mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-06 18:52:58 +00:00
Auto-Update: 2025-02-27T17:00:20.597792+00:00
This commit is contained in:
parent
3421beccb3
commit
63a904ffaf
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-4466",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2023-03-13T17:15:11.857",
|
||||
"lastModified": "2024-11-21T07:35:19.140",
|
||||
"lastModified": "2025-02-27T16:15:33.850",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -35,6 +35,18 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-4661",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2023-03-13T17:15:12.010",
|
||||
"lastModified": "2024-11-21T07:35:41.290",
|
||||
"lastModified": "2025-02-27T16:15:35.253",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -35,6 +35,18 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-0073",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2023-03-13T17:15:12.233",
|
||||
"lastModified": "2024-11-21T07:36:30.153",
|
||||
"lastModified": "2025-02-27T16:15:35.380",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -35,6 +35,18 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-0100",
|
||||
"sourceIdentifier": "emo@eclipse.org",
|
||||
"published": "2023-03-15T15:15:09.533",
|
||||
"lastModified": "2024-11-21T07:36:33.180",
|
||||
"lastModified": "2025-02-27T15:15:35.703",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -55,6 +55,16 @@
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-20"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-0172",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2023-03-13T17:15:12.327",
|
||||
"lastModified": "2024-11-21T07:36:40.990",
|
||||
"lastModified": "2025-02-27T16:15:35.517",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -35,6 +35,18 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-0538",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2023-03-13T17:15:12.583",
|
||||
"lastModified": "2024-11-21T07:37:22.083",
|
||||
"lastModified": "2025-02-27T16:15:35.693",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -35,6 +35,18 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-0844",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2023-03-13T17:15:12.850",
|
||||
"lastModified": "2024-11-21T07:37:56.533",
|
||||
"lastModified": "2025-02-27T16:15:35.820",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -35,6 +35,18 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-24468",
|
||||
"sourceIdentifier": "security@opentext.com",
|
||||
"published": "2023-03-15T23:15:09.563",
|
||||
"lastModified": "2024-11-21T07:47:55.107",
|
||||
"lastModified": "2025-02-27T15:15:36.287",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -45,6 +45,16 @@
|
||||
"value": "NVD-CWE-Other"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-284"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-25344",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-03-15T20:15:10.480",
|
||||
"lastModified": "2024-11-21T07:49:25.280",
|
||||
"lastModified": "2025-02-27T15:15:36.880",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -45,6 +45,16 @@
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-94"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-25589",
|
||||
"sourceIdentifier": "security-alert@hpe.com",
|
||||
"published": "2023-03-22T06:15:09.837",
|
||||
"lastModified": "2024-11-21T07:49:47.050",
|
||||
"lastModified": "2025-02-27T16:15:36.483",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -65,6 +65,16 @@
|
||||
"value": "NVD-CWE-Other"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-306"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-25590",
|
||||
"sourceIdentifier": "security-alert@hpe.com",
|
||||
"published": "2023-03-22T06:15:09.927",
|
||||
"lastModified": "2024-11-21T07:49:47.190",
|
||||
"lastModified": "2025-02-27T16:15:36.647",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -65,6 +65,16 @@
|
||||
"value": "CWE-269"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-269"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-25591",
|
||||
"sourceIdentifier": "security-alert@hpe.com",
|
||||
"published": "2023-03-22T06:15:10.017",
|
||||
"lastModified": "2024-11-21T07:49:47.307",
|
||||
"lastModified": "2025-02-27T16:15:36.780",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -65,6 +65,16 @@
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-266"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-25592",
|
||||
"sourceIdentifier": "security-alert@hpe.com",
|
||||
"published": "2023-03-22T06:15:10.110",
|
||||
"lastModified": "2024-11-21T07:49:47.423",
|
||||
"lastModified": "2025-02-27T15:15:37.023",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -65,6 +65,16 @@
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-25593",
|
||||
"sourceIdentifier": "security-alert@hpe.com",
|
||||
"published": "2023-03-22T06:15:10.220",
|
||||
"lastModified": "2024-11-21T07:49:47.533",
|
||||
"lastModified": "2025-02-27T15:15:37.180",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -65,6 +65,16 @@
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-25594",
|
||||
"sourceIdentifier": "security-alert@hpe.com",
|
||||
"published": "2023-03-22T06:15:10.337",
|
||||
"lastModified": "2024-11-21T07:49:47.660",
|
||||
"lastModified": "2025-02-27T15:15:37.313",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -65,6 +65,16 @@
|
||||
"value": "CWE-863"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-863"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-25596",
|
||||
"sourceIdentifier": "security-alert@hpe.com",
|
||||
"published": "2023-03-22T06:15:10.517",
|
||||
"lastModified": "2024-11-21T07:49:47.883",
|
||||
"lastModified": "2025-02-27T15:15:37.443",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -65,6 +65,16 @@
|
||||
"value": "CWE-312"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-312"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-27239",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-03-15T06:15:08.337",
|
||||
"lastModified": "2024-11-21T07:52:30.530",
|
||||
"lastModified": "2025-02-27T15:15:37.690",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-6495",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-06-19T09:15:10.433",
|
||||
"lastModified": "2024-11-21T08:43:57.933",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-02-27T15:15:08.350",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,25 +36,87 @@
|
||||
},
|
||||
"exploitabilityScore": 1.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 4.8,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.7,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:yarpp:yet_another_related_posts_plugin:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "5.30.10",
|
||||
"matchCriteriaId": "4BB81329-B1F5-468F-B8A0-D2A9B338763E"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3037032%40yet-another-related-posts-plugin%2Ftrunk&old=2999784%40yet-another-related-posts-plugin%2Ftrunk&sfp_email=&sfph_mail=",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/d586e455-c73f-4916-a926-4d53699bb434?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3037032%40yet-another-related-posts-plugin%2Ftrunk&old=2999784%40yet-another-related-posts-plugin%2Ftrunk&sfp_email=&sfph_mail=",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/d586e455-c73f-4916-a926-4d53699bb434?source=cve",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-0383",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-06-19T09:15:10.807",
|
||||
"lastModified": "2024-11-21T08:46:27.953",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-02-27T15:15:08.350",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,33 +36,101 @@
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:bootstrapped:wp_recipe_maker:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "9.1.1",
|
||||
"matchCriteriaId": "D8D96A84-8F23-4BB4-9E97-9AD1D78010DE"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3019769/wp-recipe-maker/trunk/includes/public/shortcodes/recipe/class-wprm-sc-ingredients.php",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3019769/wp-recipe-maker/trunk/includes/public/shortcodes/recipe/class-wprm-sc-instructions.php",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/104b3c01-4623-43cb-aed4-16e3be62e1f9?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3019769/wp-recipe-maker/trunk/includes/public/shortcodes/recipe/class-wprm-sc-ingredients.php",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3019769/wp-recipe-maker/trunk/includes/public/shortcodes/recipe/class-wprm-sc-instructions.php",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/104b3c01-4623-43cb-aed4-16e3be62e1f9?source=cve",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
63
CVE-2024/CVE-2024-131xx/CVE-2024-13148.json
Normal file
63
CVE-2024/CVE-2024-131xx/CVE-2024-13148.json
Normal file
@ -0,0 +1,63 @@
|
||||
{
|
||||
"id": "CVE-2024-13148",
|
||||
"sourceIdentifier": "iletisim@usom.gov.tr",
|
||||
"published": "2025-02-27T15:15:38.583",
|
||||
"lastModified": "2025-02-27T15:15:38.583",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [
|
||||
{
|
||||
"sourceIdentifier": "iletisim@usom.gov.tr",
|
||||
"tags": [
|
||||
"exclusively-hosted-service"
|
||||
]
|
||||
}
|
||||
],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Yukseloglu Filter B2B Login Platform allows SQL Injection.This issue affects B2B Login Platform: before 16.01.2025."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "iletisim@usom.gov.tr",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "iletisim@usom.gov.tr",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.usom.gov.tr/bildirim/tr-25-0045",
|
||||
"source": "iletisim@usom.gov.tr"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-2765",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-05-02T17:15:19.280",
|
||||
"lastModified": "2024-11-21T09:10:28.063",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-02-27T16:24:20.267",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,49 +36,129 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.5
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ultimatemember:ultimate_member:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "2.8.5",
|
||||
"matchCriteriaId": "87F1C080-FF86-41A4-8C9B-62AB0D49DC43"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/ultimatemember/ultimatemember/blob/de04d89a49dfb9baf4019ea77b1edfbcd17fd849/includes/core/um-filters-fields.php#L117",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/ultimatemember/ultimatemember/blob/de04d89a49dfb9baf4019ea77b1edfbcd17fd849/includes/core/um-filters-fields.php#L472",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/ultimatemember/ultimatemember/pull/1491/files",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3067953%40ultimate-member&new=3067953%40ultimate-member&sfp_email=&sfph_mail=",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/86ddd5fd-137b-478e-952e-b36fc6a5c28d?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/ultimatemember/ultimatemember/blob/de04d89a49dfb9baf4019ea77b1edfbcd17fd849/includes/core/um-filters-fields.php#L117",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/ultimatemember/ultimatemember/blob/de04d89a49dfb9baf4019ea77b1edfbcd17fd849/includes/core/um-filters-fields.php#L472",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/ultimatemember/ultimatemember/pull/1491/files",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3067953%40ultimate-member&new=3067953%40ultimate-member&sfp_email=&sfph_mail=",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/86ddd5fd-137b-478e-952e-b36fc6a5c28d?source=cve",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-3490",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-05-02T07:15:22.040",
|
||||
"lastModified": "2024-11-21T09:29:42.900",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-02-27T16:24:20.267",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,25 +36,87 @@
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:bootstrapped:wp_recipe_maker:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "9.4.0",
|
||||
"matchCriteriaId": "3688DE8F-EF8A-46FB-9BE2-AF15A31C45FA"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3078644/wp-recipe-maker",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/69cc7b6c-b6c2-4bba-afb4-86ba1b36b295?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3078644/wp-recipe-maker",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/69cc7b6c-b6c2-4bba-afb4-86ba1b36b295?source=cve",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-3781",
|
||||
"sourceIdentifier": "cve-coordination@incibe.es",
|
||||
"published": "2024-04-15T14:15:08.013",
|
||||
"lastModified": "2024-11-21T09:30:23.203",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-02-27T15:34:49.607",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,14 +51,37 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:whitebearsolutions:wbsairback:21.02.04:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8B16A4DD-68FD-4E8E-B775-83CAA5F0E469"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-wbsairback-white-bear-solutions",
|
||||
"source": "cve-coordination@incibe.es"
|
||||
"source": "cve-coordination@incibe.es",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-wbsairback-white-bear-solutions",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-3782",
|
||||
"sourceIdentifier": "cve-coordination@incibe.es",
|
||||
"published": "2024-04-15T14:15:08.213",
|
||||
"lastModified": "2024-11-21T09:30:23.343",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-02-27T15:34:49.607",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,14 +51,37 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:whitebearsolutions:wbsairback:21.02.04:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8B16A4DD-68FD-4E8E-B775-83CAA5F0E469"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-wbsairback-white-bear-solutions",
|
||||
"source": "cve-coordination@incibe.es"
|
||||
"source": "cve-coordination@incibe.es",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-wbsairback-white-bear-solutions",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-3783",
|
||||
"sourceIdentifier": "cve-coordination@incibe.es",
|
||||
"published": "2024-04-15T14:15:08.400",
|
||||
"lastModified": "2024-11-21T09:30:23.470",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-02-27T15:34:49.607",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,14 +51,37 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:whitebearsolutions:wbsairback:21.02.04:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8B16A4DD-68FD-4E8E-B775-83CAA5F0E469"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-wbsairback-white-bear-solutions",
|
||||
"source": "cve-coordination@incibe.es"
|
||||
"source": "cve-coordination@incibe.es",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-wbsairback-white-bear-solutions",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-3784",
|
||||
"sourceIdentifier": "cve-coordination@incibe.es",
|
||||
"published": "2024-04-15T14:15:08.600",
|
||||
"lastModified": "2024-11-21T09:30:23.603",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-02-27T15:34:49.607",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,17 +36,72 @@
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 3.7
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:L",
|
||||
"baseScore": 6.6,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-94"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:whitebearsolutions:wbsairback:21.02.04:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8B16A4DD-68FD-4E8E-B775-83CAA5F0E469"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-wbsairback-white-bear-solutions",
|
||||
"source": "cve-coordination@incibe.es"
|
||||
"source": "cve-coordination@incibe.es",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-wbsairback-white-bear-solutions",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-3787",
|
||||
"sourceIdentifier": "cve-coordination@incibe.es",
|
||||
"published": "2024-05-14T15:42:16.080",
|
||||
"lastModified": "2024-11-21T09:30:24.027",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-02-27T15:34:49.607",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,17 +36,72 @@
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 3.7
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:L",
|
||||
"baseScore": 6.6,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-94"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:whitebearsolutions:wbsairback:21.02.04:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8B16A4DD-68FD-4E8E-B775-83CAA5F0E469"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-wbsairback-white-bear-solutions",
|
||||
"source": "cve-coordination@incibe.es"
|
||||
"source": "cve-coordination@incibe.es",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-wbsairback-white-bear-solutions",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-3789",
|
||||
"sourceIdentifier": "cve-coordination@incibe.es",
|
||||
"published": "2024-05-14T15:42:16.860",
|
||||
"lastModified": "2024-11-21T09:30:24.290",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-02-27T15:34:49.607",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,14 +51,37 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:whitebearsolutions:wbsairback:21.02.04:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8B16A4DD-68FD-4E8E-B775-83CAA5F0E469"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-wbsairback-white-bear-solutions",
|
||||
"source": "cve-coordination@incibe.es"
|
||||
"source": "cve-coordination@incibe.es",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-wbsairback-white-bear-solutions",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-3790",
|
||||
"sourceIdentifier": "cve-coordination@incibe.es",
|
||||
"published": "2024-05-14T15:42:17.243",
|
||||
"lastModified": "2024-11-21T09:30:24.420",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-02-27T15:34:49.607",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,14 +51,37 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:whitebearsolutions:wbsairback:21.02.04:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8B16A4DD-68FD-4E8E-B775-83CAA5F0E469"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-wbsairback-white-bear-solutions",
|
||||
"source": "cve-coordination@incibe.es"
|
||||
"source": "cve-coordination@incibe.es",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-wbsairback-white-bear-solutions",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-3791",
|
||||
"sourceIdentifier": "cve-coordination@incibe.es",
|
||||
"published": "2024-05-14T15:42:17.880",
|
||||
"lastModified": "2024-11-21T09:30:24.543",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-02-27T15:34:49.607",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,14 +51,37 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:whitebearsolutions:wbsairback:21.02.04:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8B16A4DD-68FD-4E8E-B775-83CAA5F0E469"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-wbsairback-white-bear-solutions",
|
||||
"source": "cve-coordination@incibe.es"
|
||||
"source": "cve-coordination@incibe.es",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-wbsairback-white-bear-solutions",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-3792",
|
||||
"sourceIdentifier": "cve-coordination@incibe.es",
|
||||
"published": "2024-05-14T15:42:18.567",
|
||||
"lastModified": "2024-11-21T09:30:24.667",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-02-27T15:34:49.607",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,14 +51,37 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:whitebearsolutions:wbsairback:21.02.04:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8B16A4DD-68FD-4E8E-B775-83CAA5F0E469"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-wbsairback-white-bear-solutions",
|
||||
"source": "cve-coordination@incibe.es"
|
||||
"source": "cve-coordination@incibe.es",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-wbsairback-white-bear-solutions",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-3793",
|
||||
"sourceIdentifier": "cve-coordination@incibe.es",
|
||||
"published": "2024-05-14T15:42:19.017",
|
||||
"lastModified": "2024-11-21T09:30:24.793",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-02-27T15:34:49.607",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,14 +51,37 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:whitebearsolutions:wbsairback:21.02.04:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8B16A4DD-68FD-4E8E-B775-83CAA5F0E469"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-wbsairback-white-bear-solutions",
|
||||
"source": "cve-coordination@incibe.es"
|
||||
"source": "cve-coordination@incibe.es",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-wbsairback-white-bear-solutions",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-3794",
|
||||
"sourceIdentifier": "cve-coordination@incibe.es",
|
||||
"published": "2024-05-14T15:42:19.673",
|
||||
"lastModified": "2024-11-21T09:30:24.920",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-02-27T15:34:49.607",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,14 +51,37 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:whitebearsolutions:wbsairback:21.02.04:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8B16A4DD-68FD-4E8E-B775-83CAA5F0E469"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-wbsairback-white-bear-solutions",
|
||||
"source": "cve-coordination@incibe.es"
|
||||
"source": "cve-coordination@incibe.es",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-wbsairback-white-bear-solutions",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-3795",
|
||||
"sourceIdentifier": "cve-coordination@incibe.es",
|
||||
"published": "2024-05-14T15:42:20.367",
|
||||
"lastModified": "2024-11-21T09:30:25.043",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-02-27T15:34:49.607",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,14 +51,37 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:whitebearsolutions:wbsairback:21.02.04:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8B16A4DD-68FD-4E8E-B775-83CAA5F0E469"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-wbsairback-white-bear-solutions",
|
||||
"source": "cve-coordination@incibe.es"
|
||||
"source": "cve-coordination@incibe.es",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-wbsairback-white-bear-solutions",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-3796",
|
||||
"sourceIdentifier": "cve-coordination@incibe.es",
|
||||
"published": "2024-05-14T15:42:20.967",
|
||||
"lastModified": "2024-11-21T09:30:25.163",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-02-27T15:34:49.607",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,14 +51,37 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:whitebearsolutions:wbsairback:21.02.04:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8B16A4DD-68FD-4E8E-B775-83CAA5F0E469"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-wbsairback-white-bear-solutions",
|
||||
"source": "cve-coordination@incibe.es"
|
||||
"source": "cve-coordination@incibe.es",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-wbsairback-white-bear-solutions",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-3895",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-05-02T17:15:32.250",
|
||||
"lastModified": "2024-11-21T09:30:39.007",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-02-27T16:24:20.267",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -39,38 +39,92 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:androidbubbles:wp_datepicker:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "2.1.1",
|
||||
"matchCriteriaId": "D4F6FAEB-6E8C-45B0-9B50-EAF5FE466D76"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3073525/wp-datepicker/trunk/inc/functions_inner.php",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3071975%40wp-datepicker&new=3071975%40wp-datepicker&sfp_email=&sfph_mail=",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3073221%40wp-datepicker&new=3073221%40wp-datepicker&sfp_email=&sfph_mail=",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/45a42f20-a4d7-4c8e-a144-505a6723a2a0?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3073525/wp-datepicker/trunk/inc/functions_inner.php",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3071975%40wp-datepicker&new=3071975%40wp-datepicker&sfp_email=&sfph_mail=",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3073221%40wp-datepicker&new=3073221%40wp-datepicker&sfp_email=&sfph_mail=",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/45a42f20-a4d7-4c8e-a144-505a6723a2a0?source=cve",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-541xx/CVE-2024-54169.json
Normal file
56
CVE-2024/CVE-2024-541xx/CVE-2024-54169.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-54169",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2025-02-27T15:15:39.100",
|
||||
"lastModified": "2025-02-27T15:15:39.100",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "IBM EntireX 11.1\u00a0could allow an authenticated attacker to traverse directories on the system. An attacker could send a specially crafted URL request containing \"dot dot\" sequences (/../) to view arbitrary files on the system."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-22"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7184194",
|
||||
"source": "psirt@us.ibm.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-541xx/CVE-2024-54170.json
Normal file
56
CVE-2024/CVE-2024-541xx/CVE-2024-54170.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-54170",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2025-02-27T15:15:39.240",
|
||||
"lastModified": "2025-02-27T15:15:39.240",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "IBM EntireX 11.1\u00a0could allow a local user to cause a denial of service due to use of a regular expression with an inefficient complexity that consumes excessive CPU cycles."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-1333"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7184194",
|
||||
"source": "psirt@us.ibm.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-564xx/CVE-2024-56493.json
Normal file
56
CVE-2024/CVE-2024-564xx/CVE-2024-56493.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-56493",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2025-02-27T15:15:39.377",
|
||||
"lastModified": "2025-02-27T15:15:39.377",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "IBM EntireX 11.1 could allow a local user to obtain sensitive information when a detailed technical error message is returned. This information could be used in further attacks against the system."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
||||
"baseScore": 3.3,
|
||||
"baseSeverity": "LOW",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-209"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7184194",
|
||||
"source": "psirt@us.ibm.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-564xx/CVE-2024-56494.json
Normal file
56
CVE-2024/CVE-2024-564xx/CVE-2024-56494.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-56494",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2025-02-27T15:15:39.517",
|
||||
"lastModified": "2025-02-27T15:15:39.517",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "IBM EntireX 11.1 could allow a local user to obtain sensitive information when a detailed technical error message is returned. This information could be used in further attacks against the system."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
||||
"baseScore": 3.3,
|
||||
"baseSeverity": "LOW",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-209"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7184194",
|
||||
"source": "psirt@us.ibm.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-564xx/CVE-2024-56495.json
Normal file
56
CVE-2024/CVE-2024-564xx/CVE-2024-56495.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-56495",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2025-02-27T15:15:39.657",
|
||||
"lastModified": "2025-02-27T15:15:39.657",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "IBM EntireX 11.1 could allow a local user to obtain sensitive information when a detailed technical error message is returned. This information could be used in further attacks against the system."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
||||
"baseScore": 3.3,
|
||||
"baseSeverity": "LOW",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-209"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7184194",
|
||||
"source": "psirt@us.ibm.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-564xx/CVE-2024-56496.json
Normal file
56
CVE-2024/CVE-2024-564xx/CVE-2024-56496.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-56496",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2025-02-27T15:15:39.793",
|
||||
"lastModified": "2025-02-27T15:15:39.793",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "IBM EntireX 11.1 could allow a local user to obtain sensitive information when a detailed technical error message is returned. This information could be used in further attacks against the system."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
||||
"baseScore": 3.3,
|
||||
"baseSeverity": "LOW",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-209"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7184194",
|
||||
"source": "psirt@us.ibm.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-568xx/CVE-2024-56810.json
Normal file
56
CVE-2024/CVE-2024-568xx/CVE-2024-56810.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-56810",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2025-02-27T15:15:39.930",
|
||||
"lastModified": "2025-02-27T15:15:39.930",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "IBM EntireX 11.1 could allow a local user to obtain sensitive information when a detailed technical error message is returned. This information could be used in further attacks against the system."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
||||
"baseScore": 3.3,
|
||||
"baseSeverity": "LOW",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-209"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7184194",
|
||||
"source": "psirt@us.ibm.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-568xx/CVE-2024-56811.json
Normal file
56
CVE-2024/CVE-2024-568xx/CVE-2024-56811.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-56811",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2025-02-27T15:15:40.067",
|
||||
"lastModified": "2025-02-27T15:15:40.067",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "IBM EntireX 11.1 could allow a local user to obtain sensitive information when a detailed technical error message is returned. This information could be used in further attacks against the system."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
||||
"baseScore": 3.3,
|
||||
"baseSeverity": "LOW",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-209"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7184194",
|
||||
"source": "psirt@us.ibm.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-568xx/CVE-2024-56812.json
Normal file
56
CVE-2024/CVE-2024-568xx/CVE-2024-56812.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-56812",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2025-02-27T15:15:40.200",
|
||||
"lastModified": "2025-02-27T15:15:40.200",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "IBM EntireX 11.1 could allow a local user to obtain sensitive information when a detailed technical error message is returned. This information could be used in further attacks against the system."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
||||
"baseScore": 3.3,
|
||||
"baseSeverity": "LOW",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-209"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7184194",
|
||||
"source": "psirt@us.ibm.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2025/CVE-2025-07xx/CVE-2025-0759.json
Normal file
56
CVE-2025/CVE-2025-07xx/CVE-2025-0759.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-0759",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2025-02-27T15:15:40.603",
|
||||
"lastModified": "2025-02-27T15:15:40.603",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "IBM EntireX 11.1 could allow a local user to unintentionally modify data timestamp integrity due to improper shared resource synchronization."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
|
||||
"baseScore": 3.3,
|
||||
"baseSeverity": "LOW",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-367"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7184194",
|
||||
"source": "psirt@us.ibm.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-0893",
|
||||
"sourceIdentifier": "secure@symantec.com",
|
||||
"published": "2025-02-19T18:15:24.127",
|
||||
"lastModified": "2025-02-19T18:15:24.127",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-02-27T16:15:38.110",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -39,6 +39,18 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-269"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25417",
|
||||
|
56
CVE-2025/CVE-2025-09xx/CVE-2025-0914.json
Normal file
56
CVE-2025/CVE-2025-09xx/CVE-2025-0914.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-0914",
|
||||
"sourceIdentifier": "cve@rapid7.com",
|
||||
"published": "2025-02-27T16:15:38.237",
|
||||
"lastModified": "2025-02-27T16:15:38.237",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An improper access control issue in the VQL shell feature in Velociraptor Versions < 0.73.4 allowed authenticated users to execute the execve() plugin in deployments where this was explicitly forbidden by configuring the prevent_execve flag in the configuration file. This setting is not usually recommended and is uncommonly used, so this issue will only affect users who do set it. This issue is fixed in release 0.73.4."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cve@rapid7.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N",
|
||||
"baseScore": 3.8,
|
||||
"baseSeverity": "LOW",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 2.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cve@rapid7.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-281"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://docs.velociraptor.app/announcements/advisories/cve-2025-0914/",
|
||||
"source": "cve@rapid7.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-1247",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2025-02-13T14:16:18.400",
|
||||
"lastModified": "2025-02-27T14:15:35.523",
|
||||
"lastModified": "2025-02-27T16:15:38.390",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -52,6 +52,10 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2025:1884",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2025:1885",
|
||||
"source": "secalert@redhat.com"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-1634",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2025-02-26T17:15:22.083",
|
||||
"lastModified": "2025-02-27T14:15:35.650",
|
||||
"lastModified": "2025-02-27T16:15:38.500",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -52,6 +52,10 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2025:1884",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2025:1885",
|
||||
"source": "secalert@redhat.com"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-1686",
|
||||
"sourceIdentifier": "report@snyk.io",
|
||||
"published": "2025-02-27T05:15:14.143",
|
||||
"lastModified": "2025-02-27T05:15:14.143",
|
||||
"lastModified": "2025-02-27T15:15:40.940",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -89,6 +89,16 @@
|
||||
"value": "CWE-73"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-73"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
@ -107,6 +117,10 @@
|
||||
{
|
||||
"url": "https://security.snyk.io/vuln/SNYK-JAVA-IOPEBBLETEMPLATES-8745594",
|
||||
"source": "report@snyk.io"
|
||||
},
|
||||
{
|
||||
"url": "https://security.snyk.io/vuln/SNYK-JAVA-IOPEBBLETEMPLATES-8745594",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2025-1691",
|
||||
"sourceIdentifier": "cna@mongodb.com",
|
||||
"published": "2025-02-27T13:15:11.253",
|
||||
"lastModified": "2025-02-27T13:15:11.253",
|
||||
"lastModified": "2025-02-27T16:15:38.610",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The MongoDB Shell may be susceptible to control character injection where an attacker with control of the mongosh autocomplete feature, can use the autocompletion feature to input and run obfuscated malicious text. This requires user interaction in the form of the user using \u2018tab\u2019 to autocomplete text that is a prefix of the attacker\u2019s prepared autocompletion. This issue affects mongosh versions prior to\u00a02.3.9.\u00a0\n\n\n\n\nThe vulnerability is exploitable only when mongosh is connected to a cluster that is partially or fully controlled by an attacker."
|
||||
"value": "The MongoDB Shell may be susceptible to control character injection where an attacker with control of the mongosh autocomplete feature, can use the autocompletion feature to input and run obfuscated malicious text. This requires user interaction in the form of the user using \u2018tab\u2019 to autocomplete text that is a prefix of the attacker\u2019s prepared autocompletion. This issue affects mongosh versions prior to\u00a02.3.9.\u00a0\n\n\nThe vulnerability is exploitable only when mongosh is connected to a cluster that is partially or fully controlled by an attacker."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
153
CVE-2025/CVE-2025-17xx/CVE-2025-1741.json
Normal file
153
CVE-2025/CVE-2025-17xx/CVE-2025-1741.json
Normal file
@ -0,0 +1,153 @@
|
||||
{
|
||||
"id": "CVE-2025-1741",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-02-27T16:15:38.930",
|
||||
"lastModified": "2025-02-27T16:15:38.930",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability classified as problematic was found in b1gMail up to 7.4.1-pl1. Affected by this vulnerability is an unknown functionality of the file src/admin/users.php of the component Admin Page. The manipulation of the argument query/q leads to deserialization. The attack can be launched remotely. Upgrading to version 7.4.1-pl2 is able to address this issue. The identifier of the patch is 4816c8b748f6a5b965c8994e2cf10861bf6e68aa. It is recommended to upgrade the affected component. The vendor acted highly professional and even fixed this issue in the discontinued commercial edition as b1gMail 7.4.0-pl3."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 5.1,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "LOW",
|
||||
"vulnIntegrityImpact": "LOW",
|
||||
"vulnAvailabilityImpact": "LOW",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L",
|
||||
"baseScore": 4.7,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:M/C:P/I:P/A:P",
|
||||
"baseScore": 5.8,
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "MULTIPLE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL"
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 6.4,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-20"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-502"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/mcdruid/cb0b848c12fd6a6bc0c1b3357b983d30",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/b1gMail-OSS/b1gMail/commit/4816c8b748f6a5b965c8994e2cf10861bf6e68aa",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/b1gMail-OSS/b1gMail/releases/tag/7.4.1-pl2",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.297829",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.297829",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.505838",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.b1gmail.eu/forum/thread/217-security-update-to-b1gmail-7-4-1-released/",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2025/CVE-2025-17xx/CVE-2025-1755.json
Normal file
60
CVE-2025/CVE-2025-17xx/CVE-2025-1755.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2025-1755",
|
||||
"sourceIdentifier": "cna@mongodb.com",
|
||||
"published": "2025-02-27T16:15:39.137",
|
||||
"lastModified": "2025-02-27T16:15:39.137",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "MongoDB Compass may be susceptible to local privilege escalation under certain conditions potentially enabling unauthorized actions on a user's system with elevated privileges, when a crafted file is stored in C:\\node_modules\\. This issue affects MongoDB Compass prior to 1.42.1"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@mongodb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 6.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@mongodb.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-426"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://jira.mongodb.org/browse/COMPASS-9058",
|
||||
"source": "cna@mongodb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2025:1755.html",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2025/CVE-2025-17xx/CVE-2025-1756.json
Normal file
60
CVE-2025/CVE-2025-17xx/CVE-2025-1756.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2025-1756",
|
||||
"sourceIdentifier": "cna@mongodb.com",
|
||||
"published": "2025-02-27T16:15:39.287",
|
||||
"lastModified": "2025-02-27T16:15:39.287",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "mongosh may be susceptible to local privilege escalation under certain conditions potentially enabling unauthorized actions on a user's system with elevated privilege, when a crafted file is stored in C:\\node_modules\\. This issue affects mongosh prior to 2.3.0"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@mongodb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 6.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@mongodb.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-426"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://jira.mongodb.org/browse/MONGOSH-2028",
|
||||
"source": "cna@mongodb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2025:1756",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2025/CVE-2025-253xx/CVE-2025-25323.json
Normal file
21
CVE-2025/CVE-2025-253xx/CVE-2025-25323.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2025-25323",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-27T16:15:39.637",
|
||||
"lastModified": "2025-02-27T16:15:39.637",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue in Qianjin Network Information Technology (Shanghai) Co., Ltd 51Job iOS 14.22.0 allows attackers to access sensitive user information via supplying a crafted link."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/ZhouZiyi1/Vuls/blob/main/250111-51Job/250111-51Job.pdf",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2025/CVE-2025-253xx/CVE-2025-25324.json
Normal file
21
CVE-2025/CVE-2025-253xx/CVE-2025-25324.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2025-25324",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-27T16:15:39.760",
|
||||
"lastModified": "2025-02-27T16:15:39.760",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue in Shandong Provincial Big Data Center AiShanDong iOS 5.0.0 allows attackers to access sensitive user information via supplying a crafted link."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/ZhouZiyi1/Vuls/blob/main/250111-AiShanDong/250111-AiShanDong.pdf",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2025/CVE-2025-253xx/CVE-2025-25325.json
Normal file
21
CVE-2025/CVE-2025-253xx/CVE-2025-25325.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2025-25325",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-27T16:15:39.870",
|
||||
"lastModified": "2025-02-27T16:15:39.870",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue in Yibin Fengguan Network Technology Co., Ltd YuPao DirectHire iOS 8.8.0 allows attackers to access sensitive user information via supplying a crafted link."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/ZhouZiyi1/Vuls/blob/main/250112-YuPaoDirectHire/250112-YuPaoDirectHire.pdf",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2025/CVE-2025-253xx/CVE-2025-25326.json
Normal file
21
CVE-2025/CVE-2025-253xx/CVE-2025-25326.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2025-25326",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-27T16:15:39.987",
|
||||
"lastModified": "2025-02-27T16:15:39.987",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue in Merchants Union Consumer Finance Company Limited Merchants Union Finance iOS 6.19.0 allows attackers to access sensitive user information via supplying a crafted link."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/ZhouZiyi1/Vuls/blob/main/250115-MerchantsUnionFinance/250115-MerchantsUnionFinance.pdf",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2025/CVE-2025-253xx/CVE-2025-25330.json
Normal file
21
CVE-2025/CVE-2025-253xx/CVE-2025-25330.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2025-25330",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-27T16:15:40.103",
|
||||
"lastModified": "2025-02-27T16:15:40.103",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue in Boohee Technology Boohee Health iOS 13.0.13 allows attackers to access sensitive user information via supplying a crafted link."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/ZhouZiyi1/Vuls/blob/main/250116-BooheeHealth/250116-BooheeHealth.pdf",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2025/CVE-2025-253xx/CVE-2025-25331.json
Normal file
21
CVE-2025/CVE-2025-253xx/CVE-2025-25331.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2025-25331",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-27T16:15:40.217",
|
||||
"lastModified": "2025-02-27T16:15:40.217",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue in Beitatong Technology LianJia iOS 9.83.50 allows attackers to access sensitive user information via supplying a crafted link."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/ZhouZiyi1/Vuls/blob/main/250116-LianJia/250116-LianJia.pdf",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2025/CVE-2025-253xx/CVE-2025-25333.json
Normal file
21
CVE-2025/CVE-2025-253xx/CVE-2025-25333.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2025-25333",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-27T16:15:40.350",
|
||||
"lastModified": "2025-02-27T16:15:40.350",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue in IKEA CN iOS 4.13.0 allows attackers to access sensitive user information via supplying a crafted link."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/ZhouZiyi1/Vuls/blob/main/250116-IKEACN/250116-IKEACN.pdf",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2025/CVE-2025-253xx/CVE-2025-25334.json
Normal file
21
CVE-2025/CVE-2025-253xx/CVE-2025-25334.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2025-25334",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-27T16:15:40.463",
|
||||
"lastModified": "2025-02-27T16:15:40.463",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue in Suning Commerce Group Suning EMall iOS 9.5.198 allows attackers to access sensitive user information via supplying a crafted link."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/ZhouZiyi1/Vuls/blob/main/250116-SuningEMall/250116-SuningEMall.pdf",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2025/CVE-2025-257xx/CVE-2025-25759.json
Normal file
21
CVE-2025/CVE-2025-257xx/CVE-2025-25759.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2025-25759",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-27T15:15:41.570",
|
||||
"lastModified": "2025-02-27T15:15:41.570",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue in the component admin_template.php of SUCMS v1.0 allows attackers to execute a directory traversal and arbitrary file deletion via a crafted GET request."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/147536951/Qianyi-learn/blob/main/SUCMS.pdf",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2025/CVE-2025-257xx/CVE-2025-25760.json
Normal file
21
CVE-2025/CVE-2025-257xx/CVE-2025-25760.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2025-25760",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-27T15:15:41.670",
|
||||
"lastModified": "2025-02-27T15:15:41.670",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A Server-Side Request Forgery (SSRF) in the component admin_webgather.php of SUCMS v1.0 allows attackers to access internal data and services via a crafted GET request."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/147536951/Qianyi-learn/blob/main/SUCMS2.pdf",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2025/CVE-2025-257xx/CVE-2025-25761.json
Normal file
60
CVE-2025/CVE-2025-257xx/CVE-2025-25761.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2025-25761",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-27T15:15:41.777",
|
||||
"lastModified": "2025-02-27T15:15:41.777",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "HkCms v2.3.2.240702 was discovered to contain an arbitrary file write vulnerability in the component Appcenter.php."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.2,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-73"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/147536951/Qianyi-learn/blob/main/Hkcms.pdf",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/147536951/Qianyi-learn/blob/main/Hkcms.pdf",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-27154",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-02-27T14:15:36.180",
|
||||
"lastModified": "2025-02-27T14:15:36.180",
|
||||
"lastModified": "2025-02-27T15:15:41.937",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -60,7 +60,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -85,6 +85,10 @@
|
||||
{
|
||||
"url": "https://github.com/spotipy-dev/spotipy/security/advisories/GHSA-pwhh-q4h6-w599",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/spotipy-dev/spotipy/security/advisories/GHSA-pwhh-q4h6-w599",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
94
README.md
94
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2025-02-27T15:00:20.056532+00:00
|
||||
2025-02-27T17:00:20.597792+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2025-02-27T14:53:37.577000+00:00
|
||||
2025-02-27T16:24:20.267000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,53 +33,69 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
283367
|
||||
283393
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `9`
|
||||
Recently added CVEs: `26`
|
||||
|
||||
- [CVE-2024-13402](CVE-2024/CVE-2024-134xx/CVE-2024-13402.json) (`2025-02-27T13:15:09.947`)
|
||||
- [CVE-2024-9334](CVE-2024/CVE-2024-93xx/CVE-2024-9334.json) (`2025-02-27T14:15:34.783`)
|
||||
- [CVE-2025-1691](CVE-2025/CVE-2025-16xx/CVE-2025-1691.json) (`2025-02-27T13:15:11.253`)
|
||||
- [CVE-2025-1692](CVE-2025/CVE-2025-16xx/CVE-2025-1692.json) (`2025-02-27T13:15:11.413`)
|
||||
- [CVE-2025-1693](CVE-2025/CVE-2025-16xx/CVE-2025-1693.json) (`2025-02-27T13:15:11.563`)
|
||||
- [CVE-2025-1738](CVE-2025/CVE-2025-17xx/CVE-2025-1738.json) (`2025-02-27T13:15:11.720`)
|
||||
- [CVE-2025-1739](CVE-2025/CVE-2025-17xx/CVE-2025-1739.json) (`2025-02-27T13:15:11.883`)
|
||||
- [CVE-2025-22280](CVE-2025/CVE-2025-222xx/CVE-2025-22280.json) (`2025-02-27T14:15:36.033`)
|
||||
- [CVE-2025-27154](CVE-2025/CVE-2025-271xx/CVE-2025-27154.json) (`2025-02-27T14:15:36.180`)
|
||||
- [CVE-2024-54169](CVE-2024/CVE-2024-541xx/CVE-2024-54169.json) (`2025-02-27T15:15:39.100`)
|
||||
- [CVE-2024-54170](CVE-2024/CVE-2024-541xx/CVE-2024-54170.json) (`2025-02-27T15:15:39.240`)
|
||||
- [CVE-2024-56493](CVE-2024/CVE-2024-564xx/CVE-2024-56493.json) (`2025-02-27T15:15:39.377`)
|
||||
- [CVE-2024-56494](CVE-2024/CVE-2024-564xx/CVE-2024-56494.json) (`2025-02-27T15:15:39.517`)
|
||||
- [CVE-2024-56495](CVE-2024/CVE-2024-564xx/CVE-2024-56495.json) (`2025-02-27T15:15:39.657`)
|
||||
- [CVE-2024-56496](CVE-2024/CVE-2024-564xx/CVE-2024-56496.json) (`2025-02-27T15:15:39.793`)
|
||||
- [CVE-2024-56810](CVE-2024/CVE-2024-568xx/CVE-2024-56810.json) (`2025-02-27T15:15:39.930`)
|
||||
- [CVE-2024-56811](CVE-2024/CVE-2024-568xx/CVE-2024-56811.json) (`2025-02-27T15:15:40.067`)
|
||||
- [CVE-2024-56812](CVE-2024/CVE-2024-568xx/CVE-2024-56812.json) (`2025-02-27T15:15:40.200`)
|
||||
- [CVE-2025-0759](CVE-2025/CVE-2025-07xx/CVE-2025-0759.json) (`2025-02-27T15:15:40.603`)
|
||||
- [CVE-2025-0914](CVE-2025/CVE-2025-09xx/CVE-2025-0914.json) (`2025-02-27T16:15:38.237`)
|
||||
- [CVE-2025-1741](CVE-2025/CVE-2025-17xx/CVE-2025-1741.json) (`2025-02-27T16:15:38.930`)
|
||||
- [CVE-2025-1755](CVE-2025/CVE-2025-17xx/CVE-2025-1755.json) (`2025-02-27T16:15:39.137`)
|
||||
- [CVE-2025-1756](CVE-2025/CVE-2025-17xx/CVE-2025-1756.json) (`2025-02-27T16:15:39.287`)
|
||||
- [CVE-2025-25323](CVE-2025/CVE-2025-253xx/CVE-2025-25323.json) (`2025-02-27T16:15:39.637`)
|
||||
- [CVE-2025-25324](CVE-2025/CVE-2025-253xx/CVE-2025-25324.json) (`2025-02-27T16:15:39.760`)
|
||||
- [CVE-2025-25325](CVE-2025/CVE-2025-253xx/CVE-2025-25325.json) (`2025-02-27T16:15:39.870`)
|
||||
- [CVE-2025-25326](CVE-2025/CVE-2025-253xx/CVE-2025-25326.json) (`2025-02-27T16:15:39.987`)
|
||||
- [CVE-2025-25330](CVE-2025/CVE-2025-253xx/CVE-2025-25330.json) (`2025-02-27T16:15:40.103`)
|
||||
- [CVE-2025-25331](CVE-2025/CVE-2025-253xx/CVE-2025-25331.json) (`2025-02-27T16:15:40.217`)
|
||||
- [CVE-2025-25333](CVE-2025/CVE-2025-253xx/CVE-2025-25333.json) (`2025-02-27T16:15:40.350`)
|
||||
- [CVE-2025-25334](CVE-2025/CVE-2025-253xx/CVE-2025-25334.json) (`2025-02-27T16:15:40.463`)
|
||||
- [CVE-2025-25759](CVE-2025/CVE-2025-257xx/CVE-2025-25759.json) (`2025-02-27T15:15:41.570`)
|
||||
- [CVE-2025-25760](CVE-2025/CVE-2025-257xx/CVE-2025-25760.json) (`2025-02-27T15:15:41.670`)
|
||||
- [CVE-2025-25761](CVE-2025/CVE-2025-257xx/CVE-2025-25761.json) (`2025-02-27T15:15:41.777`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `27`
|
||||
Recently modified CVEs: `41`
|
||||
|
||||
- [CVE-2024-26691](CVE-2024/CVE-2024-266xx/CVE-2024-26691.json) (`2025-02-27T14:34:43.180`)
|
||||
- [CVE-2024-26699](CVE-2024/CVE-2024-266xx/CVE-2024-26699.json) (`2025-02-27T14:34:43.180`)
|
||||
- [CVE-2024-26724](CVE-2024/CVE-2024-267xx/CVE-2024-26724.json) (`2025-02-27T14:34:43.180`)
|
||||
- [CVE-2024-26767](CVE-2024/CVE-2024-267xx/CVE-2024-26767.json) (`2025-02-27T14:34:43.180`)
|
||||
- [CVE-2024-26774](CVE-2024/CVE-2024-267xx/CVE-2024-26774.json) (`2025-02-27T14:34:43.180`)
|
||||
- [CVE-2024-26776](CVE-2024/CVE-2024-267xx/CVE-2024-26776.json) (`2025-02-27T14:34:43.180`)
|
||||
- [CVE-2024-26777](CVE-2024/CVE-2024-267xx/CVE-2024-26777.json) (`2025-02-27T14:34:43.180`)
|
||||
- [CVE-2024-26778](CVE-2024/CVE-2024-267xx/CVE-2024-26778.json) (`2025-02-27T14:34:43.180`)
|
||||
- [CVE-2024-26796](CVE-2024/CVE-2024-267xx/CVE-2024-26796.json) (`2025-02-27T14:35:09.517`)
|
||||
- [CVE-2024-26805](CVE-2024/CVE-2024-268xx/CVE-2024-26805.json) (`2025-02-27T14:35:09.517`)
|
||||
- [CVE-2024-30427](CVE-2024/CVE-2024-304xx/CVE-2024-30427.json) (`2025-02-27T14:53:37.577`)
|
||||
- [CVE-2024-30428](CVE-2024/CVE-2024-304xx/CVE-2024-30428.json) (`2025-02-27T14:53:37.577`)
|
||||
- [CVE-2024-30429](CVE-2024/CVE-2024-304xx/CVE-2024-30429.json) (`2025-02-27T14:53:37.577`)
|
||||
- [CVE-2024-30430](CVE-2024/CVE-2024-304xx/CVE-2024-30430.json) (`2025-02-27T14:53:37.577`)
|
||||
- [CVE-2024-30478](CVE-2024/CVE-2024-304xx/CVE-2024-30478.json) (`2025-02-27T14:53:37.577`)
|
||||
- [CVE-2024-50146](CVE-2024/CVE-2024-501xx/CVE-2024-50146.json) (`2025-02-27T13:15:10.813`)
|
||||
- [CVE-2024-5084](CVE-2024/CVE-2024-50xx/CVE-2024-5084.json) (`2025-02-27T13:30:57.937`)
|
||||
- [CVE-2024-52559](CVE-2024/CVE-2024-525xx/CVE-2024-52559.json) (`2025-02-27T13:15:10.943`)
|
||||
- [CVE-2024-57977](CVE-2024/CVE-2024-579xx/CVE-2024-57977.json) (`2025-02-27T13:15:11.053`)
|
||||
- [CVE-2024-58002](CVE-2024/CVE-2024-580xx/CVE-2024-58002.json) (`2025-02-27T13:15:11.153`)
|
||||
- [CVE-2025-1247](CVE-2025/CVE-2025-12xx/CVE-2025-1247.json) (`2025-02-27T14:15:35.523`)
|
||||
- [CVE-2025-1634](CVE-2025/CVE-2025-16xx/CVE-2025-1634.json) (`2025-02-27T14:15:35.650`)
|
||||
- [CVE-2025-21712](CVE-2025/CVE-2025-217xx/CVE-2025-21712.json) (`2025-02-27T13:15:12.043`)
|
||||
- [CVE-2025-21721](CVE-2025/CVE-2025-217xx/CVE-2025-21721.json) (`2025-02-27T13:15:12.150`)
|
||||
- [CVE-2025-21746](CVE-2025/CVE-2025-217xx/CVE-2025-21746.json) (`2025-02-27T13:15:12.240`)
|
||||
- [CVE-2023-27239](CVE-2023/CVE-2023-272xx/CVE-2023-27239.json) (`2025-02-27T15:15:37.690`)
|
||||
- [CVE-2023-6495](CVE-2023/CVE-2023-64xx/CVE-2023-6495.json) (`2025-02-27T15:15:08.350`)
|
||||
- [CVE-2024-0383](CVE-2024/CVE-2024-03xx/CVE-2024-0383.json) (`2025-02-27T15:15:08.350`)
|
||||
- [CVE-2024-2765](CVE-2024/CVE-2024-27xx/CVE-2024-2765.json) (`2025-02-27T16:24:20.267`)
|
||||
- [CVE-2024-3490](CVE-2024/CVE-2024-34xx/CVE-2024-3490.json) (`2025-02-27T16:24:20.267`)
|
||||
- [CVE-2024-3781](CVE-2024/CVE-2024-37xx/CVE-2024-3781.json) (`2025-02-27T15:34:49.607`)
|
||||
- [CVE-2024-3782](CVE-2024/CVE-2024-37xx/CVE-2024-3782.json) (`2025-02-27T15:34:49.607`)
|
||||
- [CVE-2024-3783](CVE-2024/CVE-2024-37xx/CVE-2024-3783.json) (`2025-02-27T15:34:49.607`)
|
||||
- [CVE-2024-3784](CVE-2024/CVE-2024-37xx/CVE-2024-3784.json) (`2025-02-27T15:34:49.607`)
|
||||
- [CVE-2024-3787](CVE-2024/CVE-2024-37xx/CVE-2024-3787.json) (`2025-02-27T15:34:49.607`)
|
||||
- [CVE-2024-3789](CVE-2024/CVE-2024-37xx/CVE-2024-3789.json) (`2025-02-27T15:34:49.607`)
|
||||
- [CVE-2024-3790](CVE-2024/CVE-2024-37xx/CVE-2024-3790.json) (`2025-02-27T15:34:49.607`)
|
||||
- [CVE-2024-3791](CVE-2024/CVE-2024-37xx/CVE-2024-3791.json) (`2025-02-27T15:34:49.607`)
|
||||
- [CVE-2024-3792](CVE-2024/CVE-2024-37xx/CVE-2024-3792.json) (`2025-02-27T15:34:49.607`)
|
||||
- [CVE-2024-3793](CVE-2024/CVE-2024-37xx/CVE-2024-3793.json) (`2025-02-27T15:34:49.607`)
|
||||
- [CVE-2024-3794](CVE-2024/CVE-2024-37xx/CVE-2024-3794.json) (`2025-02-27T15:34:49.607`)
|
||||
- [CVE-2024-3795](CVE-2024/CVE-2024-37xx/CVE-2024-3795.json) (`2025-02-27T15:34:49.607`)
|
||||
- [CVE-2024-3796](CVE-2024/CVE-2024-37xx/CVE-2024-3796.json) (`2025-02-27T15:34:49.607`)
|
||||
- [CVE-2024-3895](CVE-2024/CVE-2024-38xx/CVE-2024-3895.json) (`2025-02-27T16:24:20.267`)
|
||||
- [CVE-2025-0893](CVE-2025/CVE-2025-08xx/CVE-2025-0893.json) (`2025-02-27T16:15:38.110`)
|
||||
- [CVE-2025-1247](CVE-2025/CVE-2025-12xx/CVE-2025-1247.json) (`2025-02-27T16:15:38.390`)
|
||||
- [CVE-2025-1634](CVE-2025/CVE-2025-16xx/CVE-2025-1634.json) (`2025-02-27T16:15:38.500`)
|
||||
- [CVE-2025-1686](CVE-2025/CVE-2025-16xx/CVE-2025-1686.json) (`2025-02-27T15:15:40.940`)
|
||||
- [CVE-2025-1691](CVE-2025/CVE-2025-16xx/CVE-2025-1691.json) (`2025-02-27T16:15:38.610`)
|
||||
- [CVE-2025-27154](CVE-2025/CVE-2025-271xx/CVE-2025-27154.json) (`2025-02-27T15:15:41.937`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
172
_state.csv
172
_state.csv
@ -210034,7 +210034,7 @@ CVE-2022-44651,0,0,da8c72a9a5ded5321324ee960d2de8f6f9954e67def10cda183e521f57888
|
||||
CVE-2022-44652,0,0,67db30badeefb96fde339a3d62324c7e214ccb26dfcd0c39111c4e515796473e,2024-11-21T07:28:16.330000
|
||||
CVE-2022-44653,0,0,3a7d57519b71f5e10d1d7e7e6354fa683e057b66274d10564d6ef57f1d2ac5ab,2024-11-21T07:28:16.437000
|
||||
CVE-2022-44654,0,0,aad1a29668196bdd7f6bf72ba7d12d61263d690479e465d7c94bb8ce496a3c58,2024-11-21T07:28:16.533000
|
||||
CVE-2022-4466,0,0,c1d3f905e17335b364f11c2d403ce5a23031ba41e34e3133ab0283bd0011dae3,2024-11-21T07:35:19.140000
|
||||
CVE-2022-4466,0,1,2ded83b548d768666bfa26ed43dedf2d6276be6950957fa54a81ca3e3abdf8f6,2025-02-27T16:15:33.850000
|
||||
CVE-2022-44666,0,0,d2cbcaee03b3f5be8fc66b212f973833dcf85745b321dabdc7a29944da696700,2024-11-21T07:28:16.640000
|
||||
CVE-2022-44667,0,0,cf2495015663bda7489dcb818715c44b17c3658cb254872115559898ede3dfbe,2024-11-21T07:28:16.777000
|
||||
CVE-2022-44668,0,0,8d3bf294d7dde6db71f7f44d1f8d2b3816033401edb914cef097f31844e78e8b,2024-11-21T07:28:16.917000
|
||||
@ -211359,7 +211359,7 @@ CVE-2022-46601,0,0,59547fb0d646a1ec84929c9e1fd9a00e0a261e762c89b23d1d70593ce9f17
|
||||
CVE-2022-46603,0,0,39a1185318e3c94bbe17e5d46dd95fb493c34b22996a9d91a28c1007b996c1f6,2024-11-21T07:30:48.640000
|
||||
CVE-2022-46604,0,0,b3c03fe1d67c4cfc94729b6347a47d09d11eea6681cc02122391a91a35b8c2f1,2024-11-21T07:30:48.780000
|
||||
CVE-2022-46609,0,0,d09923216e91d7621ef5afebe22fb939f9ebfd5f40672a2db23294481c3c6f9e,2024-11-21T07:30:48.933000
|
||||
CVE-2022-4661,0,0,a8f1c12ed83555fef1d556faed813186e801d1eded278cb006cc21e6d648dace,2024-11-21T07:35:41.290000
|
||||
CVE-2022-4661,0,1,fe47677fa6be0e830c6577198920ced5624926c949b247a41868acbac720adae,2025-02-27T16:15:35.253000
|
||||
CVE-2022-46610,0,0,3210e6aa239ffa309767742c0f43b352e1f7cf8f886460962d0004b772c377b7,2024-11-21T07:30:49.080000
|
||||
CVE-2022-4662,0,0,cdc2f466a3092771151738e6a6afc831c079456815cff7cd4e5a1876b8f3712e,2024-11-21T07:35:41.410000
|
||||
CVE-2022-46620,0,0,82ae0fa3f9545ae840ed1e8cfa871c0304352c04c5027028d19da993adb477e6,2023-11-07T03:55:42.210000
|
||||
@ -213985,7 +213985,7 @@ CVE-2023-0069,0,0,fbeebfdbedd3a9959dd565020dd3eff073b852f8a177b310fda2dcb0e919da
|
||||
CVE-2023-0070,0,0,8af155f487a0101fddbe52c416440c5cd676cf772f8d175d008a6b3bfb7c26c8,2024-11-21T07:36:29.850000
|
||||
CVE-2023-0071,0,0,63f3711ec31ece4e46d0d19fcee20f3780808fb2036b3c7df3c8e5f5031c035a,2024-11-21T07:36:29.953000
|
||||
CVE-2023-0072,0,0,d333d59260663a0b5930bb992584a27415216729bc2149a3935b4f3b91fe9ce7,2024-11-21T07:36:30.050000
|
||||
CVE-2023-0073,0,0,deace5d090f92ce8070b70622887ea27ca3f6aff79e21de831c3279e5ed1e4fd,2024-11-21T07:36:30.153000
|
||||
CVE-2023-0073,0,1,4219d28cf8a8d534b8bb1557d23974eda5aed9757126ae99cc20e907c2210182,2025-02-27T16:15:35.380000
|
||||
CVE-2023-0074,0,0,ce10478d69cd9d1b7654891af952e110eae11269b74683dec4c68d9e22ea7f5b,2024-11-21T07:36:30.253000
|
||||
CVE-2023-0075,0,0,466352db98ef58ae363d8a7118603b05eddb78ca6cd6a6943d37fa56e4df0513,2024-11-21T07:36:30.367000
|
||||
CVE-2023-0076,0,0,a78e9ecdc4cb9cf0c285f6cb0f6ce5ab64c97f1efb57fe80772751b3c2fb5e79,2024-11-21T07:36:30.493000
|
||||
@ -214012,7 +214012,7 @@ CVE-2023-0096,0,0,7321c36f4f89a6785fad6fdb9435e212b799545c0e3c5038412c5a38fc786e
|
||||
CVE-2023-0097,0,0,0641f8d806dc02bdf950e2314b9c55d5b11bbfbb7109ee92a6375a357677eef0,2024-11-21T07:36:32.857000
|
||||
CVE-2023-0098,0,0,c7fedda80e02bfd4f785b2bab870c413bb31bdff60d3756a437b1d44fc8c8f14,2024-11-21T07:36:32.957000
|
||||
CVE-2023-0099,0,0,1256f8563bc74dbe1844e1d08de72388e7f62a118f65c56a7d3cff8e675139f0,2024-11-21T07:36:33.060000
|
||||
CVE-2023-0100,0,0,d928eeb71b70e5225d1539b61a0a3057b97fedf845591075d53817ba67188949,2024-11-21T07:36:33.180000
|
||||
CVE-2023-0100,0,1,e4c750e104019521d9a5f27283d4c5dda7e61f8ece2e20cfed11554ccf39edc1,2025-02-27T15:15:35.703000
|
||||
CVE-2023-0101,0,0,d14b0040eff67b88ec695d1eac556cb74f5e10fc5385ec2fd1470eda6e25b038,2024-11-21T07:36:33.293000
|
||||
CVE-2023-0102,0,0,99d17b2de8249e27cfdcfb6925f9f053c1fa8b7db080606cb4ae1c7714aeb068,2024-11-21T07:36:33.400000
|
||||
CVE-2023-0103,0,0,dfcd27678dfcaf85b01142c426f96ee37124fef04a16ed6686fb9e9d3354d41b,2024-11-21T07:36:33.523000
|
||||
@ -214084,7 +214084,7 @@ CVE-2023-0168,0,0,480bb72aebfb6db5bc6de2fc7749a7dfe9ec422fccde53fd6ce097e3e084f7
|
||||
CVE-2023-0169,0,0,3ebd5a673119d51eef3e7abb5f06b05f9848a20d46a7404b0ed22a00320db063,2024-11-21T07:36:40.683000
|
||||
CVE-2023-0170,0,0,3f6b0d3dcc40dded89b2acfa9b275f38cee69f0618392e50ed711911e66c8397,2024-11-21T07:36:40.787000
|
||||
CVE-2023-0171,0,0,88549ef36d04c543f76735cf01c4aca2040798bfed1d7f5648621cd2ba5c5669,2024-11-21T07:36:40.893000
|
||||
CVE-2023-0172,0,0,d26020f8d46550973f1a925a57697e42a128c4bbf9e98cef3f40e866ad4ea04f,2024-11-21T07:36:40.990000
|
||||
CVE-2023-0172,0,1,da28032d4cf9d66f6b939e44d8ce887c8e8adf8b6d1eb5c1a415364d882c11d9,2025-02-27T16:15:35.517000
|
||||
CVE-2023-0173,0,0,1bd9d5abc484b52dfafa856f324d2c4bc56ac7d15f96cb08d9567aa6ba692006,2024-11-21T07:36:41.090000
|
||||
CVE-2023-0174,0,0,d4822de47fa802dbe8a63dfef7d04d1e9ef5769f710525300c41a308c79a5372,2024-11-21T07:36:41.190000
|
||||
CVE-2023-0175,0,0,f675b36a1edf72fa9629e908e8135656f624b1e3facf4fe662ec8f8ba7f94a2d,2025-02-26T19:15:14.847000
|
||||
@ -214433,7 +214433,7 @@ CVE-2023-0534,0,0,ade7ab28da0420cc365f47dad870343cdd8da608da1a7ddf62838dae0c66a2
|
||||
CVE-2023-0535,0,0,097c1a72387a82081f06503b5910ccdb4d6c97aee981438d38ed487552857661,2024-11-21T07:37:21.773000
|
||||
CVE-2023-0536,0,0,e637cc93da899c75d4344be893bd279d9c6249fc897c970ef96c3a2f5590177a,2024-11-21T07:37:21.880000
|
||||
CVE-2023-0537,0,0,2b43fa3c7d6c09be7b74ae22f3c06f76acd623b7b0c21dc267ababb5984feaec,2025-01-29T15:15:11.527000
|
||||
CVE-2023-0538,0,0,90eb5bd178f7a6820e802465b8b69f8fdf969eb0aef8beb2772cdffc291412c7,2024-11-21T07:37:22.083000
|
||||
CVE-2023-0538,0,1,93bd0a7452675c80af54b0b64fee7d659b3b74c3f15a2d1e9d62100379c03b54,2025-02-27T16:15:35.693000
|
||||
CVE-2023-0539,0,0,eb5da49490d206e212924c29579cf2b2d7eeee726e1ab1af1850e6b4fb48f600,2024-11-21T07:37:22.190000
|
||||
CVE-2023-0540,0,0,98b75b2c051f118a526aedeef979393d2c5d6fba7747a82ab591af7b6b5ec511,2024-11-21T07:37:22.300000
|
||||
CVE-2023-0541,0,0,8866871e625b24e0151a49d74242e6c1e8dca48d30dc17af749d0248fe8e219f,2024-11-21T07:37:22.400000
|
||||
@ -214726,7 +214726,7 @@ CVE-2023-0839,0,0,59de6945d22d4f5a2e4faad808b3a6c1accf2b1b643f4e1ee9548bb5635258
|
||||
CVE-2023-0840,0,0,c790f5a490f603a68c1b1a8025a0018864660e4a9cfc3ed956e8b0ced636f80b,2024-11-21T07:37:56.140000
|
||||
CVE-2023-0841,0,0,bf77b6bb9d902c2a71a529a4b01f6a1c4edd5b730d4d4f73129a0e2fc29cc3e7,2024-11-21T07:37:56.270000
|
||||
CVE-2023-0842,0,0,b9abfe03421669a5abf2f7de0de80583c10ac019519501c8b1017687933d142a,2025-02-13T20:15:47.193000
|
||||
CVE-2023-0844,0,0,81b7b73fb88cffd8c3ac55cf689fd134bf3533f0d88481e1aadc344bdc8eff17,2024-11-21T07:37:56.533000
|
||||
CVE-2023-0844,0,1,dd79e4e128282e95683ac82d219723934b113031b10d753a6b8b4ea0796fbfc8,2025-02-27T16:15:35.820000
|
||||
CVE-2023-0845,0,0,7d3ce8bc5220c2f8044fa4f58217fc24ae61afcac4bde6afe49ff9a498d457f7,2024-11-21T07:37:56.660000
|
||||
CVE-2023-0846,0,0,5419ef2f9432088ba337bc3e1c8e8a91931f294ae7e4a1fb6e79fedbb5675c16,2024-11-21T07:37:56.800000
|
||||
CVE-2023-0847,0,0,40a682ceaabdd9fe7672f27f0b73a1e05382cd04afbf632a030a19dd9189ad20,2024-11-21T07:37:56.923000
|
||||
@ -219611,7 +219611,7 @@ CVE-2023-24464,0,0,665b2ce4da67a5c0980922d44ffd4566ee548bdd53dead916998f380e0b66
|
||||
CVE-2023-24465,0,0,5448889530988c381c47996b768fed4b61a602e0da0ee13f5efeff6b48fd5bd8,2024-11-21T07:47:54.987000
|
||||
CVE-2023-24466,0,0,8825cb5f95bf994402763fbf571f68eb37c34d6ee18462ed3ffef9bccf2207fd,2024-11-22T16:15:19.673000
|
||||
CVE-2023-24467,0,0,55406cf1faaec4b6580953c04a3012fa1c0d42832668608c31cb96b9c3c3eb6e,2024-11-22T16:15:19.810000
|
||||
CVE-2023-24468,0,0,b16bd4de6dfdbe945d32fdf1548c9e11d1c93ddf707756efebe0726c679f4afb,2024-11-21T07:47:55.107000
|
||||
CVE-2023-24468,0,1,639e71c18e7c077a186e13edd7fabab7022c977c2968a99bddf61b8a74e99700,2025-02-27T15:15:36.287000
|
||||
CVE-2023-24469,0,0,a9377ea65c9498eaf5d1c4eae744f9e44b65020ab796251fe5a53a3ce5c454f8,2025-01-03T19:15:09.590000
|
||||
CVE-2023-2447,0,0,4ec809bb328a770bd9ca5946a889993e16b770e9ec04f38adc8310b23274c0c6,2024-11-21T07:58:38.067000
|
||||
CVE-2023-24470,0,0,b9aed5a006801525507460b60c51f828a0cf2886ae2a907eb98e672ae9993898,2025-01-06T16:15:24.590000
|
||||
@ -220323,7 +220323,7 @@ CVE-2023-2533,0,0,db7332ea725d80d1fea4bb9c8fcc31dd08047586f6cf8216ad2be737deb5db
|
||||
CVE-2023-25330,0,0,08f3ee33c083dc703c8c8ce32873b303743eeee4c637ccb5438853532d2b5f13,2024-11-21T07:49:25
|
||||
CVE-2023-2534,0,0,2765d8e31a6947ae0d35fb13d15df7a661ee4119acfec516d581783fb3089e47,2024-11-21T07:58:47.543000
|
||||
CVE-2023-25341,0,0,a6c0ae09f38d0a080f9399b91e16f70d20e262ee8151f1a5c7bc5a49f687504a,2024-11-21T15:15:09.430000
|
||||
CVE-2023-25344,0,0,8a83a30314d7b7167b00f406ae152838e039dee182e8c3aadf0cc57ee858b016,2024-11-21T07:49:25.280000
|
||||
CVE-2023-25344,0,1,146165727e4f96e86ffd30149c000b525f7a1da629b64e33c9ea664dc8c6e5d1,2025-02-27T15:15:36.880000
|
||||
CVE-2023-25345,0,0,3047d7e94bcb27ce1963bc1007e57600c1401bd6a1e52384238fe1fc44a5b2f8,2024-11-21T07:49:25.413000
|
||||
CVE-2023-25346,0,0,1545a193327540134d9d675ee16977b31fe2260b58497e6c55a05aab12a877a0,2025-02-03T19:15:10.233000
|
||||
CVE-2023-25347,0,0,7dd18f4e49becbf7027509d47983052d9cc5e16b21885845ebdbbaf2c5086acf,2025-02-04T17:15:11.847000
|
||||
@ -220524,14 +220524,14 @@ CVE-2023-25585,0,0,9e94a4446e8f802adc005bef4d755b2185bfe31d5df001c6ea04fab8fbcb0
|
||||
CVE-2023-25586,0,0,c65fa3b26be994e24a9b060869c0e9aee70d01a5893a1f41172a1913f475c216,2024-11-21T07:49:46.750000
|
||||
CVE-2023-25587,0,0,4f020c857ff9af5a4bd6d5005353b5aacb71da853f520756ad7e438c23e94c7d,2023-11-07T04:09:02.113000
|
||||
CVE-2023-25588,0,0,e8386f6040763e8d459dc96834deb0e46357604578ef68bf5523791a7e86a0a9,2024-11-21T07:49:46.910000
|
||||
CVE-2023-25589,0,0,540558eed47c07fceadb83dca126174a0410a39d99bd2e13a17affab839866b8,2024-11-21T07:49:47.050000
|
||||
CVE-2023-25590,0,0,66667aef880bd4b49a5b1d5960e50589e7b88da20538a5ba7d2c81afbd0cd559,2024-11-21T07:49:47.190000
|
||||
CVE-2023-25591,0,0,2c3807c8f06a9ce1a957d6c17663f296b1f6693ac6cf3afde806ebac7a470ea0,2024-11-21T07:49:47.307000
|
||||
CVE-2023-25592,0,0,b61d97453c4fcccc7f2bd8265903afba260ab94c6c3f5405342d8a1854714726,2024-11-21T07:49:47.423000
|
||||
CVE-2023-25593,0,0,65a4e1a8f84992f50f5fb9eab2018b84c33844b0e651e3e81e6566cb61828010,2024-11-21T07:49:47.533000
|
||||
CVE-2023-25594,0,0,8abf09e59f68ceced335bf46e94e35be82d646a84818ef449033b8635a8f5b29,2024-11-21T07:49:47.660000
|
||||
CVE-2023-25589,0,1,ed9c576cc9047ecc599724ec77f40393c5a5e5268fe1cbadcc4b09f460be25e8,2025-02-27T16:15:36.483000
|
||||
CVE-2023-25590,0,1,c23d47e62afe999b5eee65e0433a1e1b758ad8f4dc57a504e743a502ce469f85,2025-02-27T16:15:36.647000
|
||||
CVE-2023-25591,0,1,fc4f6fb3fc9918c1817ba808559e7c27b005f9a0ba1c5880d822b534ea41ff06,2025-02-27T16:15:36.780000
|
||||
CVE-2023-25592,0,1,b81ed0ff74c765ecc9aba16f9320ec1800540a681e798d80755d140bab2fe509,2025-02-27T15:15:37.023000
|
||||
CVE-2023-25593,0,1,4693ee6cde961d3b3ba80524ee4ae2a0f29de2b7c3858fb913ceb41b4ebd6820,2025-02-27T15:15:37.180000
|
||||
CVE-2023-25594,0,1,68933931bd5eb08871ff88f8f6718fc206241addb8bf9e6f06f49b865f4e1fff,2025-02-27T15:15:37.313000
|
||||
CVE-2023-25595,0,0,726a4d03782813d387168e4496552502f96f8a0a02861e47f01e358207039d15,2024-11-21T07:49:47.773000
|
||||
CVE-2023-25596,0,0,f88f62634ad25859484d0cc31d9b059e5a63e3289ddac7a38fb605882d4dd22a,2024-11-21T07:49:47.883000
|
||||
CVE-2023-25596,0,1,22fd223f38dadc90cb60a3e027b685e25cdb48761e367c792452f52201dcb81d,2025-02-27T15:15:37.443000
|
||||
CVE-2023-25597,0,0,3cc8467908e0af0563c0dcccea858dd0d6f7cdf781593c0d30cc7f58d8e064ed,2025-02-07T22:15:11.907000
|
||||
CVE-2023-25598,0,0,feb063d3ad1fdbfaa91ec631b072563c17f1eadc253a15c5a5729735749cd8bd,2025-01-17T16:15:29.543000
|
||||
CVE-2023-25599,0,0,e8f10bf4c5e1aae36571db6e2ab215516a8e52f6532eb9e92eed30ee54734b43,2025-01-16T21:15:14
|
||||
@ -221786,7 +221786,7 @@ CVE-2023-27234,0,0,8a7752bb1b30f5109f35237cc28f0ace1198d6b8423fb706790cd6275247e
|
||||
CVE-2023-27235,0,0,c60453614f616d535021868dd641756962f30770bab77e2c62e439343b77ec43,2024-11-21T07:52:30.097000
|
||||
CVE-2023-27237,0,0,e09f60848d34f83c21a67da1938fe74ef21b790eaeaa3d9fbd20f0f0b76350dd,2025-01-24T20:15:29.370000
|
||||
CVE-2023-27238,0,0,d98fc7eb90e07475353f284ec45b33ba5354b97f9b17f461e52280af1f4ddb4c,2025-01-27T17:15:10.970000
|
||||
CVE-2023-27239,0,0,8bece8ac4b3711e3110c648e7b065b3c9db482f541d115b3820b8138bcb95a0f,2024-11-21T07:52:30.530000
|
||||
CVE-2023-27239,0,1,e3f7a01d1f6a6e0e399bbe635a62e7a718f485f2854678531b7b6aedb867e6ae,2025-02-27T15:15:37.690000
|
||||
CVE-2023-2724,0,0,2a19d858691970cc8211d9fd57ad5cb987dab827efcf2e326b77a55f6df6f404,2024-11-21T07:59:10.277000
|
||||
CVE-2023-27240,0,0,31aeed1a9374cf18aa004fe480a20b0dc68d29dd270625d02ca4951e391124b2,2024-11-21T07:52:30.667000
|
||||
CVE-2023-27241,0,0,9f62c1c7d8b3cd4510cb286500ad3ad5d9ba8a6dcb5fca6d1b5562aab075be9c,2024-11-21T07:52:30.810000
|
||||
@ -242608,7 +242608,7 @@ CVE-2023-6491,0,0,708b8f4bd32ebd1485ce2aad158d524378e5ecd9cb55f1f4183d21b05ef95b
|
||||
CVE-2023-6492,0,0,e6005ae667055ac8ae283196b03169ed895debca9f77dbaece293ed0c91f2b51,2024-11-21T08:43:57.547000
|
||||
CVE-2023-6493,0,0,66a6bc3744048daffff5b648f4b2a86cf20fb0204e54a7708f7bf9298339ead7,2024-11-21T08:43:57.670000
|
||||
CVE-2023-6494,0,0,58d3ba976d002233f94c50a2e7bd2b38437c01419717380fe446502529d03d76,2024-11-21T08:43:57.800000
|
||||
CVE-2023-6495,0,0,07580866c9005ac881df59437ba2c30d423f24fa96905467f6445d8022236228,2024-11-21T08:43:57.933000
|
||||
CVE-2023-6495,0,1,163daf25f95216e2a4393e5557edc99e1d0302d4ecf46393135b4ae052f54924,2025-02-27T15:15:08.350000
|
||||
CVE-2023-6496,0,0,5d2f54a02ee360ba1de525c4f7a1d9dddf580fd371e63b636f4cedeb93b8c61e,2024-11-21T08:43:58.060000
|
||||
CVE-2023-6497,0,0,aa3f4d8e375adf0950f1e7568e823aa8c35e08c8b46d6419dbf36b73542f6176,2024-11-21T08:43:58.190000
|
||||
CVE-2023-6498,0,0,99cc8bcb8dbf27e1173e3bab1860eaae5e4dc624a7bdde19b917842567a95f41,2024-11-21T08:43:58.347000
|
||||
@ -243668,7 +243668,7 @@ CVE-2024-0379,0,0,655129da83bf7b78f99b2d842cc93a793c4b9dead86fb37c1ebfba25f8a6af
|
||||
CVE-2024-0380,0,0,b13ba26b2c93293898a30471c8b142088e326e5cfea22174ba924ab8efd84293,2024-11-21T08:46:27.490000
|
||||
CVE-2024-0381,0,0,4408f366f53a4f9f027eb35f7cc148cd5099ad6f453db0955bde4e51626db08a,2024-11-21T08:46:27.643000
|
||||
CVE-2024-0382,0,0,89dea95cfa60010212418517f6858b68d57b6774bff452bfccc38c701002fb49,2024-11-21T08:46:27.790000
|
||||
CVE-2024-0383,0,0,4d3cd2e06d2ed6f81a82e8f563bb40368dcf1fc236d6447217886f1134d36ee6,2024-11-21T08:46:27.953000
|
||||
CVE-2024-0383,0,1,30793f1471582535661bef767a904ca3eed3e8bc50918a0fda3ff5471e0afc3c,2025-02-27T15:15:08.350000
|
||||
CVE-2024-0384,0,0,7a94f21befb3cd3a1407d20d2b315c6141a3e3c615a2b4fd46013577fd76d174,2024-11-21T08:46:28.113000
|
||||
CVE-2024-0385,0,0,47bbad66c4ff4a041a286ba0b4b00ec5b402f0ff40bd1c75d9eec3a0b77bafc1,2025-01-08T18:32:52.073000
|
||||
CVE-2024-0386,0,0,9a86b84ea8daa10a5ecec2032f545acedf93668b25f5a695f09f1a66ecd589e4,2025-01-15T16:38:37.440000
|
||||
@ -247089,6 +247089,7 @@ CVE-2024-13142,0,0,83e0842aea5b2cb3dd06404d668eb9948718605f09db4c9056bc023c82417
|
||||
CVE-2024-13143,0,0,5b98fd73f844e22877d6840bd4c9a6249f752b17b68060c8d46233d630dea32e,2025-01-06T00:15:05.460000
|
||||
CVE-2024-13144,0,0,421356c7c2f8738fb679788721a3f3f954ae7a1eb9d21a080e8a08af1c17c712,2025-01-06T00:15:05.633000
|
||||
CVE-2024-13145,0,0,8f9d33e26ad78b43f2820c128d400944c11f810ee68c6fe46ad1e5eafbee4338,2025-01-06T01:15:06.253000
|
||||
CVE-2024-13148,1,1,18c889edd80766f73ecc91abe91ae173a814345d17b1bca83519b712d8d6c233,2025-02-27T15:15:38.583000
|
||||
CVE-2024-1315,0,0,ae67b7f13a317bdc1be64b4fdf580a08492423f203ba37c909a5dc9e35687d4a,2025-01-17T17:30:38.363000
|
||||
CVE-2024-13152,0,0,20d39b15541fe09be6285588087866b10b1bfafdf3570ce59d1648746f261a55,2025-02-14T13:15:42.170000
|
||||
CVE-2024-13153,0,0,e5372006a19c4f2229d5d82f2f00e097ecc1dd71c1df06bd0280614a58d1fbcf,2025-01-09T09:15:07.243000
|
||||
@ -247336,7 +247337,7 @@ CVE-2024-13399,0,0,ae1b981aa62bfabc1644fd540791945410e14b2403d65b8acc8ef844a0568
|
||||
CVE-2024-1340,0,0,779cbb4786989b99b13d0df5bfadd47a6bb17fb76227d8a826f245b565dc9020,2024-11-21T08:50:22.180000
|
||||
CVE-2024-13400,0,0,a0da00543409991e4d6711b443cdf6fcdbfddf916acf7563da4678bdf041bb43,2025-01-31T18:02:33.637000
|
||||
CVE-2024-13401,0,0,5efe32d869945c8cf2c8e98762f61d5eb40d85526a7f385be1d59dce88509538,2025-01-17T05:15:09.077000
|
||||
CVE-2024-13402,1,1,a466c3ff7432d3a23760e319c7411c50d1b433d39d2428e9327926ba492124bb,2025-02-27T13:15:09.947000
|
||||
CVE-2024-13402,0,0,a466c3ff7432d3a23760e319c7411c50d1b433d39d2428e9327926ba492124bb,2025-02-27T13:15:09.947000
|
||||
CVE-2024-13403,0,0,f48009abe82bf9e29ae1b7a46417bc2967746c0b5702def33976d86176d1ffc8,2025-02-04T09:15:09.303000
|
||||
CVE-2024-13404,0,0,c306a147bdbb783a3f22c9c4f49bd90e70cf49c0fec041c52ab9283c517d7448,2025-01-31T20:18:46.230000
|
||||
CVE-2024-13405,0,0,fb551ac182383da8fdfe04e2d83ed2b2737ab3967b873d712814245495cdf68c,2025-02-19T08:15:15.167000
|
||||
@ -247730,7 +247731,7 @@ CVE-2024-1420,0,0,87cbde692a44b30138e5311554a8fe03ab6752ef419e674117c5a1abadbc52
|
||||
CVE-2024-1421,0,0,fce1981b75bfc198cf465137dc2c270b1d9fba91a6f00b707f307cdaadc63f73,2025-01-22T17:41:50.340000
|
||||
CVE-2024-1422,0,0,c910d0586a998d32e26f3d43ad0e4a4057e510585a23426b26fef7d51c99eee6,2025-01-17T19:56:49.607000
|
||||
CVE-2024-1423,0,0,cf9424b269ea30f1f1f93fb8aca6f7020e19a4ef0b7ad3a1dcf8f2e9317f1810,2024-02-27T15:15:07.460000
|
||||
CVE-2024-1424,0,1,00e086e6d4dcaadb6e71fa58e95992435cd427a273bb86ed3bcc8f96b780d214,2025-02-27T14:53:37.577000
|
||||
CVE-2024-1424,0,0,00e086e6d4dcaadb6e71fa58e95992435cd427a273bb86ed3bcc8f96b780d214,2025-02-27T14:53:37.577000
|
||||
CVE-2024-1425,0,0,5f21d9d2efc76ee4284336e12fe4e6efc369aee3b9a89ab878da35914f23bb10,2024-12-31T17:16:58.103000
|
||||
CVE-2024-1426,0,0,0ef7fe6cf1c59dc132db1b4ef41bf1d02ea3e90e47eef266595245fb0be9e4ec,2025-01-21T19:48:55.403000
|
||||
CVE-2024-1427,0,0,045d36306302d266d38f2f3182a2a05490c1c0ad4388299e4f45dc3722894b2a,2024-11-21T08:50:33.653000
|
||||
@ -247868,7 +247869,7 @@ CVE-2024-1567,0,0,6cdbaee71c1770d77caf03403af77d158a420504c05e33f36e632e6fe2f3ce
|
||||
CVE-2024-1568,0,0,4660f06f13504a73ee731b062d7289c45d2cdd5ee8fbad08955ed262bed14189,2025-01-16T15:34:31.447000
|
||||
CVE-2024-1569,0,0,cc3fd6764ddebd625443ddcd2f6dd2aba14c01115654ddd2b36f709166cad3a4,2024-11-21T08:50:51.360000
|
||||
CVE-2024-1570,0,0,25898391ded7988cd2da012ae2a7ccaf83daa0ac2ffc39f3073e6c6025585cb6,2025-01-22T16:31:46.067000
|
||||
CVE-2024-1571,0,1,f3d49b2468436cc55f43430be000f569c341c5bb488502d391ca8d5ab3df2145,2025-02-27T14:53:37.577000
|
||||
CVE-2024-1571,0,0,f3d49b2468436cc55f43430be000f569c341c5bb488502d391ca8d5ab3df2145,2025-02-27T14:53:37.577000
|
||||
CVE-2024-1572,0,0,a83548f030b810663477d0b6737646927187cff3fac85148113c7069e7392583,2024-11-21T08:50:51.713000
|
||||
CVE-2024-1573,0,0,55326b48e714bd45f8a7f03a13179fac399e55741cedcbe359268a4ab07b26b6,2024-11-21T08:50:51.837000
|
||||
CVE-2024-1574,0,0,4b773e15e20eaa265c844cea28d7f429a990bf0f316d61c1be91dcdcc753dad5,2024-11-21T08:50:51.953000
|
||||
@ -253463,7 +253464,7 @@ CVE-2024-26688,0,0,a0933753ecf706512391da968c1bf6e01179d03229619ccebb51447535c3b
|
||||
CVE-2024-26689,0,0,45aef623305996e79be3f7e9accf7726333231f3f2e12fd9e4b9fa27d10e7a24,2025-01-14T17:26:26.393000
|
||||
CVE-2024-2669,0,0,f9471b163440c0cdda967029f9665700cf935edd6c2a1bb0a81b9e232cd43f09,2025-02-21T15:14:07.237000
|
||||
CVE-2024-26690,0,0,2c7b24fb82937969d4004e2fcf893dbb69bba8a0a64d7e77bdd23c96decb3399,2024-11-21T09:02:51.193000
|
||||
CVE-2024-26691,0,1,d1f693a33132027d826f7d1db5c60571c371f5304e71ee8c92392bba83ed7578,2025-02-27T14:34:43.180000
|
||||
CVE-2024-26691,0,0,d1f693a33132027d826f7d1db5c60571c371f5304e71ee8c92392bba83ed7578,2025-02-27T14:34:43.180000
|
||||
CVE-2024-26692,0,0,e7f487356d74c96106975bf2abfe9db6d6da6422f0939133b174aaec264ed9e0,2024-11-21T09:02:51.487000
|
||||
CVE-2024-26693,0,0,0d216053635f1d975b6125d601423966cfb8e3352e6cb20eea467a9c7f54bfc5,2024-11-21T09:02:51.593000
|
||||
CVE-2024-26694,0,0,31366aaef63a6678374a95d259ee5e17e7b5f964d9e410ff050a98b8f6c7cbb0,2025-01-07T20:53:53.143000
|
||||
@ -253471,7 +253472,7 @@ CVE-2024-26695,0,0,1ae7cd1e1e85f699df2959b2788d7af1c813dbc8bb82849f43b281e54bed1
|
||||
CVE-2024-26696,0,0,265278528371538cc023600a4c7d8dbbc5ef61d12e3796a87a5522e53c60b655,2024-11-21T09:02:51.970000
|
||||
CVE-2024-26697,0,0,45e5cf8cc205b6572bf2614df87fc02ee354aaf14f2ce522f92421e8870dc643,2024-11-21T09:02:52.090000
|
||||
CVE-2024-26698,0,0,f3c474569b48f60e66044478a18c11a89915914693da10adf07718688bd99993,2024-11-21T09:02:52.217000
|
||||
CVE-2024-26699,0,1,8794599b2be132b74a60620b18f1bc35cf946a4e08c6c6986dddbe97f78e8469,2025-02-27T14:34:43.180000
|
||||
CVE-2024-26699,0,0,8794599b2be132b74a60620b18f1bc35cf946a4e08c6c6986dddbe97f78e8469,2025-02-27T14:34:43.180000
|
||||
CVE-2024-2670,0,0,8bf571b45e5a0f9f2f2f7f29218c47b9f435fc3d26bbb11853c68d013882dc52,2025-02-21T15:15:55.763000
|
||||
CVE-2024-26700,0,0,d340b64f76c76c9e47b3fd93523ba35bc98d09d990c5461e898e1d4216e0399a,2025-01-07T20:26:40.460000
|
||||
CVE-2024-26701,0,0,b03e1ce32248050afb32bc7948ab24791df0affca83332817771b6e5cd8267b8,2024-04-03T17:15:50.720000
|
||||
@ -253499,7 +253500,7 @@ CVE-2024-26720,0,0,1ca9f5c1cf45272d711bbb341b9a3a3e8a66cb323b330efba47b2d4d73910
|
||||
CVE-2024-26721,0,0,ca9a0496ef9381a3510ada8cf6ba88673a4cc89acefb09f26c80679837546878,2024-11-21T09:02:55.100000
|
||||
CVE-2024-26722,0,0,12d674d56dcf1067f7c24e779fb92b06855d0b7019ccfecfbfdcc292981abf0d,2025-01-07T17:35:32.710000
|
||||
CVE-2024-26723,0,0,f35d3a0170fc204ff63f3cb0d2c569463d0cc7f7c48d6a9fa170a41519069565,2024-11-21T09:02:55.350000
|
||||
CVE-2024-26724,0,1,9a896f13cd8770e9ab35aeeacbd0a9c7720b799c08f7ee4ef97296609559f74c,2025-02-27T14:34:43.180000
|
||||
CVE-2024-26724,0,0,9a896f13cd8770e9ab35aeeacbd0a9c7720b799c08f7ee4ef97296609559f74c,2025-02-27T14:34:43.180000
|
||||
CVE-2024-26725,0,0,e9fe20a5c5e5470547a40a8d97f1401a07214b8c6c4b76fbce65efa947d2335c,2025-01-07T17:28:15.293000
|
||||
CVE-2024-26726,0,0,a2e6006099000b7188e7331f1757708510f6f822879749731a4c6d16b7b3a5dc,2024-11-21T09:02:55.767000
|
||||
CVE-2024-26727,0,0,f9e493a2bebe6568fa8635c090fa7c3e7b404bd3fd35053c77015e7873b7cdd0,2024-11-21T09:02:55.880000
|
||||
@ -253546,7 +253547,7 @@ CVE-2024-26763,0,0,ea60cb10ec181dc23fe842240e1437c7c10aef932cbc953d9703f81ca6ffe
|
||||
CVE-2024-26764,0,0,182584c1b22dec918cc3c58a7bf9ff6e42e4473d6f7b976355d13ff4ba65cc27,2024-11-21T09:03:01.100000
|
||||
CVE-2024-26765,0,0,86639deee47c82199c185bbb9e529948404a232a3b8d78621e9c695bf46ea544,2024-11-21T09:03:01.213000
|
||||
CVE-2024-26766,0,0,68fc4b89d6403948bcb3c1a46456d541b6b2a5a051c19a0f4b0d3b1b2c0898ad,2024-11-21T09:03:01.327000
|
||||
CVE-2024-26767,0,1,3e5c80746b7511c9f6aeb36b1c8b59eb41a7b9be4ad7426cc19cb790b7c56f61,2025-02-27T14:34:43.180000
|
||||
CVE-2024-26767,0,0,3e5c80746b7511c9f6aeb36b1c8b59eb41a7b9be4ad7426cc19cb790b7c56f61,2025-02-27T14:34:43.180000
|
||||
CVE-2024-26768,0,0,6fafd2ec3e7cdf9346d5cf413e5e98785829ef156a7452d7bcbd56c557bb4b27,2024-11-21T09:03:01.570000
|
||||
CVE-2024-26769,0,0,9ba21540aec936514403e64bdad200b6edb1d7f751bc14c530bdb954115ae255,2024-11-21T09:03:01.763000
|
||||
CVE-2024-2677,0,0,6a44ca783f96afdf6daeb2ac346e3e6dbf371bf3fa88ba024936355e01095fea,2025-02-21T16:16:38.053000
|
||||
@ -253554,11 +253555,11 @@ CVE-2024-26770,0,0,8d08eaa70a2e2e3d40574f2b704a77374cb9e6669a6ba5b5bad3773130c49
|
||||
CVE-2024-26771,0,0,5e3318a5219a1562a00396de2c61a0fa558f01729e9603c0306f834212e0432f,2025-01-27T14:59:26.887000
|
||||
CVE-2024-26772,0,0,fe8524e99fc68d449508f3ebfd8f6afb4c482f632501c09f5f84e454baa54b83,2024-11-21T09:03:02.190000
|
||||
CVE-2024-26773,0,0,7ef5aed49abdb8b41013d862bea1395e73f0e319d07ad740410642ca0777300e,2024-11-21T09:03:02.380000
|
||||
CVE-2024-26774,0,1,53353673b281eeac1b74af43d28278d8b02200ca0fea5b71264bfc12751890f5,2025-02-27T14:34:43.180000
|
||||
CVE-2024-26774,0,0,53353673b281eeac1b74af43d28278d8b02200ca0fea5b71264bfc12751890f5,2025-02-27T14:34:43.180000
|
||||
CVE-2024-26775,0,0,285e0acd81a3ae287fc503b023988af78322228ca5a120edc7cd1b3b8dae3d03,2025-01-07T17:29:01.727000
|
||||
CVE-2024-26776,0,1,6bd87b054cf379d80339f7b74cece11c8ce7d6e9252343ded58770b6f5c3e5cd,2025-02-27T14:34:43.180000
|
||||
CVE-2024-26777,0,1,e82143173d149baee9cf08e82a0784ad67a75b7eb7359cdea4b0c77c6ef99130,2025-02-27T14:34:43.180000
|
||||
CVE-2024-26778,0,1,a00564862a522e80b3ed45f867d89afedb852ff78077cdaeaa7915b05eb358ad,2025-02-27T14:34:43.180000
|
||||
CVE-2024-26776,0,0,6bd87b054cf379d80339f7b74cece11c8ce7d6e9252343ded58770b6f5c3e5cd,2025-02-27T14:34:43.180000
|
||||
CVE-2024-26777,0,0,e82143173d149baee9cf08e82a0784ad67a75b7eb7359cdea4b0c77c6ef99130,2025-02-27T14:34:43.180000
|
||||
CVE-2024-26778,0,0,a00564862a522e80b3ed45f867d89afedb852ff78077cdaeaa7915b05eb358ad,2025-02-27T14:34:43.180000
|
||||
CVE-2024-26779,0,0,d1dc3ab9d0793413ef8d6f7d472f6b251827d39f169d2e3624611da23e742948,2024-11-21T09:03:03.160000
|
||||
CVE-2024-2678,0,0,1b8569b660baa62f28f36408544cf75e14fd1bbcb0868691da73c3b9150b92e8,2025-02-21T16:19:14.340000
|
||||
CVE-2024-26780,0,0,fee0ab2d14222179966bcf01d07c058d2d30ea8f43041aa94eb3ef9c96c6dd91,2024-11-21T09:03:03.370000
|
||||
@ -253578,7 +253579,7 @@ CVE-2024-26792,0,0,785771b4bfd2e03416e2a07ada6b7ec1391a403eee900f868d4d1d8145ef2
|
||||
CVE-2024-26793,0,0,aa90abb3d1121ccaaf349ab01239e4c0a4a16759efda564be699ec746faed484,2024-12-20T15:56:00.320000
|
||||
CVE-2024-26794,0,0,23d739d3565f17af447122df5e00eeef05a8ec54d56457d32b6380cc23d7ee66,2024-11-21T09:03:05.240000
|
||||
CVE-2024-26795,0,0,5d4eabef0c456f46f9992c03723452a3a8d635aa76f96f4b5da9c93ac3ba4967,2024-11-21T09:03:05.433000
|
||||
CVE-2024-26796,0,1,03c45ba40e27605dd519c5ab37d3d0d1746ee35a9b66965cb2322da1cdf0ae28,2025-02-27T14:35:09.517000
|
||||
CVE-2024-26796,0,0,03c45ba40e27605dd519c5ab37d3d0d1746ee35a9b66965cb2322da1cdf0ae28,2025-02-27T14:35:09.517000
|
||||
CVE-2024-26797,0,0,d555849e5fdf34e0c546a7c8e0d877b819832c74438f586ca3128c8a5874d4a2,2024-11-21T09:03:05.660000
|
||||
CVE-2024-26798,0,0,0a31e852f2f7b601301225ce2a65456a90e397455c97cc5be42b040cfac0e775,2024-11-21T09:03:05.853000
|
||||
CVE-2024-26799,0,0,94e40360a58865d9d67dfe9e60236d4a43830fc422ed0bb78cda58451cb646a0,2024-11-21T09:03:05.970000
|
||||
@ -253588,7 +253589,7 @@ CVE-2024-26801,0,0,d616c47816b367b14619cbeef905892d5b398628baa089c4b9bb3e31bba83
|
||||
CVE-2024-26802,0,0,c3eb25f159f3d9e97001cc75436ed032ab724692e7cfb5cb782ce74be6d22c98,2024-11-21T09:03:06.387000
|
||||
CVE-2024-26803,0,0,da1a5e4a8e1ccdf52da3c008697a74e25b55e57ecff04da71adde2377c898cae,2024-11-21T09:03:06.517000
|
||||
CVE-2024-26804,0,0,59bfb883bba3b84feb6cabc2a731628af8063660636b34871b628531b08d0367,2024-11-21T09:03:06.640000
|
||||
CVE-2024-26805,0,1,6145167443e14e76f499ad74849672ed15ebdfd5fc7470da88f90504d2566084,2025-02-27T14:35:09.517000
|
||||
CVE-2024-26805,0,0,6145167443e14e76f499ad74849672ed15ebdfd5fc7470da88f90504d2566084,2025-02-27T14:35:09.517000
|
||||
CVE-2024-26806,0,0,fa7b569795b93812c90f444b0d8a3e8553cdcd19a61fca66229df1fb76bf9338,2024-11-21T09:03:07.020000
|
||||
CVE-2024-26807,0,0,e784ff7229ad9502ed5252e14bf11afcea7ca1c4def17960827a9c3d29e5d37e,2024-11-21T09:03:07.157000
|
||||
CVE-2024-26808,0,0,32e7e1684e8180e17c00c1a0297443beb6ce1f9164af83c298f9e4ac426327fb,2024-11-21T09:03:07.277000
|
||||
@ -254350,7 +254351,7 @@ CVE-2024-27630,0,0,731bb8197af928fa1856445520f3756b9aaeb95131f03d7742b6fef448807
|
||||
CVE-2024-27631,0,0,103c8638d1817e707cc71d480f3c6c37dce3aa1d7f3ffd71e92f717245a4593a,2024-11-21T09:04:50.500000
|
||||
CVE-2024-27632,0,0,806c654f1571354881d3c6348cc0f58a5e5f574c6954819a3746e29682bd59d2,2024-11-21T09:04:50.717000
|
||||
CVE-2024-2764,0,0,3f3c25f4f3a08eb39b9d08adf8bafa0aa7bdbaabe9053d418949f903a6821eff,2024-12-12T17:32:10.783000
|
||||
CVE-2024-2765,0,0,25d34160b19a37018246e688c43b2f7edb2c0925d78ee66366358a9db455b6d3,2024-11-21T09:10:28.063000
|
||||
CVE-2024-2765,0,1,08bd85002ffe72607df91e7517a31094fc1a0f1368c3deb397d5fe0d90129748,2025-02-27T16:24:20.267000
|
||||
CVE-2024-27655,0,0,64fa652cff6d4913a7eacc3477b493ff8020b9ebde555ca388d39ea40f9c07a2,2024-11-21T09:04:50.860000
|
||||
CVE-2024-27656,0,0,68f3453eec67e27bd69569bc008dd807d641f5cc4dd19bbc4b6e65dd6883ecd0,2024-11-21T09:04:51.073000
|
||||
CVE-2024-27657,0,0,aa83ece6f7ede02f84fcbdbfb40aa14e1e784ec9454470534310c727804b3979,2024-11-21T09:04:51.290000
|
||||
@ -256424,11 +256425,11 @@ CVE-2024-30423,0,0,5b1517d395b5f8158dfe3dfb9c31f1c8a0fee969a59141fbef55b4ecb5784
|
||||
CVE-2024-30424,0,0,48524e69984a1ed7696a166e148f60ba365f7f7962129b44ff4524ebe85c89bb,2024-11-25T15:07:22.740000
|
||||
CVE-2024-30425,0,0,d68c222db45dd584e58dce13133847ff4ad6b955db2902ac4a600d2a9429d974,2025-01-31T19:59:44.457000
|
||||
CVE-2024-30426,0,0,cca737ed45c2f700e4297a282f888b853848134669a65254ac719723adb2bbcf,2025-02-24T12:31:39.620000
|
||||
CVE-2024-30427,0,1,376d55f813869862413ca39c53d02961e8acba30eb8052b6277669dec8e46801,2025-02-27T14:53:37.577000
|
||||
CVE-2024-30428,0,1,120a48de3044f1581e586fcd9879a9594ed268412fffadfa250d034ebbba9635,2025-02-27T14:53:37.577000
|
||||
CVE-2024-30429,0,1,4144738f097005e0e5cc3b821762e2c42993cc372bfb50764aa04fcc38bf746a,2025-02-27T14:53:37.577000
|
||||
CVE-2024-30427,0,0,376d55f813869862413ca39c53d02961e8acba30eb8052b6277669dec8e46801,2025-02-27T14:53:37.577000
|
||||
CVE-2024-30428,0,0,120a48de3044f1581e586fcd9879a9594ed268412fffadfa250d034ebbba9635,2025-02-27T14:53:37.577000
|
||||
CVE-2024-30429,0,0,4144738f097005e0e5cc3b821762e2c42993cc372bfb50764aa04fcc38bf746a,2025-02-27T14:53:37.577000
|
||||
CVE-2024-3043,0,0,8e21ed0042b558d8edd83b12ee0b4291bdba5ec46b953c6e95eadc7fdd76f95c,2024-11-21T09:28:44.967000
|
||||
CVE-2024-30430,0,1,1a4ba08c73bf48d8bdf6ec5e5d5c0da4833965a567eef766a1e7b315f3e0ab38,2025-02-27T14:53:37.577000
|
||||
CVE-2024-30430,0,0,1a4ba08c73bf48d8bdf6ec5e5d5c0da4833965a567eef766a1e7b315f3e0ab38,2025-02-27T14:53:37.577000
|
||||
CVE-2024-30431,0,0,2af38fbded82d170dca915df62a9abfa07549ebdef29a51d4a86e17f57c22b03,2024-11-21T09:11:54.533000
|
||||
CVE-2024-30432,0,0,aabe80294bbaca58cfd6d3e8a149021d2d178d3a7b6f451157000984f416f3ba,2024-11-21T09:11:54.657000
|
||||
CVE-2024-30433,0,0,7e68f751b7f02ed630e16851eb13de7ab852867ef0832b251d2b3e44dc66dc64,2024-11-21T09:11:54.810000
|
||||
@ -256476,7 +256477,7 @@ CVE-2024-30471,0,0,7f05159d7b1bb52c7f44f1503d91bcf3ddb878300d6d0f685babe2188a880
|
||||
CVE-2024-30472,0,0,f99421b44702b1bfa7591fc35986a5e44a7c75afd2395131e35a18241f34b854,2024-11-21T09:11:59.780000
|
||||
CVE-2024-30473,0,0,8a48066726a6946e8d6fbf02f4834d5e17669616d02513742cf7028713d497f7,2025-02-04T17:22:53.270000
|
||||
CVE-2024-30477,0,0,5f48ccb06e4867f2a1b2058d885b227a439282c1bc0b756765407174c49f98c0,2024-11-21T09:12:00.047000
|
||||
CVE-2024-30478,0,1,1a1ff03ce377a4dc26f2c869f5dac4b5e50db58aca9c14b2002c0634901a6a42,2025-02-27T14:53:37.577000
|
||||
CVE-2024-30478,0,0,1a1ff03ce377a4dc26f2c869f5dac4b5e50db58aca9c14b2002c0634901a6a42,2025-02-27T14:53:37.577000
|
||||
CVE-2024-30479,0,0,3a1c45d84b195b84f8d4de162f387c14126668af368e7be294e7e3937eb3e371,2024-11-21T09:12:00.287000
|
||||
CVE-2024-3048,0,0,b45859794096e9789b16af327bbbaf4ffd55ea7d3fdff52dc4d2a53dcaa166fc,2024-11-21T09:28:45.697000
|
||||
CVE-2024-30480,0,0,2e15e0231151aa8e84d8885d70d7113ba628105d9affd7bdb295edcc9c141e57,2024-11-21T09:12:00.427000
|
||||
@ -259829,7 +259830,7 @@ CVE-2024-34891,0,0,25cb8e112712853608c2c85751a52cff47c44dea59bc7bfcbbd2c0cf2d381
|
||||
CVE-2024-34896,0,0,dd6344ce5d2b289f10bffba66b41e7c69f6818bef3b82757e5f893863762bf60,2025-02-18T19:15:15.580000
|
||||
CVE-2024-34897,0,0,ed6004a0904a9f6108b53670a99740a88abdbc735b7762b9196beaacf5a4f95b,2025-02-18T19:15:15.710000
|
||||
CVE-2024-34899,0,0,9ecfd3fb5f76f8e91935a0ef479d0a8882ca629447934509efa12eb54a961a89,2024-11-21T09:19:31.127000
|
||||
CVE-2024-3490,0,0,a44d4e788dbbb31c2d20e7cda7c06080195f41b9c2be3506ebb9ea17f43626d8,2024-11-21T09:29:42.900000
|
||||
CVE-2024-3490,0,1,6b438a19a68fbfd03d67c03743c25a7cf2b8df82a474630e451b14e0e84ce524,2025-02-27T16:24:20.267000
|
||||
CVE-2024-34905,0,0,59d0bb8ac29776054ec2390b8e9ed63207063a9a715e1e403ae1d1ccb3a38a14,2024-11-21T09:19:31.277000
|
||||
CVE-2024-34906,0,0,3bbfb8955edb9ea0b431511df10b395b49def6a899fcaa20ba525c1779c862e5,2024-11-21T09:19:31.530000
|
||||
CVE-2024-34909,0,0,3912d2499dc504e99cc68dc89139180122ae1dac7133c9025db727a905e4e269,2024-11-21T09:19:31.770000
|
||||
@ -262101,20 +262102,20 @@ CVE-2024-3780,0,0,a09ec1f79188d078f50e7a2bb4abf902889a3f5b8d804aa8f15de03d54dac9
|
||||
CVE-2024-37800,0,0,181e136eec13b5820afe4f39edeed05bd09a2f14d24d0cf641ab872734640d9e,2024-11-21T09:24:19.810000
|
||||
CVE-2024-37802,0,0,706c958bf2a9284b7acd12ade4f60f428328e5fbfa19d79761e97fc7d6903788,2024-11-21T09:24:20.040000
|
||||
CVE-2024-37803,0,0,d69eeebd204d2fe2694b3c38c1feea68fb9126791c5afcc8bafbf308aa06171b,2024-11-21T09:24:20.260000
|
||||
CVE-2024-3781,0,0,75b98cb34aadf1fe2dbca1c5df4b0430abd2c83c685ace5bcf4bbd5a6cd35847,2024-11-21T09:30:23.203000
|
||||
CVE-2024-3781,0,1,811024c81fcec4851635352f18340797a729395a722ecf3d2c858147ac01c2d5,2025-02-27T15:34:49.607000
|
||||
CVE-2024-37816,0,0,0255491dd0ac61fe8f883862d2c202814fc8f53a759901f88a06c7013f4661c0,2024-11-27T20:15:24.903000
|
||||
CVE-2024-37818,0,0,adc0803b390ef119b7312d5c108656cbe1c41da7e77dc9f33c1c6c84e04bc7b6,2024-11-21T09:24:20.427000
|
||||
CVE-2024-3782,0,0,ebd4c693b03f2d9c219f121be82cd281875d05e62ebd1c9f7d6713ada5db2eac,2024-11-21T09:30:23.343000
|
||||
CVE-2024-3782,0,1,d675e8c9822f2b65f8432c08855c3bd1094feaf0965d865a7d0a6df5793df2b3,2025-02-27T15:34:49.607000
|
||||
CVE-2024-37820,0,0,cd852e1dadcb7edc135763a1f4f8f423dcb6c177e797c3b00dca3df88e5d65fd,2024-11-21T19:15:09.450000
|
||||
CVE-2024-37821,0,0,1453a655cd572a4a0dd83a571605e37d7e86ccc97e2d883b331db535ee79a9ea,2024-11-21T09:24:20.780000
|
||||
CVE-2024-37825,0,0,9415ecb729c8ea23547630f5e9156dca92043a10d0acfd9c137211bd64cfbf2f,2024-11-21T09:24:21.010000
|
||||
CVE-2024-37826,0,0,20f0d54db5f0b645077d95bb794fe1fc2b56fd00b52ab4b12112458724d576ad,2024-08-12T21:35:07.723000
|
||||
CVE-2024-37828,0,0,766adf4d444cb8eb6560cf67ecd774e30c8a3685f9d4dfd3f03a2ce063007731,2024-11-21T09:24:21.423000
|
||||
CVE-2024-37829,0,0,78588a989f53424b667515b878467614f73062f0b4d3590146f49431c4122429,2024-11-21T09:24:21.640000
|
||||
CVE-2024-3783,0,0,379cf90df67b2bc763d44570fdd71ca07780322ecd8b039367e8dd5662a7c946,2024-11-21T09:30:23.470000
|
||||
CVE-2024-3783,0,1,f9c9c890bd245a2750970b7c27e2ee376854eb7a110663b8497d2dda28e722d6,2025-02-27T15:34:49.607000
|
||||
CVE-2024-37830,0,0,9396113938aff690243b110d71c1db69617c2b0e2f623a15484e143c1ba91169,2024-11-21T09:24:21.857000
|
||||
CVE-2024-37831,0,0,441743a859c32d6468deb58ac518c2787d768e84d36d713eb3a544fa4a083a51,2024-11-21T09:24:22.087000
|
||||
CVE-2024-3784,0,0,d4c09a4a70c6653560a5b92afe4600704799bae70e094525f4ebcfeb9784306c,2024-11-21T09:30:23.603000
|
||||
CVE-2024-3784,0,1,08cf7605e00cbc6ed6b869a77f3c8538dc73c871e3ce916a4a2b80cc73330a3f,2025-02-27T15:34:49.607000
|
||||
CVE-2024-37840,0,0,e25fd33381a4edbbcc6883cdbf75a1bed2d4af5371e13f531acf1de5147ed65a,2024-11-21T09:24:22.330000
|
||||
CVE-2024-37843,0,0,0b3063ae527efc2fee65f8cf91bc539262de9f2518563f8af622b9935d078d5d,2024-11-21T09:24:22.550000
|
||||
CVE-2024-37844,0,0,309b5878be678f267abd2605f919c710c5a70b405c93110c0363d43291df9df3,2024-11-05T16:03:33.217000
|
||||
@ -262137,7 +262138,7 @@ CVE-2024-37863,0,0,6e547bbf181c4a9e595d32656aed95f0317e97be6194411c87b914a812710
|
||||
CVE-2024-37865,0,0,dfeb9a6ca61904e957829daa61e066997af14de3bcf96e9ea969e9a485811c09,2024-11-21T09:24:25.140000
|
||||
CVE-2024-37868,0,0,86aba95bea13cf4bcf66aea63309cd8719ccea2be3d5a1c071c8e084167a7293,2024-10-08T18:16:07.383000
|
||||
CVE-2024-37869,0,0,ce409ae8f9d19780de31fb5c79caf3f541d760ccb03940db155e1fc53346697d,2024-10-08T18:15:54.250000
|
||||
CVE-2024-3787,0,0,7b9a870ab3d3e5144d18d7fdfea67a2ec485c0c0f19097b50341fadda8b5fa78,2024-11-21T09:30:24.027000
|
||||
CVE-2024-3787,0,1,c71f3d89c4f4a5a83f9bcc44952d39f533782feefb20967e6ec050888d63b73a,2025-02-27T15:34:49.607000
|
||||
CVE-2024-37870,0,0,d15041c1c4174f04ccd6db3655427ba3b8c771d22aedee856ced32d25642ca29,2024-11-21T09:24:25.827000
|
||||
CVE-2024-37871,0,0,b045ceb4582b35706f03973a842d86ec98725db8fd2169ac81b3e469ff7aad96,2024-11-21T09:24:26.050000
|
||||
CVE-2024-37872,0,0,8d1e254eb7523d398afd2ac4a3a43d964124c32e65e3e5ffed14fdd015d2da4d,2024-11-21T09:24:26.263000
|
||||
@ -262156,7 +262157,7 @@ CVE-2024-37886,0,0,f0a021a42cfb4f844466dd7ebce1cce59b3a76317d0e94d306a13047e6ee2
|
||||
CVE-2024-37887,0,0,ce3b4f7dbbe9319f9a99f667a522474e95017d0525bbf21a311b687abc254ab0,2024-11-21T09:24:28.407000
|
||||
CVE-2024-37888,0,0,bccd67c6879eca6b637a626b2dbd914ead368108981562eab53114bbf8992329,2024-11-21T09:24:28.543000
|
||||
CVE-2024-37889,0,0,f2ae257286a98dcc092ae84d69912ea7fa44d6af4aa5a20997e5fb931ab3e7b3,2024-11-21T09:24:28.663000
|
||||
CVE-2024-3789,0,0,754b0267ea1ebb62bc2c1c853e0b2a2fb5058c7c651335c3e24668f2f52d13aa,2024-11-21T09:30:24.290000
|
||||
CVE-2024-3789,0,1,a7a3ce718301d5fd19a58b5131985163b24f09c224ba73f0b8fb3f9fafd5ce1a,2025-02-27T15:34:49.607000
|
||||
CVE-2024-37890,0,0,6d9265d1a4019acbaf9847570ed538af8d32dc0fa6057c28dc3e7d41713a2cf4,2024-11-21T09:24:28.810000
|
||||
CVE-2024-37891,0,0,5b4026b1f245b6ccfff5e5cab8cc3dc2679b2651a439a6bf43ff4bd6a0fb1b46,2024-11-21T09:24:28.953000
|
||||
CVE-2024-37893,0,0,44cc5c1c4a811860b6120fda80d860a009e0adaa00644ca58af35f9cdce29302,2024-11-21T09:24:29.090000
|
||||
@ -262166,7 +262167,7 @@ CVE-2024-37896,0,0,7496bcb94686c1b20265c78118e271a3d1b71c6703352d6058c170f115cca
|
||||
CVE-2024-37897,0,0,395eb6e878dc08633c01647412c82e7154278b39adc62052dc129918deb2443f,2024-11-21T09:24:29.623000
|
||||
CVE-2024-37898,0,0,ceb51e6817d849296a71d497367f9c03102417b6b660ee927a2bb10bd7f1cc00,2024-09-06T21:16:55.600000
|
||||
CVE-2024-37899,0,0,8bcfbbbf28d6009c77956811f7c492e4be3248bfb507997d02b4550add2d9bfd,2025-02-05T16:01:02.763000
|
||||
CVE-2024-3790,0,0,1683f69dce5f099820935ed3e085f418d40c3062d6a224e08a8b5ce3f61d7945,2024-11-21T09:30:24.420000
|
||||
CVE-2024-3790,0,1,fb51ad27d584644454272125d9ad2474825ac514902078b92cc65be535e14153,2025-02-27T15:34:49.607000
|
||||
CVE-2024-37900,0,0,71db7ce42b670bcfc80f61eb84d259055a053561c3204238aa43a0ced619d3ae,2025-01-10T16:54:03.820000
|
||||
CVE-2024-37901,0,0,878c4a6a346bdf9361411abb10af3cf8a835e99c7a497cde963a683f3319ac14,2024-09-06T20:54:20.857000
|
||||
CVE-2024-37902,0,0,d606c54ec49963dae75df14960ec3ebc5b06ce69f013e9eb9199335103f5ad62,2024-11-21T09:24:30.200000
|
||||
@ -262174,10 +262175,10 @@ CVE-2024-37903,0,0,ac28b821cf5d49d042613ed82e844b155151e9f3b20f26d94cc98ea876980
|
||||
CVE-2024-37904,0,0,e813ec7f77e1c4db357fbfbc330d401e07462134bcbd1a3b7af6bb82218928d6,2024-11-21T09:24:30.433000
|
||||
CVE-2024-37905,0,0,cfbfe70dc3025c966e75130e8ffb3a66e205aad91789012e9278b2230582a572,2024-11-21T09:24:30.567000
|
||||
CVE-2024-37906,0,0,60638f015f60d4998ac5e53e04dc8278b4f14f313ae3fd281a3fcf7a24f402f6,2024-11-21T09:24:30.690000
|
||||
CVE-2024-3791,0,0,391bef14712a31efc0f7b8636dcd385112ac540b1112018964166b0fe1dd2304,2024-11-21T09:30:24.543000
|
||||
CVE-2024-3791,0,1,0c276d1e8f22610eb03676b939abf1e9583e8bb0ad093bb06efd426012eb8064,2025-02-27T15:34:49.607000
|
||||
CVE-2024-37918,0,0,f2c0960766c039c73333a140c9c64ce658d1c2a5371f8e0cc54f919287aa2413,2024-11-21T09:24:30.817000
|
||||
CVE-2024-37919,0,0,6b84d0d30daccc9c79cc1332a607796144e96d73003348dede97754aecdf1109,2024-11-21T09:24:30.933000
|
||||
CVE-2024-3792,0,0,b885b0ebd4c00697c19815d351a246eb633bc1b6a5ee7d6318add5363860affe,2024-11-21T09:30:24.667000
|
||||
CVE-2024-3792,0,1,92451412c7b4cb259739ffd69f765ed895686ce36bada0958cbe5445aecbf77f,2025-02-27T15:34:49.607000
|
||||
CVE-2024-37920,0,0,890f1847ce5a987963fcae06b45f60f0a4de775bdd560e6ade71ec616ab1bc5a,2024-11-21T09:24:31.070000
|
||||
CVE-2024-37921,0,0,ecc4d5f20e1a693d04a769d55d4de6eb4e8069e6c6ea9b19862ad1137c1a6db3,2024-11-01T20:24:53.730000
|
||||
CVE-2024-37922,0,0,0144790ca3586a88bc548ff48ff61287508a4b6844538a0575c4e40a89e6afd2,2025-02-03T15:41:55.347000
|
||||
@ -262188,7 +262189,7 @@ CVE-2024-37926,0,0,690fc32ea92b25faf58f80d227097abe2c4cd64ea06bfbe0a84a93056612e
|
||||
CVE-2024-37927,0,0,4eba3bbba8c8fc6793f93a314c32aaa170c67d65057a7fc7bb8df3ff4a5ee904,2024-11-21T09:24:31.800000
|
||||
CVE-2024-37928,0,0,88845070e40e5d4b843bd2b49d9131210be7e0694c6b4ca837387c51ffcf48f4,2024-11-21T09:24:31.927000
|
||||
CVE-2024-37929,0,0,de597624344a169a3be44fadd933bc291bed1e8c9022a10f7c94d97e32d8943a,2024-11-01T20:24:53.730000
|
||||
CVE-2024-3793,0,0,73640d6ba231d9c41da9d7b15c75450b04a69d1d87b056e5cb4d2223186d10d8,2024-11-21T09:30:24.793000
|
||||
CVE-2024-3793,0,1,6350427e125e78c107b32e512e08ccfe5e3bc005b606a15d9b465fd0e82a6494,2025-02-27T15:34:49.607000
|
||||
CVE-2024-37930,0,0,e48bdd5c17daf8908b5fe20b5940f98445ff5eae1cf2ab12b729cee9c0413a70,2024-09-12T21:24:59.393000
|
||||
CVE-2024-37931,0,0,8886326d0fb4b164d58d74b09f166e7ff4eda0ca58e67142066eacce5d057240,2025-01-02T14:15:07.340000
|
||||
CVE-2024-37932,0,0,6d856c356044ea2d56cceaf836c2b5ba62fcd331949b626635fd85b97ea9bf94,2024-11-21T09:24:32.260000
|
||||
@ -262199,7 +262200,7 @@ CVE-2024-37936,0,0,d25ba5c67c0db6d849ac88ca33248eff1760cbcf37d4757d2cbfdae21efc0
|
||||
CVE-2024-37937,0,0,19ec3e1f5f49e4f0aa1978d3f4e330e056f1e016e87297bd81264c1a805b3c0e,2025-01-02T12:15:22.297000
|
||||
CVE-2024-37938,0,0,e3c1c3aa70fbb988b2f75a9eb0b74fa4e3d6b23dcc0eeef07caa3d2df84907d0,2024-11-21T09:24:32.900000
|
||||
CVE-2024-37939,0,0,7d78b13316567066ec29ff62b340c009cf9861fc6bbdb739181963e7eed92f9f,2024-11-21T09:24:33.030000
|
||||
CVE-2024-3794,0,0,b99e0638ae6d64a4952a006e0c982ae6b521173babc0ec8536874ade6e188da5,2024-11-21T09:30:24.920000
|
||||
CVE-2024-3794,0,1,cab78926cc7c580f745f90274b59940a2714e21028fcd07420271b250ae03a96,2025-02-27T15:34:49.607000
|
||||
CVE-2024-37940,0,0,9082879a31b69ca88ecda947392fdb0e290d01aa8ecc211e2f6bbb079701b0bf,2024-11-21T09:24:33.160000
|
||||
CVE-2024-37941,0,0,ce95899776753c10994fb5c0baa5559a6d21a97272aa9782be9d3f572ab77019,2024-11-21T09:24:33.287000
|
||||
CVE-2024-37942,0,0,f8016f8b9c4cc6ae85181382835fbc9c193283fe069b149331bf141b42f1baf4,2024-11-21T09:24:33.413000
|
||||
@ -262209,7 +262210,7 @@ CVE-2024-37946,0,0,00b1fbbfc0d2087522919de371a22b11c465fbd70bfb589657c6d22d25f9a
|
||||
CVE-2024-37947,0,0,cd991f0b772c0aa9709524c9ab829a4556eefa1e363002da259de22b2af3066d,2025-02-03T15:36:35.497000
|
||||
CVE-2024-37948,0,0,5097955877ffd34efa17e2fa108c28030a0542d43b802cc7941430a1a937aa26,2024-11-21T09:24:34.080000
|
||||
CVE-2024-37949,0,0,a1091a4c75e1bd8344a63600b92c0ac81f8e705d5157c70b2633385463ebc0b7,2024-11-21T09:24:34.213000
|
||||
CVE-2024-3795,0,0,b87227fec74bc22a8370ab6cca33324b03e7eb8a4f54cc80b52f84e1d242420f,2024-11-21T09:30:25.043000
|
||||
CVE-2024-3795,0,1,281eae0d40c411b316aff4ca658cd4420a6a08ad3f12e1c0830f2b174e55c751,2025-02-27T15:34:49.607000
|
||||
CVE-2024-37950,0,0,e76389ff4658371d59501a8fc08aefcb4889b2fca8cde97cc9923eed57eabec9,2024-11-21T09:24:34.343000
|
||||
CVE-2024-37951,0,0,03aad2c1ad69fa2b1932db5d4c84c2ec0549e9ade11e6efdf054aedafd6429b3,2024-11-21T09:24:34.467000
|
||||
CVE-2024-37952,0,0,cd31cf21662ab17a9bbcc873ce1242f623f9ea892edb98ca03d91e645fe64177,2024-11-21T09:24:34.600000
|
||||
@ -262220,7 +262221,7 @@ CVE-2024-37956,0,0,61481c48e38db3f8a05369765f4eaaf2b442602110bfe4e8231954f68887c
|
||||
CVE-2024-37957,0,0,a8222dc719812e73523fa0449020fd6bfaed368e79ee525e6fb73e85d9b8f55e,2024-11-21T09:24:35.307000
|
||||
CVE-2024-37958,0,0,540c02bec92c5d8ab60f85416bf350b9ade7701699ff3e5af971452f58e69d79,2024-11-21T09:24:35.440000
|
||||
CVE-2024-37959,0,0,2862307e6b6656e94395dac2d8ff6f12ad600e913a0f2b2e4ab9d9950e1d2714,2024-11-21T09:24:35.580000
|
||||
CVE-2024-3796,0,0,5e13880a616d837f5f87d8ca618a02d49accff6c61baaf75a0f5a9c0334540f3,2024-11-21T09:30:25.163000
|
||||
CVE-2024-3796,0,1,84603d5fb01f38cfeb9eb059818cbfe14765a4480d54be17b62422201cf6f853,2025-02-27T15:34:49.607000
|
||||
CVE-2024-37960,0,0,88ecfceb39b7e0063b870ddb68c9129955f8d29f0184bea950ac004cc590cadd,2024-11-21T09:24:35.723000
|
||||
CVE-2024-37961,0,0,cf66c48c044de3bddb607a0cf3c90167369e2890a5e938294c10f20a360a5cca,2024-11-21T09:24:35.847000
|
||||
CVE-2024-37962,0,0,db2675353f860399b9d6d1a0495bf62bb81eedede36ed49cbf58759c240cc39a,2024-12-19T12:15:06.737000
|
||||
@ -263144,7 +263145,7 @@ CVE-2024-3893,0,0,09efe4cc959eb8a4000a2996938df3ee2abc638e569f1f06c5c89fa7fb7b00
|
||||
CVE-2024-3894,0,0,b3a2aa3b7941117f799646b94fe80eaf70c3bf0a40df09c6ce1c103c909b6f7c,2024-11-21T09:30:38.890000
|
||||
CVE-2024-38944,0,0,aea38a4752802a1f34132bcbb575e35233d1954a8780f67f8d4f7cb5965d4f2d,2024-11-21T09:26:59.773000
|
||||
CVE-2024-38949,0,0,37157e233df90a73366a05c90945fefa68ba5959ff251c7bc601be03a335c73b,2024-11-21T09:27:00.007000
|
||||
CVE-2024-3895,0,0,7a0a06be547f9625e9488e1cda90af14416becdd791d1799e9af2383bcc27c38,2024-11-21T09:30:39.007000
|
||||
CVE-2024-3895,0,1,0566768cd3a689d7435eee0d258e0dfa90f34747eb857c2d09feff0bcf921254,2025-02-27T16:24:20.267000
|
||||
CVE-2024-38950,0,0,3d1ce94030613da6a2ba7963efa6466f81addb4ed6cba912d4be8dce4e80b36d,2024-11-21T09:27:00.260000
|
||||
CVE-2024-38951,0,0,17e6d72d6ddc33d1e74949cddb49cc4cea8c80a6d51eb19eb8f6f6dcf3bf4102,2024-11-21T09:27:00.490000
|
||||
CVE-2024-38952,0,0,f38baf84d36c6a8308d09b2d27a0d4f36a3cd4be5595209fae6a993eda0806ec,2024-11-21T09:27:00.710000
|
||||
@ -271228,7 +271229,7 @@ CVE-2024-50142,0,0,b2c5af1ce969bd7983e3442069ed7f8b24fed69937dc954f24e0354d022df
|
||||
CVE-2024-50143,0,0,567c2b16c7d43252518c662df6881aa0eec229fd63f18528756c7fbeaa09ed4b,2024-11-15T22:22:40.397000
|
||||
CVE-2024-50144,0,0,5ae604a667d8dead888173efe4f3293be9a6b09a9f1785582a531cf96a2fc7d4,2024-11-18T21:16:17.367000
|
||||
CVE-2024-50145,0,0,98f53d30fdb8b23e9497c3781c9f52abd6382f34216b5d55340deb28868421c7,2024-11-15T19:50:44.203000
|
||||
CVE-2024-50146,0,1,653d976e592938c412896a37ce85cb2e2a18fe1aa601d7b63cef839bf54c4f1a,2025-02-27T13:15:10.813000
|
||||
CVE-2024-50146,0,0,653d976e592938c412896a37ce85cb2e2a18fe1aa601d7b63cef839bf54c4f1a,2025-02-27T13:15:10.813000
|
||||
CVE-2024-50147,0,0,b3b71bdc694c103dbc53ae8dd319728eabf98a5d7ef19dbedccdab8d20522d05,2024-11-18T21:19:21.917000
|
||||
CVE-2024-50148,0,0,29eee073fa03f15b890aa5c0bce0077794c99acb699f53407212567151a1a25f,2024-11-18T21:24:05.020000
|
||||
CVE-2024-50149,0,0,c787490f93b85be8fc6ccda6ac0403d02734503c1dbcd49a6038dc27a90e3da9,2024-12-11T15:15:13.170000
|
||||
@ -271809,7 +271810,7 @@ CVE-2024-50836,0,0,2b207118e0a8a4ce500ad2ad82cbd68c1c17f6445a35919a8ad8d19d94e8a
|
||||
CVE-2024-50837,0,0,e4f50cb608a9502c76a99235bbbc28b472f4d4fa633e2640771600ede0bee6df,2024-11-15T13:58:08.913000
|
||||
CVE-2024-50838,0,0,7b54b2e271a063a818d0bf4dff1ca05c047467f8817d2c7f31bf268cb99e8d34,2024-11-15T13:58:08.913000
|
||||
CVE-2024-50839,0,0,fb7575ee1c3ee269ac106b6dd0ebe8c613257013972de7a3961ad74520bdcf56,2024-11-15T13:58:08.913000
|
||||
CVE-2024-5084,0,1,03c6027f11a8a05a61aeb37221e721820960f6c5aca582f8538c6c13f3a6433a,2025-02-27T13:30:57.937000
|
||||
CVE-2024-5084,0,0,03c6027f11a8a05a61aeb37221e721820960f6c5aca582f8538c6c13f3a6433a,2025-02-27T13:30:57.937000
|
||||
CVE-2024-50840,0,0,7f2672a897fefdffc52751836cb370e512db5cd32670b90dac2503d33dbff2c2,2024-11-15T13:58:08.913000
|
||||
CVE-2024-50841,0,0,1b7ead830a48947d153ded94e12295c6952d0a7046aa507547ebb0fc4f177b31,2024-11-15T13:58:08.913000
|
||||
CVE-2024-50842,0,0,f7b07a1b2b830ed92801fa7f1b54eb1abc0607cca9e6a36c8e0f57711c48f153,2024-11-15T13:58:08.913000
|
||||
@ -272962,7 +272963,7 @@ CVE-2024-52554,0,0,6c54306f2e6d9fb6f74be49581a8d7a732bed7e140bab05d7cfce43a22fc3
|
||||
CVE-2024-52555,0,0,0e7650262da77965578e51615ed2e240e4965fb0467279926cec95693ddd0fcd,2025-01-31T14:37:51.653000
|
||||
CVE-2024-52557,0,0,ae48eb61b089aed52fa7fc65aa860d697df20451b58d606dded631522ecb778c,2025-02-27T03:15:10.373000
|
||||
CVE-2024-52558,0,0,fa32c6dd3f7f7069c5222cac92732c751cdcd8c311d81175627dacc022aec1da,2024-12-06T18:15:26.007000
|
||||
CVE-2024-52559,0,1,86cc88640f1d86168320f0656d2a7fa7c043dc88da01526969a8ccc338d93a46,2025-02-27T13:15:10.943000
|
||||
CVE-2024-52559,0,0,86cc88640f1d86168320f0656d2a7fa7c043dc88da01526969a8ccc338d93a46,2025-02-27T13:15:10.943000
|
||||
CVE-2024-5256,0,0,351ec0133ebd6057956e3a32f156ca3c6d3a5e82f4f6d83d2ed56c2cf43e8b33,2024-11-21T09:47:17.300000
|
||||
CVE-2024-52560,0,0,c9377755687e3f124f4fb8ae71bf4f5bf247464d322cf8d0c6998968d4e49ff5,2025-02-27T03:15:10.573000
|
||||
CVE-2024-52564,0,0,082fb97e963e24eeaf48108489383b26257575861650145a72a41c8a27e90eeb,2024-12-05T10:31:40.663000
|
||||
@ -274041,7 +274042,9 @@ CVE-2024-54158,0,0,8c6dc67958b420fa6c8d095b96806595ddd0e8ce477f8baa35f7cadb7e015
|
||||
CVE-2024-54159,0,0,a6966b82b06dc6cc6ffe535670f7fe423d90e23d66a5791ea4c4b55b9827bb58,2024-12-03T15:15:12.097000
|
||||
CVE-2024-5416,0,0,2cc8eb5abc95e0327999359a16ced825b9a25c50e0044d232fce1c6bda48c682,2024-09-26T14:37:59.290000
|
||||
CVE-2024-54160,0,0,4df1c13c84c21e9aa7050ae9319fa9577473b95f44c8e77953e28575fc0cc4c7,2025-02-12T15:15:15.050000
|
||||
CVE-2024-54169,1,1,8f8e39f28e7aaab08ffb70d2fa53ac338f4a1cb17764b38d9fedae190adae1e0,2025-02-27T15:15:39.100000
|
||||
CVE-2024-5417,0,0,2c092c55b8a1a8c8890a1e4546beb75d8fbd37f20d02cbd8444692608bc2553d,2024-10-07T15:44:01.830000
|
||||
CVE-2024-54170,1,1,115fcfa389ae6bda1f9341d4e101093ad6d8b81f4dcb7bc6cae920d01c10de34,2025-02-27T15:15:39.240000
|
||||
CVE-2024-54171,0,0,76fdd9d793c7b352d23e0d64a823cd883e5b81bbb06d5f2cffeb90d9ca7786b4,2025-02-06T21:15:21.453000
|
||||
CVE-2024-54176,0,0,5463f590e796ae65427debb4e96d6df8b03f447d67021c1f3c7471918becbe24,2025-02-08T17:15:21.643000
|
||||
CVE-2024-5418,0,0,c3b6dacc234cf8a9c6de6913d07caa1810e24ada600d2b1f8edeb26c6b62184b,2024-11-21T09:47:36.970000
|
||||
@ -275207,6 +275210,10 @@ CVE-2024-56473,0,0,95cfed310cb3647bbda3340eb9a2861ece3f6a264ec3b8709c7f3e2f2b2f3
|
||||
CVE-2024-56477,0,0,69f54c57c1e95b4eee06ff2634a0d66e2fb14ef4e946564e8329b5df0b1d985e,2025-02-14T15:15:11.887000
|
||||
CVE-2024-5648,0,0,bc73cf61a73f7ebbf93011e7f0eec24203116f4c2ab4460b3b361f438af2c397,2024-11-21T09:48:05.320000
|
||||
CVE-2024-5649,0,0,92f21873e8ee5bd32fcc22cd04303aa3780b31222c125187737acc3fe33a1fe2,2024-11-21T09:48:05.430000
|
||||
CVE-2024-56493,1,1,9fb9f3d685456a24e5a7a669651c63e6452dee16c634f01fe0f8c84f53a6c695,2025-02-27T15:15:39.377000
|
||||
CVE-2024-56494,1,1,cad70116124e747903120c8a3187fe4ea246c73f601b8a13a3163495e1cb1049,2025-02-27T15:15:39.517000
|
||||
CVE-2024-56495,1,1,f889038e399ec7fd6045f8954528488dbad89286b8da8df71d3aa9a4bbd4e496,2025-02-27T15:15:39.657000
|
||||
CVE-2024-56496,1,1,84c3675ffa4af34d7bc94a53bb318429a792bae5d72148505e8c72840cb3ad4f,2025-02-27T15:15:39.793000
|
||||
CVE-2024-56497,0,0,a7ecc72de50d553601513fb44c5785a7cd2d4cfbd01028d279dfa23254fa1ea5,2025-02-03T20:49:01.510000
|
||||
CVE-2024-5650,0,0,e326c3216630004af5368334e17751b93c2144fc6e95ba439673319f24c5efbd,2024-11-21T09:48:05.557000
|
||||
CVE-2024-56507,0,0,2fcd6aea186081b10138c7efdbe4c6828fb4bc2d016266039f2e51dacfa7b54c,2024-12-27T21:15:08.287000
|
||||
@ -275517,6 +275524,9 @@ CVE-2024-56801,0,0,608d72ce684573f2f07cbdeab1ed98d867b4db13f9541ced20c6319a643d6
|
||||
CVE-2024-56802,0,0,6ee863a0be69f17945770e06c9cb9ea63f693e0628097d71cfeccbe8965990b5,2024-12-31T16:15:28.240000
|
||||
CVE-2024-56803,0,0,e6caec2622228c0a4a255f1bc86158e1556677df2e0db9c60d4d558fd33bc5d3,2024-12-31T23:15:41.553000
|
||||
CVE-2024-5681,0,0,25a463be80d3bb29af40554a62ba0e4276aefee689d98e36dee0bcfe769073f6,2024-11-21T09:48:08.953000
|
||||
CVE-2024-56810,1,1,28cef03cd5359249a40e425e91d2a99bd05718422b482c233bf4415ff4d95805,2025-02-27T15:15:39.930000
|
||||
CVE-2024-56811,1,1,c0c9c9d710bced065e3d2f6b86e9fc71d05d5e6427024d86517bb1544cf4606b,2025-02-27T15:15:40.067000
|
||||
CVE-2024-56812,1,1,058d48fad5c864e4387fd48a4ac7a0808b83214b6a1e5428ae4f4903647b014c,2025-02-27T15:15:40.200000
|
||||
CVE-2024-5682,0,0,61babb4b22790f05b1e6fb044157f817a85668af929c91e823c0d3ae99b2f335,2024-09-20T12:30:51.220000
|
||||
CVE-2024-56826,0,0,ec68978dbfde8fef0ce0777a1db20b08edcfd57501134820891a9283a7b02eac,2025-01-09T04:15:12.660000
|
||||
CVE-2024-56827,0,0,45e65a3f7a940f5d088604960cd3497fe1850c47a3f74bab0994003ce1109732,2025-01-09T04:15:12.840000
|
||||
@ -276101,7 +276111,7 @@ CVE-2024-57973,0,0,880ae8920cff383c83382a12f0aed951c431326b6251c9eee5046fcc771c1
|
||||
CVE-2024-57974,0,0,9283c31329c8c79a7c2d7ba850e2fae6c4866efb0bc89895bb99f52893ea9871,2025-02-27T02:15:10.590000
|
||||
CVE-2024-57975,0,0,cb69d9a311887f4b534587384c990ff308b1380cbfc2d7252bdcecd7dbc0f8f1,2025-02-27T02:15:10.687000
|
||||
CVE-2024-57976,0,0,7f09566c0feeca43e88331a7b08960623ddee4f005b52f57b309033e09c409f6,2025-02-27T02:15:10.790000
|
||||
CVE-2024-57977,0,1,95d6e3cfdf7d059ffc8f36aea59ffac8f831718016b7d9622c1ff999e22b555d,2025-02-27T13:15:11.053000
|
||||
CVE-2024-57977,0,0,95d6e3cfdf7d059ffc8f36aea59ffac8f831718016b7d9622c1ff999e22b555d,2025-02-27T13:15:11.053000
|
||||
CVE-2024-57978,0,0,e8ec9a121960a685f9c435a7ce1a5bc00fc9f8a0953711b3760133a98ea218ac,2025-02-27T02:15:10.990000
|
||||
CVE-2024-57979,0,0,022cf17af330e8a9f7ce941e4c03648881e6a5a964e2654b247615aeae7964b8,2025-02-27T02:15:11.087000
|
||||
CVE-2024-5798,0,0,1cf6b5fddcb53bc6e432a6a3428f56651407d96c3d029c184944ae69fb8dd23b,2024-11-21T09:48:21.013000
|
||||
@ -276129,7 +276139,7 @@ CVE-2024-57999,0,0,48c9ed92d08de2fcae4026c9ef9257a4176bfcbb954c4a8c091b9b36e1a3e
|
||||
CVE-2024-5800,0,0,0f1ba4e6921bceda8aa9f69d4954ff1ca271a0069f260f484c22f7b777658fee,2024-08-12T13:41:36.517000
|
||||
CVE-2024-58000,0,0,e6779467396c4c7b4b8a6e267dadc7356f5669ed597352b30c7f4e3a2fade9bc,2025-02-27T02:15:14.033000
|
||||
CVE-2024-58001,0,0,1ca7135605c27baa2ff41ca14b97a1158622dc893de3d0edc4ce91d0223c6eba,2025-02-27T03:15:11.080000
|
||||
CVE-2024-58002,0,1,25a27b0d9fe28835ea1c6e57d50ea8f1336ba2eaaf36ddd02cc630480d326e28,2025-02-27T13:15:11.153000
|
||||
CVE-2024-58002,0,0,25a27b0d9fe28835ea1c6e57d50ea8f1336ba2eaaf36ddd02cc630480d326e28,2025-02-27T13:15:11.153000
|
||||
CVE-2024-58003,0,0,46450a09a6f54addf43be0c82d79310bab68cc144d2932a834ba9b37fe69f0c4,2025-02-27T03:15:11.277000
|
||||
CVE-2024-58004,0,0,8b7c12b136527252508ad830ab80dd313ff57c70923621f086f1770af781b569,2025-02-27T03:15:11.380000
|
||||
CVE-2024-58005,0,0,2b8445c1f31120a62745ed9659109edc5b61c3c950d5ba8ee2d0774104a846c8,2025-02-27T03:15:11.480000
|
||||
@ -279250,7 +279260,7 @@ CVE-2024-9327,0,0,8a7521488d62c373c38a9df28f71f3a103861ac4cdfbc479de5d63bb5149cd
|
||||
CVE-2024-9328,0,0,b8494e2a763df9275472fb9e08e10e2bb0b4c6d4079a2b9786105d6097553f18,2024-10-01T11:34:57.773000
|
||||
CVE-2024-9329,0,0,5a3d931a38804f6849af226ecca4156ce845f1dbc4dbfeaa3d64e1e03750be87,2024-11-21T09:54:17.147000
|
||||
CVE-2024-9333,0,0,86a4f29dc34e46aec9774e41cb3aeff2bbdc214a06b4147e3c438b765ac175a1,2024-10-04T13:50:43.727000
|
||||
CVE-2024-9334,1,1,f453d5c150390effbe6392cc4e6a0011770b5896b016001268c79fdbc21d7ef9,2025-02-27T14:15:34.783000
|
||||
CVE-2024-9334,0,0,f453d5c150390effbe6392cc4e6a0011770b5896b016001268c79fdbc21d7ef9,2025-02-27T14:15:34.783000
|
||||
CVE-2024-9341,0,0,5254cd0407dba4163e45bfc4ed2a071202e5ab922b5099bdcba8d28a558c1e38,2024-12-11T04:15:06.090000
|
||||
CVE-2024-9344,0,0,947aeadb28a081f51ccba5cfed355aa11f035786814ba0789ea30b60063bb469,2024-10-08T15:06:57.470000
|
||||
CVE-2024-9345,0,0,1092198f3341340c84b195f1fb0718cf68fae0e79a30c397da7978c7a50c2c5b,2024-10-08T16:10:17.567000
|
||||
@ -280224,6 +280234,7 @@ CVE-2025-0751,0,0,41447a1f62dc3ac9ecb88fcff2841f80e5cd50cbe7db83d66299a5c159c4b5
|
||||
CVE-2025-0752,0,0,de749aab58e2326cecf2e69cd47cb06af87bcedce5e0f5e8b795ca284455a6c7,2025-01-28T10:15:09.493000
|
||||
CVE-2025-0753,0,0,0664e041c345df85d53dfb2c47a778f67916ea16ed36ea2765a7ec7e7cbf7cd2,2025-01-27T21:15:13.653000
|
||||
CVE-2025-0754,0,0,01e22cbc27c23b2a20fc22b4b38925f42f70aba0e3cf26d239fd3f71faae49ca,2025-01-28T10:15:09.697000
|
||||
CVE-2025-0759,1,1,f572811706ba51744ee45129f48d6948c8d40f854e28ffb23f9648591608afb2,2025-02-27T15:15:40.603000
|
||||
CVE-2025-0760,0,0,41c51c3186d7c1d82dcf6c1e725fcfd59fdc585d73de4a715eb553b80d5dac62,2025-02-26T00:15:10.890000
|
||||
CVE-2025-0762,0,0,e4f54e0a8112ca4bbd93833150136d658b70b741ccb351b92cec93e89ce75210,2025-01-29T15:15:17.687000
|
||||
CVE-2025-0781,0,0,b187217e5320659130c2f954520571f906b51edbf3680129182cf06170507db1,2025-01-29T22:15:30.187000
|
||||
@ -280293,7 +280304,7 @@ CVE-2025-0881,0,0,c0b87ae49840b2495e4993b7143628de7aaa51e127538c05ffa700ec31c486
|
||||
CVE-2025-0882,0,0,b114ec462c06b6cb6e0f95f48a5ddf25603f5483375e39294eee648d47a7849f,2025-02-25T19:08:48.593000
|
||||
CVE-2025-0889,0,0,0629b7b02ac3b35a03999e70ad430e300216aa76950a072ad25c550e5da8658f,2025-02-26T08:13:09.050000
|
||||
CVE-2025-0890,0,0,68df14f89e9fe80a79d0a5c45e2ac7eb09be58559d3bae2cdceaf342154a05c6,2025-02-04T11:15:08.880000
|
||||
CVE-2025-0893,0,0,6db1785577b11d9c0f80255d5dcae1d7c0eabc239e3cf19e2ae2ac23422990f0,2025-02-19T18:15:24.127000
|
||||
CVE-2025-0893,0,1,9aeacb99190c595b48dfab12a1ef373316d1268f2ba3ec63739da944f1088a1b,2025-02-27T16:15:38.110000
|
||||
CVE-2025-0896,0,0,ecb21883de9b1361a3658cc48f44fdef2f626a3624bc2d70212f10094545a767,2025-02-13T02:15:29.470000
|
||||
CVE-2025-0897,0,0,17e8fee0d08c1e41eba72312a61f77d72e1199079fe8978f61db78a1602a3680,2025-02-25T20:40:15.277000
|
||||
CVE-2025-0899,0,0,d8701cd2c405f04761906304023370caa539e5fcf15c63a9325dc062ea45abed,2025-02-12T19:00:59.227000
|
||||
@ -280308,6 +280319,7 @@ CVE-2025-0908,0,0,d299598e6a9f28ce78543471bc7557b8f443bf108ba075d719a9c0a22f15b6
|
||||
CVE-2025-0909,0,0,1ff7d78519026d4b0df5324b5b84f781600c6266238b96b6e6fda4fafcd94e70,2025-02-12T18:59:31.043000
|
||||
CVE-2025-0910,0,0,5441c161f7257bb6355c09b7b0bb2df312d9b6c6d59e58e837649ec8c68777c9,2025-02-12T18:59:18.447000
|
||||
CVE-2025-0911,0,0,b9aa939093c00e0782e255aa47e49c2cf1d4559eb848b6a9c47f1e00b8bd8fad,2025-02-12T19:00:17
|
||||
CVE-2025-0914,1,1,6dd0aa1e476732eb696c5fa7b91292327e350a4e273c740c3850da13ddfe539c,2025-02-27T16:15:38.237000
|
||||
CVE-2025-0916,0,0,b3e2dfc1a782ae4e58fd745e6dc8ce9f3019ca5ca64e71e978c066cc4fb2d49f,2025-02-25T20:19:48.457000
|
||||
CVE-2025-0918,0,0,3a735425a74a1c0bbfdbd7a0fbcbdab0443a6b145783519e1d180e6751979379,2025-02-22T13:15:11.687000
|
||||
CVE-2025-0919,0,0,f3c40a8c3e9859b98dc4dbb233022019405b6bb3a32be39636bc5e978bd23a1b,2025-02-12T17:15:23.357000
|
||||
@ -280515,7 +280527,7 @@ CVE-2025-1239,0,0,6a31294ac2475a5f4cf013905a0ebd1264b78acdf12a9a65f2d79fa7affa22
|
||||
CVE-2025-1240,0,0,363ac0ec488e57d295d78c481b595c1c1507ba076f5813d8f4f20530988afa84,2025-02-11T22:15:29.800000
|
||||
CVE-2025-1243,0,0,cc81de32b5d05e39147da539415b77f22c0d2f7ae5860780f62e8e275e3c2c4c,2025-02-12T01:15:09.073000
|
||||
CVE-2025-1244,0,0,a597843e6aa6eb4c7c250951319b52c2666290fdc4f71a7756fc0b1cc4210c74,2025-02-27T11:15:12.050000
|
||||
CVE-2025-1247,0,1,29f4b020e3b05ec6e0daa3bc3acfe65ff38610a46609196b503d4e1e7958dbf1,2025-02-27T14:15:35.523000
|
||||
CVE-2025-1247,0,1,076ebdee060c0d22b647df1a0cc091510262713de157cf89796199eeb4b4a429,2025-02-27T16:15:38.390000
|
||||
CVE-2025-1249,0,0,93399ea1aab7846ff3005cc3013f42e420495dbd53698c66dd2894c536c541a3,2025-02-26T15:15:24.470000
|
||||
CVE-2025-1258,0,0,e60d49e74992453b0cd2d8b93f0bc7a60901e2447adb1d6d0cde7627e3bb44f5,2025-02-20T18:15:26.217000
|
||||
CVE-2025-1262,0,0,08f99db194238254f28713e2d46d598cdff03dede7f449d79e504f7931daff4e,2025-02-25T13:15:10.077000
|
||||
@ -280649,7 +280661,7 @@ CVE-2025-1617,0,0,f8b5d497942700d9485e4f9475a52f7ce71fe3f54483032059a95f27d690d0
|
||||
CVE-2025-1618,0,0,5653f37c834d7e927ebdf4835f8b4b2db1c30742d0495922546989d808169e24,2025-02-24T05:15:10.980000
|
||||
CVE-2025-1629,0,0,60983f0ba0e5f0b685c866a67c52df667d2bfe57a6c3421095271a3cf3a2da01,2025-02-24T05:15:11.280000
|
||||
CVE-2025-1632,0,0,e4d830f0038f1d0ec1a385180555c2b78df11cbe25ede30530c1c285ee3eb6b4,2025-02-24T15:15:13.217000
|
||||
CVE-2025-1634,0,1,b84319fa754bec4570231dc05c3084557d2efe0ac1489ee15c893f5e7d2a4ff4,2025-02-27T14:15:35.650000
|
||||
CVE-2025-1634,0,1,29f3957e0a85b3b8849afab5bb93f47350a7407e4de4941bc376da929d054d05,2025-02-27T16:15:38.500000
|
||||
CVE-2025-1640,0,0,c9144f1d36a671c5c294220717c102bbee784a06194946bddd82d757b17db602,2025-02-25T00:15:09.723000
|
||||
CVE-2025-1641,0,0,3e60680d02c32355c7c51637987e868a5b83b44bf51944f0dde54e34ed255aca,2025-02-25T00:15:09.913000
|
||||
CVE-2025-1642,0,0,eb1ad85c96cb940c08a5097dfefa119ff4b08ca6e6f0f41907372556779e3a83,2025-02-25T01:15:09.057000
|
||||
@ -280662,19 +280674,22 @@ CVE-2025-1673,0,0,65913cd1f473636c65413fc4e623a1696f83129720ac5b6275f0e5547e3994
|
||||
CVE-2025-1674,0,0,aea9658bbbdcb44450b6b18ac1c08e616d00c82d64dc8139e95057e3b44f7a8f,2025-02-25T08:15:29.887000
|
||||
CVE-2025-1675,0,0,919ba4e5330550da1b3bdc08ee6fe479b5b6b92bc2456a105e1c616b57e9b557,2025-02-25T08:15:30.020000
|
||||
CVE-2025-1676,0,0,73eee89d98e983375dedac852336dab7a9ecc8ee838aaa1b83c8304d12c3e6af,2025-02-25T14:15:31.447000
|
||||
CVE-2025-1686,0,0,f49e5f83c745c7a168547441c7be7e25329e3426cb9cf0c6f371fd736542e27e,2025-02-27T05:15:14.143000
|
||||
CVE-2025-1686,0,1,23cd3c40272d7a72f321820420241176eea8b3e5e43dac201a79181919492a5e,2025-02-27T15:15:40.940000
|
||||
CVE-2025-1689,0,0,1c00c32eaad5939943566023d14c1be06a7ba8ec73ab77384240a530eef75a6b,2025-02-27T07:15:35.400000
|
||||
CVE-2025-1690,0,0,b484cbf975316cdfffb848000f1942fa8662b09171f29f2f7abcd4816c9d0170,2025-02-27T09:15:10.697000
|
||||
CVE-2025-1691,1,1,6bb17ce0adfb4005455e7cd40fb4ea2452a50f070aac1aebbbeac4612b38c54b,2025-02-27T13:15:11.253000
|
||||
CVE-2025-1692,1,1,f19d2f3d51d6b58c4d2f95ef7b4b6cd1e259542d76210593d23c4537af12197b,2025-02-27T13:15:11.413000
|
||||
CVE-2025-1693,1,1,a0109cea3a1ec609b1e54b89e09375134f157dcaf9bb0b02d6ba359b475266be,2025-02-27T13:15:11.563000
|
||||
CVE-2025-1691,0,1,600bb411eade037a6bca0e2f6c1185000603b401d9b2d8d12d2fd4fd3e4354cb,2025-02-27T16:15:38.610000
|
||||
CVE-2025-1692,0,0,f19d2f3d51d6b58c4d2f95ef7b4b6cd1e259542d76210593d23c4537af12197b,2025-02-27T13:15:11.413000
|
||||
CVE-2025-1693,0,0,a0109cea3a1ec609b1e54b89e09375134f157dcaf9bb0b02d6ba359b475266be,2025-02-27T13:15:11.563000
|
||||
CVE-2025-1716,0,0,8a7e7768592d932d97a9d455845c05847d58dcca59512369f8a7ffd36f47bf6c,2025-02-26T15:15:24.653000
|
||||
CVE-2025-1717,0,0,b0c0ad726c8af064a3d2e1309a09d880998fbb19c4d5853e91430d93130f76bf,2025-02-27T08:15:31.130000
|
||||
CVE-2025-1726,0,0,9e943efd00091e453c109ba8e244c1de6e22713989bebe809d937c0962ed1af8,2025-02-26T20:15:13.510000
|
||||
CVE-2025-1728,0,0,126b29abd5a8b7142eab21be075a4425d5b9e0d4bb1eedd2c9477807954e2152,2025-02-26T22:15:14.333000
|
||||
CVE-2025-1738,1,1,5e1b2b2b1d4db3558f89d0488b29d771876500128261550d8395e9a1552dcb39,2025-02-27T13:15:11.720000
|
||||
CVE-2025-1739,1,1,474bd41a40b4d7e6fdfff026df5b08f6be7f300b56e56bcc0fdd145be437283a,2025-02-27T13:15:11.883000
|
||||
CVE-2025-1738,0,0,5e1b2b2b1d4db3558f89d0488b29d771876500128261550d8395e9a1552dcb39,2025-02-27T13:15:11.720000
|
||||
CVE-2025-1739,0,0,474bd41a40b4d7e6fdfff026df5b08f6be7f300b56e56bcc0fdd145be437283a,2025-02-27T13:15:11.883000
|
||||
CVE-2025-1741,1,1,344f7bc016a7178d5c4314a2e4d09672c42edf31aa2ee8b574916c55f2eebd7d,2025-02-27T16:15:38.930000
|
||||
CVE-2025-1751,0,0,e01d857b710fac9b7b6217b59ced116e365117c6a164f06207b3b6874d6bb32a,2025-02-27T12:15:35.030000
|
||||
CVE-2025-1755,1,1,022c1cdfb96f9a1d1782ea7a255dc456cf2cd5b57b21fa0b4b69f69925763fae,2025-02-27T16:15:39.137000
|
||||
CVE-2025-1756,1,1,20464066b464a87a383feb7ebdf7bcca2a5e74a3cb642d459cada04b2b771e8c,2025-02-27T16:15:39.287000
|
||||
CVE-2025-20014,0,0,9692e5cd581a413def58e50a6734c5a89401a76673de37fc6a41ad824a4429cc,2025-01-29T20:15:35.207000
|
||||
CVE-2025-20016,0,0,6fccb84eb01c2cd66b422e82777f9738bfe5004121e1b551d0ae454724543c0e,2025-01-14T10:15:07.500000
|
||||
CVE-2025-20029,0,0,9b8781ac9a16d1f4940e1c86f8d87c8f1f8e66cb5b362950b6fdcd60c25126c4,2025-02-05T18:15:29.573000
|
||||
@ -281232,7 +281247,7 @@ CVE-2025-21708,0,0,d933c334c327268dfe94797007314260d74aab59fc77728e72b8d8b7e7bbb
|
||||
CVE-2025-21709,0,0,566fb484d81c3d6984d7001ae650972c150e021d1439e30cdbdee6e879e9cae0,2025-02-27T02:15:14.560000
|
||||
CVE-2025-21710,0,0,caac5a8cd4f59a38798bb65050c056c6ac14dc33ba2554c9f9132c182247504c,2025-02-27T02:15:14.657000
|
||||
CVE-2025-21711,0,0,1ad137bce1c83de2777c91aff300be1d715180746549ec95097915a0e6f83f97,2025-02-27T02:15:14.760000
|
||||
CVE-2025-21712,0,1,0d2ee91f96988cef698a87645cfd8480b918f5263551051bca1f5bac6a7c256e,2025-02-27T13:15:12.043000
|
||||
CVE-2025-21712,0,0,0d2ee91f96988cef698a87645cfd8480b918f5263551051bca1f5bac6a7c256e,2025-02-27T13:15:12.043000
|
||||
CVE-2025-21713,0,0,c0471bfe099bcdf2eb9fbfdd85133612e7add0d99f327db2a3131e92e92f3a86,2025-02-27T02:15:14.960000
|
||||
CVE-2025-21714,0,0,0443c9d2a524f4163004ed6af8df0ace54b54c7c2169bb90bedac2c54123834a,2025-02-27T02:15:15.050000
|
||||
CVE-2025-21715,0,0,ab25a9824a2d6ca4a0cf91a33e78b3602f2fce2d0cd3fcd6725106a8eba7d908,2025-02-27T02:15:15.167000
|
||||
@ -281241,7 +281256,7 @@ CVE-2025-21717,0,0,7ca6cd69efbb56fd36ed628b74ce2e13274561c37d021271d3bfd71e8ee64
|
||||
CVE-2025-21718,0,0,5fb025932012588e486a67bbb8003b6c391d3e39000a93f80ecbca817adbd3c0,2025-02-27T02:15:15.473000
|
||||
CVE-2025-21719,0,0,157d53c5a8fa7b32509ec25adac9f4941a4f315dbe964473d128ebd5d2106061,2025-02-27T02:15:15.580000
|
||||
CVE-2025-21720,0,0,c2a7c6189229fd84b828b80d035a48cf5be9b44c4fdaaa3cb13d86df8037388f,2025-02-27T02:15:15.683000
|
||||
CVE-2025-21721,0,1,0f9bd98b6879198ba8cb006a744eda8143b70b9014761347ae9f9283e95be19a,2025-02-27T13:15:12.150000
|
||||
CVE-2025-21721,0,0,0f9bd98b6879198ba8cb006a744eda8143b70b9014761347ae9f9283e95be19a,2025-02-27T13:15:12.150000
|
||||
CVE-2025-21722,0,0,4ff28cbb7db6f566613f999667bae8e043c8ef362dbc89d551947bea584f4f92,2025-02-27T02:15:15.883000
|
||||
CVE-2025-21723,0,0,dae0449f384656e24d333a5692bdb0c67d65760a84aa08200fd65093c57cece1,2025-02-27T02:15:15.993000
|
||||
CVE-2025-21724,0,0,87af61e9bb904173709cf188d0701c3b5e1fc2fa500e06d42307eb73dd3567c4,2025-02-27T02:15:16.113000
|
||||
@ -281266,7 +281281,7 @@ CVE-2025-21742,0,0,51c376b8442050e3ecce4cd435613cc2fa3091d1d17189e7df759dc221b5a
|
||||
CVE-2025-21743,0,0,67d0f2265465e77221734c331d253f7fc354211b176cc2dca3ec8c8422af76a2,2025-02-27T03:15:14.933000
|
||||
CVE-2025-21744,0,0,47422ad751d060765f01a5efc42c50639eae4ea758b465c4063846c39e11c32c,2025-02-27T03:15:15.037000
|
||||
CVE-2025-21745,0,0,be9c70871a86f55f03e75d0139a528ae87f70bff7945ffa31b101fe624299975,2025-02-27T03:15:15.137000
|
||||
CVE-2025-21746,0,1,36306adb9a963e16a67d91ae9de437b5d52b2819ace643674f9f14e9d35e0c26,2025-02-27T13:15:12.240000
|
||||
CVE-2025-21746,0,0,36306adb9a963e16a67d91ae9de437b5d52b2819ace643674f9f14e9d35e0c26,2025-02-27T13:15:12.240000
|
||||
CVE-2025-21747,0,0,b4c7b8e9bbe08c3621e3d19d7432493cfeaae5b0fc274069a49e2619d118b55b,2025-02-27T03:15:15.337000
|
||||
CVE-2025-21748,0,0,3c89dfc075db5c3cfdcdd002206c2f3c37c4cb82a3a4b4823a2372ec53398649,2025-02-27T03:15:15.440000
|
||||
CVE-2025-21749,0,0,a7a8fa1c39a893df0dbcfcec02a053688ff8871d74d4e9c34c4774d7189b8c61,2025-02-27T03:15:15.543000
|
||||
@ -281365,7 +281380,7 @@ CVE-2025-22265,0,0,51006a5fb12dad2a881e7b25e5673794091472c79149c473510be2ae25b43
|
||||
CVE-2025-22267,0,0,f20afa71bc4d80e805bd92045ab58754dc4544d5a2500dd19c3f675f1704780a,2025-01-21T18:15:15.100000
|
||||
CVE-2025-22275,0,0,dc0905974c721b278910237158fbbf2db7a66a5bd4b529c9d9744ba0c53260f3,2025-01-03T07:15:25.297000
|
||||
CVE-2025-22276,0,0,5a96987c782440e555f7f8980bf83cb51411fc2fe9b353a8ca4c203659e7b960,2025-01-21T18:15:15.303000
|
||||
CVE-2025-22280,1,1,36b57de6430c09432b283d29b57dfb0829f9a3d1e3f25ed71ed6457697f2c437,2025-02-27T14:15:36.033000
|
||||
CVE-2025-22280,0,0,36b57de6430c09432b283d29b57dfb0829f9a3d1e3f25ed71ed6457697f2c437,2025-02-27T14:15:36.033000
|
||||
CVE-2025-22284,0,0,370c5c60e996c4b6559ca9bd6a1392b16df8aec67b8cecdd196304ea4ccbf961,2025-02-16T23:15:09.280000
|
||||
CVE-2025-22286,0,0,44135cef202ec1b1c9d4f0252ad614abd14631ba5cdbd8f36ca1d7fd4944fbe5,2025-02-16T23:15:09.427000
|
||||
CVE-2025-22289,0,0,c7670fed37bc75554b393a65a800a4550d1fe20759eceb18daee859ae095fb32,2025-02-16T23:15:09.567000
|
||||
@ -282927,6 +282942,14 @@ CVE-2025-25299,0,0,3b24acf1d2004d8b4c6aca494f2152b620141ac014e17849f142b2b49de11
|
||||
CVE-2025-25300,0,0,b7e8b6eadd3a124fef94cf4aa5497d00354ff8a753d773c320d25ce607eb8590,2025-02-18T19:15:28.957000
|
||||
CVE-2025-25304,0,0,788bdf6a18db5f968ef26eda5d9694e7483d0ff6e02996c3186ccc8ce04eb43e,2025-02-14T20:15:36.903000
|
||||
CVE-2025-25305,0,0,3bc54120ca4b8dd20d29c84d0022ea008e0f61f5bc4dbbe96dcffeee4c227201,2025-02-18T19:15:29.083000
|
||||
CVE-2025-25323,1,1,9d54f6ab903f7d667d98dd6d95d826ddc61bd41984daa807a0cea6e5a7b6672c,2025-02-27T16:15:39.637000
|
||||
CVE-2025-25324,1,1,7416fec2baed5a33bce83e714c820e6bbedabfbd40ca8cfcf862246456e22209,2025-02-27T16:15:39.760000
|
||||
CVE-2025-25325,1,1,c86828d940531de1f9ba9a0442c7b2c96402c4863bc6449fb0dd3ed1d3adb216,2025-02-27T16:15:39.870000
|
||||
CVE-2025-25326,1,1,955c851f345060263e9fe55f19172f235fd67cd8788d63ce6cc31b2512aba192,2025-02-27T16:15:39.987000
|
||||
CVE-2025-25330,1,1,0a92c33d73444ad205c8dff313935ffbef10654588ff371f4eadabd58b6898b2,2025-02-27T16:15:40.103000
|
||||
CVE-2025-25331,1,1,a7e1084033f53e04a790d37a366d6556d7807dba3d23cde5c9e0f882a523fe13,2025-02-27T16:15:40.217000
|
||||
CVE-2025-25333,1,1,362d6f3754ba1c2d14ca30e072a63aa1a54fd62201532f919863b8050dce3230,2025-02-27T16:15:40.350000
|
||||
CVE-2025-25334,1,1,09f902b448e0e9b7a4421fffc73864efaba3e065c215ef17ffb5bb8d88ce2adc,2025-02-27T16:15:40.463000
|
||||
CVE-2025-25343,0,0,58830c0cbe4e53f265b0e865057002c72f07a9ce6d9abf6a7103aa5f63054e04,2025-02-19T16:41:43.887000
|
||||
CVE-2025-25349,0,0,7493ec8dd478515c80e3ecdac0113c1e149e92926bb9c4a90d85a8a01928eead,2025-02-14T19:34:31.553000
|
||||
CVE-2025-25351,0,0,9b264106d1e8d6ffeef659bdf79e22896d03641eb6839ed6f4bc0ff6168f9910,2025-02-14T19:35:39.130000
|
||||
@ -282987,6 +283010,9 @@ CVE-2025-25743,0,0,65b470adc61c7865b16e040e95e97b019f65181411fb698ca491a4d95f9cd
|
||||
CVE-2025-25744,0,0,a94e293e8b090a3f233edd8811f540b50467cbc536ca78f870a52d5731bb3874,2025-02-19T19:02:27.687000
|
||||
CVE-2025-25745,0,0,406fa6a59b9bdf024e304acfed3b72076652d04111e85cc18e48015ad28192dc,2025-02-14T16:15:37.010000
|
||||
CVE-2025-25746,0,0,cbf058e2dc9833cb4adeac1d2f404166a61c0d96a6ad617dde3893fa4bf6a37d,2025-02-24T16:30:37.200000
|
||||
CVE-2025-25759,1,1,eedffb45bd3b6e8e3e4f7d5d57adbf8c32c90ef403acf0429d900a41830cc9e5,2025-02-27T15:15:41.570000
|
||||
CVE-2025-25760,1,1,752e75e8976bad389f88ae42af50744da8580d603ec5c4bae3b9d4093e299438,2025-02-27T15:15:41.670000
|
||||
CVE-2025-25761,1,1,bf44ae5b1d350bd64453566ef4089fefa067d963f3b003ec61f95240aa53b128,2025-02-27T15:15:41.777000
|
||||
CVE-2025-25765,0,0,3adfd18b0523627b6799d8f3fe18ae9718bbe1da9964013c36335171c37fde7a,2025-02-21T18:16:12.420000
|
||||
CVE-2025-25766,0,0,57af4b18309fbf59a64f83f90aab5cd3bfbe39741914f4dbb52a684f7edb326e,2025-02-21T18:16:12.647000
|
||||
CVE-2025-25767,0,0,65da93516558bfe81b43fcd0adbd639aa009f9a52ab8537bd361623a21370b60,2025-02-21T19:15:14.253000
|
||||
@ -283313,7 +283339,7 @@ CVE-2025-27144,0,0,1943a5ebc9fa4ebdac773d12aa5884bfb6e27a53701e1ad9e8e73a5ce013e
|
||||
CVE-2025-27145,0,0,38c5004ff48d2670f12fb99a3982f3e02a12208e5ab880775c9f41ae19934057,2025-02-25T14:15:31.567000
|
||||
CVE-2025-27146,0,0,1949c93bb4c1257d1700888fb7aa70bba73c2053b702350dbd7e6c46a590f25c,2025-02-25T20:15:38.030000
|
||||
CVE-2025-27148,0,0,5163b56718d84c64a6427ae7a494a2fc79bb8ffbfb0430ce497f1576aee3262b,2025-02-25T21:15:18.073000
|
||||
CVE-2025-27154,1,1,b16b780bdbace94e9ec6c7dea1fe2169cd03d4b06f255988b7df51a8bfc9aad3,2025-02-27T14:15:36.180000
|
||||
CVE-2025-27154,0,1,53a6480a35165b490ac534e1504555080f684ed1444ce4f625bdb4de17643976,2025-02-27T15:15:41.937000
|
||||
CVE-2025-27218,0,0,efa55c2dc9300fcbe5554c514f0fd9c100e33cfb72ff20b2eedb0bf35dee5b0b,2025-02-20T21:15:26.510000
|
||||
CVE-2025-27265,0,0,f92ef224928c265ed828ba40cf1c61290404ad79163953c8c2df56f81d7b8ab6,2025-02-24T15:15:14.310000
|
||||
CVE-2025-27266,0,0,7b4f333de7657eb474765345c5822ee79cdee853af3b515f2a266de5b5a75147,2025-02-24T15:15:14.443000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user