mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-06 02:32:40 +00:00
Auto-Update: 2025-03-03T19:00:20.497556+00:00
This commit is contained in:
parent
1f1e0113d4
commit
7187c85313
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-47165",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-03-25T10:15:08.620",
|
||||
"lastModified": "2024-11-21T06:35:32.130",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-03-03T17:33:19.643",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,55 +15,188 @@
|
||||
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: drm/meson: corrige el fallo de apagado cuando el componente no se prueba Cuando el componente principal no se prueba, por ejemplo, cuando el m\u00f3dulo dw-hdmi a\u00fan no est\u00e1 cargado o en el aplazamiento de la prueba, se produce el siguiente fallo aparece al apagar: No se puede manejar la desreferencia del puntero NULL del kernel en la direcci\u00f3n virtual 0000000000000038... pc: meson_drv_shutdown+0x24/0x50 lr: platform_drv_shutdown+0x20/0x30... Rastreo de llamadas: meson_drv_shutdown+0x24/0x50 platform_drv_shutdown+0x20/0x3 0 dispositivo_apagado+ 0x158/0x360 kernel_restart_prepare+0x38/0x48 kernel_restart+0x18/0x68 __do_sys_reboot+0x224/0x250 __arm64_sys_reboot+0x24/0x30... Simplemente verifique si la estructura priv se ha asignado antes de usarla."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-476"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.14.226",
|
||||
"versionEndExcluding": "4.14.235",
|
||||
"matchCriteriaId": "A07A64EB-4EF7-4E9B-B9FF-644C696B0956"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.19.181",
|
||||
"versionEndExcluding": "4.19.193",
|
||||
"matchCriteriaId": "91721D26-39B5-40A4-A968-A31040F12DD0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.4.106",
|
||||
"versionEndExcluding": "5.4.124",
|
||||
"matchCriteriaId": "B2A93BFA-D696-43D4-9C26-B767EEAFCF3F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.10.24",
|
||||
"versionEndExcluding": "5.10.42",
|
||||
"matchCriteriaId": "59C0E6BA-30A4-474C-B391-98594A614B32"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.12",
|
||||
"versionEndExcluding": "5.12.9",
|
||||
"matchCriteriaId": "3B1CFA77-6B5E-430C-AC49-3B3508F2D903"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0CBAD0FC-C281-4666-AB2F-F8E6E1165DF7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "96AC23B2-D46A-49D9-8203-8E1BEDCA8532"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DA610E30-717C-4700-9F77-A3C9244F3BFD"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/4ce2bf20b4a6e307e114847d60b2bf40a6a1fac0",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/7cfc4ea78fc103ea51ecbacd9236abb5b1c490d2",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/b4298d33c1fcce511ffe84d8d3de07e220300f9b",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/b4b91033a0b11fe9ade58156cd9168f89f4a8c1a",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/d66083c0d6f5125a4d982aa177dd71ab4cd3d212",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/e256a0eb43e17209e347409a80805b1659398d68",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/4ce2bf20b4a6e307e114847d60b2bf40a6a1fac0",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/7cfc4ea78fc103ea51ecbacd9236abb5b1c490d2",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/b4298d33c1fcce511ffe84d8d3de07e220300f9b",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/b4b91033a0b11fe9ade58156cd9168f89f4a8c1a",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/d66083c0d6f5125a4d982aa177dd71ab4cd3d212",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/e256a0eb43e17209e347409a80805b1659398d68",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-47169",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-03-25T10:15:08.820",
|
||||
"lastModified": "2024-11-21T06:35:32.660",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-03-03T17:33:19.643",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,71 +15,229 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: serial: rp2: use 'request_firmware' en lugar de 'request_firmware_nowait' En 'rp2_probe', el controlador registra 'rp2_uart_interrupt' y luego llama a 'rp2_fw_cb' a trav\u00e9s de 'request_firmware_nowait'. En 'rp2_fw_cb', si el firmware no existe, la funci\u00f3n simplemente regresa sin inicializar los puertos de 'rp2_card'. Pero ahora la funci\u00f3n de manejo de interrupciones ha sido registrada, y cuando llega una interrupci\u00f3n, 'rp2_uart_interrupt' puede acceder a esos puertos y causar desreferencia al puntero NULL u otros errores. Debido a que el controlador realiza alg\u00fan trabajo de inicializaci\u00f3n en 'rp2_fw_cb', para que el controlador est\u00e9 listo para manejar interrupciones, se debe usar 'request_firmware' en lugar de 'request_firmware_nowait' as\u00edncrono. Este informe lo revela: INFORMACI\u00d3N: intentando registrar una clave no est\u00e1tica. el c\u00f3digo est\u00e1 bien pero necesita una anotaci\u00f3n de bloqueo. apagando el validador de correcci\u00f3n de bloqueo. CPU: 2 PID: 0 Comunicaciones: swapper/2 No contaminado 4.19.177-gdba4159c14ef-dirty #45 Nombre del hardware: PC est\u00e1ndar QEMU (Q35 + ICH9, 2009), BIOS rel-1.12.0-59- gc9ba5276e321-prebuilt.qemu .org 01/04/2014 Seguimiento de llamadas: __dump_stack lib/dump_stack.c:77 [en l\u00ednea] dump_stack+0xec/0x156 lib/dump_stack.c:118 asignar_lock_key kernel/locking/lockdep.c:727 [en l\u00ednea] Register_lock_class +0x14e5/0x1ba0 kernel/locking/lockdep.c:753 __lock_acquire+0x187/0x3750 kernel/locking/lockdep.c:3303 lock_acquire+0x124/0x340 kernel/locking/lockdep.c:3907 __raw_spin_lock include/linux/spinlock_api_smp.h: 142 [en l\u00ednea] _raw_spin_lock+0x32/0x50 kernel/locking/spinlock.c:144 spin_lock include/linux/spinlock.h:329 [en l\u00ednea] rp2_ch_interrupt drivers/tty/serial/rp2.c:466 [en l\u00ednea] rp2_asic_interrupt.isra. 9+0x15d/0x990 controladores/tty/serial/rp2.c:493 rp2_uart_interrupt+0x49/0xe0 controladores/tty/serial/rp2.c:504 __handle_irq_event_percpu+0xfb/0x770 kernel/irq/handle.c:149 handle_irq_event_percpu+0x79/ 0x150 kernel/irq/handle.c:189 handle_irq_event+0xac/0x140 kernel/irq/handle.c:206 handle_fasteoi_irq+0x232/0x5c0 kernel/irq/chip.c:725 generic_handle_irq_desc include/linux/irqdesc.h:155 [en l\u00ednea ] handle_irq+0x230/0x3a0 arch/x86/kernel/irq_64.c:87 do_IRQ+0xa7/0x1e0 arch/x86/kernel/irq.c:247 common_interrupt+0xf/0xf arch/x86/entry/entry_64.S:670 < /IRQ> RIP: 0010:native_safe_halt+0x28/0x30 arch/x86/include/asm/irqflags.h:61 C\u00f3digo: 00 00 55 be 04 00 00 00 48 c7 c7 00 c2 2f 8c 48 89 e5 e8 fb 31 e7 f8 8b 05 75 af 8d 03 85 c0 7e 07 0f 00 2d 8a 61 65 00 fb f4 <5d> c3 90 90 90 90 90 90 0f 1f 44 00 00 55 48 89 e5 41 57 41 56 41 RSP: 00 18:ffff88806b71fcc8 EF BANDERAS: 00000246 ORIG_RAX: ffffffffffffffde RAX: 0000000000000000 RBX: ffffffff8bde7e48 RCX: ffffffff88a21285 RDX: 00000000000000000 RSI: 00000000000000004 RDI: ffffff ff8c2fc200 RBP: ffff88806b71fcc8 R08: ffffbfff185f840 R09: ffffbfff185f840 R10: 00000000000000001 R11: ffffbfff185f840 R12: 0000000000000002 R13: ff ffffff8bea18a0 R14: 0000000000000000 R15: 0000000000000000 arch_safe_halt arch/x86/include/asm/paravirt.h:94 [en l\u00ednea] default_idle+0x6f/0x360 arch/x86/kernel/process.c:557 arch_cpu_idle+0xf/0x20 arch/x86/kernel/process.c:548 default_idle_call+ 0x3b/0x60 kernel/sched/idle.c:93 cpuidle_idle_call kernel/sched/idle.c:153 [en l\u00ednea] do_idle+0x2ab/0x3c0 kernel/sched/idle.c:263 cpu_startup_entry+0xcb/0xe0 kernel/sched/idle. c:369 start_secondary+0x3b8/0x4e0 arch/x86/kernel/smpboot.c:271 second_startup_64+0xa4/0xb0 arch/x86/kernel/head_64.S:243 ERROR: no se puede manejar la desreferencia del puntero NULL del kernel en 00000000000000010 PGD 8000000056d270 67 P4D 8000000056d27067 PUD 56d28067 PMD 0 Ups: 0000 [#1] PREEMPT SMP KASAN PTI CPU: 2 PID: 0 Comm: swapper/2 No contaminado 4.19.177-gdba4159c14ef-dirty #45 Nombre de hardware: PC est\u00e1ndar QEMU (Q35 + ICH9, 2009) , BIOS rel-1.12.0-59- gc9ba5276e321-prebuilt.qemu.org 01/04/2014 ---truncado---"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-476"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "4.4.271",
|
||||
"matchCriteriaId": "3B637FF8-3372-4BEA-89EE-EC94A37C4E6B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.5",
|
||||
"versionEndExcluding": "4.9.271",
|
||||
"matchCriteriaId": "1E7DAE3A-78E9-45DB-96D8-4541CD7DC26B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.10",
|
||||
"versionEndExcluding": "4.14.235",
|
||||
"matchCriteriaId": "03A23445-0C1A-42AB-AC5C-768360DDF32C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.15",
|
||||
"versionEndExcluding": "4.19.193",
|
||||
"matchCriteriaId": "C8DEF3EC-88D9-4B89-8CF9-64BD6C863C9D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.20",
|
||||
"versionEndExcluding": "5.4.124",
|
||||
"matchCriteriaId": "06FE0F99-F7A9-462A-8355-30E2EDA9826B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.5",
|
||||
"versionEndExcluding": "5.10.42",
|
||||
"matchCriteriaId": "C3E7E799-1C8A-45FB-9E07-4731996144C9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.11",
|
||||
"versionEndExcluding": "5.12.9",
|
||||
"matchCriteriaId": "2C8A1D02-81A7-44E5-ACFD-CC6A6694F930"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0CBAD0FC-C281-4666-AB2F-F8E6E1165DF7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "96AC23B2-D46A-49D9-8203-8E1BEDCA8532"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DA610E30-717C-4700-9F77-A3C9244F3BFD"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/016002848c82eeb5d460489ce392d91fe18c475c",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/1cc57cb32c84e059bd158494f746b665fc14d1b1",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/1e04d5d5fe5e76af68f834e1941fcbfa439653be",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/35265552c7fe9553c75e324c80f45e28ff14eb6e",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/6a931ceb0b9401fe18d0c500e08164bf9cc7be4b",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/915452f40e2f495e187276c4407a4f567ec2307e",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/9b07b6973f7359e2dd6a9fe6db0c142634c823b7",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/c697244ce940ec07e2d745ccb63ca97fc0266fbc",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/016002848c82eeb5d460489ce392d91fe18c475c",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/1cc57cb32c84e059bd158494f746b665fc14d1b1",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/1e04d5d5fe5e76af68f834e1941fcbfa439653be",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/35265552c7fe9553c75e324c80f45e28ff14eb6e",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/6a931ceb0b9401fe18d0c500e08164bf9cc7be4b",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/915452f40e2f495e187276c4407a4f567ec2307e",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/9b07b6973f7359e2dd6a9fe6db0c142634c823b7",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/c697244ce940ec07e2d745ccb63ca97fc0266fbc",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-26076",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-03-13T15:15:12.720",
|
||||
"lastModified": "2024-11-21T07:50:44.053",
|
||||
"lastModified": "2025-03-03T18:15:27.330",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -65,6 +65,16 @@
|
||||
"value": "CWE-120"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-120"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-27010",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-03-13T19:15:22.617",
|
||||
"lastModified": "2024-11-21T07:52:10.720",
|
||||
"lastModified": "2025-03-03T17:15:10.880",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "NVD-CWE-Other"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-250"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
21
CVE-2023/CVE-2023-490xx/CVE-2023-49031.json
Normal file
21
CVE-2023/CVE-2023-490xx/CVE-2023-49031.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2023-49031",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-03-03T18:15:28.330",
|
||||
"lastModified": "2025-03-03T18:15:28.330",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Directory Traversal (Local File Inclusion) vulnerability in Tikit (now Advanced) eMarketing platform 6.8.3.0 allows a remote attacker to read arbitrary files and obtain sensitive information via a crafted payload to the filename parameter to the OpenLogFile endpoint."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Yoshik0xF6/CVE-2023-49031",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-49257",
|
||||
"sourceIdentifier": "cvd@cert.pl",
|
||||
"published": "2024-01-12T15:15:09.230",
|
||||
"lastModified": "2024-11-21T08:33:08.160",
|
||||
"lastModified": "2025-03-03T18:15:28.480",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -46,7 +46,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-434"
|
||||
"value": "CWE-732"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2023-4997",
|
||||
"sourceIdentifier": "cvd@cert.pl",
|
||||
"published": "2023-10-04T11:15:10.563",
|
||||
"lastModified": "2024-11-21T08:36:25.793",
|
||||
"lastModified": "2025-03-03T17:15:11.153",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper authorisation of regular users in ProIntegra Uptime DC software (versions below 2.0.0.33940) allows them to change passwords of all other users including administrators leading to a privilege escalation.\n"
|
||||
"value": "Improper authorisation of regular users in ProIntegra Uptime DC software (versions below 2.0.0.33940) allows them to change passwords of all other users including administrators leading to a privilege escalation."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -66,7 +66,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
"value": "CWE-863"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-13153",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2025-01-09T09:15:07.243",
|
||||
"lastModified": "2025-01-09T09:15:07.243",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-03-03T17:42:59.740",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -19,7 +19,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -51,18 +71,45 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:unlimited-elements:unlimited_elements_for_elementor:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "1.5.136",
|
||||
"matchCriteriaId": "5CF0B5B2-9695-4A01-A4B8-3C476C64A88D"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://unlimited-elements.com/change-log/",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://wordpress.org/plugins/unlimited-elements-for-elementor/#developers",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/99625a3e-b8a4-42f8-8996-f7c5c0ff2d5f?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-24778",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2025-03-03T11:15:11.113",
|
||||
"lastModified": "2025-03-03T15:15:14.323",
|
||||
"lastModified": "2025-03-03T18:15:28.933",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -51,6 +51,10 @@
|
||||
{
|
||||
"url": "https://lists.apache.org/thread/j14w6wghlwwrgfgc6hoz9f94fwxtlgzh",
|
||||
"source": "security@apache.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2025/03/03/1",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-2515",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-03-16T09:15:07.417",
|
||||
"lastModified": "2024-11-21T09:09:55.143",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-03-03T16:40:55.250",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -76,30 +96,69 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:magesh-k21:online-college-event-hall-reservation-system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "02B406BB-6ED0-4CC0-B1A1-AE670E825BF1"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/MAGESH-K21%20%20Online-College-Event-Hall-Reservation-System/Reflected%20XSS%20-%20home.php.md",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.256952",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.256952",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/MAGESH-K21%20%20Online-College-Event-Hall-Reservation-System/Reflected%20XSS%20-%20home.php.md",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.256952",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.256952",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-2516",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-03-16T12:15:14.363",
|
||||
"lastModified": "2024-11-21T09:09:55.273",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-03-03T16:40:55.250",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -76,30 +96,69 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:magesh-k21:online-college-event-hall-reservation-system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "02B406BB-6ED0-4CC0-B1A1-AE670E825BF1"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/MAGESH-K21%20%20Online-College-Event-Hall-Reservation-System/Blind%20SQL%20Injection%20-%20home.php.md",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.256953",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.256953",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/MAGESH-K21%20%20Online-College-Event-Hall-Reservation-System/Blind%20SQL%20Injection%20-%20home.php.md",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.256953",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.256953",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-2532",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-03-16T22:15:07.613",
|
||||
"lastModified": "2024-11-21T09:09:57.453",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-03-03T16:40:55.250",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -76,30 +96,69 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:magesh-k21:online-college-event-hall-reservation-system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "02B406BB-6ED0-4CC0-B1A1-AE670E825BF1"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/MAGESH-K21%20%20Online-College-Event-Hall-Reservation-System/SQL%20Injection%20-%20update-users.php.md",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.256969",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.256969",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/MAGESH-K21%20%20Online-College-Event-Hall-Reservation-System/SQL%20Injection%20-%20update-users.php.md",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.256969",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.256969",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -3,7 +3,7 @@
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-03-17T01:15:50.107",
|
||||
"lastModified": "2025-03-03T16:40:55.250",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -42,19 +42,19 @@
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 5.4,
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
],
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-26632",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-03-18T11:15:09.697",
|
||||
"lastModified": "2024-11-21T09:02:43.700",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-03-03T17:33:19.643",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,39 +15,131 @@
|
||||
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: bloque: corrige la iteraci\u00f3n sobre una biograf\u00eda vac\u00eda con bio_for_each_folio_all Si la biograf\u00eda no contiene datos, bio_first_folio() llama a page_folio() en un puntero NULL y \u00a1vaya! Mueve la prueba de que hemos llegado al final de la biograf\u00eda de bio_next_folio() a bio_first_folio(). [axboe: agregue improbable() al caso de error]"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-476"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.17",
|
||||
"versionEndExcluding": "6.1.75",
|
||||
"matchCriteriaId": "DB5C8DA6-49C9-4423-ACFE-969306B07B9E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.2",
|
||||
"versionEndExcluding": "6.6.14",
|
||||
"matchCriteriaId": "5C6B50A6-3D8B-4CE2-BDCC-A098609CBA14"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.7",
|
||||
"versionEndExcluding": "6.7.2",
|
||||
"matchCriteriaId": "7229C448-E0C9-488B-8939-36BA5254065E"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/7bed6f3d08b7af27b7015da8dc3acf2b9c1f21d7",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/a6bd8182137a12d22d3f2cee463271bdcb491659",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/c6350b5cb78e9024c49eaee6fdb914ad2903a5fe",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/ca3ede3f5893e2d26d4dbdef1eec28a8487fafde",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/7bed6f3d08b7af27b7015da8dc3acf2b9c1f21d7",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/a6bd8182137a12d22d3f2cee463271bdcb491659",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/c6350b5cb78e9024c49eaee6fdb914ad2903a5fe",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/ca3ede3f5893e2d26d4dbdef1eec28a8487fafde",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-26660",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-04-02T07:15:43.053",
|
||||
"lastModified": "2024-11-21T09:02:47.193",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-03-03T17:33:19.643",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,47 +15,167 @@
|
||||
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: drm/amd/display: implementar la verificaci\u00f3n de los l\u00edmites para la creaci\u00f3n del codificador de flujo en la matriz DCN301 'stream_enc_regs' es una matriz de estructuras dcn10_stream_enc_registers. La matriz se inicializa con cuatro elementos, correspondientes a las cuatro llamadas a stream_enc_regs() en el inicializador de la matriz. Esto significa que los \u00edndices v\u00e1lidos para esta matriz son 0, 1, 2 y 3. El mensaje de error 'stream_enc_regs' 4 <= 5 a continuaci\u00f3n indica que hay un intento de acceder a esta matriz con un \u00edndice de 5, que no est\u00e1 disponible. de los l\u00edmites. Esto podr\u00eda provocar un comportamiento indefinido. Aqu\u00ed, eng_id se utiliza como \u00edndice para acceder a la matriz stream_enc_regs. Si eng_id es 5, esto dar\u00eda como resultado un acceso fuera de los l\u00edmites en la matriz stream_enc_regs. Solucionando as\u00ed el error de desbordamiento de b\u00fafer en dcn301_stream_encoder_create informado por Smatch: drivers/gpu/drm/amd/amdgpu/../display/dc/resource/dcn301/dcn301_resource.c:1011 dcn301_stream_encoder_create() error: desbordamiento de b\u00fafer 'stream_enc_regs' 4 <= 5"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-125"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.11",
|
||||
"versionEndExcluding": "5.15.149",
|
||||
"matchCriteriaId": "0D0465BB-4053-4E15-9137-6696EBAE90FD"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.16",
|
||||
"versionEndExcluding": "6.1.78",
|
||||
"matchCriteriaId": "26190115-BC0C-4106-9408-E7928FE5DA62"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.2",
|
||||
"versionEndExcluding": "6.6.17",
|
||||
"matchCriteriaId": "73F8C6ED-5A0B-4B25-8FA9-AF916A9C8F0B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.7",
|
||||
"versionEndExcluding": "6.7.5",
|
||||
"matchCriteriaId": "01925741-2C95-47C1-A7EA-3DC2BB0012D3"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B9F4EA73-0894-400F-A490-3A397AB7A517"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "056BD938-0A27-4569-B391-30578B309EE3"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F02056A5-B362-4370-9FF8-6F0BD384D520"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/42442f74314d41ddc68227047036fa3e78940054",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/58fca355ad37dcb5f785d9095db5f748b79c5dc2",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/a938eab9586eea31cfd129a507f552efae14d738",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/cd9bd10c59e3c1446680514fd3097c5b00d3712d",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/efdd665ce1a1634b8c1dad5e7f6baaef3e131d0a",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/42442f74314d41ddc68227047036fa3e78940054",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/58fca355ad37dcb5f785d9095db5f748b79c5dc2",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/a938eab9586eea31cfd129a507f552efae14d738",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/cd9bd10c59e3c1446680514fd3097c5b00d3712d",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/efdd665ce1a1634b8c1dad5e7f6baaef3e131d0a",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-26665",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-04-02T07:15:43.430",
|
||||
"lastModified": "2024-11-21T09:02:47.933",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-03-03T17:33:19.643",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,59 +15,210 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: t\u00faneles: corrige el acceso fuera de los l\u00edmites al compilar el error IPv6 PMTU Si el error ICMPv6 se genera a partir de un skb no lineal, obtenemos el siguiente s\u00edmbolo, ERROR: KASAN: slab-out- fuera de los l\u00edmites en do_csum+0x220/0x240 Lectura de tama\u00f1o 4 en la direcci\u00f3n ffff88811d402c80 por tarea netperf/820 CPU: 0 PID: 820 Comm: netperf Not tainted 6.8.0-rc1+ #543 ... kasan_report+0xd8/0x110 do_csum+0x220 /0x240 csum_partial+0xc/0x20 skb_tunnel_check_pmtu+0xeb9/0x3280 vxlan_xmit_one+0x14c2/0x4080 vxlan_xmit+0xf61/0x5c00 dev_hard_start_xmit+0xfb/0x510 __dev_queue_xmit+0x7cd/0x32 a0 br_dev_queue_push_xmit+0x39d/0x6a0 Utilice skb_checksum en lugar de csum_partial, que no puede manejar SKB no lineales."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-125"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.9",
|
||||
"versionEndExcluding": "5.10.210",
|
||||
"matchCriteriaId": "393FFD59-45A0-4C2A-A547-8B90CE3BBAA1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.11",
|
||||
"versionEndExcluding": "5.15.149",
|
||||
"matchCriteriaId": "0D0465BB-4053-4E15-9137-6696EBAE90FD"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.16",
|
||||
"versionEndExcluding": "6.1.78",
|
||||
"matchCriteriaId": "26190115-BC0C-4106-9408-E7928FE5DA62"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.2",
|
||||
"versionEndExcluding": "6.6.17",
|
||||
"matchCriteriaId": "73F8C6ED-5A0B-4B25-8FA9-AF916A9C8F0B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.7",
|
||||
"versionEndExcluding": "6.7.5",
|
||||
"matchCriteriaId": "01925741-2C95-47C1-A7EA-3DC2BB0012D3"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B9F4EA73-0894-400F-A490-3A397AB7A517"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "056BD938-0A27-4569-B391-30578B309EE3"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F02056A5-B362-4370-9FF8-6F0BD384D520"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/510c869ffa4068c5f19ff4df51d1e2f3a30aaac1",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/7dc9feb8b1705cf00de20563b6bc4831f4c99dab",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/d75abeec401f8c86b470e7028a13fcdc87e5dd06",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/d964dd1bc1452594b4207d9229c157d9386e5d8a",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/e37cde7a5716466ff2a76f7f27f0a29b05b9a732",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/e77bf828f1ca1c47fcff58bdc26b60a9d3dfbe1d",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/510c869ffa4068c5f19ff4df51d1e2f3a30aaac1",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/7dc9feb8b1705cf00de20563b6bc4831f4c99dab",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/d75abeec401f8c86b470e7028a13fcdc87e5dd06",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/d964dd1bc1452594b4207d9229c157d9386e5d8a",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/e37cde7a5716466ff2a76f7f27f0a29b05b9a732",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/e77bf828f1ca1c47fcff58bdc26b60a9d3dfbe1d",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-26760",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-04-03T17:15:52.367",
|
||||
"lastModified": "2024-11-21T09:03:00.647",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-03-03T17:33:19.643",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,39 +15,156 @@
|
||||
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: scsi: target: pscsi: corrige bio_put() para el caso de error A partir del commit 066ff571011d (\"bloque: convierte bio_kmalloc en un contenedor kmalloc simple\"), una biograf\u00eda asignada por bio_kmalloc() debe ser liberado por bio_uninit() y kfree(). Esto no se hace correctamente en el caso de error, al presionar WARN y desreferenciar el puntero NULL en bio_free()."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-476"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.19",
|
||||
"versionEndExcluding": "6.1.80",
|
||||
"matchCriteriaId": "6C87F3F9-DEA3-4634-9011-9F66B4796842"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.2",
|
||||
"versionEndExcluding": "6.6.19",
|
||||
"matchCriteriaId": "8D82004C-B2AE-4048-9344-32EFF65953B0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.7",
|
||||
"versionEndExcluding": "6.7.7",
|
||||
"matchCriteriaId": "575EE16B-67F2-4B5B-B5F8-1877715C898B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B9F4EA73-0894-400F-A490-3A397AB7A517"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "056BD938-0A27-4569-B391-30578B309EE3"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F02056A5-B362-4370-9FF8-6F0BD384D520"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc4:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "62075ACE-B2A0-4B16-829D-B3DA5AE5CC41"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc5:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A780F817-2A77-4130-A9B7-5C25606314E3"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/1cfe9489fb563e9a0c9cdc5ca68257a44428c2ec",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/4ebc079f0c7dcda1270843ab0f38ab4edb8f7921",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/de959094eb2197636f7c803af0943cb9d3b35804",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/f49b20fd0134da84a6bd8108f9e73c077b7d6231",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/1cfe9489fb563e9a0c9cdc5ca68257a44428c2ec",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/4ebc079f0c7dcda1270843ab0f38ab4edb8f7921",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/de959094eb2197636f7c803af0943cb9d3b35804",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/f49b20fd0134da84a6bd8108f9e73c077b7d6231",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-27859",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-02-10T19:15:37.737",
|
||||
"lastModified": "2025-02-18T19:15:15.473",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-03-03T16:52:20.953",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,27 +15,125 @@
|
||||
"value": "El problema se solucion\u00f3 mejorando la gesti\u00f3n de la memoria. Este problema se solucion\u00f3 en iOS 17.4 y iPadOS 17.4, tvOS 17.4, watchOS 10.4, visionOS 1.1 y macOS Sonoma 14.4. El procesamiento de contenido web puede provocar la ejecuci\u00f3n de c\u00f3digo arbitrario."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "17.4",
|
||||
"matchCriteriaId": "CCCC6AF9-4EFA-4A45-888B-93C0C1327BC7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "17.4",
|
||||
"matchCriteriaId": "BCB4911E-7824-4C34-916D-88110CB415EB"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "14.4",
|
||||
"matchCriteriaId": "58227FD1-0619-45F6-AD19-25831899376A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "17.4",
|
||||
"matchCriteriaId": "BB6BA6CB-001B-4440-A9AE-473F5722F8E0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "1.1",
|
||||
"matchCriteriaId": "EB7F6CDA-FEC0-45D7-ACBE-8B5AD35F1AB5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.4",
|
||||
"matchCriteriaId": "5547F484-4E4B-4961-BAF8-F891D50BB4B6"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/120881",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/120882",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/120883",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/120893",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/120895",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2024/CVE-2024-457xx/CVE-2024-45778.json
Normal file
60
CVE-2024/CVE-2024-457xx/CVE-2024-45778.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-45778",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2025-03-03T17:15:12.700",
|
||||
"lastModified": "2025-03-03T17:15:12.700",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A stack overflow flaw was found when reading a BFS file system. A crafted BFS filesystem may lead to an uncontrolled loop, causing grub2 to crash."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "secalert@redhat.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 4.1,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 0.5,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "secalert@redhat.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-190"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2024-45778",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2345640",
|
||||
"source": "secalert@redhat.com"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2024/CVE-2024-457xx/CVE-2024-45782.json
Normal file
60
CVE-2024/CVE-2024-457xx/CVE-2024-45782.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-45782",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2025-03-03T17:15:12.900",
|
||||
"lastModified": "2025-03-03T17:15:12.900",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A flaw was found in the HFS filesystem. When reading an HFS volume's name at grub_fs_mount(), the HFS filesystem driver performs a strcpy() using the user-provided volume name as input without properly validating the volume name's length. This issue may read to a heap-based out-of-bounds writer, impacting grub's sensitive data integrity and eventually leading to a secure boot protection bypass."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "secalert@redhat.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 6.7,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "secalert@redhat.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-120"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2024-45782",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2345858",
|
||||
"source": "secalert@redhat.com"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-510xx/CVE-2024-51091.json
Normal file
21
CVE-2024/CVE-2024-510xx/CVE-2024-51091.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-51091",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-03-03T18:15:29.523",
|
||||
"lastModified": "2025-03-03T18:15:29.523",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cross Site Scripting vulnerability in seajs v.2.2.3 allows a remote attacker to execute arbitrary code via the seajs package"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/jackfromeast/176413c3bd73f825f7aeeb05e80e02a6",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-533xx/CVE-2024-53384.json
Normal file
21
CVE-2024/CVE-2024-533xx/CVE-2024-53384.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-53384",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-03-03T18:15:29.670",
|
||||
"lastModified": "2025-03-03T18:15:29.670",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A DOM Clobbering vulnerability in tsup v8.3.4 allows attackers to execute arbitrary code via a crafted script in the import.meta.url to document.currentScript in cjs_shims.js components"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/jackfromeast/36f98bf7542d11835c883c1d175d9b92",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-533xx/CVE-2024-53387.json
Normal file
21
CVE-2024/CVE-2024-533xx/CVE-2024-53387.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-53387",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-03-03T17:15:13.050",
|
||||
"lastModified": "2025-03-03T17:15:13.050",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A DOM Clobbering vulnerability in umeditor v1.2.3 allows attackers to execute arbitrary code via supplying a crafted HTML element."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/jackfromeast/d52c506113f33b8871d0e647411df894",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-533xx/CVE-2024-53388.json
Normal file
21
CVE-2024/CVE-2024-533xx/CVE-2024-53388.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-53388",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-03-03T17:15:13.167",
|
||||
"lastModified": "2025-03-03T17:15:13.167",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A DOM Clobbering vulnerability in mavo v0.3.2 allows attackers to execute arbitrary code via supplying a crafted HTML element."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/jackfromeast/a61a5429a97985e7ff4c1d39e339d5d8",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-54658",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-02-10T19:15:39.320",
|
||||
"lastModified": "2025-02-18T19:15:18.857",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-03-03T16:52:20.953",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,31 +15,138 @@
|
||||
"value": "El problema se solucion\u00f3 mejorando la gesti\u00f3n de la memoria. Este problema se solucion\u00f3 en iOS 17.4 y iPadOS 17.4, Safari 17.4, tvOS 17.4, watchOS 10.4, visionOS 1.1 y macOS Sonoma 14.4. El procesamiento de contenido web puede provocar una denegaci\u00f3n de servicio. "
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "17.4",
|
||||
"matchCriteriaId": "DC7753BA-5DF8-4F98-8DA8-69DA473F8307"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "17.4",
|
||||
"matchCriteriaId": "CCCC6AF9-4EFA-4A45-888B-93C0C1327BC7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "17.4",
|
||||
"matchCriteriaId": "BCB4911E-7824-4C34-916D-88110CB415EB"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "14.4",
|
||||
"matchCriteriaId": "58227FD1-0619-45F6-AD19-25831899376A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "17.4",
|
||||
"matchCriteriaId": "BB6BA6CB-001B-4440-A9AE-473F5722F8E0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "1.1",
|
||||
"matchCriteriaId": "EB7F6CDA-FEC0-45D7-ACBE-8B5AD35F1AB5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.4",
|
||||
"matchCriteriaId": "5547F484-4E4B-4961-BAF8-F891D50BB4B6"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/120881",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/120882",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/120883",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/120893",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/120894",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/120895",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-55532",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2025-03-03T16:15:38.777",
|
||||
"lastModified": "2025-03-03T16:15:38.777",
|
||||
"lastModified": "2025-03-03T18:15:29.797",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@apache.org",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -28,6 +28,10 @@
|
||||
{
|
||||
"url": "https://cwiki.apache.org/confluence/display/RANGER/Vulnerabilities+found+in+Ranger",
|
||||
"source": "security@apache.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2025/03/03/2",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-57237",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-03T19:15:13.053",
|
||||
"lastModified": "2025-02-12T20:15:35.483",
|
||||
"lastModified": "2025-03-03T18:15:29.913",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -22,20 +22,20 @@
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 6.1,
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
"impactScore": 3.4
|
||||
}
|
||||
]
|
||||
},
|
||||
|
21
CVE-2024/CVE-2024-572xx/CVE-2024-57240.json
Normal file
21
CVE-2024/CVE-2024-572xx/CVE-2024-57240.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-57240",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-03-03T17:15:13.320",
|
||||
"lastModified": "2025-03-03T17:15:13.320",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A Cross-Site Scripting (XSS) vulnerability in the Rendering Engine component in Apryse WebViewer v11.1 and earlier allows attackers to execute arbitrary code via a crafted PDF file."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/devom3/43c328e23ec854090ed555a13541ca94",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-57850",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2025-01-11T15:15:07.423",
|
||||
"lastModified": "2025-01-11T15:15:07.423",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-03-03T17:42:59.740",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,35 +15,144 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: jffs2: evitar la corrupci\u00f3n de la memoria de descompresi\u00f3n de rtime La rutina de descompresi\u00f3n de rtime no comprueba completamente los l\u00edmites durante la totalidad del paso de descompresi\u00f3n y puede da\u00f1ar la memoria fuera del b\u00fafer de descompresi\u00f3n si los datos comprimidos est\u00e1n da\u00f1ados. Esto agrega la verificaci\u00f3n requerida para evitar este modo de falla."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "5.4.287",
|
||||
"matchCriteriaId": "DC7D5C80-B677-4131-A399-3366D7F3961C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.5",
|
||||
"versionEndExcluding": "5.10.231",
|
||||
"matchCriteriaId": "B5C644CC-2BD7-4E32-BC54-8DCC7ABE9935"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.11",
|
||||
"versionEndExcluding": "5.15.174",
|
||||
"matchCriteriaId": "419FD073-1517-4FD5-8158-F94BC68A1E89"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.16",
|
||||
"versionEndExcluding": "6.1.120",
|
||||
"matchCriteriaId": "09AC6122-E2A4-40FE-9D33-268A1B2EC265"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.2",
|
||||
"versionEndExcluding": "6.6.66",
|
||||
"matchCriteriaId": "29A976AD-B9AB-4A95-9F08-7669F8847EB9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.7",
|
||||
"versionEndExcluding": "6.12.5",
|
||||
"matchCriteriaId": "9501D045-7A94-42CA-8B03-821BE94A65B7"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/421f9e9f0fae9f8e721ffa07f22d9765fa1214d5",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/47c9a7f81027a78afea9d2e9a54bfd8fabb6b3d0",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/6808a1812a3419542223e7fe9e2de577e99e45d1",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/bd384b04ad1995441b18fe6c1366d02de8c5d5eb",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/dc39b08fcc3831b0bc46add91ba93cd2aab50716",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/f6fc251baefc3cdc4f41f2f5a47940d7d4a67332",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/fe051552f5078fa02d593847529a3884305a6ffe",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2024-8573",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-09-08T10:15:01.907",
|
||||
"lastModified": "2024-09-10T12:08:12.567",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2025-03-03T18:15:30.130",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability, which was classified as critical, was found in TOTOLINK AC1200 T8 and AC1200 T10 4.1.5cu.861_B20230220/4.1.8cu.5207. This affects the function setParentalRules of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument desc leads to buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
|
||||
"value": "A vulnerability, which was classified as critical, was found in TOTOLINK AC1200 T8 and AC1200 T10 4.1.5cu.861_B20230220/4.1.8cu.5207. This affects the function setParentalRules of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument desc/week/sTime/eTime leads to buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well. The vendor was contacted early about this disclosure but did not respond in any way."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -133,6 +133,10 @@
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-119"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-120"
|
||||
|
25
CVE-2025/CVE-2025-02xx/CVE-2025-0285.json
Normal file
25
CVE-2025/CVE-2025-02xx/CVE-2025-0285.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2025-0285",
|
||||
"sourceIdentifier": "cret@cert.org",
|
||||
"published": "2025-03-03T17:15:13.430",
|
||||
"lastModified": "2025-03-03T17:15:13.430",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Paragon Partition Manager version 7.9.1 contains an arbitrary kernel memory mapping vulnerability within biontdrv.sys that is caused by a failure to properly validate the length of user supplied data, which can allow an attacker to perform privilege escalation exploits."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://paragon-software.zendesk.com/hc/en-us/articles/32993902732817-IMPORTANT-Paragon-Driver-Security-Patch-for-All-Products-of-Hard-Disk-Manager-Product-Line-Biontdrv-sys",
|
||||
"source": "cret@cert.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.kb.cert.org/vuls/id/726882",
|
||||
"source": "cret@cert.org"
|
||||
}
|
||||
]
|
||||
}
|
25
CVE-2025/CVE-2025-02xx/CVE-2025-0286.json
Normal file
25
CVE-2025/CVE-2025-02xx/CVE-2025-0286.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2025-0286",
|
||||
"sourceIdentifier": "cret@cert.org",
|
||||
"published": "2025-03-03T17:15:13.537",
|
||||
"lastModified": "2025-03-03T17:15:13.537",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Paragon Partition Manager version 7.9.1 contains an arbitrary kernel memory write vulnerability within biontdrv.sys that is caused by a failure to properly validate the length of user supplied data, which can allow an attacker to execute arbitrary code on the victim machine."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://paragon-software.zendesk.com/hc/en-us/articles/32993902732817-IMPORTANT-Paragon-Driver-Security-Patch-for-All-Products-of-Hard-Disk-Manager-Product-Line-Biontdrv-sys",
|
||||
"source": "cret@cert.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.kb.cert.org/vuls/id/726882",
|
||||
"source": "cret@cert.org"
|
||||
}
|
||||
]
|
||||
}
|
25
CVE-2025/CVE-2025-02xx/CVE-2025-0287.json
Normal file
25
CVE-2025/CVE-2025-02xx/CVE-2025-0287.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2025-0287",
|
||||
"sourceIdentifier": "cret@cert.org",
|
||||
"published": "2025-03-03T17:15:13.710",
|
||||
"lastModified": "2025-03-03T17:15:13.710",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Paragon Partition Manager version 7.9.1 contains a null pointer dereference vulnerability within biontdrv.sys that is caused by a lack of a valid MasterLrp structure in the input buffer, allowing an attacker to execute arbitrary code in the kernel, facilitating privilege escalation."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://paragon-software.zendesk.com/hc/en-us/articles/32993902732817-IMPORTANT-Paragon-Driver-Security-Patch-for-All-Products-of-Hard-Disk-Manager-Product-Line-Biontdrv-sys",
|
||||
"source": "cret@cert.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.kb.cert.org/vuls/id/726882",
|
||||
"source": "cret@cert.org"
|
||||
}
|
||||
]
|
||||
}
|
25
CVE-2025/CVE-2025-02xx/CVE-2025-0288.json
Normal file
25
CVE-2025/CVE-2025-02xx/CVE-2025-0288.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2025-0288",
|
||||
"sourceIdentifier": "cret@cert.org",
|
||||
"published": "2025-03-03T17:15:13.823",
|
||||
"lastModified": "2025-03-03T17:15:13.823",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Paragon Partition Manager version 7.9.1 contains an arbitrary kernel memory vulnerability facilitated by the memmove function, which does not validate or sanitize user controlled input, allowing an attacker the ability to write arbitrary kernel memory and perform privilege escalation."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://paragon-software.zendesk.com/hc/en-us/articles/32993902732817-IMPORTANT-Paragon-Driver-Security-Patch-for-All-Products-of-Hard-Disk-Manager-Product-Line-Biontdrv-sys",
|
||||
"source": "cret@cert.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.kb.cert.org/vuls/id/726882",
|
||||
"source": "cret@cert.org"
|
||||
}
|
||||
]
|
||||
}
|
25
CVE-2025/CVE-2025-02xx/CVE-2025-0289.json
Normal file
25
CVE-2025/CVE-2025-02xx/CVE-2025-0289.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2025-0289",
|
||||
"sourceIdentifier": "cret@cert.org",
|
||||
"published": "2025-03-03T17:15:13.943",
|
||||
"lastModified": "2025-03-03T17:15:13.943",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Paragon Partition Manager version 17, both community and Business versions, contain an insecure kernel resource access vulnerability facilitated by the driver not validating the MappedSystemVa pointer before passing it to HalReturnToFirmware, which can allows an attacker the ability to compromise the service."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://paragon-software.zendesk.com/hc/en-us/articles/32993902732817-IMPORTANT-Paragon-Driver-Security-Patch-for-All-Products-of-Hard-Disk-Manager-Product-Line-Biontdrv-sys",
|
||||
"source": "cret@cert.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.kb.cert.org/vuls/id/726882",
|
||||
"source": "cret@cert.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-0393",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2025-01-14T09:15:21.263",
|
||||
"lastModified": "2025-01-14T09:15:21.263",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-03-03T17:42:59.740",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -19,6 +19,26 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
@ -51,26 +71,59 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:royal-elementor-addons:royal_elementor_addons:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndIncluding": "1.7.1006",
|
||||
"matchCriteriaId": "FB3CAF62-228C-4561-8E62-56D65A5B0EF5"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/royal-elementor-addons/tags/1.7.1006/classes/modules/wpr-filter-grid-posts.php#L1260",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/royal-elementor-addons/tags/1.7.1006/classes/modules/wpr-filter-grid-posts.php#L391",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3220959/",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://wordpress.org/plugins/royal-elementor-addons/#developers",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/a8e34c05-7431-4acd-91f3-aab5e66f61ad?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2025/CVE-2025-06xx/CVE-2025-0678.json
Normal file
60
CVE-2025/CVE-2025-06xx/CVE-2025-0678.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2025-0678",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2025-03-03T17:15:14.053",
|
||||
"lastModified": "2025-03-03T17:15:14.053",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A flaw was found in grub2. When reading data from a squash4 filesystem, grub's squash4 fs module uses user-controlled parameters from the filesystem geometry to determine the internal buffer size, however, it improperly checks for integer overflows. A maliciously crafted filesystem may lead some of those buffer size calculations to overflow, causing it to perform a grub_malloc() operation with a smaller size than expected. As a result, the direct_read() will perform a heap based out-of-bounds write during data reading. This flaw may be leveraged to corrupt grub's internal critical data and may result in arbitrary code execution, by-passing secure boot protections."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "secalert@redhat.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 6.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 0.5,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "secalert@redhat.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2025-0678",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2346118",
|
||||
"source": "secalert@redhat.com"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2025/CVE-2025-06xx/CVE-2025-0684.json
Normal file
60
CVE-2025/CVE-2025-06xx/CVE-2025-0684.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2025-0684",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2025-03-03T18:15:30.537",
|
||||
"lastModified": "2025-03-03T18:15:30.537",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A flaw was found in grub2. When performing a symlink lookup from a reiserfs filesystem, grub's reiserfs fs module uses user-controlled parameters from the filesystem geometry to determine the internal buffer size, however, it improperly checks for integer overflows. A maliciouly crafted filesystem may lead some of those buffer size calculations to overflow, causing it to perform a grub_malloc() operation with a smaller size than expected. As a result, the grub_reiserfs_read_symlink() will call grub_reiserfs_read_real() with a overflown length parameter, leading to a heap based out-of-bounds write during data reading. This flaw may be leveraged to corrupt grub's internal critical data and can result in arbitrary code execution, by-passing secure boot protections."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "secalert@redhat.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 6.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 0.5,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "secalert@redhat.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2025-0684",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2346119",
|
||||
"source": "secalert@redhat.com"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2025/CVE-2025-06xx/CVE-2025-0685.json
Normal file
60
CVE-2025/CVE-2025-06xx/CVE-2025-0685.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2025-0685",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2025-03-03T18:15:30.733",
|
||||
"lastModified": "2025-03-03T18:15:30.733",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A flaw was found in grub2. When reading data from a jfs filesystem, grub's jfs filesystem module uses user-controlled parameters from the filesystem geometry to determine the internal buffer size, however, it improperly checks for integer overflows. A maliciouly crafted filesystem may lead some of those buffer size calculations to overflow, causing it to perform a grub_malloc() operation with a smaller size than expected. As a result, the grub_jfs_lookup_symlink() function will write past the internal buffer length during grub_jfs_read_file(). This issue can be leveraged to corrupt grub's internal critical data and may result in arbitrary code execution, by-passing secure boot protections."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "secalert@redhat.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 6.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 0.5,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "secalert@redhat.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2025-0685",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2346120",
|
||||
"source": "secalert@redhat.com"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2025/CVE-2025-06xx/CVE-2025-0686.json
Normal file
60
CVE-2025/CVE-2025-06xx/CVE-2025-0686.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2025-0686",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2025-03-03T18:15:30.930",
|
||||
"lastModified": "2025-03-03T18:15:30.930",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A flaw was found in grub2. When performing a symlink lookup from a romfs filesystem, grub's romfs filesystem module uses user-controlled parameters from the filesystem geometry to determine the internal buffer size, however, it improperly checks for integer overflows. A maliciously crafted filesystem may lead some of those buffer size calculations to overflow, causing it to perform a grub_malloc() operation with a smaller size than expected. As a result, the grub_romfs_read_symlink() may cause out-of-bounds writes when the calling grub_disk_read() function. This issue may be leveraged to corrupt grub's internal critical data and can result in arbitrary code execution by-passing secure boot protections."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "secalert@redhat.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 6.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 0.5,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "secalert@redhat.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2025-0686",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2346121",
|
||||
"source": "secalert@redhat.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-1002",
|
||||
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
||||
"published": "2025-02-10T21:15:21.830",
|
||||
"lastModified": "2025-02-10T21:15:21.830",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-03-03T16:52:20.953",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -80,6 +80,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.6,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -95,10 +115,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microdicom:dicom_viewer:2024.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "48FAD0AC-0C8A-4684-895E-DB324148B68B"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.cisa.gov/news-events/ics-medical-advisories/icsma-25-037-01",
|
||||
"source": "ics-cert@hq.dhs.gov"
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"US Government Resource"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-1152",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-02-10T18:15:34.043",
|
||||
"lastModified": "2025-02-10T18:15:34.043",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-03-03T16:52:20.953",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -63,7 +63,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L",
|
||||
@ -80,6 +80,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.6,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
|
||||
"baseScore": 3.7,
|
||||
"baseSeverity": "LOW",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -122,28 +142,74 @@
|
||||
"value": "CWE-404"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-401"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:binutils:2.43:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "41E442CC-ADC3-46D7-BC3C-AF5210AA9C04"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://sourceware.org/bugzilla/attachment.cgi?id=15887",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://sourceware.org/bugzilla/show_bug.cgi?id=32576",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Issue Tracking"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.295056",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.295056",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.gnu.org/",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-1153",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-02-10T19:15:39.900",
|
||||
"lastModified": "2025-02-10T19:15:39.900",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-03-03T16:52:20.953",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -63,7 +63,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L",
|
||||
@ -80,6 +80,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.6,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 5.9,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -120,30 +140,76 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:binutils:2.43:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "41E442CC-ADC3-46D7-BC3C-AF5210AA9C04"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:binutils:2.44:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9C0316B8-F6B0-46B1-BE93-DD52D7EC3357"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://sourceware.org/bugzilla/show_bug.cgi?id=32603",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=8d97c1a53f3dc9fd8e1ccdb039b8a33d50133150",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.295057",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.295057",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.489991",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.gnu.org/",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-1160",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-02-10T23:15:15.387",
|
||||
"lastModified": "2025-02-18T18:15:30.120",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-03-03T16:52:20.953",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -80,6 +80,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -111,35 +131,81 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-1392"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-Other"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:remyandrade:employee_management_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0F228168-0FA5-49AE-ADDE-39BC9772B293"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/jmx0hxq/0e9cde14b6e9190a7451cd72d7b23bfd",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.295064",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.295064",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.493860",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.sourcecodester.com/",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-1168",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-02-11T02:15:37.733",
|
||||
"lastModified": "2025-02-18T18:15:31.127",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-03-03T16:52:20.953",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -80,6 +80,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -122,24 +142,67 @@
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:rems:contact_manager_with_export_to_vcf:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B1388B7F-5297-4826-8963-BA619741FAE0"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.295072",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.295072",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"VDB Entry",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.494766",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"VDB Entry",
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.sourcecodester.com/",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-1169",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-02-11T03:15:07.640",
|
||||
"lastModified": "2025-02-18T18:15:31.317",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-03-03T16:52:20.953",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -63,7 +63,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
|
||||
@ -80,6 +80,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -122,24 +142,67 @@
|
||||
"value": "CWE-94"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:rems:image_compressor_tool:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EE413C73-5945-4A1B-B00F-181206A1E93A"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.295073",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.295073",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"VDB Entry",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.494775",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"VDB Entry",
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.sourcecodester.com/",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-1179",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-02-11T07:15:30.230",
|
||||
"lastModified": "2025-02-11T07:15:30.230",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-03-03T16:52:20.953",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -63,7 +63,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L",
|
||||
@ -80,6 +80,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.6,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.6,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -120,34 +140,80 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gnu:binutils:2.43:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "41E442CC-ADC3-46D7-BC3C-AF5210AA9C04"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://sourceware.org/bugzilla/attachment.cgi?id=15915",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://sourceware.org/bugzilla/show_bug.cgi?id=32640",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://sourceware.org/bugzilla/show_bug.cgi?id=32640#c1",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.295082",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.295082",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.495376",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.gnu.org/",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-1244",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2025-02-12T15:15:18.430",
|
||||
"lastModified": "2025-03-03T12:15:34.453",
|
||||
"lastModified": "2025-03-03T18:15:31.307",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -80,6 +80,10 @@
|
||||
"url": "https://access.redhat.com/errata/RHSA-2025:2022",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2025:2157",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2025-1244",
|
||||
"source": "secalert@redhat.com"
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2025-1829",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-03-02T19:15:10.723",
|
||||
"lastModified": "2025-03-02T19:15:10.723",
|
||||
"lastModified": "2025-03-03T18:15:31.937",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in TOTOLINK X18 9.1.0cu.2024_B20220329. It has been declared as critical. This vulnerability affects the function setMtknatCfg of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument mtkhnatEnable leads to os command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se ha encontrado una vulnerabilidad en TOTOLINK X18 9.1.0cu.2024_B20220329. Se ha declarado como cr\u00edtica. Esta vulnerabilidad afecta a la funci\u00f3n setMtknatCfg del archivo /cgi-bin/cstecgi.cgi. La manipulaci\u00f3n del argumento mtkhnatEnable provoca la inyecci\u00f3n de comandos en el sistema operativo. El ataque se puede iniciar de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse. Se contact\u00f3 al proveedor con anticipaci\u00f3n sobre esta revelaci\u00f3n, pero no respondi\u00f3 de ninguna manera."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -59,7 +63,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
@ -107,7 +111,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -140,6 +144,10 @@
|
||||
{
|
||||
"url": "https://www.totolink.net/",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/sjwszt/CVE/blob/main/CVE_2.md",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2025-1831",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-03-02T20:15:34.577",
|
||||
"lastModified": "2025-03-02T20:15:34.577",
|
||||
"lastModified": "2025-03-03T18:15:32.520",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability classified as critical has been found in zj1983 zz up to 2024-8. Affected is the function GetDBUser of the file src/main/java/com/futvan/z/system/zorg/ZorgAction.java. The manipulation of the argument user_id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se ha encontrado una vulnerabilidad clasificada como cr\u00edtica en zj1983 zz hasta 2024-8. La funci\u00f3n GetDBUser del archivo src/main/java/com/futvan/z/system/zorg/ZorgAction.java est\u00e1 afectada. La manipulaci\u00f3n del argumento user_id conduce a una inyecci\u00f3n SQL. Es posible lanzar el ataque de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse. Se contact\u00f3 al proveedor con anticipaci\u00f3n sobre esta revelaci\u00f3n, pero no respondi\u00f3 de ninguna manera."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -59,7 +63,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
@ -107,7 +111,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -136,6 +140,10 @@
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.504806",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/caigo8/CVE-md/blob/main/zz/ZZ_2024_8%E5%89%8D%E5%8F%B0SQL%E6%B3%A8%E5%85%A52.md",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2025-1832",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-03-02T21:15:10.110",
|
||||
"lastModified": "2025-03-02T21:15:10.110",
|
||||
"lastModified": "2025-03-03T18:15:32.950",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability classified as critical was found in zj1983 zz up to 2024-8. Affected by this vulnerability is the function getUserList of the file src/main/java/com/futvan/z/system/zrole/ZroleAction.java. The manipulation of the argument roleid leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se ha encontrado una vulnerabilidad clasificada como cr\u00edtica en zj1983 zz hasta 2024-8. La funci\u00f3n getUserList del archivo src/main/java/com/futvan/z/system/zrole/ZroleAction.java se ve afectada por esta vulnerabilidad. La manipulaci\u00f3n del argumento roleid provoca una inyecci\u00f3n SQL. El ataque se puede ejecutar de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse. Se contact\u00f3 al proveedor con anticipaci\u00f3n sobre esta revelaci\u00f3n, pero no respondi\u00f3 de ninguna manera."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -59,7 +63,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
@ -107,7 +111,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -136,6 +140,10 @@
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.504814",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/caigo8/CVE-md/blob/main/zz/zz_2024_8_4%E5%90%8E%E5%8F%B0SQL%E6%B3%A8%E5%85%A5.md",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2025-1833",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-03-02T22:15:34.820",
|
||||
"lastModified": "2025-03-02T22:15:34.820",
|
||||
"lastModified": "2025-03-03T18:15:33.763",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability, which was classified as critical, has been found in zj1983 zz up to 2024-8. Affected by this issue is the function sendNotice of the file src/main/java/com/futvan/z/erp/customer_notice/Customer_noticeAction.java of the component HTTP Request Handler. The manipulation of the argument url leads to server-side request forgery. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se ha encontrado una vulnerabilidad clasificada como cr\u00edtica en zj1983 zz hasta 2024-8. Este problema afecta a la funci\u00f3n sendNotice del archivo src/main/java/com/futvan/z/erp/customer_notice/Customer_noticeAction.java del componente HTTP Request Handler. La manipulaci\u00f3n del argumento url conduce a server-side request forgery. El ataque puede ejecutarse de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse. Se contact\u00f3 al proveedor con anticipaci\u00f3n sobre esta revelaci\u00f3n, pero no respondi\u00f3 de ninguna manera."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -59,7 +63,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
@ -107,7 +111,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -132,6 +136,10 @@
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.504833",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/caigo8/CVE-md/blob/main/zz/zz_2024_8%E5%90%8E%E5%8F%B0SSRF.md",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2025-1843",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-03-03T01:15:11.127",
|
||||
"lastModified": "2025-03-03T01:15:11.127",
|
||||
"lastModified": "2025-03-03T18:15:34.290",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability, which was classified as critical, has been found in Mini-Tmall up to 20250211. This issue affects the function select of the file com/xq/tmall/dao/ProductMapper.java. The manipulation of the argument orderBy leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se ha encontrado una vulnerabilidad, que se ha clasificado como cr\u00edtica, en Mini-Tmall hasta 20250211. Este problema afecta a la funci\u00f3n select del archivo com/xq/tmall/dao/ProductMapper.java. La manipulaci\u00f3n del argumento orderBy conduce a una inyecci\u00f3n SQL. El ataque puede iniciarse de forma remota. El exploit se ha divulgado al p\u00fablico y puede utilizarse. Se contact\u00f3 al proveedor con anticipaci\u00f3n sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -59,7 +63,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
@ -107,7 +111,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -136,6 +140,10 @@
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.504958",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/qkdjksfkeg/cve_article/blob/main/Tmall_demo/SQL%20injection.md",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2025-1844",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-03-03T02:15:33.390",
|
||||
"lastModified": "2025-03-03T02:15:33.390",
|
||||
"lastModified": "2025-03-03T18:15:34.773",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability, which was classified as critical, was found in ESAFENET CDG 5.6.3.154.205_20250114. Affected is an unknown function of the file /CDGServer3/logManagement/backupLogDetail.jsp. The manipulation of the argument logTaskId leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se ha detectado una vulnerabilidad clasificada como cr\u00edtica en ESAFENET CDG 5.6.3.154.205_20250114. Se trata de una funci\u00f3n desconocida del archivo /CDGServer3/logManagement/backupLogDetail.jsp. La manipulaci\u00f3n del argumento logTaskId provoca una inyecci\u00f3n SQL. Es posible lanzar el ataque de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse. Se contact\u00f3 al proveedor con antelaci\u00f3n sobre esta revelaci\u00f3n, pero no respondi\u00f3 de ninguna manera."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -59,7 +63,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
@ -107,7 +111,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -136,6 +140,10 @@
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.505008",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/666lail/report/blob/main/tmp/1.md",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2025-1845",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-03-03T02:15:33.563",
|
||||
"lastModified": "2025-03-03T02:15:33.563",
|
||||
"lastModified": "2025-03-03T18:15:35.840",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability has been found in ESAFENET DSM 3.1.2 and classified as critical. Affected by this vulnerability is the function examExportPDF of the file /admin/plan/examExportPDF. The manipulation of the argument s leads to command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se ha encontrado una vulnerabilidad en ESAFENET DSM 3.1.2 y se ha clasificado como cr\u00edtica. Esta vulnerabilidad afecta a la funci\u00f3n examExportPDF del archivo /admin/plan/examExportPDF. La manipulaci\u00f3n del argumento s provoca la inyecci\u00f3n de comandos. El ataque se puede ejecutar de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse. Se contact\u00f3 al proveedor con anticipaci\u00f3n sobre esta revelaci\u00f3n, pero no respondi\u00f3 de ninguna manera."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -59,7 +63,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
@ -107,7 +111,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -136,6 +140,10 @@
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.505009",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/666lail/report/blob/main/tmp/2.md",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2025-1846",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-03-03T03:15:08.777",
|
||||
"lastModified": "2025-03-03T03:15:08.777",
|
||||
"lastModified": "2025-03-03T18:15:36.340",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in zj1983 zz up to 2024-8. It has been declared as problematic. This vulnerability affects the function deleteLocalFile of the file src/main/java/com/futvan/z/system/zfile/ZfileAction.java of the component File Handler. The manipulation of the argument zids leads to denial of service. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se ha detectado una vulnerabilidad en zj1983 zz hasta 2024-8. Se ha declarado como problem\u00e1tica. Esta vulnerabilidad afecta a la funci\u00f3n deleteLocalFile del archivo src/main/java/com/futvan/z/system/zfile/ZfileAction.java del componente File Handler. La manipulaci\u00f3n del argumento zids provoca una denegaci\u00f3n de servicio. El ataque se puede iniciar de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse. Se contact\u00f3 al proveedor con anticipaci\u00f3n sobre esta revelaci\u00f3n, pero no respondi\u00f3 de ninguna manera."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -59,7 +63,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
|
||||
@ -107,7 +111,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -132,6 +136,10 @@
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.505097",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/caigo8/CVE-md/blob/main/zz/zz_2024_8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E5%88%A0%E9%99%A4.md",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2025-1847",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-03-03T03:15:08.983",
|
||||
"lastModified": "2025-03-03T03:15:08.983",
|
||||
"lastModified": "2025-03-03T18:15:36.537",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in zj1983 zz up to 2024-8. It has been rated as critical. This issue affects some unknown processing. The manipulation leads to improper authorization. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se encontr\u00f3 una vulnerabilidad en zj1983 zz hasta 2024-8. Se la ha calificado como cr\u00edtica. Este problema afecta a algunos procesos desconocidos. La manipulaci\u00f3n conduce a una autorizaci\u00f3n incorrecta. El ataque puede iniciarse de forma remota. El exploit se ha divulgado al p\u00fablico y puede utilizarse. Se contact\u00f3 al proveedor con anticipaci\u00f3n sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -59,7 +63,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
@ -107,7 +111,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -136,6 +140,10 @@
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.505303",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/caigo8/CVE-md/blob/main/zz/ZZ_2024_8%E5%9E%82%E7%9B%B4%E8%B6%8A%E6%9D%83.md",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2025-1848",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-03-03T04:15:08.657",
|
||||
"lastModified": "2025-03-03T04:15:08.657",
|
||||
"lastModified": "2025-03-03T18:15:36.720",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability classified as critical has been found in zj1983 zz up to 2024-8. Affected is an unknown function of the file /import_data_check. The manipulation of the argument url leads to server-side request forgery. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se ha encontrado una vulnerabilidad clasificada como cr\u00edtica en zj1983 zz hasta 2024-8. Se ve afectada una funci\u00f3n desconocida del archivo /import_data_check. La manipulaci\u00f3n del argumento url conduce a server-side request forgery. Es posible lanzar el ataque de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse. Se contact\u00f3 al proveedor con anticipaci\u00f3n sobre esta revelaci\u00f3n, pero no respondi\u00f3 de ninguna manera."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -59,7 +63,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
@ -107,7 +111,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -132,6 +136,10 @@
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.505345",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/caigo8/CVE-md/blob/main/zz/zz_import_data_check_SSRF.md",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2025-1849",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-03-03T04:15:08.837",
|
||||
"lastModified": "2025-03-03T04:15:08.837",
|
||||
"lastModified": "2025-03-03T18:15:36.893",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability classified as critical was found in zj1983 zz up to 2024-8. Affected by this vulnerability is an unknown functionality of the file /import_data_todb. The manipulation of the argument url leads to server-side request forgery. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se ha detectado una vulnerabilidad clasificada como cr\u00edtica en zj1983 zz hasta 2024-8. Esta vulnerabilidad afecta a una funcionalidad desconocida del archivo /import_data_todb. La manipulaci\u00f3n del argumento url conduce a Server-Side Request Forgery. El ataque se puede ejecutar de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse. Se contact\u00f3 al proveedor con anticipaci\u00f3n sobre esta revelaci\u00f3n, pero no respondi\u00f3 de ninguna manera."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -59,7 +63,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
@ -107,7 +111,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -132,6 +136,10 @@
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.505346",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/caigo8/CVE-md/blob/main/zz/zz_import_data_todb_SSRF.md",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2025-1850",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-03-03T05:15:10.587",
|
||||
"lastModified": "2025-03-03T05:15:10.587",
|
||||
"lastModified": "2025-03-03T18:15:37.077",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability, which was classified as critical, has been found in Codezips College Management System 1.0. Affected by this issue is some unknown functionality of the file /university.php. The manipulation of the argument book_name leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se ha encontrado una vulnerabilidad clasificada como cr\u00edtica en Codezips College Management System 1.0. Este problema afecta a algunas funciones desconocidas del archivo /university.php. La manipulaci\u00f3n del argumento book_name provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -59,7 +63,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||||
@ -107,7 +111,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -136,6 +140,10 @@
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.511626",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/WHOAMI-xiaoyu/CVE/blob/main/CVE_2.md",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2025-1851",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-03-03T05:15:10.867",
|
||||
"lastModified": "2025-03-03T05:15:10.867",
|
||||
"lastModified": "2025-03-03T18:15:37.277",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability, which was classified as critical, was found in Tenda AC7 up to 15.03.06.44. This affects the function formSetFirewallCfg of the file /goform/SetFirewallCfg. The manipulation of the argument firewallEn leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Hasta la versi\u00f3n 15.03.06.44 se ha detectado una vulnerabilidad clasificada como cr\u00edtica en Tenda AC7. Afecta a la funci\u00f3n formSetFirewallCfg del archivo /goform/SetFirewallCfg. La manipulaci\u00f3n del argumento firewallEn provoca un desbordamiento del b\u00fafer basado en la pila. Es posible iniciar el ataque de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -59,7 +63,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
@ -107,7 +111,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -140,6 +144,10 @@
|
||||
{
|
||||
"url": "https://www.tenda.com.cn/",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/Raining-101/IOT_cve/blob/main/ac7_V15.03.06.44_SetFirewallCfg.md",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2025-1852",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-03-03T06:15:21.343",
|
||||
"lastModified": "2025-03-03T06:15:21.343",
|
||||
"lastModified": "2025-03-03T18:15:37.447",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability has been found in Totolink EX1800T 9.1.0cu.2112_B20220316 and classified as critical. This vulnerability affects the function loginAuth of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument password leads to buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se ha encontrado una vulnerabilidad en Totolink EX1800T 9.1.0cu.2112_B20220316 y se ha clasificado como cr\u00edtica. Esta vulnerabilidad afecta a la funci\u00f3n loginAuth del archivo /cgi-bin/cstecgi.cgi. La manipulaci\u00f3n del argumento password provoca un desbordamiento del b\u00fafer. El ataque puede iniciarse de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -59,7 +63,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
@ -107,7 +111,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -140,6 +144,10 @@
|
||||
{
|
||||
"url": "https://www.totolink.net/",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/watermelon-happy/cve/blob/main/ex1800tCVE.md",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
152
CVE-2025/CVE-2025-18xx/CVE-2025-1876.json
Normal file
152
CVE-2025/CVE-2025-18xx/CVE-2025-1876.json
Normal file
@ -0,0 +1,152 @@
|
||||
{
|
||||
"id": "CVE-2025-1876",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-03-03T17:15:14.517",
|
||||
"lastModified": "2025-03-03T17:15:14.517",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [
|
||||
{
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"unsupported-when-assigned"
|
||||
]
|
||||
}
|
||||
],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability, which was classified as critical, has been found in D-Link DAP-1562 1.10. Affected by this issue is the function http_request_parse of the component HTTP Header Handler. The manipulation of the argument Authorization leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 6.9,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "LOW",
|
||||
"vulnIntegrityImpact": "LOW",
|
||||
"vulnAvailabilityImpact": "LOW",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||||
"baseScore": 7.3,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||||
"baseScore": 7.5,
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "NONE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL"
|
||||
},
|
||||
"baseSeverity": "HIGH",
|
||||
"exploitabilityScore": 10.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-119"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-121"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.298190",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.298190",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.506106",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://witty-maiasaura-083.notion.site/D-link-DAP-1562-http_request_parse-Vulnerability-1a4b2f2a636180a2a67de271ad5fe6d7",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.dlink.com/",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-21155",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2025-02-11T18:15:27.583",
|
||||
"lastModified": "2025-02-11T18:15:27.583",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-03-03T16:52:20.953",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,10 +51,48 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:substance_3d_stager:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "3.1.1",
|
||||
"matchCriteriaId": "447435A6-E2B6-49C6-A3B5-66A691F57945"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://helpx.adobe.com/security/products/substance3d_stager/apsb25-09.html",
|
||||
"source": "psirt@adobe.com"
|
||||
"source": "psirt@adobe.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-22738",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2025-01-15T16:15:36.187",
|
||||
"lastModified": "2025-01-15T16:15:36.187",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-03-03T17:42:59.740",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.7,
|
||||
"impactScore": 3.7
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 4.8,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.7,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -51,10 +71,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:wpulike:wp_ulike:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "4.7.7",
|
||||
"matchCriteriaId": "678B21EB-0342-4510-A358-DE242100DC66"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/wordpress/plugin/wp-ulike/vulnerability/wordpress-wp-ulike-plugin-4-7-6-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
"source": "audit@patchstack.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
78
CVE-2025/CVE-2025-253xx/CVE-2025-25301.json
Normal file
78
CVE-2025/CVE-2025-253xx/CVE-2025-25301.json
Normal file
@ -0,0 +1,78 @@
|
||||
{
|
||||
"id": "CVE-2025-25301",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-03-03T17:15:14.740",
|
||||
"lastModified": "2025-03-03T17:15:14.740",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Rembg is a tool to remove images background. In Rembg 2.0.57 and earlier, the /api/remove endpoint takes a URL query parameter that allows an image to be fetched, processed and returned. An attacker may be able to query this endpoint to view pictures hosted on the internal network of the rembg server. This issue may lead to Information Disclosure."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:L/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 6.9,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "NONE",
|
||||
"vulnIntegrityImpact": "NONE",
|
||||
"vulnAvailabilityImpact": "NONE",
|
||||
"subConfidentialityImpact": "LOW",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-918"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://securitylab.github.com/advisories/GHSL-2024-161_GHSL-2024-162_rembg/",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
82
CVE-2025/CVE-2025-253xx/CVE-2025-25302.json
Normal file
82
CVE-2025/CVE-2025-253xx/CVE-2025-25302.json
Normal file
@ -0,0 +1,82 @@
|
||||
{
|
||||
"id": "CVE-2025-25302",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-03-03T17:15:14.920",
|
||||
"lastModified": "2025-03-03T17:15:14.920",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Rembg is a tool to remove images background. In Rembg 2.0.57 and earlier, the CORS middleware is setup incorrectly. All origins are reflected, which allows any website to send cross site requests to the rembg server and thus query any API. Even if authentication were to be enabled, allow_credentials is set to True, which would allow any website to send authenticated cross site requests."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 8.7,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "HIGH",
|
||||
"vulnIntegrityImpact": "NONE",
|
||||
"vulnAvailabilityImpact": "NONE",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-346"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/danielgatis/rembg/blob/d1e00734f8a996abf512a3a5c251c7a9a392c90a/rembg/commands/s_command.py#L93",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://securitylab.github.com/advisories/GHSL-2024-161_GHSL-2024-162_rembg/",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
86
CVE-2025/CVE-2025-253xx/CVE-2025-25303.json
Normal file
86
CVE-2025/CVE-2025-253xx/CVE-2025-25303.json
Normal file
@ -0,0 +1,86 @@
|
||||
{
|
||||
"id": "CVE-2025-25303",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-03-03T17:15:15.073",
|
||||
"lastModified": "2025-03-03T17:15:15.073",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The MouseTooltipTranslator Chrome extension allows mouseover translation of any language at once. The MouseTooltipTranslator browser extension is vulnerable to SSRF attacks. The pdf.mjs script uses the URL parameter from the current URL as the file to download and display to the extension user. Because pdf.mjs is imported in viewer.html and viewer.html is accessible to all URLs, an attacker can force the user\u2019s browser to make a request to any arbitrary URL. After discussion with maintainer, patching this issue would require disabling a major feature of the extension in exchange for a low severity vulnerability. Decision to not patch issue."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 6.9,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "NONE",
|
||||
"vulnIntegrityImpact": "NONE",
|
||||
"vulnAvailabilityImpact": "NONE",
|
||||
"subConfidentialityImpact": "LOW",
|
||||
"subIntegrityImpact": "LOW",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-918"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/ttop32/MouseTooltipTranslator/blob/0.1.127/public/manifest.json#L23",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/ttop32/MouseTooltipTranslator/blob/0.1.127/public/pdfjs/build/pdf.mjs#L13932",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://securitylab.github.com/advisories/GHSL-2024-018_MouseTooltipTranslator/",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-25791",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-26T15:15:27.100",
|
||||
"lastModified": "2025-02-26T15:15:27.100",
|
||||
"lastModified": "2025-03-03T18:15:40.030",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Una vulnerabilidad de carga de archivos arbitrarios en la funci\u00f3n de instalaci\u00f3n de complementos de YZNCMS v2.0.1 permite a los atacantes ejecutar c\u00f3digo arbitrario mediante la carga de un archivo Zip manipulado espec\u00edficamente para ello."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
|
||||
"baseScore": 4.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 2.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-77"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://yzncms.com",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-25818",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-26T15:15:28.367",
|
||||
"lastModified": "2025-02-26T15:15:28.367",
|
||||
"lastModified": "2025-03-03T17:15:15.230",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Una vulnerabilidad de cross site scripting (XSS) en Emlog Pro v2.5.4 permite a los atacantes ejecutar secuencias de comandos web o HTML arbitrarios mediante la inyecci\u00f3n de un payload manipulado en la funci\u00f3n postStrVar en article_save.php."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
|
||||
"baseScore": 5.1,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.5,
|
||||
"impactScore": 2.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://emlogpro.com",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-26465",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2025-02-18T19:15:29.230",
|
||||
"lastModified": "2025-02-28T13:15:28.343",
|
||||
"lastModified": "2025-03-03T18:15:40.247",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -108,6 +108,14 @@
|
||||
"url": "https://www.theregister.com/2025/02/18/openssh_vulnerabilities_mitm_dos/",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
},
|
||||
{
|
||||
"url": "https://www.vicarius.io/vsociety/posts/cve-2025-26465-detect-vulnerable-openssh",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
},
|
||||
{
|
||||
"url": "https://www.vicarius.io/vsociety/posts/cve-2025-26465-mitigate-vulnerable-openssh",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
},
|
||||
{
|
||||
"url": "https://seclists.org/oss-sec/2025/q1/144",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-27094",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-03-03T16:15:43.023",
|
||||
"lastModified": "2025-03-03T16:15:43.023",
|
||||
"lastModified": "2025-03-03T17:15:15.433",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -38,7 +38,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -59,6 +59,10 @@
|
||||
{
|
||||
"url": "https://tuleap.net/plugins/tracker/?aid=41849",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://tuleap.net/plugins/tracker/?aid=41849",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-27099",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-03-03T16:15:43.173",
|
||||
"lastModified": "2025-03-03T16:15:43.173",
|
||||
"lastModified": "2025-03-03T17:15:15.533",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -38,7 +38,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -63,6 +63,10 @@
|
||||
{
|
||||
"url": "https://tuleap.net/plugins/tracker/?aid=41858",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://tuleap.net/plugins/tracker/?aid=41858",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
64
CVE-2025/CVE-2025-273xx/CVE-2025-27370.json
Normal file
64
CVE-2025/CVE-2025-273xx/CVE-2025-27370.json
Normal file
@ -0,0 +1,64 @@
|
||||
{
|
||||
"id": "CVE-2025-27370",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-03-03T18:15:40.650",
|
||||
"lastModified": "2025-03-03T18:15:40.650",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "OpenID Connect Core through 1.0 errata set 2 allows audience injection in certain situations. When the private_key_jwt authentication mechanism is used, a malicious Authorization Server could trick a Client into writing attacker-controlled values into the audience, including token endpoints or issuer identifiers of other Authorization Servers. The malicious Authorization Server could then use these private key JWTs to impersonate the Client."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cve@mitre.org",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:H/A:N",
|
||||
"baseScore": 6.9,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.6,
|
||||
"impactScore": 4.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cve@mitre.org",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-863"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://openid.net/notice-of-a-security-vulnerability/",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://openid.net/wp-content/uploads/2025/01/OIDF-Responsible-Disclosure-Notice-on-Security-Vulnerability-for-private_key_jwt.pdf",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://talks.secworkshop.events/osw2025/talk/R8D9BS/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
64
CVE-2025/CVE-2025-273xx/CVE-2025-27371.json
Normal file
64
CVE-2025/CVE-2025-273xx/CVE-2025-27371.json
Normal file
@ -0,0 +1,64 @@
|
||||
{
|
||||
"id": "CVE-2025-27371",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-03-03T18:15:40.850",
|
||||
"lastModified": "2025-03-03T18:15:40.850",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In certain IETF OAuth 2.0-related specifications, when the JSON Web Token Profile for OAuth 2.0 Client Authentication mechanism is used, there are ambiguities in the audience values of JWTs sent to authorization servers. The affected RFCs may include RFC 7523, and also RFC 7521, RFC 7522, RFC 9101 (JAR), and RFC 9126 (PAR)."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cve@mitre.org",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:H/A:N",
|
||||
"baseScore": 6.9,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.6,
|
||||
"impactScore": 4.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cve@mitre.org",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-863"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://openid.net/notice-of-a-security-vulnerability/",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://openid.net/wp-content/uploads/2025/01/OIDF-Responsible-Disclosure-Notice-on-Security-Vulnerability-for-private_key_jwt.pdf",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://talks.secworkshop.events/osw2025/talk/R8D9BS/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
64
CVE-2025/CVE-2025-274xx/CVE-2025-27421.json
Normal file
64
CVE-2025/CVE-2025-274xx/CVE-2025-27421.json
Normal file
@ -0,0 +1,64 @@
|
||||
{
|
||||
"id": "CVE-2025-27421",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-03-03T17:15:15.630",
|
||||
"lastModified": "2025-03-03T17:15:15.630",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Abacus is a highly scalable and stateless counting API. A critical goroutine leak vulnerability has been identified in the Abacus server's Server-Sent Events (SSE) implementation. The issue occurs when clients disconnect from the /stream endpoint, as the server fails to properly clean up resources and terminate associated goroutines. This leads to resource exhaustion where the server continues running but eventually stops accepting new SSE connections while maintaining high memory usage. The vulnerability specifically involves improper channel cleanup in the event handling mechanism, causing goroutines to remain blocked indefinitely. This vulnerability is fixed in 1.4.0."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-400"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-772"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/JasonLovesDoggo/abacus/commit/898ff1204e11317cc161240b660e63eed5a72b33",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/JasonLovesDoggo/abacus/security/advisories/GHSA-vh64-54px-qgf8",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2025/CVE-2025-274xx/CVE-2025-27422.json
Normal file
60
CVE-2025/CVE-2025-274xx/CVE-2025-27422.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2025-27422",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-03-03T17:15:15.787",
|
||||
"lastModified": "2025-03-03T17:15:15.787",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "FACTION is a PenTesting Report Generation and Collaboration Framework. Authentication is bypassed when an attacker registers a new user with admin privileges. This is possible at any time without any authorization. The request must follow the validation rules (no missing information, secure password, etc) but there are no other controls stopping them. This vulnerability is fixed in 1.4.3."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-287"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/factionsecurity/faction/commit/0a6848d388d6dba1c81918cce2772b1e805cd3d6",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/factionsecurity/faction/security/advisories/GHSA-97cv-f342-v2jc",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
64
CVE-2025/CVE-2025-274xx/CVE-2025-27423.json
Normal file
64
CVE-2025/CVE-2025-274xx/CVE-2025-27423.json
Normal file
@ -0,0 +1,64 @@
|
||||
{
|
||||
"id": "CVE-2025-27423",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-03-03T17:15:15.943",
|
||||
"lastModified": "2025-03-03T17:15:15.943",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Vim is an open source, command line text editor. Vim is distributed with the tar.vim plugin, that allows easy editing and viewing of (compressed or uncompressed) tar files. Starting with 9.1.0858, the tar.vim plugin uses the \":read\" ex command line to append below the cursor position, however the is not sanitized and is taken literally from the tar archive. This allows to execute shell commands via special crafted tar archives. Whether this really happens, depends on the shell being used ('shell' option, which is set using $SHELL). The issue has been fixed as of Vim patch v9.1.1164"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-77"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/vim/vim/commit/129a8446d23cd9cb4445fcfea259cba5e0487d29",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/vim/vim/commit/334a13bff78aa0ad206bc436885f63e3a0bab399",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/vim/vim/security/advisories/GHSA-wfmf-8626-q3r3",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
82
CVE-2025/CVE-2025-274xx/CVE-2025-27498.json
Normal file
82
CVE-2025/CVE-2025-274xx/CVE-2025-27498.json
Normal file
@ -0,0 +1,82 @@
|
||||
{
|
||||
"id": "CVE-2025-27498",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-03-03T17:15:16.443",
|
||||
"lastModified": "2025-03-03T17:15:16.443",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "aes-gcm is a pure Rust implementation of the AES-GCM. In decrypt_in_place_detached, the decrypted ciphertext (which is the correct ciphertext) is exposed even if the tag is incorrect. This is because in decrypt_inplace in asconcore.rs, tag verification causes an error to be returned with the plaintext contents still in buffer. The vulnerability is fixed in 0.4.3."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:A/VC:L/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 5.6,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "HIGH",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "ACTIVE",
|
||||
"vulnConfidentialityImpact": "LOW",
|
||||
"vulnIntegrityImpact": "HIGH",
|
||||
"vulnAvailabilityImpact": "NONE",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-347"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/RustCrypto/AEADs/commit/d1d749ba57e38e65b0e037cd744d0b17f7254037",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/RustCrypto/AEADs/security/advisories/GHSA-r38m-44fw-h886",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
106
README.md
106
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2025-03-03T17:00:20.839150+00:00
|
||||
2025-03-03T19:00:20.497556+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2025-03-03T16:40:55.250000+00:00
|
||||
2025-03-03T18:15:40.850000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,65 +33,69 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
283909
|
||||
283936
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `21`
|
||||
Recently added CVEs: `27`
|
||||
|
||||
- [CVE-2024-41770](CVE-2024/CVE-2024-417xx/CVE-2024-41770.json) (`2025-03-03T16:15:37.853`)
|
||||
- [CVE-2024-41771](CVE-2024/CVE-2024-417xx/CVE-2024-41771.json) (`2025-03-03T16:15:38.007`)
|
||||
- [CVE-2024-43169](CVE-2024/CVE-2024-431xx/CVE-2024-43169.json) (`2025-03-03T16:15:38.157`)
|
||||
- [CVE-2024-45779](CVE-2024/CVE-2024-457xx/CVE-2024-45779.json) (`2025-03-03T15:15:14.660`)
|
||||
- [CVE-2024-45780](CVE-2024/CVE-2024-457xx/CVE-2024-45780.json) (`2025-03-03T15:15:14.950`)
|
||||
- [CVE-2024-55532](CVE-2024/CVE-2024-555xx/CVE-2024-55532.json) (`2025-03-03T16:15:38.777`)
|
||||
- [CVE-2024-55570](CVE-2024/CVE-2024-555xx/CVE-2024-55570.json) (`2025-03-03T16:15:38.900`)
|
||||
- [CVE-2024-8261](CVE-2024/CVE-2024-82xx/CVE-2024-8261.json) (`2025-03-03T15:15:15.820`)
|
||||
- [CVE-2024-8262](CVE-2024/CVE-2024-82xx/CVE-2024-8262.json) (`2025-03-03T15:15:15.990`)
|
||||
- [CVE-2025-0555](CVE-2025/CVE-2025-05xx/CVE-2025-0555.json) (`2025-03-03T16:15:39.227`)
|
||||
- [CVE-2025-0689](CVE-2025/CVE-2025-06xx/CVE-2025-0689.json) (`2025-03-03T15:15:16.147`)
|
||||
- [CVE-2025-1125](CVE-2025/CVE-2025-11xx/CVE-2025-1125.json) (`2025-03-03T15:15:16.300`)
|
||||
- [CVE-2025-1801](CVE-2025/CVE-2025-18xx/CVE-2025-1801.json) (`2025-03-03T15:15:16.500`)
|
||||
- [CVE-2025-24023](CVE-2025/CVE-2025-240xx/CVE-2025-24023.json) (`2025-03-03T16:15:41.820`)
|
||||
- [CVE-2025-25185](CVE-2025/CVE-2025-251xx/CVE-2025-25185.json) (`2025-03-03T16:15:42.377`)
|
||||
- [CVE-2025-27094](CVE-2025/CVE-2025-270xx/CVE-2025-27094.json) (`2025-03-03T16:15:43.023`)
|
||||
- [CVE-2025-27099](CVE-2025/CVE-2025-270xx/CVE-2025-27099.json) (`2025-03-03T16:15:43.173`)
|
||||
- [CVE-2025-27417](CVE-2025/CVE-2025-274xx/CVE-2025-27417.json) (`2025-03-03T16:15:43.820`)
|
||||
- [CVE-2025-27418](CVE-2025/CVE-2025-274xx/CVE-2025-27418.json) (`2025-03-03T16:15:43.960`)
|
||||
- [CVE-2025-27419](CVE-2025/CVE-2025-274xx/CVE-2025-27419.json) (`2025-03-03T16:15:44.090`)
|
||||
- [CVE-2025-27420](CVE-2025/CVE-2025-274xx/CVE-2025-27420.json) (`2025-03-03T16:15:44.223`)
|
||||
- [CVE-2024-45782](CVE-2024/CVE-2024-457xx/CVE-2024-45782.json) (`2025-03-03T17:15:12.900`)
|
||||
- [CVE-2024-51091](CVE-2024/CVE-2024-510xx/CVE-2024-51091.json) (`2025-03-03T18:15:29.523`)
|
||||
- [CVE-2024-53384](CVE-2024/CVE-2024-533xx/CVE-2024-53384.json) (`2025-03-03T18:15:29.670`)
|
||||
- [CVE-2024-53387](CVE-2024/CVE-2024-533xx/CVE-2024-53387.json) (`2025-03-03T17:15:13.050`)
|
||||
- [CVE-2024-53388](CVE-2024/CVE-2024-533xx/CVE-2024-53388.json) (`2025-03-03T17:15:13.167`)
|
||||
- [CVE-2024-57240](CVE-2024/CVE-2024-572xx/CVE-2024-57240.json) (`2025-03-03T17:15:13.320`)
|
||||
- [CVE-2025-0285](CVE-2025/CVE-2025-02xx/CVE-2025-0285.json) (`2025-03-03T17:15:13.430`)
|
||||
- [CVE-2025-0286](CVE-2025/CVE-2025-02xx/CVE-2025-0286.json) (`2025-03-03T17:15:13.537`)
|
||||
- [CVE-2025-0287](CVE-2025/CVE-2025-02xx/CVE-2025-0287.json) (`2025-03-03T17:15:13.710`)
|
||||
- [CVE-2025-0288](CVE-2025/CVE-2025-02xx/CVE-2025-0288.json) (`2025-03-03T17:15:13.823`)
|
||||
- [CVE-2025-0289](CVE-2025/CVE-2025-02xx/CVE-2025-0289.json) (`2025-03-03T17:15:13.943`)
|
||||
- [CVE-2025-0678](CVE-2025/CVE-2025-06xx/CVE-2025-0678.json) (`2025-03-03T17:15:14.053`)
|
||||
- [CVE-2025-0684](CVE-2025/CVE-2025-06xx/CVE-2025-0684.json) (`2025-03-03T18:15:30.537`)
|
||||
- [CVE-2025-0685](CVE-2025/CVE-2025-06xx/CVE-2025-0685.json) (`2025-03-03T18:15:30.733`)
|
||||
- [CVE-2025-0686](CVE-2025/CVE-2025-06xx/CVE-2025-0686.json) (`2025-03-03T18:15:30.930`)
|
||||
- [CVE-2025-1876](CVE-2025/CVE-2025-18xx/CVE-2025-1876.json) (`2025-03-03T17:15:14.517`)
|
||||
- [CVE-2025-25301](CVE-2025/CVE-2025-253xx/CVE-2025-25301.json) (`2025-03-03T17:15:14.740`)
|
||||
- [CVE-2025-25302](CVE-2025/CVE-2025-253xx/CVE-2025-25302.json) (`2025-03-03T17:15:14.920`)
|
||||
- [CVE-2025-25303](CVE-2025/CVE-2025-253xx/CVE-2025-25303.json) (`2025-03-03T17:15:15.073`)
|
||||
- [CVE-2025-27370](CVE-2025/CVE-2025-273xx/CVE-2025-27370.json) (`2025-03-03T18:15:40.650`)
|
||||
- [CVE-2025-27371](CVE-2025/CVE-2025-273xx/CVE-2025-27371.json) (`2025-03-03T18:15:40.850`)
|
||||
- [CVE-2025-27421](CVE-2025/CVE-2025-274xx/CVE-2025-27421.json) (`2025-03-03T17:15:15.630`)
|
||||
- [CVE-2025-27422](CVE-2025/CVE-2025-274xx/CVE-2025-27422.json) (`2025-03-03T17:15:15.787`)
|
||||
- [CVE-2025-27423](CVE-2025/CVE-2025-274xx/CVE-2025-27423.json) (`2025-03-03T17:15:15.943`)
|
||||
- [CVE-2025-27498](CVE-2025/CVE-2025-274xx/CVE-2025-27498.json) (`2025-03-03T17:15:16.443`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `37`
|
||||
Recently modified CVEs: `52`
|
||||
|
||||
- [CVE-2024-2531](CVE-2024/CVE-2024-25xx/CVE-2024-2531.json) (`2025-03-03T16:40:55.250`)
|
||||
- [CVE-2024-2533](CVE-2024/CVE-2024-25xx/CVE-2024-2533.json) (`2025-03-03T16:40:55.250`)
|
||||
- [CVE-2024-2534](CVE-2024/CVE-2024-25xx/CVE-2024-2534.json) (`2025-03-03T16:40:55.250`)
|
||||
- [CVE-2024-2535](CVE-2024/CVE-2024-25xx/CVE-2024-2535.json) (`2025-03-03T16:40:55.250`)
|
||||
- [CVE-2024-3003](CVE-2024/CVE-2024-30xx/CVE-2024-3003.json) (`2025-03-03T16:20:59.253`)
|
||||
- [CVE-2024-3004](CVE-2024/CVE-2024-30xx/CVE-2024-3004.json) (`2025-03-03T16:20:59.253`)
|
||||
- [CVE-2024-5048](CVE-2024/CVE-2024-50xx/CVE-2024-5048.json) (`2025-03-03T16:25:24.627`)
|
||||
- [CVE-2024-5064](CVE-2024/CVE-2024-50xx/CVE-2024-5064.json) (`2025-03-03T16:11:16.720`)
|
||||
- [CVE-2024-5065](CVE-2024/CVE-2024-50xx/CVE-2024-5065.json) (`2025-03-03T16:11:16.720`)
|
||||
- [CVE-2024-5066](CVE-2024/CVE-2024-50xx/CVE-2024-5066.json) (`2025-03-03T16:11:16.720`)
|
||||
- [CVE-2024-54957](CVE-2024/CVE-2024-549xx/CVE-2024-54957.json) (`2025-03-03T16:15:38.450`)
|
||||
- [CVE-2024-55160](CVE-2024/CVE-2024-551xx/CVE-2024-55160.json) (`2025-03-03T16:15:38.617`)
|
||||
- [CVE-2024-6653](CVE-2024/CVE-2024-66xx/CVE-2024-6653.json) (`2025-03-03T16:25:24.627`)
|
||||
- [CVE-2025-0339](CVE-2025/CVE-2025-03xx/CVE-2025-0339.json) (`2025-03-03T16:25:24.627`)
|
||||
- [CVE-2025-1170](CVE-2025/CVE-2025-11xx/CVE-2025-1170.json) (`2025-03-03T16:25:24.627`)
|
||||
- [CVE-2025-1576](CVE-2025/CVE-2025-15xx/CVE-2025-1576.json) (`2025-03-03T16:25:24.627`)
|
||||
- [CVE-2025-1577](CVE-2025/CVE-2025-15xx/CVE-2025-1577.json) (`2025-03-03T16:25:24.627`)
|
||||
- [CVE-2025-1716](CVE-2025/CVE-2025-17xx/CVE-2025-1716.json) (`2025-03-03T16:15:39.520`)
|
||||
- [CVE-2025-20647](CVE-2025/CVE-2025-206xx/CVE-2025-20647.json) (`2025-03-03T15:15:16.880`)
|
||||
- [CVE-2025-22211](CVE-2025/CVE-2025-222xx/CVE-2025-22211.json) (`2025-03-03T16:15:39.843`)
|
||||
- [CVE-2025-22952](CVE-2025/CVE-2025-229xx/CVE-2025-22952.json) (`2025-03-03T16:15:40.010`)
|
||||
- [CVE-2025-24428](CVE-2025/CVE-2025-244xx/CVE-2025-24428.json) (`2025-03-03T15:31:07.747`)
|
||||
- [CVE-2025-24429](CVE-2025/CVE-2025-244xx/CVE-2025-24429.json) (`2025-03-03T15:31:07.747`)
|
||||
- [CVE-2025-24430](CVE-2025/CVE-2025-244xx/CVE-2025-24430.json) (`2025-03-03T15:31:07.747`)
|
||||
- [CVE-2025-24432](CVE-2025/CVE-2025-244xx/CVE-2025-24432.json) (`2025-03-03T15:31:07.747`)
|
||||
- [CVE-2025-1168](CVE-2025/CVE-2025-11xx/CVE-2025-1168.json) (`2025-03-03T16:52:20.953`)
|
||||
- [CVE-2025-1169](CVE-2025/CVE-2025-11xx/CVE-2025-1169.json) (`2025-03-03T16:52:20.953`)
|
||||
- [CVE-2025-1179](CVE-2025/CVE-2025-11xx/CVE-2025-1179.json) (`2025-03-03T16:52:20.953`)
|
||||
- [CVE-2025-1244](CVE-2025/CVE-2025-12xx/CVE-2025-1244.json) (`2025-03-03T18:15:31.307`)
|
||||
- [CVE-2025-1829](CVE-2025/CVE-2025-18xx/CVE-2025-1829.json) (`2025-03-03T18:15:31.937`)
|
||||
- [CVE-2025-1831](CVE-2025/CVE-2025-18xx/CVE-2025-1831.json) (`2025-03-03T18:15:32.520`)
|
||||
- [CVE-2025-1832](CVE-2025/CVE-2025-18xx/CVE-2025-1832.json) (`2025-03-03T18:15:32.950`)
|
||||
- [CVE-2025-1833](CVE-2025/CVE-2025-18xx/CVE-2025-1833.json) (`2025-03-03T18:15:33.763`)
|
||||
- [CVE-2025-1843](CVE-2025/CVE-2025-18xx/CVE-2025-1843.json) (`2025-03-03T18:15:34.290`)
|
||||
- [CVE-2025-1844](CVE-2025/CVE-2025-18xx/CVE-2025-1844.json) (`2025-03-03T18:15:34.773`)
|
||||
- [CVE-2025-1845](CVE-2025/CVE-2025-18xx/CVE-2025-1845.json) (`2025-03-03T18:15:35.840`)
|
||||
- [CVE-2025-1846](CVE-2025/CVE-2025-18xx/CVE-2025-1846.json) (`2025-03-03T18:15:36.340`)
|
||||
- [CVE-2025-1847](CVE-2025/CVE-2025-18xx/CVE-2025-1847.json) (`2025-03-03T18:15:36.537`)
|
||||
- [CVE-2025-1848](CVE-2025/CVE-2025-18xx/CVE-2025-1848.json) (`2025-03-03T18:15:36.720`)
|
||||
- [CVE-2025-1849](CVE-2025/CVE-2025-18xx/CVE-2025-1849.json) (`2025-03-03T18:15:36.893`)
|
||||
- [CVE-2025-1850](CVE-2025/CVE-2025-18xx/CVE-2025-1850.json) (`2025-03-03T18:15:37.077`)
|
||||
- [CVE-2025-1851](CVE-2025/CVE-2025-18xx/CVE-2025-1851.json) (`2025-03-03T18:15:37.277`)
|
||||
- [CVE-2025-1852](CVE-2025/CVE-2025-18xx/CVE-2025-1852.json) (`2025-03-03T18:15:37.447`)
|
||||
- [CVE-2025-21155](CVE-2025/CVE-2025-211xx/CVE-2025-21155.json) (`2025-03-03T16:52:20.953`)
|
||||
- [CVE-2025-22738](CVE-2025/CVE-2025-227xx/CVE-2025-22738.json) (`2025-03-03T17:42:59.740`)
|
||||
- [CVE-2025-25791](CVE-2025/CVE-2025-257xx/CVE-2025-25791.json) (`2025-03-03T18:15:40.030`)
|
||||
- [CVE-2025-25818](CVE-2025/CVE-2025-258xx/CVE-2025-25818.json) (`2025-03-03T17:15:15.230`)
|
||||
- [CVE-2025-26465](CVE-2025/CVE-2025-264xx/CVE-2025-26465.json) (`2025-03-03T18:15:40.247`)
|
||||
- [CVE-2025-27094](CVE-2025/CVE-2025-270xx/CVE-2025-27094.json) (`2025-03-03T17:15:15.433`)
|
||||
- [CVE-2025-27099](CVE-2025/CVE-2025-270xx/CVE-2025-27099.json) (`2025-03-03T17:15:15.533`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
237
_state.csv
237
_state.csv
@ -126416,7 +126416,7 @@ CVE-2018-8635,0,0,2fa77610eae5127b69b72c8cd0c818352e2543174d574fb2deef54909e4fd4
|
||||
CVE-2018-8636,0,0,432a07941e0899dcde198ff4f6249981610b9fb745921cfa04dab18ffc106851,2024-11-21T04:14:09.333000
|
||||
CVE-2018-8637,0,0,14830137fe8bbc02788d245c16f9474c23cdbb327541d997f923df2c03a74013,2024-11-21T04:14:09.450000
|
||||
CVE-2018-8638,0,0,b65222b6ab3c08a5318c5cfa087d17966ae608ccda1cc49c66b47d657073eba3,2024-11-21T04:14:09.573000
|
||||
CVE-2018-8639,0,1,26e81bcdc0dd6fccd292eebc08d51db2c952691c33d061a24396c110eb4770aa,2025-03-03T16:15:36.493000
|
||||
CVE-2018-8639,0,0,26e81bcdc0dd6fccd292eebc08d51db2c952691c33d061a24396c110eb4770aa,2025-03-03T16:15:36.493000
|
||||
CVE-2018-8641,0,0,a43394ac0283961ddab14e82a4299cbf7b8ac31c65f3064c1f9d8590d867ced2,2024-11-21T04:14:09.823000
|
||||
CVE-2018-8643,0,0,bb7f45a85641f4ae4900e37b2faa285774a0d13729ca5f355b4cb6670454fe5d,2024-11-21T04:14:09.953000
|
||||
CVE-2018-8649,0,0,c268dba9f2f7c15df48853255b474b1824af0b9b7086e1ed7148f8b0f4c9ee76,2024-11-21T04:14:10.080000
|
||||
@ -187409,11 +187409,11 @@ CVE-2021-47161,0,0,76dd3822df5b653cc5b3533e2932b27b97e30a870e1e54b596d0168afab1c
|
||||
CVE-2021-47162,0,0,6600fbe6f8b1cc517f1a975156019fa2f78220e0ad1b235c249d5b7a9ea903ad,2024-11-21T06:35:31.717000
|
||||
CVE-2021-47163,0,0,a06ed223386e63a8ac14caa534dcb3ad375e47473849992ae6bb2f995b5ca751,2024-11-21T06:35:31.853000
|
||||
CVE-2021-47164,0,0,5f23854b4f099fb6fdac7718ce7e13674f7549368640ba9489dcff1f7fab1462,2024-11-21T06:35:31.987000
|
||||
CVE-2021-47165,0,0,09d8e52a7ef3c0caf5025856dd3a2534980d562c1d0b455dbaca9ae5f446ecfc,2024-11-21T06:35:32.130000
|
||||
CVE-2021-47165,0,1,f1fc50e90c322221d19dbc186e02f7bf0409c8bc78bac039bc2970c66bf19a10,2025-03-03T17:33:19.643000
|
||||
CVE-2021-47166,0,0,9feca83df845984b5de93af8efb875dc8aa408f0068657d03229fa12e7ec4b5c,2024-11-21T06:35:32.270000
|
||||
CVE-2021-47167,0,0,ad90752669d7bf1ca0a11528407fa915ec3859e188b9c48a12c90484211f21be,2024-11-21T06:35:32.403000
|
||||
CVE-2021-47168,0,0,49217aa6aa129593c320b00aef3e691a32c4b6de37ab951687c028cdded799e0,2024-11-21T06:35:32.533000
|
||||
CVE-2021-47169,0,0,b53597b3859ea18d852db712d7bdb4dd31d8bc472ab36aae169feadc34c24a86,2024-11-21T06:35:32.660000
|
||||
CVE-2021-47169,0,1,25666f16fd01c6bd8d092094f4c0639847fee0de4acf6771b18e77a87876ee67,2025-03-03T17:33:19.643000
|
||||
CVE-2021-47170,0,0,eebe8891c62ff697aec84868114988a0a88f21bc806abbc9a9a885d993a7de9e,2024-11-21T06:35:32.790000
|
||||
CVE-2021-47171,0,0,53f9efba59fa2e2383ad5139a1ec5849f84c59bcb80640d33ac39a94bd1d81f1,2024-11-21T06:35:32.923000
|
||||
CVE-2021-47172,0,0,d828888ed8ef79257f45aee96101e886d726fa717d11fd369327fc396e922a4a,2024-11-21T06:35:33.073000
|
||||
@ -220981,7 +220981,7 @@ CVE-2023-26072,0,0,9d71983155b48b93297e485003e5f4e2c8c9af23e3b1c25eaac392689190d
|
||||
CVE-2023-26073,0,0,09741fb39b8701f0e3ef5d6844c8639a00c99dafca00486c4a66b5d1ea134140,2024-11-21T07:50:43.503000
|
||||
CVE-2023-26074,0,0,092c9a1c1dbd0756517e1ac3fb0f8ee7d519a46f4fb62e08023ac22b64cc30d2,2024-11-21T07:50:43.673000
|
||||
CVE-2023-26075,0,0,ff56d1a9f5f2d9fc61a036599ac8d07140c88c5af679a7e3e6771a54d2337e43,2025-02-27T21:15:18.510000
|
||||
CVE-2023-26076,0,0,cc79ad1657f1a0a12157aedefda72150ee83bc945d53abb684ae16e9c2b8a0ae,2024-11-21T07:50:44.053000
|
||||
CVE-2023-26076,0,1,e30c665235ca223c424307e1a3ca76b40dd12c9b5c65ef27ce1ef2b364bad901,2025-03-03T18:15:27.330000
|
||||
CVE-2023-26077,0,0,82651bffd17201218473c387a66287ae68908d2c8c6a570401ca6c223517eea4,2024-11-21T07:50:44.210000
|
||||
CVE-2023-26078,0,0,c3d7804ef5c232ff215416da75bb0ae90c43cc41842850d8baa070dc2dad30ac,2024-11-21T07:50:44.370000
|
||||
CVE-2023-2608,0,0,15173476a57029e92a741b7bdf1508ad449142c8f8a5f0a3a32a4f190bbdec6c,2024-11-21T07:58:55.437000
|
||||
@ -221603,7 +221603,7 @@ CVE-2023-26949,0,0,2c6b8148ef5efe785cdb1d1c73e6f72cf00cd8df8a95fe5cd7fd83b5c450e
|
||||
CVE-2023-2695,0,0,1a03e6ccf425b7efab4b2b3d34d6ccd4c483f382d13af42c5c783fbc5e3e288c,2024-11-21T07:59:06.173000
|
||||
CVE-2023-26950,0,0,776d2f7b141aebc20febebface8c5cc1214b6003cf0611b92d93d7ca6b16e7ba,2024-11-21T07:52:05.960000
|
||||
CVE-2023-26951,0,0,e1adc49b9103f912e0f2aa00fe9d939d9cab78c809f7f4a57db4e408eaae3d8c,2024-11-21T07:52:06.123000
|
||||
CVE-2023-26952,0,1,9a77e11b71d30a33fc14ddb60eb3c430a4af1c5011ff90903a5c4573a4441c86,2025-03-03T16:15:37.590000
|
||||
CVE-2023-26952,0,0,9a77e11b71d30a33fc14ddb60eb3c430a4af1c5011ff90903a5c4573a4441c86,2025-03-03T16:15:37.590000
|
||||
CVE-2023-26953,0,0,a744baada54f853b994febf277396e18887bac247f3d83fd721e1a19f7695965,2024-11-21T07:52:06.437000
|
||||
CVE-2023-26954,0,0,25be800d2a27b5a2697c9d918f8a2349a547ae4f9a78abb00c6ceaad8c48b070,2024-11-21T07:52:06.593000
|
||||
CVE-2023-26955,0,0,b8f41864dbe1598322641771160d9e7a2e547f6259bb94db906df77dcc968550,2024-11-21T07:52:06.740000
|
||||
@ -221638,7 +221638,7 @@ CVE-2023-27000,0,0,e7632f817e61d8a12de30f7cfd641dc1805aa79e66ef1ddb4d0513ee23d48
|
||||
CVE-2023-27001,0,0,3ac29dffc9689e6b71694979be6cfa0bad2c5d91addbadb78a74143a10316adc,2024-11-21T07:52:10.427000
|
||||
CVE-2023-27008,0,0,1025aac055231396c7c04d404864dcb2609774418612e6608c48001f9e020623,2025-02-18T21:15:15
|
||||
CVE-2023-2701,0,0,359ca3cd85c5ad292c6eb2e38c8d6f254861fc7eec8105a5b114d5cb8ef3d322,2024-11-21T07:59:06.923000
|
||||
CVE-2023-27010,0,0,9ec2689a56d9a51f6035a2f37afcde9da7bf8e824dcb8cac3c33623f06dfcf40,2024-11-21T07:52:10.720000
|
||||
CVE-2023-27010,0,1,745a49b1c5716222865a934c6a0267c8e324416df9583e99aaef3e0918f09419,2025-03-03T17:15:10.880000
|
||||
CVE-2023-27012,0,0,8fb65310570a50514b75afe7000e6e9ef36a598183353ee72217dda16108e491,2025-02-12T20:15:32.317000
|
||||
CVE-2023-27013,0,0,1604c38b98312bcac4b2d79a7158aae9f9527f7b5271c3d76f6415940eb26348,2025-02-12T20:15:32.477000
|
||||
CVE-2023-27014,0,0,a32a81fd3c7dcb00ad93453db64e871c651a593ef7078ef0bc276a1e49f4801f,2025-02-12T20:15:32.640000
|
||||
@ -238555,6 +238555,7 @@ CVE-2023-49028,0,0,1fe6cffd82021764ce68fd3a53c4875910ce33e674fe2677a56e372e5a7b2
|
||||
CVE-2023-49029,0,0,c614567def59347336438740b811220368c65599cc4c871c14425dc96c92f919,2024-11-21T08:32:42.833000
|
||||
CVE-2023-4903,0,0,4e15f764aaa4b079f24341cacdb9f278af35d9bba3f5d8eb18a330cc8e32e94b,2024-11-21T08:36:13.627000
|
||||
CVE-2023-49030,0,0,05a1c83003c2661094ba87a267d63d6f1ebc1176bdaa7cc3b41d9bda2fa7cad0,2024-11-21T08:32:42.990000
|
||||
CVE-2023-49031,1,1,701f12fe4b4ed942bc1b9e2b2bc62466e80497326b3c152997ffb8bc7eca6f0c,2025-03-03T18:15:28.330000
|
||||
CVE-2023-49032,0,0,bf0051df9f823bcff03622a71e492c2e2c8f0b2e1823ce4c4a928e1018ed932e,2024-11-21T08:32:43.220000
|
||||
CVE-2023-49034,0,0,1d1efe3d808290b90ce8e37a8c591816f90907f686b935dadde78588546b498b,2024-11-21T08:32:43.363000
|
||||
CVE-2023-49038,0,0,c9ba25652a66916f2762c9c471fc85f429fa7f7f0cea2238a2047f0c789b591f,2024-11-21T08:32:43.590000
|
||||
@ -238754,7 +238755,7 @@ CVE-2023-49253,0,0,6bcc1caa4fe1d5c3fb930e1e6d020cd5af57d2e223b7cbb7cd40bd8b4d0fe
|
||||
CVE-2023-49254,0,0,a445b0f6ae60f2a245881debdbe67f95e0164deb25a5fc48870fb7ac271514fd,2024-11-21T08:33:07.753000
|
||||
CVE-2023-49255,0,0,be1a86a7ebe6cb806c0e930c172298693eeb28b862f6d586da20eb0e6d65bdee,2024-11-21T08:33:07.887000
|
||||
CVE-2023-49256,0,0,fff3d693d0a8b193751618615483e39254622d7ab4a90cb947bccce2afd3ac77,2024-11-21T08:33:08.020000
|
||||
CVE-2023-49257,0,0,4237cf13461234b7f051ac2fadb9014d2cf363ba2904bb92638a856ed3b6b363,2024-11-21T08:33:08.160000
|
||||
CVE-2023-49257,0,1,54ad6ba0bc630625b0d5652f7d642002aac152a755f3cb3c12d2224b524c8ac0,2025-03-03T18:15:28.480000
|
||||
CVE-2023-49258,0,0,d7e58c6a3363f56f570266892ee4f64dc7320b8854779a72f83922532b52a158,2024-11-21T08:33:08.297000
|
||||
CVE-2023-49259,0,0,e6244212b1909acee79666099d746c8f2782df1d6d7e2a3deb92b50aa1d48a86,2024-11-21T08:33:08.450000
|
||||
CVE-2023-4926,0,0,a48ef158a7272869542d1ef25731d510dff8d9f79e54c406506be9432559e2ad,2024-11-21T08:36:16.977000
|
||||
@ -239257,7 +239258,7 @@ CVE-2023-49965,0,0,bbbb4e195b10642bbe570fdd2635d5b00de86015f5ea2d7e57560f5a41f76
|
||||
CVE-2023-49967,0,0,7455fad67fada8a71e63581ef71704562d617d7986216f8b4aed77f63a5a1ef2,2024-11-21T08:34:06.340000
|
||||
CVE-2023-49968,0,0,e27c0d39fec3cc8d78cbcdbda5600060aa4aa6025ea7df0c05b60635677b9f80,2024-11-21T08:34:06.490000
|
||||
CVE-2023-49969,0,0,1c6e721c03f56e0577536da9bf5b7c5c7b3559914e0b7dbdfb0a379adc55a5d7,2024-11-21T08:34:06.703000
|
||||
CVE-2023-4997,0,0,475f97ad537cb2a688ee3a3694348f3bbddf51b9273b93864aad9a10fd2fce5e,2024-11-21T08:36:25.793000
|
||||
CVE-2023-4997,0,1,4fe9a3ee9fae40bbb6d40dfd328b8595f2fd5fbfb2596c65f27ae22282aa5cb0,2025-03-03T17:15:11.153000
|
||||
CVE-2023-49970,0,0,b6b21cd662c6188652027dde752dfbe4d17bfefd4a2e3df151e2c3955d71ee50,2024-11-21T08:34:06.910000
|
||||
CVE-2023-49971,0,0,df8ebc04397853587b183e5e501cceacb90d46b4cec9e39b49a79d04bda2daf6,2025-01-15T16:38:44.307000
|
||||
CVE-2023-49973,0,0,0b8457fedb29078695c5eaf42c4bcb75a5f9487ca6a772330139e3edda79513c,2025-01-15T16:38:19.337000
|
||||
@ -244453,7 +244454,7 @@ CVE-2024-10230,0,0,0b6a0fc884e5ae244e576686edf454ca3ce274c75c14a9d5a28d123bec664
|
||||
CVE-2024-10231,0,0,1cdb8518034cbde6323ad37f5ecdbdd8647d8b70c51f5e1314952e0041e1b97b,2024-10-25T17:01:55.633000
|
||||
CVE-2024-10232,0,0,0d56e4d1ad2ea7a2574f878dbfab6b288953236c47236ee86211a53fb0dc2629,2024-11-01T12:57:03.417000
|
||||
CVE-2024-10233,0,0,0f0fa741bc160fc828eb74121d2173934d2af8a73c34c7d13db17f836aa89919,2024-10-29T14:34:04.427000
|
||||
CVE-2024-10234,0,1,1893d17cd41795582a8c43f46483f6ef12bef3fa89cc3bb862ec0381a56f8a8e,2025-03-03T15:15:13.357000
|
||||
CVE-2024-10234,0,0,1893d17cd41795582a8c43f46483f6ef12bef3fa89cc3bb862ec0381a56f8a8e,2025-03-03T15:15:13.357000
|
||||
CVE-2024-10237,0,0,cc60321022b7cb6e5577da8c0f73bbdcebcda7ac9248188a1c24cddff8eea243,2025-02-04T08:15:27.920000
|
||||
CVE-2024-10238,0,0,af3722233a0cb909065d9075279edbedb9fe764eee160ff09f19117c4c052fa2,2025-02-04T08:15:28.280000
|
||||
CVE-2024-10239,0,0,1aeb02b8ba8e9d51182e102b3178de31d842bee8699e4cff348214784dcd3eed,2025-02-04T08:15:28.430000
|
||||
@ -246958,7 +246959,7 @@ CVE-2024-12994,0,0,41373c4d40e1bbb5f2300e236673b238210d40fc5f881d7cbaeba6a415952
|
||||
CVE-2024-12995,0,0,ec2417906e9c84646a2cfbd3e013e0c39f1a4db0cac26074a9d06cf2f93902af,2024-12-28T14:15:22.507000
|
||||
CVE-2024-12996,0,0,6c43766b1ce2636ec36981eeeba47786371be2965a0df2a813c99d297c767f66,2025-01-06T15:15:10.933000
|
||||
CVE-2024-12997,0,0,71092d52f774b0f71c49030eb5b4ba5f2fdddc53fb6fa15623fde6c383daa7f1,2025-01-06T15:15:11.027000
|
||||
CVE-2024-12998,0,1,7c5edb61033bdadf008d6ee07abea3a9b5cf8804ee985e49dc6e03fe12e393aa,2025-03-03T16:25:24.627000
|
||||
CVE-2024-12998,0,0,7c5edb61033bdadf008d6ee07abea3a9b5cf8804ee985e49dc6e03fe12e393aa,2025-03-03T16:25:24.627000
|
||||
CVE-2024-12999,0,0,cef46f50781baf217473f51d55cd419e9cb6a34f142f75461329fcd7fecc83f9,2025-02-18T19:03:01.740000
|
||||
CVE-2024-1300,0,0,cd5e94fcfe97597e01cd14e77d002316d1f6043211ecf00bfd2ed45a32b95c9e,2024-11-25T03:15:10.053000
|
||||
CVE-2024-13000,0,0,bc161add052684ff88735e2b18fbd0186cf4b5d7e82bd795e40644a35f7cfe8c,2025-02-18T19:02:13.137000
|
||||
@ -247099,7 +247100,7 @@ CVE-2024-13145,0,0,5c365a974659bd41337fcb8adb2d8fbc8e9cd8f5a39411bbe19577a7fc11a
|
||||
CVE-2024-13148,0,0,5e62731777939a6cccea414e3b22f75ba2217f43648f57abb338beb059e81dd8,2025-02-27T15:15:38.583000
|
||||
CVE-2024-1315,0,0,ae67b7f13a317bdc1be64b4fdf580a08492423f203ba37c909a5dc9e35687d4a,2025-01-17T17:30:38.363000
|
||||
CVE-2024-13152,0,0,122264645183d9f888de428d629fb2ba29cf302edc1f968441a9e42307fca5f1,2025-02-14T13:15:42.170000
|
||||
CVE-2024-13153,0,0,bde600732fea7e9bd4529fca5c8af47ad8bbffe8707fb32f1115e25622da8b0f,2025-01-09T09:15:07.243000
|
||||
CVE-2024-13153,0,1,6a7ea48b6c8668ba1a47dbcf1a141a7b25a12c4a1f85a5c59e5d5a298d008763,2025-03-03T17:42:59.740000
|
||||
CVE-2024-13154,0,0,8b848cb4ffbbf3d5300b505058bccc136fae4b33341f37a24f40fb8ac9f235ba,2025-01-13T21:15:11.970000
|
||||
CVE-2024-13155,0,0,6682537fa9f5844e5906fbe79fbac9ddfaae9e2af1434030859c114baf0c7e12,2025-02-25T20:23:19.657000
|
||||
CVE-2024-13156,0,0,30f08a5146793529d2149bd8fe28d1d230f7d62ef9b057e2393b31a9d88e81a0,2025-01-14T09:15:20.910000
|
||||
@ -252048,7 +252049,7 @@ CVE-2024-24774,0,0,f6081191014f835b364f01c2d06774fe804398159465de16dc62a59398430
|
||||
CVE-2024-24775,0,0,7f0cbc7d6af894e75c1d6dc5713fcd9f630cd471f82e9ecb0a63fc95da2f7ff6,2025-01-23T19:53:31.737000
|
||||
CVE-2024-24776,0,0,a2f3ec067717ca04fbf18f3a449f632e7089db64e0a17c019f843c8598b0286f,2024-11-21T08:59:40.850000
|
||||
CVE-2024-24777,0,0,c46e7117281fbe7f2ffae8cc271867d3ae614f1ea7039937a5b87028aa4a092b,2024-11-21T08:59:41.007000
|
||||
CVE-2024-24778,0,1,dbd76f970b5a45b04b740724568e322a3c370dfb52b1338fbe33569ac9a7b2cc,2025-03-03T15:15:14.323000
|
||||
CVE-2024-24778,0,1,8e69505cadc4079a45418c71d867e3a3f3dd8b7a21b0499700cd2514fa5e55d4,2025-03-03T18:15:28.933000
|
||||
CVE-2024-24779,0,0,7865ce8073200edcc497f4b351f74becfa65acde228d4f6892cf22addee64a54,2025-02-13T18:17:09.103000
|
||||
CVE-2024-2478,0,0,3c239e842dee9874af5c6211db90ee2eaf9a1e0be73fcbf1799989b16285416b,2025-01-23T19:24:38.173000
|
||||
CVE-2024-24781,0,0,056ec447dbcc83fc2a310224e9277e0a17bd56759c2d803ede35170578118e80,2024-11-21T08:59:41.280000
|
||||
@ -252382,7 +252383,7 @@ CVE-2024-25146,0,0,70580878c7e66c134303e82bf314a0ea51bb4c7efa77286154d103535edb2
|
||||
CVE-2024-25147,0,0,9c971f93dad595a47edb7f4ccdd3d989147ee2c0c3ea302a65f044923ee197f7,2025-01-28T21:25:53.533000
|
||||
CVE-2024-25148,0,0,baaba4bd1038fed5c1e9c1ed403cafba105c20610c41c31a35b866b1248f5d6d,2024-11-21T09:00:21.143000
|
||||
CVE-2024-25149,0,0,c3bee153938ba2820767f603be3339e9a49705623e20e7321fe693091302456b,2024-12-10T23:03:54.853000
|
||||
CVE-2024-2515,0,0,9cd9ac706b4d705f08abc9a17b7951ad446969eff5cd99dc1afcfec778d916b3,2024-11-21T09:09:55.143000
|
||||
CVE-2024-2515,0,1,8703d1f211a0cf75bdaf670bd1e44b4453f13a068639ddb743951bea9bd657c7,2025-03-03T16:40:55.250000
|
||||
CVE-2024-25150,0,0,9beb971424f34e419f2e67ec3339fe7f8ab91aa6b6e1cf1fb61046498d7f4901,2024-12-10T23:01:58.647000
|
||||
CVE-2024-25151,0,0,a4c322b80a85824537c1b7eed9b06ce1ba65938efaec3cdae6e0b58e6d2e2b54,2025-01-28T02:28:11.500000
|
||||
CVE-2024-25152,0,0,ceb801e8165316ac016fe3f822acb190520dfcd3154999216d5ec981331720bc,2025-01-28T21:26:06.277000
|
||||
@ -252391,7 +252392,7 @@ CVE-2024-25154,0,0,7cd5ee3b427e3989a02b3c82e36ec257d930c9c6f4bec557cf5ca75dd266a
|
||||
CVE-2024-25155,0,0,831d273875feb8840d15e6e3f2448939251eea9e4bd1bb15600946d38fa50978,2025-01-21T18:59:03.507000
|
||||
CVE-2024-25156,0,0,60847190532a7ba7e7ee62459daea2ab78e6427de860956fbb7099bc19f8fc08,2025-01-23T18:14:11.203000
|
||||
CVE-2024-25157,0,0,b70385b233eacac3c5d9d9d5477e3e8a95d4ead7ee037df905caab5d3e171959,2024-08-19T18:57:58.657000
|
||||
CVE-2024-2516,0,0,6e3f6ff199327375c8fc0eda99d3252a6de8e4ff202ab52dd032fd37f18cacb7,2024-11-21T09:09:55.273000
|
||||
CVE-2024-2516,0,1,456c9d36ecd93046841ee39c16041816353dae7b72fa58ecf962b5658fb7130c,2025-03-03T16:40:55.250000
|
||||
CVE-2024-25164,0,0,eee54783d2d6bfd262ee8b281adf3cb7c0b25d88225f6d68f860ad59977da6c4,2024-11-21T09:00:22.493000
|
||||
CVE-2024-25165,0,0,7c7f47e7bc83c48f0b6b83f12869667aa2deb29ed4294425f3ed1cea3197a218,2024-11-21T09:00:22.717000
|
||||
CVE-2024-25166,0,0,d65d60bade9b69cb76854592f67ba61d52edf8bca7037b9f05c53ea22da07c20,2024-11-21T09:00:22.937000
|
||||
@ -252442,31 +252443,31 @@ CVE-2024-25227,0,0,16b073802d3fc8b93b926c8f5c058b8c88e26270131230484aed954a3eea7
|
||||
CVE-2024-25228,0,0,3f8b8b90a475931a022fce6ad96b33e0d7743a1b36b24664692106a8d55dfa6b,2024-11-21T09:00:30.977000
|
||||
CVE-2024-2523,0,0,64ffb1ee13cecf1fe5d58eddcd99e34843f184937b3a4a074291701fa4996359,2025-02-14T16:53:12.380000
|
||||
CVE-2024-25239,0,0,62d1960a75816647dd0824c1a6dd7522a9b290438071c728f2122144b08a1a07,2024-11-21T09:00:31.193000
|
||||
CVE-2024-2524,0,1,cd53fad577f0fd12df0004d921087bd2c9d9b5f0451891e3224971afb02f04a8,2025-03-03T16:40:55.250000
|
||||
CVE-2024-2524,0,0,cd53fad577f0fd12df0004d921087bd2c9d9b5f0451891e3224971afb02f04a8,2025-03-03T16:40:55.250000
|
||||
CVE-2024-25247,0,0,8f27432758a2853eba1d5c1a91c7da083827266e4e63e595dc12f3b358565fca,2024-11-21T09:00:31.417000
|
||||
CVE-2024-25248,0,0,81a8ad990dc45e329a2a406fa2e8862ab2f5c3673d256130877de386ab70b693,2025-02-14T16:22:09.803000
|
||||
CVE-2024-25249,0,0,7cbde78c75e4d8497d99a20ea8ce98a726a45fe216dbf1b4e6c8ae0251db6893,2025-02-12T16:44:43.817000
|
||||
CVE-2024-2525,0,1,8cd372a206122148f74f5f14097699f07c807df2adc17c97a7f1765a1e1a5ded,2025-03-03T16:40:55.250000
|
||||
CVE-2024-2525,0,0,8cd372a206122148f74f5f14097699f07c807df2adc17c97a7f1765a1e1a5ded,2025-03-03T16:40:55.250000
|
||||
CVE-2024-25250,0,0,db72313d2b8a86eec26ab519ea1baaf7ac154d306dc7534c2e8c4d26bd439334,2024-11-21T09:00:31.943000
|
||||
CVE-2024-25251,0,0,6dea5af83ad1e7e7deeb31cb468a1c94ab5c1e06beee69c782e91b5b37b29796,2024-11-21T09:00:32.163000
|
||||
CVE-2024-25253,0,0,48e99cce2b2802e3aeef59d20e7058849d1e4e7be86482650a3710ee00ff024a,2024-11-19T17:35:11.063000
|
||||
CVE-2024-25254,0,0,0339a82eef9bc1a7a8bb28fefdcad83242ffe04648f59e10cecbad0da67cea19,2024-11-19T19:35:13.453000
|
||||
CVE-2024-25255,0,0,879d4410a08cc23864a4824dcb477088b28d669368fe48b08008f9744ea817de,2024-12-24T06:15:33.590000
|
||||
CVE-2024-2526,0,1,5b12ee0f5dfcabee3dc8d7d789fe613b7a308c64f74159aaaf3cd718cda115b3,2025-03-03T16:40:55.250000
|
||||
CVE-2024-2526,0,0,5b12ee0f5dfcabee3dc8d7d789fe613b7a308c64f74159aaaf3cd718cda115b3,2025-03-03T16:40:55.250000
|
||||
CVE-2024-25260,0,0,6ee402f74d2c05b4570f4093e7c197c9456061478a7a78d4fa79e707475ac8a5,2024-11-21T09:00:33
|
||||
CVE-2024-25262,0,0,6b97d3438756703316ea9218afd4ff7812af2caa96c0282d0288ca35efad388f,2024-11-21T09:00:33.223000
|
||||
CVE-2024-25269,0,0,7db9340337a565034be772e1d22a8640fa799f73da7eee35603a69a3a5c8ca49,2024-11-21T09:00:33.443000
|
||||
CVE-2024-2527,0,1,b2dd22bb503f5bcd0309b2a838be8c7b5900ab03d9af42efa50a6119a7bd0419,2025-03-03T16:40:55.250000
|
||||
CVE-2024-2527,0,0,b2dd22bb503f5bcd0309b2a838be8c7b5900ab03d9af42efa50a6119a7bd0419,2025-03-03T16:40:55.250000
|
||||
CVE-2024-25270,0,0,8208357e1e39e95096dcbaa9833346184b3d01a6dfda4e5a2a59f10ccfd4ef6f,2024-09-13T16:01:01.810000
|
||||
CVE-2024-25274,0,0,e9c3338ea30ee27a2b2e63cb3c1583dff1e7dfbf6ba74eeffc44e3645c9dc1e5,2024-11-21T09:00:33.740000
|
||||
CVE-2024-2528,0,1,82051b49bd591e31c056ac2e14980618cebe86ad5a57d2eaeff62f5bf5045936,2025-03-03T16:40:55.250000
|
||||
CVE-2024-2528,0,0,82051b49bd591e31c056ac2e14980618cebe86ad5a57d2eaeff62f5bf5045936,2025-03-03T16:40:55.250000
|
||||
CVE-2024-25282,0,0,ece765810af1beae8ae3c646ce0359c978f27717aa503d7fd58c7978bfaf62ad,2024-10-22T21:15:06
|
||||
CVE-2024-25283,0,0,323cda08c4ad8578ffbdc4bc4e7587e08475721a056c8a548c83870b8d85bc7c,2024-10-22T21:15:06.147000
|
||||
CVE-2024-25284,0,0,169acf62687feab76dee844f984028cd42cf9344ea750a3f8c3678efd45936bf,2024-10-22T21:15:06.243000
|
||||
CVE-2024-25285,0,0,6e828470eeaaf616cefe85cb4df7eced878006e1b539da025e4720003c774496,2024-10-22T21:15:06.350000
|
||||
CVE-2024-25286,0,0,9476558ae89ae983b5b6d52ebbb122d05a57e12d287f16ed2a62862936f106f5,2024-10-22T21:15:06.443000
|
||||
CVE-2024-25288,0,0,38218632e649898aa9cfb0d0c7bffa67d5b4699381a2842eb82dd347454a5d39,2024-11-21T09:00:34.027000
|
||||
CVE-2024-2529,0,1,140b7257d09ae9f7c973742fff3387fefa88246f51097aa84615074cb5ec8948,2025-03-03T16:40:55.250000
|
||||
CVE-2024-2529,0,0,140b7257d09ae9f7c973742fff3387fefa88246f51097aa84615074cb5ec8948,2025-03-03T16:40:55.250000
|
||||
CVE-2024-25290,0,0,35a48ca5a622e094bd31621eeb7b60a8ce0e37e115c0a197c45f71405831ee4c,2024-11-21T09:00:34.240000
|
||||
CVE-2024-25291,0,0,ba7c4ce1e37aa8e24b394ec2f91fed6d0c84aacadb9e83714fd1d90b98266610,2024-11-21T09:00:34.457000
|
||||
CVE-2024-25292,0,0,df780968bda75020e10947a61600b7afa111d416f7ae745b1c296092b16c64d0,2025-01-21T18:30:20.803000
|
||||
@ -252474,7 +252475,7 @@ CVE-2024-25293,0,0,85561e1f8c0397872a3690c79a54190ab513deff632dd15d08724cd294257
|
||||
CVE-2024-25294,0,0,548c06e67bc118a6fa5feec4c8fe3ecd605a03dc361470c0aeb4866e475c38a0,2024-11-21T09:00:35.037000
|
||||
CVE-2024-25297,0,0,a5e886fa4ef1133925f78074d5887ee6bf7505c42983811cbe1a106b4c6fd254,2024-11-21T09:00:35.267000
|
||||
CVE-2024-25298,0,0,cfcf64b5d754fd69e4a2bff3f63744d367a17e7b3976b42159232a586e9e2d88,2024-11-21T09:00:35.500000
|
||||
CVE-2024-2530,0,1,b9a909134159d82a3554eb342697a4735676ab8f10bd2e524a256cc48b75abba,2025-03-03T16:40:55.250000
|
||||
CVE-2024-2530,0,0,b9a909134159d82a3554eb342697a4735676ab8f10bd2e524a256cc48b75abba,2025-03-03T16:40:55.250000
|
||||
CVE-2024-25300,0,0,23582c8c4d7fe6a0311ddd5bed53f7ba87f4e5428121585285b1071fcb39ae55,2024-11-21T09:00:35.733000
|
||||
CVE-2024-25301,0,0,69aeaa33f60b274bbeca44f2d86eb63201ff38f7408132d281722838b8a904ce,2024-11-21T09:00:35.893000
|
||||
CVE-2024-25302,0,0,8118eb539031f099b5029926e4d0dd98150ab6d0dffef1fbfc4b61bb3c98657c,2024-11-21T09:00:36.040000
|
||||
@ -252484,7 +252485,7 @@ CVE-2024-25306,0,0,b63f7a3170c4507e7efe0aff36598000c6c079a952c8d561914ac0c55d3ba
|
||||
CVE-2024-25307,0,0,f4e5f998ce518e2c9e2e2280726987c541629fa5fbba20cdafc47279611c0476,2024-11-21T09:00:36.717000
|
||||
CVE-2024-25308,0,0,f34f3f6259ffa6c4d4d6dc06610983771cfb029a7d8c1806dba298a8e8cb4930,2024-11-21T09:00:36.903000
|
||||
CVE-2024-25309,0,0,cec91a13be6d678a8bd296a3887d54716bf431e23f423573bedaefc9a4942072,2024-11-21T09:00:37.043000
|
||||
CVE-2024-2531,0,1,6f41d04e9dea510ccf892ca84b54d88106ef14550053e3638b435517ba578b43,2025-03-03T16:40:55.250000
|
||||
CVE-2024-2531,0,0,6f41d04e9dea510ccf892ca84b54d88106ef14550053e3638b435517ba578b43,2025-03-03T16:40:55.250000
|
||||
CVE-2024-25310,0,0,e320ecb7aa1fafa5346e4ba3ff5ca0add324bed9c883e1dfa83208a858415278,2024-11-21T09:00:37.193000
|
||||
CVE-2024-25312,0,0,50e6e996a258790b41a929b5735f5aeaa7b5a4c7b1b057eefb4c7307913cc4b6,2024-11-21T09:00:37.333000
|
||||
CVE-2024-25313,0,0,bb46a9ca1b5035ee988d64a5c851568b06c620c7a914d8396ffb1520db7b2e30,2024-11-21T09:00:37.480000
|
||||
@ -252492,16 +252493,16 @@ CVE-2024-25314,0,0,b81f442b14f2368db80246f464d4f0035cd6146ceca4f37905d96abb30e01
|
||||
CVE-2024-25315,0,0,94d0f2dbf16eb115667c034dce6adf07e1e07fc3107709e47083290b58a485d1,2024-11-21T09:00:37.853000
|
||||
CVE-2024-25316,0,0,695834cabcc8024d51e9ae992af51a4b43da1168ad3e61123711bd3b9cddbb9f,2024-11-21T09:00:38
|
||||
CVE-2024-25318,0,0,afa95d8853578df0bf95ae75b7a95038a81dfb503035271638c8f89374910c1c,2024-11-21T09:00:38.227000
|
||||
CVE-2024-2532,0,0,6415c2e32041702b5fc36491108741bb87a5f644f2224019bac57a50b7cb0237,2024-11-21T09:09:57.453000
|
||||
CVE-2024-2532,0,1,6557048ff732e1d7dac3c557555f5b8de490a23e928e028ca37f9a1f93ccb7a9,2025-03-03T16:40:55.250000
|
||||
CVE-2024-25320,0,0,d2d47bd358763a78ddcff7788532c0481ee5d7a2cce25691dc5b0cde445466ba,2024-11-21T09:00:38.390000
|
||||
CVE-2024-25325,0,0,b9a6eccdc6c82e87ce40cd5511f956ad176fcac06b9d26c743462dcd60e300a7,2024-11-21T09:00:38.610000
|
||||
CVE-2024-25327,0,0,200c2b510342a3e155d5c5aae84c1549b1fe17451fa1d4b0fa553a648fd4f02a,2024-11-21T09:00:38.827000
|
||||
CVE-2024-2533,0,1,e346cf84b9f2f449ac50f84ba3df088cc28ba956b6844353c3136c630c632e16,2025-03-03T16:40:55.250000
|
||||
CVE-2024-2533,0,0,e346cf84b9f2f449ac50f84ba3df088cc28ba956b6844353c3136c630c632e16,2025-03-03T16:40:55.250000
|
||||
CVE-2024-25331,0,0,2b5df9bf20f2ad2788f6bfc10fc6e2710ebce7c5b2ae509b177bc3eeb5d61cac,2024-11-21T09:00:39.057000
|
||||
CVE-2024-2534,0,1,97424fd59d63544788b3bddf8d6f9632a6b45872cdeae763936c7deb3e7b6689,2025-03-03T16:40:55.250000
|
||||
CVE-2024-2534,0,0,97424fd59d63544788b3bddf8d6f9632a6b45872cdeae763936c7deb3e7b6689,2025-03-03T16:40:55.250000
|
||||
CVE-2024-25343,0,0,e95b5c5e8048e4efd735c454ea3bfb2db00d33bbce0bc4a2a17d6a93c15ddff4,2024-11-21T09:00:39.283000
|
||||
CVE-2024-25344,0,0,33d39ecf8d6ac556c3d5bb95eb67c067ec31235f8aa78fc627aabc924889d088,2024-11-21T09:00:39.500000
|
||||
CVE-2024-2535,0,1,7304021672dd7969c233c581f531940d7359a1986d671601349f510e41900ed5,2025-03-03T16:40:55.250000
|
||||
CVE-2024-2535,0,1,db38ebb41a68a314837b286eb732510d8807566971f0363fbff364d69699d835,2025-03-03T16:40:55.250000
|
||||
CVE-2024-25350,0,0,42b2885b778a3363dd7e8660ea5d10f7e6357ec013f679bcedd4548c237100ad,2024-11-21T09:00:39.723000
|
||||
CVE-2024-25351,0,0,48adb19f4acbaef01702e2c768d6f3345f4c2ea27c5c7efc96ab3e55f3a7fae6,2024-11-21T09:00:39.960000
|
||||
CVE-2024-25354,0,0,297ccea736333201514db90fe7dbcf98c84ce9c571080000be069d554c6a00ad,2024-11-21T09:00:40.210000
|
||||
@ -253430,7 +253431,7 @@ CVE-2024-26629,0,0,2a7ecd77e86c42f4a70a3376c42e7624451573e296d28b71c04baf0cc1ec5
|
||||
CVE-2024-2663,0,0,c22f0e7b5ed31e3585ae04604569739fcb5bd35aa21e256ad3298c060be80007,2024-11-21T09:10:14.400000
|
||||
CVE-2024-26630,0,0,adde7411c6c89a1ccc138c9f1404cb16baf029b425dd47ea72b82cb8b0a9fe04,2024-11-21T09:02:43.470000
|
||||
CVE-2024-26631,0,0,eb4c850fd5a6959a2922e5f8e3fdc1bab0839dca96694a777740412e05e949ce,2024-11-21T09:02:43.580000
|
||||
CVE-2024-26632,0,0,45a62b76f2e86f5477c6e9d8ba48dcd130a62956d5a56ee6ce84c07427e07d45,2024-11-21T09:02:43.700000
|
||||
CVE-2024-26632,0,1,7d5b9a41e5544a024d3fe43e030dd518d74e6fe0747c4fbe31f63afe56570152,2025-03-03T17:33:19.643000
|
||||
CVE-2024-26633,0,0,53fb39ca7258086fde7e81877e5cc590f32c01622b87c853980b5069721d02f8,2024-12-20T13:15:19.710000
|
||||
CVE-2024-26634,0,0,1f9eeabf8f133d86a691ddf2fa231459fd38dd0f521c36b94c4201dd9d3e3366,2024-11-21T09:02:44.020000
|
||||
CVE-2024-26635,0,0,a7edca2438cebac503d3d0a80a3b8ba894da4196ace5867bea23ec41425d9fe5,2024-11-21T09:02:44.140000
|
||||
@ -253461,12 +253462,12 @@ CVE-2024-26657,0,0,5b20f2d67a13488a4561cdf1804b4d16bd412c492c2f8931f4259c8fdab78
|
||||
CVE-2024-26658,0,0,fdb2631e448bd210fea3052df1cd33afa28ec2d71cfc06366e87396444d81fff,2025-02-03T16:15:21.710000
|
||||
CVE-2024-26659,0,0,d1c064e96da1d530f31cb13996b98b6c11a5365d98cf8e2364eb0850bbe23f59,2024-11-21T09:02:47.073000
|
||||
CVE-2024-2666,0,0,94c10c4038495e2feaf574a5456d0064fe9e83a56f9b4605d7001b425c92541e,2025-01-08T19:47:15.707000
|
||||
CVE-2024-26660,0,0,6028a94cbb5a9c9ef9fd6139ee07c29239b5013624aa3697f8ef0e8c75309c99,2024-11-21T09:02:47.193000
|
||||
CVE-2024-26660,0,1,102ff31ee0865425b639eb07f439d8a6e1d3deb1a18904061edc12771f87edd7,2025-03-03T17:33:19.643000
|
||||
CVE-2024-26661,0,0,d45863d2e30232e358edb0d1a1e889067585e710a0e2ee684c544bcee0a67515,2024-11-21T09:02:47.317000
|
||||
CVE-2024-26662,0,0,a88f4521b9b995afb0e21d9f507fb182180356687597cd7121dd3a6b42115b74,2024-11-21T09:02:47.500000
|
||||
CVE-2024-26663,0,0,74a791432f5d59cb2bc083592aaf9ae5c64f10e827e4bfdc39da1da462ef98fd,2025-01-07T17:20:30.367000
|
||||
CVE-2024-26664,0,0,f174ef6695a76159aab69bc64b6113c4071e242e88009058b38ce039df6e0a7f,2024-11-21T09:02:47.807000
|
||||
CVE-2024-26665,0,0,914c844dba6f5cd54c69860e0490ff270d80c476de8e03ca1dee30ded177c0e2,2024-11-21T09:02:47.933000
|
||||
CVE-2024-26665,0,1,b7860a2cfba0c9676ba45ba5e75215a1baad4430a49d03c9fc2928401834e288,2025-03-03T17:33:19.643000
|
||||
CVE-2024-26666,0,0,f3d57571a156c221255e6ed43ce466550f0474a9e05c86712515e781d1d5dfe2,2024-11-21T09:02:48.060000
|
||||
CVE-2024-26667,0,0,e5ad506f4c73ca6a1fa85cffa41c22f32b9dc8afefacf0aae7843e76fbaf00b7,2024-11-21T09:02:48.243000
|
||||
CVE-2024-26668,0,0,19e99ff104cefd1cd23ad3007ee1b6d98ed06b00b2ab1e0701085c50b1f5ac6e,2024-11-21T09:02:48.360000
|
||||
@ -253571,7 +253572,7 @@ CVE-2024-26757,0,0,ea19223d6591c0bb304a57b49e3343899072ac606ffd2b71bfbed5f59d9bf
|
||||
CVE-2024-26758,0,0,c89d8554b475b329ed0ac9ff1b69624897deb142b13dfbc35a85f8d82feeb354,2024-11-21T09:03:00.333000
|
||||
CVE-2024-26759,0,0,c16a8feb5c03575808a38e891cf9c009a3d4bd2625d12119e088f14de118118c,2024-11-21T09:03:00.527000
|
||||
CVE-2024-2676,0,0,909464e30d2c10e8a9af079a102bd07a257c9534a32f512f1c3ed8618aa3e4c5,2025-02-21T16:06:24.990000
|
||||
CVE-2024-26760,0,0,0518c5037cf3afe5f4eb3cf2eb8918e02d9d0470eb95c405ebf760a9dc0b1639,2024-11-21T09:03:00.647000
|
||||
CVE-2024-26760,0,1,309039c98c771463a89da74c13e437fec948305bc99ab63970666c4f90f70dd1,2025-03-03T17:33:19.643000
|
||||
CVE-2024-26761,0,0,aa1a20a0803d63a54b19e75f2a8a8f8bec9c12a955e5a2a8d3004b5d801f81f9,2024-11-21T09:03:00.763000
|
||||
CVE-2024-26762,0,0,a287f1e9fd29a626fe10dbe6954ee97461b04e8a4deb899f82974d34c52e8f61,2024-11-21T09:03:00.880000
|
||||
CVE-2024-26763,0,0,ea60cb10ec181dc23fe842240e1437c7c10aef932cbc953d9703f81ca6ffe278,2024-11-21T09:03:00.980000
|
||||
@ -254537,7 +254538,7 @@ CVE-2024-27855,0,0,7b61a08acfa4129bbd09ca95b2fbbadadedd2683e38c872f9104fbd486556
|
||||
CVE-2024-27856,0,0,09c5bb73b814d1144196c9ecf929f00cb814093cdfced3c6adadc63f100b4422,2025-01-16T15:15:13.100000
|
||||
CVE-2024-27857,0,0,50c74cada9fa0a92498be7b0ed6d9257c0a8cdcb5b5d97a471df147f46938208,2024-11-21T09:05:17.540000
|
||||
CVE-2024-27858,0,0,aa4ac34917fc25a3b363315db7cb3fffd219145d245e40c2d78d17a7bcb483bf,2024-09-23T19:56:28.840000
|
||||
CVE-2024-27859,0,0,d996415f36df124c2055edc36c95ac8a19b6cfff8d3ca6929250ae8cf8d6847f,2025-02-18T19:15:15.473000
|
||||
CVE-2024-27859,0,1,a7656a9ee29e09d9d6dd0ed0138e7403302c55b95156638f98095c6c05798bbf,2025-03-03T16:52:20.953000
|
||||
CVE-2024-2786,0,0,fdc7011c4f0b705afb5fcd1f3a67915269e31c824586b5ff624ca764a8b78249,2025-01-07T18:17:10.187000
|
||||
CVE-2024-27860,0,0,573c398bb03b5382369ac69cc1d55fcdcd51ef33a018d7ec6bcd579bee759306,2024-09-23T19:10:07.350000
|
||||
CVE-2024-27861,0,0,44687bbf9414155e406d842a229f671ff45e5709268fc42f7e0846677b06e6c3,2024-10-10T13:13:53.450000
|
||||
@ -256070,7 +256071,7 @@ CVE-2024-30025,0,0,59211b3148d41d5f2d1591e205eaddafb7c2881bce7db47b5f2828dd1e258
|
||||
CVE-2024-30027,0,0,2453006bce839a4dccec64751f1915bf46ab8c1dbcaac05cd82e943729c9e722,2025-01-08T15:47:32.647000
|
||||
CVE-2024-30028,0,0,528f9a241d54b5d0a61f7ba5959930a7199b44f51e4af6dc146f70726a6a27fa,2025-01-08T15:47:42.203000
|
||||
CVE-2024-30029,0,0,757a9f3dcd31128b99ad30ab6cae35772eeef937c04086ec4ffaf707096648d8,2025-01-08T15:47:58.657000
|
||||
CVE-2024-3003,0,1,4673719ed7dbaaae6513df93f675de5ef775ef3cc5ec698ede839c4bfd9ca02a,2025-03-03T16:20:59.253000
|
||||
CVE-2024-3003,0,0,4673719ed7dbaaae6513df93f675de5ef775ef3cc5ec698ede839c4bfd9ca02a,2025-03-03T16:20:59.253000
|
||||
CVE-2024-30030,0,0,37892ecdf6da58f97d739e70f80226ffd9b0d5a5e8c59bb8905ab9b418310045,2025-01-28T17:15:23.673000
|
||||
CVE-2024-30031,0,0,cecb1c1d6955264ff1c6dc402bee6c96f05874b073d3e4e550eca8ab24cf7001,2025-01-08T15:48:09.667000
|
||||
CVE-2024-30032,0,0,e97bc9f469761134c288d43791e05d263ad5408925711e41e3a9b4a875aeedd4,2025-01-08T15:48:37.563000
|
||||
@ -256081,7 +256082,7 @@ CVE-2024-30036,0,0,10f01c6391438dab4883c634ef797688fedda0a95a991404880cb2c671a1a
|
||||
CVE-2024-30037,0,0,f2d401000dd9549b2f095203aa37be55cc4c90841f711ed62b7216ea20cd689f,2025-01-08T15:50:32.630000
|
||||
CVE-2024-30038,0,0,27a4c29b38257f8bcafe88f8509a9aba246c05aefab003cf829c6073e1b87d25,2025-01-16T19:13:10.340000
|
||||
CVE-2024-30039,0,0,a9047a1ee3770867bedf8729bda5c6e979affd5cf6d07e8365e2142e85ac3926,2025-01-28T17:15:23.990000
|
||||
CVE-2024-3004,0,1,af43f34cb38820e9ef4be76ad7373071685c236a1a28cf654ccd60a7ccb631f7,2025-03-03T16:20:59.253000
|
||||
CVE-2024-3004,0,0,af43f34cb38820e9ef4be76ad7373071685c236a1a28cf654ccd60a7ccb631f7,2025-03-03T16:20:59.253000
|
||||
CVE-2024-30040,0,0,0232720eb813240f57e5570e979939c07517f0db0e7772853aceeee8dbf63044,2025-02-24T15:50:23.420000
|
||||
CVE-2024-30041,0,0,f9c10cbe19f35b717577bc6764f2546acc1215ed22680df6006f57d9c2099fde,2025-01-08T19:13:10.127000
|
||||
CVE-2024-30042,0,0,9544f834a0b92a843308b4d5510959960649fdfd12e3981ba713ba27b676a4c4,2025-01-08T18:59:45.373000
|
||||
@ -265075,8 +265076,8 @@ CVE-2024-41766,0,0,27a514791788a4bf30eb4a3bf81b83642a6793378dce75a5c9d762909251c
|
||||
CVE-2024-41767,0,0,e172d29e714c5abc78a0eb3060db7132aed0e0deb2dd067ea8983ade3a6ffcf1,2025-01-04T15:15:06.987000
|
||||
CVE-2024-41768,0,0,62950a30cb25f26fc31df7352fdd7c6931a582431a6a1cb92e67af8ad7943776,2025-01-04T15:15:07.127000
|
||||
CVE-2024-4177,0,0,b19cea7dfc04a16711a952f111997ccebc4378d3e2d6a3d68b2d48d03a2529dc,2024-11-21T09:42:20.397000
|
||||
CVE-2024-41770,1,1,af8a886b555c6a520ba25f6bf61218f4cb3f859af10142a2a3841edd1e529c7e,2025-03-03T16:15:37.853000
|
||||
CVE-2024-41771,1,1,b82be72730ebeb6316d41392cf7933a0d584cb83a8a72b1028fe8580d7640d85,2025-03-03T16:15:38.007000
|
||||
CVE-2024-41770,0,0,af8a886b555c6a520ba25f6bf61218f4cb3f859af10142a2a3841edd1e529c7e,2025-03-03T16:15:37.853000
|
||||
CVE-2024-41771,0,0,b82be72730ebeb6316d41392cf7933a0d584cb83a8a72b1028fe8580d7640d85,2025-03-03T16:15:38.007000
|
||||
CVE-2024-41773,0,0,beaf4d8c312e85e3696081a024d02001bdac13d0a849a736ca19b73511b0958b,2024-08-26T18:33:07.997000
|
||||
CVE-2024-41774,0,0,db82f7998f610ab2c3c2ae4d9e33bcab8463b004f8921670f73f55120becfa11,2024-08-24T11:15:05.670000
|
||||
CVE-2024-41775,0,0,e5a5c3f0c9c2d797037bc42d58511f5d720ca3c68c1710b74d20237b76b1bbd9,2024-12-11T03:25:45.430000
|
||||
@ -266173,7 +266174,7 @@ CVE-2024-43164,0,0,af1cf52e9e5daf0524d227ca91881ef1661a1e31cfb7baa9b781d652d8651
|
||||
CVE-2024-43165,0,0,d6b26bb563a0e6badcd424e8717f3eee2117ad61bb0aaa9e33b8f5d6bf543f4c,2024-08-13T12:58:25.437000
|
||||
CVE-2024-43167,0,0,1f0299dd298e58ae7d0320a556b5cc8080d25729e8c4fc9c4051248a2f05ca8c,2024-11-21T09:35:06.587000
|
||||
CVE-2024-43168,0,0,a00133049ed1a922ca0a7599f98603d24e2d8039ab92bf6ffa7a406368253241,2024-10-21T12:15:04.327000
|
||||
CVE-2024-43169,1,1,352e656ad4f035f7b427be36366f55e8b13d480e407d80a8f1b98141bc5da940,2025-03-03T16:15:38.157000
|
||||
CVE-2024-43169,0,0,352e656ad4f035f7b427be36366f55e8b13d480e407d80a8f1b98141bc5da940,2025-03-03T16:15:38.157000
|
||||
CVE-2024-4317,0,0,db0abb41f20407d83ae6da5ad6bf273d95c1b6dc6d76af61523cb7222e98db9f,2025-02-12T16:17:31.043000
|
||||
CVE-2024-43173,0,0,d8d2ac885c1902e546063772016f5d0005860b114ffe9d7489140ac6cd8bfc67,2024-10-25T15:40:19.977000
|
||||
CVE-2024-43176,0,0,67ef639d68302e5458cf789165bf8b534cafee061131b6437c0c7535ddbce0f4,2025-01-09T15:15:15.737000
|
||||
@ -268196,10 +268197,12 @@ CVE-2024-45774,0,0,4d2c75ba8338553ee4a278a85581b6e2db4424169927a3758eac6b06d727b
|
||||
CVE-2024-45775,0,0,5e285262d1706cab5ca05a7725649dadf6185a7492d72f859f11f2cece394355,2025-02-18T20:15:19.177000
|
||||
CVE-2024-45776,0,0,6ff331300b63b0445c4a33993b39c621dc4140ea58408c74e411ebee541079c0,2025-02-18T20:15:19.313000
|
||||
CVE-2024-45777,0,0,381f048bca6c71d068d001bd4e22e7b202a5aa1ffd4c67366bc2225f24d010f7,2025-02-19T18:15:23.210000
|
||||
CVE-2024-45779,1,1,bdf659b838ab3fb43a4f002f915b6f26c371435eee6685b792b16de994082a9e,2025-03-03T15:15:14.660000
|
||||
CVE-2024-45778,1,1,4a788605efb9b4cb4a9d6b761519c855051768041e43218264b80f4c5b038d32,2025-03-03T17:15:12.700000
|
||||
CVE-2024-45779,0,0,bdf659b838ab3fb43a4f002f915b6f26c371435eee6685b792b16de994082a9e,2025-03-03T15:15:14.660000
|
||||
CVE-2024-4578,0,0,bdbd727086f88b7c6dce9bba415908bda128d8ea217ac43f45c5788929d872c3,2024-11-21T09:43:08.790000
|
||||
CVE-2024-45780,1,1,138a44b3c391eb0986ad2082a3b1151b909667827c1949031faf9513029b99f1,2025-03-03T15:15:14.950000
|
||||
CVE-2024-45780,0,0,138a44b3c391eb0986ad2082a3b1151b909667827c1949031faf9513029b99f1,2025-03-03T15:15:14.950000
|
||||
CVE-2024-45781,0,0,133ac0cb92299a7df10b4b06b4cea79c7c1972b417bc5974d3666a0db7bf0b58,2025-02-24T19:15:14.423000
|
||||
CVE-2024-45782,1,1,9a6d58c808594661629c2038d537df1d03a760fc3efa15bba0bd203537e988b6,2025-03-03T17:15:12.900000
|
||||
CVE-2024-45783,0,0,26ae80ac76949a820b287a710d857e419cd80f84fb3ed37275ecee208bfb63de,2025-02-18T20:15:19.560000
|
||||
CVE-2024-45784,0,0,3048a1cb0fccc9c661b7edc8375d75b46aaf139acaa67371a0b13f350fb0ec33,2024-11-21T09:38:05.210000
|
||||
CVE-2024-45785,0,0,fd50e853f09ab6c2230e086d2435c3cb1d80eb0fdb3f5f2bda7ceb6deffb7b10,2024-11-06T17:08:40.507000
|
||||
@ -271641,7 +271644,7 @@ CVE-2024-50476,0,0,35748ba4306c4240aef0107ccb81a7afc297d782a8a366836b7f46e83a5cd
|
||||
CVE-2024-50477,0,0,30b542ca3c23213ee012ae6b20ea099ce0e58e93e7a3ceb961529dd7319062c0,2024-10-31T00:24:28.160000
|
||||
CVE-2024-50478,0,0,c6e943c6420c3f5a389145933c0c4dfb9fcb100e73f4e688b0d5bc9895280483,2024-10-31T01:44:47.407000
|
||||
CVE-2024-50479,0,0,83213c1cbe1c808ca9abcf9be6166c74770ee338364b15f7cadb07ba2e041af4,2024-10-31T13:02:20.793000
|
||||
CVE-2024-5048,0,1,265e0e2c79f135ea01b40d803e3730f9ea5ffbf96881c97c4387f71d50fc0cfa,2025-03-03T16:25:24.627000
|
||||
CVE-2024-5048,0,0,265e0e2c79f135ea01b40d803e3730f9ea5ffbf96881c97c4387f71d50fc0cfa,2025-03-03T16:25:24.627000
|
||||
CVE-2024-50480,0,0,c394acde8bd643a056b7572b138b020eb004b0c9c953a2494c2b6863f87f6132,2024-10-29T14:34:04.427000
|
||||
CVE-2024-50481,0,0,b6d00daa5f8961a65f932692fff07056f855c2a0de3457ab8639f1aabd27024d,2024-10-29T14:34:04.427000
|
||||
CVE-2024-50482,0,0,093771549c5fece2d89ef85592fe40f6590e8d360be1b306b38d905240229a77,2024-10-29T14:34:04.427000
|
||||
@ -271784,11 +271787,11 @@ CVE-2024-50633,0,0,8447ae8fa0b4e5a5b6295a68bdf62cfe1ea1f8940cf2403607b397d2eabaa
|
||||
CVE-2024-50634,0,0,75c75741b4ff07a7223817b405561d2122b2e965df2d36431c234973c9416179,2024-11-14T20:40:43.690000
|
||||
CVE-2024-50636,0,0,35ef03dd8175dba345c3fb32a6b071a45c850c144fdf90f5aef46a21c35cb9c9,2024-11-19T19:35:14.833000
|
||||
CVE-2024-50637,0,0,d977347a448c3f65e92048b639a2e3e6ff98b542be1611660d9dca9c5510503b,2024-11-07T14:15:16.780000
|
||||
CVE-2024-5064,0,1,91d2ad00b9fb6d6b6f91370daf04e64eab273b7f9f9382620f78e682b7135991,2025-03-03T16:11:16.720000
|
||||
CVE-2024-5064,0,0,91d2ad00b9fb6d6b6f91370daf04e64eab273b7f9f9382620f78e682b7135991,2025-03-03T16:11:16.720000
|
||||
CVE-2024-50647,0,0,a8132e40e6415680c63502dcfb71c83170a27c8ae17ae2d8709790d4ecaf5c60,2024-12-03T17:15:11.193000
|
||||
CVE-2024-50648,0,0,cd768dd502a6a41a750f72e8678d74f0fdb7ca88354fa77c670060f1a5a3d16d,2024-12-03T17:15:11.357000
|
||||
CVE-2024-50649,0,0,75af684ee5c50b16f619d7bbac2db41b70d6b9041e53190a772eac935e0bd425,2024-12-03T17:15:11.520000
|
||||
CVE-2024-5065,0,1,45949c8a72612bb25fb94f4af84a4c03ee696dabef3f10ded89a1a6800bed143,2025-03-03T16:11:16.720000
|
||||
CVE-2024-5065,0,0,45949c8a72612bb25fb94f4af84a4c03ee696dabef3f10ded89a1a6800bed143,2025-03-03T16:11:16.720000
|
||||
CVE-2024-50650,0,0,51e56b1d34ec223623aa5ce32045a557a25d3bd1c5a91fb1d138ae1327c6b06e,2024-12-03T17:15:11.683000
|
||||
CVE-2024-50651,0,0,011c4281624dacbc96bb39ed41c7067acfaaf24f648047c3bd252399725a9be8,2024-11-27T21:15:07.573000
|
||||
CVE-2024-50652,0,0,2f965c69b573d9e115cdae86c6768d0ed1bea347974fb0bbbfc5caeeb795e4e9,2024-11-22T00:00:27.760000
|
||||
@ -271799,7 +271802,7 @@ CVE-2024-50656,0,0,e53c92dd40aeb79d431b51fb04bac1f16260e97b7e3acd3a14cd582afd780
|
||||
CVE-2024-50657,0,0,30b2eb884e7e45c72e97be70bee207473abaa297a2a95565537ba3cd89d0a4dd,2024-11-27T17:15:12.323000
|
||||
CVE-2024-50658,0,0,dc74515f499285ca9589c261009f1434e39f4df3c1feba74e29bae75532d2d18,2025-01-08T16:15:34.413000
|
||||
CVE-2024-50659,0,0,070d9cee09db7fd442130a440bc492ee33550ec72e00250b2d953adb8bd85a17,2025-01-08T16:15:34.597000
|
||||
CVE-2024-5066,0,1,c5197e9076a09a4f7e41d09d6e85802f85b56930d19599de015bc424c394fb95,2025-03-03T16:11:16.720000
|
||||
CVE-2024-5066,0,0,c5197e9076a09a4f7e41d09d6e85802f85b56930d19599de015bc424c394fb95,2025-03-03T16:11:16.720000
|
||||
CVE-2024-50660,0,0,f71f8e7c2fcb36b53cf871d625509d1de985a324b433af36346565606f116252,2025-01-08T16:15:34.817000
|
||||
CVE-2024-50664,0,0,002d5b0430aa7459420dc0956bb490c4f154a70576e6a288cb3d4c29b0b5a9fe,2025-02-11T20:57:42.027000
|
||||
CVE-2024-50665,0,0,ed17c9d088b29ba5a0894119bb80fb3febe70d5b2746ba98271e86eea823596b,2025-02-11T20:51:48.500000
|
||||
@ -271996,6 +271999,7 @@ CVE-2024-51075,0,0,24a9c25e3ffc707f200389e741ea19b266840c341bd7e1a60e2cb6faa61d8
|
||||
CVE-2024-51076,0,0,e5e3ed6e47651290142238cae400834ab55b60425e57165275989efcabaab333,2024-11-04T13:41:48.267000
|
||||
CVE-2024-5108,0,0,2dbe7b73a30a679e8187fbb42897811cbeb8e5e0df154c40c12811a3dfea6c02,2025-02-21T21:14:08.303000
|
||||
CVE-2024-5109,0,0,71e4e0c4bca00ee29a2fa080f7e148d6d2b101e79a10d5714f213d96eed611a1,2025-02-21T20:22:51.190000
|
||||
CVE-2024-51091,1,1,7e3be999d132c421726433ace9a407b1f700c09d94767f9fdddb3b85c60ce5ff,2025-03-03T18:15:29.523000
|
||||
CVE-2024-51093,0,0,a6898e879de35c8cf2e460ec5a84ae7f0123df10aa875737ef5d0e250287c851,2024-11-21T18:15:11.043000
|
||||
CVE-2024-51094,0,0,9c0a3563e2cbfb0f7e4111937c25ede7da4801ccd5cc0469207158910b8a9299,2024-11-19T17:35:14.493000
|
||||
CVE-2024-5110,0,0,6a4943fa22d3a4c423b7bacab486aa156591a7b82c2720ae65bc973c202b558e,2025-02-21T20:12:32.623000
|
||||
@ -273616,7 +273620,10 @@ CVE-2024-53376,0,0,8911dbfc8997baa2a57cf32f34b4dcc9a56903a67bd0c4ffc9a41950a9065
|
||||
CVE-2024-53379,0,0,2b6df428322956cd20e5c553031d5487355c33ab4cabbe810e5c3a60725bbc7b,2025-02-27T19:15:48.927000
|
||||
CVE-2024-5338,0,0,2afe684191c73468eff383b7ca370b5770f74a1aec9a85ac89128ddd56eac957,2024-11-21T09:47:26.997000
|
||||
CVE-2024-53382,0,0,bc22c0f67f340c82703587339ab10b2cf8a3692c3e7d029c8d913b364828432f,2025-03-03T07:15:33.397000
|
||||
CVE-2024-53384,1,1,e63525e28645ffd574e4bc5c37cec43657018cac2aeb992a27d57ce5edd4d535,2025-03-03T18:15:29.670000
|
||||
CVE-2024-53386,0,0,8bb56eeec23e0a18d63c27f203ebccf2a4947e5af96ad0f07d167c04fae16fdb,2025-03-03T07:15:34.560000
|
||||
CVE-2024-53387,1,1,609df7ae497cedd9f156e2ec60775eff9e6d887f421bbcb389ceb26e5ac9aac5,2025-03-03T17:15:13.050000
|
||||
CVE-2024-53388,1,1,8d3e08409f54a376783ce329de4e860405860aa5f0436b7497252430669d8c0e,2025-03-03T17:15:13.167000
|
||||
CVE-2024-5339,0,0,0d824fdd75ea0024ca1d8121d180fa88d48321696b6a589d7b7ff1cb4a42c3e7,2024-11-21T09:47:27.133000
|
||||
CVE-2024-5340,0,0,ee38ec7c3eb1b237a6f1222e4c2d09975ad3132aecab39c527a9d8e3693c02d9,2024-11-21T09:47:27.263000
|
||||
CVE-2024-53407,0,0,028a3e4d14bfc90eea9cc0c6159117f08c823fe19cf4dd25d6c1d6ae5f9691c6,2025-01-31T21:15:10.213000
|
||||
@ -274498,7 +274505,7 @@ CVE-2024-5462,0,0,d4f147823b82222903b9d9bf51249493cafff25daa3597a42629662406d9f6
|
||||
CVE-2024-5463,0,0,357d166209285de4e8f9b5c7c2d63d7eb415952b3a9d1476d831eb91162afaf7,2024-11-21T09:47:43.833000
|
||||
CVE-2024-5464,0,0,255f781a5f94f0faf95d7c73d6b2015838426915e8e0274a4b6257e37377ce5d,2024-11-21T09:47:43.990000
|
||||
CVE-2024-5465,0,0,d854caa252ac359088449fa3628f1e50a198f1dced6d951af90835f292847339,2024-11-21T09:47:44.140000
|
||||
CVE-2024-54658,0,0,1d3c392f8d61d57257ee80e192f6232396a2ef2df3ef7808f2004f246352763a,2025-02-18T19:15:18.857000
|
||||
CVE-2024-54658,0,1,c51d7b235a06e000d006cb570ad201153e6a0063880f45bf4be65fb7411135b5,2025-03-03T16:52:20.953000
|
||||
CVE-2024-5466,0,0,bd8eca91ebf8acc552049523b9652cf94021fa13aaf76627ede5f76950f6758d,2024-12-19T20:21:12.243000
|
||||
CVE-2024-54660,0,0,8ecb328311227df4f4ba808c9aa5038fb826cdcbe9b14662d633f31264e20c88,2025-02-03T21:15:13.873000
|
||||
CVE-2024-54661,0,0,13e4cca9a8df33a1723e5327d2d34e809c611fe62aeebc75663d0c80abb5d0eb,2025-01-07T01:15:06.913000
|
||||
@ -274608,7 +274615,7 @@ CVE-2024-5494,0,0,01220fe18988d81f50a7497aa6ab19647b6ffe5fd178defdb09fee026bb9cf
|
||||
CVE-2024-5495,0,0,5042268a950e30bd3019e8943c12e21fd198069753506c20c0160553a125c76e,2024-12-26T16:42:57.383000
|
||||
CVE-2024-54951,0,0,5d19b9002b3d609d782a9b71d0927437769cc7cbd3c6535e97fd8da5cd4a41ad,2025-02-14T16:15:34.060000
|
||||
CVE-2024-54954,0,0,c5f7bba0f482724c8baeb34ff731ef8127c621f5f601d09231830cf72a39e47f,2025-02-26T19:15:22.440000
|
||||
CVE-2024-54957,0,1,d0c111cc2d7d3d0df4e7a6c0b95859d88d8d979df525778250dc512805cb8aed,2025-03-03T16:15:38.450000
|
||||
CVE-2024-54957,0,0,d0c111cc2d7d3d0df4e7a6c0b95859d88d8d979df525778250dc512805cb8aed,2025-03-03T16:15:38.450000
|
||||
CVE-2024-54958,0,0,69980aeea30a2a881a4d3d60af27dc56a66e90cd80d98f68c95b14c20a9676de,2025-02-21T22:15:12.440000
|
||||
CVE-2024-54959,0,0,9f0a686e6ecddb708d340473cce33ce83c57a259a6f56d0e5117df6a2fd44baa,2025-02-21T22:15:12.593000
|
||||
CVE-2024-5496,0,0,9136fd74dd5c910c46896c769e58528b87587fcd9bbfc0ee678598fdc16fe0a5,2024-12-26T16:43:17.607000
|
||||
@ -274665,7 +274672,7 @@ CVE-2024-5515,0,0,55e8a346ed4b5156add8d5d4764b4fcbbcd3f128ffe8273b81d6c93a5192c8
|
||||
CVE-2024-55156,0,0,047a3c5a6f209e8eb9fb8475b27346fa1fbc5a9a2b9777c641dd68bdd26e4778,2025-02-21T18:15:18.540000
|
||||
CVE-2024-55159,0,0,4a0a9cc5fc22fa8488e14d07795095f6dbe86f6d6a4bb90e1244dfeccc3a07d6,2025-02-21T18:15:18.707000
|
||||
CVE-2024-5516,0,0,e06cf16e59a4c312854169722f307c5b1c3df8696d5f2dcd2a942cae721ba3e7,2025-02-11T15:12:30.713000
|
||||
CVE-2024-55160,0,1,11a0bf9e53badcc10e04b61dc64f019be635a5fab9b8ca8d85bb5bc4a7d74844,2025-03-03T16:15:38.617000
|
||||
CVE-2024-55160,0,0,11a0bf9e53badcc10e04b61dc64f019be635a5fab9b8ca8d85bb5bc4a7d74844,2025-03-03T16:15:38.617000
|
||||
CVE-2024-5517,0,0,aeac710ef90dc4db283f0d86d7fc3c11ec410a5f07233ec58c2840a5440c4d3f,2025-02-11T15:11:46.037000
|
||||
CVE-2024-5518,0,0,592daa13d5f40c4bec892c0e751c69d9592d967bcef9d52a8eeab5abfab02e78,2025-02-11T15:10:47.877000
|
||||
CVE-2024-55186,0,0,80cbe31f0c6c827f9fe1ea965ee9f035483ef81bd6d62228d42baa84cd806d8a,2024-12-20T21:15:08.850000
|
||||
@ -274763,7 +274770,7 @@ CVE-2024-55517,0,0,3c8c33e9f0396a101831f3e5ff6c0b4973f6bbd431af52c58783b2edaa611
|
||||
CVE-2024-5552,0,0,779c8b119b5a7bc042c6e25c9be4959c8015ea49092434c017d15512182ef4be,2024-11-21T09:47:54.927000
|
||||
CVE-2024-55529,0,0,1d23a6190ed20d6e071a25112ca50d5aa9ed1f469e0055848697711ea503dd18,2025-01-06T20:15:39.163000
|
||||
CVE-2024-5553,0,0,cbe2ddf67f45d187893926fbbdd2baf5f4f4aaeda85e24ec6fe6e5dc2690683a,2025-01-15T17:29:08.167000
|
||||
CVE-2024-55532,1,1,b95dd06756876774d7ad807bf9789c0c3d8d5e494ac0cd2e75361eb9170639e2,2025-03-03T16:15:38.777000
|
||||
CVE-2024-55532,0,1,6019b1ad578f2bed61169992a977212f42c83f99040b7f33db42bada10e85f78,2025-03-03T18:15:29.797000
|
||||
CVE-2024-55538,0,0,67bd56020d7a76419d848694822e6e545c69b0a5adc3b05464d4d5160a8064ea,2025-01-02T15:15:23.933000
|
||||
CVE-2024-55539,0,0,f458db4a5ff47752a8a05ab76298a754be66b6f65eac9c3cadabf0854aa3f5af,2025-01-09T17:15:16.057000
|
||||
CVE-2024-5554,0,0,3fb8d13bac6e351fa1470fa96b8178263946ef86d2aae872feb00193d95f3ac4,2024-11-21T09:47:55.160000
|
||||
@ -274790,7 +274797,7 @@ CVE-2024-55564,0,0,0ed737f325f7d691c0861d9b182294d3bfcbaeec43b5fc3c9c74a4f890349
|
||||
CVE-2024-55565,0,0,41a9edd709fcc5c920649312806312f16fb139e829113bdded78cdd6366005ad,2024-12-12T19:15:13.670000
|
||||
CVE-2024-55566,0,0,498f1e4e837f8ad9758e1df3de86aaaf6f7c709a5bad66d4383c3066d4682f26,2024-12-17T21:15:08.777000
|
||||
CVE-2024-5557,0,0,44dff462a78b58967ede2ecdaa2532229f4e94d50ecd88f40009666b113c3dd3,2024-11-21T09:47:55.560000
|
||||
CVE-2024-55570,1,1,6e9d2e652c470456ab2e828a585ea715db809dd2e7d02ec6fe542ca24100e541,2025-03-03T16:15:38.900000
|
||||
CVE-2024-55570,0,0,6e9d2e652c470456ab2e828a585ea715db809dd2e7d02ec6fe542ca24100e541,2025-03-03T16:15:38.900000
|
||||
CVE-2024-55573,0,0,87c1d76df18d7da2938a148b25d87e75b4595eedc061d29382f7b68f19851cf6,2025-01-24T19:15:12.923000
|
||||
CVE-2024-55577,0,0,eb6e58a9376d2712c57299b02d380d0ccd71fcb052d16b54f861ce85709558e3,2025-01-15T06:15:16.740000
|
||||
CVE-2024-55578,0,0,5c3fcc77d09324042ddbdfd728ad5e7386e7d5896fd6497db19ee19fc8c81ce3,2024-12-12T18:15:27.533000
|
||||
@ -275790,9 +275797,10 @@ CVE-2024-57226,0,0,13241ab5fcad4d8797ceadffb98a698582b96500669617b3e0cb2d147cf0e
|
||||
CVE-2024-57227,0,0,647d380c097e46d112c6c1fffa7a24d381c637a1d42abe27695321f81f5a0211,2025-01-16T18:15:25.373000
|
||||
CVE-2024-57228,0,0,2b2ede4eee89a9d230ac4fe6f1506a12a678e5912df7ff0d6e847af20a26c5cd,2025-01-16T18:15:25.703000
|
||||
CVE-2024-5723,0,0,e9a9bfbb365da81a3cbb0381b41b1530e9a21124d15e20f7ac8fec3dc25c5b02,2024-11-26T02:16:48.200000
|
||||
CVE-2024-57237,0,0,10a0a055ff6114ab5c31b296696f6a71ea30e20eb63b78fcf8047450271df36f,2025-02-12T20:15:35.483000
|
||||
CVE-2024-57237,0,1,fef0cbf59beef0bbb0800c060e5efd45e878e97a99de79a05a81bee9e443498e,2025-03-03T18:15:29.913000
|
||||
CVE-2024-57238,0,0,a6b3be788c3bc4fc051e3d4d8b4703fb53567dec95099f9b84b95f6aa023a077,2025-02-12T20:15:35.620000
|
||||
CVE-2024-5724,0,0,3819aa5efba8f524b2e05daa0542d560ece04ca1ec3f26079bc1135d63d2a09c,2024-11-21T09:48:13.843000
|
||||
CVE-2024-57240,1,1,72eff3f38096ef7320505323de413dfbe06e6971e701418633b96c9d22b36f06,2025-03-03T17:15:13.320000
|
||||
CVE-2024-57241,0,0,8994dec25d800da5e0c31df7a39443f7369494e97fd5d505a6f1c683c830876d,2025-02-18T14:15:28.237000
|
||||
CVE-2024-57248,0,0,fb61bd5f2cf829e3e9949d68a4efd231804cc252fcca96074ac9da52c6e827ed,2025-02-10T18:15:32.563000
|
||||
CVE-2024-57249,0,0,8fcbb1cd0dac9099c77da0f7019c7d58aadbbe52552dc9898297ef492ac8f84f,2025-02-11T16:15:48.463000
|
||||
@ -276089,7 +276097,7 @@ CVE-2024-57843,0,0,a291eea3f115dccf31a54bfbd28c6238356a52daec4febc3cf5227594411c
|
||||
CVE-2024-57844,0,0,ba7a9af927cdccfb32d77efd3b08b23135ba420a4b94376a9ac04ef40ed20ba5,2025-01-15T13:15:12.277000
|
||||
CVE-2024-57849,0,0,6c1a4f1831f5a2a9c9af19f1c5a93dad2a70d3fd672b039b5a9c54549819e120,2025-01-11T15:15:07.290000
|
||||
CVE-2024-5785,0,0,0e9b551c455c61638ce3e7d2f5874ca2c1cf14d589c0a4025501beedb178de88,2024-11-21T09:48:19.780000
|
||||
CVE-2024-57850,0,0,935491ba0e108e2b11a2a3b56ec1f62ee68c5d85a897dac1eb824251deb5adc6,2025-01-11T15:15:07.423000
|
||||
CVE-2024-57850,0,1,2124fa4258eb8c3a063b5b749880114208033ff71b7e7d5f4ee7e623334505c3,2025-03-03T17:42:59.740000
|
||||
CVE-2024-57852,0,0,cbbd46a7ddf6f86a683d1d4e04a80ddf6950679f6a40ec3d30c4ce0030834f86,2025-02-27T03:15:10.977000
|
||||
CVE-2024-57857,0,0,3f0cabf5d6ee223bacca9cfe8ea4c67c059ddcf7e3b9854317117b67ecec7803,2025-02-13T14:16:17.620000
|
||||
CVE-2024-5786,0,0,8f234ab6daf42312db402cec6a9780e6a0a03ed9070824749daf6f62affc4884,2024-11-21T09:48:19.897000
|
||||
@ -277052,7 +277060,7 @@ CVE-2024-6649,0,0,ef74f40b31322d5b329007bed5c92f233ef3833094d9e1d8063e53644fd1f1
|
||||
CVE-2024-6650,0,0,191a90b8e59766bb211098cdcde45ac010c3596b1d57e656d1836d4979422916,2024-11-21T09:50:04.373000
|
||||
CVE-2024-6651,0,0,a4781e28925027a5ab244f480cd88bd079c01f30be1e8b73b56732969688d923,2024-08-06T16:30:24.547000
|
||||
CVE-2024-6652,0,0,5652218e66653b40cb1f1758003b60ec7838cc9f220048781065b3fa7a0c3a50,2024-11-21T09:50:04.710000
|
||||
CVE-2024-6653,0,1,4108167d12666de6c39e5a237e3145b9962ab760426ea3cb98ff3f68cf88be0a,2025-03-03T16:25:24.627000
|
||||
CVE-2024-6653,0,0,4108167d12666de6c39e5a237e3145b9962ab760426ea3cb98ff3f68cf88be0a,2025-03-03T16:25:24.627000
|
||||
CVE-2024-6654,0,0,f805b0729a3c46b8be827fad378328d1ed2614783c392da30990213f3c0be59b,2024-10-09T09:15:06.713000
|
||||
CVE-2024-6655,0,0,cd84fc0b2c91b2bd9ab26bb80467662001cb12ff5fa86634c3654ff0dea4aaa7,2024-11-21T09:50:05.080000
|
||||
CVE-2024-6656,0,0,dd8d93127fb59afa87e8332076ccbf05d54c72d83e0b40e7ed5f4d6dde708cff,2024-09-19T13:05:44.953000
|
||||
@ -278448,8 +278456,8 @@ CVE-2024-8256,0,0,1611701250ae3ec61529b0da09cb8680607654a2f70f8e904e5974c82b4cf9
|
||||
CVE-2024-8258,0,0,f110e480f74f3d8ee9f2f16ea989eb0ea229b8f21015ec0d3b5c01c8038eabd1,2024-09-27T18:56:41.140000
|
||||
CVE-2024-8259,0,0,7bf4352426e14b796c98c3dff8a9f93d11f407925658b449d6ea8fe3ebd0f96f,2024-12-13T08:15:05.017000
|
||||
CVE-2024-8260,0,0,1a5d0d9640e33b2f7c9f22aba5e11715bf32bcc340f2c05d167a5a396b68ca4a,2024-09-19T16:08:58.863000
|
||||
CVE-2024-8261,1,1,b26e3650b4e8c808c79ab42633b4cd9f746eabe974630e56d567d421bcda9b41,2025-03-03T15:15:15.820000
|
||||
CVE-2024-8262,1,1,1b71717d43cc8abe3c9b92de4653872f506de8ba7069bdf5958b8e5371b45b63,2025-03-03T15:15:15.990000
|
||||
CVE-2024-8261,0,0,b26e3650b4e8c808c79ab42633b4cd9f746eabe974630e56d567d421bcda9b41,2025-03-03T15:15:15.820000
|
||||
CVE-2024-8262,0,0,1b71717d43cc8abe3c9b92de4653872f506de8ba7069bdf5958b8e5371b45b63,2025-03-03T15:15:15.990000
|
||||
CVE-2024-8263,0,0,c30b2614165b38dd1e79b54ad73ee801cd690dec6dfd531970fbb0c695a6b519,2024-09-30T15:57:26.213000
|
||||
CVE-2024-8264,0,0,2d0f7550734ab3870107734db176c89529f357d12409e5b5d0288029aba420c5,2024-10-17T14:06:39.420000
|
||||
CVE-2024-8266,0,0,7f51b02f290727aff51f7eadea155b5c0e5946c8babbbc1d8d023ac984ce4386,2025-02-13T01:15:25.137000
|
||||
@ -278717,7 +278725,7 @@ CVE-2024-8569,0,0,e97f1837802a26c97b97aa0e5330fc2cda35846d2f426d40c1d861d2d513b9
|
||||
CVE-2024-8570,0,0,35b004950db01bf28159cb7562e5ce8a51db620d19280577ea1dff40ca8f76f7,2024-09-11T16:07:35.400000
|
||||
CVE-2024-8571,0,0,1e61ea796a1987f060c2d849f110956dcbfd97021bdf692350e4c9831bfba6d6,2024-09-11T16:05:34.220000
|
||||
CVE-2024-8572,0,0,ba2ce6b4842387485ee0a2063de1f3423e42b59cebebf6b097f5d687c17fe8d1,2024-09-11T15:59:57.040000
|
||||
CVE-2024-8573,0,0,e3e20c0aa48aa54903584f35c1f847647f2c243a94f357c571ca62f77bbf3a53,2024-09-10T12:08:12.567000
|
||||
CVE-2024-8573,0,1,894a5b427b38e831f14a7134a58b8f62a81e7a22bb045350cfb1ce13c10526ba,2025-03-03T18:15:30.130000
|
||||
CVE-2024-8574,0,0,d7b0fe8fe3e454e505d204504797e0e3f51e0262f52a926511d015f1e298d997,2024-09-09T18:47:10.577000
|
||||
CVE-2024-8575,0,0,a9e0ba0af3a9f75cd3a1edb61c57e2962260db405f2e6724b3d20d42ab7c9dd5,2024-09-09T18:47:45.917000
|
||||
CVE-2024-8576,0,0,ae3f5c3aa8cd29a1fa14f12648e69e0abf3801c51cf750a3cbc28d96f60cd229,2024-09-09T18:59:57.423000
|
||||
@ -280044,6 +280052,11 @@ CVE-2025-0246,0,0,c39f5bdf37092ddacf9510ed2d75cd9204291d6d9bc9dd6c5bd8168e56e080
|
||||
CVE-2025-0247,0,0,0125f498ef227ebc436135b5d9339a763bd05ec1f3a6e4d4fb60e8d0a9524607,2025-01-14T17:15:20.547000
|
||||
CVE-2025-0282,0,0,193a86684d492a70f8035af4d9672f451f74d0f498147e63c150db661e49e756,2025-02-20T23:15:11.950000
|
||||
CVE-2025-0283,0,0,170559952a9515dd5478b031ee87167014dac9ea49e5e0d222b13defbaf7dddd,2025-01-14T15:58:55.813000
|
||||
CVE-2025-0285,1,1,bd76a73d88fc72bc10ed44c3117c45016b96684dc519171e4420c8e33e931fd6,2025-03-03T17:15:13.430000
|
||||
CVE-2025-0286,1,1,c4ec72a9554ec8a756e5843089b16cd508ff7c50c18456a0f96863f5d96c876a,2025-03-03T17:15:13.537000
|
||||
CVE-2025-0287,1,1,117ed428bdf1b61729c7fbe349ae65f5f01b243205b22e9b333952ed68d2afc1,2025-03-03T17:15:13.710000
|
||||
CVE-2025-0288,1,1,a9d3af508f26bc1a8c7748a2db86a46548a895db1c48b9ff7e76f56239bc4552,2025-03-03T17:15:13.823000
|
||||
CVE-2025-0289,1,1,8d7c88a592ed289173b4a13ae98054285b63c7fbb44bee84e192a3dffe5fdd54,2025-03-03T17:15:13.943000
|
||||
CVE-2025-0290,0,0,1b0af77f22124c7fd21050a24684089c59772f145263e66a578112620b4a0b4d,2025-01-28T09:15:09.363000
|
||||
CVE-2025-0291,0,0,c1c3893d4e09f9e0204fc40192dba70b3c3378a020c5622ef22757e5df4fb545,2025-02-11T15:16:03.447000
|
||||
CVE-2025-0294,0,0,c9b2fc3087b74017273fe9485890135d0ff2bb52c4c2bc9ab42cdccd09c8f44c,2025-01-07T15:15:12.113000
|
||||
@ -280073,7 +280086,7 @@ CVE-2025-0333,0,0,81e4cc439859af53c1b986765c85b9db6681ddfd15355f617bb0f4d13181d4
|
||||
CVE-2025-0334,0,0,a2752894f0956fdde9f25172948b20b0ef85e697939129012141ceedb1b495bc,2025-01-09T06:15:15.610000
|
||||
CVE-2025-0335,0,0,d5fa0c487675ca616e7ff135ad8a970ffdd4ae08b32ac07ee07443b3a83ed665,2025-02-26T18:25:29.120000
|
||||
CVE-2025-0336,0,0,795ad1de1d64b863b23a9ee9f1f8e965a4f5ae1458793c278520d16970dab18d,2025-01-09T07:15:27.860000
|
||||
CVE-2025-0339,0,1,56d80730bd4432f993e46d3759d1fe5c37d850c2923afcadbbf473db701d571e,2025-03-03T16:25:24.627000
|
||||
CVE-2025-0339,0,0,56d80730bd4432f993e46d3759d1fe5c37d850c2923afcadbbf473db701d571e,2025-03-03T16:25:24.627000
|
||||
CVE-2025-0340,0,0,d2643790c5408b8656f83d48122b2edd0443b492b102add5cec114f36ec3d251,2025-02-27T02:05:55.703000
|
||||
CVE-2025-0341,0,0,0910c605cd873a48d6e147ef8e48f39c307a6f6230257069712b94ac115dd221,2025-01-09T08:15:30.060000
|
||||
CVE-2025-0342,0,0,3dbfe8ec26cd89c8d358aa4179b87636b3a72d2e0b33768a4263c0b8cd9e88dc,2025-01-09T08:15:30.310000
|
||||
@ -280105,7 +280118,7 @@ CVE-2025-0377,0,0,1df5153b8a72b25478d0a1c4aa2347b3a7ff1e86a04300cb39dc18c1f91a36
|
||||
CVE-2025-0390,0,0,85e211229fc727d0a75c99e73a6347ac673debd4de873b613075df2a57d5f8e2,2025-01-11T08:15:26.527000
|
||||
CVE-2025-0391,0,0,0467368bada2df94a15908d4f5a949241716a78292a611cf2ebdc384e88dff74,2025-01-11T09:15:05.937000
|
||||
CVE-2025-0392,0,0,6d776f15a1615409f95c7590d77895411eaef103ad79522fbedabde2ae1bcf6e,2025-01-11T11:15:06.657000
|
||||
CVE-2025-0393,0,0,22eedb82350171fa3c91a6ff1a85dbf34b74c615b75c2cb01768d2b6196b94bb,2025-01-14T09:15:21.263000
|
||||
CVE-2025-0393,0,1,dfdff2773554c7857a88b27ef6038371e74a604c222de006f26f9dbe056025eb,2025-03-03T17:42:59.740000
|
||||
CVE-2025-0394,0,0,8af05602da319139a083fa2a7a4d905dc508d9028abbcf98db5f09623dbab6ca,2025-01-14T09:15:21.430000
|
||||
CVE-2025-0395,0,0,6c0480d65cb32616c80fd0c8d1f7a5f562f82dede6c8f4e1992556d40f947f0a,2025-02-28T13:15:26.860000
|
||||
CVE-2025-0396,0,0,b1ad63be952ebb25b29036632d23a5d199acb4c2189238a997d4a9d9ed4a3a46,2025-01-12T12:15:17.963000
|
||||
@ -280228,7 +280241,7 @@ CVE-2025-0542,0,0,6313331796a87cfd429c6887ebdeb1b0129ce5eba24c6840f8a5db7fe94154
|
||||
CVE-2025-0543,0,0,eff0a1055b76d4ca2905d4fafa8d1e8eefdbdc8138e12e68c5bbcea714737ab9,2025-01-25T17:15:21.720000
|
||||
CVE-2025-0545,0,0,63c3b9042492b87a07e49abf13646d4f678ce0fc03e014fc20736bc03bb30cd9,2025-02-24T14:15:10.910000
|
||||
CVE-2025-0554,0,0,d63933ab2a1fc2c70aefeeec5806ddf95b1569c2ec4a93f64ef98e2e1c34bb43,2025-01-18T06:15:28.160000
|
||||
CVE-2025-0555,1,1,13e96b4b6559b4859a1e09ee34d9bd76a96e1705c70a1bf7532ff1abe8c059c2,2025-03-03T16:15:39.227000
|
||||
CVE-2025-0555,0,0,13e96b4b6559b4859a1e09ee34d9bd76a96e1705c70a1bf7532ff1abe8c059c2,2025-03-03T16:15:39.227000
|
||||
CVE-2025-0556,0,0,2e939f9c46df46e943acd27c5231aa3ec1bc692b51067d4f0d8c17d23ee23f89,2025-02-20T20:41:40.723000
|
||||
CVE-2025-0557,0,0,a4d2397bb9974138a91f8206bbe00f4a1c6824d0efb01426f3cbba3778440e81,2025-01-18T09:15:07.710000
|
||||
CVE-2025-0558,0,0,7fd691444ae638db34f49f79deeccdce303e5d6667650549a03c453163c549f9,2025-01-18T13:15:20.417000
|
||||
@ -280293,11 +280306,15 @@ CVE-2025-0665,0,0,32d62a31dda68c00a725e820e49c088e5a4c0cbb7a3a5fc704b21339eef4d9
|
||||
CVE-2025-0674,0,0,6c39db7af62f37c0b44063680ba18af7d951adbde12586340e38d9aeb6048261,2025-02-07T00:15:27.017000
|
||||
CVE-2025-0675,0,0,08dac668b15b1b323f36ad42590ad19042939b423a1bc201978135ab31be85b8,2025-02-07T00:15:28.030000
|
||||
CVE-2025-0677,0,0,fc7fff60af52aedb8853b612fe5c7b8dfbe345cea75377cd46c5dc68fb745fa8,2025-02-19T19:15:15.280000
|
||||
CVE-2025-0678,1,1,a8e7b0d9112e22450ddb31af5114d89ca1572100dfa70cec738acdfd0baf60e9,2025-03-03T17:15:14.053000
|
||||
CVE-2025-0680,0,0,304211fa316d5ad912272d7e1c6d2fe276e0a8944295f89aa501df2029db6e97,2025-01-30T19:15:14.147000
|
||||
CVE-2025-0681,0,0,7f6d6145ecf7ddf69724980071110b6e3798eda306effd9fc06d55b4146ea16b,2025-01-30T19:15:14.300000
|
||||
CVE-2025-0682,0,0,82dc327006a11cf9eb8ed15c2db6bd7a0cc541bc0cc289fa88e6bc57635c989b,2025-01-25T06:15:28.740000
|
||||
CVE-2025-0683,0,0,656748caff6fec701396e9f78e84e971ce5f7b02979f679e43ad5dbf6778d8d5,2025-01-31T18:15:37.750000
|
||||
CVE-2025-0689,1,1,606a0d0cb1b5a9d976d1ff484b03dc425584d2fd14d18706666e718a5ed9ac1d,2025-03-03T15:15:16.147000
|
||||
CVE-2025-0684,1,1,08cf09aadd4265d9f17fc91e7ffa365e4af4b017983ec1ff0167ffac235b59e4,2025-03-03T18:15:30.537000
|
||||
CVE-2025-0685,1,1,36f03222d9846bb79813c677d1ef99c125061b51820965038a411e4d83039174,2025-03-03T18:15:30.733000
|
||||
CVE-2025-0686,1,1,c1cd4659b63910dd911bbe910efe568d44b2d78dc5d45dcca3ca5f7d1cf3b4cc,2025-03-03T18:15:30.930000
|
||||
CVE-2025-0689,0,0,606a0d0cb1b5a9d976d1ff484b03dc425584d2fd14d18706666e718a5ed9ac1d,2025-03-03T15:15:16.147000
|
||||
CVE-2025-0690,0,0,09027ea6c3bed8670e162224b0d482e5f3ab1012b1f296c54e49592e0794bc03,2025-02-24T08:15:09.503000
|
||||
CVE-2025-0692,0,0,3bbfd4bed044f796cd2d07e43de15285d842507b5abe7025f2d75e37bd86b43b,2025-02-19T22:15:23.433000
|
||||
CVE-2025-0693,0,0,eb9b33dbce1f9879430fb8ae34fc689989eda5748b42d3c57f89b331c8c0f5eb,2025-01-23T22:15:15.397000
|
||||
@ -280484,7 +280501,7 @@ CVE-2025-0997,0,0,d60982b4727f69c406a2b69a152e99650b0a7ac4a2979d7c180af9b049e9fe
|
||||
CVE-2025-0998,0,0,b98f0b713604f6d6debd775ef9a03f9f9afc3c7e8c1e50ee3e2f779bfe4f4608,2025-02-19T15:15:16.563000
|
||||
CVE-2025-0999,0,0,1be984dffbf5aa9403a277a79b79d3b81aa77630507f7a52346c4d25af468acb,2025-02-19T20:15:36.007000
|
||||
CVE-2025-1001,0,0,25822520434c0eee757567b9ac3c60dedccca12f67ad7f4e0649410902d4f3cd,2025-02-21T01:15:09.533000
|
||||
CVE-2025-1002,0,0,5924bfb893b69c2c48bc15800a18d8e148e3af0fc98b9ac93c5345173dbb78d8,2025-02-10T21:15:21.830000
|
||||
CVE-2025-1002,0,1,f97bac87e40c3e4ae6a1dab3e12b443e097c8b7c3a30912be5a1e1c3dab8f385,2025-03-03T16:52:20.953000
|
||||
CVE-2025-1003,0,0,6637ae0e206322756cfeafb7e3ebdef919f97629dd73a22be7a206522532acca,2025-02-04T00:15:33.940000
|
||||
CVE-2025-1004,0,0,9cae67c415976182c9e721c9cd510a26d80715a77eb7b99e0e645fceac3cfbf2,2025-02-06T21:15:22.247000
|
||||
CVE-2025-1005,0,0,6634395cbbb9a7c65c4fbb122df0f4ce8e0e536d41583c0c210842e7f1160ca8,2025-02-24T12:31:01.313000
|
||||
@ -280558,7 +280575,7 @@ CVE-2025-1115,0,0,30d7245a282f9be9cd5e268e84a047b532c6864c57222cb265a909087aa7d4
|
||||
CVE-2025-1116,0,0,00a59e293e16dcad8521027625075db7b6762697e4bdc6e6648fad6aa5872375,2025-02-08T12:15:39.660000
|
||||
CVE-2025-1117,0,0,689febb6066d1fec82c60e215bad724ad5df8fa85c4636fc9e776b8da79fe4d3,2025-02-08T13:15:07.843000
|
||||
CVE-2025-1118,0,0,1d46e95b87fe7edb9839b43fa6447bac85df34e285b438ecef13347991dc098d,2025-02-19T18:15:24.280000
|
||||
CVE-2025-1125,1,1,15af4019967856e6ea42daf32245e9e558665fc6040814b2b70f87b319149ce8,2025-03-03T15:15:16.300000
|
||||
CVE-2025-1125,0,0,15af4019967856e6ea42daf32245e9e558665fc6040814b2b70f87b319149ce8,2025-03-03T15:15:16.300000
|
||||
CVE-2025-1126,0,0,75a0af68b2de42873e4ee33ccd68bb162ec9dabf122dea8ebb0bf11a24b953a1,2025-02-11T17:15:23.537000
|
||||
CVE-2025-1127,0,0,5cab03037829677b3ff4c77d268b6ebc0b526a062cfabc702392a7f88c64ffc1,2025-02-13T19:15:14.153000
|
||||
CVE-2025-1128,0,0,3e3abcd3f96edb2abceed71a856737fc42627c92bf399c3000e0a443d77fce4c,2025-02-25T07:15:18.480000
|
||||
@ -280575,24 +280592,24 @@ CVE-2025-1148,0,0,d1618314ff59009839b509aacbbca99b15c99ccd5fbd1d92e78000fe3994e5
|
||||
CVE-2025-1149,0,0,d8d91fe8a3ea61c4ba8a8728b35b19cb024f17e8929c6b84c98db6467585ef43,2025-02-10T15:15:13.093000
|
||||
CVE-2025-1150,0,0,ad52c0f26e616344bc9e26433ea525a076361996f0527b54486144825cdc9fc6,2025-02-10T17:15:18.517000
|
||||
CVE-2025-1151,0,0,6f137cbb7dc8cd66d49b40611be226ac13ffd672475b8994ef22393fe66acf80,2025-02-10T17:15:18.713000
|
||||
CVE-2025-1152,0,0,941bdd76f63c9e36646d2514ed9a768715eff331ea36926bfaf5737d1ce4c5ec,2025-02-10T18:15:34.043000
|
||||
CVE-2025-1153,0,0,0ecc24c7fb98e79f6fc13494f133dda5ac9bd638e03e4b55b9e91e76752966af,2025-02-10T19:15:39.900000
|
||||
CVE-2025-1152,0,1,ae53d6bc7df1c05ec8db34e17fef35dc2661a6e86edb0d9d93d56afcdd732f31,2025-03-03T16:52:20.953000
|
||||
CVE-2025-1153,0,1,4a0aa81e885caa78790692d05830179faca64dd7e5cb7f2a5704fa52079f4dff,2025-03-03T16:52:20.953000
|
||||
CVE-2025-1154,0,0,57272d35734346cb9c87a9c3d8280a92cef919f388fe5cd9152692becb234631,2025-02-10T20:15:42.173000
|
||||
CVE-2025-1155,0,0,80c10c69f8c4209d273d0f2f525d1dc06e697593fb801952ed2e59d173c27449,2025-02-10T21:15:22.020000
|
||||
CVE-2025-1156,0,0,b9d7f43a66be70b99a0c5a29d90bee603b5f0498d98b3e0e919a25713e636c40,2025-02-10T21:15:22.133000
|
||||
CVE-2025-1157,0,0,0768c3316686f8ea0ce85f895d4742070425b3dcc01a4b346a3d2ba70ce2affd,2025-02-10T21:15:22.300000
|
||||
CVE-2025-1158,0,0,5e890f5418f698c1bba0f62345c72d90ed4bba77c16f29dd16e63bbd56007ead,2025-02-10T22:15:37.080000
|
||||
CVE-2025-1159,0,0,90400029a439f5c084fc196475b85cccbb140946c8929820cb6af741e32f7edd,2025-02-11T16:15:49.820000
|
||||
CVE-2025-1160,0,0,b6eb95ef65e41f2fc0255c464d03f10768661ee65b4113962d6d468c0b6b4deb,2025-02-18T18:15:30.120000
|
||||
CVE-2025-1160,0,1,9ed013a287e8b0e2fb1943b5a3277af7222e216b017461ef1c63a5d096f62e0c,2025-03-03T16:52:20.953000
|
||||
CVE-2025-1162,0,0,3b2bb2db7d54134892b769fb4423602d51c7e76dad09dbb88016ba5ca9824837,2025-02-18T18:15:30.347000
|
||||
CVE-2025-1163,0,0,b975e395770f67220ae579bd05fea3ea91a0cf1c411dec11ad62f751ffa1168e,2025-02-11T16:15:49.973000
|
||||
CVE-2025-1164,0,0,e9bbc44bade1bc16b0d947d13699313517ec6ca51887fcc4ad782f0763bb0e56,2025-02-11T16:15:50.100000
|
||||
CVE-2025-1165,0,0,34dfe20c3add5e7f1a3c3253370e0b994562b1e78bd746b6a2ced4fa7e32b226,2025-02-18T18:15:30.530000
|
||||
CVE-2025-1166,0,0,d865e452fab72aab211665c2175168d5c2705d2612224a67de071e15e8040724,2025-02-18T18:15:30.743000
|
||||
CVE-2025-1167,0,0,2d3866f5641bb3d5b1eecb2f44d6b7f1da7ec111493e479f26cb5c3d7c480a69,2025-02-18T18:15:30.940000
|
||||
CVE-2025-1168,0,0,71b85aae92f04582e0700d4784a3bc2a793ba320bdca0fd4391697007788cb53,2025-02-18T18:15:31.127000
|
||||
CVE-2025-1169,0,0,8c055d8e40c4e159e2c7a6b5e02bfdddebcf6a95d43241331f4d09d2ebf7b9fa,2025-02-18T18:15:31.317000
|
||||
CVE-2025-1170,0,1,feddbff8762786c58b56b4bf5125ff9df23e79ce1623aef48a226f8050f6bd05,2025-03-03T16:25:24.627000
|
||||
CVE-2025-1168,0,1,4a1406c1b5e33a30f712f8cf4938baac8df6cb2dd16d2778f2443a592ac7c4db,2025-03-03T16:52:20.953000
|
||||
CVE-2025-1169,0,1,fe01deed4aa0ac0beffa688a70b98e4c6971422227ee7d7a1d13ad31fff5d4cb,2025-03-03T16:52:20.953000
|
||||
CVE-2025-1170,0,0,feddbff8762786c58b56b4bf5125ff9df23e79ce1623aef48a226f8050f6bd05,2025-03-03T16:25:24.627000
|
||||
CVE-2025-1171,0,0,f170f11bcfeecfa035d408acd2b5aa9d719bf2c41b86861cf69d4a47ff02dc01,2025-02-28T02:17:48.143000
|
||||
CVE-2025-1172,0,0,8e59f1ce675ba7727e3262ba156fc17ba513ead7169ce565d608390ce0ce1365,2025-02-28T02:17:48.143000
|
||||
CVE-2025-1173,0,0,19fdf9f9d4e4497e9a2ec0879adc1243d220e391d63758299a413cfaea78434a,2025-02-28T02:17:48.143000
|
||||
@ -280601,7 +280618,7 @@ CVE-2025-1175,0,0,e4e505608345f018f25d9a8f47aadfc991d7592689b77a43eab3f49ae131ee
|
||||
CVE-2025-1176,0,0,d6dca320a4640a736fafe63f90a3c92a5ff2761ed55359c273af5b390b7318ef,2025-02-20T16:40:56.790000
|
||||
CVE-2025-1177,0,0,a9031c02ad15cd3b79dae0a4c247f1d863fa16483cc0621210d54f890eaefbe0,2025-02-20T15:58:50.097000
|
||||
CVE-2025-1178,0,0,2f1840a40618337523c22fd8c03700c138257f2d73bd6581485943a674b97af6,2025-02-11T16:15:50.410000
|
||||
CVE-2025-1179,0,0,52c6f29cb50c719935d38299de7e162486a201b0c0d2d3ad3255c84f08269eac,2025-02-11T07:15:30.230000
|
||||
CVE-2025-1179,0,1,3297418a330e74fd477c6438f6da915df0956de0b57128f7637ac56e4c339143,2025-03-03T16:52:20.953000
|
||||
CVE-2025-1180,0,0,482e7a91c46cfa35d47e6ff4e9d3a7143cddcb1e73a2a9f5403f9ed9c303e86c,2025-02-11T15:15:20.260000
|
||||
CVE-2025-1181,0,0,0fef40647a61f80aaba8a4cfdd85fdda47bca041d99333f27eaeb2e33c9be973,2025-02-11T15:15:20.393000
|
||||
CVE-2025-1182,0,0,54e498160c1635f94a2f987c8bdb0818a2273e3d3652f60ff63b2a7f8ae5df6a,2025-02-11T15:15:20.523000
|
||||
@ -280649,7 +280666,7 @@ CVE-2025-1231,0,0,53b09d0e70e608d42ef2315cf58b2a0031ad64c29b00c44d026df29aef3338
|
||||
CVE-2025-1239,0,0,6187788ffe5fd6000cc24d081f477dcae5b0ef59871d160b3ff23ee25b818501,2025-02-14T14:15:32.687000
|
||||
CVE-2025-1240,0,0,363ac0ec488e57d295d78c481b595c1c1507ba076f5813d8f4f20530988afa84,2025-02-11T22:15:29.800000
|
||||
CVE-2025-1243,0,0,b36908327b1b41fa664c4a39c71934592fd1d75bcc40ba67f7d64ed64955da7e,2025-02-12T01:15:09.073000
|
||||
CVE-2025-1244,0,0,0ae76203740f379d7903882ca8506bd3e442f9968d35d8da5cd8a7c6ae871553,2025-03-03T12:15:34.453000
|
||||
CVE-2025-1244,0,1,00fcfd698eb59091aa282e3a0775a6dd44b3c414df60c9b9a0d63b7e603b2a46,2025-03-03T18:15:31.307000
|
||||
CVE-2025-1247,0,0,413d4bcd6e00b55487b15f2b541fa31d8a6169438afa6345f0107f85b8ddc727,2025-03-03T14:15:34.120000
|
||||
CVE-2025-1249,0,0,f9cf8228939f75e3961b7ce63e2e103ee292f920596572fc4d2ff4b8583fc869,2025-02-26T15:15:24.470000
|
||||
CVE-2025-1258,0,0,e60d49e74992453b0cd2d8b93f0bc7a60901e2447adb1d6d0cde7627e3bb44f5,2025-02-20T18:15:26.217000
|
||||
@ -280763,8 +280780,8 @@ CVE-2025-1570,0,0,b46b74003a884bfde248d1f55d464c09d2edda3a9f89316fe0cc50da512e92
|
||||
CVE-2025-1571,0,0,2ff9d1871ce4b294af235897d1f180d1853e1f37cf780d6e8da053f8773e82c8,2025-02-28T07:15:34.227000
|
||||
CVE-2025-1572,0,0,1320b2f727383676da6c73261af1868478cf6dd12bf50e5bdd5ba7a431e21124,2025-02-28T08:15:35.810000
|
||||
CVE-2025-1575,0,0,295612ec0ffb6cc1f5a98b01cca7e60e463451cd2e098b1e5038c15250f15467,2025-02-23T04:15:24.980000
|
||||
CVE-2025-1576,0,1,aeb190ff01707b8d12dded28d81e8d078211363f2b351bee055762ff93e0203e,2025-03-03T16:25:24.627000
|
||||
CVE-2025-1577,0,1,4d8fa583e71372f21db5fe2ef87d702b5d584f75eb8697a695605f1072d59f24,2025-03-03T16:25:24.627000
|
||||
CVE-2025-1576,0,0,aeb190ff01707b8d12dded28d81e8d078211363f2b351bee055762ff93e0203e,2025-03-03T16:25:24.627000
|
||||
CVE-2025-1577,0,0,4d8fa583e71372f21db5fe2ef87d702b5d584f75eb8697a695605f1072d59f24,2025-03-03T16:25:24.627000
|
||||
CVE-2025-1578,0,0,0d9ecf545c28371e3a17142eb6623e9049c12d991fcbf8ec598bccc17e9c793c,2025-02-28T19:36:29.477000
|
||||
CVE-2025-1579,0,0,27c513acd0a9c40f3d5e6eaa99975a86fa62c7ac2618374b3e15bf65d08f5d6d,2025-02-23T09:15:09.393000
|
||||
CVE-2025-1580,0,0,afeecf9391b29af9c4df01adece54496ac1306b282e21af172a55a31e76b33b2,2025-02-23T10:15:09.623000
|
||||
@ -280827,7 +280844,7 @@ CVE-2025-1690,0,0,c3c30e76959167db5e53b3f3d7f732bab0cb17823abdf119dfc999308f89a2
|
||||
CVE-2025-1691,0,0,fa342911d8aff1f1c916fab2606c8daed81ceb012a2ca7f67eb6c905e0ec582d,2025-02-27T16:15:38.610000
|
||||
CVE-2025-1692,0,0,ada4fe9963e6bfb9428a6effda149b259cc8c8d330fa71a5cddb43ce0441e458,2025-02-27T13:15:11.413000
|
||||
CVE-2025-1693,0,0,78bee8ea11b0f84269d8265b773d2949284a15da89c9262684dc7b4564686390,2025-02-27T13:15:11.563000
|
||||
CVE-2025-1716,0,1,db3aecae26e7981ab8a106cfd43bc335b9dad5cbc10d04d2c9d637c981434378,2025-03-03T16:15:39.520000
|
||||
CVE-2025-1716,0,0,db3aecae26e7981ab8a106cfd43bc335b9dad5cbc10d04d2c9d637c981434378,2025-03-03T16:15:39.520000
|
||||
CVE-2025-1717,0,0,531ae6ccf2948d3fb4bab20d73b08fd6766b8bf8893677c6840dec6217d1f072,2025-02-27T08:15:31.130000
|
||||
CVE-2025-1723,0,0,bd3dc44ce79d918f1eca963344abea138edda86e5a9253ac44f547b43e3ab229,2025-03-03T08:15:15.717000
|
||||
CVE-2025-1726,0,0,1eac96fa1d7a7ec9ea278c42b19f49f33808e18559f649ea58334e24fccb274f,2025-02-26T20:15:13.510000
|
||||
@ -280857,7 +280874,7 @@ CVE-2025-1795,0,0,70fd77cb540d3bda179678e58a7ef81c271cc3e16d5d4d855b724aa1245ec6
|
||||
CVE-2025-1797,0,0,300dd40b9ba65144edab2a795cb46e891c141669ea3cc5dd5e27c94a6c5ec09e,2025-03-01T15:15:11.573000
|
||||
CVE-2025-1799,0,0,43816068956cdf14dad20a4e5e4d1fc47001df714eea26349dd91115ab4dac95,2025-03-01T18:15:34.803000
|
||||
CVE-2025-1800,0,0,322e2f3c3e826d546073227fc29a2546415ead7a627628aa90cb68e7eca6995b,2025-03-01T18:15:34.983000
|
||||
CVE-2025-1801,1,1,a2a811c3bbd4e41c2b1f7fc15d1597e52583d9e67a8b01eb2f319fa5bd9e33e7,2025-03-03T15:15:16.500000
|
||||
CVE-2025-1801,0,0,a2a811c3bbd4e41c2b1f7fc15d1597e52583d9e67a8b01eb2f319fa5bd9e33e7,2025-03-03T15:15:16.500000
|
||||
CVE-2025-1803,0,0,61b8ea959516cf458cfa0ea204219ee983e8adc2cba473f893652a1e07a05d40,2025-03-01T01:15:28.077000
|
||||
CVE-2025-1804,0,0,4efbbb5111b547eb1b7feeda8daec896151cbee844f359a595f3a1d604d85292,2025-03-01T19:15:10.660000
|
||||
CVE-2025-1806,0,0,50d403f25a8bffb801c29906a32759d0581e4716f01ef933399e6391a089100f,2025-03-02T00:15:33.980000
|
||||
@ -280876,27 +280893,27 @@ CVE-2025-1818,0,0,d36c337878b30c2f80b4fe6d65335bad90523aeaff616d34524d0eb820cfb6
|
||||
CVE-2025-1819,0,0,b8077e9897a336636549b20cf9dc0e287a17bc30f636d2d56ac710cc82e6e8b0,2025-03-02T17:15:11.483000
|
||||
CVE-2025-1820,0,0,5b07ae8a40a108bc4ab7ed1b8cb2828218b05189c18957cbe94b8a5f85021b26,2025-03-02T17:15:11.677000
|
||||
CVE-2025-1821,0,0,a22d62df68a6ecdf2cee7c63de4eb3be143020d9e83525092cb5432c673c769f,2025-03-02T19:15:10.547000
|
||||
CVE-2025-1829,0,0,7bd0b178236abc248f33deca78089674811f2be261b98e2d4cb6a5f686400d1a,2025-03-02T19:15:10.723000
|
||||
CVE-2025-1829,0,1,fde8c132aea7b0381baf40fb45deb0fda4ca046d0a6be0cd0198b49b4d2a0189,2025-03-03T18:15:31.937000
|
||||
CVE-2025-1830,0,0,3e81308df6e20208e5b8dd46f2ba49560e891edb972fd2acbd10ea701dde0eb6,2025-03-02T20:15:33.767000
|
||||
CVE-2025-1831,0,0,26956ae81d5dc8972cfd2062e799a0ff1438cf6d1566635ba60e2d789cba3f80,2025-03-02T20:15:34.577000
|
||||
CVE-2025-1832,0,0,236dc639d7ddb0baafd72dab1099fb056d5eb2410a74bf2ec5e369437d8779b3,2025-03-02T21:15:10.110000
|
||||
CVE-2025-1833,0,0,20fdb57eae0d9c145f022ababa08106368fcf40a78b1f2f8a9fb4fde977089f3,2025-03-02T22:15:34.820000
|
||||
CVE-2025-1831,0,1,dedf0ae51363b8d3ed1c865993f4e92f8fcbae9a0264890a31526f1cf08aecec,2025-03-03T18:15:32.520000
|
||||
CVE-2025-1832,0,1,629dbdcf5550d5557538ee06a7ac8f727a167d99ca32f116db8fc1cbc6bc3943,2025-03-03T18:15:32.950000
|
||||
CVE-2025-1833,0,1,412c4506bdf3d53653b4205b23dc52fa25efa7a9f0ddc11e86618e846c0dd94b,2025-03-03T18:15:33.763000
|
||||
CVE-2025-1834,0,0,0ad2de3af2e9de32d9a99e976be1a3bb5dd352e04c52e05ce75aa17bb8e7d3a8,2025-03-02T22:15:34.997000
|
||||
CVE-2025-1835,0,0,2a60a18877264a79f9b058b41ced82deb6530a74d9ea4d0efc60852085021534,2025-03-02T23:15:10.477000
|
||||
CVE-2025-1836,0,0,13bb65ca0c6e5a0d08d48c52a2ee2cb91592f3886044f600fe193534f47d51c6,2025-03-02T23:15:10.993000
|
||||
CVE-2025-1840,0,0,d37a1f00306bec1b2440f6ba2a388e661831cd809495b3808bb6eec88299d06e,2025-03-03T00:15:42.857000
|
||||
CVE-2025-1841,0,0,72bd852d9729b5ab0e0fcfbf1d47c2dc8f892ff9f5a00440a1cc43c8f6ead9b4,2025-03-03T00:15:43.033000
|
||||
CVE-2025-1842,0,0,2740657f48db38aea65ff197731a80f46823dc93f34b86cad29da345a9d78495,2025-03-03T01:15:10.023000
|
||||
CVE-2025-1843,0,0,de69dfec2e0b193564d55ff4e98cb87273a9fbfd2b156d82a5acaf926ac31da8,2025-03-03T01:15:11.127000
|
||||
CVE-2025-1844,0,0,f7a0768b0a78e26485c5dc34e4b3b0832ad616e62441c9ecdb8a086661609d04,2025-03-03T02:15:33.390000
|
||||
CVE-2025-1845,0,0,4d13fb467d03250d9d7ad58527e0d7ddc037dede35f97e95d7597953255643db,2025-03-03T02:15:33.563000
|
||||
CVE-2025-1846,0,0,5c7f3bcd4f600ed21100c2323eba63af680e8a42c3178debbd9d070582d1b8dc,2025-03-03T03:15:08.777000
|
||||
CVE-2025-1847,0,0,746236a7f5daba7186147d066b7aaaa80fd843c4adbf688ee60e53e05f7bb637,2025-03-03T03:15:08.983000
|
||||
CVE-2025-1848,0,0,b4b3792b2f071cb7baebc550aa244188045e4139769a51b876e21cea9dd8bd3b,2025-03-03T04:15:08.657000
|
||||
CVE-2025-1849,0,0,354df1d3115e7ed477918e35dd2218a14edf9641d1ba7b4fa97da52f2d0d22aa,2025-03-03T04:15:08.837000
|
||||
CVE-2025-1850,0,0,ea68a3dd00a560e71fe95deae84b875b31ca9504072c80640a2691c9ac6d0c08,2025-03-03T05:15:10.587000
|
||||
CVE-2025-1851,0,0,faa5ac08ac0fee46f1b16a0465106e5a4a341af911fe8c171e43fb5f1b00229c,2025-03-03T05:15:10.867000
|
||||
CVE-2025-1852,0,0,a886287ebd221b754a408205bc3961099fffa063d675a6087bdc41ff2f34bc44,2025-03-03T06:15:21.343000
|
||||
CVE-2025-1843,0,1,952309a902e5f1ef5af6384d2fedc20e363b2d346a8c7b0b378ee7b767fbe968,2025-03-03T18:15:34.290000
|
||||
CVE-2025-1844,0,1,36733d3ad467e74040d2298fc997773dc4b826b85e011a14f94c3f5f7b4b2d14,2025-03-03T18:15:34.773000
|
||||
CVE-2025-1845,0,1,c92853bfb71ea4fa8e4a4fc1f4b9baa88ef35e5426053983652151fd7bce795b,2025-03-03T18:15:35.840000
|
||||
CVE-2025-1846,0,1,51092600573c3bda80c700b6a8ea887629c09c0e03ae4b0ac2064388b0613b3a,2025-03-03T18:15:36.340000
|
||||
CVE-2025-1847,0,1,46fdf146f62263a0167fe919bb397b4120a8e8de268127eff305761e90fec00a,2025-03-03T18:15:36.537000
|
||||
CVE-2025-1848,0,1,4304128e930dad5c3b8b7258c342acdb2748223c34186c8f98d95ba3006e543a,2025-03-03T18:15:36.720000
|
||||
CVE-2025-1849,0,1,f2258c853087c6840804e3a02ab7b6509c32174f759f6aa5b93be0056910680f,2025-03-03T18:15:36.893000
|
||||
CVE-2025-1850,0,1,ed2d993fc975f386b8fad0f239bbd09bd774a741a5c53a4b455fd831639e33a1,2025-03-03T18:15:37.077000
|
||||
CVE-2025-1851,0,1,f8420159a375356cdfd200ff3bd53ab2168d0b711b6e47bfeb1f78dbe8d34bc6,2025-03-03T18:15:37.277000
|
||||
CVE-2025-1852,0,1,368f0d9bdf8de44077e6f73fd13ce719918d7cf971eb7381c563106693af6c20,2025-03-03T18:15:37.447000
|
||||
CVE-2025-1853,0,0,1ca7b3f52c25c3fc5fa57ff0b3fdcd1cc5bcf593f896e1516be8778f7214bfba,2025-03-03T06:15:21.697000
|
||||
CVE-2025-1854,0,0,807272fc1faf394020bd02f44d1204a0d3e08b77045a8805f11576c69ec3afca,2025-03-03T07:15:35.030000
|
||||
CVE-2025-1855,0,0,3e9f8b558ac6552e8526a9c2fbaf0089e976661b34f06258bdcdb5078af97e9f,2025-03-03T07:15:35.277000
|
||||
@ -280915,6 +280932,7 @@ CVE-2025-1872,0,0,37d85e8c5e628c1acd5202959187915e2c659fa3bf0379a3a04d86d535bc53
|
||||
CVE-2025-1873,0,0,e1c282e5ad730be363eaf77efd9ada11d8c28125c103f5c76eae6f3dc74ed906,2025-03-03T13:15:12.547000
|
||||
CVE-2025-1874,0,0,aaac5f5bbefa513f1f275c65a81e3107f76733903a225b9b994a8887fc4365fa,2025-03-03T13:15:12.693000
|
||||
CVE-2025-1875,0,0,05a3bf51a95148d04bc21a250ccef05a1148e7afa6764429679a636a04f327f8,2025-03-03T13:15:12.837000
|
||||
CVE-2025-1876,1,1,5ab8224545773fa9f93a39ef9ebb1dd5f5c34e4ebc74e7211110b0307ff1d955,2025-03-03T17:15:14.517000
|
||||
CVE-2025-20014,0,0,f4fd1db051e4652a5d7e7863a21c37faec75062d4b5ce0e4f2c6bffc2f3ee854,2025-01-29T20:15:35.207000
|
||||
CVE-2025-20016,0,0,6fccb84eb01c2cd66b422e82777f9738bfe5004121e1b551d0ae454724543c0e,2025-01-14T10:15:07.500000
|
||||
CVE-2025-20029,0,0,d9e3ca63dc18f9436b5043ebae0bcb543cc6452f75921963fed59e1df065c2d7,2025-02-05T18:15:29.573000
|
||||
@ -280990,7 +281008,7 @@ CVE-2025-20643,0,0,2e2366245f9f5bcad98b9838a1898890ae5530ce7393a7ea521ec6965e892
|
||||
CVE-2025-20644,0,0,ca4674e609c8d43590774d83b33a9ead2d66ed4ea8d3e9136628580894824b31,2025-03-03T03:15:09.173000
|
||||
CVE-2025-20645,0,0,50c2f7a77d19c85e70131931e626054a7b3b307d4380740abc99317c0cc503c0,2025-03-03T03:15:09.293000
|
||||
CVE-2025-20646,0,0,cffc2e10e8f144699ea086242ab9f118a4a5f283ffced233e9122854e6f3cb85,2025-03-03T03:15:09.403000
|
||||
CVE-2025-20647,0,1,f8b14a260b30296d5521b985721527413454d57f9703d76e8d5f0a3d821d5af3,2025-03-03T15:15:16.880000
|
||||
CVE-2025-20647,0,0,f8b14a260b30296d5521b985721527413454d57f9703d76e8d5f0a3d821d5af3,2025-03-03T15:15:16.880000
|
||||
CVE-2025-20648,0,0,8a5329795e49d943046cd42334c66ec6e22086a139db47fcc996c0e16d9bec63,2025-03-03T03:15:09.620000
|
||||
CVE-2025-20649,0,0,e6b321888e5587435d9fe5c887af311fd6ada0707e9e5d0aaa38016074282498,2025-03-03T03:15:09.730000
|
||||
CVE-2025-20650,0,0,d87d253c52d390a1c1085865131f5ccd369068e01b98708e99f6223902cbbf92,2025-03-03T03:15:09.840000
|
||||
@ -281054,7 +281072,7 @@ CVE-2025-21136,0,0,1471b8df9400bf2a614051a2204be217d0d5f426f818af5f4e13aa30b875a
|
||||
CVE-2025-21137,0,0,45139b02243d4b1da14a9edb94333c11b50a8560016fecd32028ca2a6372fd84,2025-01-21T17:49:47.150000
|
||||
CVE-2025-21138,0,0,9175fd36c28710bcae9acb351f078e58c4e36962afaf9695ab07299ddfe97cfb,2025-01-21T17:49:57.513000
|
||||
CVE-2025-21139,0,0,2997f9c80c926e4a0ccbf0529ea4d9ee2a8d2178744e4927ee6a077f342903ba,2025-01-21T17:50:10.023000
|
||||
CVE-2025-21155,0,0,1ee49d33bfabef78343cc7af8c527cca0e5a2529c9eaeeb2555c43789cd90432,2025-02-11T18:15:27.583000
|
||||
CVE-2025-21155,0,1,3b730fcf3884ebe69fa3cb10c79d458749d35e3fdc22e4031b3aa2f27e975e38,2025-03-03T16:52:20.953000
|
||||
CVE-2025-21156,0,0,3dee0f6c65f1bd094a761214b4f97ccdafcdcd8576589694bb708cf58dce07fd,2025-02-11T18:15:27.787000
|
||||
CVE-2025-21157,0,0,dc11ff4b6b9e18e8b723fd7cd41934447880c05424133b5ef5cb6054de515224,2025-03-03T14:54:17.487000
|
||||
CVE-2025-21158,0,0,68d9b59f620ec5478dd99f17f5a82d6ee9d79b9f8dce8ee154ea0f44bd83c1b3,2025-03-03T14:54:17.487000
|
||||
@ -281627,7 +281645,7 @@ CVE-2025-22207,0,0,227e1dd024a03046d5aad9d73b27b2d6f23b1761e7c90a962fa1e9e855255
|
||||
CVE-2025-22208,0,0,4da3f6139c6e9c40f33488344972941101e9c73e7b48ee2d6c4ba83ac4c0595f,2025-02-21T13:15:11.400000
|
||||
CVE-2025-22209,0,0,6259f847301f1e17e539d0555807865e6f3eb75df7ef5140d83a13597977cfcd,2025-02-21T13:15:11.553000
|
||||
CVE-2025-22210,0,0,abd3877e40c6e9332d48e0a8769aa45708e26e2efdd35254a970ae6f9ad61b2e,2025-02-25T22:15:15.060000
|
||||
CVE-2025-22211,0,1,46973cc2447595c7ddddc91ed5a119416d2f8b85568742f477e9baab344732de,2025-03-03T16:15:39.843000
|
||||
CVE-2025-22211,0,0,46973cc2447595c7ddddc91ed5a119416d2f8b85568742f477e9baab344732de,2025-03-03T16:15:39.843000
|
||||
CVE-2025-22214,0,0,9f9cbba758088c6fe54f3b7aba457fa8b68f7e0bf397744585451dc526c7cea3,2025-01-02T04:15:06.277000
|
||||
CVE-2025-22215,0,0,e26e39627ebf88fc4492196348e13c55563ef72a3b7150347ad788f5576b3be6,2025-01-08T15:15:21.927000
|
||||
CVE-2025-22216,0,0,0647923838513073f2b0d0386ce946a85c5a3cb60aa88ae944b42a751c855e8c,2025-01-31T18:15:38.247000
|
||||
@ -281939,7 +281957,7 @@ CVE-2025-22734,0,0,ebb588399299ed7786c13a4d873d6a5e5a3c44188d8c165fdc0198076e15c
|
||||
CVE-2025-22735,0,0,de6a6f26a15403b2f22d28132a742d5d30dbb5d122c903ecf659b867065c2369,2025-01-21T14:15:12.737000
|
||||
CVE-2025-22736,0,0,0f002f9c72e82e1a6604d70abaa51b2bc570bcdd5574d8a2c1f2e2cb9ae96bef,2025-01-15T16:15:35.877000
|
||||
CVE-2025-22737,0,0,d993d76148f4207aebc67a18a146e07d4f4f3ca83cc7e5580153e5155464b350,2025-01-15T16:15:36.030000
|
||||
CVE-2025-22738,0,0,66295193def3bb821d4d07460e015d4f0b5ac1600519337a96c9abcc7a61d25f,2025-01-15T16:15:36.187000
|
||||
CVE-2025-22738,0,1,73c5f33c15da133af8f5c3f0cb6df210373e9a3523fbd71c818e52f95d68cc4a,2025-03-03T17:42:59.740000
|
||||
CVE-2025-22742,0,0,11a4a56fc317da9c8dfee788933cef43a2971f0d29d36632165000485ef746b0,2025-01-15T16:15:36.350000
|
||||
CVE-2025-22743,0,0,76f32fc2f88d28b097346bb603b63ac7aee93ae537a00506ea3d57cf32b7feb9,2025-01-15T16:15:36.503000
|
||||
CVE-2025-22744,0,0,9c4303b28715077c0dbe485fb40535cf186962e58a22a39419bcf9fb85bca699,2025-01-15T16:15:36.657000
|
||||
@ -282043,7 +282061,7 @@ CVE-2025-22921,0,0,fc4d8d5f4bc002d31a8eab55216be4cd1b637344934aafdd7df2486b97620
|
||||
CVE-2025-22936,0,0,d81f6f27c0c4b19886d50175e4767c83ad84386da04b2ebc81be17b6a19a6c20,2025-02-12T14:15:33.187000
|
||||
CVE-2025-22946,0,0,7db37666dfbf9142b1788db2e9c9ed7b839c8fa56ddb82a64c0b003e5a2cac22,2025-01-14T15:15:28.480000
|
||||
CVE-2025-22949,0,0,4497a547d6c85b77c71713f92e0bd769cd0fee1b37f22227e370aa8af86f0dec,2025-01-14T15:15:28.637000
|
||||
CVE-2025-22952,0,1,81f6e17717edc94ecbde92b279584adc65afdde56cad155ba2ae5a67cb261723,2025-03-03T16:15:40.010000
|
||||
CVE-2025-22952,0,0,81f6e17717edc94ecbde92b279584adc65afdde56cad155ba2ae5a67cb261723,2025-03-03T16:15:40.010000
|
||||
CVE-2025-22957,0,0,a83a10114b8bffbb61185f4b7e1da98510853b7fa64b4f1d87dfa557428e19b8,2025-02-18T19:15:26.813000
|
||||
CVE-2025-22960,0,0,03dbe017a43731b62764513a5831ed79527b3dffb6d1c2c75f2395befe9bee6b,2025-02-13T23:15:10.960000
|
||||
CVE-2025-22961,0,0,a8d7599115f6e6df511a78a0281bfd773eeeaf5f1ff31bc5878e314826477a78,2025-02-13T23:15:11.047000
|
||||
@ -282733,7 +282751,7 @@ CVE-2025-24017,0,0,4127b8a7fb48204ccdedd278270e1a824a4426e6472255b67fd4d2229bebb
|
||||
CVE-2025-24018,0,0,e4baea09df10b36d105667a7249c05293515d725374ccb74ed2a1fb48a8a06d4,2025-01-21T18:15:17.803000
|
||||
CVE-2025-24019,0,0,2a3a6a9851c247290336c704932309ffb09f759a478660ebcaeee5a66d59a10f,2025-01-21T18:15:17.933000
|
||||
CVE-2025-24020,0,0,285e20714349f7ac830f6a14f1541e73cc305a3a9f896b0ecc137956f3014986,2025-02-13T19:01:51.927000
|
||||
CVE-2025-24023,1,1,e8fdef59197c9924a10fdfa91dbf4507403955b870c2d28a819e357561bf0cd8,2025-03-03T16:15:41.820000
|
||||
CVE-2025-24023,0,0,e8fdef59197c9924a10fdfa91dbf4507403955b870c2d28a819e357561bf0cd8,2025-03-03T16:15:41.820000
|
||||
CVE-2025-24024,0,0,2eed754b499c2c804003117f998e15abebe8d400a886c780cd3d285697b11dd6,2025-01-21T20:15:46.617000
|
||||
CVE-2025-24025,0,0,d0deb6cc735d18f2d50160ca3518f33216e8d39f408db984acc4bbc8bf3a9a39,2025-01-24T21:15:11.600000
|
||||
CVE-2025-24027,0,0,7aafd16a9bde691788eff3c983eb76660cc50c899ff68b8c3f8ccfb1cc458ed4,2025-01-22T15:15:27.090000
|
||||
@ -282873,10 +282891,10 @@ CVE-2025-24424,0,0,21b11ca09b8673874895510024aaf8ad8182154f441913c677a9c85fbedac
|
||||
CVE-2025-24425,0,0,242b701dbfe06337da2bd8ccd3cf54d94fc82056ed1037bc6580e60c9aaf77b6,2025-02-27T21:15:40.257000
|
||||
CVE-2025-24426,0,0,eaa855dd71562a46bc77bf16a3517ae67c9de83e174a555c416f09cf48e00df1,2025-02-27T21:15:40.397000
|
||||
CVE-2025-24427,0,0,aeab414832c49a4f5c936b87983d2491f9c9e21252b16e14b179a723e5483abe,2025-02-27T21:15:40.530000
|
||||
CVE-2025-24428,0,1,6f3bfb62e88d069c8bfb9f9cb6b3a3a8a2df49dbf20d09db54a464cce8414b85,2025-03-03T15:31:07.747000
|
||||
CVE-2025-24429,0,1,4d04a778412031aca079c9ff56172e80337374f9460cca8b388e11a6b62a962d,2025-03-03T15:31:07.747000
|
||||
CVE-2025-24430,0,1,4eb06266fd7847e2baa675fe7677c830ad926011feeec64352e65e743c1785ba,2025-03-03T15:31:07.747000
|
||||
CVE-2025-24432,0,1,58a0f1e795d23f9cf4e0ca6e03bf6a0d61e3a2662bbadcf516ffb8aad14cbabb,2025-03-03T15:31:07.747000
|
||||
CVE-2025-24428,0,0,6f3bfb62e88d069c8bfb9f9cb6b3a3a8a2df49dbf20d09db54a464cce8414b85,2025-03-03T15:31:07.747000
|
||||
CVE-2025-24429,0,0,4d04a778412031aca079c9ff56172e80337374f9460cca8b388e11a6b62a962d,2025-03-03T15:31:07.747000
|
||||
CVE-2025-24430,0,0,4eb06266fd7847e2baa675fe7677c830ad926011feeec64352e65e743c1785ba,2025-03-03T15:31:07.747000
|
||||
CVE-2025-24432,0,0,58a0f1e795d23f9cf4e0ca6e03bf6a0d61e3a2662bbadcf516ffb8aad14cbabb,2025-03-03T15:31:07.747000
|
||||
CVE-2025-24434,0,0,380744e45c93abb2193a38a3d330d1de2a80e61ae98cfa1c0e2c7340f63efe4f,2025-02-27T21:15:41.317000
|
||||
CVE-2025-24435,0,0,9a399c91aada2dd1bf7b57eaed273c4fd2f09f22088815b4e80f1fb5172bec45,2025-02-27T21:15:41.437000
|
||||
CVE-2025-24436,0,0,fa6e1028e6b05751859f5712ef24bba808cb1ae0a39dca5196099fca50ecb47a,2025-02-27T21:15:41.553000
|
||||
@ -283323,7 +283341,7 @@ CVE-2025-25181,0,0,d93e6c4eee13ffa168372e2c7e46bbc0128edff1659cd70737de5b3c44664
|
||||
CVE-2025-25182,0,0,6fd347398e5cc83c7bcf9c93dfa3366f2e8e0aced29c81495217dd5d01f504cd,2025-02-12T17:15:23.857000
|
||||
CVE-2025-25183,0,0,9f610c42840d8f1123d400fa738e85280ed4290b29d92e2aa642daf493197632,2025-02-07T20:15:34.083000
|
||||
CVE-2025-25184,0,0,2da8803a7b31a0463a88b6351bc585e918c07913590e0cf3e756bba1e93f2c10,2025-02-14T20:15:34.350000
|
||||
CVE-2025-25185,1,1,005a564ea1a0f55ecc5a392070d3f2d135705a3c73cde58d64305b7aacd01aba,2025-03-03T16:15:42.377000
|
||||
CVE-2025-25185,0,0,005a564ea1a0f55ecc5a392070d3f2d135705a3c73cde58d64305b7aacd01aba,2025-03-03T16:15:42.377000
|
||||
CVE-2025-25186,0,0,c422218bc2b3a51bb7e35622bef2d3f79367445faa61fc891c243b951694bb43,2025-02-10T16:15:39.457000
|
||||
CVE-2025-25187,0,0,2ca61614d958811964bebe01178416385840d15966b28619da4a847cdf1ef2a2,2025-02-10T18:15:35.703000
|
||||
CVE-2025-25188,0,0,2461474c8c359fbc15a8610b387ef0ac657a3108436b2e05cbe126ccfb2936c2,2025-02-10T18:15:35.827000
|
||||
@ -283368,6 +283386,9 @@ CVE-2025-25296,0,0,9e79c5fad11a03b5a2666c57a0c1edbda7d102bfbc1a9f3cdfefb4bac3905
|
||||
CVE-2025-25297,0,0,ddf94cfbbc189ce93f241ea6683b88ac35f83102b385ee87dcdb33fc29a231fe,2025-02-14T20:15:36.627000
|
||||
CVE-2025-25299,0,0,b88cb269210123945d038d12d198228aa26d1b8e47ccb86107a7f3a5f3e3fad2,2025-02-20T20:15:46.853000
|
||||
CVE-2025-25300,0,0,a63610c8954a67da8954dfef77eac19e25e19f8d8bc841f17242c70e43478917,2025-02-18T19:15:28.957000
|
||||
CVE-2025-25301,1,1,77d12a956c3492221333f90e5a669a7fb662ba9bde6723b60a694158d8c34e04,2025-03-03T17:15:14.740000
|
||||
CVE-2025-25302,1,1,207de2032449cd33d7cee27d5ca889c06a6e05f64afdcb1fa983f86317cb1891,2025-03-03T17:15:14.920000
|
||||
CVE-2025-25303,1,1,4634a176f3297b7030e523b34eba1b52c58b609fb86c5b9340271a222a29f1f8,2025-03-03T17:15:15.073000
|
||||
CVE-2025-25304,0,0,7deb89a558ae2974a24d9b6d35c21d12df30c14623e00d1a3e10b48167354c5e,2025-02-14T20:15:36.903000
|
||||
CVE-2025-25305,0,0,f9de35ea3a1d1f816c6badb532d5c4e886ee750e6a306cd0122b4c0858013f3f,2025-02-18T19:15:29.083000
|
||||
CVE-2025-25323,0,0,54c9af45f2f2bfed3aa436188f6ce7824965b5e9499a263eee6799f1b580c38a,2025-02-28T16:15:38.153000
|
||||
@ -283475,7 +283496,7 @@ CVE-2025-25784,0,0,7692b0b021ef9cff1ec4a869e2fe61c0999898fb7ec7360d59c814b17f82d
|
||||
CVE-2025-25785,0,0,bc17dc315f508712d84a76b1e8f23f7f21539e82980e5f82975871a87c4e8aae,2025-02-26T15:15:26.720000
|
||||
CVE-2025-25789,0,0,dbcde910a2e6bfc7406d8baa980984134d87dc975529ef3dc53c087268dc1585,2025-02-26T15:15:26.853000
|
||||
CVE-2025-25790,0,0,cf16ab54e5556628b5b883651ce8af541edf2d9d76dc393146144b12103f43c5,2025-02-26T15:15:26.980000
|
||||
CVE-2025-25791,0,0,2089cc3837f1a9d3eaffe4f812ded438c89aa4e78e299af1741630199f84d467,2025-02-26T15:15:27.100000
|
||||
CVE-2025-25791,0,1,8f427a5814c6955913fad1f85d24fb9e4344b742b4f09e2e17f073d51f11daaf,2025-03-03T18:15:40.030000
|
||||
CVE-2025-25792,0,0,65d2048948b927ed6537eb86be44be326a7e7f5180a39f4dea30d54f0ac4c3d6,2025-02-26T15:15:27.230000
|
||||
CVE-2025-25793,0,0,98717c3b4b6e47ee955ffb5711c27dc13e1eae9c4a0dc0d8e895a7e87452c379,2025-02-26T15:15:27.367000
|
||||
CVE-2025-25794,0,0,840e75473343391737e0fadf999c877fd1cc5969682f29cbdbea6ef77281a08d,2025-02-26T15:15:27.490000
|
||||
@ -283485,7 +283506,7 @@ CVE-2025-25799,0,0,86ded328c5a870afb5c08e55c199b1e60f378edae7fd31d2a0dd4d36b5493
|
||||
CVE-2025-25800,0,0,522fb65d58ed245411f19820e000d842e65fe1759af2fa4ffd4c03c8bb5f4592,2025-02-26T16:15:17.053000
|
||||
CVE-2025-25802,0,0,8203a907b733e39a56b3d605d1fe9c4a4172c043db07dde7f4be6b7fa6a69f66,2025-02-26T15:15:28.127000
|
||||
CVE-2025-25813,0,0,0d3675aeb7cf7fedde0d08c01c9ceb08309fdff7b32b3ab8adcd2ec8b434b303,2025-02-26T15:15:28.250000
|
||||
CVE-2025-25818,0,0,25aaeaac188e7aaf7b17f64f92df5c529642fde756b6bb0400ea4d3466e081be,2025-02-26T15:15:28.367000
|
||||
CVE-2025-25818,0,1,bb1057156f76c0ba13313437f2d9a42516b0d209ee43b6f684c1131ad31b9b9f,2025-03-03T17:15:15.230000
|
||||
CVE-2025-25823,0,0,b4ac477f9ed173d267e81d0f4893b0290a15dbbbbe65cdc4bb9bf3c2ae71bff2,2025-02-26T15:15:28.497000
|
||||
CVE-2025-25825,0,0,ce66997893510daddbe1bb264e5808f6942b14e7fc8599212cadc079ecb5ab46,2025-02-26T15:15:28.620000
|
||||
CVE-2025-25827,0,0,874830c79accc8e4160e8d7866ad1aa97670bb8448b95d8c643c94d01d9862f1,2025-02-26T15:15:28.747000
|
||||
@ -283594,7 +283615,7 @@ CVE-2025-26408,0,0,e45f7220dde0c01d1f86f33cd06eb34062f4e98e989de6c2a87bcb17b259e
|
||||
CVE-2025-26409,0,0,998a9bcbefad73980e88cfadca0416aeed1df460a44260fe4402eb5cd5541ec2,2025-02-18T18:15:36.230000
|
||||
CVE-2025-26410,0,0,36441b10bb87afc4c434a271b8839836d6ce7232b364d1eaf56804b3d996ac68,2025-02-18T18:15:36.357000
|
||||
CVE-2025-26411,0,0,fcde46ab874d21012fc4027217c83b95868b33b38456359d4b0f7ea8269a0842,2025-02-18T18:15:36.473000
|
||||
CVE-2025-26465,0,0,fd5bb3f85e1a91bd1d8984e07b7b2ca19bc33d190686c0f3d55567168c5a90e9,2025-02-28T13:15:28.343000
|
||||
CVE-2025-26465,0,1,f25765ed256eff314f13089336ba54158694f343e4e7f929cae34b191b596bff,2025-03-03T18:15:40.247000
|
||||
CVE-2025-26466,0,0,98182fad274b686eae3526edee7ac65264cd0a870b2ae410fa676640ea9f1742,2025-02-28T22:15:40.080000
|
||||
CVE-2025-26473,0,0,0de7ad16e6d8c7db9e1838d2da6a9c6cb3a186f455c098963c4286ddeef3bd3d,2025-02-13T22:15:13.417000
|
||||
CVE-2025-26490,0,0,b8bc76b2be7d18c514587d66cef4d0bee94c01d7b29c32dae10138139a41dc50,2025-02-14T20:15:37.847000
|
||||
@ -283800,11 +283821,11 @@ CVE-2025-27089,0,0,a454d43bdd21fb972482a0ce87896ca310da5d909b4331caf97bfdced4edb
|
||||
CVE-2025-27090,0,0,0a4ccf92007267c16eee4b4b222c0a1bb704a8cf350c4393244356bc535834a9,2025-02-27T20:18:12.583000
|
||||
CVE-2025-27091,0,0,b859d3590fe981ab912d6921b74efbe324bec6c5ee689190e2cf257247d50a52,2025-02-27T20:18:12.583000
|
||||
CVE-2025-27092,0,0,7104bc7ae5ee9a84de752291fd5401045f96963015db3ee80e61b32134a06641,2025-02-27T20:18:12.583000
|
||||
CVE-2025-27094,1,1,9047142af5410ccb8c1afaf1bab9ce9ee2f001800e7383997daf2a183665d6b4,2025-03-03T16:15:43.023000
|
||||
CVE-2025-27094,0,1,1d0155e4f99b84ebc1c41b06ebf2678969c0072b94c6127fed8335ba465ba26a,2025-03-03T17:15:15.433000
|
||||
CVE-2025-27096,0,0,713806d5fcce08ce5e5f69a4288233d3ecee84861b6679ecda83068a27e46fd0,2025-02-28T19:18:34.167000
|
||||
CVE-2025-27097,0,0,2589fa071c1a9a9a5c73ad315b8e6452ddbba374e2341b11c614c9f7d8047e61,2025-02-27T20:18:12.583000
|
||||
CVE-2025-27098,0,0,492c80cbc63ad6506b976d2c569a0f82a671edac45cb267f8bf0fb56623897bc,2025-02-27T20:18:12.583000
|
||||
CVE-2025-27099,1,1,bd96157c304614dba09b7409a5d65bd961fe119753420ce92d59641ffcb930e4,2025-03-03T16:15:43.173000
|
||||
CVE-2025-27099,0,1,02f7b15a92b044980d4320020e01555470581ad4478f07732cef3a6e4066fc9a,2025-03-03T17:15:15.533000
|
||||
CVE-2025-27100,0,0,e8e728a94b37df8d941f1021ffd1ce6798ea17728dd5164f5aca39df84532b59,2025-02-21T00:15:09.250000
|
||||
CVE-2025-27104,0,0,db08a4c948fc11797e4258ffc992c2c766c2c60f6bb4613e3fe0360292b496dc,2025-02-22T16:15:32.640000
|
||||
CVE-2025-27105,0,0,df9e9eacd546987ca285a6d087354c1720d68ee71843aaeedd241da5e8b62276,2025-02-22T16:15:32.827000
|
||||
@ -283891,6 +283912,8 @@ CVE-2025-27355,0,0,caa62ce9bbf1bb76cf121e6e89f446abe3d40a89991436a920bab478df84b
|
||||
CVE-2025-27356,0,0,c6532ae1cc5e3e40abfb75187df6e9c621394ebd78da8fba75994511b24c76a9,2025-02-24T15:15:21.077000
|
||||
CVE-2025-27357,0,0,e2381e6c407b4287d4d33f07c25d73cafce07e3f2901d8a47889678f366841e0,2025-02-24T15:15:21.233000
|
||||
CVE-2025-27364,0,0,9286c5546baa0d62309d5b0261f0843f04abf72743b73d703ec5236da175e8e1,2025-02-24T20:15:34.180000
|
||||
CVE-2025-27370,1,1,6a3f372a00563fd7d20711dd288241ab4863d1b4cbc2a21a27406d6e826e4af9,2025-03-03T18:15:40.650000
|
||||
CVE-2025-27371,1,1,6a1913b1debfdeab0d65044891ecc29d273b8b40a383bc571526b1089d713f12,2025-03-03T18:15:40.850000
|
||||
CVE-2025-27399,0,0,2891c688c24ccac3deb5afdb6da61c4526a1d43fbc384fe64492b9e930958b6e,2025-02-27T18:15:30.380000
|
||||
CVE-2025-27400,0,0,cdbf04b984faf2bb61d60f663ecdfdd44190b0515d3b8d47c87701b41ec06666,2025-02-28T16:15:40.237000
|
||||
CVE-2025-27408,0,0,1a23c30b7689ae8b8ad6930173abdf59d3279571e27ef7dee42c61d8dd013e6b,2025-02-28T18:15:28.983000
|
||||
@ -283898,10 +283921,14 @@ CVE-2025-27410,0,0,542213b5e82bd30fa9408540bb6d09bd94cf07a4e4b5ab21e3b6313192903
|
||||
CVE-2025-27413,0,0,3c683ca647c635eed6050d34ef335b08e4f82a229181584d65143149a8f8e1dd,2025-02-28T21:15:27.820000
|
||||
CVE-2025-27414,0,0,dade89b00ff438afc3d75db3405cd2399cd0f72f2b40e361d9e8e1ad3c96ce6b,2025-02-28T21:15:27.957000
|
||||
CVE-2025-27416,0,0,bfd9605f18fa0d0b58583b28f8d49afc65f3c8a40e0ddae1ef370584ff7e71a4,2025-03-01T01:15:28.857000
|
||||
CVE-2025-27417,1,1,5c589d1a1bba9dd4dfbe6007cf98586df4e847d94a8f2b250e5956247447fa54,2025-03-03T16:15:43.820000
|
||||
CVE-2025-27418,1,1,95d40949cc41880d5e8884f774a33f7f897b5b967ed3adfce78866d647a990ee,2025-03-03T16:15:43.960000
|
||||
CVE-2025-27419,1,1,55e62c002b978adac6247e565a20ef9edbd5cdd15575177be89a6632879d00e7,2025-03-03T16:15:44.090000
|
||||
CVE-2025-27420,1,1,9d526a7e533e1150de46ca6280cff846925c1fbe0c81b3eaf5526bd6ed1ef822,2025-03-03T16:15:44.223000
|
||||
CVE-2025-27417,0,0,5c589d1a1bba9dd4dfbe6007cf98586df4e847d94a8f2b250e5956247447fa54,2025-03-03T16:15:43.820000
|
||||
CVE-2025-27418,0,0,95d40949cc41880d5e8884f774a33f7f897b5b967ed3adfce78866d647a990ee,2025-03-03T16:15:43.960000
|
||||
CVE-2025-27419,0,0,55e62c002b978adac6247e565a20ef9edbd5cdd15575177be89a6632879d00e7,2025-03-03T16:15:44.090000
|
||||
CVE-2025-27420,0,0,9d526a7e533e1150de46ca6280cff846925c1fbe0c81b3eaf5526bd6ed1ef822,2025-03-03T16:15:44.223000
|
||||
CVE-2025-27421,1,1,c5f8cbb8f9ad5af14f93e4ff38fc97a2222c7110d039eea8083f6d3839df358a,2025-03-03T17:15:15.630000
|
||||
CVE-2025-27422,1,1,bcd8a473455936a2a24238f0c36bf9a7c4201ca34fa1348e7e22e5b4114dc5b5,2025-03-03T17:15:15.787000
|
||||
CVE-2025-27423,1,1,88e83c39a3504ab732d13ded688593dc0fb5c684cb5e5c6337b81425bc853482,2025-03-03T17:15:15.943000
|
||||
CVE-2025-27498,1,1,5abce51fa5a892a16b00a0cc6ce6e1fd8dbe5c06f14b98e0dedb5a5e4ad38ec0,2025-03-03T17:15:16.443000
|
||||
CVE-2025-27554,0,0,47bde4f4167aaccaa05d2d034a78839ca444a85000927aab5c407b820ef1320c,2025-03-01T06:15:34.693000
|
||||
CVE-2025-27579,0,0,1e17d16504251ae47acc90d9c67b6caae5e3d8109a892a4d76197d339c767b90,2025-03-03T00:15:43.210000
|
||||
CVE-2025-27583,0,0,18dfdb5a0ae261632796dbd76e99b9a1ffc071aa6c00449a4d28af735e378f81,2025-03-03T01:15:12.030000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user