380fef8ac01d1b39b335201332211f73a13ef8acae3136b78a07347c5d,2025-03-04T19:30:24.047000
CVE-2025-22316,0,0,c96c2f380fef8ac01d1b39b335201332211f73a13ef8acae3136b78a07347c5d,2025-03-04T19:30:24.047000
CVE-2025-22317,0,0,8c2b42f24e2f8faacd2e0bb645d3a6edfbe8586f973836795d4b0c5487694c1f,2025-01-15T16:15:34.590000
CVE-2025-22318,0,0,5368a1418cfba2423af73277ae3342fb96667eca67d105e8830cafc6ce9b8c3c,2025-01-21T14:15:10.110000
CVE-2025-22319,0,0,e55624a930eb59e1a8b1dc4193cc8bdb767b79f4292003f9b671325f24154163,2025-01-07T17:15:32.810000
@ -282179,7 +282188,7 @@ CVE-2025-22888,0,0,83c67ff923e9645ec5fafd719e12957b03331dea9b9bd08e509c66897fdc5
CVE-2025-22890,0,0,8dd6ffe45f0151dcb8b41a48dac74b1e668a5294c2f1614982860358b9b03cd6,2025-02-06T07:15:17.113000
CVE-2025-22891,0,0,5058a67448259ac9abdaa428b056ef85a9f11123cf1683cf0699d5426be467a6,2025-02-05T18:15:31.190000
CVE-2025-22894,0,0,099d82dc8568fb50b5dde7926f3fbb32a13311bb5c7a970a54e9828e99c29a1c,2025-02-06T08:15:30.027000
CVE-2025-22896,0,0,9d75a19ade9d91162e9a0c4a13a263140173b5a69917e95ab6dc8bbc94c9913f,2025-02-13T22:15:11.737000
CVE-2025-22896,0,1,291a4adaa89bdcc150dac503f60db0675c03727130ace5fe68815e30173b8003,2025-03-04T20:59:05.417000
CVE-2025-22897,0,0,a295222b6163a7e71540804650907cffe2d3c82432401321f3950139acc1d17a,2025-03-04T17:12:06.513000
CVE-2025-22904,0,0,11fbec6328b596ed08ed392234d8935217007830badddad8b05907ab798c39a5,2025-02-18T21:15:26.993000
CVE-2025-22905,0,0,bda5091cb8423b637c26775857bce84858d2915411a8d309230a6bd8a5902766,2025-02-18T21:15:27.153000
@ -282289,10 +282298,10 @@ CVE-2025-23112,0,0,5295af5f2d972260409bf6e8ddb1e42cd398e210c99c068cbfdfd18c1a2f6
CVE-2025-23113,0,0,e6cccd37793f33004af385d66a450da8db2860bda0bd7d1ee76256a1a29e87d5,2025-02-25T16:11:55.610000
CVE-2025-23114,0,0,76dcd1ec6e101307de60d1efade8dc8b1885e30638a84718a1a37bbecd49b630,2025-02-05T02:15:28.610000
CVE-2025-23115,0,0,d809baa250bb6271b2b24f5db83bcfb12be4dc10edc0be309139d3eeaccfa95c,2025-03-01T03:15:23.263000
CVE-2025-23116,0,1,94ebcac7b22f04cee3fd23949dbd697e53008f7dfa4b4c59e2a346fa1407180d,2025-03-04T20:15:37.840000
CVE-2025-23116,0,0,94ebcac7b22f04cee3fd23949dbd697e53008f7dfa4b4c59e2a346fa1407180d,2025-03-04T20:15:37.840000
CVE-2025-23117,0,0,5732a4937afa35b8f8d30224de97ffd5815c8e798bd9572f33ca15c433571cdc,2025-03-01T03:15:23.473000
CVE-2025-23118,0,1,1b6935e1de98bd988462eba8eda54cef63b56f3eba9236fce4c76fcc1a2a8638,2025-03-04T20:15:37.960000
CVE-2025-23119,0,1,03b50e07e15abdb790cc32062bbf922a7a5b86dedcc5d4ac846195c74e91324e,2025-03-04T20:15:38.060000
CVE-2025-23118,0,0,1b6935e1de98bd988462eba8eda54cef63b56f3eba9236fce4c76fcc1a2a8638,2025-03-04T20:15:37.960000
CVE-2025-23119,0,0,03b50e07e15abdb790cc32062bbf922a7a5b86dedcc5d4ac846195c74e91324e,2025-03-04T20:15:38.060000
CVE-2025-23124,0,0,4a6299a78e71ef66b973ec2da68c573755c2e809b823d245784536d2b11ad68d,2025-01-11T15:15:08.930000
CVE-2025-23125,0,0,2e6f0fce9ee8e787d649705f4cf1025930f6b72d6ac2efc70c4c1837b8d7d15b,2025-01-11T15:15:09.023000
CVE-2025-23126,0,0,aec9ca15332b86ad22382c8419cfef8190ae4b723f5c3088974b31a1f5dd4089,2025-01-11T15:15:09.100000
@ -282350,7 +282359,7 @@ CVE-2025-23403,0,0,644047de2ce1ffb265b5a42cecfc2f854cd0e7552ab44d86c93242e1e0442
CVE-2025-23405,0,0,1d766bc4849324d5a2aa10241aa29cfa3fa9dddb8599893bc0ba377c47067ae6,2025-02-28T17:15:16.637000
CVE-2025-23406,0,0,38d5c87f4e786637cbc4fcb4a2f7006ad80927b3c7219b037e30cf1414c39e8c,2025-02-14T05:15:12.567000
CVE-2025-23409,0,0,06262ad791ce570937296bcb697070013ba33b5198b3c057b85c061f90b04a2b,2025-03-04T17:12:06.513000
CVE-2025-23411,0,0,2149399d3d8cce275d78a69bd832e8585ca8be81bc1e889fab80ae4194b4819b,2025-02-13T22:15:11.913000
CVE-2025-23411,0,1,873449632c5f07c04f0012ee0ce445b82ec9d7b013c9b4a2a560f053a421fd92,2025-03-04T20:59:05.417000
CVE-2025-23412,0,0,879dc1f233cd1ed0927b887a0c257bb01d6c254311c7a39c5817d5ae0b0fbc54,2025-02-05T18:15:31.580000
CVE-2025-23413,0,0,5d8a681b56b331debf19dc9f08d08646859aabde28ec61411300a927339c1e48,2025-02-05T18:15:31.930000
CVE-2025-23414,0,0,2c9de769450c672cb0ed8621be68efc7fb4031b86902dc24212f40994c2669ef,2025-03-04T17:12:06.513000
@ -283316,8 +283325,8 @@ CVE-2025-24846,0,0,3ff917c4c6b459e301d644b006b5a125f5ca87087b0f384a12c5d025e312d
CVE-2025-24849,0,0,0ee9898c778a9b7afdcc6b402323e98a9996b5fba0ecbd5a154a7193bceeb36e,2025-02-28T17:15:17.253000
CVE-2025-24858,0,0,80a2e3e27ced5551413d1f52e03f6696ce40853726c2f8318cd2bd73891576ca,2025-01-26T07:15:09.237000
CVE-2025-24860,0,0,f6b6c9635e86cbebd470da0b1fb7a3385879aa273aed1cf32bf09076c689158e,2025-02-15T01:15:11.327000
CVE-2025-24861,0,1,fc737346eef529f7ce1820f1979d09e2fa4fa5e49ae311378cd6313a62a3da9a,2025-03-04T19:24:05.917000
CVE-2025-24865,0,0,603eed1e7746bd38a679a73087511eb0fd535ced8399709a5c81fcbfef7ad498,2025-02-13T22:15:12.613000
CVE-2025-24861,0,0,fc737346eef529f7ce1820f1979d09e2fa4fa5e49ae311378cd6313a62a3da9a,2025-03-04T19:24:05.917000
CVE-2025-24865,0,1,d86122dd19f261653c8b86d31d64d9d418f9889d6a6559684ce29911d0a2e3dc,2025-03-04T20:59:05.417000
CVE-2025-24867,0,0,32b5b4cae9faa98375e2ec8191ee6bbac47790e6975c81218e81b4b72829e2de,2025-02-11T01:15:10.847000
CVE-2025-24868,0,0,3126f003c867405c437c9a5d233b2132fdf5dda635736a251e9443dc3f9770bc,2025-02-11T01:15:10.990000
CVE-2025-24869,0,0,7487e9b2ea994aa31a7eba56e36180a5b91aaa886297577734820094a1ac00ef,2025-02-18T18:15:33.810000
@ -283381,7 +283390,7 @@ CVE-2025-25063,0,0,fe8d3efef171b62a11b34e6bca9a7ce9094019d5a41cf3cdaf3675f4485df
CVE-2025-25064,0,0,258595a704e6a3f019f4641e0546921384b59e10bf4a735ca6bcc89e948d4941,2025-02-18T19:15:28.380000
CVE-2025-25065,0,0,45484afbd03efe60cdfc0e8025f2d7de171ad9fb0eea11f3663a654375185778,2025-02-18T19:15:28.497000
CVE-2025-25066,0,0,bfac3442efe119c58d1253bccaa4b523ef1872eec5be8616734787a2e6e2eb4f,2025-02-03T06:15:11.373000
CVE-2025-25067,0,0,610ce24421f83ef05e153edca72928571f3ca60dd422f89edc58c3887f9223e9,2025-02-13T22:15:12.780000
CVE-2025-25067,0,1,2f09f51b35dbaf6463f10a0672cf6819d42c674ab7d8e36c8f2d4bf8365c44b6,2025-03-04T20:59:05.417000
CVE-2025-25069,0,0,3ac7d43aa5f66d76ca4f47d340594454f3b8efd5492158fbebd7f38cfb3d56c4,2025-02-13T22:15:12.930000
CVE-2025-25070,0,0,5327ab05edcb8e3afa82526bab4bc859623c1daaa376383bc1e52985f02ea43d,2025-03-03T14:15:49.490000
CVE-2025-25071,0,0,1629f669e71655c3fde13bbe5cdd27b1092b6fb208e43d4e7d5ad171118f64db,2025-02-07T10:15:11.840000
@ -283556,6 +283565,7 @@ CVE-2025-25379,0,0,10c6b59b7ced1a65c44b725df73613b964204bd8bcc126008f75da9f2d8ec
CVE-2025-25387,0,0,8227bd6f57bafc5fc7f8bddfd6ec6a78dcca117ca404c22469842eba5d4e306c,2025-02-14T17:15:20.393000
CVE-2025-25388,0,0,e086cda7e4e5c05ccba48ad30906fb7e59dedc66fc1b83e5645bd434397a431f,2025-02-13T20:15:49.730000
CVE-2025-25389,0,0,c4fa8037812de3d612838c95ec3fcc9b936e3b28bc2aa3e854f709efa62e78c8,2025-02-14T17:15:20.663000
CVE-2025-25426,1,1,18dfd985014e3d06f15f0887716144593e2f2c245308a61865a8a721b8c6a75e,2025-03-04T22:15:40.633000
CVE-2025-25428,0,0,a4039c579030febd59545c017c3c1beb99a5f4778526e73f910acc016f0edd9b,2025-03-04T16:15:39.597000
CVE-2025-25429,0,0,cececf6fd4380f28dd3128e781fd11132f0c103fc594cfd9dd17f0a87d409fc9,2025-02-28T23:15:10.903000
CVE-2025-25430,0,0,9163efbf1f16deef9388edc5dfce8619e56506503048f018e2813a808e54d729,2025-03-04T16:15:39.763000
@ -283635,7 +283645,7 @@ CVE-2025-25768,0,0,c0ea06537ea4dff0558f2426b2095c6f0d5d7ca5691b12d94a7b7cd0158fe
CVE-2025-25769,0,0,c04f243adfab6d0c228896823c1de48d6c8d1554d46e87c10f438472ea98cdce,2025-02-24T18:15:19.487000
CVE-2025-25770,0,0,083dca9bf78425b081932176ffd5590f62d2e6b52d7243e21c6da305bd5b4229,2025-02-24T18:15:20.280000
CVE-2025-25772,0,0,049a4d8ccd7e92d8a6c37014ca81c63552e30fbd0e2bdc0e271ff3963136769b,2025-02-21T22:15:12.813000
CVE-2025-25783,0,0,e927df359f393d1988c3409b87466786ce421f8238f7c9491a003b20edd55f28,2025-02-26T15:15:26.440000
CVE-2025-25783,0,1,7667c9a81f530a99609c56eb13bc325e3e204504dcfbc3fb6341518f78f741e8,2025-03-04T22:15:40.787000
CVE-2025-25784,0,0,7692b0b021ef9cff1ec4a869e2fe61c0999898fb7ec7360d59c814b17f82d8d2,2025-02-26T15:15:26.580000
CVE-2025-25785,0,0,bc17dc315f508712d84a76b1e8f23f7f21539e82980e5f82975871a87c4e8aae,2025-02-26T15:15:26.720000
CVE-2025-25789,0,0,dbcde910a2e6bfc7406d8baa980984134d87dc975529ef3dc53c087268dc1585,2025-02-26T15:15:26.853000
@ -283701,13 +283711,14 @@ CVE-2025-26014,0,0,0e63db03b12de770f19f2e4a205d81f3b9f22e3b31412c31dff023e0922ec
CVE-2025-26047,0,0,6eee5ba5b9f24b6c856893b12cf4174655504b377088e34ddf907f7cbda1f89f,2025-02-28T16:15:40.020000
CVE-2025-26058,0,0,d6830ee74802882f622367eb3e014df2c057afc37826d4d9d4aaa490f6e8cee5,2025-02-19T21:15:15.920000
CVE-2025-26091,0,0,de888ac48b9f6b5458a595acd54af619dbe9af0acc8f88bc90bf02904e83c7b4,2025-03-04T17:15:18.243000
CVE-2025-26136,1,1,dd279c367bb6ad30414b81a4791646503e65d9c901ff7cc33e01460deeb04bcc,2025-03-04T21:15:13.770000
CVE-2025-26156,0,0,3c070f48ae01803cf4deab6e20453c0715f07513428e1a7ccf93241deeb274fe,2025-02-14T19:15:15.033000
CVE-2025-26157,0,0,59b5a4f935b691a0cfae6c8ea0b4bbb0d47e4814d1aa791e95c7dd113790e9fc,2025-02-14T20:15:37.543000
CVE-2025-26158,0,0,b94398759aa4427b7dc090483f4f088a5c44388e38d183da6dc19ae9b872cf91,2025-02-14T20:15:37.677000
CVE-2025-26182,0,0,6a92295a726305134e0425c70d4139d9e04662ca5b2a45afb0e0f0461299a57f,2025-03-04T17:15:18.363000
CVE-2025-26200,0,0,07971a3db98f9cfae341b32901f42b0af32b82b7b85e8efc840488c86eda257e,2025-02-24T17:15:14.273000
CVE-2025-26201,0,0,19cc0d8c975fa49352fb9ad1f8db6737d71edae986faba1d37ba48d4a441cec4,2025-02-24T18:15:21.047000
CVE-2025-26202,1,1,e7579c410a7fcc5c61f85e01ce1308fe848cd4bebfecad6f981dd4f5f089526b,2025-03-04T19:15:38.640000
CVE-2025-26202,0,0,e7579c410a7fcc5c61f85e01ce1308fe848cd4bebfecad6f981dd4f5f089526b,2025-03-04T19:15:38.640000
CVE-2025-26206,0,0,bc67999dabe96502b241246d2665faf1f09178bdb9b72e5e7dd5401b748e2b93,2025-03-04T17:15:18.487000
CVE-2025-26263,0,0,662238db512d7984d6510c607e6bc28336ca603217f5c07913705819afe210e7,2025-02-28T16:15:40.127000
CVE-2025-26264,0,0,3e1d4d30fa9513d426ec3a7ec9d2895da1266ed6b8213b35e226a5d2b686e5dc,2025-02-28T22:15:39.780000
@ -283719,6 +283730,8 @@ CVE-2025-26308,0,0,69e4926ab121453dd269ecd5c4a1e680c76cfe3a7adc73ca0152c52aac5d4
CVE-2025-26309,0,0,7ae8d8b0652f85e6f8fa255fc222f026973cab38848f066168ff295eb6f4ee31,2025-02-21T18:16:13.790000
CVE-2025-26310,0,0,55b236dbeb9a20179e9b06fa335fdfa1062067456641081301fd898e499e9d2b,2025-02-21T18:16:17.950000
CVE-2025-26311,0,0,8f41ce6db700f92fea4726f2c9198369bec586ae5a386ba2dec789165ea39c8e,2025-02-20T21:15:25.907000
CVE-2025-26318,1,1,e7267312f00e1f71c48d7e9cfc74d2787ac98dd399b64def9f7227f17d52eedb,2025-03-04T21:15:13.897000
CVE-2025-26319,1,1,dac6da880aa641c080aacc3777799e36f634dc8b1034dbc989be52ef1fb3523c,2025-03-04T22:15:40.993000
CVE-2025-26320,0,0,5fefe4585825870b6e42a706d5c6a8703dfe4775e609ed2f31b171f050d5485d,2025-03-04T16:15:40.240000
CVE-2025-26325,0,0,4eaa7da6a5e4d1e182731f1781ee5d725571c0a3ec63342fdfe0db1d2f4660fc,2025-02-28T22:15:39.927000
CVE-2025-26326,0,0,f84875e9cdda7cdf32b7a706b3dc63076bc4fd2668c6fb2df857dabcd399807f,2025-02-28T15:15:13.743000
@ -283767,14 +283780,14 @@ CVE-2025-26409,0,0,998a9bcbefad73980e88cfadca0416aeed1df460a44260fe4402eb5cd5541
CVE-2025-26410,0,0,36441b10bb87afc4c434a271b8839836d6ce7232b364d1eaf56804b3d996ac68,2025-02-18T18:15:36.357000
CVE-2025-26411,0,0,fcde46ab874d21012fc4027217c83b95868b33b38456359d4b0f7ea8269a0842,2025-02-18T18:15:36.473000
CVE-2025-26465,0,0,f25765ed256eff314f13089336ba54158694f343e4e7f929cae34b191b596bff,2025-03-03T18:15:40.247000
CVE-2025-26466,0,1,743ad0e070bc5e7ef47cd7c04af1797ee7202bad9060b7c570566a89d39e9ff6,2025-03-04T20:15:38.167000
CVE-2025-26466,0,0,743ad0e070bc5e7ef47cd7c04af1797ee7202bad9060b7c570566a89d39e9ff6,2025-03-04T20:15:38.167000
CVE-2025-26473,0,0,0de7ad16e6d8c7db9e1838d2da6a9c6cb3a186f455c098963c4286ddeef3bd3d,2025-02-13T22:15:13.417000
CVE-2025-26490,0,0,b8bc76b2be7d18c514587d66cef4d0bee94c01d7b29c32dae10138139a41dc50,2025-02-14T20:15:37.847000
CVE-2025-26491,0,0,7c0d222179eba4a77c32c46173122e282947b63a6de5118491e2b730e6dd9271,2025-02-14T20:15:37.930000
CVE-2025-26492,0,0,10f610a7afe531efeeb1575e93a64c84a3a6f9453498a7cd0479c1add3e10654,2025-02-11T14:15:31.260000
CVE-2025-26493,0,0,f799a8cc0e301789ed68586a5557695a6ad2df626328779fd09deada6e66bea3,2025-02-11T14:15:31.473000
CVE-2025-26494,0,0,9fa7dddcdaa3cd38f994e8d5f44807b1011184fd2f20f9f1171b97bd05f68ad5,2025-02-19T22:15:24.083000
CVE-2025-26495,0,0,9bd7f91393f57ac4b7e327a438c72992a19380bc8797fca3ba6b30269fbbf330,2025-02-11T18:15:47.237000
CVE-2025-26495,0,1,983e2fd32f57fd04049b2b771442705c11716769548e3c408ea9243e53d33e3b,2025-03-04T21:15:14.020000
CVE-2025-26506,0,0,fbc7fbe48e89907d7f54c9d44bbfddf8def7e8f962f2da16afa56ece7168f990,2025-02-14T17:15:22.747000
CVE-2025-26507,0,0,95b908cc64a72128294640690e70f9b52cb7f86d46bb5d8b6708727a9b7abcf3,2025-02-14T17:15:22.863000
CVE-2025-26508,0,0,d39bd75c34a7083f955ea70add860587db1f6572db6bc11a7a1abfe21efc97ea,2025-02-14T17:15:22.983000
@ -283998,7 +284011,7 @@ CVE-2025-27142,0,0,50c09bf35dff2e7c08051751460862f1793d1e64e755656069216a4226cde
CVE-2025-27143,0,0,b2f4a315d358bac155e0e21cd73590b43aafc4b46c5907cec4f1957f851895fd,2025-02-28T16:07:41.847000
CVE-2025-27144,0,0,7b7ab9cc6cc8170173ae9d52939463b9ea29a5775bc47236dbba73f17e364355,2025-02-24T23:15:11.427000
CVE-2025-27145,0,0,7e8b752c87a1dd34aba04c7cf87b9d5cdd943f6b8e8f712300f3772423d75c2c,2025-02-25T14:15:31.567000
CVE-2025-27146,0,1,b30cf4143c492463fc9e081a667f3688558a525e5b4a712bc44768344363998d,2025-03-04T20:42:55.570000
CVE-2025-27146,0,0,b30cf4143c492463fc9e081a667f3688558a525e5b4a712bc44768344363998d,2025-03-04T20:42:55.570000
CVE-2025-27148,0,0,0963513cfe4fd138a7cc371ff6c5e28b249af6b11e474f931c82fde41391bc40,2025-02-25T21:15:18.073000
CVE-2025-27150,0,0,16645d4491d4ecf056172f9473b123dac485ad0730153c2f479b2d27b8827f53,2025-03-04T17:15:18.663000
CVE-2025-27154,0,0,179e806bf6fd7e259a7a47a7d31c5b4ce46022e5303dc73a51a2119984531a3e,2025-02-27T15:15:41.937000
@ -284078,8 +284091,8 @@ CVE-2025-27400,0,0,cdbf04b984faf2bb61d60f663ecdfdd44190b0515d3b8d47c87701b41ec06
CVE-2025-27401,0,0,22ed82e05b27dccaeb90eea83d4f38739be0a524ed60e6011b6797fb1c5104a8,2025-03-04T17:15:19.547000
CVE-2025-27402,0,0,19a0d72c136a10b841041721ff7160479f8f3faf7c693bab048416133a6a67a3,2025-03-04T17:15:19.703000
CVE-2025-27408,0,0,1a23c30b7689ae8b8ad6930173abdf59d3279571e27ef7dee42c61d8dd013e6b,2025-02-28T18:15:28.983000
CVE-2025-27410,0,0,542213b5e82bd30fa9408540bb6d09bd94cf07a4e4b5ab21e3b6313192903c64,2025-02-28T21:15:27.677000
CVE-2025-27413,0,0,3c683ca647c635eed6050d34ef335b08e4f82a229181584d65143149a8f8e1dd,2025-02-28T21:15:27.820000
CVE-2025-27410,0,1,622f5e65362d03d0ed561fcc081614d728b6f23a5af908c6c614a85e8709a2df,2025-03-04T21:15:14.197000
CVE-2025-27413,0,1,66f5e580a6d62dac3e1a8081e71a88e4497308b17c07d32439f0a0f6705b5196,2025-03-04T21:15:14.303000
CVE-2025-27414,0,0,dade89b00ff438afc3d75db3405cd2399cd0f72f2b40e361d9e8e1ad3c96ce6b,2025-02-28T21:15:27.957000
CVE-2025-27416,0,0,bfd9605f18fa0d0b58583b28f8d49afc65f3c8a40e0ddae1ef370584ff7e71a4,2025-03-01T01:15:28.857000
CVE-2025-27417,0,0,cdcf8fc02cc79b9a0b20b04560621cd31c16ef1455c76722ca7ab3938e8044e5,2025-03-04T17:15:19.857000
@ -284097,9 +284110,10 @@ CVE-2025-27499,0,0,4965d1f33bd39650c875a4f519cbf29847dad09c69afddd5d8f9f75ded369
CVE-2025-27500,0,0,be50dbcb64bc9b0e171440007ce7d77f7cd94b8b10aa18d6f6266491eec37f80,2025-03-03T19:15:36.157000
CVE-2025-27501,0,0,585f2e0737e182b22f02653235a04e243ed477e6e20bf1f8010304d8d76990c5,2025-03-03T19:15:36.300000
CVE-2025-27507,0,0,ac222d7a76e525c1f46cf22a467332d1ebeead1ea6a6b94fad24e3b75b3e24ea,2025-03-04T17:15:20.360000
CVE-2025-27510,1,1,19950d83b5cbb49ed1aa4b1fda9e8249865d9f8162ff1ffdeb4e6b89c8f42b9b,2025-03-04T22:15:41.147000
CVE-2025-27521,0,0,06038b1cc125ef52d54e2a9ad4394e47e044a334b4438ae976f884783cb609c4,2025-03-04T08:15:36.203000
CVE-2025-27554,0,0,47bde4f4167aaccaa05d2d034a78839ca444a85000927aab5c407b820ef1320c,2025-03-01T06:15:34.693000
CVE-2025-27579,0,1,e37901d639203dabeb0abb1f8d25952e3d9090042ecc93a0b94bf072c75c186f,2025-03-04T19:15:38.800000
CVE-2025-27579,0,0,e37901d639203dabeb0abb1f8d25952e3d9090042ecc93a0b94bf072c75c186f,2025-03-04T19:15:38.800000
CVE-2025-27583,0,0,18dfdb5a0ae261632796dbd76e99b9a1ffc071aa6c00449a4d28af735e378f81,2025-03-03T01:15:12.030000
CVE-2025-27584,0,0,7c36caae7b88889d70bacae0c47b7b1525e549e4aea51dfda3fa9c2476496e88,2025-03-04T17:15:20.527000
CVE-2025-27585,0,0,e4743bb908476490b966e1bc83c4b96f68ead94a4d392d96480e7b58a960cb94,2025-03-04T17:15:20.690000

Can't render this file because it is too large.