mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-21 17:41:05 +00:00
Auto-Update: 2025-03-04T23:00:20.031352+00:00
This commit is contained in:
parent
b31291e1a7
commit
60e65d1cb1
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2019-20171",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2019-12-31T00:15:13.307",
|
||||
"lastModified": "2024-11-21T04:38:09.203",
|
||||
"lastModified": "2025-03-04T22:15:34.720",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in GPAC version 0.8.0 and 0.9.0-development-20191109. There are memory leaks in metx_New in isomedia/box_code_base.c and abst_Read in isomedia/box_code_adobe.c."
|
||||
"value": "An issue was discovered in GPAC version 0.5.2 and 0.9.0-development-20191109. There are memory leaks in metx_New in isomedia/box_code_base.c and abst_Read in isomedia/box_code_adobe.c."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -114,6 +114,10 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/gpac/gpac/blob/v0.5.2/src/isomedia/box_code_adobe.c",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/gpac/gpac/issues/1337",
|
||||
"source": "cve@mitre.org",
|
||||
|
21
CVE-2020/CVE-2020-234xx/CVE-2020-23438.json
Normal file
21
CVE-2020/CVE-2020-234xx/CVE-2020-23438.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2020-23438",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-03-04T21:15:10.907",
|
||||
"lastModified": "2025-03-04T21:15:10.907",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Wondershare filmora 9.2.11 is affected by Trojan Dll hijacking leading to privilege escalation."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://cvewalkthrough.com/cve-2020-23438-wondershare-filmora-9-2-11-trojan-dll-hijacking-leading-to-privilege-escalation/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2021-33353",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-03-08T22:15:09.593",
|
||||
"lastModified": "2024-11-21T06:08:44.643",
|
||||
"lastModified": "2025-03-04T22:15:34.960",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-22"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-22"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2021-33639",
|
||||
"sourceIdentifier": "securities@openeuler.org",
|
||||
"published": "2023-03-08T23:15:10.713",
|
||||
"lastModified": "2024-11-21T06:09:15.307",
|
||||
"lastModified": "2025-03-04T21:15:11.043",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
|
21
CVE-2021/CVE-2021-417xx/CVE-2021-41719.json
Normal file
21
CVE-2021/CVE-2021-417xx/CVE-2021-41719.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2021-41719",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-03-04T21:15:11.237",
|
||||
"lastModified": "2025-03-04T21:15:11.237",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Maharashtra State Electricity Distribution Company Limited Mahavitran IOS Application 16.1 application till version 16.1 communicates using the GET method to process requests that contain sensitive information such as user account name and password, which can expose that information through the browser's history, referrers, web logs, and other sources."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://cvewalkthrough.com/cve-2021-41719-mseb-ios-application-sensitive-information-exposure/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2021-46875",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-03-12T05:15:11.190",
|
||||
"lastModified": "2024-11-21T06:34:49.867",
|
||||
"lastModified": "2025-03-04T22:15:35.267",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-48365",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-03-12T05:15:11.917",
|
||||
"lastModified": "2024-11-21T07:33:15.613",
|
||||
"lastModified": "2025-03-04T21:15:11.377",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.2,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-269"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-269"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-22892",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-03-08T21:15:10.820",
|
||||
"lastModified": "2024-11-21T07:45:35.793",
|
||||
"lastModified": "2025-03-04T21:15:11.610",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-668"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-668"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-23328",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-03-10T22:15:10.377",
|
||||
"lastModified": "2024-11-21T07:46:00.090",
|
||||
"lastModified": "2025-03-04T22:15:35.720",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-434"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-434"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2023-30630",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-04-13T16:15:07.930",
|
||||
"lastModified": "2025-02-07T17:15:28.740",
|
||||
"lastModified": "2025-03-04T22:15:36.017",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Dmidecode before 3.5 allows -dump-bin to overwrite a local file. This has security relevance because, for example, execution of Dmidecode via Sudo is plausible."
|
||||
"value": "Dmidecode before 3.5 allows -dump-bin to overwrite a local file. This has security relevance because, for example, execution of Dmidecode via Sudo is plausible. NOTE: Some third parties have indicated the fix in 3.5 does not adequately address the vulnerability. The argument is that the proposed patch prevents dmidecode from writing to an existing file. However, there are multiple attack vectors that would not require overwriting an existing file that would provide the same level of unauthorized privilege escalation (e.g. creating a new file in /etc/cron.hourly)."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-32340",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2025-01-23T03:15:08.290",
|
||||
"lastModified": "2025-01-23T03:15:08.290",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-03-04T21:36:47.970",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -19,7 +19,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N",
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 2.5
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -51,10 +71,37 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ibm:sterling_b2b_integrator:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.0.0.0",
|
||||
"versionEndIncluding": "6.1.2.5",
|
||||
"matchCriteriaId": "E2DD03C2-67D3-4BA5-8109-10C84538AC3B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ibm:sterling_b2b_integrator:6.2.0.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F0302972-715D-4926-AC67-E2E84DA403CD"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7176082",
|
||||
"source": "psirt@us.ibm.com"
|
||||
"source": "psirt@us.ibm.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-33838",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2025-01-29T02:15:26.640",
|
||||
"lastModified": "2025-01-29T02:15:26.640",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-03-04T21:58:37.043",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -19,7 +19,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N",
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 0.7,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 4.9,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,12 +69,42 @@
|
||||
"value": "CWE-759"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-916"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ibm:security_verify_governance:10.0.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A0412C4E-CCDF-4DAE-88B2-1D006F696ED7"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7172200",
|
||||
"source": "psirt@us.ibm.com"
|
||||
"source": "psirt@us.ibm.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-35017",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2025-01-29T00:15:07.333",
|
||||
"lastModified": "2025-01-29T01:15:07.667",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-03-04T21:58:37.043",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,10 +51,30 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ibm:security_verify_governance:10.0.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A0412C4E-CCDF-4DAE-88B2-1D006F696ED7"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7172423",
|
||||
"source": "psirt@us.ibm.com"
|
||||
"source": "psirt@us.ibm.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-37412",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2025-01-29T17:15:26.657",
|
||||
"lastModified": "2025-01-29T17:15:26.657",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-03-04T21:43:48.913",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -19,7 +19,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:N",
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 0.7,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N",
|
||||
"baseScore": 4.9,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,12 +69,44 @@
|
||||
"value": "CWE-250"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ibm:aspera_faspex:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.0.0",
|
||||
"versionEndIncluding": "5.0.10",
|
||||
"matchCriteriaId": "A9FCEC50-B898-4268-964D-F81A02E15F27"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7181814",
|
||||
"source": "psirt@us.ibm.com"
|
||||
"source": "psirt@us.ibm.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-37413",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2025-01-29T17:15:26.800",
|
||||
"lastModified": "2025-01-29T17:15:26.800",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-03-04T21:43:48.913",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -19,6 +19,26 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
@ -49,12 +69,44 @@
|
||||
"value": "CWE-204"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-203"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ibm:aspera_faspex:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.0.0",
|
||||
"versionEndIncluding": "5.0.10",
|
||||
"matchCriteriaId": "A9FCEC50-B898-4268-964D-F81A02E15F27"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7181814",
|
||||
"source": "psirt@us.ibm.com"
|
||||
"source": "psirt@us.ibm.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-50309",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2025-01-23T03:15:08.573",
|
||||
"lastModified": "2025-01-23T03:15:08.573",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-03-04T21:36:47.970",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -19,7 +19,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -51,10 +71,37 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ibm:sterling_b2b_integrator:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.0.0.0",
|
||||
"versionEndIncluding": "6.1.2.5",
|
||||
"matchCriteriaId": "E2DD03C2-67D3-4BA5-8109-10C84538AC3B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ibm:sterling_b2b_integrator:6.2.0.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F0302972-715D-4926-AC67-E2E84DA403CD"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7176082",
|
||||
"source": "psirt@us.ibm.com"
|
||||
"source": "psirt@us.ibm.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-6948",
|
||||
"sourceIdentifier": "prodsec@nozominetworks.com",
|
||||
"published": "2024-04-02T11:15:50.890",
|
||||
"lastModified": "2024-11-21T08:44:53.957",
|
||||
"lastModified": "2025-03-04T22:15:36.313",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,13 +36,43 @@
|
||||
},
|
||||
"exploitabilityScore": 1.5,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L",
|
||||
"baseScore": 4.1,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 1.5,
|
||||
"impactScore": 2.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "prodsec@nozominetworks.com",
|
||||
"type": "Secondary",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-120"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-2931",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-04-02T09:15:07.567",
|
||||
"lastModified": "2024-11-21T09:10:52.123",
|
||||
"lastModified": "2025-03-04T22:15:36.563",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,9 +36,41 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-200"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://inky-knuckle-2c2.notion.site/WPFront-User-Role-Editor-Information-disclosure-7435b8340a004f5f8485cad375326b2c",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-50685",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-26T21:15:17.373",
|
||||
"lastModified": "2025-02-26T21:15:17.373",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-03-04T22:15:36.813",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "SunGrow iSolarCloud antes de la correcci\u00f3n del 31 de octubre de 2024, es vulnerable a referencias de objetos directos (IDOR) inseguras a trav\u00e9s del modelo de API powerStationService."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
|
||||
"baseScore": 9.1,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-639"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://en.sungrowpower.com/security-notice-detail-2/6118",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-50686",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-26T21:15:17.470",
|
||||
"lastModified": "2025-02-26T21:15:17.470",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-03-04T22:15:37.017",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "SunGrow iSolarCloud antes de la correcci\u00f3n del 31 de octubre de 2024 es vulnerable a referencias de objetos directos (IDOR) inseguras a trav\u00e9s del modelo de API commonService."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
|
||||
"baseScore": 9.1,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-639"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://en.sungrowpower.com/security-notice-detail-2/6112",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-50687",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-26T21:15:17.557",
|
||||
"lastModified": "2025-02-26T21:15:17.557",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-03-04T22:15:37.213",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "SunGrow iSolarCloud antes de la correcci\u00f3n del 31 de octubre de 2024 es vulnerable a referencias de objetos directos (IDOR) inseguras a trav\u00e9s del modelo de API devService."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
|
||||
"baseScore": 9.1,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-639"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://en.sungrowpower.com/security-notice-detail-2/6114",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-50688",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-26T21:15:17.647",
|
||||
"lastModified": "2025-02-26T21:15:17.647",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-03-04T22:15:37.413",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "La aplicaci\u00f3n SunGrow iSolarCloud para Android V2.1.6.20241017 y versiones anteriores contienen credenciales codificadas. La aplicaci\u00f3n (independientemente de la cuenta de usuario) y la nube utilizan las mismas credenciales MQTT para intercambiar la telemetr\u00eda del dispositivo."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-798"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://en.sungrowpower.com/security-notice-detail-2/6122",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-50689",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-26T21:15:17.737",
|
||||
"lastModified": "2025-02-26T21:15:17.737",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-03-04T22:15:37.630",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "SunGrow iSolarCloud antes de la correcci\u00f3n del 31 de octubre de 2024 es vulnerable a referencias de objetos directos (IDOR) inseguras a trav\u00e9s del modelo de API orgService."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
|
||||
"baseScore": 9.1,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-639"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://en.sungrowpower.com/security-notice-detail-2/6116",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-50691",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-26T21:15:17.823",
|
||||
"lastModified": "2025-02-26T21:15:17.823",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-03-04T22:15:37.823",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "La aplicaci\u00f3n SunGrow iSolarCloud para Android V2.1.6.20241104 y versiones anteriores presentan un problema de falta de validaci\u00f3n del certificado SSL. La aplicaci\u00f3n ignora expl\u00edcitamente los errores de certificado y es vulnerable a ataques MiTM. Los atacantes pueden hacerse pasar por el servidor iSolarCloud y comunicarse con la aplicaci\u00f3n para Android."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
|
||||
"baseScore": 7.4,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-295"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://en.sungrowpower.com/security-notice-detail-2/6124",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-50693",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-26T21:15:17.910",
|
||||
"lastModified": "2025-02-26T21:15:17.910",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-03-04T22:15:38.023",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "SunGrow iSolarCloud antes de la correcci\u00f3n del 31 de octubre de 2024 es vulnerable a referencias de objetos directos (IDOR) inseguras a trav\u00e9s del modelo de API userService."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
|
||||
"baseScore": 9.1,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-639"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://en.sungrowpower.com/security-notice-detail-2/6120",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-50696",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-26T21:15:17.997",
|
||||
"lastModified": "2025-02-26T21:15:17.997",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-03-04T22:15:38.213",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "SunGrow WiNet-S V200.001.00.P025 y las versiones anteriores les faltan comprobaciones de integridad para las actualizaciones de firmware. El env\u00edo de un mensaje MQTT espec\u00edfico permite una actualizaci\u00f3n de un inversor o un dispositivo de conectividad WiNet con un archivo de firmware falso que se encuentra en un servidor controlado por el atacante."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-494"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://en.sungrowpower.com/security-notice-detail-2/6140",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-50706",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-03-04T15:15:19.290",
|
||||
"lastModified": "2025-03-04T15:15:19.290",
|
||||
"lastModified": "2025-03-04T22:15:38.420",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "Unauthenticated SQL injection vulnerability in Uniguest Tripleplay before 24.2.1 allows remote attackers to execute arbitrary SQL queries on the backend database."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://uniguest.com/cve-bulletins/",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-53573",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-26T22:15:14.043",
|
||||
"lastModified": "2025-02-26T22:15:14.043",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-03-04T21:15:11.833",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Unifiedtransform v2.X es vulnerable a un control de acceso incorrecto. Los usuarios no autorizados pueden acceder y manipular endpoints destinados exclusivamente para uso administrativo. Este problema afecta espec\u00edficamente a teacher/edit/{id}."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-284"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://drive.google.com/file/d/14Or6QIpOeLEqdFm1mwxdE_NNCOwMmcFc/view",
|
||||
@ -24,6 +59,10 @@
|
||||
{
|
||||
"url": "https://www.getastra.com/blog/vulnerability/improper-access-control-in-school-management-system-unifiedtransform/",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://drive.google.com/file/d/14Or6QIpOeLEqdFm1mwxdE_NNCOwMmcFc/view",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-53920",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-11-27T15:15:26.837",
|
||||
"lastModified": "2025-03-01T06:15:34.350",
|
||||
"lastModified": "2025-03-04T22:15:38.610",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,42 +15,7 @@
|
||||
"value": "En elisp-mode.el de GNU Emacs hasta la versi\u00f3n 30.0.92, un usuario que elija invocar elisp-completion-at-point (para completar el c\u00f3digo) en c\u00f3digo fuente de Emacs Lisp que no sea de confianza puede desencadenar una expansi\u00f3n de macros de Lisp no segura que permita a los atacantes ejecutar c\u00f3digo arbitrario. (Esta expansi\u00f3n no segura tambi\u00e9n ocurre si un usuario elige habilitar el diagn\u00f3stico sobre la marcha de que byte compila c\u00f3digo fuente de Emacs Lisp que no es de confianza)."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-94"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://eshelyaron.com/posts/2024-11-27-emacs-aritrary-code-execution-and-how-to-avoid-it.html",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-55563",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-12-09T01:15:06.313",
|
||||
"lastModified": "2024-12-09T01:15:06.313",
|
||||
"lastModified": "2025-03-04T22:15:38.777",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Bitcoin Core hasta la versi\u00f3n 27.2 permite el bloqueo de la retransmisi\u00f3n de transacciones mediante un ataque de protocolo fuera de la cadena, un problema relacionado con CVE-2024-52913. Por ejemplo, el resultado de un HTLC (contrato de bloqueo de tiempo hash) puede modificarse porque una inundaci\u00f3n de tr\u00e1fico de transacciones impide la propagaci\u00f3n de ciertas transacciones del canal Lightning."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-770"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://ariard.github.io",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-56898",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-03T21:15:14.047",
|
||||
"lastModified": "2025-03-03T22:15:36.810",
|
||||
"lastModified": "2025-03-04T22:15:38.990",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,42 +15,7 @@
|
||||
"value": "El control de acceso incorrecto en Geovision GV-ASWeb versi\u00f3n 6.1.0.0 o anterior permite que atacantes no autorizados con privilegios de bajo nivel administren y creen nuevas cuentas de usuario mediante el suministro de una solicitud HTTP manipulada."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
|
||||
"baseScore": 8.1,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/DRAGOWN/CVE-2024-56898",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-56901",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-03T21:15:14.157",
|
||||
"lastModified": "2025-03-03T22:15:36.967",
|
||||
"lastModified": "2025-03-04T22:15:39.143",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Cross-Site Request Forgery (CSRF) en Account Management component of Geovision GV-ASWeb version 6.1.1.0 o anterior permite a los atacantes crear arbitrariamente cuentas de administrador a trav\u00e9s de un m\u00e9todo de solicitud GET manipulado."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/DRAGOWN/CVE-2024-56901",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-56902",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-03T21:15:14.270",
|
||||
"lastModified": "2025-03-03T22:15:37.063",
|
||||
"lastModified": "2025-03-04T22:15:39.340",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Un problema en Geovision GV-ASWeb con la versi\u00f3n 6.1.0.0 o anterior permite que atacantes no autorizados con privilegios de bajo nivel puedan solicitar informaci\u00f3n sobre otras cuentas a trav\u00e9s de una solicitud HTTP manipulado."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-200"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/DRAGOWN/CVE-2024-56902",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-56903",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-03T21:15:14.357",
|
||||
"lastModified": "2025-03-03T22:15:37.173",
|
||||
"lastModified": "2025-03-04T22:15:39.547",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Cross-Site Request Forgery (CSRF) en Geovision GV-ASWeb con la versi\u00f3n 6.1.1.0 o menos permite a los atacantes ejecutar operaciones arbitrarias mediante el suministro de una solicitud HTTP manipulado."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H",
|
||||
"baseScore": 8.1,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/DRAGOWN/CVE-2024-56903",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-57423",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-26T21:15:18.093",
|
||||
"lastModified": "2025-02-26T21:15:18.093",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-03-04T21:15:12.020",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,11 +15,50 @@
|
||||
"value": "Una vulnerabilidad de cross site scripting en CloudClassroom-PHP Project v1.0 permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s del par\u00e1metro exid de la funci\u00f3n de evaluaci\u00f3n."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/harshad-alt/CVE/blob/main/CVE-2024-57423.md",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/harshad-alt/CVE/blob/main/CVE-2024-57423.md",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-80xx/CVE-2024-8000.json
Normal file
56
CVE-2024/CVE-2024-80xx/CVE-2024-8000.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-8000",
|
||||
"sourceIdentifier": "psirt@arista.com",
|
||||
"published": "2025-03-04T21:15:12.220",
|
||||
"lastModified": "2025-03-04T21:15:12.220",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "On affected platforms running Arista EOS with 802.1X configured, certain conditions may occur where a dynamic ACL is received from the AAA server resulting in only the first line of the ACL being installed after an Accelerated Software Upgrade (ASU) restart. \n\nNote: supplicants with pending captive-portal authentication during ASU would be impacted with this bug."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@arista.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.6,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@arista.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-1284"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.arista.com/en/support/advisories-notices/security-advisory/21086-security-advisory-0109",
|
||||
"source": "psirt@arista.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-91xx/CVE-2024-9135.json
Normal file
56
CVE-2024/CVE-2024-91xx/CVE-2024-9135.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-9135",
|
||||
"sourceIdentifier": "psirt@arista.com",
|
||||
"published": "2025-03-04T21:15:12.360",
|
||||
"lastModified": "2025-03-04T21:15:12.360",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "On affected platforms running Arista EOS with BGP Link State configured, BGP peer flap can cause the BGP agent to leak memory. This may result in BGP routing processing being terminated and route flapping."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@arista.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@arista.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-401"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.arista.com/en/support/advisories-notices/security-advisory/21092-security-advisory-0110",
|
||||
"source": "psirt@arista.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-1283",
|
||||
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
||||
"published": "2025-02-13T22:15:11.413",
|
||||
"lastModified": "2025-02-13T22:15:11.413",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-03-04T20:59:05.417",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -93,16 +93,143 @@
|
||||
"value": "CWE-288"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-306"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:dingtian-tech:dt-r002_firmware:3.1.3044a:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FCDD272A-AB68-41C7-8F84-1353263EDB83"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:dingtian-tech:dt-r002:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A66EBB54-A7E6-4627-9A00-AB11A5AF632B"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:dingtian-tech:dt-r008_firmware:3.1.1759a:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7BAF5AD2-D97D-4AD3-AD81-3D7650383E13"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:dingtian-tech:dt-r008:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DE107C89-F002-4E31-8DED-D342207152DF"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:dingtian-tech:dt-r016_firmware:3.1.2776a:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7050E734-415B-4A61-94B4-BF70721C2F38"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:dingtian-tech:dt-r016:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4870512F-79B8-486C-9F4A-4215733C89AD"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:dingtian-tech:dt-r032_firmware:3.1.3826a:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3B2902EB-490A-41DB-B198-E6A614F77B56"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:dingtian-tech:dt-r032:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7443447D-5BA5-4B70-952F-E33BB0043139"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-044-18",
|
||||
"source": "ics-cert@hq.dhs.gov"
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"tags": [
|
||||
"US Government Resource",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.dingtian-tech.com/en_us/aboutus.html?tab=contact_us",
|
||||
"source": "ics-cert@hq.dhs.gov"
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
145
CVE-2025/CVE-2025-19xx/CVE-2025-1954.json
Normal file
145
CVE-2025/CVE-2025-19xx/CVE-2025-1954.json
Normal file
@ -0,0 +1,145 @@
|
||||
{
|
||||
"id": "CVE-2025-1954",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-03-04T21:15:12.750",
|
||||
"lastModified": "2025-03-04T21:15:12.750",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in PHPGurukul Human Metapneumovirus Testing Management System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /login.php. The manipulation of the argument username leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 6.9,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "LOW",
|
||||
"vulnIntegrityImpact": "LOW",
|
||||
"vulnAvailabilityImpact": "LOW",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||||
"baseScore": 7.3,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||||
"baseScore": 7.5,
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "NONE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL"
|
||||
},
|
||||
"baseSeverity": "HIGH",
|
||||
"exploitabilityScore": 10.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-74"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/sorcha-l/cve/blob/main/Human%20Metapneumovirus%20(HMPV)%20%E2%80%93%20Testing%20Management%20System%20%20SQL%20Injection%20Vulnerability.md",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://phpgurukul.com/",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.298555",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.298555",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.510360",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
145
CVE-2025/CVE-2025-19xx/CVE-2025-1955.json
Normal file
145
CVE-2025/CVE-2025-19xx/CVE-2025-1955.json
Normal file
@ -0,0 +1,145 @@
|
||||
{
|
||||
"id": "CVE-2025-1955",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-03-04T21:15:12.940",
|
||||
"lastModified": "2025-03-04T21:15:12.940",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in code-projects Online Class and Exam Scheduling System 1.0. It has been rated as problematic. Affected by this issue is some unknown functionality of the file /Scheduling/scheduling/pages/profile.php. The manipulation of the argument username leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 5.1,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "PASSIVE",
|
||||
"vulnConfidentialityImpact": "NONE",
|
||||
"vulnIntegrityImpact": "LOW",
|
||||
"vulnAvailabilityImpact": "NONE",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
|
||||
"baseScore": 3.5,
|
||||
"baseSeverity": "LOW",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
|
||||
"baseScore": 4.0,
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 2.9,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-94"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://code-projects.org/",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://hexotion.notion.site/Online-Class-and-Exam-Scheduling-System-in-PHP-has-Stored-Cross-Site-Scripting-vulnerability-in-prof-1a7bb766cf32809b9f0be980e90d83f7?pvs=73",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.298556",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.298556",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.510689",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
145
CVE-2025/CVE-2025-19xx/CVE-2025-1956.json
Normal file
145
CVE-2025/CVE-2025-19xx/CVE-2025-1956.json
Normal file
@ -0,0 +1,145 @@
|
||||
{
|
||||
"id": "CVE-2025-1956",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-03-04T22:15:39.867",
|
||||
"lastModified": "2025-03-04T22:15:39.867",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability classified as critical has been found in code-projects Shopping Portal 1.0. This affects an unknown part of the file /Shopping/Admin/index.php of the component Login. The manipulation of the argument password leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 6.9,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "LOW",
|
||||
"vulnIntegrityImpact": "LOW",
|
||||
"vulnAvailabilityImpact": "LOW",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||||
"baseScore": 7.3,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||||
"baseScore": 7.5,
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "NONE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL"
|
||||
},
|
||||
"baseSeverity": "HIGH",
|
||||
"exploitabilityScore": 10.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-74"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://code-projects.org/",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://hexotion.notion.site/Shopping-Portal-in-PHP-has-Stored-SQL-injection-vulnerability-in-admin-index-php-1a7bb766cf3280e8bb81eaa59c4c2b74",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.298557",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.298557",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.510696",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
145
CVE-2025/CVE-2025-19xx/CVE-2025-1957.json
Normal file
145
CVE-2025/CVE-2025-19xx/CVE-2025-1957.json
Normal file
@ -0,0 +1,145 @@
|
||||
{
|
||||
"id": "CVE-2025-1957",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-03-04T22:15:40.040",
|
||||
"lastModified": "2025-03-04T22:15:40.040",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability classified as problematic was found in code-projects Blood Bank System 1.0. This vulnerability affects unknown code of the file /BBfile/Blood/o+.php. The manipulation of the argument Bloodname leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 5.1,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "PASSIVE",
|
||||
"vulnConfidentialityImpact": "NONE",
|
||||
"vulnIntegrityImpact": "LOW",
|
||||
"vulnAvailabilityImpact": "NONE",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
|
||||
"baseScore": 3.5,
|
||||
"baseSeverity": "LOW",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
|
||||
"baseScore": 4.0,
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 2.9,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-94"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://code-projects.org/",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/Corgile/cve/blob/main/cve.md",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.298558",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.298558",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.510705",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
141
CVE-2025/CVE-2025-19xx/CVE-2025-1958.json
Normal file
141
CVE-2025/CVE-2025-19xx/CVE-2025-1958.json
Normal file
@ -0,0 +1,141 @@
|
||||
{
|
||||
"id": "CVE-2025-1958",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-03-04T22:15:40.210",
|
||||
"lastModified": "2025-03-04T22:15:40.210",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability, which was classified as critical, has been found in aaluoxiang oa_system 1.0. This issue affects some unknown processing of the file src/main/resources/mappers/address-mapper.xml. The manipulation of the argument outtype leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "LOW",
|
||||
"vulnIntegrityImpact": "LOW",
|
||||
"vulnAvailabilityImpact": "LOW",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
||||
"baseScore": 6.5,
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL"
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-74"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/qkdjksfkeg/cve_article/blob/main/oasys/SQL%20injection.md",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.298559",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.298559",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.510750",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-22896",
|
||||
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
||||
"published": "2025-02-13T22:15:11.737",
|
||||
"lastModified": "2025-02-13T22:15:11.737",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-03-04T20:59:05.417",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -80,6 +80,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 4.0
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -95,18 +115,46 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:myscada:mypro:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "1.4",
|
||||
"matchCriteriaId": "ED7FC18F-6415-4B32-9420-E5D9663BFF49"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-044-16",
|
||||
"source": "ics-cert@hq.dhs.gov"
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"tags": [
|
||||
"US Government Resource",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.myscada.org/contacts/",
|
||||
"source": "ics-cert@hq.dhs.gov"
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.myscada.org/downloads/mySCADAPROManager/",
|
||||
"source": "ics-cert@hq.dhs.gov"
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-23411",
|
||||
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
||||
"published": "2025-02-13T22:15:11.913",
|
||||
"lastModified": "2025-02-13T22:15:11.913",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-03-04T20:59:05.417",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -80,6 +80,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -95,18 +115,46 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:myscada:mypro:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "1.4",
|
||||
"matchCriteriaId": "ED7FC18F-6415-4B32-9420-E5D9663BFF49"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-044-16",
|
||||
"source": "ics-cert@hq.dhs.gov"
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"tags": [
|
||||
"US Government Resource",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.myscada.org/contacts/",
|
||||
"source": "ics-cert@hq.dhs.gov"
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.myscada.org/downloads/mySCADAPROManager/",
|
||||
"source": "ics-cert@hq.dhs.gov"
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-24865",
|
||||
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
||||
"published": "2025-02-13T22:15:12.613",
|
||||
"lastModified": "2025-02-13T22:15:12.613",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-03-04T20:59:05.417",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -80,6 +80,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 6.0
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -95,18 +115,46 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:myscada:mypro:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "1.4",
|
||||
"matchCriteriaId": "ED7FC18F-6415-4B32-9420-E5D9663BFF49"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-044-16",
|
||||
"source": "ics-cert@hq.dhs.gov"
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"tags": [
|
||||
"US Government Resource",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.myscada.org/contacts/",
|
||||
"source": "ics-cert@hq.dhs.gov"
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.myscada.org/downloads/mySCADAPROManager/",
|
||||
"source": "ics-cert@hq.dhs.gov"
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-25067",
|
||||
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
||||
"published": "2025-02-13T22:15:12.780",
|
||||
"lastModified": "2025-02-13T22:15:12.780",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-03-04T20:59:05.417",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -95,18 +95,46 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:myscada:mypro:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "1.4",
|
||||
"matchCriteriaId": "ED7FC18F-6415-4B32-9420-E5D9663BFF49"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-044-16",
|
||||
"source": "ics-cert@hq.dhs.gov"
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"tags": [
|
||||
"US Government Resource",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.myscada.org/contacts/",
|
||||
"source": "ics-cert@hq.dhs.gov"
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.myscada.org/downloads/mySCADAPROManager/",
|
||||
"source": "ics-cert@hq.dhs.gov"
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
25
CVE-2025/CVE-2025-254xx/CVE-2025-25426.json
Normal file
25
CVE-2025/CVE-2025-254xx/CVE-2025-25426.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2025-25426",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-03-04T22:15:40.633",
|
||||
"lastModified": "2025-03-04T22:15:40.633",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "yshopmall <=v1.9.0 is vulnerable to SQL Injection in the image listing interface."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/Catherines77/79e6b69490b085d9c2d96c99e72c3579",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/guchengwuyue/yshopmall/issues/34",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-25783",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-26T15:15:26.440",
|
||||
"lastModified": "2025-02-26T15:15:26.440",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-03-04T22:15:40.787",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Una vulnerabilidad de carga de archivos arbitrarios en el componente admin\\plugin.php de Emlog Pro v2.5.3 permite a los atacantes ejecutar c\u00f3digo arbitrario mediante la carga de un archivo Zip manipulado espec\u00edficamente para ello."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-434"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://emlogpro.com",
|
||||
@ -28,6 +63,10 @@
|
||||
{
|
||||
"url": "https://www.emlog.net/",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/Ka7arotto/emlog/blob/main/emlog-3.md",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2025/CVE-2025-261xx/CVE-2025-26136.json
Normal file
21
CVE-2025/CVE-2025-261xx/CVE-2025-26136.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2025-26136",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-03-04T21:15:13.770",
|
||||
"lastModified": "2025-03-04T21:15:13.770",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A SQL injection vulnerability exists in mysiteforme versions prior to 2025.01.1."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/xiadmin6/6d664692d31a04eb59096a488b9f3712",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2025/CVE-2025-263xx/CVE-2025-26318.json
Normal file
21
CVE-2025/CVE-2025-263xx/CVE-2025-26318.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2025-26318",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-03-04T21:15:13.897",
|
||||
"lastModified": "2025-03-04T21:15:13.897",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Insecure permissions in TSplus Remote Access v17.30 allow attackers to retrieve a list of all domain accounts currently connected to the application."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Frozenka/CVE-2025-26318",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2025/CVE-2025-263xx/CVE-2025-26319.json
Normal file
21
CVE-2025/CVE-2025-263xx/CVE-2025-26319.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2025-26319",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-03-04T22:15:40.993",
|
||||
"lastModified": "2025-03-04T22:15:40.993",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "FlowiseAI Flowise v2.2.6 was discovered to contain an arbitrary file upload vulnerability in /api/v1/attachments."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/dorattias/CVE-2025-26319",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-26495",
|
||||
"sourceIdentifier": "security@salesforce.com",
|
||||
"published": "2025-02-11T18:15:47.237",
|
||||
"lastModified": "2025-02-11T18:15:47.237",
|
||||
"lastModified": "2025-03-04T21:15:14.020",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,30 @@
|
||||
"value": "La vulnerabilidad de almacenamiento de informaci\u00f3n confidencial en texto plano en Salesforce Tableau Server puede registrar el token de acceso personal (PAT) en repositorios de registro. Este problema afecta a Tableau Server: antes de 2022.1.3, antes de 2021.4.8, antes de 2021.3.13, antes de 2021.2.14, antes de 2021.1.16, antes de 2020.4.19."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@salesforce.com",
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2025-27410",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-02-28T21:15:27.677",
|
||||
"lastModified": "2025-02-28T21:15:27.677",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-03-04T21:15:14.197",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "PwnDoc is a penetration test reporting application. Prior to version 1.2.0, the backup restore functionality is vulnerable to path traversal in the TAR entry's name, allowing an attacker to overwrite any file on the system with their content. By overwriting an included `.js` file and restarting the container, this allows for Remote Code Execution as an administrator. The remote code execution occurs because any user with the `backups:create` and `backups:update` (only administrators by default) is able to overwrite any file on the system. Version 1.2.0 fixes the issue."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "PwnDoc es una aplicaci\u00f3n de informes de pruebas de penetraci\u00f3n. Antes de la versi\u00f3n 1.2.0, la funci\u00f3n de restauraci\u00f3n de copias de seguridad era vulnerable a la navegaci\u00f3n por rutas en el nombre de la entrada TAR, lo que permit\u00eda a un atacante sobrescribir cualquier archivo del sistema con su contenido. Al sobrescribir un archivo `.js` incluido y reiniciar el contenedor, se permite la ejecuci\u00f3n remota de c\u00f3digo como administrador. La ejecuci\u00f3n remota de c\u00f3digo se produce porque cualquier usuario con `backups:create` y `backups:update` (solo administradores de forma predeterminada) puede sobrescribir cualquier archivo del sistema. La versi\u00f3n 1.2.0 soluciona el problema."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -38,7 +42,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -67,6 +71,10 @@
|
||||
{
|
||||
"url": "https://github.com/pwndoc/pwndoc/security/advisories/GHSA-mxw8-vgvx-89hx",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/pwndoc/pwndoc/security/advisories/GHSA-mxw8-vgvx-89hx",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2025-27413",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-02-28T21:15:27.820",
|
||||
"lastModified": "2025-02-28T21:15:27.820",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-03-04T21:15:14.303",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "PwnDoc is a penetration test reporting application. Prior to version 1.2.0, the backup restore functionality allows an administrator to import raw data into the database, including Path Traversal (`../`) sequences. This is problematic for the template update functionality as it uses the path from the database to write arbitrary content to, potentially overwriting source code to achieve Remote Code Execution. Any user with the `backups:create`, `backups:update` and `templates:update` permissions (only administrators by default) can write arbitrary content to anywhere on the filesystem. By overwriting source code, it is possible to achieve Remote Code Execution. Version 1.2.0 fixes the issue."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "PwnDoc es una aplicaci\u00f3n de informes de pruebas de penetraci\u00f3n. Antes de la versi\u00f3n 1.2.0, la funci\u00f3n de restauraci\u00f3n de copias de seguridad permite a un administrador importar datos sin procesar a la base de datos, incluidas las secuencias Path Traversal (`../`). Esto es problem\u00e1tico para la funci\u00f3n de actualizaci\u00f3n de plantillas, ya que utiliza la ruta de la base de datos para escribir contenido arbitrario, lo que podr\u00eda sobrescribir el c\u00f3digo fuente para lograr la ejecuci\u00f3n remota de c\u00f3digo. Cualquier usuario con los permisos `backups:create`, `backups:update` y `templates:update` (solo administradores de forma predeterminada) puede escribir contenido arbitrario en cualquier lugar del sistema de archivos. Al sobrescribir el c\u00f3digo fuente, es posible lograr la ejecuci\u00f3n remota de c\u00f3digo. La versi\u00f3n 1.2.0 soluciona el problema."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -38,7 +42,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -71,6 +75,10 @@
|
||||
{
|
||||
"url": "https://github.com/pwndoc/pwndoc/security/advisories/GHSA-r3vj-47cf-4672",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/pwndoc/pwndoc/security/advisories/GHSA-r3vj-47cf-4672",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
82
CVE-2025/CVE-2025-275xx/CVE-2025-27510.json
Normal file
82
CVE-2025/CVE-2025-275xx/CVE-2025-27510.json
Normal file
@ -0,0 +1,82 @@
|
||||
{
|
||||
"id": "CVE-2025-27510",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-03-04T22:15:41.147",
|
||||
"lastModified": "2025-03-04T22:15:41.147",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "conda-forge-metadata provides programatic access to conda-forge's metadata. conda-forge-metadata uses an optional dependency - \"conda-oci-mirror\" which was neither present on the PyPi repository nor registered by any entity. If conda-oci-mirror is taken over by a threat actor, it can result in remote code execution."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 9.3,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "HIGH",
|
||||
"vulnIntegrityImpact": "HIGH",
|
||||
"vulnAvailabilityImpact": "HIGH",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-829"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/conda-forge/conda-forge-metadata/blob/799aee36b21ee06289d73d57838b28201f5a57af/pyproject.toml#L28",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/conda-forge/conda-forge-metadata/security/advisories/GHSA-vwfh-m3q7-9jpw",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
86
README.md
86
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2025-03-04T21:00:20.048667+00:00
|
||||
2025-03-04T23:00:20.031352+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2025-03-04T20:42:55.570000+00:00
|
||||
2025-03-04T22:15:41.147000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,56 +33,58 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
284105
|
||||
284119
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `12`
|
||||
Recently added CVEs: `14`
|
||||
|
||||
- [CVE-2019-1815](CVE-2019/CVE-2019-18xx/CVE-2019-1815.json) (`2025-03-04T19:15:36.177`)
|
||||
- [CVE-2020-3122](CVE-2020/CVE-2020-31xx/CVE-2020-3122.json) (`2025-03-04T19:15:36.890`)
|
||||
- [CVE-2025-1080](CVE-2025/CVE-2025-10xx/CVE-2025-1080.json) (`2025-03-04T20:15:36.867`)
|
||||
- [CVE-2025-1259](CVE-2025/CVE-2025-12xx/CVE-2025-1259.json) (`2025-03-04T20:15:37.003`)
|
||||
- [CVE-2025-1260](CVE-2025/CVE-2025-12xx/CVE-2025-1260.json) (`2025-03-04T20:15:37.133`)
|
||||
- [CVE-2025-1946](CVE-2025/CVE-2025-19xx/CVE-2025-1946.json) (`2025-03-04T19:15:37.583`)
|
||||
- [CVE-2025-1947](CVE-2025/CVE-2025-19xx/CVE-2025-1947.json) (`2025-03-04T19:15:37.760`)
|
||||
- [CVE-2025-1949](CVE-2025/CVE-2025-19xx/CVE-2025-1949.json) (`2025-03-04T19:15:37.943`)
|
||||
- [CVE-2025-1952](CVE-2025/CVE-2025-19xx/CVE-2025-1952.json) (`2025-03-04T19:15:38.117`)
|
||||
- [CVE-2025-1953](CVE-2025/CVE-2025-19xx/CVE-2025-1953.json) (`2025-03-04T20:15:37.657`)
|
||||
- [CVE-2025-1969](CVE-2025/CVE-2025-19xx/CVE-2025-1969.json) (`2025-03-04T19:15:38.290`)
|
||||
- [CVE-2025-26202](CVE-2025/CVE-2025-262xx/CVE-2025-26202.json) (`2025-03-04T19:15:38.640`)
|
||||
- [CVE-2020-23438](CVE-2020/CVE-2020-234xx/CVE-2020-23438.json) (`2025-03-04T21:15:10.907`)
|
||||
- [CVE-2021-41719](CVE-2021/CVE-2021-417xx/CVE-2021-41719.json) (`2025-03-04T21:15:11.237`)
|
||||
- [CVE-2024-8000](CVE-2024/CVE-2024-80xx/CVE-2024-8000.json) (`2025-03-04T21:15:12.220`)
|
||||
- [CVE-2024-9135](CVE-2024/CVE-2024-91xx/CVE-2024-9135.json) (`2025-03-04T21:15:12.360`)
|
||||
- [CVE-2025-1954](CVE-2025/CVE-2025-19xx/CVE-2025-1954.json) (`2025-03-04T21:15:12.750`)
|
||||
- [CVE-2025-1955](CVE-2025/CVE-2025-19xx/CVE-2025-1955.json) (`2025-03-04T21:15:12.940`)
|
||||
- [CVE-2025-1956](CVE-2025/CVE-2025-19xx/CVE-2025-1956.json) (`2025-03-04T22:15:39.867`)
|
||||
- [CVE-2025-1957](CVE-2025/CVE-2025-19xx/CVE-2025-1957.json) (`2025-03-04T22:15:40.040`)
|
||||
- [CVE-2025-1958](CVE-2025/CVE-2025-19xx/CVE-2025-1958.json) (`2025-03-04T22:15:40.210`)
|
||||
- [CVE-2025-25426](CVE-2025/CVE-2025-254xx/CVE-2025-25426.json) (`2025-03-04T22:15:40.633`)
|
||||
- [CVE-2025-26136](CVE-2025/CVE-2025-261xx/CVE-2025-26136.json) (`2025-03-04T21:15:13.770`)
|
||||
- [CVE-2025-26318](CVE-2025/CVE-2025-263xx/CVE-2025-26318.json) (`2025-03-04T21:15:13.897`)
|
||||
- [CVE-2025-26319](CVE-2025/CVE-2025-263xx/CVE-2025-26319.json) (`2025-03-04T22:15:40.993`)
|
||||
- [CVE-2025-27510](CVE-2025/CVE-2025-275xx/CVE-2025-27510.json) (`2025-03-04T22:15:41.147`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `35`
|
||||
Recently modified CVEs: `42`
|
||||
|
||||
- [CVE-2024-41147](CVE-2024/CVE-2024-411xx/CVE-2024-41147.json) (`2025-03-04T19:15:37.117`)
|
||||
- [CVE-2024-45426](CVE-2024/CVE-2024-454xx/CVE-2024-45426.json) (`2025-03-04T20:42:55.570`)
|
||||
- [CVE-2024-52366](CVE-2024/CVE-2024-523xx/CVE-2024-52366.json) (`2025-03-04T19:30:24.047`)
|
||||
- [CVE-2024-52367](CVE-2024/CVE-2024-523xx/CVE-2024-52367.json) (`2025-03-04T19:30:24.047`)
|
||||
- [CVE-2024-52891](CVE-2024/CVE-2024-528xx/CVE-2024-52891.json) (`2025-03-04T19:30:24.047`)
|
||||
- [CVE-2024-52893](CVE-2024/CVE-2024-528xx/CVE-2024-52893.json) (`2025-03-04T19:30:24.047`)
|
||||
- [CVE-2024-55581](CVE-2024/CVE-2024-555xx/CVE-2024-55581.json) (`2025-03-04T20:15:36.677`)
|
||||
- [CVE-2024-56285](CVE-2024/CVE-2024-562xx/CVE-2024-56285.json) (`2025-03-04T19:30:24.047`)
|
||||
- [CVE-2024-8676](CVE-2024/CVE-2024-86xx/CVE-2024-8676.json) (`2025-03-04T19:15:37.457`)
|
||||
- [CVE-2024-9618](CVE-2024/CVE-2024-96xx/CVE-2024-9618.json) (`2025-03-04T20:34:08.907`)
|
||||
- [CVE-2025-0341](CVE-2025/CVE-2025-03xx/CVE-2025-0341.json) (`2025-03-04T19:30:24.047`)
|
||||
- [CVE-2025-0433](CVE-2025/CVE-2025-04xx/CVE-2025-0433.json) (`2025-03-04T20:34:08.907`)
|
||||
- [CVE-2025-1938](CVE-2025/CVE-2025-19xx/CVE-2025-1938.json) (`2025-03-04T20:15:37.257`)
|
||||
- [CVE-2025-20021](CVE-2025/CVE-2025-200xx/CVE-2025-20021.json) (`2025-03-04T19:08:18.957`)
|
||||
- [CVE-2025-20024](CVE-2025/CVE-2025-200xx/CVE-2025-20024.json) (`2025-03-04T19:08:18.957`)
|
||||
- [CVE-2025-20042](CVE-2025/CVE-2025-200xx/CVE-2025-20042.json) (`2025-03-04T19:08:18.957`)
|
||||
- [CVE-2025-20081](CVE-2025/CVE-2025-200xx/CVE-2025-20081.json) (`2025-03-04T19:08:18.957`)
|
||||
- [CVE-2025-22316](CVE-2025/CVE-2025-223xx/CVE-2025-22316.json) (`2025-03-04T19:30:24.047`)
|
||||
- [CVE-2025-23116](CVE-2025/CVE-2025-231xx/CVE-2025-23116.json) (`2025-03-04T20:15:37.840`)
|
||||
- [CVE-2025-23118](CVE-2025/CVE-2025-231xx/CVE-2025-23118.json) (`2025-03-04T20:15:37.960`)
|
||||
- [CVE-2025-23119](CVE-2025/CVE-2025-231xx/CVE-2025-23119.json) (`2025-03-04T20:15:38.060`)
|
||||
- [CVE-2025-24861](CVE-2025/CVE-2025-248xx/CVE-2025-24861.json) (`2025-03-04T19:24:05.917`)
|
||||
- [CVE-2025-26466](CVE-2025/CVE-2025-264xx/CVE-2025-26466.json) (`2025-03-04T20:15:38.167`)
|
||||
- [CVE-2025-27146](CVE-2025/CVE-2025-271xx/CVE-2025-27146.json) (`2025-03-04T20:42:55.570`)
|
||||
- [CVE-2025-27579](CVE-2025/CVE-2025-275xx/CVE-2025-27579.json) (`2025-03-04T19:15:38.800`)
|
||||
- [CVE-2024-50686](CVE-2024/CVE-2024-506xx/CVE-2024-50686.json) (`2025-03-04T22:15:37.017`)
|
||||
- [CVE-2024-50687](CVE-2024/CVE-2024-506xx/CVE-2024-50687.json) (`2025-03-04T22:15:37.213`)
|
||||
- [CVE-2024-50688](CVE-2024/CVE-2024-506xx/CVE-2024-50688.json) (`2025-03-04T22:15:37.413`)
|
||||
- [CVE-2024-50689](CVE-2024/CVE-2024-506xx/CVE-2024-50689.json) (`2025-03-04T22:15:37.630`)
|
||||
- [CVE-2024-50691](CVE-2024/CVE-2024-506xx/CVE-2024-50691.json) (`2025-03-04T22:15:37.823`)
|
||||
- [CVE-2024-50693](CVE-2024/CVE-2024-506xx/CVE-2024-50693.json) (`2025-03-04T22:15:38.023`)
|
||||
- [CVE-2024-50696](CVE-2024/CVE-2024-506xx/CVE-2024-50696.json) (`2025-03-04T22:15:38.213`)
|
||||
- [CVE-2024-50706](CVE-2024/CVE-2024-507xx/CVE-2024-50706.json) (`2025-03-04T22:15:38.420`)
|
||||
- [CVE-2024-53573](CVE-2024/CVE-2024-535xx/CVE-2024-53573.json) (`2025-03-04T21:15:11.833`)
|
||||
- [CVE-2024-53920](CVE-2024/CVE-2024-539xx/CVE-2024-53920.json) (`2025-03-04T22:15:38.610`)
|
||||
- [CVE-2024-55563](CVE-2024/CVE-2024-555xx/CVE-2024-55563.json) (`2025-03-04T22:15:38.777`)
|
||||
- [CVE-2024-56898](CVE-2024/CVE-2024-568xx/CVE-2024-56898.json) (`2025-03-04T22:15:38.990`)
|
||||
- [CVE-2024-56901](CVE-2024/CVE-2024-569xx/CVE-2024-56901.json) (`2025-03-04T22:15:39.143`)
|
||||
- [CVE-2024-56902](CVE-2024/CVE-2024-569xx/CVE-2024-56902.json) (`2025-03-04T22:15:39.340`)
|
||||
- [CVE-2024-56903](CVE-2024/CVE-2024-569xx/CVE-2024-56903.json) (`2025-03-04T22:15:39.547`)
|
||||
- [CVE-2024-57423](CVE-2024/CVE-2024-574xx/CVE-2024-57423.json) (`2025-03-04T21:15:12.020`)
|
||||
- [CVE-2025-1283](CVE-2025/CVE-2025-12xx/CVE-2025-1283.json) (`2025-03-04T20:59:05.417`)
|
||||
- [CVE-2025-22896](CVE-2025/CVE-2025-228xx/CVE-2025-22896.json) (`2025-03-04T20:59:05.417`)
|
||||
- [CVE-2025-23411](CVE-2025/CVE-2025-234xx/CVE-2025-23411.json) (`2025-03-04T20:59:05.417`)
|
||||
- [CVE-2025-24865](CVE-2025/CVE-2025-248xx/CVE-2025-24865.json) (`2025-03-04T20:59:05.417`)
|
||||
- [CVE-2025-25067](CVE-2025/CVE-2025-250xx/CVE-2025-25067.json) (`2025-03-04T20:59:05.417`)
|
||||
- [CVE-2025-25783](CVE-2025/CVE-2025-257xx/CVE-2025-25783.json) (`2025-03-04T22:15:40.787`)
|
||||
- [CVE-2025-26495](CVE-2025/CVE-2025-264xx/CVE-2025-26495.json) (`2025-03-04T21:15:14.020`)
|
||||
- [CVE-2025-27410](CVE-2025/CVE-2025-274xx/CVE-2025-27410.json) (`2025-03-04T21:15:14.197`)
|
||||
- [CVE-2025-27413](CVE-2025/CVE-2025-274xx/CVE-2025-27413.json) (`2025-03-04T21:15:14.303`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
192
_state.csv
192
_state.csv
@ -61107,8 +61107,8 @@ CVE-2013-3685,0,0,205af49c3267581953b684138c8dad1b16fe11f6f312f61a87e337fabc2b4f
|
||||
CVE-2013-3686,0,0,eebbd81728fb6e4840384b2a0ec02516f591236d57bcbe773d57a1aac38bf2c1,2024-11-21T01:54:07.490000
|
||||
CVE-2013-3687,0,0,dcceeef4a61c59dd935e1e9e1f694aa223ee49d782e52381f29bcf8281c29cbc,2024-11-21T01:54:07.620000
|
||||
CVE-2013-3688,0,0,e3e01dfe96912715778028dfc8112f2a3a5678c1b57bf96f61a394d7177a1d5c,2024-11-21T01:54:07.773000
|
||||
CVE-2013-3689,0,1,572f2b19cbb2daabecb9c730012f4d95238c73bd57569342a052607db54c2977,2025-03-04T19:48:23.663000
|
||||
CVE-2013-3690,0,1,6c42d09499428df1db5c9e5df580a05ba328156f82cc3c0d6f3a1d92ce4a4a30,2025-03-04T19:48:23.663000
|
||||
CVE-2013-3689,0,0,572f2b19cbb2daabecb9c730012f4d95238c73bd57569342a052607db54c2977,2025-03-04T19:48:23.663000
|
||||
CVE-2013-3690,0,0,6c42d09499428df1db5c9e5df580a05ba328156f82cc3c0d6f3a1d92ce4a4a30,2025-03-04T19:48:23.663000
|
||||
CVE-2013-3691,0,0,662300d1019eefc9a9b554f6ce1c622a77217ce84734ae1f41a221e8f353fdbc,2024-11-21T01:54:08.207000
|
||||
CVE-2013-3692,0,0,96af6f014c3da794a77f58caaf588053402063804ab3da06b73ae0aa46837e0b,2024-11-21T01:54:08.357000
|
||||
CVE-2013-3693,0,0,3c504d7e088cc147e215a12ec53997de2a794bf4498d6d967572688fef0531b5,2024-11-21T01:54:08.503000
|
||||
@ -131626,7 +131626,7 @@ CVE-2019-13450,0,0,a19e6500b825532ded42e48c09641afd14ca1b35c58867d8ba26866674127
|
||||
CVE-2019-13451,0,0,a1fd8e06dc636f583339bab277b9f7ce88aa543c45b062540e9367260bbb806d,2024-11-21T04:24:55.753000
|
||||
CVE-2019-13452,0,0,a260a130de3aa51cdf61f28a916d5f1159f8284885f00dd938827bf731f11b36,2024-11-21T04:24:55.907000
|
||||
CVE-2019-13453,0,0,0a82515d8a4330d6d2485f5b2b503bad3f6405e5a6ac8bfc09e7278bf358ee47,2024-11-21T04:24:56.063000
|
||||
CVE-2019-13454,0,1,6165dbac71b781f66799a9751a43e6e34669598ccffccc15a0efe04affe03de0,2025-03-04T19:15:35.237000
|
||||
CVE-2019-13454,0,0,6165dbac71b781f66799a9751a43e6e34669598ccffccc15a0efe04affe03de0,2025-03-04T19:15:35.237000
|
||||
CVE-2019-13455,0,0,6c267d56c3f12b2088e8ad265b320ed1f0e0fafbc01e189497ba888523a3e7ff,2024-11-21T04:24:56.373000
|
||||
CVE-2019-13456,0,0,e24c18d2aadb56f50a2a595db10eb544ef765f5486aa5ad442830fe8c5c8b128,2024-11-21T04:24:56.510000
|
||||
CVE-2019-13457,0,0,27b2d170c9f7bbb6311b529cb2e86cb68d5a06d40e8e6c74a29dfd36a9e1ffcc,2024-11-21T04:24:56.660000
|
||||
@ -135468,7 +135468,7 @@ CVE-2019-1811,0,0,7257fa9318dbfbb906f8172322d1a6dcf0026ac87e97127a618142b9ce820f
|
||||
CVE-2019-1812,0,0,f39f3180939fe0866f9a91a0e0e9b95e0612f700f79a209a057b2b8cb0dacbf2,2024-11-21T04:37:26.070000
|
||||
CVE-2019-1813,0,0,72bcb700ab78583c44bd818d08ef976f5a57e0b08f0d9981270962c1cc81ecea,2024-11-21T04:37:26.217000
|
||||
CVE-2019-1814,0,0,6b482a1984164225f91a406f53c4f46d9a97fe53faff00d70635949504734401,2024-11-21T04:37:26.363000
|
||||
CVE-2019-1815,1,1,4871e5779746f975ac6ff42d79d909a08b58b5f74c8290525e657fd4eb18ff46,2025-03-04T19:15:36.177000
|
||||
CVE-2019-1815,0,0,4871e5779746f975ac6ff42d79d909a08b58b5f74c8290525e657fd4eb18ff46,2025-03-04T19:15:36.177000
|
||||
CVE-2019-1816,0,0,bc1b96179ad9e6dc3efe1c98de6af983824c419aa24897dd76fe2ae3535bf76d,2024-11-21T04:37:26.523000
|
||||
CVE-2019-1817,0,0,b37f886c116df24d0ef11fd8cd0180a420714c8f2b41e09b3f99177374f69a57,2024-11-21T04:37:26.647000
|
||||
CVE-2019-18177,0,0,997596f59e0036f91e0b923e8d3cab2e9e3873b57aa1cfd4f381e2447e82c231,2024-11-21T04:32:46.273000
|
||||
@ -137250,7 +137250,7 @@ CVE-2019-20168,0,0,37aa92c44d287a73d1bbcd0bc0e1a0de137f9ef1deec178ea372539e9bc3e
|
||||
CVE-2019-20169,0,0,0834c829596733cc28648d69230760f9fd56e1b084607b5879e3fd7169e74b4c,2024-11-21T04:38:08.910000
|
||||
CVE-2019-2017,0,0,dd99c9e35699c1da10971d23090ea37db3dc2e833b76635592ac5ad9265a3c4c,2024-11-21T04:40:04.483000
|
||||
CVE-2019-20170,0,0,4a5899be0944d37ef7af687241fed4014abc8bda769c157fb80cca27cc9dad49,2024-11-21T04:38:09.050000
|
||||
CVE-2019-20171,0,0,8ca833683ad278bbe92ef63068658ad5ee3d131d18f051cea4f06f682a2ce36b,2024-11-21T04:38:09.203000
|
||||
CVE-2019-20171,0,1,b1fd71db647b6d6b511f0603e259e07d03e362c706880074de1320ae50069d80,2025-03-04T22:15:34.720000
|
||||
CVE-2019-20172,0,0,ea9e7933bbea8b62583f952f956336f7b5101259e8906f6ecc439a86a02acd19,2024-11-21T04:38:09.343000
|
||||
CVE-2019-20173,0,0,ece132ae4647a13553a7a5216838e1012c3570585ad3f2eacb2af6c2f76c2c4f,2024-11-21T04:38:09.487000
|
||||
CVE-2019-20174,0,0,c12f3a2a97851901aea175acd388ffa21babf69083506dae1d15b5ac2d92c989,2024-11-21T04:38:09.627000
|
||||
@ -151171,13 +151171,13 @@ CVE-2020-16288,0,0,d5c85cf050877eac16ac8f0a8c75310ee25449c708fc9bccdd60160a5b61e
|
||||
CVE-2020-16289,0,0,67430e37588268a04064328cb09968e412328b3738f03759e0839be6b9ca0512,2024-11-21T05:07:06.313000
|
||||
CVE-2020-1629,0,0,6b2792cdaa36dac6a55d7d64f0615393e4000e33e8edf3329f3e16c110035a88,2024-11-21T05:11:02.143000
|
||||
CVE-2020-16290,0,0,e80db55365f51a00c0dabbacc1b82bb802c435ea9768018b9a868ce2b6f47018,2024-11-21T05:07:06.480000
|
||||
CVE-2020-16291,0,1,0c6b6f6af22139f9fbcfed9821ae7eb35bb8659249745a8f811e18926eeb7a48,2025-03-04T19:15:36.420000
|
||||
CVE-2020-16291,0,0,0c6b6f6af22139f9fbcfed9821ae7eb35bb8659249745a8f811e18926eeb7a48,2025-03-04T19:15:36.420000
|
||||
CVE-2020-16292,0,0,7a601c2d8cac81f5f64da0942c11dda7fd07665897264f7a9660a4aec99ee0c2,2024-11-21T05:07:06.803000
|
||||
CVE-2020-16293,0,0,8bf4d6b7b3cd01d4d68ec7cdc6c807e18da7791704bce6aa13c5b369543816c0,2024-11-21T05:07:06.963000
|
||||
CVE-2020-16294,0,0,730ad86bc9f044428f72830dbd6577c72f23e23613e4f836d84d893142d6a39f,2024-11-21T05:07:07.123000
|
||||
CVE-2020-16295,0,0,277b0569456b5ee990a95a66ef959372dc8bd258ef48635800915a1285c4c997,2024-11-21T05:07:07.280000
|
||||
CVE-2020-16296,0,0,16ce964ec3ad178950659680ce17d2559b452c257c07c4bfdbe1c5f34f293ac9,2024-11-21T05:07:07.440000
|
||||
CVE-2020-16297,0,1,21742a8527410c4173e5463a9715935b6e79258186c0b38250e4486717057ed5,2025-03-04T19:15:36.597000
|
||||
CVE-2020-16297,0,0,21742a8527410c4173e5463a9715935b6e79258186c0b38250e4486717057ed5,2025-03-04T19:15:36.597000
|
||||
CVE-2020-16298,0,0,7fb0cec13cbdba3c8a7cb7650986cc836cdc89f6d665f07282e2b62746258cb9,2024-11-21T05:07:07.773000
|
||||
CVE-2020-16299,0,0,494bec4da61991784c1f8f627af330c2c2c4729e77aed4a9a1c41485a049eb90,2024-11-21T05:07:07.940000
|
||||
CVE-2020-1630,0,0,d445e46b239bb9262f6403e0518dc2597f4c384b64c96baeb0b77baa0b2af3a9,2024-11-21T05:11:02.310000
|
||||
@ -151185,7 +151185,7 @@ CVE-2020-16300,0,0,e9b9f6b73e7cb846cffd9ee48a5253d903ba306bad0b1d28187ac2999bd13
|
||||
CVE-2020-16301,0,0,6ffde003eeffc9a85f36a12711a38c94fefdd516ccfb5707ee4dcee30a503910,2024-11-21T05:07:08.273000
|
||||
CVE-2020-16302,0,0,faaa0dda2ed3b1abe9333508b9636216916c723b268967a7135baeadcd24c708,2024-11-21T05:07:08.433000
|
||||
CVE-2020-16303,0,0,5eb1abe08b6db2147b1c8bb4e98ed1549d73f423a65c72d32a7e25777347df3f,2024-11-21T05:07:08.593000
|
||||
CVE-2020-16304,0,1,206b79ea3314eb0486e9546111d3522a5ed2e027a28ac94eb9d2bbdef3f34d56,2025-03-04T19:15:36.743000
|
||||
CVE-2020-16304,0,0,206b79ea3314eb0486e9546111d3522a5ed2e027a28ac94eb9d2bbdef3f34d56,2025-03-04T19:15:36.743000
|
||||
CVE-2020-16305,0,0,6468629a138a100ef0d4aa666d0809ce0a36ac011f139131f3b503c0568d41c7,2024-11-21T05:07:08.920000
|
||||
CVE-2020-16306,0,0,3233b6147a505da27746f4a780af25be6c5775b185dccf805f17869c6d486bf7,2024-11-21T05:07:09.080000
|
||||
CVE-2020-16307,0,0,906010918ff0850051577978de90c20a14d44237732b35efca66371c292d3a7f,2024-11-21T05:07:09.237000
|
||||
@ -153807,6 +153807,7 @@ CVE-2020-23373,0,0,ed95f6883c9020ba20f58ea5ed2953056429f5cc89ca616baddbc57021583
|
||||
CVE-2020-23374,0,0,41c64d027245d5760e9f742909427e53700585c6136d9359480945611a6d8a47,2024-11-21T05:13:48.020000
|
||||
CVE-2020-23376,0,0,93992f78343dd8910c81b004ae2ad3ae891bccaecf9cf5c8e3b17e8c361bc8c9,2024-11-21T05:13:48.153000
|
||||
CVE-2020-23426,0,0,f62b0e6a732a94edac59175929696cde44032328f771832d17ebff4ad24c8fb9,2024-11-21T05:13:48.287000
|
||||
CVE-2020-23438,1,1,216fc9451b476383265a839ed63b17b80eefca8578be4f89961e5debba9a0231,2025-03-04T21:15:10.907000
|
||||
CVE-2020-23446,0,0,88c29f2746008a01e89a0c729df4d9a3bc7511c7606776d5c75fb09952cd46ef,2024-11-21T05:13:48.437000
|
||||
CVE-2020-23447,0,0,be30263ff308de1c9539ba998de3bb8fac1bd9ca26faf8500d512518f9b6ec41,2024-11-21T05:13:48.580000
|
||||
CVE-2020-23448,0,0,d45d7e57b1e4d75c3161a8ef8a6ed6a2836024eec5e66035a556c9012745fd01,2024-11-21T05:13:48.720000
|
||||
@ -157840,7 +157841,7 @@ CVE-2020-3118,0,0,ab3d8ab3aa505c2c0d05ad5df043a25ffb5a170413595648bcabb8b1b1d972
|
||||
CVE-2020-3119,0,0,0870dee6bca2f4249667243d4049273e03b842939953ccfd2796129499d443d1,2024-11-21T05:30:21.903000
|
||||
CVE-2020-3120,0,0,97360dafe2754942cbbb79bf509a7de595d46c19be8f6643a32688ca08cac22b,2024-11-21T05:30:22.057000
|
||||
CVE-2020-3121,0,0,ed15543005c12fde1ae863fa626214726d57ca2a6dce777d35eccc784c07b467,2024-11-21T05:30:22.217000
|
||||
CVE-2020-3122,1,1,f9bc9a2e14b010199ab8d7c332f1e52a64e4c6e6b6c73fc2d429c1f705cfda13,2025-03-04T19:15:36.890000
|
||||
CVE-2020-3122,0,0,f9bc9a2e14b010199ab8d7c332f1e52a64e4c6e6b6c73fc2d429c1f705cfda13,2025-03-04T19:15:36.890000
|
||||
CVE-2020-3123,0,0,df70284a76d5d85ce7336281e6eeb89c860eb74aca7c21d31d73f769e601aefb,2024-11-21T05:30:22.373000
|
||||
CVE-2020-3124,0,0,bd5bdfd427a38f4aeec68de1a9cfb55f706a375f16cf469eb125e2cdfe5e414f,2024-11-21T05:30:22.513000
|
||||
CVE-2020-3125,0,0,583946cdbeffea277d4142f6145ecc184f2fb93acdb5403daef2d93670740b6e,2024-11-21T05:30:22.623000
|
||||
@ -177213,7 +177214,7 @@ CVE-2021-33347,0,0,d57feb5106894bb611a650a977511367b0102014ebb93bb500c067f5b68d8
|
||||
CVE-2021-33348,0,0,8bdc260900608e8d82c45b0b21fecdd8e10188f492e8d2615bdc1dfb29eb15b0,2024-11-21T06:08:44.213000
|
||||
CVE-2021-33351,0,0,f370fe0d6a8289ccc56296db68d4e0bc5ce18771846d15f045f9b4c4b723e2d7,2024-11-21T06:08:44.347000
|
||||
CVE-2021-33352,0,0,e3342c76a0f6b98a2e94354e252afbca2b229d9c481d909a1d86aecfd13b5f7e,2024-11-21T06:08:44.500000
|
||||
CVE-2021-33353,0,0,6951e8203079c58a35dbe0304da17768307462a20c915722af4d010194176a41,2024-11-21T06:08:44.643000
|
||||
CVE-2021-33353,0,1,7c2c4b7896620124533885d6bd3de4e33e6d14b0e7ac5f792a930ee530eb7192,2025-03-04T22:15:34.960000
|
||||
CVE-2021-33354,0,0,c809b0d19ab7f7969b4f1de78dc5b988bff2c1c93cea1c82f6d27d58f0f657ab,2024-11-21T06:08:44.790000
|
||||
CVE-2021-33356,0,0,2e117bb974dabca13136cd4702ccf7267b60e0545c77f5bd84e8d8cf5896c37c,2024-11-21T06:08:44.957000
|
||||
CVE-2021-33357,0,0,6ce59078ced6558e26a0b267e0080720480f04604b93a17274c1b3c9e4eec51b,2024-11-21T06:08:45.140000
|
||||
@ -177424,7 +177425,7 @@ CVE-2021-33635,0,0,1b1ad1f50ba5a3158e4c287d7f43d905e1f46c19119b8cd62d0915a9d4cbc
|
||||
CVE-2021-33636,0,0,03d6025bda1a836ebebddc121f16e2f8bcb94e228b71af69f387e2f387aeee32,2024-11-21T06:09:14.883000
|
||||
CVE-2021-33637,0,0,3672fcc36c71d2a5aac94b1c62030a1c55cb16ccb63697545c5c8a85466eb567,2024-11-21T06:09:15.040000
|
||||
CVE-2021-33638,0,0,41eae936d9cea6bd09226ef4f14971fe145986524633bb507d17a2d31077087c,2024-11-21T06:09:15.173000
|
||||
CVE-2021-33639,0,0,14a8f852652c9dee6a1897342b1c4848b5ea4cf8c5383f97cd5849fa895351e8,2024-11-21T06:09:15.307000
|
||||
CVE-2021-33639,0,1,1ff6a9f2cf1a524d0b2ed023dee8175f550111065a18244476c891f5c77049c2,2025-03-04T21:15:11.043000
|
||||
CVE-2021-33640,0,0,960eea859801957bdecf92c8ce9a368f9c2c5b29dd3e3701ea0473fbdff1ffc9,2024-11-21T06:09:15.430000
|
||||
CVE-2021-33641,0,0,736448e83dfbd3e140b2921a3e26eafc4bf84852038e91c846ab54d019770f60,2024-11-21T06:09:15.587000
|
||||
CVE-2021-33642,0,0,4a30b814e330987a203593889177ca0d4efcaf1b36cbd5214570cd7aa57d5939,2024-11-21T06:09:15.707000
|
||||
@ -183611,6 +183612,7 @@ CVE-2021-4171,0,0,d6973b89eda8573f0cc77737b23b712a87bd9e9baf6501828b75ab17d50f2c
|
||||
CVE-2021-41714,0,0,e48756d244dee85ea57debac32e4d12267f4eda2b8e124373427985b69ebcaad,2024-11-21T06:26:39.217000
|
||||
CVE-2021-41715,0,0,db879839d02c790808ec1a011ea57dfd852a0f1c316a65ebea370d2db32e0b3a,2024-11-21T06:26:39.383000
|
||||
CVE-2021-41716,0,0,d34bb8fb71dd2027fe9e5668ef7fdcc1793fc7e22897bb2b84d6e0b5904561bd,2024-11-21T06:26:39.543000
|
||||
CVE-2021-41719,1,1,b916032008ccf43406d636af25ba4f943ae3db0f0daa6c0e01de662b7db596f0,2025-03-04T21:15:11.237000
|
||||
CVE-2021-4172,0,0,e96e216ec67c77f4d12066b034c9783c3a8dfe54a2298c3700ee210d6d4468a8,2024-11-21T06:37:03.893000
|
||||
CVE-2021-41720,0,0,80ff269557dafca1f62fd75c530f1f3954044fc80a2b1af1977e3aae370d8856,2023-11-07T03:38:59.713000
|
||||
CVE-2021-41728,0,0,ad5a0dd3cfbdea3c0e75417edb410657010dbedf6d45fb8c3988fe77fa9dcf34,2024-11-21T06:26:39.710000
|
||||
@ -187121,7 +187123,7 @@ CVE-2021-46868,0,0,f0ef3dd45f64ad741bb81b50cf78f63c19bd438fd32124d2f17de81f953a6
|
||||
CVE-2021-46871,0,0,05c2919904c965d0b69570703d46258f27345788e02af9d544a23baf7cc1224f,2024-11-21T06:34:49.383000
|
||||
CVE-2021-46872,0,0,fd01e6b4d7cf956efd9d67ee9685007e549687974e41eefa9b4ee93344bfe2ff,2024-11-21T06:34:49.547000
|
||||
CVE-2021-46873,0,0,bd696af11164da0889d93481e3bf2473217e799ee3de555882260a6e2f73ec72,2024-11-21T06:34:49.717000
|
||||
CVE-2021-46875,0,0,f78f3d704204f75728e25a4d5fa2b64bf612c39bae6e7636864b1d0cddf98817,2024-11-21T06:34:49.867000
|
||||
CVE-2021-46875,0,1,cd128e15ae16beb3eef5e9c0528dea9bb7a3bcbe28dc60234951f81ea8a515de,2025-03-04T22:15:35.267000
|
||||
CVE-2021-46876,0,0,55d623b0fa818c0b029b6a0df44287071e00d9c5b9308c4393d59d6487a3bc62,2024-11-21T06:34:50.013000
|
||||
CVE-2021-46877,0,0,d38d83f8552fd712480fd15b31c69fae523b8d5890dcdafac1ebd8aa441c7eef,2025-02-26T19:15:12.823000
|
||||
CVE-2021-46878,0,0,78f663683c9ae191c79be4d598f09b9b821005339cc94153cd9666f6c0ac2049,2025-02-11T21:15:08.843000
|
||||
@ -209000,7 +209002,7 @@ CVE-2022-43276,0,0,5d85c76de9f88d50bdcdd31ba939101c5863a3950667e27b370b33c9c9b0d
|
||||
CVE-2022-43277,0,0,225f1afe59053822a21f0aa0a5279acbabf65c95787f162876d9a2fa96159cea,2024-11-21T07:26:11.033000
|
||||
CVE-2022-43278,0,0,b7e2aa9a730bbdedac5a203acea323799e54d098c81f5e1f7b8370971fb0b9b3,2024-11-21T07:26:11.190000
|
||||
CVE-2022-43279,0,0,b9806c379fdb337f3a815999e8a7364d89f8bcc2f957d21959960d8ef89b3b53,2024-11-21T07:26:11.347000
|
||||
CVE-2022-4328,0,1,c7890d21e9935f0470f840b31f6d736decff1a85abf42fdd20b3e761967beab7,2025-03-04T20:15:35.163000
|
||||
CVE-2022-4328,0,0,c7890d21e9935f0470f840b31f6d736decff1a85abf42fdd20b3e761967beab7,2025-03-04T20:15:35.163000
|
||||
CVE-2022-43280,0,0,0a8cdb3da0a3d98dccf1325b5796453b879146d561a247f5c67a0c04b850a9c3,2024-11-21T07:26:11.593000
|
||||
CVE-2022-43281,0,0,9fdf1c3d16ce3685ff656df7152ad22a2b823909c73efe39786aa51e101e5700,2024-11-21T07:26:11.757000
|
||||
CVE-2022-43282,0,0,57af2ac3594ef0651718107bf670bf9ba3df981b4ed846cf8a2a5c9d1f4e39d6,2024-11-21T07:26:11.930000
|
||||
@ -212505,7 +212507,7 @@ CVE-2022-48361,0,0,6b034f2ccbabb2b0b4002568b86f68ea980901a49de34e86421633d13aeef
|
||||
CVE-2022-48362,0,0,a38eaad973d052fb8eacb61a27cb037ec8505981e43cf64cdd466cc188539039,2024-11-21T07:33:15.157000
|
||||
CVE-2022-48363,0,0,ae4c901f61cd4343186e6d40e9f444a91647523881c8c467f0d831123ad34cf8,2024-11-21T07:33:15.307000
|
||||
CVE-2022-48364,0,0,389a006950dbd3156debcd5c772205d3b42a4dd07de138f247cf906a4a434f6b,2024-11-21T07:33:15.467000
|
||||
CVE-2022-48365,0,0,b935554843b9537d40e30b971626a708eb32cc0a7c1c7683e5ed169f2896d8ea,2024-11-21T07:33:15.613000
|
||||
CVE-2022-48365,0,1,eae53272272059ee540fa751ff72ac0ef2f33a7f485342c55fa20e700679c0da,2025-03-04T21:15:11.377000
|
||||
CVE-2022-48366,0,0,40b8dcee156b44165a66a59dac89249a9f52ab12258de1e17f30c4c54cdff5b5,2025-03-04T17:15:10.980000
|
||||
CVE-2022-48367,0,0,d82067646b346a8279d79bfe5c8a110a939fc1772a639bf1a5605ff44510a41c,2025-03-04T17:15:11.203000
|
||||
CVE-2022-48368,0,0,cfdf0fb927519fcc4fbf933573497ea0bbcaa6b18dba88de4bcc45d5ac302c81,2025-01-28T20:15:28.660000
|
||||
@ -218417,7 +218419,7 @@ CVE-2023-22889,0,0,6716b509ed5c405bd04ae933068b80977723c43438fbe0730e49946a4c10f
|
||||
CVE-2023-2289,0,0,6013867f705d189ecb694a4c75caacb35ccfe1ab1779a608673144f0d10ca3f4,2024-11-21T07:58:19.060000
|
||||
CVE-2023-22890,0,0,594c803ebe43843c407dd09796d90846ed3fbf28e4010f104f3e4bc11928c0ed,2024-11-21T07:45:35.493000
|
||||
CVE-2023-22891,0,0,6b960d5609fef2c7e51785d1776f82b9a9dc1c19fcf013319b8201924bfe16d4,2024-11-21T07:45:35.647000
|
||||
CVE-2023-22892,0,0,bed5e7f25e629ecc89f6e80195ccbc99ade99e8eb19a2d0ed5a2c1e0b3697bee,2024-11-21T07:45:35.793000
|
||||
CVE-2023-22892,0,1,c963711bf8dff126d953038745e504027e8bd2d954a24cb7a184225e893f5abe,2025-03-04T21:15:11.610000
|
||||
CVE-2023-22893,0,0,c3342eb32834df651051500937183e326b6ea2c855ec70350295dbe77a89ad74,2025-02-05T17:15:18.133000
|
||||
CVE-2023-22894,0,0,83a9bc4d6f652a5da819c8e1af0fc9a362d82f490b3fc0d16b028bb916c464fe,2025-02-05T17:15:18.590000
|
||||
CVE-2023-22895,0,0,56d189325d26815b5c06ca899e2abcb81a36620a30974be41b02b29e9483f523,2024-11-21T07:45:36.257000
|
||||
@ -218616,7 +218618,7 @@ CVE-2023-23324,0,0,5d48828077c8be90528b04711cd87bf712a72c1a2913ba049bb8d673723ba
|
||||
CVE-2023-23325,0,0,518dcf9a2af100841b84c73e77aead56932b04d21c668e4e673d1b9b408ecbdb,2024-11-21T07:45:59.640000
|
||||
CVE-2023-23326,0,0,1a4e39362f1c8791076d367fc23df696eb59e6884fa5b2335a9fcfd232e3f37d,2025-02-27T19:15:47.783000
|
||||
CVE-2023-23327,0,0,6da2ce2cc26156b13a1b95f743a9753609f58547ad519cbf4c93b3a27b663a72,2024-11-21T07:45:59.933000
|
||||
CVE-2023-23328,0,0,8b7f9244b0915a9b56758c5e614f7cb7fe95d9dce3a04a7593556df54a35d4ba,2024-11-21T07:46:00.090000
|
||||
CVE-2023-23328,0,1,93bd54281b2a6b33993da36fd1ee5c9aba3043faf08f089dbbd35a213677db25,2025-03-04T22:15:35.720000
|
||||
CVE-2023-2333,0,0,49815d35ba5652045e1256f3d4e37c7e202552cb53ecfa1b0d6fb27fcb89f551,2024-11-21T07:58:24.400000
|
||||
CVE-2023-23330,0,0,4d49459152c00a8d0e982eb0ce8f3681dcb11541a12b5dcd275f47bba39075ba,2025-02-18T21:15:14.247000
|
||||
CVE-2023-23331,0,0,b84a1a7634d01037bc3f1c88ee1e839a2ef2a60e14da401de106f78681906d84,2024-11-21T07:46:00.377000
|
||||
@ -221606,7 +221608,7 @@ CVE-2023-2695,0,0,1a03e6ccf425b7efab4b2b3d34d6ccd4c483f382d13af42c5c783fbc5e3e28
|
||||
CVE-2023-26950,0,0,776d2f7b141aebc20febebface8c5cc1214b6003cf0611b92d93d7ca6b16e7ba,2024-11-21T07:52:05.960000
|
||||
CVE-2023-26951,0,0,e1adc49b9103f912e0f2aa00fe9d939d9cab78c809f7f4a57db4e408eaae3d8c,2024-11-21T07:52:06.123000
|
||||
CVE-2023-26952,0,0,9a77e11b71d30a33fc14ddb60eb3c430a4af1c5011ff90903a5c4573a4441c86,2025-03-03T16:15:37.590000
|
||||
CVE-2023-26953,0,1,df116039a3d5e2187601aea238f6a2dc84108655cb925d05b197fe653c3aa647,2025-03-04T20:15:36.217000
|
||||
CVE-2023-26953,0,0,df116039a3d5e2187601aea238f6a2dc84108655cb925d05b197fe653c3aa647,2025-03-04T20:15:36.217000
|
||||
CVE-2023-26954,0,0,25be800d2a27b5a2697c9d918f8a2349a547ae4f9a78abb00c6ceaad8c48b070,2024-11-21T07:52:06.593000
|
||||
CVE-2023-26955,0,0,b8f41864dbe1598322641771160d9e7a2e547f6259bb94db906df77dcc968550,2024-11-21T07:52:06.740000
|
||||
CVE-2023-26956,0,0,357b2a07c4dff39d60a75c8ab45811278d23b3855aa28ce615f60743efe78a52,2024-11-21T07:52:06.880000
|
||||
@ -224557,7 +224559,7 @@ CVE-2023-30627,0,0,b179551ac2b2aec7f243ff1595f134b80bdcf8367ebe0ab868616ab5fe5c6
|
||||
CVE-2023-30628,0,0,acdb1a51d868c185cef5580412bfd3a1adac8efeb23d4e4d62dab4098c169b96,2024-11-21T08:00:32.690000
|
||||
CVE-2023-30629,0,0,db8d47acde7b3fee691ae50fd114be204f5537a7a6a8f106752ff53ee0b6dbcc,2024-11-21T08:00:32.820000
|
||||
CVE-2023-3063,0,0,cd7fb32daee65efff903827a32e072d7912d2ff2abce0c6d7779ba3dd71b4c62,2024-11-21T08:16:21.533000
|
||||
CVE-2023-30630,0,0,358a6893f9457f664e23c612f9d096976ea338a84921b14ae754ff90f00238ce,2025-02-07T17:15:28.740000
|
||||
CVE-2023-30630,0,1,e9d5c7c15e40c974939f85897f47959e11abda8a12f7e2deba572dfe47747548,2025-03-04T22:15:36.017000
|
||||
CVE-2023-30631,0,0,bfc0d3beeb5e32392077de35a24d682dc59521e8c032d8e7696231220add5d78,2025-02-13T17:16:25.470000
|
||||
CVE-2023-30633,0,0,74099a59b3b177109852946fc25b65f30a6716f2451544a4a77fa813ae4ce4f7,2024-11-21T08:00:33.987000
|
||||
CVE-2023-30635,0,0,ab8703ab2fe3f8b696f825d26e2348963d273f0de2940555f66172cfe52d1f89,2025-02-07T17:15:28.943000
|
||||
@ -225887,7 +225889,7 @@ CVE-2023-32337,0,0,a01aa4bebe213f4039138b0eb96d92b230dde3cc35fc23554071c5e999080
|
||||
CVE-2023-32338,0,0,8dea335f01070595c6ec59a7d3c53171b9fb9fbff328f6bd4351efdab3957994,2024-11-21T08:03:08.703000
|
||||
CVE-2023-32339,0,0,56e5e5057225790255da00ffb858773794e855ce0038d02d9bcb9ad217984b74,2024-11-21T08:03:08.850000
|
||||
CVE-2023-3234,0,0,0fa1466c040a99f283157c1612582306e508dc74f92b2c2292dbaa2cbe7e5460,2024-11-21T08:16:45.660000
|
||||
CVE-2023-32340,0,0,f0c449ea23d7ad1f8248413bf0940f60153e0bf8bddb719986298e3bfed480a5,2025-01-23T03:15:08.290000
|
||||
CVE-2023-32340,0,1,d324af44d4f9440a5f091bfa20e1025ba656c02cea3fd8022695f9a982e24666,2025-03-04T21:36:47.970000
|
||||
CVE-2023-32341,0,0,d38b9ebaa1a9c25da70da76b9a1cefb48113ed83bfcd9e5e955b91cec0095134,2024-11-21T08:03:08.987000
|
||||
CVE-2023-32342,0,0,cb80571e1573bb95c1a667148885dc625dc45a1310587dac64fa32bf27bd1e3f,2024-11-21T08:03:09.113000
|
||||
CVE-2023-32344,0,0,7bc8b77d90defd48ee4bb5a1611c065560350060add6413ed28dc594c84c459d,2024-12-17T18:55:38.543000
|
||||
@ -227109,7 +227111,7 @@ CVE-2023-33834,0,0,338462881466f026d06fb0a898a81c64748a20178a06738e4a164f6a84447
|
||||
CVE-2023-33835,0,0,432bdcbfe47f544f7e44c279aa8783e94976046ffda41560fd11ed4500d9a992,2024-11-21T08:06:03.170000
|
||||
CVE-2023-33836,0,0,8e6bae324546cbe4044fe7403966767062ff69440e841f8fdf3251d5b7aff7cf,2024-11-21T08:06:03.297000
|
||||
CVE-2023-33837,0,0,3e72af0b5778583b8a5be70ca04b487c7ba841372620c26c1dd17212a1bc0b68,2024-11-21T08:06:03.417000
|
||||
CVE-2023-33838,0,0,8add7de0dd859f608c535f12d4a3f26571c1c5dceb418af141c3d977ba8e3bc0,2025-01-29T02:15:26.640000
|
||||
CVE-2023-33838,0,1,b8bbac79bea1a0bbf9b0f3d05e4d76e8fcb59f6fa1104442f613e229ab8cf466,2025-03-04T21:58:37.043000
|
||||
CVE-2023-33839,0,0,55118ac57814892c7a86cc7191590c87f7473353289e127fe908a59566e253fb,2024-11-21T08:06:03.540000
|
||||
CVE-2023-3384,0,0,43976c80ef1dd4016470fbdde9d42c2f2727e9da019d45b7389b90b07d63defc,2024-11-21T08:17:09.093000
|
||||
CVE-2023-33840,0,0,24c35b3cfd8bae5bbdb3a25483622775cad57e6faaeebf192f416134d4238003,2024-11-21T08:06:03.657000
|
||||
@ -228002,7 +228004,7 @@ CVE-2023-35011,0,0,595611a84f9ba8a89ca02487067584cc7500bae92cad139dfc4bf7e0af400
|
||||
CVE-2023-35012,0,0,be4d3ebe65d22f0da5142f18515ee073275ab0ff192c73473ba47b80d829de5c,2024-11-21T08:07:49.463000
|
||||
CVE-2023-35013,0,0,3c60a648d2b0bc01d2542f4e2a303e707c86c7b8e21e66a227569ec81a62646b,2024-11-21T08:07:49.620000
|
||||
CVE-2023-35016,0,0,7d3b091b2dd76f99668f6df38b8be61e97d884e5c88c73d95ac35cad3586a7c5,2024-11-21T08:07:49.753000
|
||||
CVE-2023-35017,0,0,c305b900f25af3be568ba6084a99f154f424196e4c77d6021676685e00da2135,2025-01-29T01:15:07.667000
|
||||
CVE-2023-35017,0,1,d0ab0e61fdb3c9ec84c06431069e353d8a4d90610baa0b659c41e66e268d7d2a,2025-03-04T21:58:37.043000
|
||||
CVE-2023-35018,0,0,0316c36a9fe4f0d9da4560d3103a2672e6aa994f14ca6f76a90253e57ae24d01,2024-11-21T08:07:49.880000
|
||||
CVE-2023-35019,0,0,c4da68ced56941d8f8f54680af70cc154d4ac5d54e9158020c5a33b32fce9f82,2024-11-21T08:07:50.013000
|
||||
CVE-2023-3502,0,0,79a130f0fcdd8a169bdb9aef276575323be3ab9e99f90f043f6135ec6e5d2b45,2024-11-21T08:17:24.263000
|
||||
@ -229764,8 +229766,8 @@ CVE-2023-37407,0,0,4d11a36e41fa3acc5f564431e82d0f4e97124ab39df0cb5f293ada9821e2c
|
||||
CVE-2023-3741,0,0,1ddd4fff44ed6da7a38f77e1cd87d0e1a51a839bcb171f62bcdf113f89dbd961,2024-11-21T08:17:57.493000
|
||||
CVE-2023-37410,0,0,4259c5a1111c28363272e35fbab32b984c617cae11efedba0dfffe4bceca6df3,2024-11-21T08:11:39.267000
|
||||
CVE-2023-37411,0,0,1663df42344987669b4b5f3ae2bb86174a111a736d50fa35c86aaf557197896b,2025-01-14T20:22:28.020000
|
||||
CVE-2023-37412,0,0,7b8c0d9cd93118c36420dd8041f2e89d7ef5cb77a92421f8d6f1b10f5ba80d3e,2025-01-29T17:15:26.657000
|
||||
CVE-2023-37413,0,0,9c84c5c5127b762322cad097019a1b26e0c795e205cc1ffb3ed7b1d30d3ce2e8,2025-01-29T17:15:26.800000
|
||||
CVE-2023-37412,0,1,b75d27f7a63464dd1a1216b50732f3987589667e580083e9b8e1caa97582cdcc,2025-03-04T21:43:48.913000
|
||||
CVE-2023-37413,0,1,e2af5cd1c6f2062e3c083c737025d14fcd4fee20317a281ed29dc1f5f39dc370,2025-03-04T21:43:48.913000
|
||||
CVE-2023-37415,0,0,fbd26b9efa145d7333ca6605a4c1d9c7b340d5ef61e72854c29f2472607ffb19,2025-02-13T17:16:44.760000
|
||||
CVE-2023-37416,0,0,6181a6944222013b0541f2f7c4616297cf8227fdaa1404a19c28e419e3a98a69,2024-11-21T08:11:39.767000
|
||||
CVE-2023-37417,0,0,289ff2c2e0a474d67ae1359d72b3dbd2d6b12d7fe05b46c2cd25b415e5c0ebe1,2024-11-21T08:11:39.897000
|
||||
@ -239485,7 +239487,7 @@ CVE-2023-50305,0,0,dabf8219efdb3dd68521f2a5ca58bceb1db63561a1224bc65ebbdd00bf414
|
||||
CVE-2023-50306,0,0,232289e12c03f60066803c3276293eaf16ca3d82db14d055689f581ac2e8d3f5,2025-02-12T17:01:45.710000
|
||||
CVE-2023-50307,0,0,54dcb069378ef7ce7cf1e378a429a1153c8dcdc770f8f93df646b7251911e08b,2024-11-21T08:36:49.880000
|
||||
CVE-2023-50308,0,0,f0daddfcaa94c1b3e4528be72f010ad2604cb01fd116e7d24805892a037010cf,2024-11-21T08:36:50.020000
|
||||
CVE-2023-50309,0,0,3710913107524245e5271ccebac144284551995d27b55911d0ad98d408e701f7,2025-01-23T03:15:08.573000
|
||||
CVE-2023-50309,0,1,df1f5d6e8f6471be7fd38838dbaf45480066146485da40bf66433fbbc237d6fb,2025-03-04T21:36:47.970000
|
||||
CVE-2023-5031,0,0,c15eb3bf24311ad5ba1ff97f455276e30339f2370acbcbb30160cc9662735c68,2024-11-21T08:40:55.833000
|
||||
CVE-2023-50310,0,0,ee63583edc72c7bb2dd2fbd446b3bacc51b87b3209164901da3eca6b0c813dde,2024-11-05T16:40:57.533000
|
||||
CVE-2023-50311,0,0,bfcc9d072f5a2d893dd33392360fe36f36ce6d9885fb951e98233624c4f9ba2b,2024-11-21T08:36:50.263000
|
||||
@ -243013,7 +243015,7 @@ CVE-2023-6944,0,0,df2b7229c517209019fce35466d5ffbbde525fb676023ff8b16393577f2b89
|
||||
CVE-2023-6945,0,0,eee61cdc8cecbbaa6c3be1b94704de1a8c4d868a06c2b4c07233fbc728fc898a,2024-11-21T08:44:53.660000
|
||||
CVE-2023-6946,0,0,d11da4da13dc038beb075b5af1213743f8b40d251e7b7ea3b52df4c6657ce74d,2024-11-21T08:44:53.810000
|
||||
CVE-2023-6947,0,0,681ae83ea96dd1197213cace9f29ac2d9a0cee2cf919317601ee722b94cb412c,2025-02-24T18:22:30.857000
|
||||
CVE-2023-6948,0,0,fe5733c12b0ee41b32ac32792a9499fb1c2fbb29abf274a6083757f7f49e4eea,2024-11-21T08:44:53.957000
|
||||
CVE-2023-6948,0,1,9cc65931cf8a0e00e25f08e7233eac963d62013a0e18fcf910075a0fbc9942d6,2025-03-04T22:15:36.313000
|
||||
CVE-2023-6949,0,0,078850d39f1204331fbc98d392a0469ded8443843d8a5c473dc39bd1460bfcd6,2024-11-21T08:44:54.107000
|
||||
CVE-2023-6950,0,0,abe9e2e0d7383949fcddc1e9a1bdb75c1a66b8207ce4e95629fab56a059c4d2f,2024-11-21T08:44:54.263000
|
||||
CVE-2023-6951,0,0,5cf81bbb22b08bd5b560463dd9595ff1b504507f72343e9bcf9ea7dcc9ded4e0,2024-11-21T08:44:54.380000
|
||||
@ -247603,7 +247605,7 @@ CVE-2024-13679,0,0,86229dc69131243d51d94ef8cb1d9ef15ccbc5bcaa679afb8c5258e078722
|
||||
CVE-2024-1368,0,0,bdafec7323bf6060c2602bb232f81dd53afd410b7ab713f1778c3940b8b89a37,2025-02-11T19:44:46.867000
|
||||
CVE-2024-13680,0,0,74b46f50e9e8190b451f914492933fe4a5d6196724bd1fb0611ec5e03b0be866,2025-02-05T17:37:37.827000
|
||||
CVE-2024-13681,0,0,f9b5888e5600eddb54eab02d107b8219d0a2ff1dd821d3ec69a804f466f47fda,2025-02-21T14:22:38.737000
|
||||
CVE-2024-13682,0,1,8aaf6dfc2318ffbd59ab18bd7982cb8a58fedb73e001992aa6ad754b2c953bb8,2025-03-04T20:34:08.907000
|
||||
CVE-2024-13682,0,0,8aaf6dfc2318ffbd59ab18bd7982cb8a58fedb73e001992aa6ad754b2c953bb8,2025-03-04T20:34:08.907000
|
||||
CVE-2024-13683,0,0,60466d727e6596c848a3b384eab039ecd16e7bfc142b0f259b6e51a93695759b,2025-02-05T17:18:36.090000
|
||||
CVE-2024-13684,0,0,29bd0282adaed7c145caec3d49c703050082025937ad2fcfe46d4b20fa2f4a61,2025-02-21T15:57:57.993000
|
||||
CVE-2024-13685,0,0,50ccc6b12c4c95fb069a8c449d3bc8810677414e2a7ace0a2bc79b90508fa4b7,2025-03-04T15:15:18.760000
|
||||
@ -247643,7 +247645,7 @@ CVE-2024-13720,0,0,b870b55deaed62451c7cb49e48fdc621ee68a35c7c8a7750776cbfa21cdbd
|
||||
CVE-2024-13721,0,0,7853af92862fbd0b23333c3c99089ce31ef5cb7b10d0753f382c5079c3e0f6ec,2025-01-25T06:15:27.860000
|
||||
CVE-2024-13722,0,0,fac6574297fad520484336a8f32a80c91be5643d31918d246727bb21994df2e7,2025-02-06T15:15:12.867000
|
||||
CVE-2024-13723,0,0,f977680e0d30dc0600d1d9cea9477509ddf62122fdeae5be3fea5ec8d4e5f870,2025-02-06T15:15:13.050000
|
||||
CVE-2024-13724,0,1,2b3eede8759ae6c30590769eb9aab05e1a7b386a27c7e1b434fa46e7c9b63efe,2025-03-04T20:34:08.907000
|
||||
CVE-2024-13724,0,0,2b3eede8759ae6c30590769eb9aab05e1a7b386a27c7e1b434fa46e7c9b63efe,2025-03-04T20:34:08.907000
|
||||
CVE-2024-13725,0,0,3ae67647de598849d6499031064f2ab84aae12fe373705e9378e4edd2b924528,2025-02-21T15:56:24.220000
|
||||
CVE-2024-13726,0,0,6f933b5330ba37986acbe4c29892bcb7173ac142380eeae5f3195ee1c4836999,2025-02-19T22:15:23.043000
|
||||
CVE-2024-13728,0,0,fc3600c0f61ce7085e8da7204bc76ef6f37fa32ad9251533dccbbb08ac5789f5,2025-02-23T06:15:08.710000
|
||||
@ -255633,7 +255635,7 @@ CVE-2024-29301,0,0,0b8fa97e724a0f2d24e37ca1a4df5c4ca78204e3fd2679571d5516d23f066
|
||||
CVE-2024-29302,0,0,a396970a1bfb9e586dae33dbbabcbcf0c71d859b9e4ecbbb9f7753a6e28b7a9f,2024-11-21T09:07:55.880000
|
||||
CVE-2024-29303,0,0,d06549f14e9cda2e75b85b1c6ae9ba33f16a0dcc3d18f7cf7ea9a575fe2c0e15,2024-11-21T09:07:56.093000
|
||||
CVE-2024-29309,0,0,0082805f5fd607b4a8b696afc756ce0148248a6498a1ac3f5f6f79133d44ca30,2024-11-21T09:07:56.297000
|
||||
CVE-2024-2931,0,0,06ccc2dcd781809116ebbd74f9b3f6ebb8a8544b117075c949793d8040784fc5,2024-11-21T09:10:52.123000
|
||||
CVE-2024-2931,0,1,f5154698ded0d52412d5cb7de1344da17cba1944b851f5064ce758547d008c30,2025-03-04T22:15:36.563000
|
||||
CVE-2024-29316,0,0,fcf08fc934238242be85211e527308a25a1845e213d3df0567dedd77f3e73990,2024-11-21T09:07:56.540000
|
||||
CVE-2024-29318,0,0,6b7a8de3b5f73b6e00b5cb422aecae397836bdfb0435783acd4fb94fb5e7b3ca,2024-11-21T09:07:56.760000
|
||||
CVE-2024-29319,0,0,69fb3b2cb652eb32dd1d717d0873133a6783ff4c6e6a16c234669dea86327af7,2024-11-21T09:07:56.937000
|
||||
@ -264725,7 +264727,7 @@ CVE-2024-41143,0,0,8799e9b8f93d667e7053f384d3b50025554822f122dd37c394e433231808c
|
||||
CVE-2024-41144,0,0,d705e4f77b5a2c06974e9e65f896eaf4fba04d31882cccffe75db10bb34113df,2024-09-04T17:25:48.123000
|
||||
CVE-2024-41145,0,0,e583948039235f072af443025bc0ea6bb5630b5a84bc37fad1ee2b5dbca5d3b0,2024-12-18T23:15:07.970000
|
||||
CVE-2024-41146,0,0,b94819261ed093bad14667a8628fb4c8e2f7195a09c74edaba0fc803a2fc4bd7,2024-12-12T02:15:22.880000
|
||||
CVE-2024-41147,0,1,df440930f10dc8dcb645681a9cf98ce9032e5f5ab6a204ead504e28df31f6121,2025-03-04T19:15:37.117000
|
||||
CVE-2024-41147,0,0,df440930f10dc8dcb645681a9cf98ce9032e5f5ab6a204ead504e28df31f6121,2025-03-04T19:15:37.117000
|
||||
CVE-2024-41149,0,0,a971cf0aedf9cee5d8fa4c27e9a50e30f9e939e67806350993a8176bbcd4f77c,2025-02-11T16:15:40.073000
|
||||
CVE-2024-4115,0,0,ffb5f36fbe2984a7256aff205f47c39ef178d82820690299ed15db732f03d6a7,2025-01-15T18:42:08.110000
|
||||
CVE-2024-41150,0,0,b3fa487187a6e523624f7e09b49e1bcf30bc22e86ed50f81eb7ef85655bb3043,2024-08-27T14:35:09.013000
|
||||
@ -267956,7 +267958,7 @@ CVE-2024-45421,0,0,b71c44d8233793d60baaa2910b35613747d6bdecc2b9f60906a3406edc38d
|
||||
CVE-2024-45422,0,0,852733e0a4a28635312204f04762ccb7170e0a34bd9b9b76b76475e8b074cc76,2024-11-19T21:56:45.533000
|
||||
CVE-2024-45424,0,0,73b37c04e0e6176b52b3857a0ea15264132a1aac6e0190535b955d4e369170f2,2025-02-25T20:15:35.570000
|
||||
CVE-2024-45425,0,0,6df3a853980c91f9b85f63bed74a9f5f0999718133ed38c82f2ef7ebdcead281,2025-02-25T20:15:35.753000
|
||||
CVE-2024-45426,0,1,608533929bad9a9fc0c50fabf9bdc8dc68202d6474456aa729268902afc736c5,2025-03-04T20:42:55.570000
|
||||
CVE-2024-45426,0,0,608533929bad9a9fc0c50fabf9bdc8dc68202d6474456aa729268902afc736c5,2025-03-04T20:42:55.570000
|
||||
CVE-2024-45429,0,0,b23bb94fab5b564541d550cee389f2e1055de24c768b6da2dee7d47222a5cd9a,2024-09-13T20:48:05.387000
|
||||
CVE-2024-4543,0,0,9bce683dcafed21194de784f36310cf5dc5033963875cc73daa2b50b23cbbe10,2024-11-21T09:43:04.340000
|
||||
CVE-2024-45435,0,0,37f0d591070e12a5a02e0dabd27d209725a2e9e84d47f1671760e29b19f30212,2024-09-03T17:23:36.073000
|
||||
@ -271827,19 +271829,19 @@ CVE-2024-50671,0,0,99782c17088a8d91d172d01f5a082085329526fd6f7189288ae0f91a8aaa1
|
||||
CVE-2024-50672,0,0,a506f4d2b4e62571040ff3dd4b935bbaea397a7aabe2668687c8152c3cc151d7,2024-11-27T17:15:12.563000
|
||||
CVE-2024-50677,0,0,41d5addef3c1d4fcaf4d23ee7f34aa0575b53eb368f3af05bd4b5c5da2166101,2024-12-06T17:15:10.180000
|
||||
CVE-2024-50684,0,0,5a61a50d007de96e358b48a746bcc4b0ab7bfc7b760a2f7b5136cfc32170c3a6,2025-02-26T21:15:17.267000
|
||||
CVE-2024-50685,0,0,8bd1206fab701fc7387096fbdf4dca94fcec7a23cb892665fc6488169883273e,2025-02-26T21:15:17.373000
|
||||
CVE-2024-50686,0,0,44ec82b78dbce016d58e0e2c71c1d132325498e47fe5eaa1803905854b57b557,2025-02-26T21:15:17.470000
|
||||
CVE-2024-50687,0,0,960c0756bb9648a789e406e7a051b9355a5aba5dc4487964588cc54a78726986,2025-02-26T21:15:17.557000
|
||||
CVE-2024-50688,0,0,ba987f5447a5e43fd6a73c884338ed64ae301837df386f86f17f3bc11ad07a20,2025-02-26T21:15:17.647000
|
||||
CVE-2024-50689,0,0,38f280fdbdf7956ff2c033ca7cd9deef79d621c86980c4f51a8e75a28ab6be1a,2025-02-26T21:15:17.737000
|
||||
CVE-2024-50685,0,1,59e9595e40a823d9905fea8d75a88e2fb2c63033537cbd78efe9d391fbfb163c,2025-03-04T22:15:36.813000
|
||||
CVE-2024-50686,0,1,0171ebeb1b945891d00c815a65f69b73d47e2ab2940d7c6aed13c26fe5622bea,2025-03-04T22:15:37.017000
|
||||
CVE-2024-50687,0,1,f99c76c74640587e351d9ae9128e2b3ddbc7b6f5fac68e17f56141a62e1ebe8f,2025-03-04T22:15:37.213000
|
||||
CVE-2024-50688,0,1,ebb3cbac65642e4e45cf19c2e84a0958da1d8bca13b5eb44adfa4736383f63eb,2025-03-04T22:15:37.413000
|
||||
CVE-2024-50689,0,1,f478ed3c5b5e41ef747ba618605ced4afbca0e040632bebe3ac8f0d1ebfe7040,2025-03-04T22:15:37.630000
|
||||
CVE-2024-5069,0,0,cb203d2fbd25b3fb824d6eb3c18b6672404d2707479da947f8f686d32b78e229,2025-02-11T15:25:17.363000
|
||||
CVE-2024-50690,0,0,ff35d9179c06042a7dad20271b2fa37f4aa6b5d7892a2883702507182dc897fc,2025-02-06T22:15:38.033000
|
||||
CVE-2024-50691,0,0,ab130a0aeae9b4b84741a5675d2341974d91a8d1ea1d7aa7de0b4ef516e8051e,2025-02-26T21:15:17.823000
|
||||
CVE-2024-50691,0,1,38cb1cb6ef39a0677c6fd4a6d88fb5e8c11ea09c8c2f8777d02eeefd15a98a20,2025-03-04T22:15:37.823000
|
||||
CVE-2024-50692,0,0,b4b232b8fd20cfc83ca910c8b78001cb2d8096ac3932e97d2b610a65820b9588,2025-02-06T17:15:19.313000
|
||||
CVE-2024-50693,0,0,fb95a2bd15b7d351e5d74d6d4b28ac193e88eda7b022e5625ea83f5917eac6af,2025-02-26T21:15:17.910000
|
||||
CVE-2024-50693,0,1,972928eb76fd2b21326eab1c6fec2b24cbca464c838f8b320dfc2a560f318d7f,2025-03-04T22:15:38.023000
|
||||
CVE-2024-50694,0,0,b192cf8569bb942756ad1070033fb5b23a0338a219f3f58bb390a97c9a59335f,2025-02-05T15:15:20.463000
|
||||
CVE-2024-50695,0,0,9bf1b957244a59b772ead8b2f70e41a1650386c01d6d5befeea804e2a8547f40,2025-02-05T15:15:20.633000
|
||||
CVE-2024-50696,0,0,e98a7a56ad10f593ecbe49afcaac03c72ff4a44be28a5f4f8ee006f9cf54e925,2025-02-26T21:15:17.997000
|
||||
CVE-2024-50696,0,1,a98a623e23313d99d71e3bdfbcde8d19741ecc17b52798129d9a57cd69d5e194,2025-03-04T22:15:38.213000
|
||||
CVE-2024-50697,0,0,e7f5e58656f67ebe9a367b387e0e9c827dd57c742ddc3361887e61032ad4a459,2025-01-27T16:15:31.423000
|
||||
CVE-2024-50698,0,0,6d0bafa41ec7a5b3fc381b0a13e0e4535aa28369bc46836a66f0b19857db9b1a,2025-02-05T15:15:20.790000
|
||||
CVE-2024-50699,0,0,b7bfb9ce8d871e66c8bc846d040c669e65be2a2e4a5ca2c2838499d7e02651cc,2024-12-11T16:15:12.720000
|
||||
@ -271848,7 +271850,7 @@ CVE-2024-50702,0,0,364da4b19de28c5c7b507be40fbdae2c11e3df8d6828b6df401d4df157b3f
|
||||
CVE-2024-50703,0,0,e1914095d1b7a0ffe223f333a29d6d8f0777fb87821c72e0f90605f07525e975,2024-12-30T16:15:11.713000
|
||||
CVE-2024-50704,0,0,33de55037448a6030b29028b7c032e00bcd17665a8884aeb1bb01713ccfcdcbc,2025-03-04T17:15:12.323000
|
||||
CVE-2024-50705,0,0,5fba789015dc4730dfd900eb12ed13b5d6925a0038226a440b770e2b421e3a62,2025-03-04T17:15:12.523000
|
||||
CVE-2024-50706,0,0,bdf826c2f0e018abe61028151297292c44083149d42747ce0b23d50c7f191ee6,2025-03-04T15:15:19.290000
|
||||
CVE-2024-50706,0,1,16ec6377302e1ac2758312752b9c9339ce67b853de406aa22e5e048065820580,2025-03-04T22:15:38.420000
|
||||
CVE-2024-50707,0,0,b4c98511e68eadc38c0eaad86845af9d03870972465b2ad348462d5ec825f76d,2025-03-04T17:15:12.700000
|
||||
CVE-2024-5071,0,0,6dfa056d4abe7e6b37a7311009a7ee0087dcbc392285cd9b9ee51e94d1bed9a4,2024-11-21T09:46:54.120000
|
||||
CVE-2024-50713,0,0,0aa4de590634689fc06ab979763234a81b3e22004da47f2c72171e7a681edd71,2024-12-31T19:15:46.967000
|
||||
@ -272870,8 +272872,8 @@ CVE-2024-52361,0,0,0f590da84310a3a70b1ce4708563ee9a1181dbd1f95752797a9808951be26
|
||||
CVE-2024-52363,0,0,7dd69c3ad4a5bb3fc6e21b529185fceaea70503e2ac84d08e88882dbccbc4fa2,2025-01-17T02:15:25.060000
|
||||
CVE-2024-52364,0,0,82606ab35773dfde3fb3002f292688c503168f9c71015cb6232e593a409c127a,2025-02-05T12:15:28.743000
|
||||
CVE-2024-52365,0,0,67d0593b9ab22b3d0e70ebc54cc166e413b2572e8cebaba6bf7845898f27108c,2025-02-05T12:15:28.917000
|
||||
CVE-2024-52366,0,1,8d4807b7da1551c2337cd8fbb0f4960a85f72dc7f8084a3578c5eac6aee2fa69,2025-03-04T19:30:24.047000
|
||||
CVE-2024-52367,0,1,ae8b6491f41e72866c9422a738f1a3ffb4c0221b3ad0be9cfdf3bb19754340ce,2025-03-04T19:30:24.047000
|
||||
CVE-2024-52366,0,0,8d4807b7da1551c2337cd8fbb0f4960a85f72dc7f8084a3578c5eac6aee2fa69,2025-03-04T19:30:24.047000
|
||||
CVE-2024-52367,0,0,ae8b6491f41e72866c9422a738f1a3ffb4c0221b3ad0be9cfdf3bb19754340ce,2025-03-04T19:30:24.047000
|
||||
CVE-2024-52369,0,0,e081cda06af085b69b5cce5744190264c91cd87aef2aa4d459e7fe8f2ad5e6bb,2024-11-15T13:58:08.913000
|
||||
CVE-2024-5237,0,0,220865d5e6e44ad392451e3ec0d33ff0c63d7a2d2cdc2f08c10036b961cbca46,2025-02-27T13:30:57.937000
|
||||
CVE-2024-52370,0,0,d2931a84b2cf7b14e018c99dc708ce275e6f773b3432c9c5f476dcff0fb41c95,2024-11-15T13:58:08.913000
|
||||
@ -273260,9 +273262,9 @@ CVE-2024-52882,0,0,0e9b7e7fc9ff7df204d4c4669c35379bdd8bdf36506c56aa49c6db64563e7
|
||||
CVE-2024-52883,0,0,52d7ad1ab3055f670faacd58028c9ee893ca0da51fa82feaca7a6e676a1b1814,2025-02-10T17:15:18.027000
|
||||
CVE-2024-52884,0,0,3227498fd6659af285064d680f971c699a66d023f187f44698185a705cf44c56,2025-02-10T17:15:18.190000
|
||||
CVE-2024-5289,0,0,45ad6e1c3a8134226122bea6b70bcd4aeb55721ddc7a695e24fb24c5dc173e1b,2024-11-21T09:47:21.990000
|
||||
CVE-2024-52891,0,1,f2b2af1a35dbe934810199d02f0b646087a3d951b4f9f0b479c7a912999f5ba5,2025-03-04T19:30:24.047000
|
||||
CVE-2024-52891,0,0,f2b2af1a35dbe934810199d02f0b646087a3d951b4f9f0b479c7a912999f5ba5,2025-03-04T19:30:24.047000
|
||||
CVE-2024-52892,0,0,9eba69a4b423ab3b0faed8136763965b521ef23cc8c0984c63b5b975c522a8cc,2025-02-06T20:15:39.763000
|
||||
CVE-2024-52893,0,1,49c7c77019f10ed75dd3db11195e80deb1ed15b96d8f33f23ac4e1472b7b811e,2025-03-04T19:30:24.047000
|
||||
CVE-2024-52893,0,0,49c7c77019f10ed75dd3db11195e80deb1ed15b96d8f33f23ac4e1472b7b811e,2025-03-04T19:30:24.047000
|
||||
CVE-2024-52895,0,0,776381c39f26d27f642d71ec1be88368d50de1a99de3a3998fc1acb8e968c6e5,2025-02-14T15:15:09.210000
|
||||
CVE-2024-52896,0,0,4f05d5756387a4a38056c43617cd5bc7f4b71fd12d45391dd4bd8326aa374d5f,2025-01-10T15:15:15.633000
|
||||
CVE-2024-52897,0,0,81ad80051d1322a8bfb61db68a23039003246d955567fed9fc0a8a2a809d5fdf,2025-01-10T15:15:15.777000
|
||||
@ -273727,7 +273729,7 @@ CVE-2024-53563,0,0,f6ed2a0477f6a476013c53a3a4876f7b2e47b331802caf434b1ccfe2bfebf
|
||||
CVE-2024-53564,0,0,9ab937f1953e956617795aaf18dddda75dd03cf95a1ae2a6d6ee23cedb4ba889,2025-01-09T17:15:15.423000
|
||||
CVE-2024-53566,0,0,5169befd7db7ebb5725344c6b1622ae4de4cab71c37cd96a53ae5495bb145b4d,2025-02-06T02:15:10.167000
|
||||
CVE-2024-5357,0,0,bf437ffa18c198ccaa3bc6e70504e8b6ba04e5dffa35498f1c778a6c476f4cda,2025-02-21T19:48:37.280000
|
||||
CVE-2024-53573,0,0,ddbe4e88059e3e2f78f7bb3bd93b636a2c10c45a5afa9f86dc3386597b661130,2025-02-26T22:15:14.043000
|
||||
CVE-2024-53573,0,1,c3e20d8447ccfff87f007a16c3e4b4b7293cce35a180bc230bee89e192db70cd,2025-03-04T21:15:11.833000
|
||||
CVE-2024-5358,0,0,83e445e1bb1013b59cd13c6236f1ab370fff5556d9976328321efe50ae33b70a,2025-02-21T19:47:18.300000
|
||||
CVE-2024-53580,0,0,017091ad6343956d021513aaff57df30e0f57917f14c0dad11fd7549b9689d6e,2024-12-31T20:16:06.953000
|
||||
CVE-2024-53582,0,0,cce1965e7b4052e02c06570940ab4f482ad0e70a57583dab150a15faf0f215a2,2025-02-18T19:15:18.237000
|
||||
@ -273986,7 +273988,7 @@ CVE-2024-53915,0,0,4605c52b83221ae0e3cdd10a9aad63d660542ba26783410343eed38f4ba2e
|
||||
CVE-2024-53916,0,0,b4be14b34e457d9e45c1c40d47ab72826003c5ec84913feddaf103f9ff837586,2025-01-06T18:15:21.627000
|
||||
CVE-2024-53919,0,0,276cab16a69dd8abd191858092e087c05871f9a8d5d2b89d95f580d07d640fa6,2024-12-10T16:15:23.817000
|
||||
CVE-2024-5392,0,0,3bd578a4b87004c861758caab532f09486d9bd47476ed81e956985706fb24772,2025-02-10T16:24:01.917000
|
||||
CVE-2024-53920,0,0,f9be964c217505ee655444d7c7fd49f71901e1036830d416bc8e1164e583d036,2025-03-01T06:15:34.350000
|
||||
CVE-2024-53920,0,1,317c16d0f3d17bbbfb72792dce5e0d1c10a56e02f54b956ecfe8399855e800ac,2025-03-04T22:15:38.610000
|
||||
CVE-2024-53921,0,0,80ba8805361036f43b4514262b685ccd25900644ea805da6dca5ed5b14f2db17,2024-12-03T20:15:16.153000
|
||||
CVE-2024-53923,0,0,555f40f110f5cc9cc3044cd555d315fd962ceb2a9297b9a92037b2bcd868c9b6,2025-01-24T19:15:12.777000
|
||||
CVE-2024-5393,0,0,113ce1b27b2fdacd4ecfb463e30a2b29428b5308f45f45e127c5f710983003a2,2025-02-10T16:23:40.037000
|
||||
@ -274833,7 +274835,7 @@ CVE-2024-55556,0,0,36ef2f008ce211b77e0b5750d7d4b803fcde3fc58fe847ba118d22617dc7c
|
||||
CVE-2024-55557,0,0,1c44f970be9c9162e2fd5fa3f9e1778bc69c31c3d5707dcbd0caa2e430754ba4,2024-12-17T16:15:25.900000
|
||||
CVE-2024-5556,0,0,f573f07f74091c9ef49ab63e55c790d8f661c071a22a95c82ecfdf6c6886287c,2024-08-27T14:36:53.273000
|
||||
CVE-2024-55560,0,0,34631484c4ac18e7385d5b08b3c8f4829d4f28112bef5e467e27e8892a961b13,2024-12-09T16:15:22.750000
|
||||
CVE-2024-55563,0,0,18204ee9bcd7a443817ede90b4af782476bfed51d18ddfae7057258f3016b43a,2024-12-09T01:15:06.313000
|
||||
CVE-2024-55563,0,1,2b9003e8272d684081f7653be3aa0dc76a00fa35a71d84bdac507f3193e1df6a,2025-03-04T22:15:38.777000
|
||||
CVE-2024-55564,0,0,0ed737f325f7d691c0861d9b182294d3bfcbaeec43b5fc3c9c74a4f890349c8b,2024-12-09T16:15:22.907000
|
||||
CVE-2024-55565,0,0,41a9edd709fcc5c920649312806312f16fb139e829113bdded78cdd6366005ad,2024-12-12T19:15:13.670000
|
||||
CVE-2024-55566,0,0,498f1e4e837f8ad9758e1df3de86aaaf6f7c709a5bad66d4383c3066d4682f26,2024-12-17T21:15:08.777000
|
||||
@ -274845,7 +274847,7 @@ CVE-2024-55578,0,0,5c3fcc77d09324042ddbdfd728ad5e7386e7d5896fd6497db19ee19fc8c81
|
||||
CVE-2024-55579,0,0,eb7b97c3360bce570eb740843f88f428eb8ed07ac934bdc24aaa75a35aac660f,2024-12-10T15:15:08.163000
|
||||
CVE-2024-5558,0,0,27c470fd7893b831fc84cdde276205428cb613b4f465921ca99eb64316442434,2024-11-21T09:47:55.700000
|
||||
CVE-2024-55580,0,0,d0db8db8caa9064b5ccfd1ebfcb70a56a05a77720b165abb2a708efdd1b5b12c,2024-12-10T15:15:08.300000
|
||||
CVE-2024-55581,0,1,f7ccdb67ff7739fea17993b33fa4724556778bda84016d6b56841f0a4bde8e1e,2025-03-04T20:15:36.677000
|
||||
CVE-2024-55581,0,0,f7ccdb67ff7739fea17993b33fa4724556778bda84016d6b56841f0a4bde8e1e,2025-03-04T20:15:36.677000
|
||||
CVE-2024-55582,0,0,8c7e64bb3acec7a473c6e65040db0fdec814405cb32a2dc0c98b336fe36f3523,2024-12-11T17:15:21.103000
|
||||
CVE-2024-55586,0,0,925f554fe1c6418481a3cd536be7ee8d09491d59c7f2a3844aeb8009a61c81a3,2024-12-12T02:08:22.247000
|
||||
CVE-2024-55587,0,0,043360c021c66dd2c5a5e7aa976c02dd7134a3fcd9d370dcc05a2b2b78d778ba,2024-12-12T17:15:11.197000
|
||||
@ -275222,7 +275224,7 @@ CVE-2024-56281,0,0,9c3b69f0b2ecf520353b529a17ca8ad701ab8ccc15815f99ab295cf335f2f
|
||||
CVE-2024-56282,0,0,04e98b81565a63c3e74733082f2cc2f0ed2a15a497ac9549579e47435edda923,2025-01-07T11:15:10.177000
|
||||
CVE-2024-56283,0,0,79c5f86507c9307f4fac74ade5445eeb172dfbdd1b5e4dbc1039aad6b3560ebc,2025-01-07T11:15:10.357000
|
||||
CVE-2024-56284,0,0,4ad097c30327cf6a2ce2177a9faeb87676a0ecdd2e832e7ad533b282007e7b30,2025-01-07T11:15:10.537000
|
||||
CVE-2024-56285,0,1,213f45370c7048d8f209a6acb42c1ddacd426bf074da8ac228f5cfc17cbcd372,2025-03-04T19:30:24.047000
|
||||
CVE-2024-56285,0,0,213f45370c7048d8f209a6acb42c1ddacd426bf074da8ac228f5cfc17cbcd372,2025-03-04T19:30:24.047000
|
||||
CVE-2024-56286,0,0,3d01d551bef5feb8be0f9be642aae2e234cddde808c71a0a3e0451071855abff,2025-01-07T11:15:10.883000
|
||||
CVE-2024-56287,0,0,cc75ffcc84b4adae7c76dcb39d27a677e443f14ce8e73dc6845fc0bfc2f5ccc2,2025-01-07T11:15:11.060000
|
||||
CVE-2024-56288,0,0,dcd521313c9aef718b4b18425644739ec165cf5b19320f13dca71eb67c6c4766,2025-02-25T22:50:07.927000
|
||||
@ -275687,11 +275689,11 @@ CVE-2024-56883,0,0,f99cbbbe44810ecf20ee9a822aaeeb39d677436c7acf1f70c821dc9769f4f
|
||||
CVE-2024-56889,0,0,4693f62751a5a06c0b0a9e5d42dd6535c82427b71471993dfffea8ef941252b1,2025-02-18T19:15:19.770000
|
||||
CVE-2024-5689,0,0,7954cfa7cab5c9d284e75ff2916a8e3e6c71cab8207a342db66b72c3a9729209,2024-11-21T09:48:10.193000
|
||||
CVE-2024-56897,0,0,c86a728646b989ba2c34050e6cf558894a483f9e45fac8ad92b270dc1bfac754,2025-03-03T20:15:43.540000
|
||||
CVE-2024-56898,0,0,1dc9e1e69ffde40039f3a045587255d291a578f1b2bd4fc573e6b1f0aa92e0bf,2025-03-03T22:15:36.810000
|
||||
CVE-2024-56898,0,1,6acb612a6a6d6abd3f207db73f49bdae4c033cc146d6a92b4e551f8b5a4c516d,2025-03-04T22:15:38.990000
|
||||
CVE-2024-5690,0,0,d4d62df1fcd0a6ab34cd7e4b18e0510e69dc46e6ad88d84635741631f871b265,2024-11-21T09:48:10.377000
|
||||
CVE-2024-56901,0,0,0b1282e90dd49deb61c3e27fcb27940be2b6dc7e484ece844aee0fff3ae360d9,2025-03-03T22:15:36.967000
|
||||
CVE-2024-56902,0,0,3d48040cfcc0f825f27fd8087ce8988537f3393239912705fac909e5d5b2e3e5,2025-03-03T22:15:37.063000
|
||||
CVE-2024-56903,0,0,c0f6909007c90dd33f84b400ce83c37ba8db2d0d8c4c18cd39c31a1c80624d5e,2025-03-03T22:15:37.173000
|
||||
CVE-2024-56901,0,1,64eb0224a857e749243b1bd7bc2761e2c8263ae6819e4c9704a3b8650c9b496e,2025-03-04T22:15:39.143000
|
||||
CVE-2024-56902,0,1,3ef5942ce98190c5aa70f63a17781c2e2ea98e203a6427a08886aad5d3b44a9f,2025-03-04T22:15:39.340000
|
||||
CVE-2024-56903,0,1,b897be5c821ce23ff62ebbc786466003154e6577f97fa83d87efcf2c721a7888,2025-03-04T22:15:39.547000
|
||||
CVE-2024-56908,0,0,f64d990eb4134bd422c919a00cf8c479aef7a2437cb86021ed293eaffacfc981,2025-02-13T23:15:10.773000
|
||||
CVE-2024-5691,0,0,0824a888e7eb71279259f37f9283a4aa7c8605aa9b71698472cf4ea15ee83b3c,2024-11-21T09:48:10.503000
|
||||
CVE-2024-56914,0,0,76cdd8d94ae11c2780ca41310bed1eae7879520cc428bb077f1f775e8c7b9036,2025-01-23T17:15:16.230000
|
||||
@ -275895,7 +275897,7 @@ CVE-2024-57408,0,0,175db0428293ce57c99d60d486d8cbd43e580b93d14f299c67a8f76d88381
|
||||
CVE-2024-57409,0,0,0b05f5863a283decb12d24250619815c0ec7b2696059e21578dc2420bbab0e60,2025-02-11T00:15:28.863000
|
||||
CVE-2024-5741,0,0,055094e9aabecf080e8eb2a3d882a04f3fba90f18ee04ead7d8cff271ac3f02a,2024-11-21T09:48:15.963000
|
||||
CVE-2024-5742,0,0,3d67a98aab4ea452eccb3180d74817d102c8dc01405b893ad9d75b571593ba72,2024-11-21T09:48:16.117000
|
||||
CVE-2024-57423,0,0,5ed9c80d6cc25b9ae2067bdaab5be046563125cef4266fb7d4fe6b8de12210b9,2025-02-26T21:15:18.093000
|
||||
CVE-2024-57423,0,1,a7b051d61ca19ed8d2d5c4de9fbb62c050c109b6ada2a11e3e6bd12976298986,2025-03-04T21:15:12.020000
|
||||
CVE-2024-57426,0,0,ba87cb306cce9c7c1734003f734ff798cd387a60923d8c8325abd2c359c44417,2025-02-11T22:15:29.347000
|
||||
CVE-2024-57427,0,0,ebce508e94de8a5b34edd05d80160e23d0760d35cafac1cba9fd80ea5c5ca427,2025-02-06T17:15:20.357000
|
||||
CVE-2024-57428,0,0,e0169033f613e35f231693e2a1697e2420f5895d248e9f0db6358d748665ae3b,2025-02-06T22:15:39.223000
|
||||
@ -278303,6 +278305,7 @@ CVE-2024-7993,0,0,07965c83eccb4d0c1d02c4c0f63f174d1471ffa40acc41fbcf0de6e84ca8ce
|
||||
CVE-2024-7994,0,0,677bb0d3a07210a7d5902c83c522b3beb4ddf65c53dfa15f4ee3e8a6eb5c8b23,2024-10-21T18:35:55.397000
|
||||
CVE-2024-7995,0,0,a8b278e923ed83ab90058edd8bf9d51cbec9eb8e7e1669b64ad19e97359b7962,2024-11-06T18:17:17.287000
|
||||
CVE-2024-7998,0,0,5a96b2d058d8fa22c17d15139fb41166f629052179fc1be6b8add20fbdc8bcac,2024-12-03T19:15:13.330000
|
||||
CVE-2024-8000,1,1,20d17ea2c760ae936afb73caf17f54bd136cfbcd975e64763d63d4fbfcc0cb6f,2025-03-04T21:15:12.220000
|
||||
CVE-2024-8001,0,0,7aeba4a4d15e98a48f9b2362095933d475040fffec8531b1bbd417b6eade812e,2025-01-08T07:15:27.463000
|
||||
CVE-2024-8002,0,0,0cb7909b5f1f4d7c5244de591889203d2577aae5ba268c7618f858bb8db772fa,2025-01-08T07:15:27.773000
|
||||
CVE-2024-8003,0,0,badc57814940a87be012bad00d6c0167779253eead22504dd18a460d7e0be4df,2024-08-21T15:51:28.397000
|
||||
@ -278866,7 +278869,7 @@ CVE-2024-8671,0,0,a99020099b190237ec4ed79dd02fe23a02e4fa3467857b7d700af772ffd6ad
|
||||
CVE-2024-8672,0,0,a15444b342cb51704c6035355a8239e8b1581fa22931a6c667330f1628aeb3b2,2024-11-28T10:15:08.870000
|
||||
CVE-2024-8674,0,0,346b5859dd79895a03165d24e9b602a990cf40990eacbe9188550aceade5c799,2025-02-11T02:15:36.413000
|
||||
CVE-2024-8675,0,0,d4603b0787f1359762182dfd0b6464a7217287d096015439ee3a45da5ea12b68,2024-10-04T13:51:25.567000
|
||||
CVE-2024-8676,0,1,2a95943b3136648d4b179cad6ee44c250ecd1d864fada3c3a1fdaaed8a8663ae,2025-03-04T19:15:37.457000
|
||||
CVE-2024-8676,0,0,2a95943b3136648d4b179cad6ee44c250ecd1d864fada3c3a1fdaaed8a8663ae,2025-03-04T19:15:37.457000
|
||||
CVE-2024-8677,0,0,60f0fdd7af95bdac2c0e1884d42dbe76c9ab4cea5844c97ea5bb9aa452948afc,2025-02-11T02:15:36.463000
|
||||
CVE-2024-8678,0,0,c9f19131bded613da0c19c1444b8e8a8b9cc51fc5c1cf15447ee67809c6ea12c,2024-10-02T19:06:48.983000
|
||||
CVE-2024-8679,0,0,2b814e408085282aa43a44f419617020b8c9c8c614fcd1f864e869f9853d89cd,2024-12-07T02:15:19.457000
|
||||
@ -279258,6 +279261,7 @@ CVE-2024-9131,0,0,50107691d6f8995fe8a6b7113df12747d01b199eb120271aa41cc0db383461
|
||||
CVE-2024-9132,0,0,4c377ed325e14fd1af892554c7d35507ad3abf8234e1ac3ab54429e427bcc737,2025-01-10T22:15:26.783000
|
||||
CVE-2024-9133,0,0,fcbfbc2bd4127e72a9aa3ddc848c573d78bc72fa9ddd322a5be2ae12167a11d5,2025-01-10T22:15:26.907000
|
||||
CVE-2024-9134,0,0,25a903436b6d7d769fb834ac188d1e6735193281626409ff9b8726ccf7896b79,2025-01-10T22:15:27.033000
|
||||
CVE-2024-9135,1,1,25c0ddda2344b7699adc016b7a6ae907ad30123b99641511f7c6dabb4ad1cdec,2025-03-04T21:15:12.360000
|
||||
CVE-2024-9136,0,0,440b3409a14907c29d57b03ac063b5d398f0722a11dac00ea875af9fd1c6005e,2024-10-01T14:28:31.027000
|
||||
CVE-2024-9137,0,0,f01ddd62d94a1f3860b505f4ee6768f2cc665b82d44b256f042250b9599b8b79,2025-01-17T08:15:24.690000
|
||||
CVE-2024-9138,0,0,94a5768e7e73f1fbef0aa543085c8f51b1c4781f2d47badd1a3c54651a536d60,2025-01-03T09:15:06.370000
|
||||
@ -279660,7 +279664,7 @@ CVE-2024-9613,0,0,f7f019a18c9e01f36efde66dfbb10d6eba11ff87ade2b8efd8a79811ebe631
|
||||
CVE-2024-9614,0,0,89d6ad4791713c9131b15fd858d4bd9404ef7090c81b08570775178f0867f84e,2024-11-13T17:01:16.850000
|
||||
CVE-2024-9615,0,0,c9468917c9754e631849fcee424e37c3bdfdc0ce7baf1874e3cbc9e2bb677dcd,2024-11-18T17:11:17.393000
|
||||
CVE-2024-9616,0,0,6ef77d38c3e8284229b9cc30b59e98636261a63c660e6b9ccf97deb77695f71d,2024-10-15T12:58:51.050000
|
||||
CVE-2024-9618,0,1,3229a4a9edba9afa8437c03cb7fbe098a5fb834064e988929d93898486da8753,2025-03-04T20:34:08.907000
|
||||
CVE-2024-9618,0,0,3229a4a9edba9afa8437c03cb7fbe098a5fb834064e988929d93898486da8753,2025-03-04T20:34:08.907000
|
||||
CVE-2024-9619,0,0,a7bf5db408a5ec4a6f2bb2b3418fdbfda580c42a8671077d531fc4eac03bc58f,2024-12-20T07:15:12.977000
|
||||
CVE-2024-9620,0,0,5f4d387a05e8c7d787dc78c4da6b8994737bf87f4aa2585e1708a37b135ad3b4,2024-10-10T12:56:30.817000
|
||||
CVE-2024-9621,0,0,d01febf4917d7e254a80be80939f9dbe78ca0c8507d48f25eb8390335c29a3af,2024-12-06T10:15:06.327000
|
||||
@ -280140,7 +280144,7 @@ CVE-2025-0335,0,0,d5fa0c487675ca616e7ff135ad8a970ffdd4ae08b32ac07ee07443b3a83ed6
|
||||
CVE-2025-0336,0,0,795ad1de1d64b863b23a9ee9f1f8e965a4f5ae1458793c278520d16970dab18d,2025-01-09T07:15:27.860000
|
||||
CVE-2025-0339,0,0,56d80730bd4432f993e46d3759d1fe5c37d850c2923afcadbbf473db701d571e,2025-03-03T16:25:24.627000
|
||||
CVE-2025-0340,0,0,d2643790c5408b8656f83d48122b2edd0443b492b102add5cec114f36ec3d251,2025-02-27T02:05:55.703000
|
||||
CVE-2025-0341,0,1,b0cebaf9b276af573888ac34520a7b93ce4fdf91461ce7b89f083d81a4f7efff,2025-03-04T19:30:24.047000
|
||||
CVE-2025-0341,0,0,b0cebaf9b276af573888ac34520a7b93ce4fdf91461ce7b89f083d81a4f7efff,2025-03-04T19:30:24.047000
|
||||
CVE-2025-0342,0,0,3dbfe8ec26cd89c8d358aa4179b87636b3a72d2e0b33768a4263c0b8cd9e88dc,2025-01-09T08:15:30.310000
|
||||
CVE-2025-0343,0,0,2f07750fbab5848d7fd769193ff51e5044832fbe65109094687a56b43364aa58,2025-02-18T22:15:16.350000
|
||||
CVE-2025-0344,0,0,fa9cdc375de2a99e7299b1ccdc9be76ceb7ad16da8244b21c453c84a18a28efa,2025-01-09T08:15:30.517000
|
||||
@ -280203,7 +280207,7 @@ CVE-2025-0428,0,0,53ca33b8751cace74b1767e06da6e1ef57d9382b6c96eab72106c311721ef6
|
||||
CVE-2025-0429,0,0,78859fcdeaa45b49773faf4a287c5acdb235628b0cbfb95e3aa51c974c22a44b,2025-01-24T20:51:18.657000
|
||||
CVE-2025-0430,0,0,4e18cb7de447c14e34b06241818bd17d9db4853e01a4fdf6d152f010ee011658,2025-01-17T18:15:30.920000
|
||||
CVE-2025-0432,0,0,be1a96ec1a155389d359c137e77a07190805d57ba524277b7183ba768a401b9a,2025-01-28T16:15:40.183000
|
||||
CVE-2025-0433,0,1,b1fd9922f5ddbc31e769695d80dcb91e7be80c9c026715a84649cc27bf0f22aa,2025-03-04T20:34:08.907000
|
||||
CVE-2025-0433,0,0,b1fd9922f5ddbc31e769695d80dcb91e7be80c9c026715a84649cc27bf0f22aa,2025-03-04T20:34:08.907000
|
||||
CVE-2025-0434,0,0,80805d1fc694dbf391f864cbd97ec8a7e48ef050c445c249811ef890ae257b48,2025-02-18T22:15:16.447000
|
||||
CVE-2025-0435,0,0,604058ef793e33435759746d46c23b90cc51452de4822b6472440608e3ab5958,2025-02-18T22:15:16.540000
|
||||
CVE-2025-0436,0,0,72789f2cd8147d5a86876c7b0b79e40e25dcd2c9396b81691e6fd199d1206765,2025-02-18T22:15:16.627000
|
||||
@ -280610,7 +280614,7 @@ CVE-2025-1075,0,0,797c9475355694050b39edcabe9ae24db6febfe58de9ae04f1e1ad1e92e5ba
|
||||
CVE-2025-1076,0,0,0fb5ade089952c20fae90954aaa2f08206a3bcb696af25bbf4ec969a8662af5f,2025-02-06T14:15:30.287000
|
||||
CVE-2025-1077,0,0,88be144d908f74868edd4d84609ed66b73f57b9c8388994c4810420e7c62d244,2025-02-07T09:15:08.380000
|
||||
CVE-2025-1078,0,0,27fb4b341e8da1a1de98d2672d440ce3475e4637ab1dc7078358dba9618f5194,2025-02-06T17:15:21.040000
|
||||
CVE-2025-1080,1,1,ade976fc0557fdb6c1cb869623868c205f052811cd96335b0e4c11a47ef03c1e,2025-03-04T20:15:36.867000
|
||||
CVE-2025-1080,0,0,ade976fc0557fdb6c1cb869623868c205f052811cd96335b0e4c11a47ef03c1e,2025-03-04T20:15:36.867000
|
||||
CVE-2025-1081,0,0,2ed1c232468718cca0ffefebc7a9616f01188f5ebdfff7d66afc4bbe1846689f,2025-02-06T21:15:23.120000
|
||||
CVE-2025-1082,0,0,fce3a76bcdd4192df493e2cdecb45710022efa3172953cd17ae4bb75681720fa,2025-02-06T23:15:08.140000
|
||||
CVE-2025-1083,0,0,24575cc196a809327eac507956b0cfbef268c827f0bdead2d6d6395339f4414c,2025-02-06T23:15:08.350000
|
||||
@ -280731,15 +280735,15 @@ CVE-2025-1244,0,0,7e59a5cfd949661bef29f7dcf50cf62d10c20d0e220dba94bf5fd512d2e887
|
||||
CVE-2025-1247,0,0,413d4bcd6e00b55487b15f2b541fa31d8a6169438afa6345f0107f85b8ddc727,2025-03-03T14:15:34.120000
|
||||
CVE-2025-1249,0,0,f9cf8228939f75e3961b7ce63e2e103ee292f920596572fc4d2ff4b8583fc869,2025-02-26T15:15:24.470000
|
||||
CVE-2025-1258,0,0,e60d49e74992453b0cd2d8b93f0bc7a60901e2447adb1d6d0cde7627e3bb44f5,2025-02-20T18:15:26.217000
|
||||
CVE-2025-1259,1,1,975ae5ff97cd191d701987d3d89a49ef9f149b61d794323b6064e28c5ee88adc,2025-03-04T20:15:37.003000
|
||||
CVE-2025-1260,1,1,33abe94e0faf572da8b0a7cf9ff4b66ed5eb9cd32ed8fc580ecfd4b9b555e933,2025-03-04T20:15:37.133000
|
||||
CVE-2025-1259,0,0,975ae5ff97cd191d701987d3d89a49ef9f149b61d794323b6064e28c5ee88adc,2025-03-04T20:15:37.003000
|
||||
CVE-2025-1260,0,0,33abe94e0faf572da8b0a7cf9ff4b66ed5eb9cd32ed8fc580ecfd4b9b555e933,2025-03-04T20:15:37.133000
|
||||
CVE-2025-1262,0,0,b2387eb6dd825b4bc22b3213ef83d0e48b91556ac3dffc3cb635c9915a53a643,2025-02-28T01:30:32.830000
|
||||
CVE-2025-1265,0,0,bc018ef071fadf7e153cbb8aa96a03eb4bac560d27730ea77e8eae7baedae9e8,2025-02-20T20:15:46.537000
|
||||
CVE-2025-1269,0,0,3d8990f3f321bb84afc5ce31cc37206b4dfeae7b9639d4320eceb6f39d26cfbc,2025-02-18T14:15:28.513000
|
||||
CVE-2025-1270,0,0,a0fba4bca59afda304bf8335640266a3acf6a1624640bee675db51d94e9fc436,2025-02-13T13:15:09.273000
|
||||
CVE-2025-1271,0,0,0359319eae8a142a0720b34e58c3d3808902c47ddd06a524c0e8a18f2f2f366a,2025-02-13T13:15:09.433000
|
||||
CVE-2025-1282,0,0,135e0d0f84484b53270653b79f9e366f1c0baa627fbaf4af3fe538f7cdb33c50,2025-02-27T09:15:10.160000
|
||||
CVE-2025-1283,0,0,df55d03ddd7425597bd6e50218384d5f9d05b634ac49322453c2c29091aeb539,2025-02-13T22:15:11.413000
|
||||
CVE-2025-1283,0,1,4175667403ef8488e39c5e8c2dd94a274e533a8ac41a5d588031878a218b6b1e,2025-03-04T20:59:05.417000
|
||||
CVE-2025-1291,0,0,bb482c13e6ea46eaa51479ea468a757d12dfa1292b1f2ec778322441cd52e4d5,2025-03-01T09:15:09.710000
|
||||
CVE-2025-1293,0,0,60a11b51b89461cf0f7c120de5ab3c93294ee5f6a5e19d6ba8d0bb06e8828d44,2025-02-20T01:15:09.950000
|
||||
CVE-2025-1295,0,0,24bdaaeb758634ffe52b87573cb2760c08e1a07ac9682ba1ed20b65d22033cf6,2025-02-27T06:15:21.990000
|
||||
@ -281036,27 +281040,32 @@ CVE-2025-1934,0,0,44f25a8902a9b9b95e941d6ccaa26cb7fa6741d2058c14d791dddd487b53c6
|
||||
CVE-2025-1935,0,0,b1f141814e3f1476674dd592029a8f4ffa3fe6d2fab8a0b0166b44a0a11fb5c0,2025-03-04T16:15:38.110000
|
||||
CVE-2025-1936,0,0,08ee55072dc1440649036276dd782693ec14b6ecbdcc6904219467a7b9af1bb6,2025-03-04T14:15:38.500000
|
||||
CVE-2025-1937,0,0,fe96f19485f137b7de4930d8a1c319b5b597161e14b41dc56749602d697c21c3,2025-03-04T14:15:38.610000
|
||||
CVE-2025-1938,0,1,c04d49fe6542d4bcfc1b767d90b0f1370a91b37a3110914f070bfcfde24f27ab,2025-03-04T20:15:37.257000
|
||||
CVE-2025-1938,0,0,c04d49fe6542d4bcfc1b767d90b0f1370a91b37a3110914f070bfcfde24f27ab,2025-03-04T20:15:37.257000
|
||||
CVE-2025-1939,0,0,5423b6d57bde27103afefd0147e6a27b92b6f89c451bc13e8b0c4b336560932e,2025-03-04T14:15:38.837000
|
||||
CVE-2025-1940,0,0,2da52b7ef01c0ebae181d033a25f813d405367fc27b9ab2f5ece7671de559246,2025-03-04T16:15:38.310000
|
||||
CVE-2025-1941,0,0,c755e145fc658d9d2d1958c16a11cb393d3d6769dff8808a148cf5adfb9a5e27,2025-03-04T16:15:38.457000
|
||||
CVE-2025-1942,0,0,e7e8ffb9220287cc58971bc54a60d82cac4054a1402ceec16ddaf1f2c60d0668,2025-03-04T16:15:38.607000
|
||||
CVE-2025-1943,0,0,021009f6feffea675fe424b37381aa7740ab1b8c35c7e162f1f5acfa4c41d210,2025-03-04T15:15:24.493000
|
||||
CVE-2025-1946,1,1,b26757e80aca8a4f5ec7f4ff9aaba5088b8b42ad89c42ebb5651e188ffb3ed38,2025-03-04T19:15:37.583000
|
||||
CVE-2025-1947,1,1,9d8514f993785be2f20f4da03dfcd4529cbec458d034f07a472d77128df9bea8,2025-03-04T19:15:37.760000
|
||||
CVE-2025-1949,1,1,593191d98ebb76e2b2ee9726e4b95d01280d2edb66962598c34919bd2cddb8f0,2025-03-04T20:15:37.410000
|
||||
CVE-2025-1952,1,1,11517103cff7deac11d9e49c32ff578cab86f2816dcafea50edd1d34472f438a,2025-03-04T20:15:37.533000
|
||||
CVE-2025-1953,1,1,45ef3a02db093c2bb45f9969c271af59913dbcadda1cc5988f4fc79ee77774f7,2025-03-04T20:15:37.657000
|
||||
CVE-2025-1969,1,1,06a782c53158bfcfa719a54832f6c914b6b8cf10ad0fb557e3dedb429cf5a384,2025-03-04T19:15:38.290000
|
||||
CVE-2025-1946,0,0,b26757e80aca8a4f5ec7f4ff9aaba5088b8b42ad89c42ebb5651e188ffb3ed38,2025-03-04T19:15:37.583000
|
||||
CVE-2025-1947,0,0,9d8514f993785be2f20f4da03dfcd4529cbec458d034f07a472d77128df9bea8,2025-03-04T19:15:37.760000
|
||||
CVE-2025-1949,0,0,593191d98ebb76e2b2ee9726e4b95d01280d2edb66962598c34919bd2cddb8f0,2025-03-04T20:15:37.410000
|
||||
CVE-2025-1952,0,0,11517103cff7deac11d9e49c32ff578cab86f2816dcafea50edd1d34472f438a,2025-03-04T20:15:37.533000
|
||||
CVE-2025-1953,0,0,45ef3a02db093c2bb45f9969c271af59913dbcadda1cc5988f4fc79ee77774f7,2025-03-04T20:15:37.657000
|
||||
CVE-2025-1954,1,1,3f34d4e968cd36d80c9294c76386f7fccfdd6b744481da9a458dbc8dc7f57722,2025-03-04T21:15:12.750000
|
||||
CVE-2025-1955,1,1,37a5842ab02dcbdf807bbf6b0629cfaa7bc44f4f542caddab49f2045e2592b24,2025-03-04T21:15:12.940000
|
||||
CVE-2025-1956,1,1,aabfb638f3cdf7e7d2199087c7d972926788b7e97818ee83eac85710d242b360,2025-03-04T22:15:39.867000
|
||||
CVE-2025-1957,1,1,7f6f3b45364dccaebd986ed12f67b5d7457c4295eb866cfa685a6fc446d6afb2,2025-03-04T22:15:40.040000
|
||||
CVE-2025-1958,1,1,619bed4d75a15053f3aac5475d86341822d0cd5f222710eba99a248d83ce8b5d,2025-03-04T22:15:40.210000
|
||||
CVE-2025-1969,0,0,06a782c53158bfcfa719a54832f6c914b6b8cf10ad0fb557e3dedb429cf5a384,2025-03-04T19:15:38.290000
|
||||
CVE-2025-20011,0,0,5d2fdc5455e5c161d4353b8b7d096a2e122865a9c5759753d2f12b06ccf9a6a1,2025-03-04T04:15:12.563000
|
||||
CVE-2025-20014,0,0,f4fd1db051e4652a5d7e7863a21c37faec75062d4b5ce0e4f2c6bffc2f3ee854,2025-01-29T20:15:35.207000
|
||||
CVE-2025-20016,0,0,6fccb84eb01c2cd66b422e82777f9738bfe5004121e1b551d0ae454724543c0e,2025-01-14T10:15:07.500000
|
||||
CVE-2025-20021,0,1,66bbc144baff2127af309ad8a7a835483b6f43145cdf2cad0f2af891111788f6,2025-03-04T19:08:18.957000
|
||||
CVE-2025-20024,0,1,3569f88c16f615c3878055fd05c1e1469b606d33e585945aff8e7ba95671e8ea,2025-03-04T19:08:18.957000
|
||||
CVE-2025-20021,0,0,66bbc144baff2127af309ad8a7a835483b6f43145cdf2cad0f2af891111788f6,2025-03-04T19:08:18.957000
|
||||
CVE-2025-20024,0,0,3569f88c16f615c3878055fd05c1e1469b606d33e585945aff8e7ba95671e8ea,2025-03-04T19:08:18.957000
|
||||
CVE-2025-20029,0,0,d9e3ca63dc18f9436b5043ebae0bcb543cc6452f75921963fed59e1df065c2d7,2025-02-05T18:15:29.573000
|
||||
CVE-2025-20033,0,0,6c60c85e451f1d6db70378d678ddf83dacc7c823ecfb493748ed6d94114eff49,2025-01-09T07:15:28.450000
|
||||
CVE-2025-20036,0,0,a1d7639f0e568c5953a2962f5a2be630b5737d729f8c4f565a3eec7e4bf19549,2025-01-15T17:15:18.950000
|
||||
CVE-2025-20042,0,1,c3c58b2b5b175f4587092daf43b30878507483fb024449b4009843d0f9203a27,2025-03-04T19:08:18.957000
|
||||
CVE-2025-20042,0,0,c3c58b2b5b175f4587092daf43b30878507483fb024449b4009843d0f9203a27,2025-03-04T19:08:18.957000
|
||||
CVE-2025-20045,0,0,415d73f9fa018669b6b7896f4e36fdab92f13949bd42dccb63d15f65c73eedf3,2025-02-05T18:15:29.760000
|
||||
CVE-2025-20049,0,0,3911b8c375043e4ad147832fc3846511b3247cf229746da0a50bbc3da242183c,2025-02-28T17:15:16.277000
|
||||
CVE-2025-20051,0,0,f5960a6a14861956075cfae09439ba801517edcedfe4aa263146ae0b9ad313be,2025-02-24T08:15:10.087000
|
||||
@ -281067,7 +281076,7 @@ CVE-2025-20060,0,0,693c96187fad6559d71e047a6bc8c0d698d09cdfad790284793c6000b73c5
|
||||
CVE-2025-20061,0,0,6979d6e76b2847064c2a9b7a24215846556b4a731cf1290fe0f120404af6a611,2025-01-29T20:15:35.363000
|
||||
CVE-2025-20072,0,0,b9e9cb3d894db8c29d56585c14d2cf06ce7800f36f472c346f2184b6fcf02e0f,2025-01-16T18:15:28.517000
|
||||
CVE-2025-20075,0,0,d1a101f734614c5c8c3625d1b34c0ffc62ba95c1554396b4b462975c1a68bfc3,2025-02-18T00:15:21.107000
|
||||
CVE-2025-20081,0,1,5ed57b6d9702389a4c481cb0e2de09aaa2b16ad08213a3133d046dfff5a5061a,2025-03-04T19:08:18.957000
|
||||
CVE-2025-20081,0,0,5ed57b6d9702389a4c481cb0e2de09aaa2b16ad08213a3133d046dfff5a5061a,2025-03-04T19:08:18.957000
|
||||
CVE-2025-20086,0,0,c718ee138c5d706935ee7319c465eb1db60c32a8ee92f074be268892106cc0d1,2025-01-15T17:15:19.107000
|
||||
CVE-2025-20088,0,0,d069a0a8d0e55448ae448cb2d1bba620f97cc6785542779fdc1ef2f2206cb89e,2025-01-15T17:15:19.243000
|
||||
CVE-2025-20091,0,0,b9d1dce1ed45549e77916a09d472eab7dad5c2ee97791200be71edbb8dfee1dd,2025-03-04T04:15:13.253000
|
||||
@ -281827,7 +281836,7 @@ CVE-2025-22312,0,0,a7bf6287b60e0e496be523a78cca84a7ead7f5ce4262b249df941bdb26960
|
||||
CVE-2025-22313,0,0,5a053d272a7f80827a28d46605edf286de3cc07b2584d481167046830126dd01,2025-01-09T16:16:25.653000
|
||||
CVE-2025-22314,0,0,b9054b96be0754de8c0a6cb596862922b24d4794887f456f87dfd0bb880d2088,2025-01-13T14:15:10.270000
|
||||
CVE-2025-22315,0,0,a72855198b7b6c3f24eb2b601132daa754b13da0204b23fceae9c014a71d07ff,2025-01-07T11:15:15.627000
|
||||
CVE-2025-22316,0,1,c96c2f380fef8ac01d1b39b335201332211f73a13ef8acae3136b78a07347c5d,2025-03-04T19:30:24.047000
|
||||
CVE-2025-22316,0,0,c96c2f380fef8ac01d1b39b335201332211f73a13ef8acae3136b78a07347c5d,2025-03-04T19:30:24.047000
|
||||
CVE-2025-22317,0,0,8c2b42f24e2f8faacd2e0bb645d3a6edfbe8586f973836795d4b0c5487694c1f,2025-01-15T16:15:34.590000
|
||||
CVE-2025-22318,0,0,5368a1418cfba2423af73277ae3342fb96667eca67d105e8830cafc6ce9b8c3c,2025-01-21T14:15:10.110000
|
||||
CVE-2025-22319,0,0,e55624a930eb59e1a8b1dc4193cc8bdb767b79f4292003f9b671325f24154163,2025-01-07T17:15:32.810000
|
||||
@ -282179,7 +282188,7 @@ CVE-2025-22888,0,0,83c67ff923e9645ec5fafd719e12957b03331dea9b9bd08e509c66897fdc5
|
||||
CVE-2025-22890,0,0,8dd6ffe45f0151dcb8b41a48dac74b1e668a5294c2f1614982860358b9b03cd6,2025-02-06T07:15:17.113000
|
||||
CVE-2025-22891,0,0,5058a67448259ac9abdaa428b056ef85a9f11123cf1683cf0699d5426be467a6,2025-02-05T18:15:31.190000
|
||||
CVE-2025-22894,0,0,099d82dc8568fb50b5dde7926f3fbb32a13311bb5c7a970a54e9828e99c29a1c,2025-02-06T08:15:30.027000
|
||||
CVE-2025-22896,0,0,9d75a19ade9d91162e9a0c4a13a263140173b5a69917e95ab6dc8bbc94c9913f,2025-02-13T22:15:11.737000
|
||||
CVE-2025-22896,0,1,291a4adaa89bdcc150dac503f60db0675c03727130ace5fe68815e30173b8003,2025-03-04T20:59:05.417000
|
||||
CVE-2025-22897,0,0,a295222b6163a7e71540804650907cffe2d3c82432401321f3950139acc1d17a,2025-03-04T17:12:06.513000
|
||||
CVE-2025-22904,0,0,11fbec6328b596ed08ed392234d8935217007830badddad8b05907ab798c39a5,2025-02-18T21:15:26.993000
|
||||
CVE-2025-22905,0,0,bda5091cb8423b637c26775857bce84858d2915411a8d309230a6bd8a5902766,2025-02-18T21:15:27.153000
|
||||
@ -282289,10 +282298,10 @@ CVE-2025-23112,0,0,5295af5f2d972260409bf6e8ddb1e42cd398e210c99c068cbfdfd18c1a2f6
|
||||
CVE-2025-23113,0,0,e6cccd37793f33004af385d66a450da8db2860bda0bd7d1ee76256a1a29e87d5,2025-02-25T16:11:55.610000
|
||||
CVE-2025-23114,0,0,76dcd1ec6e101307de60d1efade8dc8b1885e30638a84718a1a37bbecd49b630,2025-02-05T02:15:28.610000
|
||||
CVE-2025-23115,0,0,d809baa250bb6271b2b24f5db83bcfb12be4dc10edc0be309139d3eeaccfa95c,2025-03-01T03:15:23.263000
|
||||
CVE-2025-23116,0,1,94ebcac7b22f04cee3fd23949dbd697e53008f7dfa4b4c59e2a346fa1407180d,2025-03-04T20:15:37.840000
|
||||
CVE-2025-23116,0,0,94ebcac7b22f04cee3fd23949dbd697e53008f7dfa4b4c59e2a346fa1407180d,2025-03-04T20:15:37.840000
|
||||
CVE-2025-23117,0,0,5732a4937afa35b8f8d30224de97ffd5815c8e798bd9572f33ca15c433571cdc,2025-03-01T03:15:23.473000
|
||||
CVE-2025-23118,0,1,1b6935e1de98bd988462eba8eda54cef63b56f3eba9236fce4c76fcc1a2a8638,2025-03-04T20:15:37.960000
|
||||
CVE-2025-23119,0,1,03b50e07e15abdb790cc32062bbf922a7a5b86dedcc5d4ac846195c74e91324e,2025-03-04T20:15:38.060000
|
||||
CVE-2025-23118,0,0,1b6935e1de98bd988462eba8eda54cef63b56f3eba9236fce4c76fcc1a2a8638,2025-03-04T20:15:37.960000
|
||||
CVE-2025-23119,0,0,03b50e07e15abdb790cc32062bbf922a7a5b86dedcc5d4ac846195c74e91324e,2025-03-04T20:15:38.060000
|
||||
CVE-2025-23124,0,0,4a6299a78e71ef66b973ec2da68c573755c2e809b823d245784536d2b11ad68d,2025-01-11T15:15:08.930000
|
||||
CVE-2025-23125,0,0,2e6f0fce9ee8e787d649705f4cf1025930f6b72d6ac2efc70c4c1837b8d7d15b,2025-01-11T15:15:09.023000
|
||||
CVE-2025-23126,0,0,aec9ca15332b86ad22382c8419cfef8190ae4b723f5c3088974b31a1f5dd4089,2025-01-11T15:15:09.100000
|
||||
@ -282350,7 +282359,7 @@ CVE-2025-23403,0,0,644047de2ce1ffb265b5a42cecfc2f854cd0e7552ab44d86c93242e1e0442
|
||||
CVE-2025-23405,0,0,1d766bc4849324d5a2aa10241aa29cfa3fa9dddb8599893bc0ba377c47067ae6,2025-02-28T17:15:16.637000
|
||||
CVE-2025-23406,0,0,38d5c87f4e786637cbc4fcb4a2f7006ad80927b3c7219b037e30cf1414c39e8c,2025-02-14T05:15:12.567000
|
||||
CVE-2025-23409,0,0,06262ad791ce570937296bcb697070013ba33b5198b3c057b85c061f90b04a2b,2025-03-04T17:12:06.513000
|
||||
CVE-2025-23411,0,0,2149399d3d8cce275d78a69bd832e8585ca8be81bc1e889fab80ae4194b4819b,2025-02-13T22:15:11.913000
|
||||
CVE-2025-23411,0,1,873449632c5f07c04f0012ee0ce445b82ec9d7b013c9b4a2a560f053a421fd92,2025-03-04T20:59:05.417000
|
||||
CVE-2025-23412,0,0,879dc1f233cd1ed0927b887a0c257bb01d6c254311c7a39c5817d5ae0b0fbc54,2025-02-05T18:15:31.580000
|
||||
CVE-2025-23413,0,0,5d8a681b56b331debf19dc9f08d08646859aabde28ec61411300a927339c1e48,2025-02-05T18:15:31.930000
|
||||
CVE-2025-23414,0,0,2c9de769450c672cb0ed8621be68efc7fb4031b86902dc24212f40994c2669ef,2025-03-04T17:12:06.513000
|
||||
@ -283316,8 +283325,8 @@ CVE-2025-24846,0,0,3ff917c4c6b459e301d644b006b5a125f5ca87087b0f384a12c5d025e312d
|
||||
CVE-2025-24849,0,0,0ee9898c778a9b7afdcc6b402323e98a9996b5fba0ecbd5a154a7193bceeb36e,2025-02-28T17:15:17.253000
|
||||
CVE-2025-24858,0,0,80a2e3e27ced5551413d1f52e03f6696ce40853726c2f8318cd2bd73891576ca,2025-01-26T07:15:09.237000
|
||||
CVE-2025-24860,0,0,f6b6c9635e86cbebd470da0b1fb7a3385879aa273aed1cf32bf09076c689158e,2025-02-15T01:15:11.327000
|
||||
CVE-2025-24861,0,1,fc737346eef529f7ce1820f1979d09e2fa4fa5e49ae311378cd6313a62a3da9a,2025-03-04T19:24:05.917000
|
||||
CVE-2025-24865,0,0,603eed1e7746bd38a679a73087511eb0fd535ced8399709a5c81fcbfef7ad498,2025-02-13T22:15:12.613000
|
||||
CVE-2025-24861,0,0,fc737346eef529f7ce1820f1979d09e2fa4fa5e49ae311378cd6313a62a3da9a,2025-03-04T19:24:05.917000
|
||||
CVE-2025-24865,0,1,d86122dd19f261653c8b86d31d64d9d418f9889d6a6559684ce29911d0a2e3dc,2025-03-04T20:59:05.417000
|
||||
CVE-2025-24867,0,0,32b5b4cae9faa98375e2ec8191ee6bbac47790e6975c81218e81b4b72829e2de,2025-02-11T01:15:10.847000
|
||||
CVE-2025-24868,0,0,3126f003c867405c437c9a5d233b2132fdf5dda635736a251e9443dc3f9770bc,2025-02-11T01:15:10.990000
|
||||
CVE-2025-24869,0,0,7487e9b2ea994aa31a7eba56e36180a5b91aaa886297577734820094a1ac00ef,2025-02-18T18:15:33.810000
|
||||
@ -283381,7 +283390,7 @@ CVE-2025-25063,0,0,fe8d3efef171b62a11b34e6bca9a7ce9094019d5a41cf3cdaf3675f4485df
|
||||
CVE-2025-25064,0,0,258595a704e6a3f019f4641e0546921384b59e10bf4a735ca6bcc89e948d4941,2025-02-18T19:15:28.380000
|
||||
CVE-2025-25065,0,0,45484afbd03efe60cdfc0e8025f2d7de171ad9fb0eea11f3663a654375185778,2025-02-18T19:15:28.497000
|
||||
CVE-2025-25066,0,0,bfac3442efe119c58d1253bccaa4b523ef1872eec5be8616734787a2e6e2eb4f,2025-02-03T06:15:11.373000
|
||||
CVE-2025-25067,0,0,610ce24421f83ef05e153edca72928571f3ca60dd422f89edc58c3887f9223e9,2025-02-13T22:15:12.780000
|
||||
CVE-2025-25067,0,1,2f09f51b35dbaf6463f10a0672cf6819d42c674ab7d8e36c8f2d4bf8365c44b6,2025-03-04T20:59:05.417000
|
||||
CVE-2025-25069,0,0,3ac7d43aa5f66d76ca4f47d340594454f3b8efd5492158fbebd7f38cfb3d56c4,2025-02-13T22:15:12.930000
|
||||
CVE-2025-25070,0,0,5327ab05edcb8e3afa82526bab4bc859623c1daaa376383bc1e52985f02ea43d,2025-03-03T14:15:49.490000
|
||||
CVE-2025-25071,0,0,1629f669e71655c3fde13bbe5cdd27b1092b6fb208e43d4e7d5ad171118f64db,2025-02-07T10:15:11.840000
|
||||
@ -283556,6 +283565,7 @@ CVE-2025-25379,0,0,10c6b59b7ced1a65c44b725df73613b964204bd8bcc126008f75da9f2d8ec
|
||||
CVE-2025-25387,0,0,8227bd6f57bafc5fc7f8bddfd6ec6a78dcca117ca404c22469842eba5d4e306c,2025-02-14T17:15:20.393000
|
||||
CVE-2025-25388,0,0,e086cda7e4e5c05ccba48ad30906fb7e59dedc66fc1b83e5645bd434397a431f,2025-02-13T20:15:49.730000
|
||||
CVE-2025-25389,0,0,c4fa8037812de3d612838c95ec3fcc9b936e3b28bc2aa3e854f709efa62e78c8,2025-02-14T17:15:20.663000
|
||||
CVE-2025-25426,1,1,18dfd985014e3d06f15f0887716144593e2f2c245308a61865a8a721b8c6a75e,2025-03-04T22:15:40.633000
|
||||
CVE-2025-25428,0,0,a4039c579030febd59545c017c3c1beb99a5f4778526e73f910acc016f0edd9b,2025-03-04T16:15:39.597000
|
||||
CVE-2025-25429,0,0,cececf6fd4380f28dd3128e781fd11132f0c103fc594cfd9dd17f0a87d409fc9,2025-02-28T23:15:10.903000
|
||||
CVE-2025-25430,0,0,9163efbf1f16deef9388edc5dfce8619e56506503048f018e2813a808e54d729,2025-03-04T16:15:39.763000
|
||||
@ -283635,7 +283645,7 @@ CVE-2025-25768,0,0,c0ea06537ea4dff0558f2426b2095c6f0d5d7ca5691b12d94a7b7cd0158fe
|
||||
CVE-2025-25769,0,0,c04f243adfab6d0c228896823c1de48d6c8d1554d46e87c10f438472ea98cdce,2025-02-24T18:15:19.487000
|
||||
CVE-2025-25770,0,0,083dca9bf78425b081932176ffd5590f62d2e6b52d7243e21c6da305bd5b4229,2025-02-24T18:15:20.280000
|
||||
CVE-2025-25772,0,0,049a4d8ccd7e92d8a6c37014ca81c63552e30fbd0e2bdc0e271ff3963136769b,2025-02-21T22:15:12.813000
|
||||
CVE-2025-25783,0,0,e927df359f393d1988c3409b87466786ce421f8238f7c9491a003b20edd55f28,2025-02-26T15:15:26.440000
|
||||
CVE-2025-25783,0,1,7667c9a81f530a99609c56eb13bc325e3e204504dcfbc3fb6341518f78f741e8,2025-03-04T22:15:40.787000
|
||||
CVE-2025-25784,0,0,7692b0b021ef9cff1ec4a869e2fe61c0999898fb7ec7360d59c814b17f82d8d2,2025-02-26T15:15:26.580000
|
||||
CVE-2025-25785,0,0,bc17dc315f508712d84a76b1e8f23f7f21539e82980e5f82975871a87c4e8aae,2025-02-26T15:15:26.720000
|
||||
CVE-2025-25789,0,0,dbcde910a2e6bfc7406d8baa980984134d87dc975529ef3dc53c087268dc1585,2025-02-26T15:15:26.853000
|
||||
@ -283701,13 +283711,14 @@ CVE-2025-26014,0,0,0e63db03b12de770f19f2e4a205d81f3b9f22e3b31412c31dff023e0922ec
|
||||
CVE-2025-26047,0,0,6eee5ba5b9f24b6c856893b12cf4174655504b377088e34ddf907f7cbda1f89f,2025-02-28T16:15:40.020000
|
||||
CVE-2025-26058,0,0,d6830ee74802882f622367eb3e014df2c057afc37826d4d9d4aaa490f6e8cee5,2025-02-19T21:15:15.920000
|
||||
CVE-2025-26091,0,0,de888ac48b9f6b5458a595acd54af619dbe9af0acc8f88bc90bf02904e83c7b4,2025-03-04T17:15:18.243000
|
||||
CVE-2025-26136,1,1,dd279c367bb6ad30414b81a4791646503e65d9c901ff7cc33e01460deeb04bcc,2025-03-04T21:15:13.770000
|
||||
CVE-2025-26156,0,0,3c070f48ae01803cf4deab6e20453c0715f07513428e1a7ccf93241deeb274fe,2025-02-14T19:15:15.033000
|
||||
CVE-2025-26157,0,0,59b5a4f935b691a0cfae6c8ea0b4bbb0d47e4814d1aa791e95c7dd113790e9fc,2025-02-14T20:15:37.543000
|
||||
CVE-2025-26158,0,0,b94398759aa4427b7dc090483f4f088a5c44388e38d183da6dc19ae9b872cf91,2025-02-14T20:15:37.677000
|
||||
CVE-2025-26182,0,0,6a92295a726305134e0425c70d4139d9e04662ca5b2a45afb0e0f0461299a57f,2025-03-04T17:15:18.363000
|
||||
CVE-2025-26200,0,0,07971a3db98f9cfae341b32901f42b0af32b82b7b85e8efc840488c86eda257e,2025-02-24T17:15:14.273000
|
||||
CVE-2025-26201,0,0,19cc0d8c975fa49352fb9ad1f8db6737d71edae986faba1d37ba48d4a441cec4,2025-02-24T18:15:21.047000
|
||||
CVE-2025-26202,1,1,e7579c410a7fcc5c61f85e01ce1308fe848cd4bebfecad6f981dd4f5f089526b,2025-03-04T19:15:38.640000
|
||||
CVE-2025-26202,0,0,e7579c410a7fcc5c61f85e01ce1308fe848cd4bebfecad6f981dd4f5f089526b,2025-03-04T19:15:38.640000
|
||||
CVE-2025-26206,0,0,bc67999dabe96502b241246d2665faf1f09178bdb9b72e5e7dd5401b748e2b93,2025-03-04T17:15:18.487000
|
||||
CVE-2025-26263,0,0,662238db512d7984d6510c607e6bc28336ca603217f5c07913705819afe210e7,2025-02-28T16:15:40.127000
|
||||
CVE-2025-26264,0,0,3e1d4d30fa9513d426ec3a7ec9d2895da1266ed6b8213b35e226a5d2b686e5dc,2025-02-28T22:15:39.780000
|
||||
@ -283719,6 +283730,8 @@ CVE-2025-26308,0,0,69e4926ab121453dd269ecd5c4a1e680c76cfe3a7adc73ca0152c52aac5d4
|
||||
CVE-2025-26309,0,0,7ae8d8b0652f85e6f8fa255fc222f026973cab38848f066168ff295eb6f4ee31,2025-02-21T18:16:13.790000
|
||||
CVE-2025-26310,0,0,55b236dbeb9a20179e9b06fa335fdfa1062067456641081301fd898e499e9d2b,2025-02-21T18:16:17.950000
|
||||
CVE-2025-26311,0,0,8f41ce6db700f92fea4726f2c9198369bec586ae5a386ba2dec789165ea39c8e,2025-02-20T21:15:25.907000
|
||||
CVE-2025-26318,1,1,e7267312f00e1f71c48d7e9cfc74d2787ac98dd399b64def9f7227f17d52eedb,2025-03-04T21:15:13.897000
|
||||
CVE-2025-26319,1,1,dac6da880aa641c080aacc3777799e36f634dc8b1034dbc989be52ef1fb3523c,2025-03-04T22:15:40.993000
|
||||
CVE-2025-26320,0,0,5fefe4585825870b6e42a706d5c6a8703dfe4775e609ed2f31b171f050d5485d,2025-03-04T16:15:40.240000
|
||||
CVE-2025-26325,0,0,4eaa7da6a5e4d1e182731f1781ee5d725571c0a3ec63342fdfe0db1d2f4660fc,2025-02-28T22:15:39.927000
|
||||
CVE-2025-26326,0,0,f84875e9cdda7cdf32b7a706b3dc63076bc4fd2668c6fb2df857dabcd399807f,2025-02-28T15:15:13.743000
|
||||
@ -283767,14 +283780,14 @@ CVE-2025-26409,0,0,998a9bcbefad73980e88cfadca0416aeed1df460a44260fe4402eb5cd5541
|
||||
CVE-2025-26410,0,0,36441b10bb87afc4c434a271b8839836d6ce7232b364d1eaf56804b3d996ac68,2025-02-18T18:15:36.357000
|
||||
CVE-2025-26411,0,0,fcde46ab874d21012fc4027217c83b95868b33b38456359d4b0f7ea8269a0842,2025-02-18T18:15:36.473000
|
||||
CVE-2025-26465,0,0,f25765ed256eff314f13089336ba54158694f343e4e7f929cae34b191b596bff,2025-03-03T18:15:40.247000
|
||||
CVE-2025-26466,0,1,743ad0e070bc5e7ef47cd7c04af1797ee7202bad9060b7c570566a89d39e9ff6,2025-03-04T20:15:38.167000
|
||||
CVE-2025-26466,0,0,743ad0e070bc5e7ef47cd7c04af1797ee7202bad9060b7c570566a89d39e9ff6,2025-03-04T20:15:38.167000
|
||||
CVE-2025-26473,0,0,0de7ad16e6d8c7db9e1838d2da6a9c6cb3a186f455c098963c4286ddeef3bd3d,2025-02-13T22:15:13.417000
|
||||
CVE-2025-26490,0,0,b8bc76b2be7d18c514587d66cef4d0bee94c01d7b29c32dae10138139a41dc50,2025-02-14T20:15:37.847000
|
||||
CVE-2025-26491,0,0,7c0d222179eba4a77c32c46173122e282947b63a6de5118491e2b730e6dd9271,2025-02-14T20:15:37.930000
|
||||
CVE-2025-26492,0,0,10f610a7afe531efeeb1575e93a64c84a3a6f9453498a7cd0479c1add3e10654,2025-02-11T14:15:31.260000
|
||||
CVE-2025-26493,0,0,f799a8cc0e301789ed68586a5557695a6ad2df626328779fd09deada6e66bea3,2025-02-11T14:15:31.473000
|
||||
CVE-2025-26494,0,0,9fa7dddcdaa3cd38f994e8d5f44807b1011184fd2f20f9f1171b97bd05f68ad5,2025-02-19T22:15:24.083000
|
||||
CVE-2025-26495,0,0,9bd7f91393f57ac4b7e327a438c72992a19380bc8797fca3ba6b30269fbbf330,2025-02-11T18:15:47.237000
|
||||
CVE-2025-26495,0,1,983e2fd32f57fd04049b2b771442705c11716769548e3c408ea9243e53d33e3b,2025-03-04T21:15:14.020000
|
||||
CVE-2025-26506,0,0,fbc7fbe48e89907d7f54c9d44bbfddf8def7e8f962f2da16afa56ece7168f990,2025-02-14T17:15:22.747000
|
||||
CVE-2025-26507,0,0,95b908cc64a72128294640690e70f9b52cb7f86d46bb5d8b6708727a9b7abcf3,2025-02-14T17:15:22.863000
|
||||
CVE-2025-26508,0,0,d39bd75c34a7083f955ea70add860587db1f6572db6bc11a7a1abfe21efc97ea,2025-02-14T17:15:22.983000
|
||||
@ -283998,7 +284011,7 @@ CVE-2025-27142,0,0,50c09bf35dff2e7c08051751460862f1793d1e64e755656069216a4226cde
|
||||
CVE-2025-27143,0,0,b2f4a315d358bac155e0e21cd73590b43aafc4b46c5907cec4f1957f851895fd,2025-02-28T16:07:41.847000
|
||||
CVE-2025-27144,0,0,7b7ab9cc6cc8170173ae9d52939463b9ea29a5775bc47236dbba73f17e364355,2025-02-24T23:15:11.427000
|
||||
CVE-2025-27145,0,0,7e8b752c87a1dd34aba04c7cf87b9d5cdd943f6b8e8f712300f3772423d75c2c,2025-02-25T14:15:31.567000
|
||||
CVE-2025-27146,0,1,b30cf4143c492463fc9e081a667f3688558a525e5b4a712bc44768344363998d,2025-03-04T20:42:55.570000
|
||||
CVE-2025-27146,0,0,b30cf4143c492463fc9e081a667f3688558a525e5b4a712bc44768344363998d,2025-03-04T20:42:55.570000
|
||||
CVE-2025-27148,0,0,0963513cfe4fd138a7cc371ff6c5e28b249af6b11e474f931c82fde41391bc40,2025-02-25T21:15:18.073000
|
||||
CVE-2025-27150,0,0,16645d4491d4ecf056172f9473b123dac485ad0730153c2f479b2d27b8827f53,2025-03-04T17:15:18.663000
|
||||
CVE-2025-27154,0,0,179e806bf6fd7e259a7a47a7d31c5b4ce46022e5303dc73a51a2119984531a3e,2025-02-27T15:15:41.937000
|
||||
@ -284078,8 +284091,8 @@ CVE-2025-27400,0,0,cdbf04b984faf2bb61d60f663ecdfdd44190b0515d3b8d47c87701b41ec06
|
||||
CVE-2025-27401,0,0,22ed82e05b27dccaeb90eea83d4f38739be0a524ed60e6011b6797fb1c5104a8,2025-03-04T17:15:19.547000
|
||||
CVE-2025-27402,0,0,19a0d72c136a10b841041721ff7160479f8f3faf7c693bab048416133a6a67a3,2025-03-04T17:15:19.703000
|
||||
CVE-2025-27408,0,0,1a23c30b7689ae8b8ad6930173abdf59d3279571e27ef7dee42c61d8dd013e6b,2025-02-28T18:15:28.983000
|
||||
CVE-2025-27410,0,0,542213b5e82bd30fa9408540bb6d09bd94cf07a4e4b5ab21e3b6313192903c64,2025-02-28T21:15:27.677000
|
||||
CVE-2025-27413,0,0,3c683ca647c635eed6050d34ef335b08e4f82a229181584d65143149a8f8e1dd,2025-02-28T21:15:27.820000
|
||||
CVE-2025-27410,0,1,622f5e65362d03d0ed561fcc081614d728b6f23a5af908c6c614a85e8709a2df,2025-03-04T21:15:14.197000
|
||||
CVE-2025-27413,0,1,66f5e580a6d62dac3e1a8081e71a88e4497308b17c07d32439f0a0f6705b5196,2025-03-04T21:15:14.303000
|
||||
CVE-2025-27414,0,0,dade89b00ff438afc3d75db3405cd2399cd0f72f2b40e361d9e8e1ad3c96ce6b,2025-02-28T21:15:27.957000
|
||||
CVE-2025-27416,0,0,bfd9605f18fa0d0b58583b28f8d49afc65f3c8a40e0ddae1ef370584ff7e71a4,2025-03-01T01:15:28.857000
|
||||
CVE-2025-27417,0,0,cdcf8fc02cc79b9a0b20b04560621cd31c16ef1455c76722ca7ab3938e8044e5,2025-03-04T17:15:19.857000
|
||||
@ -284097,9 +284110,10 @@ CVE-2025-27499,0,0,4965d1f33bd39650c875a4f519cbf29847dad09c69afddd5d8f9f75ded369
|
||||
CVE-2025-27500,0,0,be50dbcb64bc9b0e171440007ce7d77f7cd94b8b10aa18d6f6266491eec37f80,2025-03-03T19:15:36.157000
|
||||
CVE-2025-27501,0,0,585f2e0737e182b22f02653235a04e243ed477e6e20bf1f8010304d8d76990c5,2025-03-03T19:15:36.300000
|
||||
CVE-2025-27507,0,0,ac222d7a76e525c1f46cf22a467332d1ebeead1ea6a6b94fad24e3b75b3e24ea,2025-03-04T17:15:20.360000
|
||||
CVE-2025-27510,1,1,19950d83b5cbb49ed1aa4b1fda9e8249865d9f8162ff1ffdeb4e6b89c8f42b9b,2025-03-04T22:15:41.147000
|
||||
CVE-2025-27521,0,0,06038b1cc125ef52d54e2a9ad4394e47e044a334b4438ae976f884783cb609c4,2025-03-04T08:15:36.203000
|
||||
CVE-2025-27554,0,0,47bde4f4167aaccaa05d2d034a78839ca444a85000927aab5c407b820ef1320c,2025-03-01T06:15:34.693000
|
||||
CVE-2025-27579,0,1,e37901d639203dabeb0abb1f8d25952e3d9090042ecc93a0b94bf072c75c186f,2025-03-04T19:15:38.800000
|
||||
CVE-2025-27579,0,0,e37901d639203dabeb0abb1f8d25952e3d9090042ecc93a0b94bf072c75c186f,2025-03-04T19:15:38.800000
|
||||
CVE-2025-27583,0,0,18dfdb5a0ae261632796dbd76e99b9a1ffc071aa6c00449a4d28af735e378f81,2025-03-03T01:15:12.030000
|
||||
CVE-2025-27584,0,0,7c36caae7b88889d70bacae0c47b7b1525e549e4aea51dfda3fa9c2476496e88,2025-03-04T17:15:20.527000
|
||||
CVE-2025-27585,0,0,e4743bb908476490b966e1bc83c4b96f68ead94a4d392d96480e7b58a960cb94,2025-03-04T17:15:20.690000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user