Auto-Update: 2025-03-03T19:00:20.497556+00:00

This commit is contained in:
cad-safe-bot 2025-03-03 19:03:49 +00:00
parent 1f1e0113d4
commit 7187c85313
81 changed files with 4002 additions and 438 deletions

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-47165",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-03-25T10:15:08.620",
"lastModified": "2024-11-21T06:35:32.130",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-03-03T17:33:19.643",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,55 +15,188 @@
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: drm/meson: corrige el fallo de apagado cuando el componente no se prueba Cuando el componente principal no se prueba, por ejemplo, cuando el m\u00f3dulo dw-hdmi a\u00fan no est\u00e1 cargado o en el aplazamiento de la prueba, se produce el siguiente fallo aparece al apagar: No se puede manejar la desreferencia del puntero NULL del kernel en la direcci\u00f3n virtual 0000000000000038... pc: meson_drv_shutdown+0x24/0x50 lr: platform_drv_shutdown+0x20/0x30... Rastreo de llamadas: meson_drv_shutdown+0x24/0x50 platform_drv_shutdown+0x20/0x3 0 dispositivo_apagado+ 0x158/0x360 kernel_restart_prepare+0x38/0x48 kernel_restart+0x18/0x68 __do_sys_reboot+0x224/0x250 __arm64_sys_reboot+0x24/0x30... Simplemente verifique si la estructura priv se ha asignado antes de usarla."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.14.226",
"versionEndExcluding": "4.14.235",
"matchCriteriaId": "A07A64EB-4EF7-4E9B-B9FF-644C696B0956"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.19.181",
"versionEndExcluding": "4.19.193",
"matchCriteriaId": "91721D26-39B5-40A4-A968-A31040F12DD0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.4.106",
"versionEndExcluding": "5.4.124",
"matchCriteriaId": "B2A93BFA-D696-43D4-9C26-B767EEAFCF3F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.10.24",
"versionEndExcluding": "5.10.42",
"matchCriteriaId": "59C0E6BA-30A4-474C-B391-98594A614B32"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.12",
"versionEndExcluding": "5.12.9",
"matchCriteriaId": "3B1CFA77-6B5E-430C-AC49-3B3508F2D903"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:*",
"matchCriteriaId": "0CBAD0FC-C281-4666-AB2F-F8E6E1165DF7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc2:*:*:*:*:*:*",
"matchCriteriaId": "96AC23B2-D46A-49D9-8203-8E1BEDCA8532"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc3:*:*:*:*:*:*",
"matchCriteriaId": "DA610E30-717C-4700-9F77-A3C9244F3BFD"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/4ce2bf20b4a6e307e114847d60b2bf40a6a1fac0",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/7cfc4ea78fc103ea51ecbacd9236abb5b1c490d2",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/b4298d33c1fcce511ffe84d8d3de07e220300f9b",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/b4b91033a0b11fe9ade58156cd9168f89f4a8c1a",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/d66083c0d6f5125a4d982aa177dd71ab4cd3d212",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/e256a0eb43e17209e347409a80805b1659398d68",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/4ce2bf20b4a6e307e114847d60b2bf40a6a1fac0",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/7cfc4ea78fc103ea51ecbacd9236abb5b1c490d2",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/b4298d33c1fcce511ffe84d8d3de07e220300f9b",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/b4b91033a0b11fe9ade58156cd9168f89f4a8c1a",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/d66083c0d6f5125a4d982aa177dd71ab4cd3d212",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/e256a0eb43e17209e347409a80805b1659398d68",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-47169",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-03-25T10:15:08.820",
"lastModified": "2024-11-21T06:35:32.660",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-03-03T17:33:19.643",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,71 +15,229 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: serial: rp2: use 'request_firmware' en lugar de 'request_firmware_nowait' En 'rp2_probe', el controlador registra 'rp2_uart_interrupt' y luego llama a 'rp2_fw_cb' a trav\u00e9s de 'request_firmware_nowait'. En 'rp2_fw_cb', si el firmware no existe, la funci\u00f3n simplemente regresa sin inicializar los puertos de 'rp2_card'. Pero ahora la funci\u00f3n de manejo de interrupciones ha sido registrada, y cuando llega una interrupci\u00f3n, 'rp2_uart_interrupt' puede acceder a esos puertos y causar desreferencia al puntero NULL u otros errores. Debido a que el controlador realiza alg\u00fan trabajo de inicializaci\u00f3n en 'rp2_fw_cb', para que el controlador est\u00e9 listo para manejar interrupciones, se debe usar 'request_firmware' en lugar de 'request_firmware_nowait' as\u00edncrono. Este informe lo revela: INFORMACI\u00d3N: intentando registrar una clave no est\u00e1tica. el c\u00f3digo est\u00e1 bien pero necesita una anotaci\u00f3n de bloqueo. apagando el validador de correcci\u00f3n de bloqueo. CPU: 2 PID: 0 Comunicaciones: swapper/2 No contaminado 4.19.177-gdba4159c14ef-dirty #45 Nombre del hardware: PC est\u00e1ndar QEMU (Q35 + ICH9, 2009), BIOS rel-1.12.0-59- gc9ba5276e321-prebuilt.qemu .org 01/04/2014 Seguimiento de llamadas: __dump_stack lib/dump_stack.c:77 [en l\u00ednea] dump_stack+0xec/0x156 lib/dump_stack.c:118 asignar_lock_key kernel/locking/lockdep.c:727 [en l\u00ednea] Register_lock_class +0x14e5/0x1ba0 kernel/locking/lockdep.c:753 __lock_acquire+0x187/0x3750 kernel/locking/lockdep.c:3303 lock_acquire+0x124/0x340 kernel/locking/lockdep.c:3907 __raw_spin_lock include/linux/spinlock_api_smp.h: 142 [en l\u00ednea] _raw_spin_lock+0x32/0x50 kernel/locking/spinlock.c:144 spin_lock include/linux/spinlock.h:329 [en l\u00ednea] rp2_ch_interrupt drivers/tty/serial/rp2.c:466 [en l\u00ednea] rp2_asic_interrupt.isra. 9+0x15d/0x990 controladores/tty/serial/rp2.c:493 rp2_uart_interrupt+0x49/0xe0 controladores/tty/serial/rp2.c:504 __handle_irq_event_percpu+0xfb/0x770 kernel/irq/handle.c:149 handle_irq_event_percpu+0x79/ 0x150 kernel/irq/handle.c:189 handle_irq_event+0xac/0x140 kernel/irq/handle.c:206 handle_fasteoi_irq+0x232/0x5c0 kernel/irq/chip.c:725 generic_handle_irq_desc include/linux/irqdesc.h:155 [en l\u00ednea ] handle_irq+0x230/0x3a0 arch/x86/kernel/irq_64.c:87 do_IRQ+0xa7/0x1e0 arch/x86/kernel/irq.c:247 common_interrupt+0xf/0xf arch/x86/entry/entry_64.S:670 < /IRQ> RIP: 0010:native_safe_halt+0x28/0x30 arch/x86/include/asm/irqflags.h:61 C\u00f3digo: 00 00 55 be 04 00 00 00 48 c7 c7 00 c2 2f 8c 48 89 e5 e8 fb 31 e7 f8 8b 05 75 af 8d 03 85 c0 7e 07 0f 00 2d 8a 61 65 00 fb f4 <5d> c3 90 90 90 90 90 90 0f 1f 44 00 00 55 48 89 e5 41 57 41 56 41 RSP: 00 18:ffff88806b71fcc8 EF BANDERAS: 00000246 ORIG_RAX: ffffffffffffffde RAX: 0000000000000000 RBX: ffffffff8bde7e48 RCX: ffffffff88a21285 RDX: 00000000000000000 RSI: 00000000000000004 RDI: ffffff ff8c2fc200 RBP: ffff88806b71fcc8 R08: ffffbfff185f840 R09: ffffbfff185f840 R10: 00000000000000001 R11: ffffbfff185f840 R12: 0000000000000002 R13: ff ffffff8bea18a0 R14: 0000000000000000 R15: 0000000000000000 arch_safe_halt arch/x86/include/asm/paravirt.h:94 [en l\u00ednea] default_idle+0x6f/0x360 arch/x86/kernel/process.c:557 arch_cpu_idle+0xf/0x20 arch/x86/kernel/process.c:548 default_idle_call+ 0x3b/0x60 kernel/sched/idle.c:93 cpuidle_idle_call kernel/sched/idle.c:153 [en l\u00ednea] do_idle+0x2ab/0x3c0 kernel/sched/idle.c:263 cpu_startup_entry+0xcb/0xe0 kernel/sched/idle. c:369 start_secondary+0x3b8/0x4e0 arch/x86/kernel/smpboot.c:271 second_startup_64+0xa4/0xb0 arch/x86/kernel/head_64.S:243 ERROR: no se puede manejar la desreferencia del puntero NULL del kernel en 00000000000000010 PGD 8000000056d270 67 P4D 8000000056d27067 PUD 56d28067 PMD 0 Ups: 0000 [#1] PREEMPT SMP KASAN PTI CPU: 2 PID: 0 Comm: swapper/2 No contaminado 4.19.177-gdba4159c14ef-dirty #45 Nombre de hardware: PC est\u00e1ndar QEMU (Q35 + ICH9, 2009) , BIOS rel-1.12.0-59- gc9ba5276e321-prebuilt.qemu.org 01/04/2014 ---truncado---"
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "4.4.271",
"matchCriteriaId": "3B637FF8-3372-4BEA-89EE-EC94A37C4E6B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.5",
"versionEndExcluding": "4.9.271",
"matchCriteriaId": "1E7DAE3A-78E9-45DB-96D8-4541CD7DC26B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.10",
"versionEndExcluding": "4.14.235",
"matchCriteriaId": "03A23445-0C1A-42AB-AC5C-768360DDF32C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.15",
"versionEndExcluding": "4.19.193",
"matchCriteriaId": "C8DEF3EC-88D9-4B89-8CF9-64BD6C863C9D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.20",
"versionEndExcluding": "5.4.124",
"matchCriteriaId": "06FE0F99-F7A9-462A-8355-30E2EDA9826B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.5",
"versionEndExcluding": "5.10.42",
"matchCriteriaId": "C3E7E799-1C8A-45FB-9E07-4731996144C9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11",
"versionEndExcluding": "5.12.9",
"matchCriteriaId": "2C8A1D02-81A7-44E5-ACFD-CC6A6694F930"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:*",
"matchCriteriaId": "0CBAD0FC-C281-4666-AB2F-F8E6E1165DF7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc2:*:*:*:*:*:*",
"matchCriteriaId": "96AC23B2-D46A-49D9-8203-8E1BEDCA8532"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc3:*:*:*:*:*:*",
"matchCriteriaId": "DA610E30-717C-4700-9F77-A3C9244F3BFD"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/016002848c82eeb5d460489ce392d91fe18c475c",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/1cc57cb32c84e059bd158494f746b665fc14d1b1",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/1e04d5d5fe5e76af68f834e1941fcbfa439653be",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/35265552c7fe9553c75e324c80f45e28ff14eb6e",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/6a931ceb0b9401fe18d0c500e08164bf9cc7be4b",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/915452f40e2f495e187276c4407a4f567ec2307e",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/9b07b6973f7359e2dd6a9fe6db0c142634c823b7",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/c697244ce940ec07e2d745ccb63ca97fc0266fbc",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/016002848c82eeb5d460489ce392d91fe18c475c",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/1cc57cb32c84e059bd158494f746b665fc14d1b1",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/1e04d5d5fe5e76af68f834e1941fcbfa439653be",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/35265552c7fe9553c75e324c80f45e28ff14eb6e",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/6a931ceb0b9401fe18d0c500e08164bf9cc7be4b",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/915452f40e2f495e187276c4407a4f567ec2307e",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/9b07b6973f7359e2dd6a9fe6db0c142634c823b7",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/c697244ce940ec07e2d745ccb63ca97fc0266fbc",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-26076",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-03-13T15:15:12.720",
"lastModified": "2024-11-21T07:50:44.053",
"lastModified": "2025-03-03T18:15:27.330",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -65,6 +65,16 @@
"value": "CWE-120"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-27010",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-03-13T19:15:22.617",
"lastModified": "2024-11-21T07:52:10.720",
"lastModified": "2025-03-03T17:15:10.880",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
@ -45,6 +65,16 @@
"value": "NVD-CWE-Other"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-250"
}
]
}
],
"configurations": [

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2023-49031",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-03-03T18:15:28.330",
"lastModified": "2025-03-03T18:15:28.330",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Directory Traversal (Local File Inclusion) vulnerability in Tikit (now Advanced) eMarketing platform 6.8.3.0 allows a remote attacker to read arbitrary files and obtain sensitive information via a crafted payload to the filename parameter to the OpenLogFile endpoint."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/Yoshik0xF6/CVE-2023-49031",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-49257",
"sourceIdentifier": "cvd@cert.pl",
"published": "2024-01-12T15:15:09.230",
"lastModified": "2024-11-21T08:33:08.160",
"lastModified": "2025-03-03T18:15:28.480",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -46,7 +46,7 @@
"description": [
{
"lang": "en",
"value": "CWE-434"
"value": "CWE-732"
}
]
},

View File

@ -2,13 +2,13 @@
"id": "CVE-2023-4997",
"sourceIdentifier": "cvd@cert.pl",
"published": "2023-10-04T11:15:10.563",
"lastModified": "2024-11-21T08:36:25.793",
"lastModified": "2025-03-03T17:15:11.153",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper authorisation of regular users in ProIntegra Uptime DC software (versions below 2.0.0.33940) allows them to change passwords of all other users including administrators leading to a privilege escalation.\n"
"value": "Improper authorisation of regular users in ProIntegra Uptime DC software (versions below 2.0.0.33940) allows them to change passwords of all other users including administrators leading to a privilege escalation."
},
{
"lang": "es",
@ -66,7 +66,7 @@
"description": [
{
"lang": "en",
"value": "CWE-862"
"value": "CWE-863"
}
]
},

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-13153",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-01-09T09:15:07.243",
"lastModified": "2025-01-09T09:15:07.243",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-03-03T17:42:59.740",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -19,7 +19,7 @@
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
@ -51,18 +71,45 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:unlimited-elements:unlimited_elements_for_elementor:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "1.5.136",
"matchCriteriaId": "5CF0B5B2-9695-4A01-A4B8-3C476C64A88D"
}
]
}
]
}
],
"references": [
{
"url": "https://unlimited-elements.com/change-log/",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Release Notes"
]
},
{
"url": "https://wordpress.org/plugins/unlimited-elements-for-elementor/#developers",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Release Notes"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/99625a3e-b8a4-42f8-8996-f7c5c0ff2d5f?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-24778",
"sourceIdentifier": "security@apache.org",
"published": "2025-03-03T11:15:11.113",
"lastModified": "2025-03-03T15:15:14.323",
"lastModified": "2025-03-03T18:15:28.933",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -51,6 +51,10 @@
{
"url": "https://lists.apache.org/thread/j14w6wghlwwrgfgc6hoz9f94fwxtlgzh",
"source": "security@apache.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2025/03/03/1",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-2515",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-03-16T09:15:07.417",
"lastModified": "2024-11-21T09:09:55.143",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-03-03T16:40:55.250",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.1,
"impactScore": 1.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
],
"cvssMetricV2": [
@ -76,30 +96,69 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:magesh-k21:online-college-event-hall-reservation-system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "02B406BB-6ED0-4CC0-B1A1-AE670E825BF1"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/MAGESH-K21%20%20Online-College-Event-Hall-Reservation-System/Reflected%20XSS%20-%20home.php.md",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Broken Link"
]
},
{
"url": "https://vuldb.com/?ctiid.256952",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.256952",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/MAGESH-K21%20%20Online-College-Event-Hall-Reservation-System/Reflected%20XSS%20-%20home.php.md",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
]
},
{
"url": "https://vuldb.com/?ctiid.256952",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.256952",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-2516",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-03-16T12:15:14.363",
"lastModified": "2024-11-21T09:09:55.273",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-03-03T16:40:55.250",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
@ -76,30 +96,69 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:magesh-k21:online-college-event-hall-reservation-system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "02B406BB-6ED0-4CC0-B1A1-AE670E825BF1"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/MAGESH-K21%20%20Online-College-Event-Hall-Reservation-System/Blind%20SQL%20Injection%20-%20home.php.md",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Broken Link"
]
},
{
"url": "https://vuldb.com/?ctiid.256953",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.256953",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/MAGESH-K21%20%20Online-College-Event-Hall-Reservation-System/Blind%20SQL%20Injection%20-%20home.php.md",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
]
},
{
"url": "https://vuldb.com/?ctiid.256953",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.256953",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-2532",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-03-16T22:15:07.613",
"lastModified": "2024-11-21T09:09:57.453",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-03-03T16:40:55.250",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
@ -76,30 +96,69 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:magesh-k21:online-college-event-hall-reservation-system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "02B406BB-6ED0-4CC0-B1A1-AE670E825BF1"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/MAGESH-K21%20%20Online-College-Event-Hall-Reservation-System/SQL%20Injection%20-%20update-users.php.md",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Broken Link"
]
},
{
"url": "https://vuldb.com/?ctiid.256969",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.256969",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/MAGESH-K21%20%20Online-College-Event-Hall-Reservation-System/SQL%20Injection%20-%20update-users.php.md",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
]
},
{
"url": "https://vuldb.com/?ctiid.256969",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.256969",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required",
"VDB Entry"
]
}
]
}

View File

@ -3,7 +3,7 @@
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-03-17T01:15:50.107",
"lastModified": "2025-03-03T16:40:55.250",
"vulnStatus": "Undergoing Analysis",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -42,19 +42,19 @@
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
],

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-26632",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-03-18T11:15:09.697",
"lastModified": "2024-11-21T09:02:43.700",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-03-03T17:33:19.643",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,39 +15,131 @@
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: bloque: corrige la iteraci\u00f3n sobre una biograf\u00eda vac\u00eda con bio_for_each_folio_all Si la biograf\u00eda no contiene datos, bio_first_folio() llama a page_folio() en un puntero NULL y \u00a1vaya! Mueve la prueba de que hemos llegado al final de la biograf\u00eda de bio_next_folio() a bio_first_folio(). [axboe: agregue improbable() al caso de error]"
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.17",
"versionEndExcluding": "6.1.75",
"matchCriteriaId": "DB5C8DA6-49C9-4423-ACFE-969306B07B9E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.2",
"versionEndExcluding": "6.6.14",
"matchCriteriaId": "5C6B50A6-3D8B-4CE2-BDCC-A098609CBA14"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7",
"versionEndExcluding": "6.7.2",
"matchCriteriaId": "7229C448-E0C9-488B-8939-36BA5254065E"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/7bed6f3d08b7af27b7015da8dc3acf2b9c1f21d7",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/a6bd8182137a12d22d3f2cee463271bdcb491659",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/c6350b5cb78e9024c49eaee6fdb914ad2903a5fe",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/ca3ede3f5893e2d26d4dbdef1eec28a8487fafde",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/7bed6f3d08b7af27b7015da8dc3acf2b9c1f21d7",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/a6bd8182137a12d22d3f2cee463271bdcb491659",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/c6350b5cb78e9024c49eaee6fdb914ad2903a5fe",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/ca3ede3f5893e2d26d4dbdef1eec28a8487fafde",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-26660",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-04-02T07:15:43.053",
"lastModified": "2024-11-21T09:02:47.193",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-03-03T17:33:19.643",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,47 +15,167 @@
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: drm/amd/display: implementar la verificaci\u00f3n de los l\u00edmites para la creaci\u00f3n del codificador de flujo en la matriz DCN301 'stream_enc_regs' es una matriz de estructuras dcn10_stream_enc_registers. La matriz se inicializa con cuatro elementos, correspondientes a las cuatro llamadas a stream_enc_regs() en el inicializador de la matriz. Esto significa que los \u00edndices v\u00e1lidos para esta matriz son 0, 1, 2 y 3. El mensaje de error 'stream_enc_regs' 4 <= 5 a continuaci\u00f3n indica que hay un intento de acceder a esta matriz con un \u00edndice de 5, que no est\u00e1 disponible. de los l\u00edmites. Esto podr\u00eda provocar un comportamiento indefinido. Aqu\u00ed, eng_id se utiliza como \u00edndice para acceder a la matriz stream_enc_regs. Si eng_id es 5, esto dar\u00eda como resultado un acceso fuera de los l\u00edmites en la matriz stream_enc_regs. Solucionando as\u00ed el error de desbordamiento de b\u00fafer en dcn301_stream_encoder_create informado por Smatch: drivers/gpu/drm/amd/amdgpu/../display/dc/resource/dcn301/dcn301_resource.c:1011 dcn301_stream_encoder_create() error: desbordamiento de b\u00fafer 'stream_enc_regs' 4 <= 5"
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11",
"versionEndExcluding": "5.15.149",
"matchCriteriaId": "0D0465BB-4053-4E15-9137-6696EBAE90FD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "6.1.78",
"matchCriteriaId": "26190115-BC0C-4106-9408-E7928FE5DA62"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.2",
"versionEndExcluding": "6.6.17",
"matchCriteriaId": "73F8C6ED-5A0B-4B25-8FA9-AF916A9C8F0B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7",
"versionEndExcluding": "6.7.5",
"matchCriteriaId": "01925741-2C95-47C1-A7EA-3DC2BB0012D3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*",
"matchCriteriaId": "B9F4EA73-0894-400F-A490-3A397AB7A517"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:*",
"matchCriteriaId": "056BD938-0A27-4569-B391-30578B309EE3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:*",
"matchCriteriaId": "F02056A5-B362-4370-9FF8-6F0BD384D520"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/42442f74314d41ddc68227047036fa3e78940054",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/58fca355ad37dcb5f785d9095db5f748b79c5dc2",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/a938eab9586eea31cfd129a507f552efae14d738",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/cd9bd10c59e3c1446680514fd3097c5b00d3712d",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/efdd665ce1a1634b8c1dad5e7f6baaef3e131d0a",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/42442f74314d41ddc68227047036fa3e78940054",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/58fca355ad37dcb5f785d9095db5f748b79c5dc2",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/a938eab9586eea31cfd129a507f552efae14d738",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/cd9bd10c59e3c1446680514fd3097c5b00d3712d",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/efdd665ce1a1634b8c1dad5e7f6baaef3e131d0a",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-26665",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-04-02T07:15:43.430",
"lastModified": "2024-11-21T09:02:47.933",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-03-03T17:33:19.643",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,59 +15,210 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: t\u00faneles: corrige el acceso fuera de los l\u00edmites al compilar el error IPv6 PMTU Si el error ICMPv6 se genera a partir de un skb no lineal, obtenemos el siguiente s\u00edmbolo, ERROR: KASAN: slab-out- fuera de los l\u00edmites en do_csum+0x220/0x240 Lectura de tama\u00f1o 4 en la direcci\u00f3n ffff88811d402c80 por tarea netperf/820 CPU: 0 PID: 820 Comm: netperf Not tainted 6.8.0-rc1+ #543 ... kasan_report+0xd8/0x110 do_csum+0x220 /0x240 csum_partial+0xc/0x20 skb_tunnel_check_pmtu+0xeb9/0x3280 vxlan_xmit_one+0x14c2/0x4080 vxlan_xmit+0xf61/0x5c00 dev_hard_start_xmit+0xfb/0x510 __dev_queue_xmit+0x7cd/0x32 a0 br_dev_queue_push_xmit+0x39d/0x6a0 Utilice skb_checksum en lugar de csum_partial, que no puede manejar SKB no lineales."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.9",
"versionEndExcluding": "5.10.210",
"matchCriteriaId": "393FFD59-45A0-4C2A-A547-8B90CE3BBAA1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11",
"versionEndExcluding": "5.15.149",
"matchCriteriaId": "0D0465BB-4053-4E15-9137-6696EBAE90FD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "6.1.78",
"matchCriteriaId": "26190115-BC0C-4106-9408-E7928FE5DA62"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.2",
"versionEndExcluding": "6.6.17",
"matchCriteriaId": "73F8C6ED-5A0B-4B25-8FA9-AF916A9C8F0B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7",
"versionEndExcluding": "6.7.5",
"matchCriteriaId": "01925741-2C95-47C1-A7EA-3DC2BB0012D3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*",
"matchCriteriaId": "B9F4EA73-0894-400F-A490-3A397AB7A517"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:*",
"matchCriteriaId": "056BD938-0A27-4569-B391-30578B309EE3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:*",
"matchCriteriaId": "F02056A5-B362-4370-9FF8-6F0BD384D520"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/510c869ffa4068c5f19ff4df51d1e2f3a30aaac1",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/7dc9feb8b1705cf00de20563b6bc4831f4c99dab",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/d75abeec401f8c86b470e7028a13fcdc87e5dd06",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/d964dd1bc1452594b4207d9229c157d9386e5d8a",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/e37cde7a5716466ff2a76f7f27f0a29b05b9a732",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/e77bf828f1ca1c47fcff58bdc26b60a9d3dfbe1d",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/510c869ffa4068c5f19ff4df51d1e2f3a30aaac1",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/7dc9feb8b1705cf00de20563b6bc4831f4c99dab",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/d75abeec401f8c86b470e7028a13fcdc87e5dd06",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/d964dd1bc1452594b4207d9229c157d9386e5d8a",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/e37cde7a5716466ff2a76f7f27f0a29b05b9a732",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/e77bf828f1ca1c47fcff58bdc26b60a9d3dfbe1d",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-26760",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-04-03T17:15:52.367",
"lastModified": "2024-11-21T09:03:00.647",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-03-03T17:33:19.643",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,39 +15,156 @@
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: scsi: target: pscsi: corrige bio_put() para el caso de error A partir del commit 066ff571011d (\"bloque: convierte bio_kmalloc en un contenedor kmalloc simple\"), una biograf\u00eda asignada por bio_kmalloc() debe ser liberado por bio_uninit() y kfree(). Esto no se hace correctamente en el caso de error, al presionar WARN y desreferenciar el puntero NULL en bio_free()."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.19",
"versionEndExcluding": "6.1.80",
"matchCriteriaId": "6C87F3F9-DEA3-4634-9011-9F66B4796842"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.2",
"versionEndExcluding": "6.6.19",
"matchCriteriaId": "8D82004C-B2AE-4048-9344-32EFF65953B0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7",
"versionEndExcluding": "6.7.7",
"matchCriteriaId": "575EE16B-67F2-4B5B-B5F8-1877715C898B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*",
"matchCriteriaId": "B9F4EA73-0894-400F-A490-3A397AB7A517"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:*",
"matchCriteriaId": "056BD938-0A27-4569-B391-30578B309EE3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:*",
"matchCriteriaId": "F02056A5-B362-4370-9FF8-6F0BD384D520"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc4:*:*:*:*:*:*",
"matchCriteriaId": "62075ACE-B2A0-4B16-829D-B3DA5AE5CC41"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc5:*:*:*:*:*:*",
"matchCriteriaId": "A780F817-2A77-4130-A9B7-5C25606314E3"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/1cfe9489fb563e9a0c9cdc5ca68257a44428c2ec",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/4ebc079f0c7dcda1270843ab0f38ab4edb8f7921",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/de959094eb2197636f7c803af0943cb9d3b35804",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/f49b20fd0134da84a6bd8108f9e73c077b7d6231",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/1cfe9489fb563e9a0c9cdc5ca68257a44428c2ec",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/4ebc079f0c7dcda1270843ab0f38ab4edb8f7921",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/de959094eb2197636f7c803af0943cb9d3b35804",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/f49b20fd0134da84a6bd8108f9e73c077b7d6231",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-27859",
"sourceIdentifier": "product-security@apple.com",
"published": "2025-02-10T19:15:37.737",
"lastModified": "2025-02-18T19:15:15.473",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-03T16:52:20.953",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,27 +15,125 @@
"value": "El problema se solucion\u00f3 mejorando la gesti\u00f3n de la memoria. Este problema se solucion\u00f3 en iOS 17.4 y iPadOS 17.4, tvOS 17.4, watchOS 10.4, visionOS 1.1 y macOS Sonoma 14.4. El procesamiento de contenido web puede provocar la ejecuci\u00f3n de c\u00f3digo arbitrario."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"versionEndExcluding": "17.4",
"matchCriteriaId": "CCCC6AF9-4EFA-4A45-888B-93C0C1327BC7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"versionEndExcluding": "17.4",
"matchCriteriaId": "BCB4911E-7824-4C34-916D-88110CB415EB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"versionEndExcluding": "14.4",
"matchCriteriaId": "58227FD1-0619-45F6-AD19-25831899376A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"versionEndExcluding": "17.4",
"matchCriteriaId": "BB6BA6CB-001B-4440-A9AE-473F5722F8E0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.1",
"matchCriteriaId": "EB7F6CDA-FEC0-45D7-ACBE-8B5AD35F1AB5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.4",
"matchCriteriaId": "5547F484-4E4B-4961-BAF8-F891D50BB4B6"
}
]
}
]
}
],
"references": [
{
"url": "https://support.apple.com/en-us/120881",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/120882",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/120883",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/120893",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/120895",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-45778",
"sourceIdentifier": "secalert@redhat.com",
"published": "2025-03-03T17:15:12.700",
"lastModified": "2025-03-03T17:15:12.700",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A stack overflow flaw was found when reading a BFS file system. A crafted BFS filesystem may lead to an uncontrolled loop, causing grub2 to crash."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "secalert@redhat.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 0.5,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "secalert@redhat.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-190"
}
]
}
],
"references": [
{
"url": "https://access.redhat.com/security/cve/CVE-2024-45778",
"source": "secalert@redhat.com"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2345640",
"source": "secalert@redhat.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-45782",
"sourceIdentifier": "secalert@redhat.com",
"published": "2025-03-03T17:15:12.900",
"lastModified": "2025-03-03T17:15:12.900",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A flaw was found in the HFS filesystem. When reading an HFS volume's name at grub_fs_mount(), the HFS filesystem driver performs a strcpy() using the user-provided volume name as input without properly validating the volume name's length. This issue may read to a heap-based out-of-bounds writer, impacting grub's sensitive data integrity and eventually leading to a secure boot protection bypass."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "secalert@redhat.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 0.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "secalert@redhat.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"references": [
{
"url": "https://access.redhat.com/security/cve/CVE-2024-45782",
"source": "secalert@redhat.com"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2345858",
"source": "secalert@redhat.com"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-51091",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-03-03T18:15:29.523",
"lastModified": "2025-03-03T18:15:29.523",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cross Site Scripting vulnerability in seajs v.2.2.3 allows a remote attacker to execute arbitrary code via the seajs package"
}
],
"metrics": {},
"references": [
{
"url": "https://gist.github.com/jackfromeast/176413c3bd73f825f7aeeb05e80e02a6",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-53384",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-03-03T18:15:29.670",
"lastModified": "2025-03-03T18:15:29.670",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A DOM Clobbering vulnerability in tsup v8.3.4 allows attackers to execute arbitrary code via a crafted script in the import.meta.url to document.currentScript in cjs_shims.js components"
}
],
"metrics": {},
"references": [
{
"url": "https://gist.github.com/jackfromeast/36f98bf7542d11835c883c1d175d9b92",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-53387",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-03-03T17:15:13.050",
"lastModified": "2025-03-03T17:15:13.050",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A DOM Clobbering vulnerability in umeditor v1.2.3 allows attackers to execute arbitrary code via supplying a crafted HTML element."
}
],
"metrics": {},
"references": [
{
"url": "https://gist.github.com/jackfromeast/d52c506113f33b8871d0e647411df894",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-53388",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-03-03T17:15:13.167",
"lastModified": "2025-03-03T17:15:13.167",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A DOM Clobbering vulnerability in mavo v0.3.2 allows attackers to execute arbitrary code via supplying a crafted HTML element."
}
],
"metrics": {},
"references": [
{
"url": "https://gist.github.com/jackfromeast/a61a5429a97985e7ff4c1d39e339d5d8",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-54658",
"sourceIdentifier": "product-security@apple.com",
"published": "2025-02-10T19:15:39.320",
"lastModified": "2025-02-18T19:15:18.857",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-03T16:52:20.953",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,31 +15,138 @@
"value": "El problema se solucion\u00f3 mejorando la gesti\u00f3n de la memoria. Este problema se solucion\u00f3 en iOS 17.4 y iPadOS 17.4, Safari 17.4, tvOS 17.4, watchOS 10.4, visionOS 1.1 y macOS Sonoma 14.4. El procesamiento de contenido web puede provocar una denegaci\u00f3n de servicio. "
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*",
"versionEndExcluding": "17.4",
"matchCriteriaId": "DC7753BA-5DF8-4F98-8DA8-69DA473F8307"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"versionEndExcluding": "17.4",
"matchCriteriaId": "CCCC6AF9-4EFA-4A45-888B-93C0C1327BC7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"versionEndExcluding": "17.4",
"matchCriteriaId": "BCB4911E-7824-4C34-916D-88110CB415EB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"versionEndExcluding": "14.4",
"matchCriteriaId": "58227FD1-0619-45F6-AD19-25831899376A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"versionEndExcluding": "17.4",
"matchCriteriaId": "BB6BA6CB-001B-4440-A9AE-473F5722F8E0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.1",
"matchCriteriaId": "EB7F6CDA-FEC0-45D7-ACBE-8B5AD35F1AB5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.4",
"matchCriteriaId": "5547F484-4E4B-4961-BAF8-F891D50BB4B6"
}
]
}
]
}
],
"references": [
{
"url": "https://support.apple.com/en-us/120881",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/120882",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/120883",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/120893",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/120894",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/120895",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-55532",
"sourceIdentifier": "security@apache.org",
"published": "2025-03-03T16:15:38.777",
"lastModified": "2025-03-03T16:15:38.777",
"lastModified": "2025-03-03T18:15:29.797",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -15,7 +15,7 @@
"weaknesses": [
{
"source": "security@apache.org",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -28,6 +28,10 @@
{
"url": "https://cwiki.apache.org/confluence/display/RANGER/Vulnerabilities+found+in+Ranger",
"source": "security@apache.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2025/03/03/2",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-57237",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-03T19:15:13.053",
"lastModified": "2025-02-12T20:15:35.483",
"lastModified": "2025-03-03T18:15:29.913",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -22,20 +22,20 @@
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
"impactScore": 3.4
}
]
},

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-57240",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-03-03T17:15:13.320",
"lastModified": "2025-03-03T17:15:13.320",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A Cross-Site Scripting (XSS) vulnerability in the Rendering Engine component in Apryse WebViewer v11.1 and earlier allows attackers to execute arbitrary code via a crafted PDF file."
}
],
"metrics": {},
"references": [
{
"url": "https://gist.github.com/devom3/43c328e23ec854090ed555a13541ca94",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-57850",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-01-11T15:15:07.423",
"lastModified": "2025-01-11T15:15:07.423",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-03-03T17:42:59.740",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,35 +15,144 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: jffs2: evitar la corrupci\u00f3n de la memoria de descompresi\u00f3n de rtime La rutina de descompresi\u00f3n de rtime no comprueba completamente los l\u00edmites durante la totalidad del paso de descompresi\u00f3n y puede da\u00f1ar la memoria fuera del b\u00fafer de descompresi\u00f3n si los datos comprimidos est\u00e1n da\u00f1ados. Esto agrega la verificaci\u00f3n requerida para evitar este modo de falla."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "5.4.287",
"matchCriteriaId": "DC7D5C80-B677-4131-A399-3366D7F3961C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.5",
"versionEndExcluding": "5.10.231",
"matchCriteriaId": "B5C644CC-2BD7-4E32-BC54-8DCC7ABE9935"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11",
"versionEndExcluding": "5.15.174",
"matchCriteriaId": "419FD073-1517-4FD5-8158-F94BC68A1E89"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "6.1.120",
"matchCriteriaId": "09AC6122-E2A4-40FE-9D33-268A1B2EC265"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.2",
"versionEndExcluding": "6.6.66",
"matchCriteriaId": "29A976AD-B9AB-4A95-9F08-7669F8847EB9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7",
"versionEndExcluding": "6.12.5",
"matchCriteriaId": "9501D045-7A94-42CA-8B03-821BE94A65B7"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/421f9e9f0fae9f8e721ffa07f22d9765fa1214d5",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/47c9a7f81027a78afea9d2e9a54bfd8fabb6b3d0",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/6808a1812a3419542223e7fe9e2de577e99e45d1",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/bd384b04ad1995441b18fe6c1366d02de8c5d5eb",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/dc39b08fcc3831b0bc46add91ba93cd2aab50716",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/f6fc251baefc3cdc4f41f2f5a47940d7d4a67332",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/fe051552f5078fa02d593847529a3884305a6ffe",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,13 +2,13 @@
"id": "CVE-2024-8573",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-09-08T10:15:01.907",
"lastModified": "2024-09-10T12:08:12.567",
"vulnStatus": "Analyzed",
"lastModified": "2025-03-03T18:15:30.130",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as critical, was found in TOTOLINK AC1200 T8 and AC1200 T10 4.1.5cu.861_B20230220/4.1.8cu.5207. This affects the function setParentalRules of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument desc leads to buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
"value": "A vulnerability, which was classified as critical, was found in TOTOLINK AC1200 T8 and AC1200 T10 4.1.5cu.861_B20230220/4.1.8cu.5207. This affects the function setParentalRules of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument desc/week/sTime/eTime leads to buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well. The vendor was contacted early about this disclosure but did not respond in any way."
},
{
"lang": "es",
@ -133,6 +133,10 @@
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-119"
},
{
"lang": "en",
"value": "CWE-120"

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2025-0285",
"sourceIdentifier": "cret@cert.org",
"published": "2025-03-03T17:15:13.430",
"lastModified": "2025-03-03T17:15:13.430",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Paragon Partition Manager version 7.9.1 contains an arbitrary kernel memory mapping vulnerability within biontdrv.sys that is caused by a failure to properly validate the length of user supplied data, which can allow an attacker to perform privilege escalation exploits."
}
],
"metrics": {},
"references": [
{
"url": "https://paragon-software.zendesk.com/hc/en-us/articles/32993902732817-IMPORTANT-Paragon-Driver-Security-Patch-for-All-Products-of-Hard-Disk-Manager-Product-Line-Biontdrv-sys",
"source": "cret@cert.org"
},
{
"url": "https://www.kb.cert.org/vuls/id/726882",
"source": "cret@cert.org"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2025-0286",
"sourceIdentifier": "cret@cert.org",
"published": "2025-03-03T17:15:13.537",
"lastModified": "2025-03-03T17:15:13.537",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Paragon Partition Manager version 7.9.1 contains an arbitrary kernel memory write vulnerability within biontdrv.sys that is caused by a failure to properly validate the length of user supplied data, which can allow an attacker to execute arbitrary code on the victim machine."
}
],
"metrics": {},
"references": [
{
"url": "https://paragon-software.zendesk.com/hc/en-us/articles/32993902732817-IMPORTANT-Paragon-Driver-Security-Patch-for-All-Products-of-Hard-Disk-Manager-Product-Line-Biontdrv-sys",
"source": "cret@cert.org"
},
{
"url": "https://www.kb.cert.org/vuls/id/726882",
"source": "cret@cert.org"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2025-0287",
"sourceIdentifier": "cret@cert.org",
"published": "2025-03-03T17:15:13.710",
"lastModified": "2025-03-03T17:15:13.710",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Paragon Partition Manager version 7.9.1 contains a null pointer dereference vulnerability within biontdrv.sys that is caused by a lack of a valid MasterLrp structure in the input buffer, allowing an attacker to execute arbitrary code in the kernel, facilitating privilege escalation."
}
],
"metrics": {},
"references": [
{
"url": "https://paragon-software.zendesk.com/hc/en-us/articles/32993902732817-IMPORTANT-Paragon-Driver-Security-Patch-for-All-Products-of-Hard-Disk-Manager-Product-Line-Biontdrv-sys",
"source": "cret@cert.org"
},
{
"url": "https://www.kb.cert.org/vuls/id/726882",
"source": "cret@cert.org"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2025-0288",
"sourceIdentifier": "cret@cert.org",
"published": "2025-03-03T17:15:13.823",
"lastModified": "2025-03-03T17:15:13.823",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Paragon Partition Manager version 7.9.1 contains an arbitrary kernel memory vulnerability facilitated by the memmove function, which does not validate or sanitize user controlled input, allowing an attacker the ability to write arbitrary kernel memory and perform privilege escalation."
}
],
"metrics": {},
"references": [
{
"url": "https://paragon-software.zendesk.com/hc/en-us/articles/32993902732817-IMPORTANT-Paragon-Driver-Security-Patch-for-All-Products-of-Hard-Disk-Manager-Product-Line-Biontdrv-sys",
"source": "cret@cert.org"
},
{
"url": "https://www.kb.cert.org/vuls/id/726882",
"source": "cret@cert.org"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2025-0289",
"sourceIdentifier": "cret@cert.org",
"published": "2025-03-03T17:15:13.943",
"lastModified": "2025-03-03T17:15:13.943",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Paragon Partition Manager version 17, both community and Business versions, contain an insecure kernel resource access vulnerability facilitated by the driver not validating the MappedSystemVa pointer before passing it to HalReturnToFirmware, which can allows an attacker the ability to compromise the service."
}
],
"metrics": {},
"references": [
{
"url": "https://paragon-software.zendesk.com/hc/en-us/articles/32993902732817-IMPORTANT-Paragon-Driver-Security-Patch-for-All-Products-of-Hard-Disk-Manager-Product-Line-Biontdrv-sys",
"source": "cret@cert.org"
},
{
"url": "https://www.kb.cert.org/vuls/id/726882",
"source": "cret@cert.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-0393",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-01-14T09:15:21.263",
"lastModified": "2025-01-14T09:15:21.263",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-03-03T17:42:59.740",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -19,6 +19,26 @@
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
@ -51,26 +71,59 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:royal-elementor-addons:royal_elementor_addons:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "1.7.1006",
"matchCriteriaId": "FB3CAF62-228C-4561-8E62-56D65A5B0EF5"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/royal-elementor-addons/tags/1.7.1006/classes/modules/wpr-filter-grid-posts.php#L1260",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://plugins.trac.wordpress.org/browser/royal-elementor-addons/tags/1.7.1006/classes/modules/wpr-filter-grid-posts.php#L391",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3220959/",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Patch"
]
},
{
"url": "https://wordpress.org/plugins/royal-elementor-addons/#developers",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Release Notes"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/a8e34c05-7431-4acd-91f3-aab5e66f61ad?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2025-0678",
"sourceIdentifier": "secalert@redhat.com",
"published": "2025-03-03T17:15:14.053",
"lastModified": "2025-03-03T17:15:14.053",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A flaw was found in grub2. When reading data from a squash4 filesystem, grub's squash4 fs module uses user-controlled parameters from the filesystem geometry to determine the internal buffer size, however, it improperly checks for integer overflows. A maliciously crafted filesystem may lead some of those buffer size calculations to overflow, causing it to perform a grub_malloc() operation with a smaller size than expected. As a result, the direct_read() will perform a heap based out-of-bounds write during data reading. This flaw may be leveraged to corrupt grub's internal critical data and may result in arbitrary code execution, by-passing secure boot protections."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "secalert@redhat.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 0.5,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "secalert@redhat.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"references": [
{
"url": "https://access.redhat.com/security/cve/CVE-2025-0678",
"source": "secalert@redhat.com"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2346118",
"source": "secalert@redhat.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2025-0684",
"sourceIdentifier": "secalert@redhat.com",
"published": "2025-03-03T18:15:30.537",
"lastModified": "2025-03-03T18:15:30.537",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A flaw was found in grub2. When performing a symlink lookup from a reiserfs filesystem, grub's reiserfs fs module uses user-controlled parameters from the filesystem geometry to determine the internal buffer size, however, it improperly checks for integer overflows. A maliciouly crafted filesystem may lead some of those buffer size calculations to overflow, causing it to perform a grub_malloc() operation with a smaller size than expected. As a result, the grub_reiserfs_read_symlink() will call grub_reiserfs_read_real() with a overflown length parameter, leading to a heap based out-of-bounds write during data reading. This flaw may be leveraged to corrupt grub's internal critical data and can result in arbitrary code execution, by-passing secure boot protections."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "secalert@redhat.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 0.5,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "secalert@redhat.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"references": [
{
"url": "https://access.redhat.com/security/cve/CVE-2025-0684",
"source": "secalert@redhat.com"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2346119",
"source": "secalert@redhat.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2025-0685",
"sourceIdentifier": "secalert@redhat.com",
"published": "2025-03-03T18:15:30.733",
"lastModified": "2025-03-03T18:15:30.733",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A flaw was found in grub2. When reading data from a jfs filesystem, grub's jfs filesystem module uses user-controlled parameters from the filesystem geometry to determine the internal buffer size, however, it improperly checks for integer overflows. A maliciouly crafted filesystem may lead some of those buffer size calculations to overflow, causing it to perform a grub_malloc() operation with a smaller size than expected. As a result, the grub_jfs_lookup_symlink() function will write past the internal buffer length during grub_jfs_read_file(). This issue can be leveraged to corrupt grub's internal critical data and may result in arbitrary code execution, by-passing secure boot protections."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "secalert@redhat.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 0.5,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "secalert@redhat.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"references": [
{
"url": "https://access.redhat.com/security/cve/CVE-2025-0685",
"source": "secalert@redhat.com"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2346120",
"source": "secalert@redhat.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2025-0686",
"sourceIdentifier": "secalert@redhat.com",
"published": "2025-03-03T18:15:30.930",
"lastModified": "2025-03-03T18:15:30.930",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A flaw was found in grub2. When performing a symlink lookup from a romfs filesystem, grub's romfs filesystem module uses user-controlled parameters from the filesystem geometry to determine the internal buffer size, however, it improperly checks for integer overflows. A maliciously crafted filesystem may lead some of those buffer size calculations to overflow, causing it to perform a grub_malloc() operation with a smaller size than expected. As a result, the grub_romfs_read_symlink() may cause out-of-bounds writes when the calling grub_disk_read() function. This issue may be leveraged to corrupt grub's internal critical data and can result in arbitrary code execution by-passing secure boot protections."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "secalert@redhat.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 0.5,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "secalert@redhat.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"references": [
{
"url": "https://access.redhat.com/security/cve/CVE-2025-0686",
"source": "secalert@redhat.com"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2346121",
"source": "secalert@redhat.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-1002",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2025-02-10T21:15:21.830",
"lastModified": "2025-02-10T21:15:21.830",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-03-03T16:52:20.953",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -80,6 +80,26 @@
},
"exploitabilityScore": 2.1,
"impactScore": 3.6
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.6,
"impactScore": 3.6
}
]
},
@ -95,10 +115,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microdicom:dicom_viewer:2024.3:*:*:*:*:*:*:*",
"matchCriteriaId": "48FAD0AC-0C8A-4684-895E-DB324148B68B"
}
]
}
]
}
],
"references": [
{
"url": "https://www.cisa.gov/news-events/ics-medical-advisories/icsma-25-037-01",
"source": "ics-cert@hq.dhs.gov"
"source": "ics-cert@hq.dhs.gov",
"tags": [
"Third Party Advisory",
"US Government Resource"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-1152",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-02-10T18:15:34.043",
"lastModified": "2025-02-10T18:15:34.043",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-03T16:52:20.953",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -63,7 +63,7 @@
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L",
@ -80,6 +80,26 @@
},
"exploitabilityScore": 1.6,
"impactScore": 1.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
"baseScore": 3.7,
"baseSeverity": "LOW",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.2,
"impactScore": 1.4
}
],
"cvssMetricV2": [
@ -122,28 +142,74 @@
"value": "CWE-404"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-401"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:gnu:binutils:2.43:*:*:*:*:*:*:*",
"matchCriteriaId": "41E442CC-ADC3-46D7-BC3C-AF5210AA9C04"
}
]
}
]
}
],
"references": [
{
"url": "https://sourceware.org/bugzilla/attachment.cgi?id=15887",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
]
},
{
"url": "https://sourceware.org/bugzilla/show_bug.cgi?id=32576",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Issue Tracking"
]
},
{
"url": "https://vuldb.com/?ctiid.295056",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.295056",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://www.gnu.org/",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Product"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-1153",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-02-10T19:15:39.900",
"lastModified": "2025-02-10T19:15:39.900",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-03T16:52:20.953",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -63,7 +63,7 @@
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L",
@ -80,6 +80,26 @@
},
"exploitabilityScore": 1.6,
"impactScore": 1.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.2,
"impactScore": 3.6
}
],
"cvssMetricV2": [
@ -120,30 +140,76 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:gnu:binutils:2.43:*:*:*:*:*:*:*",
"matchCriteriaId": "41E442CC-ADC3-46D7-BC3C-AF5210AA9C04"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:gnu:binutils:2.44:*:*:*:*:*:*:*",
"matchCriteriaId": "9C0316B8-F6B0-46B1-BE93-DD52D7EC3357"
}
]
}
]
}
],
"references": [
{
"url": "https://sourceware.org/bugzilla/show_bug.cgi?id=32603",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
]
},
{
"url": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=8d97c1a53f3dc9fd8e1ccdb039b8a33d50133150",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Patch"
]
},
{
"url": "https://vuldb.com/?ctiid.295057",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.295057",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.489991",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://www.gnu.org/",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Product"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-1160",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-02-10T23:15:15.387",
"lastModified": "2025-02-18T18:15:30.120",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-03-03T16:52:20.953",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -80,6 +80,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
@ -111,35 +131,81 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-1392"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:remyandrade:employee_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "0F228168-0FA5-49AE-ADDE-39BC9772B293"
}
]
}
]
}
],
"references": [
{
"url": "https://gist.github.com/jmx0hxq/0e9cde14b6e9190a7451cd72d7b23bfd",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.295064",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.295064",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.493860",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://www.sourcecodester.com/",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Product"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-1168",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-02-11T02:15:37.733",
"lastModified": "2025-02-18T18:15:31.127",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-03T16:52:20.953",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -80,6 +80,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
@ -122,24 +142,67 @@
"value": "CWE-89"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:rems:contact_manager_with_export_to_vcf:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B1388B7F-5297-4826-8963-BA619741FAE0"
}
]
}
]
}
],
"references": [
{
"url": "https://vuldb.com/?ctiid.295072",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.295072",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"VDB Entry",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?submit.494766",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"VDB Entry",
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://www.sourcecodester.com/",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Product"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-1169",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-02-11T03:15:07.640",
"lastModified": "2025-02-18T18:15:31.317",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-03T16:52:20.953",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -63,7 +63,7 @@
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
@ -80,6 +80,26 @@
},
"exploitabilityScore": 2.1,
"impactScore": 1.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
],
"cvssMetricV2": [
@ -122,24 +142,67 @@
"value": "CWE-94"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:rems:image_compressor_tool:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "EE413C73-5945-4A1B-B00F-181206A1E93A"
}
]
}
]
}
],
"references": [
{
"url": "https://vuldb.com/?ctiid.295073",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.295073",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"VDB Entry",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?submit.494775",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"VDB Entry",
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://www.sourcecodester.com/",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Product"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-1179",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-02-11T07:15:30.230",
"lastModified": "2025-02-11T07:15:30.230",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-03T16:52:20.953",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -63,7 +63,7 @@
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L",
@ -80,6 +80,26 @@
},
"exploitabilityScore": 1.6,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.6,
"impactScore": 5.9
}
],
"cvssMetricV2": [
@ -120,34 +140,80 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:gnu:binutils:2.43:*:*:*:*:*:*:*",
"matchCriteriaId": "41E442CC-ADC3-46D7-BC3C-AF5210AA9C04"
}
]
}
]
}
],
"references": [
{
"url": "https://sourceware.org/bugzilla/attachment.cgi?id=15915",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
]
},
{
"url": "https://sourceware.org/bugzilla/show_bug.cgi?id=32640",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking"
]
},
{
"url": "https://sourceware.org/bugzilla/show_bug.cgi?id=32640#c1",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking"
]
},
{
"url": "https://vuldb.com/?ctiid.295082",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.295082",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.495376",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://www.gnu.org/",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Product"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2025-1244",
"sourceIdentifier": "secalert@redhat.com",
"published": "2025-02-12T15:15:18.430",
"lastModified": "2025-03-03T12:15:34.453",
"lastModified": "2025-03-03T18:15:31.307",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -80,6 +80,10 @@
"url": "https://access.redhat.com/errata/RHSA-2025:2022",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/errata/RHSA-2025:2157",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2025-1244",
"source": "secalert@redhat.com"

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-1829",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-03-02T19:15:10.723",
"lastModified": "2025-03-02T19:15:10.723",
"lastModified": "2025-03-03T18:15:31.937",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in TOTOLINK X18 9.1.0cu.2024_B20220329. It has been declared as critical. This vulnerability affects the function setMtknatCfg of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument mtkhnatEnable leads to os command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
},
{
"lang": "es",
"value": "Se ha encontrado una vulnerabilidad en TOTOLINK X18 9.1.0cu.2024_B20220329. Se ha declarado como cr\u00edtica. Esta vulnerabilidad afecta a la funci\u00f3n setMtknatCfg del archivo /cgi-bin/cstecgi.cgi. La manipulaci\u00f3n del argumento mtkhnatEnable provoca la inyecci\u00f3n de comandos en el sistema operativo. El ataque se puede iniciar de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse. Se contact\u00f3 al proveedor con anticipaci\u00f3n sobre esta revelaci\u00f3n, pero no respondi\u00f3 de ninguna manera."
}
],
"metrics": {
@ -59,7 +63,7 @@
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
@ -107,7 +111,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -140,6 +144,10 @@
{
"url": "https://www.totolink.net/",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/sjwszt/CVE/blob/main/CVE_2.md",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-1831",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-03-02T20:15:34.577",
"lastModified": "2025-03-02T20:15:34.577",
"lastModified": "2025-03-03T18:15:32.520",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as critical has been found in zj1983 zz up to 2024-8. Affected is the function GetDBUser of the file src/main/java/com/futvan/z/system/zorg/ZorgAction.java. The manipulation of the argument user_id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
},
{
"lang": "es",
"value": "Se ha encontrado una vulnerabilidad clasificada como cr\u00edtica en zj1983 zz hasta 2024-8. La funci\u00f3n GetDBUser del archivo src/main/java/com/futvan/z/system/zorg/ZorgAction.java est\u00e1 afectada. La manipulaci\u00f3n del argumento user_id conduce a una inyecci\u00f3n SQL. Es posible lanzar el ataque de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse. Se contact\u00f3 al proveedor con anticipaci\u00f3n sobre esta revelaci\u00f3n, pero no respondi\u00f3 de ninguna manera."
}
],
"metrics": {
@ -59,7 +63,7 @@
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
@ -107,7 +111,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -136,6 +140,10 @@
{
"url": "https://vuldb.com/?submit.504806",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/caigo8/CVE-md/blob/main/zz/ZZ_2024_8%E5%89%8D%E5%8F%B0SQL%E6%B3%A8%E5%85%A52.md",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-1832",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-03-02T21:15:10.110",
"lastModified": "2025-03-02T21:15:10.110",
"lastModified": "2025-03-03T18:15:32.950",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as critical was found in zj1983 zz up to 2024-8. Affected by this vulnerability is the function getUserList of the file src/main/java/com/futvan/z/system/zrole/ZroleAction.java. The manipulation of the argument roleid leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
},
{
"lang": "es",
"value": "Se ha encontrado una vulnerabilidad clasificada como cr\u00edtica en zj1983 zz hasta 2024-8. La funci\u00f3n getUserList del archivo src/main/java/com/futvan/z/system/zrole/ZroleAction.java se ve afectada por esta vulnerabilidad. La manipulaci\u00f3n del argumento roleid provoca una inyecci\u00f3n SQL. El ataque se puede ejecutar de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse. Se contact\u00f3 al proveedor con anticipaci\u00f3n sobre esta revelaci\u00f3n, pero no respondi\u00f3 de ninguna manera."
}
],
"metrics": {
@ -59,7 +63,7 @@
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
@ -107,7 +111,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -136,6 +140,10 @@
{
"url": "https://vuldb.com/?submit.504814",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/caigo8/CVE-md/blob/main/zz/zz_2024_8_4%E5%90%8E%E5%8F%B0SQL%E6%B3%A8%E5%85%A5.md",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-1833",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-03-02T22:15:34.820",
"lastModified": "2025-03-02T22:15:34.820",
"lastModified": "2025-03-03T18:15:33.763",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as critical, has been found in zj1983 zz up to 2024-8. Affected by this issue is the function sendNotice of the file src/main/java/com/futvan/z/erp/customer_notice/Customer_noticeAction.java of the component HTTP Request Handler. The manipulation of the argument url leads to server-side request forgery. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
},
{
"lang": "es",
"value": "Se ha encontrado una vulnerabilidad clasificada como cr\u00edtica en zj1983 zz hasta 2024-8. Este problema afecta a la funci\u00f3n sendNotice del archivo src/main/java/com/futvan/z/erp/customer_notice/Customer_noticeAction.java del componente HTTP Request Handler. La manipulaci\u00f3n del argumento url conduce a server-side request forgery. El ataque puede ejecutarse de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse. Se contact\u00f3 al proveedor con anticipaci\u00f3n sobre esta revelaci\u00f3n, pero no respondi\u00f3 de ninguna manera."
}
],
"metrics": {
@ -59,7 +63,7 @@
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
@ -107,7 +111,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -132,6 +136,10 @@
{
"url": "https://vuldb.com/?submit.504833",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/caigo8/CVE-md/blob/main/zz/zz_2024_8%E5%90%8E%E5%8F%B0SSRF.md",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-1843",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-03-03T01:15:11.127",
"lastModified": "2025-03-03T01:15:11.127",
"lastModified": "2025-03-03T18:15:34.290",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as critical, has been found in Mini-Tmall up to 20250211. This issue affects the function select of the file com/xq/tmall/dao/ProductMapper.java. The manipulation of the argument orderBy leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
},
{
"lang": "es",
"value": "Se ha encontrado una vulnerabilidad, que se ha clasificado como cr\u00edtica, en Mini-Tmall hasta 20250211. Este problema afecta a la funci\u00f3n select del archivo com/xq/tmall/dao/ProductMapper.java. La manipulaci\u00f3n del argumento orderBy conduce a una inyecci\u00f3n SQL. El ataque puede iniciarse de forma remota. El exploit se ha divulgado al p\u00fablico y puede utilizarse. Se contact\u00f3 al proveedor con anticipaci\u00f3n sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera."
}
],
"metrics": {
@ -59,7 +63,7 @@
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
@ -107,7 +111,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -136,6 +140,10 @@
{
"url": "https://vuldb.com/?submit.504958",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/qkdjksfkeg/cve_article/blob/main/Tmall_demo/SQL%20injection.md",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-1844",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-03-03T02:15:33.390",
"lastModified": "2025-03-03T02:15:33.390",
"lastModified": "2025-03-03T18:15:34.773",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as critical, was found in ESAFENET CDG 5.6.3.154.205_20250114. Affected is an unknown function of the file /CDGServer3/logManagement/backupLogDetail.jsp. The manipulation of the argument logTaskId leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
},
{
"lang": "es",
"value": "Se ha detectado una vulnerabilidad clasificada como cr\u00edtica en ESAFENET CDG 5.6.3.154.205_20250114. Se trata de una funci\u00f3n desconocida del archivo /CDGServer3/logManagement/backupLogDetail.jsp. La manipulaci\u00f3n del argumento logTaskId provoca una inyecci\u00f3n SQL. Es posible lanzar el ataque de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse. Se contact\u00f3 al proveedor con antelaci\u00f3n sobre esta revelaci\u00f3n, pero no respondi\u00f3 de ninguna manera."
}
],
"metrics": {
@ -59,7 +63,7 @@
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
@ -107,7 +111,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -136,6 +140,10 @@
{
"url": "https://vuldb.com/?submit.505008",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/666lail/report/blob/main/tmp/1.md",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-1845",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-03-03T02:15:33.563",
"lastModified": "2025-03-03T02:15:33.563",
"lastModified": "2025-03-03T18:15:35.840",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been found in ESAFENET DSM 3.1.2 and classified as critical. Affected by this vulnerability is the function examExportPDF of the file /admin/plan/examExportPDF. The manipulation of the argument s leads to command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
},
{
"lang": "es",
"value": "Se ha encontrado una vulnerabilidad en ESAFENET DSM 3.1.2 y se ha clasificado como cr\u00edtica. Esta vulnerabilidad afecta a la funci\u00f3n examExportPDF del archivo /admin/plan/examExportPDF. La manipulaci\u00f3n del argumento s provoca la inyecci\u00f3n de comandos. El ataque se puede ejecutar de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse. Se contact\u00f3 al proveedor con anticipaci\u00f3n sobre esta revelaci\u00f3n, pero no respondi\u00f3 de ninguna manera."
}
],
"metrics": {
@ -59,7 +63,7 @@
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
@ -107,7 +111,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -136,6 +140,10 @@
{
"url": "https://vuldb.com/?submit.505009",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/666lail/report/blob/main/tmp/2.md",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-1846",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-03-03T03:15:08.777",
"lastModified": "2025-03-03T03:15:08.777",
"lastModified": "2025-03-03T18:15:36.340",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in zj1983 zz up to 2024-8. It has been declared as problematic. This vulnerability affects the function deleteLocalFile of the file src/main/java/com/futvan/z/system/zfile/ZfileAction.java of the component File Handler. The manipulation of the argument zids leads to denial of service. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
},
{
"lang": "es",
"value": "Se ha detectado una vulnerabilidad en zj1983 zz hasta 2024-8. Se ha declarado como problem\u00e1tica. Esta vulnerabilidad afecta a la funci\u00f3n deleteLocalFile del archivo src/main/java/com/futvan/z/system/zfile/ZfileAction.java del componente File Handler. La manipulaci\u00f3n del argumento zids provoca una denegaci\u00f3n de servicio. El ataque se puede iniciar de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse. Se contact\u00f3 al proveedor con anticipaci\u00f3n sobre esta revelaci\u00f3n, pero no respondi\u00f3 de ninguna manera."
}
],
"metrics": {
@ -59,7 +63,7 @@
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
@ -107,7 +111,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -132,6 +136,10 @@
{
"url": "https://vuldb.com/?submit.505097",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/caigo8/CVE-md/blob/main/zz/zz_2024_8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E5%88%A0%E9%99%A4.md",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-1847",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-03-03T03:15:08.983",
"lastModified": "2025-03-03T03:15:08.983",
"lastModified": "2025-03-03T18:15:36.537",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in zj1983 zz up to 2024-8. It has been rated as critical. This issue affects some unknown processing. The manipulation leads to improper authorization. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
},
{
"lang": "es",
"value": "Se encontr\u00f3 una vulnerabilidad en zj1983 zz hasta 2024-8. Se la ha calificado como cr\u00edtica. Este problema afecta a algunos procesos desconocidos. La manipulaci\u00f3n conduce a una autorizaci\u00f3n incorrecta. El ataque puede iniciarse de forma remota. El exploit se ha divulgado al p\u00fablico y puede utilizarse. Se contact\u00f3 al proveedor con anticipaci\u00f3n sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera."
}
],
"metrics": {
@ -59,7 +63,7 @@
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
@ -107,7 +111,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -136,6 +140,10 @@
{
"url": "https://vuldb.com/?submit.505303",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/caigo8/CVE-md/blob/main/zz/ZZ_2024_8%E5%9E%82%E7%9B%B4%E8%B6%8A%E6%9D%83.md",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-1848",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-03-03T04:15:08.657",
"lastModified": "2025-03-03T04:15:08.657",
"lastModified": "2025-03-03T18:15:36.720",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as critical has been found in zj1983 zz up to 2024-8. Affected is an unknown function of the file /import_data_check. The manipulation of the argument url leads to server-side request forgery. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
},
{
"lang": "es",
"value": "Se ha encontrado una vulnerabilidad clasificada como cr\u00edtica en zj1983 zz hasta 2024-8. Se ve afectada una funci\u00f3n desconocida del archivo /import_data_check. La manipulaci\u00f3n del argumento url conduce a server-side request forgery. Es posible lanzar el ataque de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse. Se contact\u00f3 al proveedor con anticipaci\u00f3n sobre esta revelaci\u00f3n, pero no respondi\u00f3 de ninguna manera."
}
],
"metrics": {
@ -59,7 +63,7 @@
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
@ -107,7 +111,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -132,6 +136,10 @@
{
"url": "https://vuldb.com/?submit.505345",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/caigo8/CVE-md/blob/main/zz/zz_import_data_check_SSRF.md",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-1849",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-03-03T04:15:08.837",
"lastModified": "2025-03-03T04:15:08.837",
"lastModified": "2025-03-03T18:15:36.893",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as critical was found in zj1983 zz up to 2024-8. Affected by this vulnerability is an unknown functionality of the file /import_data_todb. The manipulation of the argument url leads to server-side request forgery. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
},
{
"lang": "es",
"value": "Se ha detectado una vulnerabilidad clasificada como cr\u00edtica en zj1983 zz hasta 2024-8. Esta vulnerabilidad afecta a una funcionalidad desconocida del archivo /import_data_todb. La manipulaci\u00f3n del argumento url conduce a Server-Side Request Forgery. El ataque se puede ejecutar de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse. Se contact\u00f3 al proveedor con anticipaci\u00f3n sobre esta revelaci\u00f3n, pero no respondi\u00f3 de ninguna manera."
}
],
"metrics": {
@ -59,7 +63,7 @@
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
@ -107,7 +111,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -132,6 +136,10 @@
{
"url": "https://vuldb.com/?submit.505346",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/caigo8/CVE-md/blob/main/zz/zz_import_data_todb_SSRF.md",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-1850",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-03-03T05:15:10.587",
"lastModified": "2025-03-03T05:15:10.587",
"lastModified": "2025-03-03T18:15:37.077",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as critical, has been found in Codezips College Management System 1.0. Affected by this issue is some unknown functionality of the file /university.php. The manipulation of the argument book_name leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used."
},
{
"lang": "es",
"value": "Se ha encontrado una vulnerabilidad clasificada como cr\u00edtica en Codezips College Management System 1.0. Este problema afecta a algunas funciones desconocidas del archivo /university.php. La manipulaci\u00f3n del argumento book_name provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse."
}
],
"metrics": {
@ -59,7 +63,7 @@
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
@ -107,7 +111,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -136,6 +140,10 @@
{
"url": "https://vuldb.com/?submit.511626",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/WHOAMI-xiaoyu/CVE/blob/main/CVE_2.md",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-1851",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-03-03T05:15:10.867",
"lastModified": "2025-03-03T05:15:10.867",
"lastModified": "2025-03-03T18:15:37.277",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as critical, was found in Tenda AC7 up to 15.03.06.44. This affects the function formSetFirewallCfg of the file /goform/SetFirewallCfg. The manipulation of the argument firewallEn leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."
},
{
"lang": "es",
"value": "Hasta la versi\u00f3n 15.03.06.44 se ha detectado una vulnerabilidad clasificada como cr\u00edtica en Tenda AC7. Afecta a la funci\u00f3n formSetFirewallCfg del archivo /goform/SetFirewallCfg. La manipulaci\u00f3n del argumento firewallEn provoca un desbordamiento del b\u00fafer basado en la pila. Es posible iniciar el ataque de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse."
}
],
"metrics": {
@ -59,7 +63,7 @@
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
@ -107,7 +111,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -140,6 +144,10 @@
{
"url": "https://www.tenda.com.cn/",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/Raining-101/IOT_cve/blob/main/ac7_V15.03.06.44_SetFirewallCfg.md",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-1852",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-03-03T06:15:21.343",
"lastModified": "2025-03-03T06:15:21.343",
"lastModified": "2025-03-03T18:15:37.447",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been found in Totolink EX1800T 9.1.0cu.2112_B20220316 and classified as critical. This vulnerability affects the function loginAuth of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument password leads to buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used."
},
{
"lang": "es",
"value": "Se ha encontrado una vulnerabilidad en Totolink EX1800T 9.1.0cu.2112_B20220316 y se ha clasificado como cr\u00edtica. Esta vulnerabilidad afecta a la funci\u00f3n loginAuth del archivo /cgi-bin/cstecgi.cgi. La manipulaci\u00f3n del argumento password provoca un desbordamiento del b\u00fafer. El ataque puede iniciarse de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse."
}
],
"metrics": {
@ -59,7 +63,7 @@
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
@ -107,7 +111,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -140,6 +144,10 @@
{
"url": "https://www.totolink.net/",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/watermelon-happy/cve/blob/main/ex1800tCVE.md",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -0,0 +1,152 @@
{
"id": "CVE-2025-1876",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-03-03T17:15:14.517",
"lastModified": "2025-03-03T17:15:14.517",
"vulnStatus": "Received",
"cveTags": [
{
"sourceIdentifier": "cna@vuldb.com",
"tags": [
"unsupported-when-assigned"
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as critical, has been found in D-Link DAP-1562 1.10. Affected by this issue is the function http_request_parse of the component HTTP Header Handler. The manipulation of the argument Authorization leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 6.9,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnAvailabilityImpact": "LOW",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"baseScore": 7.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-119"
},
{
"lang": "en",
"value": "CWE-121"
}
]
}
],
"references": [
{
"url": "https://vuldb.com/?ctiid.298190",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.298190",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.506106",
"source": "cna@vuldb.com"
},
{
"url": "https://witty-maiasaura-083.notion.site/D-link-DAP-1562-http_request_parse-Vulnerability-1a4b2f2a636180a2a67de271ad5fe6d7",
"source": "cna@vuldb.com"
},
{
"url": "https://www.dlink.com/",
"source": "cna@vuldb.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-21155",
"sourceIdentifier": "psirt@adobe.com",
"published": "2025-02-11T18:15:27.583",
"lastModified": "2025-02-11T18:15:27.583",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-03-03T16:52:20.953",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,48 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:substance_3d_stager:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3.1.1",
"matchCriteriaId": "447435A6-E2B6-49C6-A3B5-66A691F57945"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
}
]
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/substance3d_stager/apsb25-09.html",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-22738",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-01-15T16:15:36.187",
"lastModified": "2025-01-15T16:15:36.187",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-03-03T17:42:59.740",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.7,
"impactScore": 3.7
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
}
]
},
@ -51,10 +71,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wpulike:wp_ulike:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "4.7.7",
"matchCriteriaId": "678B21EB-0342-4510-A358-DE242100DC66"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/wp-ulike/vulnerability/wordpress-wp-ulike-plugin-4-7-6-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -0,0 +1,78 @@
{
"id": "CVE-2025-25301",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-03-03T17:15:14.740",
"lastModified": "2025-03-03T17:15:14.740",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Rembg is a tool to remove images background. In Rembg 2.0.57 and earlier, the /api/remove endpoint takes a URL query parameter that allows an image to be fetched, processed and returned. An attacker may be able to query this endpoint to view pictures hosted on the internal network of the rembg server. This issue may lead to Information Disclosure."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:L/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 6.9,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "NONE",
"vulnIntegrityImpact": "NONE",
"vulnAvailabilityImpact": "NONE",
"subConfidentialityImpact": "LOW",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-918"
}
]
}
],
"references": [
{
"url": "https://securitylab.github.com/advisories/GHSL-2024-161_GHSL-2024-162_rembg/",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,82 @@
{
"id": "CVE-2025-25302",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-03-03T17:15:14.920",
"lastModified": "2025-03-03T17:15:14.920",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Rembg is a tool to remove images background. In Rembg 2.0.57 and earlier, the CORS middleware is setup incorrectly. All origins are reflected, which allows any website to send cross site requests to the rembg server and thus query any API. Even if authentication were to be enabled, allow_credentials is set to True, which would allow any website to send authenticated cross site requests."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 8.7,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "NONE",
"vulnAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-346"
}
]
}
],
"references": [
{
"url": "https://github.com/danielgatis/rembg/blob/d1e00734f8a996abf512a3a5c251c7a9a392c90a/rembg/commands/s_command.py#L93",
"source": "security-advisories@github.com"
},
{
"url": "https://securitylab.github.com/advisories/GHSL-2024-161_GHSL-2024-162_rembg/",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,86 @@
{
"id": "CVE-2025-25303",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-03-03T17:15:15.073",
"lastModified": "2025-03-03T17:15:15.073",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The MouseTooltipTranslator Chrome extension allows mouseover translation of any language at once. The MouseTooltipTranslator browser extension is vulnerable to SSRF attacks. The pdf.mjs script uses the URL parameter from the current URL as the file to download and display to the extension user. Because pdf.mjs is imported in viewer.html and viewer.html is accessible to all URLs, an attacker can force the user\u2019s browser to make a request to any arbitrary URL. After discussion with maintainer, patching this issue would require disabling a major feature of the extension in exchange for a low severity vulnerability. Decision to not patch issue."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 6.9,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "NONE",
"vulnIntegrityImpact": "NONE",
"vulnAvailabilityImpact": "NONE",
"subConfidentialityImpact": "LOW",
"subIntegrityImpact": "LOW",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-918"
}
]
}
],
"references": [
{
"url": "https://github.com/ttop32/MouseTooltipTranslator/blob/0.1.127/public/manifest.json#L23",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/ttop32/MouseTooltipTranslator/blob/0.1.127/public/pdfjs/build/pdf.mjs#L13932",
"source": "security-advisories@github.com"
},
{
"url": "https://securitylab.github.com/advisories/GHSL-2024-018_MouseTooltipTranslator/",
"source": "security-advisories@github.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2025-25791",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-26T15:15:27.100",
"lastModified": "2025-02-26T15:15:27.100",
"lastModified": "2025-03-03T18:15:40.030",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Una vulnerabilidad de carga de archivos arbitrarios en la funci\u00f3n de instalaci\u00f3n de complementos de YZNCMS v2.0.1 permite a los atacantes ejecutar c\u00f3digo arbitrario mediante la carga de un archivo Zip manipulado espec\u00edficamente para ello."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-77"
}
]
}
],
"references": [
{
"url": "http://yzncms.com",

View File

@ -2,7 +2,7 @@
"id": "CVE-2025-25818",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-26T15:15:28.367",
"lastModified": "2025-02-26T15:15:28.367",
"lastModified": "2025-03-03T17:15:15.230",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Una vulnerabilidad de cross site scripting (XSS) en Emlog Pro v2.5.4 permite a los atacantes ejecutar secuencias de comandos web o HTML arbitrarios mediante la inyecci\u00f3n de un payload manipulado en la funci\u00f3n postStrVar en article_save.php."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.5,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "http://emlogpro.com",

View File

@ -2,7 +2,7 @@
"id": "CVE-2025-26465",
"sourceIdentifier": "secalert@redhat.com",
"published": "2025-02-18T19:15:29.230",
"lastModified": "2025-02-28T13:15:28.343",
"lastModified": "2025-03-03T18:15:40.247",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -108,6 +108,14 @@
"url": "https://www.theregister.com/2025/02/18/openssh_vulnerabilities_mitm_dos/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://www.vicarius.io/vsociety/posts/cve-2025-26465-detect-vulnerable-openssh",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://www.vicarius.io/vsociety/posts/cve-2025-26465-mitigate-vulnerable-openssh",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://seclists.org/oss-sec/2025/q1/144",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"

View File

@ -2,7 +2,7 @@
"id": "CVE-2025-27094",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-03-03T16:15:43.023",
"lastModified": "2025-03-03T16:15:43.023",
"lastModified": "2025-03-03T17:15:15.433",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -38,7 +38,7 @@
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -59,6 +59,10 @@
{
"url": "https://tuleap.net/plugins/tracker/?aid=41849",
"source": "security-advisories@github.com"
},
{
"url": "https://tuleap.net/plugins/tracker/?aid=41849",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2025-27099",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-03-03T16:15:43.173",
"lastModified": "2025-03-03T16:15:43.173",
"lastModified": "2025-03-03T17:15:15.533",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -38,7 +38,7 @@
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -63,6 +63,10 @@
{
"url": "https://tuleap.net/plugins/tracker/?aid=41858",
"source": "security-advisories@github.com"
},
{
"url": "https://tuleap.net/plugins/tracker/?aid=41858",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2025-27370",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-03-03T18:15:40.650",
"lastModified": "2025-03-03T18:15:40.650",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "OpenID Connect Core through 1.0 errata set 2 allows audience injection in certain situations. When the private_key_jwt authentication mechanism is used, a malicious Authorization Server could trick a Client into writing attacker-controlled values into the audience, including token endpoints or issuer identifiers of other Authorization Servers. The malicious Authorization Server could then use these private key JWTs to impersonate the Client."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve@mitre.org",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:H/A:N",
"baseScore": 6.9,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.6,
"impactScore": 4.7
}
]
},
"weaknesses": [
{
"source": "cve@mitre.org",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-863"
}
]
}
],
"references": [
{
"url": "https://openid.net/notice-of-a-security-vulnerability/",
"source": "cve@mitre.org"
},
{
"url": "https://openid.net/wp-content/uploads/2025/01/OIDF-Responsible-Disclosure-Notice-on-Security-Vulnerability-for-private_key_jwt.pdf",
"source": "cve@mitre.org"
},
{
"url": "https://talks.secworkshop.events/osw2025/talk/R8D9BS/",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2025-27371",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-03-03T18:15:40.850",
"lastModified": "2025-03-03T18:15:40.850",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In certain IETF OAuth 2.0-related specifications, when the JSON Web Token Profile for OAuth 2.0 Client Authentication mechanism is used, there are ambiguities in the audience values of JWTs sent to authorization servers. The affected RFCs may include RFC 7523, and also RFC 7521, RFC 7522, RFC 9101 (JAR), and RFC 9126 (PAR)."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve@mitre.org",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:H/A:N",
"baseScore": 6.9,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.6,
"impactScore": 4.7
}
]
},
"weaknesses": [
{
"source": "cve@mitre.org",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-863"
}
]
}
],
"references": [
{
"url": "https://openid.net/notice-of-a-security-vulnerability/",
"source": "cve@mitre.org"
},
{
"url": "https://openid.net/wp-content/uploads/2025/01/OIDF-Responsible-Disclosure-Notice-on-Security-Vulnerability-for-private_key_jwt.pdf",
"source": "cve@mitre.org"
},
{
"url": "https://talks.secworkshop.events/osw2025/talk/R8D9BS/",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2025-27421",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-03-03T17:15:15.630",
"lastModified": "2025-03-03T17:15:15.630",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Abacus is a highly scalable and stateless counting API. A critical goroutine leak vulnerability has been identified in the Abacus server's Server-Sent Events (SSE) implementation. The issue occurs when clients disconnect from the /stream endpoint, as the server fails to properly clean up resources and terminate associated goroutines. This leads to resource exhaustion where the server continues running but eventually stops accepting new SSE connections while maintaining high memory usage. The vulnerability specifically involves improper channel cleanup in the event handling mechanism, causing goroutines to remain blocked indefinitely. This vulnerability is fixed in 1.4.0."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-400"
},
{
"lang": "en",
"value": "CWE-772"
}
]
}
],
"references": [
{
"url": "https://github.com/JasonLovesDoggo/abacus/commit/898ff1204e11317cc161240b660e63eed5a72b33",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/JasonLovesDoggo/abacus/security/advisories/GHSA-vh64-54px-qgf8",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2025-27422",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-03-03T17:15:15.787",
"lastModified": "2025-03-03T17:15:15.787",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "FACTION is a PenTesting Report Generation and Collaboration Framework. Authentication is bypassed when an attacker registers a new user with admin privileges. This is possible at any time without any authorization. The request must follow the validation rules (no missing information, secure password, etc) but there are no other controls stopping them. This vulnerability is fixed in 1.4.3."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-287"
}
]
}
],
"references": [
{
"url": "https://github.com/factionsecurity/faction/commit/0a6848d388d6dba1c81918cce2772b1e805cd3d6",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/factionsecurity/faction/security/advisories/GHSA-97cv-f342-v2jc",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2025-27423",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-03-03T17:15:15.943",
"lastModified": "2025-03-03T17:15:15.943",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Vim is an open source, command line text editor. Vim is distributed with the tar.vim plugin, that allows easy editing and viewing of (compressed or uncompressed) tar files. Starting with 9.1.0858, the tar.vim plugin uses the \":read\" ex command line to append below the cursor position, however the is not sanitized and is taken literally from the tar archive. This allows to execute shell commands via special crafted tar archives. Whether this really happens, depends on the shell being used ('shell' option, which is set using $SHELL). The issue has been fixed as of Vim patch v9.1.1164"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-77"
}
]
}
],
"references": [
{
"url": "https://github.com/vim/vim/commit/129a8446d23cd9cb4445fcfea259cba5e0487d29",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/vim/vim/commit/334a13bff78aa0ad206bc436885f63e3a0bab399",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/vim/vim/security/advisories/GHSA-wfmf-8626-q3r3",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,82 @@
{
"id": "CVE-2025-27498",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-03-03T17:15:16.443",
"lastModified": "2025-03-03T17:15:16.443",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "aes-gcm is a pure Rust implementation of the AES-GCM. In decrypt_in_place_detached, the decrypted ciphertext (which is the correct ciphertext) is exposed even if the tag is incorrect. This is because in decrypt_inplace in asconcore.rs, tag verification causes an error to be returned with the plaintext contents still in buffer. The vulnerability is fixed in 0.4.3."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:A/VC:L/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "ACTIVE",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "HIGH",
"vulnAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-347"
}
]
}
],
"references": [
{
"url": "https://github.com/RustCrypto/AEADs/commit/d1d749ba57e38e65b0e037cd744d0b17f7254037",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/RustCrypto/AEADs/security/advisories/GHSA-r38m-44fw-h886",
"source": "security-advisories@github.com"
}
]
}

106
README.md
View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2025-03-03T17:00:20.839150+00:00
2025-03-03T19:00:20.497556+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2025-03-03T16:40:55.250000+00:00
2025-03-03T18:15:40.850000+00:00
```
### Last Data Feed Release
@ -33,65 +33,69 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
283909
283936
```
### CVEs added in the last Commit
Recently added CVEs: `21`
Recently added CVEs: `27`
- [CVE-2024-41770](CVE-2024/CVE-2024-417xx/CVE-2024-41770.json) (`2025-03-03T16:15:37.853`)
- [CVE-2024-41771](CVE-2024/CVE-2024-417xx/CVE-2024-41771.json) (`2025-03-03T16:15:38.007`)
- [CVE-2024-43169](CVE-2024/CVE-2024-431xx/CVE-2024-43169.json) (`2025-03-03T16:15:38.157`)
- [CVE-2024-45779](CVE-2024/CVE-2024-457xx/CVE-2024-45779.json) (`2025-03-03T15:15:14.660`)
- [CVE-2024-45780](CVE-2024/CVE-2024-457xx/CVE-2024-45780.json) (`2025-03-03T15:15:14.950`)
- [CVE-2024-55532](CVE-2024/CVE-2024-555xx/CVE-2024-55532.json) (`2025-03-03T16:15:38.777`)
- [CVE-2024-55570](CVE-2024/CVE-2024-555xx/CVE-2024-55570.json) (`2025-03-03T16:15:38.900`)
- [CVE-2024-8261](CVE-2024/CVE-2024-82xx/CVE-2024-8261.json) (`2025-03-03T15:15:15.820`)
- [CVE-2024-8262](CVE-2024/CVE-2024-82xx/CVE-2024-8262.json) (`2025-03-03T15:15:15.990`)
- [CVE-2025-0555](CVE-2025/CVE-2025-05xx/CVE-2025-0555.json) (`2025-03-03T16:15:39.227`)
- [CVE-2025-0689](CVE-2025/CVE-2025-06xx/CVE-2025-0689.json) (`2025-03-03T15:15:16.147`)
- [CVE-2025-1125](CVE-2025/CVE-2025-11xx/CVE-2025-1125.json) (`2025-03-03T15:15:16.300`)
- [CVE-2025-1801](CVE-2025/CVE-2025-18xx/CVE-2025-1801.json) (`2025-03-03T15:15:16.500`)
- [CVE-2025-24023](CVE-2025/CVE-2025-240xx/CVE-2025-24023.json) (`2025-03-03T16:15:41.820`)
- [CVE-2025-25185](CVE-2025/CVE-2025-251xx/CVE-2025-25185.json) (`2025-03-03T16:15:42.377`)
- [CVE-2025-27094](CVE-2025/CVE-2025-270xx/CVE-2025-27094.json) (`2025-03-03T16:15:43.023`)
- [CVE-2025-27099](CVE-2025/CVE-2025-270xx/CVE-2025-27099.json) (`2025-03-03T16:15:43.173`)
- [CVE-2025-27417](CVE-2025/CVE-2025-274xx/CVE-2025-27417.json) (`2025-03-03T16:15:43.820`)
- [CVE-2025-27418](CVE-2025/CVE-2025-274xx/CVE-2025-27418.json) (`2025-03-03T16:15:43.960`)
- [CVE-2025-27419](CVE-2025/CVE-2025-274xx/CVE-2025-27419.json) (`2025-03-03T16:15:44.090`)
- [CVE-2025-27420](CVE-2025/CVE-2025-274xx/CVE-2025-27420.json) (`2025-03-03T16:15:44.223`)
- [CVE-2024-45782](CVE-2024/CVE-2024-457xx/CVE-2024-45782.json) (`2025-03-03T17:15:12.900`)
- [CVE-2024-51091](CVE-2024/CVE-2024-510xx/CVE-2024-51091.json) (`2025-03-03T18:15:29.523`)
- [CVE-2024-53384](CVE-2024/CVE-2024-533xx/CVE-2024-53384.json) (`2025-03-03T18:15:29.670`)
- [CVE-2024-53387](CVE-2024/CVE-2024-533xx/CVE-2024-53387.json) (`2025-03-03T17:15:13.050`)
- [CVE-2024-53388](CVE-2024/CVE-2024-533xx/CVE-2024-53388.json) (`2025-03-03T17:15:13.167`)
- [CVE-2024-57240](CVE-2024/CVE-2024-572xx/CVE-2024-57240.json) (`2025-03-03T17:15:13.320`)
- [CVE-2025-0285](CVE-2025/CVE-2025-02xx/CVE-2025-0285.json) (`2025-03-03T17:15:13.430`)
- [CVE-2025-0286](CVE-2025/CVE-2025-02xx/CVE-2025-0286.json) (`2025-03-03T17:15:13.537`)
- [CVE-2025-0287](CVE-2025/CVE-2025-02xx/CVE-2025-0287.json) (`2025-03-03T17:15:13.710`)
- [CVE-2025-0288](CVE-2025/CVE-2025-02xx/CVE-2025-0288.json) (`2025-03-03T17:15:13.823`)
- [CVE-2025-0289](CVE-2025/CVE-2025-02xx/CVE-2025-0289.json) (`2025-03-03T17:15:13.943`)
- [CVE-2025-0678](CVE-2025/CVE-2025-06xx/CVE-2025-0678.json) (`2025-03-03T17:15:14.053`)
- [CVE-2025-0684](CVE-2025/CVE-2025-06xx/CVE-2025-0684.json) (`2025-03-03T18:15:30.537`)
- [CVE-2025-0685](CVE-2025/CVE-2025-06xx/CVE-2025-0685.json) (`2025-03-03T18:15:30.733`)
- [CVE-2025-0686](CVE-2025/CVE-2025-06xx/CVE-2025-0686.json) (`2025-03-03T18:15:30.930`)
- [CVE-2025-1876](CVE-2025/CVE-2025-18xx/CVE-2025-1876.json) (`2025-03-03T17:15:14.517`)
- [CVE-2025-25301](CVE-2025/CVE-2025-253xx/CVE-2025-25301.json) (`2025-03-03T17:15:14.740`)
- [CVE-2025-25302](CVE-2025/CVE-2025-253xx/CVE-2025-25302.json) (`2025-03-03T17:15:14.920`)
- [CVE-2025-25303](CVE-2025/CVE-2025-253xx/CVE-2025-25303.json) (`2025-03-03T17:15:15.073`)
- [CVE-2025-27370](CVE-2025/CVE-2025-273xx/CVE-2025-27370.json) (`2025-03-03T18:15:40.650`)
- [CVE-2025-27371](CVE-2025/CVE-2025-273xx/CVE-2025-27371.json) (`2025-03-03T18:15:40.850`)
- [CVE-2025-27421](CVE-2025/CVE-2025-274xx/CVE-2025-27421.json) (`2025-03-03T17:15:15.630`)
- [CVE-2025-27422](CVE-2025/CVE-2025-274xx/CVE-2025-27422.json) (`2025-03-03T17:15:15.787`)
- [CVE-2025-27423](CVE-2025/CVE-2025-274xx/CVE-2025-27423.json) (`2025-03-03T17:15:15.943`)
- [CVE-2025-27498](CVE-2025/CVE-2025-274xx/CVE-2025-27498.json) (`2025-03-03T17:15:16.443`)
### CVEs modified in the last Commit
Recently modified CVEs: `37`
Recently modified CVEs: `52`
- [CVE-2024-2531](CVE-2024/CVE-2024-25xx/CVE-2024-2531.json) (`2025-03-03T16:40:55.250`)
- [CVE-2024-2533](CVE-2024/CVE-2024-25xx/CVE-2024-2533.json) (`2025-03-03T16:40:55.250`)
- [CVE-2024-2534](CVE-2024/CVE-2024-25xx/CVE-2024-2534.json) (`2025-03-03T16:40:55.250`)
- [CVE-2024-2535](CVE-2024/CVE-2024-25xx/CVE-2024-2535.json) (`2025-03-03T16:40:55.250`)
- [CVE-2024-3003](CVE-2024/CVE-2024-30xx/CVE-2024-3003.json) (`2025-03-03T16:20:59.253`)
- [CVE-2024-3004](CVE-2024/CVE-2024-30xx/CVE-2024-3004.json) (`2025-03-03T16:20:59.253`)
- [CVE-2024-5048](CVE-2024/CVE-2024-50xx/CVE-2024-5048.json) (`2025-03-03T16:25:24.627`)
- [CVE-2024-5064](CVE-2024/CVE-2024-50xx/CVE-2024-5064.json) (`2025-03-03T16:11:16.720`)
- [CVE-2024-5065](CVE-2024/CVE-2024-50xx/CVE-2024-5065.json) (`2025-03-03T16:11:16.720`)
- [CVE-2024-5066](CVE-2024/CVE-2024-50xx/CVE-2024-5066.json) (`2025-03-03T16:11:16.720`)
- [CVE-2024-54957](CVE-2024/CVE-2024-549xx/CVE-2024-54957.json) (`2025-03-03T16:15:38.450`)
- [CVE-2024-55160](CVE-2024/CVE-2024-551xx/CVE-2024-55160.json) (`2025-03-03T16:15:38.617`)
- [CVE-2024-6653](CVE-2024/CVE-2024-66xx/CVE-2024-6653.json) (`2025-03-03T16:25:24.627`)
- [CVE-2025-0339](CVE-2025/CVE-2025-03xx/CVE-2025-0339.json) (`2025-03-03T16:25:24.627`)
- [CVE-2025-1170](CVE-2025/CVE-2025-11xx/CVE-2025-1170.json) (`2025-03-03T16:25:24.627`)
- [CVE-2025-1576](CVE-2025/CVE-2025-15xx/CVE-2025-1576.json) (`2025-03-03T16:25:24.627`)
- [CVE-2025-1577](CVE-2025/CVE-2025-15xx/CVE-2025-1577.json) (`2025-03-03T16:25:24.627`)
- [CVE-2025-1716](CVE-2025/CVE-2025-17xx/CVE-2025-1716.json) (`2025-03-03T16:15:39.520`)
- [CVE-2025-20647](CVE-2025/CVE-2025-206xx/CVE-2025-20647.json) (`2025-03-03T15:15:16.880`)
- [CVE-2025-22211](CVE-2025/CVE-2025-222xx/CVE-2025-22211.json) (`2025-03-03T16:15:39.843`)
- [CVE-2025-22952](CVE-2025/CVE-2025-229xx/CVE-2025-22952.json) (`2025-03-03T16:15:40.010`)
- [CVE-2025-24428](CVE-2025/CVE-2025-244xx/CVE-2025-24428.json) (`2025-03-03T15:31:07.747`)
- [CVE-2025-24429](CVE-2025/CVE-2025-244xx/CVE-2025-24429.json) (`2025-03-03T15:31:07.747`)
- [CVE-2025-24430](CVE-2025/CVE-2025-244xx/CVE-2025-24430.json) (`2025-03-03T15:31:07.747`)
- [CVE-2025-24432](CVE-2025/CVE-2025-244xx/CVE-2025-24432.json) (`2025-03-03T15:31:07.747`)
- [CVE-2025-1168](CVE-2025/CVE-2025-11xx/CVE-2025-1168.json) (`2025-03-03T16:52:20.953`)
- [CVE-2025-1169](CVE-2025/CVE-2025-11xx/CVE-2025-1169.json) (`2025-03-03T16:52:20.953`)
- [CVE-2025-1179](CVE-2025/CVE-2025-11xx/CVE-2025-1179.json) (`2025-03-03T16:52:20.953`)
- [CVE-2025-1244](CVE-2025/CVE-2025-12xx/CVE-2025-1244.json) (`2025-03-03T18:15:31.307`)
- [CVE-2025-1829](CVE-2025/CVE-2025-18xx/CVE-2025-1829.json) (`2025-03-03T18:15:31.937`)
- [CVE-2025-1831](CVE-2025/CVE-2025-18xx/CVE-2025-1831.json) (`2025-03-03T18:15:32.520`)
- [CVE-2025-1832](CVE-2025/CVE-2025-18xx/CVE-2025-1832.json) (`2025-03-03T18:15:32.950`)
- [CVE-2025-1833](CVE-2025/CVE-2025-18xx/CVE-2025-1833.json) (`2025-03-03T18:15:33.763`)
- [CVE-2025-1843](CVE-2025/CVE-2025-18xx/CVE-2025-1843.json) (`2025-03-03T18:15:34.290`)
- [CVE-2025-1844](CVE-2025/CVE-2025-18xx/CVE-2025-1844.json) (`2025-03-03T18:15:34.773`)
- [CVE-2025-1845](CVE-2025/CVE-2025-18xx/CVE-2025-1845.json) (`2025-03-03T18:15:35.840`)
- [CVE-2025-1846](CVE-2025/CVE-2025-18xx/CVE-2025-1846.json) (`2025-03-03T18:15:36.340`)
- [CVE-2025-1847](CVE-2025/CVE-2025-18xx/CVE-2025-1847.json) (`2025-03-03T18:15:36.537`)
- [CVE-2025-1848](CVE-2025/CVE-2025-18xx/CVE-2025-1848.json) (`2025-03-03T18:15:36.720`)
- [CVE-2025-1849](CVE-2025/CVE-2025-18xx/CVE-2025-1849.json) (`2025-03-03T18:15:36.893`)
- [CVE-2025-1850](CVE-2025/CVE-2025-18xx/CVE-2025-1850.json) (`2025-03-03T18:15:37.077`)
- [CVE-2025-1851](CVE-2025/CVE-2025-18xx/CVE-2025-1851.json) (`2025-03-03T18:15:37.277`)
- [CVE-2025-1852](CVE-2025/CVE-2025-18xx/CVE-2025-1852.json) (`2025-03-03T18:15:37.447`)
- [CVE-2025-21155](CVE-2025/CVE-2025-211xx/CVE-2025-21155.json) (`2025-03-03T16:52:20.953`)
- [CVE-2025-22738](CVE-2025/CVE-2025-227xx/CVE-2025-22738.json) (`2025-03-03T17:42:59.740`)
- [CVE-2025-25791](CVE-2025/CVE-2025-257xx/CVE-2025-25791.json) (`2025-03-03T18:15:40.030`)
- [CVE-2025-25818](CVE-2025/CVE-2025-258xx/CVE-2025-25818.json) (`2025-03-03T17:15:15.230`)
- [CVE-2025-26465](CVE-2025/CVE-2025-264xx/CVE-2025-26465.json) (`2025-03-03T18:15:40.247`)
- [CVE-2025-27094](CVE-2025/CVE-2025-270xx/CVE-2025-27094.json) (`2025-03-03T17:15:15.433`)
- [CVE-2025-27099](CVE-2025/CVE-2025-270xx/CVE-2025-27099.json) (`2025-03-03T17:15:15.533`)
## Download and Usage

View File

@ -126416,7 +126416,7 @@ CVE-2018-8635,0,0,2fa77610eae5127b69b72c8cd0c818352e2543174d574fb2deef54909e4fd4
CVE-2018-8636,0,0,432a07941e0899dcde198ff4f6249981610b9fb745921cfa04dab18ffc106851,2024-11-21T04:14:09.333000
CVE-2018-8637,0,0,14830137fe8bbc02788d245c16f9474c23cdbb327541d997f923df2c03a74013,2024-11-21T04:14:09.450000
CVE-2018-8638,0,0,b65222b6ab3c08a5318c5cfa087d17966ae608ccda1cc49c66b47d657073eba3,2024-11-21T04:14:09.573000
CVE-2018-8639,0,1,26e81bcdc0dd6fccd292eebc08d51db2c952691c33d061a24396c110eb4770aa,2025-03-03T16:15:36.493000
CVE-2018-8639,0,0,26e81bcdc0dd6fccd292eebc08d51db2c952691c33d061a24396c110eb4770aa,2025-03-03T16:15:36.493000
CVE-2018-8641,0,0,a43394ac0283961ddab14e82a4299cbf7b8ac31c65f3064c1f9d8590d867ced2,2024-11-21T04:14:09.823000
CVE-2018-8643,0,0,bb7f45a85641f4ae4900e37b2faa285774a0d13729ca5f355b4cb6670454fe5d,2024-11-21T04:14:09.953000
CVE-2018-8649,0,0,c268dba9f2f7c15df48853255b474b1824af0b9b7086e1ed7148f8b0f4c9ee76,2024-11-21T04:14:10.080000
@ -187409,11 +187409,11 @@ CVE-2021-47161,0,0,76dd3822df5b653cc5b3533e2932b27b97e30a870e1e54b596d0168afab1c
CVE-2021-47162,0,0,6600fbe6f8b1cc517f1a975156019fa2f78220e0ad1b235c249d5b7a9ea903ad,2024-11-21T06:35:31.717000
CVE-2021-47163,0,0,a06ed223386e63a8ac14caa534dcb3ad375e47473849992ae6bb2f995b5ca751,2024-11-21T06:35:31.853000
CVE-2021-47164,0,0,5f23854b4f099fb6fdac7718ce7e13674f7549368640ba9489dcff1f7fab1462,2024-11-21T06:35:31.987000
CVE-2021-47165,0,0,09d8e52a7ef3c0caf5025856dd3a2534980d562c1d0b455dbaca9ae5f446ecfc,2024-11-21T06:35:32.130000
CVE-2021-47165,0,1,f1fc50e90c322221d19dbc186e02f7bf0409c8bc78bac039bc2970c66bf19a10,2025-03-03T17:33:19.643000
CVE-2021-47166,0,0,9feca83df845984b5de93af8efb875dc8aa408f0068657d03229fa12e7ec4b5c,2024-11-21T06:35:32.270000
CVE-2021-47167,0,0,ad90752669d7bf1ca0a11528407fa915ec3859e188b9c48a12c90484211f21be,2024-11-21T06:35:32.403000
CVE-2021-47168,0,0,49217aa6aa129593c320b00aef3e691a32c4b6de37ab951687c028cdded799e0,2024-11-21T06:35:32.533000
CVE-2021-47169,0,0,b53597b3859ea18d852db712d7bdb4dd31d8bc472ab36aae169feadc34c24a86,2024-11-21T06:35:32.660000
CVE-2021-47169,0,1,25666f16fd01c6bd8d092094f4c0639847fee0de4acf6771b18e77a87876ee67,2025-03-03T17:33:19.643000
CVE-2021-47170,0,0,eebe8891c62ff697aec84868114988a0a88f21bc806abbc9a9a885d993a7de9e,2024-11-21T06:35:32.790000
CVE-2021-47171,0,0,53f9efba59fa2e2383ad5139a1ec5849f84c59bcb80640d33ac39a94bd1d81f1,2024-11-21T06:35:32.923000
CVE-2021-47172,0,0,d828888ed8ef79257f45aee96101e886d726fa717d11fd369327fc396e922a4a,2024-11-21T06:35:33.073000
@ -220981,7 +220981,7 @@ CVE-2023-26072,0,0,9d71983155b48b93297e485003e5f4e2c8c9af23e3b1c25eaac392689190d
CVE-2023-26073,0,0,09741fb39b8701f0e3ef5d6844c8639a00c99dafca00486c4a66b5d1ea134140,2024-11-21T07:50:43.503000
CVE-2023-26074,0,0,092c9a1c1dbd0756517e1ac3fb0f8ee7d519a46f4fb62e08023ac22b64cc30d2,2024-11-21T07:50:43.673000
CVE-2023-26075,0,0,ff56d1a9f5f2d9fc61a036599ac8d07140c88c5af679a7e3e6771a54d2337e43,2025-02-27T21:15:18.510000
CVE-2023-26076,0,0,cc79ad1657f1a0a12157aedefda72150ee83bc945d53abb684ae16e9c2b8a0ae,2024-11-21T07:50:44.053000
CVE-2023-26076,0,1,e30c665235ca223c424307e1a3ca76b40dd12c9b5c65ef27ce1ef2b364bad901,2025-03-03T18:15:27.330000
CVE-2023-26077,0,0,82651bffd17201218473c387a66287ae68908d2c8c6a570401ca6c223517eea4,2024-11-21T07:50:44.210000
CVE-2023-26078,0,0,c3d7804ef5c232ff215416da75bb0ae90c43cc41842850d8baa070dc2dad30ac,2024-11-21T07:50:44.370000
CVE-2023-2608,0,0,15173476a57029e92a741b7bdf1508ad449142c8f8a5f0a3a32a4f190bbdec6c,2024-11-21T07:58:55.437000
@ -221603,7 +221603,7 @@ CVE-2023-26949,0,0,2c6b8148ef5efe785cdb1d1c73e6f72cf00cd8df8a95fe5cd7fd83b5c450e
CVE-2023-2695,0,0,1a03e6ccf425b7efab4b2b3d34d6ccd4c483f382d13af42c5c783fbc5e3e288c,2024-11-21T07:59:06.173000
CVE-2023-26950,0,0,776d2f7b141aebc20febebface8c5cc1214b6003cf0611b92d93d7ca6b16e7ba,2024-11-21T07:52:05.960000
CVE-2023-26951,0,0,e1adc49b9103f912e0f2aa00fe9d939d9cab78c809f7f4a57db4e408eaae3d8c,2024-11-21T07:52:06.123000
CVE-2023-26952,0,1,9a77e11b71d30a33fc14ddb60eb3c430a4af1c5011ff90903a5c4573a4441c86,2025-03-03T16:15:37.590000
CVE-2023-26952,0,0,9a77e11b71d30a33fc14ddb60eb3c430a4af1c5011ff90903a5c4573a4441c86,2025-03-03T16:15:37.590000
CVE-2023-26953,0,0,a744baada54f853b994febf277396e18887bac247f3d83fd721e1a19f7695965,2024-11-21T07:52:06.437000
CVE-2023-26954,0,0,25be800d2a27b5a2697c9d918f8a2349a547ae4f9a78abb00c6ceaad8c48b070,2024-11-21T07:52:06.593000
CVE-2023-26955,0,0,b8f41864dbe1598322641771160d9e7a2e547f6259bb94db906df77dcc968550,2024-11-21T07:52:06.740000
@ -221638,7 +221638,7 @@ CVE-2023-27000,0,0,e7632f817e61d8a12de30f7cfd641dc1805aa79e66ef1ddb4d0513ee23d48
CVE-2023-27001,0,0,3ac29dffc9689e6b71694979be6cfa0bad2c5d91addbadb78a74143a10316adc,2024-11-21T07:52:10.427000
CVE-2023-27008,0,0,1025aac055231396c7c04d404864dcb2609774418612e6608c48001f9e020623,2025-02-18T21:15:15
CVE-2023-2701,0,0,359ca3cd85c5ad292c6eb2e38c8d6f254861fc7eec8105a5b114d5cb8ef3d322,2024-11-21T07:59:06.923000
CVE-2023-27010,0,0,9ec2689a56d9a51f6035a2f37afcde9da7bf8e824dcb8cac3c33623f06dfcf40,2024-11-21T07:52:10.720000
CVE-2023-27010,0,1,745a49b1c5716222865a934c6a0267c8e324416df9583e99aaef3e0918f09419,2025-03-03T17:15:10.880000
CVE-2023-27012,0,0,8fb65310570a50514b75afe7000e6e9ef36a598183353ee72217dda16108e491,2025-02-12T20:15:32.317000
CVE-2023-27013,0,0,1604c38b98312bcac4b2d79a7158aae9f9527f7b5271c3d76f6415940eb26348,2025-02-12T20:15:32.477000
CVE-2023-27014,0,0,a32a81fd3c7dcb00ad93453db64e871c651a593ef7078ef0bc276a1e49f4801f,2025-02-12T20:15:32.640000
@ -238555,6 +238555,7 @@ CVE-2023-49028,0,0,1fe6cffd82021764ce68fd3a53c4875910ce33e674fe2677a56e372e5a7b2
CVE-2023-49029,0,0,c614567def59347336438740b811220368c65599cc4c871c14425dc96c92f919,2024-11-21T08:32:42.833000
CVE-2023-4903,0,0,4e15f764aaa4b079f24341cacdb9f278af35d9bba3f5d8eb18a330cc8e32e94b,2024-11-21T08:36:13.627000
CVE-2023-49030,0,0,05a1c83003c2661094ba87a267d63d6f1ebc1176bdaa7cc3b41d9bda2fa7cad0,2024-11-21T08:32:42.990000
CVE-2023-49031,1,1,701f12fe4b4ed942bc1b9e2b2bc62466e80497326b3c152997ffb8bc7eca6f0c,2025-03-03T18:15:28.330000
CVE-2023-49032,0,0,bf0051df9f823bcff03622a71e492c2e2c8f0b2e1823ce4c4a928e1018ed932e,2024-11-21T08:32:43.220000
CVE-2023-49034,0,0,1d1efe3d808290b90ce8e37a8c591816f90907f686b935dadde78588546b498b,2024-11-21T08:32:43.363000
CVE-2023-49038,0,0,c9ba25652a66916f2762c9c471fc85f429fa7f7f0cea2238a2047f0c789b591f,2024-11-21T08:32:43.590000
@ -238754,7 +238755,7 @@ CVE-2023-49253,0,0,6bcc1caa4fe1d5c3fb930e1e6d020cd5af57d2e223b7cbb7cd40bd8b4d0fe
CVE-2023-49254,0,0,a445b0f6ae60f2a245881debdbe67f95e0164deb25a5fc48870fb7ac271514fd,2024-11-21T08:33:07.753000
CVE-2023-49255,0,0,be1a86a7ebe6cb806c0e930c172298693eeb28b862f6d586da20eb0e6d65bdee,2024-11-21T08:33:07.887000
CVE-2023-49256,0,0,fff3d693d0a8b193751618615483e39254622d7ab4a90cb947bccce2afd3ac77,2024-11-21T08:33:08.020000
CVE-2023-49257,0,0,4237cf13461234b7f051ac2fadb9014d2cf363ba2904bb92638a856ed3b6b363,2024-11-21T08:33:08.160000
CVE-2023-49257,0,1,54ad6ba0bc630625b0d5652f7d642002aac152a755f3cb3c12d2224b524c8ac0,2025-03-03T18:15:28.480000
CVE-2023-49258,0,0,d7e58c6a3363f56f570266892ee4f64dc7320b8854779a72f83922532b52a158,2024-11-21T08:33:08.297000
CVE-2023-49259,0,0,e6244212b1909acee79666099d746c8f2782df1d6d7e2a3deb92b50aa1d48a86,2024-11-21T08:33:08.450000
CVE-2023-4926,0,0,a48ef158a7272869542d1ef25731d510dff8d9f79e54c406506be9432559e2ad,2024-11-21T08:36:16.977000
@ -239257,7 +239258,7 @@ CVE-2023-49965,0,0,bbbb4e195b10642bbe570fdd2635d5b00de86015f5ea2d7e57560f5a41f76
CVE-2023-49967,0,0,7455fad67fada8a71e63581ef71704562d617d7986216f8b4aed77f63a5a1ef2,2024-11-21T08:34:06.340000
CVE-2023-49968,0,0,e27c0d39fec3cc8d78cbcdbda5600060aa4aa6025ea7df0c05b60635677b9f80,2024-11-21T08:34:06.490000
CVE-2023-49969,0,0,1c6e721c03f56e0577536da9bf5b7c5c7b3559914e0b7dbdfb0a379adc55a5d7,2024-11-21T08:34:06.703000
CVE-2023-4997,0,0,475f97ad537cb2a688ee3a3694348f3bbddf51b9273b93864aad9a10fd2fce5e,2024-11-21T08:36:25.793000
CVE-2023-4997,0,1,4fe9a3ee9fae40bbb6d40dfd328b8595f2fd5fbfb2596c65f27ae22282aa5cb0,2025-03-03T17:15:11.153000
CVE-2023-49970,0,0,b6b21cd662c6188652027dde752dfbe4d17bfefd4a2e3df151e2c3955d71ee50,2024-11-21T08:34:06.910000
CVE-2023-49971,0,0,df8ebc04397853587b183e5e501cceacb90d46b4cec9e39b49a79d04bda2daf6,2025-01-15T16:38:44.307000
CVE-2023-49973,0,0,0b8457fedb29078695c5eaf42c4bcb75a5f9487ca6a772330139e3edda79513c,2025-01-15T16:38:19.337000
@ -244453,7 +244454,7 @@ CVE-2024-10230,0,0,0b6a0fc884e5ae244e576686edf454ca3ce274c75c14a9d5a28d123bec664
CVE-2024-10231,0,0,1cdb8518034cbde6323ad37f5ecdbdd8647d8b70c51f5e1314952e0041e1b97b,2024-10-25T17:01:55.633000
CVE-2024-10232,0,0,0d56e4d1ad2ea7a2574f878dbfab6b288953236c47236ee86211a53fb0dc2629,2024-11-01T12:57:03.417000
CVE-2024-10233,0,0,0f0fa741bc160fc828eb74121d2173934d2af8a73c34c7d13db17f836aa89919,2024-10-29T14:34:04.427000
CVE-2024-10234,0,1,1893d17cd41795582a8c43f46483f6ef12bef3fa89cc3bb862ec0381a56f8a8e,2025-03-03T15:15:13.357000
CVE-2024-10234,0,0,1893d17cd41795582a8c43f46483f6ef12bef3fa89cc3bb862ec0381a56f8a8e,2025-03-03T15:15:13.357000
CVE-2024-10237,0,0,cc60321022b7cb6e5577da8c0f73bbdcebcda7ac9248188a1c24cddff8eea243,2025-02-04T08:15:27.920000
CVE-2024-10238,0,0,af3722233a0cb909065d9075279edbedb9fe764eee160ff09f19117c4c052fa2,2025-02-04T08:15:28.280000
CVE-2024-10239,0,0,1aeb02b8ba8e9d51182e102b3178de31d842bee8699e4cff348214784dcd3eed,2025-02-04T08:15:28.430000
@ -246958,7 +246959,7 @@ CVE-2024-12994,0,0,41373c4d40e1bbb5f2300e236673b238210d40fc5f881d7cbaeba6a415952
CVE-2024-12995,0,0,ec2417906e9c84646a2cfbd3e013e0c39f1a4db0cac26074a9d06cf2f93902af,2024-12-28T14:15:22.507000
CVE-2024-12996,0,0,6c43766b1ce2636ec36981eeeba47786371be2965a0df2a813c99d297c767f66,2025-01-06T15:15:10.933000
CVE-2024-12997,0,0,71092d52f774b0f71c49030eb5b4ba5f2fdddc53fb6fa15623fde6c383daa7f1,2025-01-06T15:15:11.027000
CVE-2024-12998,0,1,7c5edb61033bdadf008d6ee07abea3a9b5cf8804ee985e49dc6e03fe12e393aa,2025-03-03T16:25:24.627000
CVE-2024-12998,0,0,7c5edb61033bdadf008d6ee07abea3a9b5cf8804ee985e49dc6e03fe12e393aa,2025-03-03T16:25:24.627000
CVE-2024-12999,0,0,cef46f50781baf217473f51d55cd419e9cb6a34f142f75461329fcd7fecc83f9,2025-02-18T19:03:01.740000
CVE-2024-1300,0,0,cd5e94fcfe97597e01cd14e77d002316d1f6043211ecf00bfd2ed45a32b95c9e,2024-11-25T03:15:10.053000
CVE-2024-13000,0,0,bc161add052684ff88735e2b18fbd0186cf4b5d7e82bd795e40644a35f7cfe8c,2025-02-18T19:02:13.137000
@ -247099,7 +247100,7 @@ CVE-2024-13145,0,0,5c365a974659bd41337fcb8adb2d8fbc8e9cd8f5a39411bbe19577a7fc11a
CVE-2024-13148,0,0,5e62731777939a6cccea414e3b22f75ba2217f43648f57abb338beb059e81dd8,2025-02-27T15:15:38.583000
CVE-2024-1315,0,0,ae67b7f13a317bdc1be64b4fdf580a08492423f203ba37c909a5dc9e35687d4a,2025-01-17T17:30:38.363000
CVE-2024-13152,0,0,122264645183d9f888de428d629fb2ba29cf302edc1f968441a9e42307fca5f1,2025-02-14T13:15:42.170000
CVE-2024-13153,0,0,bde600732fea7e9bd4529fca5c8af47ad8bbffe8707fb32f1115e25622da8b0f,2025-01-09T09:15:07.243000
CVE-2024-13153,0,1,6a7ea48b6c8668ba1a47dbcf1a141a7b25a12c4a1f85a5c59e5d5a298d008763,2025-03-03T17:42:59.740000
CVE-2024-13154,0,0,8b848cb4ffbbf3d5300b505058bccc136fae4b33341f37a24f40fb8ac9f235ba,2025-01-13T21:15:11.970000
CVE-2024-13155,0,0,6682537fa9f5844e5906fbe79fbac9ddfaae9e2af1434030859c114baf0c7e12,2025-02-25T20:23:19.657000
CVE-2024-13156,0,0,30f08a5146793529d2149bd8fe28d1d230f7d62ef9b057e2393b31a9d88e81a0,2025-01-14T09:15:20.910000
@ -252048,7 +252049,7 @@ CVE-2024-24774,0,0,f6081191014f835b364f01c2d06774fe804398159465de16dc62a59398430
CVE-2024-24775,0,0,7f0cbc7d6af894e75c1d6dc5713fcd9f630cd471f82e9ecb0a63fc95da2f7ff6,2025-01-23T19:53:31.737000
CVE-2024-24776,0,0,a2f3ec067717ca04fbf18f3a449f632e7089db64e0a17c019f843c8598b0286f,2024-11-21T08:59:40.850000
CVE-2024-24777,0,0,c46e7117281fbe7f2ffae8cc271867d3ae614f1ea7039937a5b87028aa4a092b,2024-11-21T08:59:41.007000
CVE-2024-24778,0,1,dbd76f970b5a45b04b740724568e322a3c370dfb52b1338fbe33569ac9a7b2cc,2025-03-03T15:15:14.323000
CVE-2024-24778,0,1,8e69505cadc4079a45418c71d867e3a3f3dd8b7a21b0499700cd2514fa5e55d4,2025-03-03T18:15:28.933000
CVE-2024-24779,0,0,7865ce8073200edcc497f4b351f74becfa65acde228d4f6892cf22addee64a54,2025-02-13T18:17:09.103000
CVE-2024-2478,0,0,3c239e842dee9874af5c6211db90ee2eaf9a1e0be73fcbf1799989b16285416b,2025-01-23T19:24:38.173000
CVE-2024-24781,0,0,056ec447dbcc83fc2a310224e9277e0a17bd56759c2d803ede35170578118e80,2024-11-21T08:59:41.280000
@ -252382,7 +252383,7 @@ CVE-2024-25146,0,0,70580878c7e66c134303e82bf314a0ea51bb4c7efa77286154d103535edb2
CVE-2024-25147,0,0,9c971f93dad595a47edb7f4ccdd3d989147ee2c0c3ea302a65f044923ee197f7,2025-01-28T21:25:53.533000
CVE-2024-25148,0,0,baaba4bd1038fed5c1e9c1ed403cafba105c20610c41c31a35b866b1248f5d6d,2024-11-21T09:00:21.143000
CVE-2024-25149,0,0,c3bee153938ba2820767f603be3339e9a49705623e20e7321fe693091302456b,2024-12-10T23:03:54.853000
CVE-2024-2515,0,0,9cd9ac706b4d705f08abc9a17b7951ad446969eff5cd99dc1afcfec778d916b3,2024-11-21T09:09:55.143000
CVE-2024-2515,0,1,8703d1f211a0cf75bdaf670bd1e44b4453f13a068639ddb743951bea9bd657c7,2025-03-03T16:40:55.250000
CVE-2024-25150,0,0,9beb971424f34e419f2e67ec3339fe7f8ab91aa6b6e1cf1fb61046498d7f4901,2024-12-10T23:01:58.647000
CVE-2024-25151,0,0,a4c322b80a85824537c1b7eed9b06ce1ba65938efaec3cdae6e0b58e6d2e2b54,2025-01-28T02:28:11.500000
CVE-2024-25152,0,0,ceb801e8165316ac016fe3f822acb190520dfcd3154999216d5ec981331720bc,2025-01-28T21:26:06.277000
@ -252391,7 +252392,7 @@ CVE-2024-25154,0,0,7cd5ee3b427e3989a02b3c82e36ec257d930c9c6f4bec557cf5ca75dd266a
CVE-2024-25155,0,0,831d273875feb8840d15e6e3f2448939251eea9e4bd1bb15600946d38fa50978,2025-01-21T18:59:03.507000
CVE-2024-25156,0,0,60847190532a7ba7e7ee62459daea2ab78e6427de860956fbb7099bc19f8fc08,2025-01-23T18:14:11.203000
CVE-2024-25157,0,0,b70385b233eacac3c5d9d9d5477e3e8a95d4ead7ee037df905caab5d3e171959,2024-08-19T18:57:58.657000
CVE-2024-2516,0,0,6e3f6ff199327375c8fc0eda99d3252a6de8e4ff202ab52dd032fd37f18cacb7,2024-11-21T09:09:55.273000
CVE-2024-2516,0,1,456c9d36ecd93046841ee39c16041816353dae7b72fa58ecf962b5658fb7130c,2025-03-03T16:40:55.250000
CVE-2024-25164,0,0,eee54783d2d6bfd262ee8b281adf3cb7c0b25d88225f6d68f860ad59977da6c4,2024-11-21T09:00:22.493000
CVE-2024-25165,0,0,7c7f47e7bc83c48f0b6b83f12869667aa2deb29ed4294425f3ed1cea3197a218,2024-11-21T09:00:22.717000
CVE-2024-25166,0,0,d65d60bade9b69cb76854592f67ba61d52edf8bca7037b9f05c53ea22da07c20,2024-11-21T09:00:22.937000
@ -252442,31 +252443,31 @@ CVE-2024-25227,0,0,16b073802d3fc8b93b926c8f5c058b8c88e26270131230484aed954a3eea7
CVE-2024-25228,0,0,3f8b8b90a475931a022fce6ad96b33e0d7743a1b36b24664692106a8d55dfa6b,2024-11-21T09:00:30.977000
CVE-2024-2523,0,0,64ffb1ee13cecf1fe5d58eddcd99e34843f184937b3a4a074291701fa4996359,2025-02-14T16:53:12.380000
CVE-2024-25239,0,0,62d1960a75816647dd0824c1a6dd7522a9b290438071c728f2122144b08a1a07,2024-11-21T09:00:31.193000
CVE-2024-2524,0,1,cd53fad577f0fd12df0004d921087bd2c9d9b5f0451891e3224971afb02f04a8,2025-03-03T16:40:55.250000
CVE-2024-2524,0,0,cd53fad577f0fd12df0004d921087bd2c9d9b5f0451891e3224971afb02f04a8,2025-03-03T16:40:55.250000
CVE-2024-25247,0,0,8f27432758a2853eba1d5c1a91c7da083827266e4e63e595dc12f3b358565fca,2024-11-21T09:00:31.417000
CVE-2024-25248,0,0,81a8ad990dc45e329a2a406fa2e8862ab2f5c3673d256130877de386ab70b693,2025-02-14T16:22:09.803000
CVE-2024-25249,0,0,7cbde78c75e4d8497d99a20ea8ce98a726a45fe216dbf1b4e6c8ae0251db6893,2025-02-12T16:44:43.817000
CVE-2024-2525,0,1,8cd372a206122148f74f5f14097699f07c807df2adc17c97a7f1765a1e1a5ded,2025-03-03T16:40:55.250000
CVE-2024-2525,0,0,8cd372a206122148f74f5f14097699f07c807df2adc17c97a7f1765a1e1a5ded,2025-03-03T16:40:55.250000
CVE-2024-25250,0,0,db72313d2b8a86eec26ab519ea1baaf7ac154d306dc7534c2e8c4d26bd439334,2024-11-21T09:00:31.943000
CVE-2024-25251,0,0,6dea5af83ad1e7e7deeb31cb468a1c94ab5c1e06beee69c782e91b5b37b29796,2024-11-21T09:00:32.163000
CVE-2024-25253,0,0,48e99cce2b2802e3aeef59d20e7058849d1e4e7be86482650a3710ee00ff024a,2024-11-19T17:35:11.063000
CVE-2024-25254,0,0,0339a82eef9bc1a7a8bb28fefdcad83242ffe04648f59e10cecbad0da67cea19,2024-11-19T19:35:13.453000
CVE-2024-25255,0,0,879d4410a08cc23864a4824dcb477088b28d669368fe48b08008f9744ea817de,2024-12-24T06:15:33.590000
CVE-2024-2526,0,1,5b12ee0f5dfcabee3dc8d7d789fe613b7a308c64f74159aaaf3cd718cda115b3,2025-03-03T16:40:55.250000
CVE-2024-2526,0,0,5b12ee0f5dfcabee3dc8d7d789fe613b7a308c64f74159aaaf3cd718cda115b3,2025-03-03T16:40:55.250000
CVE-2024-25260,0,0,6ee402f74d2c05b4570f4093e7c197c9456061478a7a78d4fa79e707475ac8a5,2024-11-21T09:00:33
CVE-2024-25262,0,0,6b97d3438756703316ea9218afd4ff7812af2caa96c0282d0288ca35efad388f,2024-11-21T09:00:33.223000
CVE-2024-25269,0,0,7db9340337a565034be772e1d22a8640fa799f73da7eee35603a69a3a5c8ca49,2024-11-21T09:00:33.443000
CVE-2024-2527,0,1,b2dd22bb503f5bcd0309b2a838be8c7b5900ab03d9af42efa50a6119a7bd0419,2025-03-03T16:40:55.250000
CVE-2024-2527,0,0,b2dd22bb503f5bcd0309b2a838be8c7b5900ab03d9af42efa50a6119a7bd0419,2025-03-03T16:40:55.250000
CVE-2024-25270,0,0,8208357e1e39e95096dcbaa9833346184b3d01a6dfda4e5a2a59f10ccfd4ef6f,2024-09-13T16:01:01.810000
CVE-2024-25274,0,0,e9c3338ea30ee27a2b2e63cb3c1583dff1e7dfbf6ba74eeffc44e3645c9dc1e5,2024-11-21T09:00:33.740000
CVE-2024-2528,0,1,82051b49bd591e31c056ac2e14980618cebe86ad5a57d2eaeff62f5bf5045936,2025-03-03T16:40:55.250000
CVE-2024-2528,0,0,82051b49bd591e31c056ac2e14980618cebe86ad5a57d2eaeff62f5bf5045936,2025-03-03T16:40:55.250000
CVE-2024-25282,0,0,ece765810af1beae8ae3c646ce0359c978f27717aa503d7fd58c7978bfaf62ad,2024-10-22T21:15:06
CVE-2024-25283,0,0,323cda08c4ad8578ffbdc4bc4e7587e08475721a056c8a548c83870b8d85bc7c,2024-10-22T21:15:06.147000
CVE-2024-25284,0,0,169acf62687feab76dee844f984028cd42cf9344ea750a3f8c3678efd45936bf,2024-10-22T21:15:06.243000
CVE-2024-25285,0,0,6e828470eeaaf616cefe85cb4df7eced878006e1b539da025e4720003c774496,2024-10-22T21:15:06.350000
CVE-2024-25286,0,0,9476558ae89ae983b5b6d52ebbb122d05a57e12d287f16ed2a62862936f106f5,2024-10-22T21:15:06.443000
CVE-2024-25288,0,0,38218632e649898aa9cfb0d0c7bffa67d5b4699381a2842eb82dd347454a5d39,2024-11-21T09:00:34.027000
CVE-2024-2529,0,1,140b7257d09ae9f7c973742fff3387fefa88246f51097aa84615074cb5ec8948,2025-03-03T16:40:55.250000
CVE-2024-2529,0,0,140b7257d09ae9f7c973742fff3387fefa88246f51097aa84615074cb5ec8948,2025-03-03T16:40:55.250000
CVE-2024-25290,0,0,35a48ca5a622e094bd31621eeb7b60a8ce0e37e115c0a197c45f71405831ee4c,2024-11-21T09:00:34.240000
CVE-2024-25291,0,0,ba7c4ce1e37aa8e24b394ec2f91fed6d0c84aacadb9e83714fd1d90b98266610,2024-11-21T09:00:34.457000
CVE-2024-25292,0,0,df780968bda75020e10947a61600b7afa111d416f7ae745b1c296092b16c64d0,2025-01-21T18:30:20.803000
@ -252474,7 +252475,7 @@ CVE-2024-25293,0,0,85561e1f8c0397872a3690c79a54190ab513deff632dd15d08724cd294257
CVE-2024-25294,0,0,548c06e67bc118a6fa5feec4c8fe3ecd605a03dc361470c0aeb4866e475c38a0,2024-11-21T09:00:35.037000
CVE-2024-25297,0,0,a5e886fa4ef1133925f78074d5887ee6bf7505c42983811cbe1a106b4c6fd254,2024-11-21T09:00:35.267000
CVE-2024-25298,0,0,cfcf64b5d754fd69e4a2bff3f63744d367a17e7b3976b42159232a586e9e2d88,2024-11-21T09:00:35.500000
CVE-2024-2530,0,1,b9a909134159d82a3554eb342697a4735676ab8f10bd2e524a256cc48b75abba,2025-03-03T16:40:55.250000
CVE-2024-2530,0,0,b9a909134159d82a3554eb342697a4735676ab8f10bd2e524a256cc48b75abba,2025-03-03T16:40:55.250000
CVE-2024-25300,0,0,23582c8c4d7fe6a0311ddd5bed53f7ba87f4e5428121585285b1071fcb39ae55,2024-11-21T09:00:35.733000
CVE-2024-25301,0,0,69aeaa33f60b274bbeca44f2d86eb63201ff38f7408132d281722838b8a904ce,2024-11-21T09:00:35.893000
CVE-2024-25302,0,0,8118eb539031f099b5029926e4d0dd98150ab6d0dffef1fbfc4b61bb3c98657c,2024-11-21T09:00:36.040000
@ -252484,7 +252485,7 @@ CVE-2024-25306,0,0,b63f7a3170c4507e7efe0aff36598000c6c079a952c8d561914ac0c55d3ba
CVE-2024-25307,0,0,f4e5f998ce518e2c9e2e2280726987c541629fa5fbba20cdafc47279611c0476,2024-11-21T09:00:36.717000
CVE-2024-25308,0,0,f34f3f6259ffa6c4d4d6dc06610983771cfb029a7d8c1806dba298a8e8cb4930,2024-11-21T09:00:36.903000
CVE-2024-25309,0,0,cec91a13be6d678a8bd296a3887d54716bf431e23f423573bedaefc9a4942072,2024-11-21T09:00:37.043000
CVE-2024-2531,0,1,6f41d04e9dea510ccf892ca84b54d88106ef14550053e3638b435517ba578b43,2025-03-03T16:40:55.250000
CVE-2024-2531,0,0,6f41d04e9dea510ccf892ca84b54d88106ef14550053e3638b435517ba578b43,2025-03-03T16:40:55.250000
CVE-2024-25310,0,0,e320ecb7aa1fafa5346e4ba3ff5ca0add324bed9c883e1dfa83208a858415278,2024-11-21T09:00:37.193000
CVE-2024-25312,0,0,50e6e996a258790b41a929b5735f5aeaa7b5a4c7b1b057eefb4c7307913cc4b6,2024-11-21T09:00:37.333000
CVE-2024-25313,0,0,bb46a9ca1b5035ee988d64a5c851568b06c620c7a914d8396ffb1520db7b2e30,2024-11-21T09:00:37.480000
@ -252492,16 +252493,16 @@ CVE-2024-25314,0,0,b81f442b14f2368db80246f464d4f0035cd6146ceca4f37905d96abb30e01
CVE-2024-25315,0,0,94d0f2dbf16eb115667c034dce6adf07e1e07fc3107709e47083290b58a485d1,2024-11-21T09:00:37.853000
CVE-2024-25316,0,0,695834cabcc8024d51e9ae992af51a4b43da1168ad3e61123711bd3b9cddbb9f,2024-11-21T09:00:38
CVE-2024-25318,0,0,afa95d8853578df0bf95ae75b7a95038a81dfb503035271638c8f89374910c1c,2024-11-21T09:00:38.227000
CVE-2024-2532,0,0,6415c2e32041702b5fc36491108741bb87a5f644f2224019bac57a50b7cb0237,2024-11-21T09:09:57.453000
CVE-2024-2532,0,1,6557048ff732e1d7dac3c557555f5b8de490a23e928e028ca37f9a1f93ccb7a9,2025-03-03T16:40:55.250000
CVE-2024-25320,0,0,d2d47bd358763a78ddcff7788532c0481ee5d7a2cce25691dc5b0cde445466ba,2024-11-21T09:00:38.390000
CVE-2024-25325,0,0,b9a6eccdc6c82e87ce40cd5511f956ad176fcac06b9d26c743462dcd60e300a7,2024-11-21T09:00:38.610000
CVE-2024-25327,0,0,200c2b510342a3e155d5c5aae84c1549b1fe17451fa1d4b0fa553a648fd4f02a,2024-11-21T09:00:38.827000
CVE-2024-2533,0,1,e346cf84b9f2f449ac50f84ba3df088cc28ba956b6844353c3136c630c632e16,2025-03-03T16:40:55.250000
CVE-2024-2533,0,0,e346cf84b9f2f449ac50f84ba3df088cc28ba956b6844353c3136c630c632e16,2025-03-03T16:40:55.250000
CVE-2024-25331,0,0,2b5df9bf20f2ad2788f6bfc10fc6e2710ebce7c5b2ae509b177bc3eeb5d61cac,2024-11-21T09:00:39.057000
CVE-2024-2534,0,1,97424fd59d63544788b3bddf8d6f9632a6b45872cdeae763936c7deb3e7b6689,2025-03-03T16:40:55.250000
CVE-2024-2534,0,0,97424fd59d63544788b3bddf8d6f9632a6b45872cdeae763936c7deb3e7b6689,2025-03-03T16:40:55.250000
CVE-2024-25343,0,0,e95b5c5e8048e4efd735c454ea3bfb2db00d33bbce0bc4a2a17d6a93c15ddff4,2024-11-21T09:00:39.283000
CVE-2024-25344,0,0,33d39ecf8d6ac556c3d5bb95eb67c067ec31235f8aa78fc627aabc924889d088,2024-11-21T09:00:39.500000
CVE-2024-2535,0,1,7304021672dd7969c233c581f531940d7359a1986d671601349f510e41900ed5,2025-03-03T16:40:55.250000
CVE-2024-2535,0,1,db38ebb41a68a314837b286eb732510d8807566971f0363fbff364d69699d835,2025-03-03T16:40:55.250000
CVE-2024-25350,0,0,42b2885b778a3363dd7e8660ea5d10f7e6357ec013f679bcedd4548c237100ad,2024-11-21T09:00:39.723000
CVE-2024-25351,0,0,48adb19f4acbaef01702e2c768d6f3345f4c2ea27c5c7efc96ab3e55f3a7fae6,2024-11-21T09:00:39.960000
CVE-2024-25354,0,0,297ccea736333201514db90fe7dbcf98c84ce9c571080000be069d554c6a00ad,2024-11-21T09:00:40.210000
@ -253430,7 +253431,7 @@ CVE-2024-26629,0,0,2a7ecd77e86c42f4a70a3376c42e7624451573e296d28b71c04baf0cc1ec5
CVE-2024-2663,0,0,c22f0e7b5ed31e3585ae04604569739fcb5bd35aa21e256ad3298c060be80007,2024-11-21T09:10:14.400000
CVE-2024-26630,0,0,adde7411c6c89a1ccc138c9f1404cb16baf029b425dd47ea72b82cb8b0a9fe04,2024-11-21T09:02:43.470000
CVE-2024-26631,0,0,eb4c850fd5a6959a2922e5f8e3fdc1bab0839dca96694a777740412e05e949ce,2024-11-21T09:02:43.580000
CVE-2024-26632,0,0,45a62b76f2e86f5477c6e9d8ba48dcd130a62956d5a56ee6ce84c07427e07d45,2024-11-21T09:02:43.700000
CVE-2024-26632,0,1,7d5b9a41e5544a024d3fe43e030dd518d74e6fe0747c4fbe31f63afe56570152,2025-03-03T17:33:19.643000
CVE-2024-26633,0,0,53fb39ca7258086fde7e81877e5cc590f32c01622b87c853980b5069721d02f8,2024-12-20T13:15:19.710000
CVE-2024-26634,0,0,1f9eeabf8f133d86a691ddf2fa231459fd38dd0f521c36b94c4201dd9d3e3366,2024-11-21T09:02:44.020000
CVE-2024-26635,0,0,a7edca2438cebac503d3d0a80a3b8ba894da4196ace5867bea23ec41425d9fe5,2024-11-21T09:02:44.140000
@ -253461,12 +253462,12 @@ CVE-2024-26657,0,0,5b20f2d67a13488a4561cdf1804b4d16bd412c492c2f8931f4259c8fdab78
CVE-2024-26658,0,0,fdb2631e448bd210fea3052df1cd33afa28ec2d71cfc06366e87396444d81fff,2025-02-03T16:15:21.710000
CVE-2024-26659,0,0,d1c064e96da1d530f31cb13996b98b6c11a5365d98cf8e2364eb0850bbe23f59,2024-11-21T09:02:47.073000
CVE-2024-2666,0,0,94c10c4038495e2feaf574a5456d0064fe9e83a56f9b4605d7001b425c92541e,2025-01-08T19:47:15.707000
CVE-2024-26660,0,0,6028a94cbb5a9c9ef9fd6139ee07c29239b5013624aa3697f8ef0e8c75309c99,2024-11-21T09:02:47.193000
CVE-2024-26660,0,1,102ff31ee0865425b639eb07f439d8a6e1d3deb1a18904061edc12771f87edd7,2025-03-03T17:33:19.643000
CVE-2024-26661,0,0,d45863d2e30232e358edb0d1a1e889067585e710a0e2ee684c544bcee0a67515,2024-11-21T09:02:47.317000
CVE-2024-26662,0,0,a88f4521b9b995afb0e21d9f507fb182180356687597cd7121dd3a6b42115b74,2024-11-21T09:02:47.500000
CVE-2024-26663,0,0,74a791432f5d59cb2bc083592aaf9ae5c64f10e827e4bfdc39da1da462ef98fd,2025-01-07T17:20:30.367000
CVE-2024-26664,0,0,f174ef6695a76159aab69bc64b6113c4071e242e88009058b38ce039df6e0a7f,2024-11-21T09:02:47.807000
CVE-2024-26665,0,0,914c844dba6f5cd54c69860e0490ff270d80c476de8e03ca1dee30ded177c0e2,2024-11-21T09:02:47.933000
CVE-2024-26665,0,1,b7860a2cfba0c9676ba45ba5e75215a1baad4430a49d03c9fc2928401834e288,2025-03-03T17:33:19.643000
CVE-2024-26666,0,0,f3d57571a156c221255e6ed43ce466550f0474a9e05c86712515e781d1d5dfe2,2024-11-21T09:02:48.060000
CVE-2024-26667,0,0,e5ad506f4c73ca6a1fa85cffa41c22f32b9dc8afefacf0aae7843e76fbaf00b7,2024-11-21T09:02:48.243000
CVE-2024-26668,0,0,19e99ff104cefd1cd23ad3007ee1b6d98ed06b00b2ab1e0701085c50b1f5ac6e,2024-11-21T09:02:48.360000
@ -253571,7 +253572,7 @@ CVE-2024-26757,0,0,ea19223d6591c0bb304a57b49e3343899072ac606ffd2b71bfbed5f59d9bf
CVE-2024-26758,0,0,c89d8554b475b329ed0ac9ff1b69624897deb142b13dfbc35a85f8d82feeb354,2024-11-21T09:03:00.333000
CVE-2024-26759,0,0,c16a8feb5c03575808a38e891cf9c009a3d4bd2625d12119e088f14de118118c,2024-11-21T09:03:00.527000
CVE-2024-2676,0,0,909464e30d2c10e8a9af079a102bd07a257c9534a32f512f1c3ed8618aa3e4c5,2025-02-21T16:06:24.990000
CVE-2024-26760,0,0,0518c5037cf3afe5f4eb3cf2eb8918e02d9d0470eb95c405ebf760a9dc0b1639,2024-11-21T09:03:00.647000
CVE-2024-26760,0,1,309039c98c771463a89da74c13e437fec948305bc99ab63970666c4f90f70dd1,2025-03-03T17:33:19.643000
CVE-2024-26761,0,0,aa1a20a0803d63a54b19e75f2a8a8f8bec9c12a955e5a2a8d3004b5d801f81f9,2024-11-21T09:03:00.763000
CVE-2024-26762,0,0,a287f1e9fd29a626fe10dbe6954ee97461b04e8a4deb899f82974d34c52e8f61,2024-11-21T09:03:00.880000
CVE-2024-26763,0,0,ea60cb10ec181dc23fe842240e1437c7c10aef932cbc953d9703f81ca6ffe278,2024-11-21T09:03:00.980000
@ -254537,7 +254538,7 @@ CVE-2024-27855,0,0,7b61a08acfa4129bbd09ca95b2fbbadadedd2683e38c872f9104fbd486556
CVE-2024-27856,0,0,09c5bb73b814d1144196c9ecf929f00cb814093cdfced3c6adadc63f100b4422,2025-01-16T15:15:13.100000
CVE-2024-27857,0,0,50c74cada9fa0a92498be7b0ed6d9257c0a8cdcb5b5d97a471df147f46938208,2024-11-21T09:05:17.540000
CVE-2024-27858,0,0,aa4ac34917fc25a3b363315db7cb3fffd219145d245e40c2d78d17a7bcb483bf,2024-09-23T19:56:28.840000
CVE-2024-27859,0,0,d996415f36df124c2055edc36c95ac8a19b6cfff8d3ca6929250ae8cf8d6847f,2025-02-18T19:15:15.473000
CVE-2024-27859,0,1,a7656a9ee29e09d9d6dd0ed0138e7403302c55b95156638f98095c6c05798bbf,2025-03-03T16:52:20.953000
CVE-2024-2786,0,0,fdc7011c4f0b705afb5fcd1f3a67915269e31c824586b5ff624ca764a8b78249,2025-01-07T18:17:10.187000
CVE-2024-27860,0,0,573c398bb03b5382369ac69cc1d55fcdcd51ef33a018d7ec6bcd579bee759306,2024-09-23T19:10:07.350000
CVE-2024-27861,0,0,44687bbf9414155e406d842a229f671ff45e5709268fc42f7e0846677b06e6c3,2024-10-10T13:13:53.450000
@ -256070,7 +256071,7 @@ CVE-2024-30025,0,0,59211b3148d41d5f2d1591e205eaddafb7c2881bce7db47b5f2828dd1e258
CVE-2024-30027,0,0,2453006bce839a4dccec64751f1915bf46ab8c1dbcaac05cd82e943729c9e722,2025-01-08T15:47:32.647000
CVE-2024-30028,0,0,528f9a241d54b5d0a61f7ba5959930a7199b44f51e4af6dc146f70726a6a27fa,2025-01-08T15:47:42.203000
CVE-2024-30029,0,0,757a9f3dcd31128b99ad30ab6cae35772eeef937c04086ec4ffaf707096648d8,2025-01-08T15:47:58.657000
CVE-2024-3003,0,1,4673719ed7dbaaae6513df93f675de5ef775ef3cc5ec698ede839c4bfd9ca02a,2025-03-03T16:20:59.253000
CVE-2024-3003,0,0,4673719ed7dbaaae6513df93f675de5ef775ef3cc5ec698ede839c4bfd9ca02a,2025-03-03T16:20:59.253000
CVE-2024-30030,0,0,37892ecdf6da58f97d739e70f80226ffd9b0d5a5e8c59bb8905ab9b418310045,2025-01-28T17:15:23.673000
CVE-2024-30031,0,0,cecb1c1d6955264ff1c6dc402bee6c96f05874b073d3e4e550eca8ab24cf7001,2025-01-08T15:48:09.667000
CVE-2024-30032,0,0,e97bc9f469761134c288d43791e05d263ad5408925711e41e3a9b4a875aeedd4,2025-01-08T15:48:37.563000
@ -256081,7 +256082,7 @@ CVE-2024-30036,0,0,10f01c6391438dab4883c634ef797688fedda0a95a991404880cb2c671a1a
CVE-2024-30037,0,0,f2d401000dd9549b2f095203aa37be55cc4c90841f711ed62b7216ea20cd689f,2025-01-08T15:50:32.630000
CVE-2024-30038,0,0,27a4c29b38257f8bcafe88f8509a9aba246c05aefab003cf829c6073e1b87d25,2025-01-16T19:13:10.340000
CVE-2024-30039,0,0,a9047a1ee3770867bedf8729bda5c6e979affd5cf6d07e8365e2142e85ac3926,2025-01-28T17:15:23.990000
CVE-2024-3004,0,1,af43f34cb38820e9ef4be76ad7373071685c236a1a28cf654ccd60a7ccb631f7,2025-03-03T16:20:59.253000
CVE-2024-3004,0,0,af43f34cb38820e9ef4be76ad7373071685c236a1a28cf654ccd60a7ccb631f7,2025-03-03T16:20:59.253000
CVE-2024-30040,0,0,0232720eb813240f57e5570e979939c07517f0db0e7772853aceeee8dbf63044,2025-02-24T15:50:23.420000
CVE-2024-30041,0,0,f9c10cbe19f35b717577bc6764f2546acc1215ed22680df6006f57d9c2099fde,2025-01-08T19:13:10.127000
CVE-2024-30042,0,0,9544f834a0b92a843308b4d5510959960649fdfd12e3981ba713ba27b676a4c4,2025-01-08T18:59:45.373000
@ -265075,8 +265076,8 @@ CVE-2024-41766,0,0,27a514791788a4bf30eb4a3bf81b83642a6793378dce75a5c9d762909251c
CVE-2024-41767,0,0,e172d29e714c5abc78a0eb3060db7132aed0e0deb2dd067ea8983ade3a6ffcf1,2025-01-04T15:15:06.987000
CVE-2024-41768,0,0,62950a30cb25f26fc31df7352fdd7c6931a582431a6a1cb92e67af8ad7943776,2025-01-04T15:15:07.127000
CVE-2024-4177,0,0,b19cea7dfc04a16711a952f111997ccebc4378d3e2d6a3d68b2d48d03a2529dc,2024-11-21T09:42:20.397000
CVE-2024-41770,1,1,af8a886b555c6a520ba25f6bf61218f4cb3f859af10142a2a3841edd1e529c7e,2025-03-03T16:15:37.853000
CVE-2024-41771,1,1,b82be72730ebeb6316d41392cf7933a0d584cb83a8a72b1028fe8580d7640d85,2025-03-03T16:15:38.007000
CVE-2024-41770,0,0,af8a886b555c6a520ba25f6bf61218f4cb3f859af10142a2a3841edd1e529c7e,2025-03-03T16:15:37.853000
CVE-2024-41771,0,0,b82be72730ebeb6316d41392cf7933a0d584cb83a8a72b1028fe8580d7640d85,2025-03-03T16:15:38.007000
CVE-2024-41773,0,0,beaf4d8c312e85e3696081a024d02001bdac13d0a849a736ca19b73511b0958b,2024-08-26T18:33:07.997000
CVE-2024-41774,0,0,db82f7998f610ab2c3c2ae4d9e33bcab8463b004f8921670f73f55120becfa11,2024-08-24T11:15:05.670000
CVE-2024-41775,0,0,e5a5c3f0c9c2d797037bc42d58511f5d720ca3c68c1710b74d20237b76b1bbd9,2024-12-11T03:25:45.430000
@ -266173,7 +266174,7 @@ CVE-2024-43164,0,0,af1cf52e9e5daf0524d227ca91881ef1661a1e31cfb7baa9b781d652d8651
CVE-2024-43165,0,0,d6b26bb563a0e6badcd424e8717f3eee2117ad61bb0aaa9e33b8f5d6bf543f4c,2024-08-13T12:58:25.437000
CVE-2024-43167,0,0,1f0299dd298e58ae7d0320a556b5cc8080d25729e8c4fc9c4051248a2f05ca8c,2024-11-21T09:35:06.587000
CVE-2024-43168,0,0,a00133049ed1a922ca0a7599f98603d24e2d8039ab92bf6ffa7a406368253241,2024-10-21T12:15:04.327000
CVE-2024-43169,1,1,352e656ad4f035f7b427be36366f55e8b13d480e407d80a8f1b98141bc5da940,2025-03-03T16:15:38.157000
CVE-2024-43169,0,0,352e656ad4f035f7b427be36366f55e8b13d480e407d80a8f1b98141bc5da940,2025-03-03T16:15:38.157000
CVE-2024-4317,0,0,db0abb41f20407d83ae6da5ad6bf273d95c1b6dc6d76af61523cb7222e98db9f,2025-02-12T16:17:31.043000
CVE-2024-43173,0,0,d8d2ac885c1902e546063772016f5d0005860b114ffe9d7489140ac6cd8bfc67,2024-10-25T15:40:19.977000
CVE-2024-43176,0,0,67ef639d68302e5458cf789165bf8b534cafee061131b6437c0c7535ddbce0f4,2025-01-09T15:15:15.737000
@ -268196,10 +268197,12 @@ CVE-2024-45774,0,0,4d2c75ba8338553ee4a278a85581b6e2db4424169927a3758eac6b06d727b
CVE-2024-45775,0,0,5e285262d1706cab5ca05a7725649dadf6185a7492d72f859f11f2cece394355,2025-02-18T20:15:19.177000
CVE-2024-45776,0,0,6ff331300b63b0445c4a33993b39c621dc4140ea58408c74e411ebee541079c0,2025-02-18T20:15:19.313000
CVE-2024-45777,0,0,381f048bca6c71d068d001bd4e22e7b202a5aa1ffd4c67366bc2225f24d010f7,2025-02-19T18:15:23.210000
CVE-2024-45779,1,1,bdf659b838ab3fb43a4f002f915b6f26c371435eee6685b792b16de994082a9e,2025-03-03T15:15:14.660000
CVE-2024-45778,1,1,4a788605efb9b4cb4a9d6b761519c855051768041e43218264b80f4c5b038d32,2025-03-03T17:15:12.700000
CVE-2024-45779,0,0,bdf659b838ab3fb43a4f002f915b6f26c371435eee6685b792b16de994082a9e,2025-03-03T15:15:14.660000
CVE-2024-4578,0,0,bdbd727086f88b7c6dce9bba415908bda128d8ea217ac43f45c5788929d872c3,2024-11-21T09:43:08.790000
CVE-2024-45780,1,1,138a44b3c391eb0986ad2082a3b1151b909667827c1949031faf9513029b99f1,2025-03-03T15:15:14.950000
CVE-2024-45780,0,0,138a44b3c391eb0986ad2082a3b1151b909667827c1949031faf9513029b99f1,2025-03-03T15:15:14.950000
CVE-2024-45781,0,0,133ac0cb92299a7df10b4b06b4cea79c7c1972b417bc5974d3666a0db7bf0b58,2025-02-24T19:15:14.423000
CVE-2024-45782,1,1,9a6d58c808594661629c2038d537df1d03a760fc3efa15bba0bd203537e988b6,2025-03-03T17:15:12.900000
CVE-2024-45783,0,0,26ae80ac76949a820b287a710d857e419cd80f84fb3ed37275ecee208bfb63de,2025-02-18T20:15:19.560000
CVE-2024-45784,0,0,3048a1cb0fccc9c661b7edc8375d75b46aaf139acaa67371a0b13f350fb0ec33,2024-11-21T09:38:05.210000
CVE-2024-45785,0,0,fd50e853f09ab6c2230e086d2435c3cb1d80eb0fdb3f5f2bda7ceb6deffb7b10,2024-11-06T17:08:40.507000
@ -271641,7 +271644,7 @@ CVE-2024-50476,0,0,35748ba4306c4240aef0107ccb81a7afc297d782a8a366836b7f46e83a5cd
CVE-2024-50477,0,0,30b542ca3c23213ee012ae6b20ea099ce0e58e93e7a3ceb961529dd7319062c0,2024-10-31T00:24:28.160000
CVE-2024-50478,0,0,c6e943c6420c3f5a389145933c0c4dfb9fcb100e73f4e688b0d5bc9895280483,2024-10-31T01:44:47.407000
CVE-2024-50479,0,0,83213c1cbe1c808ca9abcf9be6166c74770ee338364b15f7cadb07ba2e041af4,2024-10-31T13:02:20.793000
CVE-2024-5048,0,1,265e0e2c79f135ea01b40d803e3730f9ea5ffbf96881c97c4387f71d50fc0cfa,2025-03-03T16:25:24.627000
CVE-2024-5048,0,0,265e0e2c79f135ea01b40d803e3730f9ea5ffbf96881c97c4387f71d50fc0cfa,2025-03-03T16:25:24.627000
CVE-2024-50480,0,0,c394acde8bd643a056b7572b138b020eb004b0c9c953a2494c2b6863f87f6132,2024-10-29T14:34:04.427000
CVE-2024-50481,0,0,b6d00daa5f8961a65f932692fff07056f855c2a0de3457ab8639f1aabd27024d,2024-10-29T14:34:04.427000
CVE-2024-50482,0,0,093771549c5fece2d89ef85592fe40f6590e8d360be1b306b38d905240229a77,2024-10-29T14:34:04.427000
@ -271784,11 +271787,11 @@ CVE-2024-50633,0,0,8447ae8fa0b4e5a5b6295a68bdf62cfe1ea1f8940cf2403607b397d2eabaa
CVE-2024-50634,0,0,75c75741b4ff07a7223817b405561d2122b2e965df2d36431c234973c9416179,2024-11-14T20:40:43.690000
CVE-2024-50636,0,0,35ef03dd8175dba345c3fb32a6b071a45c850c144fdf90f5aef46a21c35cb9c9,2024-11-19T19:35:14.833000
CVE-2024-50637,0,0,d977347a448c3f65e92048b639a2e3e6ff98b542be1611660d9dca9c5510503b,2024-11-07T14:15:16.780000
CVE-2024-5064,0,1,91d2ad00b9fb6d6b6f91370daf04e64eab273b7f9f9382620f78e682b7135991,2025-03-03T16:11:16.720000
CVE-2024-5064,0,0,91d2ad00b9fb6d6b6f91370daf04e64eab273b7f9f9382620f78e682b7135991,2025-03-03T16:11:16.720000
CVE-2024-50647,0,0,a8132e40e6415680c63502dcfb71c83170a27c8ae17ae2d8709790d4ecaf5c60,2024-12-03T17:15:11.193000
CVE-2024-50648,0,0,cd768dd502a6a41a750f72e8678d74f0fdb7ca88354fa77c670060f1a5a3d16d,2024-12-03T17:15:11.357000
CVE-2024-50649,0,0,75af684ee5c50b16f619d7bbac2db41b70d6b9041e53190a772eac935e0bd425,2024-12-03T17:15:11.520000
CVE-2024-5065,0,1,45949c8a72612bb25fb94f4af84a4c03ee696dabef3f10ded89a1a6800bed143,2025-03-03T16:11:16.720000
CVE-2024-5065,0,0,45949c8a72612bb25fb94f4af84a4c03ee696dabef3f10ded89a1a6800bed143,2025-03-03T16:11:16.720000
CVE-2024-50650,0,0,51e56b1d34ec223623aa5ce32045a557a25d3bd1c5a91fb1d138ae1327c6b06e,2024-12-03T17:15:11.683000
CVE-2024-50651,0,0,011c4281624dacbc96bb39ed41c7067acfaaf24f648047c3bd252399725a9be8,2024-11-27T21:15:07.573000
CVE-2024-50652,0,0,2f965c69b573d9e115cdae86c6768d0ed1bea347974fb0bbbfc5caeeb795e4e9,2024-11-22T00:00:27.760000
@ -271799,7 +271802,7 @@ CVE-2024-50656,0,0,e53c92dd40aeb79d431b51fb04bac1f16260e97b7e3acd3a14cd582afd780
CVE-2024-50657,0,0,30b2eb884e7e45c72e97be70bee207473abaa297a2a95565537ba3cd89d0a4dd,2024-11-27T17:15:12.323000
CVE-2024-50658,0,0,dc74515f499285ca9589c261009f1434e39f4df3c1feba74e29bae75532d2d18,2025-01-08T16:15:34.413000
CVE-2024-50659,0,0,070d9cee09db7fd442130a440bc492ee33550ec72e00250b2d953adb8bd85a17,2025-01-08T16:15:34.597000
CVE-2024-5066,0,1,c5197e9076a09a4f7e41d09d6e85802f85b56930d19599de015bc424c394fb95,2025-03-03T16:11:16.720000
CVE-2024-5066,0,0,c5197e9076a09a4f7e41d09d6e85802f85b56930d19599de015bc424c394fb95,2025-03-03T16:11:16.720000
CVE-2024-50660,0,0,f71f8e7c2fcb36b53cf871d625509d1de985a324b433af36346565606f116252,2025-01-08T16:15:34.817000
CVE-2024-50664,0,0,002d5b0430aa7459420dc0956bb490c4f154a70576e6a288cb3d4c29b0b5a9fe,2025-02-11T20:57:42.027000
CVE-2024-50665,0,0,ed17c9d088b29ba5a0894119bb80fb3febe70d5b2746ba98271e86eea823596b,2025-02-11T20:51:48.500000
@ -271996,6 +271999,7 @@ CVE-2024-51075,0,0,24a9c25e3ffc707f200389e741ea19b266840c341bd7e1a60e2cb6faa61d8
CVE-2024-51076,0,0,e5e3ed6e47651290142238cae400834ab55b60425e57165275989efcabaab333,2024-11-04T13:41:48.267000
CVE-2024-5108,0,0,2dbe7b73a30a679e8187fbb42897811cbeb8e5e0df154c40c12811a3dfea6c02,2025-02-21T21:14:08.303000
CVE-2024-5109,0,0,71e4e0c4bca00ee29a2fa080f7e148d6d2b101e79a10d5714f213d96eed611a1,2025-02-21T20:22:51.190000
CVE-2024-51091,1,1,7e3be999d132c421726433ace9a407b1f700c09d94767f9fdddb3b85c60ce5ff,2025-03-03T18:15:29.523000
CVE-2024-51093,0,0,a6898e879de35c8cf2e460ec5a84ae7f0123df10aa875737ef5d0e250287c851,2024-11-21T18:15:11.043000
CVE-2024-51094,0,0,9c0a3563e2cbfb0f7e4111937c25ede7da4801ccd5cc0469207158910b8a9299,2024-11-19T17:35:14.493000
CVE-2024-5110,0,0,6a4943fa22d3a4c423b7bacab486aa156591a7b82c2720ae65bc973c202b558e,2025-02-21T20:12:32.623000
@ -273616,7 +273620,10 @@ CVE-2024-53376,0,0,8911dbfc8997baa2a57cf32f34b4dcc9a56903a67bd0c4ffc9a41950a9065
CVE-2024-53379,0,0,2b6df428322956cd20e5c553031d5487355c33ab4cabbe810e5c3a60725bbc7b,2025-02-27T19:15:48.927000
CVE-2024-5338,0,0,2afe684191c73468eff383b7ca370b5770f74a1aec9a85ac89128ddd56eac957,2024-11-21T09:47:26.997000
CVE-2024-53382,0,0,bc22c0f67f340c82703587339ab10b2cf8a3692c3e7d029c8d913b364828432f,2025-03-03T07:15:33.397000
CVE-2024-53384,1,1,e63525e28645ffd574e4bc5c37cec43657018cac2aeb992a27d57ce5edd4d535,2025-03-03T18:15:29.670000
CVE-2024-53386,0,0,8bb56eeec23e0a18d63c27f203ebccf2a4947e5af96ad0f07d167c04fae16fdb,2025-03-03T07:15:34.560000
CVE-2024-53387,1,1,609df7ae497cedd9f156e2ec60775eff9e6d887f421bbcb389ceb26e5ac9aac5,2025-03-03T17:15:13.050000
CVE-2024-53388,1,1,8d3e08409f54a376783ce329de4e860405860aa5f0436b7497252430669d8c0e,2025-03-03T17:15:13.167000
CVE-2024-5339,0,0,0d824fdd75ea0024ca1d8121d180fa88d48321696b6a589d7b7ff1cb4a42c3e7,2024-11-21T09:47:27.133000
CVE-2024-5340,0,0,ee38ec7c3eb1b237a6f1222e4c2d09975ad3132aecab39c527a9d8e3693c02d9,2024-11-21T09:47:27.263000
CVE-2024-53407,0,0,028a3e4d14bfc90eea9cc0c6159117f08c823fe19cf4dd25d6c1d6ae5f9691c6,2025-01-31T21:15:10.213000
@ -274498,7 +274505,7 @@ CVE-2024-5462,0,0,d4f147823b82222903b9d9bf51249493cafff25daa3597a42629662406d9f6
CVE-2024-5463,0,0,357d166209285de4e8f9b5c7c2d63d7eb415952b3a9d1476d831eb91162afaf7,2024-11-21T09:47:43.833000
CVE-2024-5464,0,0,255f781a5f94f0faf95d7c73d6b2015838426915e8e0274a4b6257e37377ce5d,2024-11-21T09:47:43.990000
CVE-2024-5465,0,0,d854caa252ac359088449fa3628f1e50a198f1dced6d951af90835f292847339,2024-11-21T09:47:44.140000
CVE-2024-54658,0,0,1d3c392f8d61d57257ee80e192f6232396a2ef2df3ef7808f2004f246352763a,2025-02-18T19:15:18.857000
CVE-2024-54658,0,1,c51d7b235a06e000d006cb570ad201153e6a0063880f45bf4be65fb7411135b5,2025-03-03T16:52:20.953000
CVE-2024-5466,0,0,bd8eca91ebf8acc552049523b9652cf94021fa13aaf76627ede5f76950f6758d,2024-12-19T20:21:12.243000
CVE-2024-54660,0,0,8ecb328311227df4f4ba808c9aa5038fb826cdcbe9b14662d633f31264e20c88,2025-02-03T21:15:13.873000
CVE-2024-54661,0,0,13e4cca9a8df33a1723e5327d2d34e809c611fe62aeebc75663d0c80abb5d0eb,2025-01-07T01:15:06.913000
@ -274608,7 +274615,7 @@ CVE-2024-5494,0,0,01220fe18988d81f50a7497aa6ab19647b6ffe5fd178defdb09fee026bb9cf
CVE-2024-5495,0,0,5042268a950e30bd3019e8943c12e21fd198069753506c20c0160553a125c76e,2024-12-26T16:42:57.383000
CVE-2024-54951,0,0,5d19b9002b3d609d782a9b71d0927437769cc7cbd3c6535e97fd8da5cd4a41ad,2025-02-14T16:15:34.060000
CVE-2024-54954,0,0,c5f7bba0f482724c8baeb34ff731ef8127c621f5f601d09231830cf72a39e47f,2025-02-26T19:15:22.440000
CVE-2024-54957,0,1,d0c111cc2d7d3d0df4e7a6c0b95859d88d8d979df525778250dc512805cb8aed,2025-03-03T16:15:38.450000
CVE-2024-54957,0,0,d0c111cc2d7d3d0df4e7a6c0b95859d88d8d979df525778250dc512805cb8aed,2025-03-03T16:15:38.450000
CVE-2024-54958,0,0,69980aeea30a2a881a4d3d60af27dc56a66e90cd80d98f68c95b14c20a9676de,2025-02-21T22:15:12.440000
CVE-2024-54959,0,0,9f0a686e6ecddb708d340473cce33ce83c57a259a6f56d0e5117df6a2fd44baa,2025-02-21T22:15:12.593000
CVE-2024-5496,0,0,9136fd74dd5c910c46896c769e58528b87587fcd9bbfc0ee678598fdc16fe0a5,2024-12-26T16:43:17.607000
@ -274665,7 +274672,7 @@ CVE-2024-5515,0,0,55e8a346ed4b5156add8d5d4764b4fcbbcd3f128ffe8273b81d6c93a5192c8
CVE-2024-55156,0,0,047a3c5a6f209e8eb9fb8475b27346fa1fbc5a9a2b9777c641dd68bdd26e4778,2025-02-21T18:15:18.540000
CVE-2024-55159,0,0,4a0a9cc5fc22fa8488e14d07795095f6dbe86f6d6a4bb90e1244dfeccc3a07d6,2025-02-21T18:15:18.707000
CVE-2024-5516,0,0,e06cf16e59a4c312854169722f307c5b1c3df8696d5f2dcd2a942cae721ba3e7,2025-02-11T15:12:30.713000
CVE-2024-55160,0,1,11a0bf9e53badcc10e04b61dc64f019be635a5fab9b8ca8d85bb5bc4a7d74844,2025-03-03T16:15:38.617000
CVE-2024-55160,0,0,11a0bf9e53badcc10e04b61dc64f019be635a5fab9b8ca8d85bb5bc4a7d74844,2025-03-03T16:15:38.617000
CVE-2024-5517,0,0,aeac710ef90dc4db283f0d86d7fc3c11ec410a5f07233ec58c2840a5440c4d3f,2025-02-11T15:11:46.037000
CVE-2024-5518,0,0,592daa13d5f40c4bec892c0e751c69d9592d967bcef9d52a8eeab5abfab02e78,2025-02-11T15:10:47.877000
CVE-2024-55186,0,0,80cbe31f0c6c827f9fe1ea965ee9f035483ef81bd6d62228d42baa84cd806d8a,2024-12-20T21:15:08.850000
@ -274763,7 +274770,7 @@ CVE-2024-55517,0,0,3c8c33e9f0396a101831f3e5ff6c0b4973f6bbd431af52c58783b2edaa611
CVE-2024-5552,0,0,779c8b119b5a7bc042c6e25c9be4959c8015ea49092434c017d15512182ef4be,2024-11-21T09:47:54.927000
CVE-2024-55529,0,0,1d23a6190ed20d6e071a25112ca50d5aa9ed1f469e0055848697711ea503dd18,2025-01-06T20:15:39.163000
CVE-2024-5553,0,0,cbe2ddf67f45d187893926fbbdd2baf5f4f4aaeda85e24ec6fe6e5dc2690683a,2025-01-15T17:29:08.167000
CVE-2024-55532,1,1,b95dd06756876774d7ad807bf9789c0c3d8d5e494ac0cd2e75361eb9170639e2,2025-03-03T16:15:38.777000
CVE-2024-55532,0,1,6019b1ad578f2bed61169992a977212f42c83f99040b7f33db42bada10e85f78,2025-03-03T18:15:29.797000
CVE-2024-55538,0,0,67bd56020d7a76419d848694822e6e545c69b0a5adc3b05464d4d5160a8064ea,2025-01-02T15:15:23.933000
CVE-2024-55539,0,0,f458db4a5ff47752a8a05ab76298a754be66b6f65eac9c3cadabf0854aa3f5af,2025-01-09T17:15:16.057000
CVE-2024-5554,0,0,3fb8d13bac6e351fa1470fa96b8178263946ef86d2aae872feb00193d95f3ac4,2024-11-21T09:47:55.160000
@ -274790,7 +274797,7 @@ CVE-2024-55564,0,0,0ed737f325f7d691c0861d9b182294d3bfcbaeec43b5fc3c9c74a4f890349
CVE-2024-55565,0,0,41a9edd709fcc5c920649312806312f16fb139e829113bdded78cdd6366005ad,2024-12-12T19:15:13.670000
CVE-2024-55566,0,0,498f1e4e837f8ad9758e1df3de86aaaf6f7c709a5bad66d4383c3066d4682f26,2024-12-17T21:15:08.777000
CVE-2024-5557,0,0,44dff462a78b58967ede2ecdaa2532229f4e94d50ecd88f40009666b113c3dd3,2024-11-21T09:47:55.560000
CVE-2024-55570,1,1,6e9d2e652c470456ab2e828a585ea715db809dd2e7d02ec6fe542ca24100e541,2025-03-03T16:15:38.900000
CVE-2024-55570,0,0,6e9d2e652c470456ab2e828a585ea715db809dd2e7d02ec6fe542ca24100e541,2025-03-03T16:15:38.900000
CVE-2024-55573,0,0,87c1d76df18d7da2938a148b25d87e75b4595eedc061d29382f7b68f19851cf6,2025-01-24T19:15:12.923000
CVE-2024-55577,0,0,eb6e58a9376d2712c57299b02d380d0ccd71fcb052d16b54f861ce85709558e3,2025-01-15T06:15:16.740000
CVE-2024-55578,0,0,5c3fcc77d09324042ddbdfd728ad5e7386e7d5896fd6497db19ee19fc8c81ce3,2024-12-12T18:15:27.533000
@ -275790,9 +275797,10 @@ CVE-2024-57226,0,0,13241ab5fcad4d8797ceadffb98a698582b96500669617b3e0cb2d147cf0e
CVE-2024-57227,0,0,647d380c097e46d112c6c1fffa7a24d381c637a1d42abe27695321f81f5a0211,2025-01-16T18:15:25.373000
CVE-2024-57228,0,0,2b2ede4eee89a9d230ac4fe6f1506a12a678e5912df7ff0d6e847af20a26c5cd,2025-01-16T18:15:25.703000
CVE-2024-5723,0,0,e9a9bfbb365da81a3cbb0381b41b1530e9a21124d15e20f7ac8fec3dc25c5b02,2024-11-26T02:16:48.200000
CVE-2024-57237,0,0,10a0a055ff6114ab5c31b296696f6a71ea30e20eb63b78fcf8047450271df36f,2025-02-12T20:15:35.483000
CVE-2024-57237,0,1,fef0cbf59beef0bbb0800c060e5efd45e878e97a99de79a05a81bee9e443498e,2025-03-03T18:15:29.913000
CVE-2024-57238,0,0,a6b3be788c3bc4fc051e3d4d8b4703fb53567dec95099f9b84b95f6aa023a077,2025-02-12T20:15:35.620000
CVE-2024-5724,0,0,3819aa5efba8f524b2e05daa0542d560ece04ca1ec3f26079bc1135d63d2a09c,2024-11-21T09:48:13.843000
CVE-2024-57240,1,1,72eff3f38096ef7320505323de413dfbe06e6971e701418633b96c9d22b36f06,2025-03-03T17:15:13.320000
CVE-2024-57241,0,0,8994dec25d800da5e0c31df7a39443f7369494e97fd5d505a6f1c683c830876d,2025-02-18T14:15:28.237000
CVE-2024-57248,0,0,fb61bd5f2cf829e3e9949d68a4efd231804cc252fcca96074ac9da52c6e827ed,2025-02-10T18:15:32.563000
CVE-2024-57249,0,0,8fcbb1cd0dac9099c77da0f7019c7d58aadbbe52552dc9898297ef492ac8f84f,2025-02-11T16:15:48.463000
@ -276089,7 +276097,7 @@ CVE-2024-57843,0,0,a291eea3f115dccf31a54bfbd28c6238356a52daec4febc3cf5227594411c
CVE-2024-57844,0,0,ba7a9af927cdccfb32d77efd3b08b23135ba420a4b94376a9ac04ef40ed20ba5,2025-01-15T13:15:12.277000
CVE-2024-57849,0,0,6c1a4f1831f5a2a9c9af19f1c5a93dad2a70d3fd672b039b5a9c54549819e120,2025-01-11T15:15:07.290000
CVE-2024-5785,0,0,0e9b551c455c61638ce3e7d2f5874ca2c1cf14d589c0a4025501beedb178de88,2024-11-21T09:48:19.780000
CVE-2024-57850,0,0,935491ba0e108e2b11a2a3b56ec1f62ee68c5d85a897dac1eb824251deb5adc6,2025-01-11T15:15:07.423000
CVE-2024-57850,0,1,2124fa4258eb8c3a063b5b749880114208033ff71b7e7d5f4ee7e623334505c3,2025-03-03T17:42:59.740000
CVE-2024-57852,0,0,cbbd46a7ddf6f86a683d1d4e04a80ddf6950679f6a40ec3d30c4ce0030834f86,2025-02-27T03:15:10.977000
CVE-2024-57857,0,0,3f0cabf5d6ee223bacca9cfe8ea4c67c059ddcf7e3b9854317117b67ecec7803,2025-02-13T14:16:17.620000
CVE-2024-5786,0,0,8f234ab6daf42312db402cec6a9780e6a0a03ed9070824749daf6f62affc4884,2024-11-21T09:48:19.897000
@ -277052,7 +277060,7 @@ CVE-2024-6649,0,0,ef74f40b31322d5b329007bed5c92f233ef3833094d9e1d8063e53644fd1f1
CVE-2024-6650,0,0,191a90b8e59766bb211098cdcde45ac010c3596b1d57e656d1836d4979422916,2024-11-21T09:50:04.373000
CVE-2024-6651,0,0,a4781e28925027a5ab244f480cd88bd079c01f30be1e8b73b56732969688d923,2024-08-06T16:30:24.547000
CVE-2024-6652,0,0,5652218e66653b40cb1f1758003b60ec7838cc9f220048781065b3fa7a0c3a50,2024-11-21T09:50:04.710000
CVE-2024-6653,0,1,4108167d12666de6c39e5a237e3145b9962ab760426ea3cb98ff3f68cf88be0a,2025-03-03T16:25:24.627000
CVE-2024-6653,0,0,4108167d12666de6c39e5a237e3145b9962ab760426ea3cb98ff3f68cf88be0a,2025-03-03T16:25:24.627000
CVE-2024-6654,0,0,f805b0729a3c46b8be827fad378328d1ed2614783c392da30990213f3c0be59b,2024-10-09T09:15:06.713000
CVE-2024-6655,0,0,cd84fc0b2c91b2bd9ab26bb80467662001cb12ff5fa86634c3654ff0dea4aaa7,2024-11-21T09:50:05.080000
CVE-2024-6656,0,0,dd8d93127fb59afa87e8332076ccbf05d54c72d83e0b40e7ed5f4d6dde708cff,2024-09-19T13:05:44.953000
@ -278448,8 +278456,8 @@ CVE-2024-8256,0,0,1611701250ae3ec61529b0da09cb8680607654a2f70f8e904e5974c82b4cf9
CVE-2024-8258,0,0,f110e480f74f3d8ee9f2f16ea989eb0ea229b8f21015ec0d3b5c01c8038eabd1,2024-09-27T18:56:41.140000
CVE-2024-8259,0,0,7bf4352426e14b796c98c3dff8a9f93d11f407925658b449d6ea8fe3ebd0f96f,2024-12-13T08:15:05.017000
CVE-2024-8260,0,0,1a5d0d9640e33b2f7c9f22aba5e11715bf32bcc340f2c05d167a5a396b68ca4a,2024-09-19T16:08:58.863000
CVE-2024-8261,1,1,b26e3650b4e8c808c79ab42633b4cd9f746eabe974630e56d567d421bcda9b41,2025-03-03T15:15:15.820000
CVE-2024-8262,1,1,1b71717d43cc8abe3c9b92de4653872f506de8ba7069bdf5958b8e5371b45b63,2025-03-03T15:15:15.990000
CVE-2024-8261,0,0,b26e3650b4e8c808c79ab42633b4cd9f746eabe974630e56d567d421bcda9b41,2025-03-03T15:15:15.820000
CVE-2024-8262,0,0,1b71717d43cc8abe3c9b92de4653872f506de8ba7069bdf5958b8e5371b45b63,2025-03-03T15:15:15.990000
CVE-2024-8263,0,0,c30b2614165b38dd1e79b54ad73ee801cd690dec6dfd531970fbb0c695a6b519,2024-09-30T15:57:26.213000
CVE-2024-8264,0,0,2d0f7550734ab3870107734db176c89529f357d12409e5b5d0288029aba420c5,2024-10-17T14:06:39.420000
CVE-2024-8266,0,0,7f51b02f290727aff51f7eadea155b5c0e5946c8babbbc1d8d023ac984ce4386,2025-02-13T01:15:25.137000
@ -278717,7 +278725,7 @@ CVE-2024-8569,0,0,e97f1837802a26c97b97aa0e5330fc2cda35846d2f426d40c1d861d2d513b9
CVE-2024-8570,0,0,35b004950db01bf28159cb7562e5ce8a51db620d19280577ea1dff40ca8f76f7,2024-09-11T16:07:35.400000
CVE-2024-8571,0,0,1e61ea796a1987f060c2d849f110956dcbfd97021bdf692350e4c9831bfba6d6,2024-09-11T16:05:34.220000
CVE-2024-8572,0,0,ba2ce6b4842387485ee0a2063de1f3423e42b59cebebf6b097f5d687c17fe8d1,2024-09-11T15:59:57.040000
CVE-2024-8573,0,0,e3e20c0aa48aa54903584f35c1f847647f2c243a94f357c571ca62f77bbf3a53,2024-09-10T12:08:12.567000
CVE-2024-8573,0,1,894a5b427b38e831f14a7134a58b8f62a81e7a22bb045350cfb1ce13c10526ba,2025-03-03T18:15:30.130000
CVE-2024-8574,0,0,d7b0fe8fe3e454e505d204504797e0e3f51e0262f52a926511d015f1e298d997,2024-09-09T18:47:10.577000
CVE-2024-8575,0,0,a9e0ba0af3a9f75cd3a1edb61c57e2962260db405f2e6724b3d20d42ab7c9dd5,2024-09-09T18:47:45.917000
CVE-2024-8576,0,0,ae3f5c3aa8cd29a1fa14f12648e69e0abf3801c51cf750a3cbc28d96f60cd229,2024-09-09T18:59:57.423000
@ -280044,6 +280052,11 @@ CVE-2025-0246,0,0,c39f5bdf37092ddacf9510ed2d75cd9204291d6d9bc9dd6c5bd8168e56e080
CVE-2025-0247,0,0,0125f498ef227ebc436135b5d9339a763bd05ec1f3a6e4d4fb60e8d0a9524607,2025-01-14T17:15:20.547000
CVE-2025-0282,0,0,193a86684d492a70f8035af4d9672f451f74d0f498147e63c150db661e49e756,2025-02-20T23:15:11.950000
CVE-2025-0283,0,0,170559952a9515dd5478b031ee87167014dac9ea49e5e0d222b13defbaf7dddd,2025-01-14T15:58:55.813000
CVE-2025-0285,1,1,bd76a73d88fc72bc10ed44c3117c45016b96684dc519171e4420c8e33e931fd6,2025-03-03T17:15:13.430000
CVE-2025-0286,1,1,c4ec72a9554ec8a756e5843089b16cd508ff7c50c18456a0f96863f5d96c876a,2025-03-03T17:15:13.537000
CVE-2025-0287,1,1,117ed428bdf1b61729c7fbe349ae65f5f01b243205b22e9b333952ed68d2afc1,2025-03-03T17:15:13.710000
CVE-2025-0288,1,1,a9d3af508f26bc1a8c7748a2db86a46548a895db1c48b9ff7e76f56239bc4552,2025-03-03T17:15:13.823000
CVE-2025-0289,1,1,8d7c88a592ed289173b4a13ae98054285b63c7fbb44bee84e192a3dffe5fdd54,2025-03-03T17:15:13.943000
CVE-2025-0290,0,0,1b0af77f22124c7fd21050a24684089c59772f145263e66a578112620b4a0b4d,2025-01-28T09:15:09.363000
CVE-2025-0291,0,0,c1c3893d4e09f9e0204fc40192dba70b3c3378a020c5622ef22757e5df4fb545,2025-02-11T15:16:03.447000
CVE-2025-0294,0,0,c9b2fc3087b74017273fe9485890135d0ff2bb52c4c2bc9ab42cdccd09c8f44c,2025-01-07T15:15:12.113000
@ -280073,7 +280086,7 @@ CVE-2025-0333,0,0,81e4cc439859af53c1b986765c85b9db6681ddfd15355f617bb0f4d13181d4
CVE-2025-0334,0,0,a2752894f0956fdde9f25172948b20b0ef85e697939129012141ceedb1b495bc,2025-01-09T06:15:15.610000
CVE-2025-0335,0,0,d5fa0c487675ca616e7ff135ad8a970ffdd4ae08b32ac07ee07443b3a83ed665,2025-02-26T18:25:29.120000
CVE-2025-0336,0,0,795ad1de1d64b863b23a9ee9f1f8e965a4f5ae1458793c278520d16970dab18d,2025-01-09T07:15:27.860000
CVE-2025-0339,0,1,56d80730bd4432f993e46d3759d1fe5c37d850c2923afcadbbf473db701d571e,2025-03-03T16:25:24.627000
CVE-2025-0339,0,0,56d80730bd4432f993e46d3759d1fe5c37d850c2923afcadbbf473db701d571e,2025-03-03T16:25:24.627000
CVE-2025-0340,0,0,d2643790c5408b8656f83d48122b2edd0443b492b102add5cec114f36ec3d251,2025-02-27T02:05:55.703000
CVE-2025-0341,0,0,0910c605cd873a48d6e147ef8e48f39c307a6f6230257069712b94ac115dd221,2025-01-09T08:15:30.060000
CVE-2025-0342,0,0,3dbfe8ec26cd89c8d358aa4179b87636b3a72d2e0b33768a4263c0b8cd9e88dc,2025-01-09T08:15:30.310000
@ -280105,7 +280118,7 @@ CVE-2025-0377,0,0,1df5153b8a72b25478d0a1c4aa2347b3a7ff1e86a04300cb39dc18c1f91a36
CVE-2025-0390,0,0,85e211229fc727d0a75c99e73a6347ac673debd4de873b613075df2a57d5f8e2,2025-01-11T08:15:26.527000
CVE-2025-0391,0,0,0467368bada2df94a15908d4f5a949241716a78292a611cf2ebdc384e88dff74,2025-01-11T09:15:05.937000
CVE-2025-0392,0,0,6d776f15a1615409f95c7590d77895411eaef103ad79522fbedabde2ae1bcf6e,2025-01-11T11:15:06.657000
CVE-2025-0393,0,0,22eedb82350171fa3c91a6ff1a85dbf34b74c615b75c2cb01768d2b6196b94bb,2025-01-14T09:15:21.263000
CVE-2025-0393,0,1,dfdff2773554c7857a88b27ef6038371e74a604c222de006f26f9dbe056025eb,2025-03-03T17:42:59.740000
CVE-2025-0394,0,0,8af05602da319139a083fa2a7a4d905dc508d9028abbcf98db5f09623dbab6ca,2025-01-14T09:15:21.430000
CVE-2025-0395,0,0,6c0480d65cb32616c80fd0c8d1f7a5f562f82dede6c8f4e1992556d40f947f0a,2025-02-28T13:15:26.860000
CVE-2025-0396,0,0,b1ad63be952ebb25b29036632d23a5d199acb4c2189238a997d4a9d9ed4a3a46,2025-01-12T12:15:17.963000
@ -280228,7 +280241,7 @@ CVE-2025-0542,0,0,6313331796a87cfd429c6887ebdeb1b0129ce5eba24c6840f8a5db7fe94154
CVE-2025-0543,0,0,eff0a1055b76d4ca2905d4fafa8d1e8eefdbdc8138e12e68c5bbcea714737ab9,2025-01-25T17:15:21.720000
CVE-2025-0545,0,0,63c3b9042492b87a07e49abf13646d4f678ce0fc03e014fc20736bc03bb30cd9,2025-02-24T14:15:10.910000
CVE-2025-0554,0,0,d63933ab2a1fc2c70aefeeec5806ddf95b1569c2ec4a93f64ef98e2e1c34bb43,2025-01-18T06:15:28.160000
CVE-2025-0555,1,1,13e96b4b6559b4859a1e09ee34d9bd76a96e1705c70a1bf7532ff1abe8c059c2,2025-03-03T16:15:39.227000
CVE-2025-0555,0,0,13e96b4b6559b4859a1e09ee34d9bd76a96e1705c70a1bf7532ff1abe8c059c2,2025-03-03T16:15:39.227000
CVE-2025-0556,0,0,2e939f9c46df46e943acd27c5231aa3ec1bc692b51067d4f0d8c17d23ee23f89,2025-02-20T20:41:40.723000
CVE-2025-0557,0,0,a4d2397bb9974138a91f8206bbe00f4a1c6824d0efb01426f3cbba3778440e81,2025-01-18T09:15:07.710000
CVE-2025-0558,0,0,7fd691444ae638db34f49f79deeccdce303e5d6667650549a03c453163c549f9,2025-01-18T13:15:20.417000
@ -280293,11 +280306,15 @@ CVE-2025-0665,0,0,32d62a31dda68c00a725e820e49c088e5a4c0cbb7a3a5fc704b21339eef4d9
CVE-2025-0674,0,0,6c39db7af62f37c0b44063680ba18af7d951adbde12586340e38d9aeb6048261,2025-02-07T00:15:27.017000
CVE-2025-0675,0,0,08dac668b15b1b323f36ad42590ad19042939b423a1bc201978135ab31be85b8,2025-02-07T00:15:28.030000
CVE-2025-0677,0,0,fc7fff60af52aedb8853b612fe5c7b8dfbe345cea75377cd46c5dc68fb745fa8,2025-02-19T19:15:15.280000
CVE-2025-0678,1,1,a8e7b0d9112e22450ddb31af5114d89ca1572100dfa70cec738acdfd0baf60e9,2025-03-03T17:15:14.053000
CVE-2025-0680,0,0,304211fa316d5ad912272d7e1c6d2fe276e0a8944295f89aa501df2029db6e97,2025-01-30T19:15:14.147000
CVE-2025-0681,0,0,7f6d6145ecf7ddf69724980071110b6e3798eda306effd9fc06d55b4146ea16b,2025-01-30T19:15:14.300000
CVE-2025-0682,0,0,82dc327006a11cf9eb8ed15c2db6bd7a0cc541bc0cc289fa88e6bc57635c989b,2025-01-25T06:15:28.740000
CVE-2025-0683,0,0,656748caff6fec701396e9f78e84e971ce5f7b02979f679e43ad5dbf6778d8d5,2025-01-31T18:15:37.750000
CVE-2025-0689,1,1,606a0d0cb1b5a9d976d1ff484b03dc425584d2fd14d18706666e718a5ed9ac1d,2025-03-03T15:15:16.147000
CVE-2025-0684,1,1,08cf09aadd4265d9f17fc91e7ffa365e4af4b017983ec1ff0167ffac235b59e4,2025-03-03T18:15:30.537000
CVE-2025-0685,1,1,36f03222d9846bb79813c677d1ef99c125061b51820965038a411e4d83039174,2025-03-03T18:15:30.733000
CVE-2025-0686,1,1,c1cd4659b63910dd911bbe910efe568d44b2d78dc5d45dcca3ca5f7d1cf3b4cc,2025-03-03T18:15:30.930000
CVE-2025-0689,0,0,606a0d0cb1b5a9d976d1ff484b03dc425584d2fd14d18706666e718a5ed9ac1d,2025-03-03T15:15:16.147000
CVE-2025-0690,0,0,09027ea6c3bed8670e162224b0d482e5f3ab1012b1f296c54e49592e0794bc03,2025-02-24T08:15:09.503000
CVE-2025-0692,0,0,3bbfd4bed044f796cd2d07e43de15285d842507b5abe7025f2d75e37bd86b43b,2025-02-19T22:15:23.433000
CVE-2025-0693,0,0,eb9b33dbce1f9879430fb8ae34fc689989eda5748b42d3c57f89b331c8c0f5eb,2025-01-23T22:15:15.397000
@ -280484,7 +280501,7 @@ CVE-2025-0997,0,0,d60982b4727f69c406a2b69a152e99650b0a7ac4a2979d7c180af9b049e9fe
CVE-2025-0998,0,0,b98f0b713604f6d6debd775ef9a03f9f9afc3c7e8c1e50ee3e2f779bfe4f4608,2025-02-19T15:15:16.563000
CVE-2025-0999,0,0,1be984dffbf5aa9403a277a79b79d3b81aa77630507f7a52346c4d25af468acb,2025-02-19T20:15:36.007000
CVE-2025-1001,0,0,25822520434c0eee757567b9ac3c60dedccca12f67ad7f4e0649410902d4f3cd,2025-02-21T01:15:09.533000
CVE-2025-1002,0,0,5924bfb893b69c2c48bc15800a18d8e148e3af0fc98b9ac93c5345173dbb78d8,2025-02-10T21:15:21.830000
CVE-2025-1002,0,1,f97bac87e40c3e4ae6a1dab3e12b443e097c8b7c3a30912be5a1e1c3dab8f385,2025-03-03T16:52:20.953000
CVE-2025-1003,0,0,6637ae0e206322756cfeafb7e3ebdef919f97629dd73a22be7a206522532acca,2025-02-04T00:15:33.940000
CVE-2025-1004,0,0,9cae67c415976182c9e721c9cd510a26d80715a77eb7b99e0e645fceac3cfbf2,2025-02-06T21:15:22.247000
CVE-2025-1005,0,0,6634395cbbb9a7c65c4fbb122df0f4ce8e0e536d41583c0c210842e7f1160ca8,2025-02-24T12:31:01.313000
@ -280558,7 +280575,7 @@ CVE-2025-1115,0,0,30d7245a282f9be9cd5e268e84a047b532c6864c57222cb265a909087aa7d4
CVE-2025-1116,0,0,00a59e293e16dcad8521027625075db7b6762697e4bdc6e6648fad6aa5872375,2025-02-08T12:15:39.660000
CVE-2025-1117,0,0,689febb6066d1fec82c60e215bad724ad5df8fa85c4636fc9e776b8da79fe4d3,2025-02-08T13:15:07.843000
CVE-2025-1118,0,0,1d46e95b87fe7edb9839b43fa6447bac85df34e285b438ecef13347991dc098d,2025-02-19T18:15:24.280000
CVE-2025-1125,1,1,15af4019967856e6ea42daf32245e9e558665fc6040814b2b70f87b319149ce8,2025-03-03T15:15:16.300000
CVE-2025-1125,0,0,15af4019967856e6ea42daf32245e9e558665fc6040814b2b70f87b319149ce8,2025-03-03T15:15:16.300000
CVE-2025-1126,0,0,75a0af68b2de42873e4ee33ccd68bb162ec9dabf122dea8ebb0bf11a24b953a1,2025-02-11T17:15:23.537000
CVE-2025-1127,0,0,5cab03037829677b3ff4c77d268b6ebc0b526a062cfabc702392a7f88c64ffc1,2025-02-13T19:15:14.153000
CVE-2025-1128,0,0,3e3abcd3f96edb2abceed71a856737fc42627c92bf399c3000e0a443d77fce4c,2025-02-25T07:15:18.480000
@ -280575,24 +280592,24 @@ CVE-2025-1148,0,0,d1618314ff59009839b509aacbbca99b15c99ccd5fbd1d92e78000fe3994e5
CVE-2025-1149,0,0,d8d91fe8a3ea61c4ba8a8728b35b19cb024f17e8929c6b84c98db6467585ef43,2025-02-10T15:15:13.093000
CVE-2025-1150,0,0,ad52c0f26e616344bc9e26433ea525a076361996f0527b54486144825cdc9fc6,2025-02-10T17:15:18.517000
CVE-2025-1151,0,0,6f137cbb7dc8cd66d49b40611be226ac13ffd672475b8994ef22393fe66acf80,2025-02-10T17:15:18.713000
CVE-2025-1152,0,0,941bdd76f63c9e36646d2514ed9a768715eff331ea36926bfaf5737d1ce4c5ec,2025-02-10T18:15:34.043000
CVE-2025-1153,0,0,0ecc24c7fb98e79f6fc13494f133dda5ac9bd638e03e4b55b9e91e76752966af,2025-02-10T19:15:39.900000
CVE-2025-1152,0,1,ae53d6bc7df1c05ec8db34e17fef35dc2661a6e86edb0d9d93d56afcdd732f31,2025-03-03T16:52:20.953000
CVE-2025-1153,0,1,4a0aa81e885caa78790692d05830179faca64dd7e5cb7f2a5704fa52079f4dff,2025-03-03T16:52:20.953000
CVE-2025-1154,0,0,57272d35734346cb9c87a9c3d8280a92cef919f388fe5cd9152692becb234631,2025-02-10T20:15:42.173000
CVE-2025-1155,0,0,80c10c69f8c4209d273d0f2f525d1dc06e697593fb801952ed2e59d173c27449,2025-02-10T21:15:22.020000
CVE-2025-1156,0,0,b9d7f43a66be70b99a0c5a29d90bee603b5f0498d98b3e0e919a25713e636c40,2025-02-10T21:15:22.133000
CVE-2025-1157,0,0,0768c3316686f8ea0ce85f895d4742070425b3dcc01a4b346a3d2ba70ce2affd,2025-02-10T21:15:22.300000
CVE-2025-1158,0,0,5e890f5418f698c1bba0f62345c72d90ed4bba77c16f29dd16e63bbd56007ead,2025-02-10T22:15:37.080000
CVE-2025-1159,0,0,90400029a439f5c084fc196475b85cccbb140946c8929820cb6af741e32f7edd,2025-02-11T16:15:49.820000
CVE-2025-1160,0,0,b6eb95ef65e41f2fc0255c464d03f10768661ee65b4113962d6d468c0b6b4deb,2025-02-18T18:15:30.120000
CVE-2025-1160,0,1,9ed013a287e8b0e2fb1943b5a3277af7222e216b017461ef1c63a5d096f62e0c,2025-03-03T16:52:20.953000
CVE-2025-1162,0,0,3b2bb2db7d54134892b769fb4423602d51c7e76dad09dbb88016ba5ca9824837,2025-02-18T18:15:30.347000
CVE-2025-1163,0,0,b975e395770f67220ae579bd05fea3ea91a0cf1c411dec11ad62f751ffa1168e,2025-02-11T16:15:49.973000
CVE-2025-1164,0,0,e9bbc44bade1bc16b0d947d13699313517ec6ca51887fcc4ad782f0763bb0e56,2025-02-11T16:15:50.100000
CVE-2025-1165,0,0,34dfe20c3add5e7f1a3c3253370e0b994562b1e78bd746b6a2ced4fa7e32b226,2025-02-18T18:15:30.530000
CVE-2025-1166,0,0,d865e452fab72aab211665c2175168d5c2705d2612224a67de071e15e8040724,2025-02-18T18:15:30.743000
CVE-2025-1167,0,0,2d3866f5641bb3d5b1eecb2f44d6b7f1da7ec111493e479f26cb5c3d7c480a69,2025-02-18T18:15:30.940000
CVE-2025-1168,0,0,71b85aae92f04582e0700d4784a3bc2a793ba320bdca0fd4391697007788cb53,2025-02-18T18:15:31.127000
CVE-2025-1169,0,0,8c055d8e40c4e159e2c7a6b5e02bfdddebcf6a95d43241331f4d09d2ebf7b9fa,2025-02-18T18:15:31.317000
CVE-2025-1170,0,1,feddbff8762786c58b56b4bf5125ff9df23e79ce1623aef48a226f8050f6bd05,2025-03-03T16:25:24.627000
CVE-2025-1168,0,1,4a1406c1b5e33a30f712f8cf4938baac8df6cb2dd16d2778f2443a592ac7c4db,2025-03-03T16:52:20.953000
CVE-2025-1169,0,1,fe01deed4aa0ac0beffa688a70b98e4c6971422227ee7d7a1d13ad31fff5d4cb,2025-03-03T16:52:20.953000
CVE-2025-1170,0,0,feddbff8762786c58b56b4bf5125ff9df23e79ce1623aef48a226f8050f6bd05,2025-03-03T16:25:24.627000
CVE-2025-1171,0,0,f170f11bcfeecfa035d408acd2b5aa9d719bf2c41b86861cf69d4a47ff02dc01,2025-02-28T02:17:48.143000
CVE-2025-1172,0,0,8e59f1ce675ba7727e3262ba156fc17ba513ead7169ce565d608390ce0ce1365,2025-02-28T02:17:48.143000
CVE-2025-1173,0,0,19fdf9f9d4e4497e9a2ec0879adc1243d220e391d63758299a413cfaea78434a,2025-02-28T02:17:48.143000
@ -280601,7 +280618,7 @@ CVE-2025-1175,0,0,e4e505608345f018f25d9a8f47aadfc991d7592689b77a43eab3f49ae131ee
CVE-2025-1176,0,0,d6dca320a4640a736fafe63f90a3c92a5ff2761ed55359c273af5b390b7318ef,2025-02-20T16:40:56.790000
CVE-2025-1177,0,0,a9031c02ad15cd3b79dae0a4c247f1d863fa16483cc0621210d54f890eaefbe0,2025-02-20T15:58:50.097000
CVE-2025-1178,0,0,2f1840a40618337523c22fd8c03700c138257f2d73bd6581485943a674b97af6,2025-02-11T16:15:50.410000
CVE-2025-1179,0,0,52c6f29cb50c719935d38299de7e162486a201b0c0d2d3ad3255c84f08269eac,2025-02-11T07:15:30.230000
CVE-2025-1179,0,1,3297418a330e74fd477c6438f6da915df0956de0b57128f7637ac56e4c339143,2025-03-03T16:52:20.953000
CVE-2025-1180,0,0,482e7a91c46cfa35d47e6ff4e9d3a7143cddcb1e73a2a9f5403f9ed9c303e86c,2025-02-11T15:15:20.260000
CVE-2025-1181,0,0,0fef40647a61f80aaba8a4cfdd85fdda47bca041d99333f27eaeb2e33c9be973,2025-02-11T15:15:20.393000
CVE-2025-1182,0,0,54e498160c1635f94a2f987c8bdb0818a2273e3d3652f60ff63b2a7f8ae5df6a,2025-02-11T15:15:20.523000
@ -280649,7 +280666,7 @@ CVE-2025-1231,0,0,53b09d0e70e608d42ef2315cf58b2a0031ad64c29b00c44d026df29aef3338
CVE-2025-1239,0,0,6187788ffe5fd6000cc24d081f477dcae5b0ef59871d160b3ff23ee25b818501,2025-02-14T14:15:32.687000
CVE-2025-1240,0,0,363ac0ec488e57d295d78c481b595c1c1507ba076f5813d8f4f20530988afa84,2025-02-11T22:15:29.800000
CVE-2025-1243,0,0,b36908327b1b41fa664c4a39c71934592fd1d75bcc40ba67f7d64ed64955da7e,2025-02-12T01:15:09.073000
CVE-2025-1244,0,0,0ae76203740f379d7903882ca8506bd3e442f9968d35d8da5cd8a7c6ae871553,2025-03-03T12:15:34.453000
CVE-2025-1244,0,1,00fcfd698eb59091aa282e3a0775a6dd44b3c414df60c9b9a0d63b7e603b2a46,2025-03-03T18:15:31.307000
CVE-2025-1247,0,0,413d4bcd6e00b55487b15f2b541fa31d8a6169438afa6345f0107f85b8ddc727,2025-03-03T14:15:34.120000
CVE-2025-1249,0,0,f9cf8228939f75e3961b7ce63e2e103ee292f920596572fc4d2ff4b8583fc869,2025-02-26T15:15:24.470000
CVE-2025-1258,0,0,e60d49e74992453b0cd2d8b93f0bc7a60901e2447adb1d6d0cde7627e3bb44f5,2025-02-20T18:15:26.217000
@ -280763,8 +280780,8 @@ CVE-2025-1570,0,0,b46b74003a884bfde248d1f55d464c09d2edda3a9f89316fe0cc50da512e92
CVE-2025-1571,0,0,2ff9d1871ce4b294af235897d1f180d1853e1f37cf780d6e8da053f8773e82c8,2025-02-28T07:15:34.227000
CVE-2025-1572,0,0,1320b2f727383676da6c73261af1868478cf6dd12bf50e5bdd5ba7a431e21124,2025-02-28T08:15:35.810000
CVE-2025-1575,0,0,295612ec0ffb6cc1f5a98b01cca7e60e463451cd2e098b1e5038c15250f15467,2025-02-23T04:15:24.980000
CVE-2025-1576,0,1,aeb190ff01707b8d12dded28d81e8d078211363f2b351bee055762ff93e0203e,2025-03-03T16:25:24.627000
CVE-2025-1577,0,1,4d8fa583e71372f21db5fe2ef87d702b5d584f75eb8697a695605f1072d59f24,2025-03-03T16:25:24.627000
CVE-2025-1576,0,0,aeb190ff01707b8d12dded28d81e8d078211363f2b351bee055762ff93e0203e,2025-03-03T16:25:24.627000
CVE-2025-1577,0,0,4d8fa583e71372f21db5fe2ef87d702b5d584f75eb8697a695605f1072d59f24,2025-03-03T16:25:24.627000
CVE-2025-1578,0,0,0d9ecf545c28371e3a17142eb6623e9049c12d991fcbf8ec598bccc17e9c793c,2025-02-28T19:36:29.477000
CVE-2025-1579,0,0,27c513acd0a9c40f3d5e6eaa99975a86fa62c7ac2618374b3e15bf65d08f5d6d,2025-02-23T09:15:09.393000
CVE-2025-1580,0,0,afeecf9391b29af9c4df01adece54496ac1306b282e21af172a55a31e76b33b2,2025-02-23T10:15:09.623000
@ -280827,7 +280844,7 @@ CVE-2025-1690,0,0,c3c30e76959167db5e53b3f3d7f732bab0cb17823abdf119dfc999308f89a2
CVE-2025-1691,0,0,fa342911d8aff1f1c916fab2606c8daed81ceb012a2ca7f67eb6c905e0ec582d,2025-02-27T16:15:38.610000
CVE-2025-1692,0,0,ada4fe9963e6bfb9428a6effda149b259cc8c8d330fa71a5cddb43ce0441e458,2025-02-27T13:15:11.413000
CVE-2025-1693,0,0,78bee8ea11b0f84269d8265b773d2949284a15da89c9262684dc7b4564686390,2025-02-27T13:15:11.563000
CVE-2025-1716,0,1,db3aecae26e7981ab8a106cfd43bc335b9dad5cbc10d04d2c9d637c981434378,2025-03-03T16:15:39.520000
CVE-2025-1716,0,0,db3aecae26e7981ab8a106cfd43bc335b9dad5cbc10d04d2c9d637c981434378,2025-03-03T16:15:39.520000
CVE-2025-1717,0,0,531ae6ccf2948d3fb4bab20d73b08fd6766b8bf8893677c6840dec6217d1f072,2025-02-27T08:15:31.130000
CVE-2025-1723,0,0,bd3dc44ce79d918f1eca963344abea138edda86e5a9253ac44f547b43e3ab229,2025-03-03T08:15:15.717000
CVE-2025-1726,0,0,1eac96fa1d7a7ec9ea278c42b19f49f33808e18559f649ea58334e24fccb274f,2025-02-26T20:15:13.510000
@ -280857,7 +280874,7 @@ CVE-2025-1795,0,0,70fd77cb540d3bda179678e58a7ef81c271cc3e16d5d4d855b724aa1245ec6
CVE-2025-1797,0,0,300dd40b9ba65144edab2a795cb46e891c141669ea3cc5dd5e27c94a6c5ec09e,2025-03-01T15:15:11.573000
CVE-2025-1799,0,0,43816068956cdf14dad20a4e5e4d1fc47001df714eea26349dd91115ab4dac95,2025-03-01T18:15:34.803000
CVE-2025-1800,0,0,322e2f3c3e826d546073227fc29a2546415ead7a627628aa90cb68e7eca6995b,2025-03-01T18:15:34.983000
CVE-2025-1801,1,1,a2a811c3bbd4e41c2b1f7fc15d1597e52583d9e67a8b01eb2f319fa5bd9e33e7,2025-03-03T15:15:16.500000
CVE-2025-1801,0,0,a2a811c3bbd4e41c2b1f7fc15d1597e52583d9e67a8b01eb2f319fa5bd9e33e7,2025-03-03T15:15:16.500000
CVE-2025-1803,0,0,61b8ea959516cf458cfa0ea204219ee983e8adc2cba473f893652a1e07a05d40,2025-03-01T01:15:28.077000
CVE-2025-1804,0,0,4efbbb5111b547eb1b7feeda8daec896151cbee844f359a595f3a1d604d85292,2025-03-01T19:15:10.660000
CVE-2025-1806,0,0,50d403f25a8bffb801c29906a32759d0581e4716f01ef933399e6391a089100f,2025-03-02T00:15:33.980000
@ -280876,27 +280893,27 @@ CVE-2025-1818,0,0,d36c337878b30c2f80b4fe6d65335bad90523aeaff616d34524d0eb820cfb6
CVE-2025-1819,0,0,b8077e9897a336636549b20cf9dc0e287a17bc30f636d2d56ac710cc82e6e8b0,2025-03-02T17:15:11.483000
CVE-2025-1820,0,0,5b07ae8a40a108bc4ab7ed1b8cb2828218b05189c18957cbe94b8a5f85021b26,2025-03-02T17:15:11.677000
CVE-2025-1821,0,0,a22d62df68a6ecdf2cee7c63de4eb3be143020d9e83525092cb5432c673c769f,2025-03-02T19:15:10.547000
CVE-2025-1829,0,0,7bd0b178236abc248f33deca78089674811f2be261b98e2d4cb6a5f686400d1a,2025-03-02T19:15:10.723000
CVE-2025-1829,0,1,fde8c132aea7b0381baf40fb45deb0fda4ca046d0a6be0cd0198b49b4d2a0189,2025-03-03T18:15:31.937000
CVE-2025-1830,0,0,3e81308df6e20208e5b8dd46f2ba49560e891edb972fd2acbd10ea701dde0eb6,2025-03-02T20:15:33.767000
CVE-2025-1831,0,0,26956ae81d5dc8972cfd2062e799a0ff1438cf6d1566635ba60e2d789cba3f80,2025-03-02T20:15:34.577000
CVE-2025-1832,0,0,236dc639d7ddb0baafd72dab1099fb056d5eb2410a74bf2ec5e369437d8779b3,2025-03-02T21:15:10.110000
CVE-2025-1833,0,0,20fdb57eae0d9c145f022ababa08106368fcf40a78b1f2f8a9fb4fde977089f3,2025-03-02T22:15:34.820000
CVE-2025-1831,0,1,dedf0ae51363b8d3ed1c865993f4e92f8fcbae9a0264890a31526f1cf08aecec,2025-03-03T18:15:32.520000
CVE-2025-1832,0,1,629dbdcf5550d5557538ee06a7ac8f727a167d99ca32f116db8fc1cbc6bc3943,2025-03-03T18:15:32.950000
CVE-2025-1833,0,1,412c4506bdf3d53653b4205b23dc52fa25efa7a9f0ddc11e86618e846c0dd94b,2025-03-03T18:15:33.763000
CVE-2025-1834,0,0,0ad2de3af2e9de32d9a99e976be1a3bb5dd352e04c52e05ce75aa17bb8e7d3a8,2025-03-02T22:15:34.997000
CVE-2025-1835,0,0,2a60a18877264a79f9b058b41ced82deb6530a74d9ea4d0efc60852085021534,2025-03-02T23:15:10.477000
CVE-2025-1836,0,0,13bb65ca0c6e5a0d08d48c52a2ee2cb91592f3886044f600fe193534f47d51c6,2025-03-02T23:15:10.993000
CVE-2025-1840,0,0,d37a1f00306bec1b2440f6ba2a388e661831cd809495b3808bb6eec88299d06e,2025-03-03T00:15:42.857000
CVE-2025-1841,0,0,72bd852d9729b5ab0e0fcfbf1d47c2dc8f892ff9f5a00440a1cc43c8f6ead9b4,2025-03-03T00:15:43.033000
CVE-2025-1842,0,0,2740657f48db38aea65ff197731a80f46823dc93f34b86cad29da345a9d78495,2025-03-03T01:15:10.023000
CVE-2025-1843,0,0,de69dfec2e0b193564d55ff4e98cb87273a9fbfd2b156d82a5acaf926ac31da8,2025-03-03T01:15:11.127000
CVE-2025-1844,0,0,f7a0768b0a78e26485c5dc34e4b3b0832ad616e62441c9ecdb8a086661609d04,2025-03-03T02:15:33.390000
CVE-2025-1845,0,0,4d13fb467d03250d9d7ad58527e0d7ddc037dede35f97e95d7597953255643db,2025-03-03T02:15:33.563000
CVE-2025-1846,0,0,5c7f3bcd4f600ed21100c2323eba63af680e8a42c3178debbd9d070582d1b8dc,2025-03-03T03:15:08.777000
CVE-2025-1847,0,0,746236a7f5daba7186147d066b7aaaa80fd843c4adbf688ee60e53e05f7bb637,2025-03-03T03:15:08.983000
CVE-2025-1848,0,0,b4b3792b2f071cb7baebc550aa244188045e4139769a51b876e21cea9dd8bd3b,2025-03-03T04:15:08.657000
CVE-2025-1849,0,0,354df1d3115e7ed477918e35dd2218a14edf9641d1ba7b4fa97da52f2d0d22aa,2025-03-03T04:15:08.837000
CVE-2025-1850,0,0,ea68a3dd00a560e71fe95deae84b875b31ca9504072c80640a2691c9ac6d0c08,2025-03-03T05:15:10.587000
CVE-2025-1851,0,0,faa5ac08ac0fee46f1b16a0465106e5a4a341af911fe8c171e43fb5f1b00229c,2025-03-03T05:15:10.867000
CVE-2025-1852,0,0,a886287ebd221b754a408205bc3961099fffa063d675a6087bdc41ff2f34bc44,2025-03-03T06:15:21.343000
CVE-2025-1843,0,1,952309a902e5f1ef5af6384d2fedc20e363b2d346a8c7b0b378ee7b767fbe968,2025-03-03T18:15:34.290000
CVE-2025-1844,0,1,36733d3ad467e74040d2298fc997773dc4b826b85e011a14f94c3f5f7b4b2d14,2025-03-03T18:15:34.773000
CVE-2025-1845,0,1,c92853bfb71ea4fa8e4a4fc1f4b9baa88ef35e5426053983652151fd7bce795b,2025-03-03T18:15:35.840000
CVE-2025-1846,0,1,51092600573c3bda80c700b6a8ea887629c09c0e03ae4b0ac2064388b0613b3a,2025-03-03T18:15:36.340000
CVE-2025-1847,0,1,46fdf146f62263a0167fe919bb397b4120a8e8de268127eff305761e90fec00a,2025-03-03T18:15:36.537000
CVE-2025-1848,0,1,4304128e930dad5c3b8b7258c342acdb2748223c34186c8f98d95ba3006e543a,2025-03-03T18:15:36.720000
CVE-2025-1849,0,1,f2258c853087c6840804e3a02ab7b6509c32174f759f6aa5b93be0056910680f,2025-03-03T18:15:36.893000
CVE-2025-1850,0,1,ed2d993fc975f386b8fad0f239bbd09bd774a741a5c53a4b455fd831639e33a1,2025-03-03T18:15:37.077000
CVE-2025-1851,0,1,f8420159a375356cdfd200ff3bd53ab2168d0b711b6e47bfeb1f78dbe8d34bc6,2025-03-03T18:15:37.277000
CVE-2025-1852,0,1,368f0d9bdf8de44077e6f73fd13ce719918d7cf971eb7381c563106693af6c20,2025-03-03T18:15:37.447000
CVE-2025-1853,0,0,1ca7b3f52c25c3fc5fa57ff0b3fdcd1cc5bcf593f896e1516be8778f7214bfba,2025-03-03T06:15:21.697000
CVE-2025-1854,0,0,807272fc1faf394020bd02f44d1204a0d3e08b77045a8805f11576c69ec3afca,2025-03-03T07:15:35.030000
CVE-2025-1855,0,0,3e9f8b558ac6552e8526a9c2fbaf0089e976661b34f06258bdcdb5078af97e9f,2025-03-03T07:15:35.277000
@ -280915,6 +280932,7 @@ CVE-2025-1872,0,0,37d85e8c5e628c1acd5202959187915e2c659fa3bf0379a3a04d86d535bc53
CVE-2025-1873,0,0,e1c282e5ad730be363eaf77efd9ada11d8c28125c103f5c76eae6f3dc74ed906,2025-03-03T13:15:12.547000
CVE-2025-1874,0,0,aaac5f5bbefa513f1f275c65a81e3107f76733903a225b9b994a8887fc4365fa,2025-03-03T13:15:12.693000
CVE-2025-1875,0,0,05a3bf51a95148d04bc21a250ccef05a1148e7afa6764429679a636a04f327f8,2025-03-03T13:15:12.837000
CVE-2025-1876,1,1,5ab8224545773fa9f93a39ef9ebb1dd5f5c34e4ebc74e7211110b0307ff1d955,2025-03-03T17:15:14.517000
CVE-2025-20014,0,0,f4fd1db051e4652a5d7e7863a21c37faec75062d4b5ce0e4f2c6bffc2f3ee854,2025-01-29T20:15:35.207000
CVE-2025-20016,0,0,6fccb84eb01c2cd66b422e82777f9738bfe5004121e1b551d0ae454724543c0e,2025-01-14T10:15:07.500000
CVE-2025-20029,0,0,d9e3ca63dc18f9436b5043ebae0bcb543cc6452f75921963fed59e1df065c2d7,2025-02-05T18:15:29.573000
@ -280990,7 +281008,7 @@ CVE-2025-20643,0,0,2e2366245f9f5bcad98b9838a1898890ae5530ce7393a7ea521ec6965e892
CVE-2025-20644,0,0,ca4674e609c8d43590774d83b33a9ead2d66ed4ea8d3e9136628580894824b31,2025-03-03T03:15:09.173000
CVE-2025-20645,0,0,50c2f7a77d19c85e70131931e626054a7b3b307d4380740abc99317c0cc503c0,2025-03-03T03:15:09.293000
CVE-2025-20646,0,0,cffc2e10e8f144699ea086242ab9f118a4a5f283ffced233e9122854e6f3cb85,2025-03-03T03:15:09.403000
CVE-2025-20647,0,1,f8b14a260b30296d5521b985721527413454d57f9703d76e8d5f0a3d821d5af3,2025-03-03T15:15:16.880000
CVE-2025-20647,0,0,f8b14a260b30296d5521b985721527413454d57f9703d76e8d5f0a3d821d5af3,2025-03-03T15:15:16.880000
CVE-2025-20648,0,0,8a5329795e49d943046cd42334c66ec6e22086a139db47fcc996c0e16d9bec63,2025-03-03T03:15:09.620000
CVE-2025-20649,0,0,e6b321888e5587435d9fe5c887af311fd6ada0707e9e5d0aaa38016074282498,2025-03-03T03:15:09.730000
CVE-2025-20650,0,0,d87d253c52d390a1c1085865131f5ccd369068e01b98708e99f6223902cbbf92,2025-03-03T03:15:09.840000
@ -281054,7 +281072,7 @@ CVE-2025-21136,0,0,1471b8df9400bf2a614051a2204be217d0d5f426f818af5f4e13aa30b875a
CVE-2025-21137,0,0,45139b02243d4b1da14a9edb94333c11b50a8560016fecd32028ca2a6372fd84,2025-01-21T17:49:47.150000
CVE-2025-21138,0,0,9175fd36c28710bcae9acb351f078e58c4e36962afaf9695ab07299ddfe97cfb,2025-01-21T17:49:57.513000
CVE-2025-21139,0,0,2997f9c80c926e4a0ccbf0529ea4d9ee2a8d2178744e4927ee6a077f342903ba,2025-01-21T17:50:10.023000
CVE-2025-21155,0,0,1ee49d33bfabef78343cc7af8c527cca0e5a2529c9eaeeb2555c43789cd90432,2025-02-11T18:15:27.583000
CVE-2025-21155,0,1,3b730fcf3884ebe69fa3cb10c79d458749d35e3fdc22e4031b3aa2f27e975e38,2025-03-03T16:52:20.953000
CVE-2025-21156,0,0,3dee0f6c65f1bd094a761214b4f97ccdafcdcd8576589694bb708cf58dce07fd,2025-02-11T18:15:27.787000
CVE-2025-21157,0,0,dc11ff4b6b9e18e8b723fd7cd41934447880c05424133b5ef5cb6054de515224,2025-03-03T14:54:17.487000
CVE-2025-21158,0,0,68d9b59f620ec5478dd99f17f5a82d6ee9d79b9f8dce8ee154ea0f44bd83c1b3,2025-03-03T14:54:17.487000
@ -281627,7 +281645,7 @@ CVE-2025-22207,0,0,227e1dd024a03046d5aad9d73b27b2d6f23b1761e7c90a962fa1e9e855255
CVE-2025-22208,0,0,4da3f6139c6e9c40f33488344972941101e9c73e7b48ee2d6c4ba83ac4c0595f,2025-02-21T13:15:11.400000
CVE-2025-22209,0,0,6259f847301f1e17e539d0555807865e6f3eb75df7ef5140d83a13597977cfcd,2025-02-21T13:15:11.553000
CVE-2025-22210,0,0,abd3877e40c6e9332d48e0a8769aa45708e26e2efdd35254a970ae6f9ad61b2e,2025-02-25T22:15:15.060000
CVE-2025-22211,0,1,46973cc2447595c7ddddc91ed5a119416d2f8b85568742f477e9baab344732de,2025-03-03T16:15:39.843000
CVE-2025-22211,0,0,46973cc2447595c7ddddc91ed5a119416d2f8b85568742f477e9baab344732de,2025-03-03T16:15:39.843000
CVE-2025-22214,0,0,9f9cbba758088c6fe54f3b7aba457fa8b68f7e0bf397744585451dc526c7cea3,2025-01-02T04:15:06.277000
CVE-2025-22215,0,0,e26e39627ebf88fc4492196348e13c55563ef72a3b7150347ad788f5576b3be6,2025-01-08T15:15:21.927000
CVE-2025-22216,0,0,0647923838513073f2b0d0386ce946a85c5a3cb60aa88ae944b42a751c855e8c,2025-01-31T18:15:38.247000
@ -281939,7 +281957,7 @@ CVE-2025-22734,0,0,ebb588399299ed7786c13a4d873d6a5e5a3c44188d8c165fdc0198076e15c
CVE-2025-22735,0,0,de6a6f26a15403b2f22d28132a742d5d30dbb5d122c903ecf659b867065c2369,2025-01-21T14:15:12.737000
CVE-2025-22736,0,0,0f002f9c72e82e1a6604d70abaa51b2bc570bcdd5574d8a2c1f2e2cb9ae96bef,2025-01-15T16:15:35.877000
CVE-2025-22737,0,0,d993d76148f4207aebc67a18a146e07d4f4f3ca83cc7e5580153e5155464b350,2025-01-15T16:15:36.030000
CVE-2025-22738,0,0,66295193def3bb821d4d07460e015d4f0b5ac1600519337a96c9abcc7a61d25f,2025-01-15T16:15:36.187000
CVE-2025-22738,0,1,73c5f33c15da133af8f5c3f0cb6df210373e9a3523fbd71c818e52f95d68cc4a,2025-03-03T17:42:59.740000
CVE-2025-22742,0,0,11a4a56fc317da9c8dfee788933cef43a2971f0d29d36632165000485ef746b0,2025-01-15T16:15:36.350000
CVE-2025-22743,0,0,76f32fc2f88d28b097346bb603b63ac7aee93ae537a00506ea3d57cf32b7feb9,2025-01-15T16:15:36.503000
CVE-2025-22744,0,0,9c4303b28715077c0dbe485fb40535cf186962e58a22a39419bcf9fb85bca699,2025-01-15T16:15:36.657000
@ -282043,7 +282061,7 @@ CVE-2025-22921,0,0,fc4d8d5f4bc002d31a8eab55216be4cd1b637344934aafdd7df2486b97620
CVE-2025-22936,0,0,d81f6f27c0c4b19886d50175e4767c83ad84386da04b2ebc81be17b6a19a6c20,2025-02-12T14:15:33.187000
CVE-2025-22946,0,0,7db37666dfbf9142b1788db2e9c9ed7b839c8fa56ddb82a64c0b003e5a2cac22,2025-01-14T15:15:28.480000
CVE-2025-22949,0,0,4497a547d6c85b77c71713f92e0bd769cd0fee1b37f22227e370aa8af86f0dec,2025-01-14T15:15:28.637000
CVE-2025-22952,0,1,81f6e17717edc94ecbde92b279584adc65afdde56cad155ba2ae5a67cb261723,2025-03-03T16:15:40.010000
CVE-2025-22952,0,0,81f6e17717edc94ecbde92b279584adc65afdde56cad155ba2ae5a67cb261723,2025-03-03T16:15:40.010000
CVE-2025-22957,0,0,a83a10114b8bffbb61185f4b7e1da98510853b7fa64b4f1d87dfa557428e19b8,2025-02-18T19:15:26.813000
CVE-2025-22960,0,0,03dbe017a43731b62764513a5831ed79527b3dffb6d1c2c75f2395befe9bee6b,2025-02-13T23:15:10.960000
CVE-2025-22961,0,0,a8d7599115f6e6df511a78a0281bfd773eeeaf5f1ff31bc5878e314826477a78,2025-02-13T23:15:11.047000
@ -282733,7 +282751,7 @@ CVE-2025-24017,0,0,4127b8a7fb48204ccdedd278270e1a824a4426e6472255b67fd4d2229bebb
CVE-2025-24018,0,0,e4baea09df10b36d105667a7249c05293515d725374ccb74ed2a1fb48a8a06d4,2025-01-21T18:15:17.803000
CVE-2025-24019,0,0,2a3a6a9851c247290336c704932309ffb09f759a478660ebcaeee5a66d59a10f,2025-01-21T18:15:17.933000
CVE-2025-24020,0,0,285e20714349f7ac830f6a14f1541e73cc305a3a9f896b0ecc137956f3014986,2025-02-13T19:01:51.927000
CVE-2025-24023,1,1,e8fdef59197c9924a10fdfa91dbf4507403955b870c2d28a819e357561bf0cd8,2025-03-03T16:15:41.820000
CVE-2025-24023,0,0,e8fdef59197c9924a10fdfa91dbf4507403955b870c2d28a819e357561bf0cd8,2025-03-03T16:15:41.820000
CVE-2025-24024,0,0,2eed754b499c2c804003117f998e15abebe8d400a886c780cd3d285697b11dd6,2025-01-21T20:15:46.617000
CVE-2025-24025,0,0,d0deb6cc735d18f2d50160ca3518f33216e8d39f408db984acc4bbc8bf3a9a39,2025-01-24T21:15:11.600000
CVE-2025-24027,0,0,7aafd16a9bde691788eff3c983eb76660cc50c899ff68b8c3f8ccfb1cc458ed4,2025-01-22T15:15:27.090000
@ -282873,10 +282891,10 @@ CVE-2025-24424,0,0,21b11ca09b8673874895510024aaf8ad8182154f441913c677a9c85fbedac
CVE-2025-24425,0,0,242b701dbfe06337da2bd8ccd3cf54d94fc82056ed1037bc6580e60c9aaf77b6,2025-02-27T21:15:40.257000
CVE-2025-24426,0,0,eaa855dd71562a46bc77bf16a3517ae67c9de83e174a555c416f09cf48e00df1,2025-02-27T21:15:40.397000
CVE-2025-24427,0,0,aeab414832c49a4f5c936b87983d2491f9c9e21252b16e14b179a723e5483abe,2025-02-27T21:15:40.530000
CVE-2025-24428,0,1,6f3bfb62e88d069c8bfb9f9cb6b3a3a8a2df49dbf20d09db54a464cce8414b85,2025-03-03T15:31:07.747000
CVE-2025-24429,0,1,4d04a778412031aca079c9ff56172e80337374f9460cca8b388e11a6b62a962d,2025-03-03T15:31:07.747000
CVE-2025-24430,0,1,4eb06266fd7847e2baa675fe7677c830ad926011feeec64352e65e743c1785ba,2025-03-03T15:31:07.747000
CVE-2025-24432,0,1,58a0f1e795d23f9cf4e0ca6e03bf6a0d61e3a2662bbadcf516ffb8aad14cbabb,2025-03-03T15:31:07.747000
CVE-2025-24428,0,0,6f3bfb62e88d069c8bfb9f9cb6b3a3a8a2df49dbf20d09db54a464cce8414b85,2025-03-03T15:31:07.747000
CVE-2025-24429,0,0,4d04a778412031aca079c9ff56172e80337374f9460cca8b388e11a6b62a962d,2025-03-03T15:31:07.747000
CVE-2025-24430,0,0,4eb06266fd7847e2baa675fe7677c830ad926011feeec64352e65e743c1785ba,2025-03-03T15:31:07.747000
CVE-2025-24432,0,0,58a0f1e795d23f9cf4e0ca6e03bf6a0d61e3a2662bbadcf516ffb8aad14cbabb,2025-03-03T15:31:07.747000
CVE-2025-24434,0,0,380744e45c93abb2193a38a3d330d1de2a80e61ae98cfa1c0e2c7340f63efe4f,2025-02-27T21:15:41.317000
CVE-2025-24435,0,0,9a399c91aada2dd1bf7b57eaed273c4fd2f09f22088815b4e80f1fb5172bec45,2025-02-27T21:15:41.437000
CVE-2025-24436,0,0,fa6e1028e6b05751859f5712ef24bba808cb1ae0a39dca5196099fca50ecb47a,2025-02-27T21:15:41.553000
@ -283323,7 +283341,7 @@ CVE-2025-25181,0,0,d93e6c4eee13ffa168372e2c7e46bbc0128edff1659cd70737de5b3c44664
CVE-2025-25182,0,0,6fd347398e5cc83c7bcf9c93dfa3366f2e8e0aced29c81495217dd5d01f504cd,2025-02-12T17:15:23.857000
CVE-2025-25183,0,0,9f610c42840d8f1123d400fa738e85280ed4290b29d92e2aa642daf493197632,2025-02-07T20:15:34.083000
CVE-2025-25184,0,0,2da8803a7b31a0463a88b6351bc585e918c07913590e0cf3e756bba1e93f2c10,2025-02-14T20:15:34.350000
CVE-2025-25185,1,1,005a564ea1a0f55ecc5a392070d3f2d135705a3c73cde58d64305b7aacd01aba,2025-03-03T16:15:42.377000
CVE-2025-25185,0,0,005a564ea1a0f55ecc5a392070d3f2d135705a3c73cde58d64305b7aacd01aba,2025-03-03T16:15:42.377000
CVE-2025-25186,0,0,c422218bc2b3a51bb7e35622bef2d3f79367445faa61fc891c243b951694bb43,2025-02-10T16:15:39.457000
CVE-2025-25187,0,0,2ca61614d958811964bebe01178416385840d15966b28619da4a847cdf1ef2a2,2025-02-10T18:15:35.703000
CVE-2025-25188,0,0,2461474c8c359fbc15a8610b387ef0ac657a3108436b2e05cbe126ccfb2936c2,2025-02-10T18:15:35.827000
@ -283368,6 +283386,9 @@ CVE-2025-25296,0,0,9e79c5fad11a03b5a2666c57a0c1edbda7d102bfbc1a9f3cdfefb4bac3905
CVE-2025-25297,0,0,ddf94cfbbc189ce93f241ea6683b88ac35f83102b385ee87dcdb33fc29a231fe,2025-02-14T20:15:36.627000
CVE-2025-25299,0,0,b88cb269210123945d038d12d198228aa26d1b8e47ccb86107a7f3a5f3e3fad2,2025-02-20T20:15:46.853000
CVE-2025-25300,0,0,a63610c8954a67da8954dfef77eac19e25e19f8d8bc841f17242c70e43478917,2025-02-18T19:15:28.957000
CVE-2025-25301,1,1,77d12a956c3492221333f90e5a669a7fb662ba9bde6723b60a694158d8c34e04,2025-03-03T17:15:14.740000
CVE-2025-25302,1,1,207de2032449cd33d7cee27d5ca889c06a6e05f64afdcb1fa983f86317cb1891,2025-03-03T17:15:14.920000
CVE-2025-25303,1,1,4634a176f3297b7030e523b34eba1b52c58b609fb86c5b9340271a222a29f1f8,2025-03-03T17:15:15.073000
CVE-2025-25304,0,0,7deb89a558ae2974a24d9b6d35c21d12df30c14623e00d1a3e10b48167354c5e,2025-02-14T20:15:36.903000
CVE-2025-25305,0,0,f9de35ea3a1d1f816c6badb532d5c4e886ee750e6a306cd0122b4c0858013f3f,2025-02-18T19:15:29.083000
CVE-2025-25323,0,0,54c9af45f2f2bfed3aa436188f6ce7824965b5e9499a263eee6799f1b580c38a,2025-02-28T16:15:38.153000
@ -283475,7 +283496,7 @@ CVE-2025-25784,0,0,7692b0b021ef9cff1ec4a869e2fe61c0999898fb7ec7360d59c814b17f82d
CVE-2025-25785,0,0,bc17dc315f508712d84a76b1e8f23f7f21539e82980e5f82975871a87c4e8aae,2025-02-26T15:15:26.720000
CVE-2025-25789,0,0,dbcde910a2e6bfc7406d8baa980984134d87dc975529ef3dc53c087268dc1585,2025-02-26T15:15:26.853000
CVE-2025-25790,0,0,cf16ab54e5556628b5b883651ce8af541edf2d9d76dc393146144b12103f43c5,2025-02-26T15:15:26.980000
CVE-2025-25791,0,0,2089cc3837f1a9d3eaffe4f812ded438c89aa4e78e299af1741630199f84d467,2025-02-26T15:15:27.100000
CVE-2025-25791,0,1,8f427a5814c6955913fad1f85d24fb9e4344b742b4f09e2e17f073d51f11daaf,2025-03-03T18:15:40.030000
CVE-2025-25792,0,0,65d2048948b927ed6537eb86be44be326a7e7f5180a39f4dea30d54f0ac4c3d6,2025-02-26T15:15:27.230000
CVE-2025-25793,0,0,98717c3b4b6e47ee955ffb5711c27dc13e1eae9c4a0dc0d8e895a7e87452c379,2025-02-26T15:15:27.367000
CVE-2025-25794,0,0,840e75473343391737e0fadf999c877fd1cc5969682f29cbdbea6ef77281a08d,2025-02-26T15:15:27.490000
@ -283485,7 +283506,7 @@ CVE-2025-25799,0,0,86ded328c5a870afb5c08e55c199b1e60f378edae7fd31d2a0dd4d36b5493
CVE-2025-25800,0,0,522fb65d58ed245411f19820e000d842e65fe1759af2fa4ffd4c03c8bb5f4592,2025-02-26T16:15:17.053000
CVE-2025-25802,0,0,8203a907b733e39a56b3d605d1fe9c4a4172c043db07dde7f4be6b7fa6a69f66,2025-02-26T15:15:28.127000
CVE-2025-25813,0,0,0d3675aeb7cf7fedde0d08c01c9ceb08309fdff7b32b3ab8adcd2ec8b434b303,2025-02-26T15:15:28.250000
CVE-2025-25818,0,0,25aaeaac188e7aaf7b17f64f92df5c529642fde756b6bb0400ea4d3466e081be,2025-02-26T15:15:28.367000
CVE-2025-25818,0,1,bb1057156f76c0ba13313437f2d9a42516b0d209ee43b6f684c1131ad31b9b9f,2025-03-03T17:15:15.230000
CVE-2025-25823,0,0,b4ac477f9ed173d267e81d0f4893b0290a15dbbbbe65cdc4bb9bf3c2ae71bff2,2025-02-26T15:15:28.497000
CVE-2025-25825,0,0,ce66997893510daddbe1bb264e5808f6942b14e7fc8599212cadc079ecb5ab46,2025-02-26T15:15:28.620000
CVE-2025-25827,0,0,874830c79accc8e4160e8d7866ad1aa97670bb8448b95d8c643c94d01d9862f1,2025-02-26T15:15:28.747000
@ -283594,7 +283615,7 @@ CVE-2025-26408,0,0,e45f7220dde0c01d1f86f33cd06eb34062f4e98e989de6c2a87bcb17b259e
CVE-2025-26409,0,0,998a9bcbefad73980e88cfadca0416aeed1df460a44260fe4402eb5cd5541ec2,2025-02-18T18:15:36.230000
CVE-2025-26410,0,0,36441b10bb87afc4c434a271b8839836d6ce7232b364d1eaf56804b3d996ac68,2025-02-18T18:15:36.357000
CVE-2025-26411,0,0,fcde46ab874d21012fc4027217c83b95868b33b38456359d4b0f7ea8269a0842,2025-02-18T18:15:36.473000
CVE-2025-26465,0,0,fd5bb3f85e1a91bd1d8984e07b7b2ca19bc33d190686c0f3d55567168c5a90e9,2025-02-28T13:15:28.343000
CVE-2025-26465,0,1,f25765ed256eff314f13089336ba54158694f343e4e7f929cae34b191b596bff,2025-03-03T18:15:40.247000
CVE-2025-26466,0,0,98182fad274b686eae3526edee7ac65264cd0a870b2ae410fa676640ea9f1742,2025-02-28T22:15:40.080000
CVE-2025-26473,0,0,0de7ad16e6d8c7db9e1838d2da6a9c6cb3a186f455c098963c4286ddeef3bd3d,2025-02-13T22:15:13.417000
CVE-2025-26490,0,0,b8bc76b2be7d18c514587d66cef4d0bee94c01d7b29c32dae10138139a41dc50,2025-02-14T20:15:37.847000
@ -283800,11 +283821,11 @@ CVE-2025-27089,0,0,a454d43bdd21fb972482a0ce87896ca310da5d909b4331caf97bfdced4edb
CVE-2025-27090,0,0,0a4ccf92007267c16eee4b4b222c0a1bb704a8cf350c4393244356bc535834a9,2025-02-27T20:18:12.583000
CVE-2025-27091,0,0,b859d3590fe981ab912d6921b74efbe324bec6c5ee689190e2cf257247d50a52,2025-02-27T20:18:12.583000
CVE-2025-27092,0,0,7104bc7ae5ee9a84de752291fd5401045f96963015db3ee80e61b32134a06641,2025-02-27T20:18:12.583000
CVE-2025-27094,1,1,9047142af5410ccb8c1afaf1bab9ce9ee2f001800e7383997daf2a183665d6b4,2025-03-03T16:15:43.023000
CVE-2025-27094,0,1,1d0155e4f99b84ebc1c41b06ebf2678969c0072b94c6127fed8335ba465ba26a,2025-03-03T17:15:15.433000
CVE-2025-27096,0,0,713806d5fcce08ce5e5f69a4288233d3ecee84861b6679ecda83068a27e46fd0,2025-02-28T19:18:34.167000
CVE-2025-27097,0,0,2589fa071c1a9a9a5c73ad315b8e6452ddbba374e2341b11c614c9f7d8047e61,2025-02-27T20:18:12.583000
CVE-2025-27098,0,0,492c80cbc63ad6506b976d2c569a0f82a671edac45cb267f8bf0fb56623897bc,2025-02-27T20:18:12.583000
CVE-2025-27099,1,1,bd96157c304614dba09b7409a5d65bd961fe119753420ce92d59641ffcb930e4,2025-03-03T16:15:43.173000
CVE-2025-27099,0,1,02f7b15a92b044980d4320020e01555470581ad4478f07732cef3a6e4066fc9a,2025-03-03T17:15:15.533000
CVE-2025-27100,0,0,e8e728a94b37df8d941f1021ffd1ce6798ea17728dd5164f5aca39df84532b59,2025-02-21T00:15:09.250000
CVE-2025-27104,0,0,db08a4c948fc11797e4258ffc992c2c766c2c60f6bb4613e3fe0360292b496dc,2025-02-22T16:15:32.640000
CVE-2025-27105,0,0,df9e9eacd546987ca285a6d087354c1720d68ee71843aaeedd241da5e8b62276,2025-02-22T16:15:32.827000
@ -283891,6 +283912,8 @@ CVE-2025-27355,0,0,caa62ce9bbf1bb76cf121e6e89f446abe3d40a89991436a920bab478df84b
CVE-2025-27356,0,0,c6532ae1cc5e3e40abfb75187df6e9c621394ebd78da8fba75994511b24c76a9,2025-02-24T15:15:21.077000
CVE-2025-27357,0,0,e2381e6c407b4287d4d33f07c25d73cafce07e3f2901d8a47889678f366841e0,2025-02-24T15:15:21.233000
CVE-2025-27364,0,0,9286c5546baa0d62309d5b0261f0843f04abf72743b73d703ec5236da175e8e1,2025-02-24T20:15:34.180000
CVE-2025-27370,1,1,6a3f372a00563fd7d20711dd288241ab4863d1b4cbc2a21a27406d6e826e4af9,2025-03-03T18:15:40.650000
CVE-2025-27371,1,1,6a1913b1debfdeab0d65044891ecc29d273b8b40a383bc571526b1089d713f12,2025-03-03T18:15:40.850000
CVE-2025-27399,0,0,2891c688c24ccac3deb5afdb6da61c4526a1d43fbc384fe64492b9e930958b6e,2025-02-27T18:15:30.380000
CVE-2025-27400,0,0,cdbf04b984faf2bb61d60f663ecdfdd44190b0515d3b8d47c87701b41ec06666,2025-02-28T16:15:40.237000
CVE-2025-27408,0,0,1a23c30b7689ae8b8ad6930173abdf59d3279571e27ef7dee42c61d8dd013e6b,2025-02-28T18:15:28.983000
@ -283898,10 +283921,14 @@ CVE-2025-27410,0,0,542213b5e82bd30fa9408540bb6d09bd94cf07a4e4b5ab21e3b6313192903
CVE-2025-27413,0,0,3c683ca647c635eed6050d34ef335b08e4f82a229181584d65143149a8f8e1dd,2025-02-28T21:15:27.820000
CVE-2025-27414,0,0,dade89b00ff438afc3d75db3405cd2399cd0f72f2b40e361d9e8e1ad3c96ce6b,2025-02-28T21:15:27.957000
CVE-2025-27416,0,0,bfd9605f18fa0d0b58583b28f8d49afc65f3c8a40e0ddae1ef370584ff7e71a4,2025-03-01T01:15:28.857000
CVE-2025-27417,1,1,5c589d1a1bba9dd4dfbe6007cf98586df4e847d94a8f2b250e5956247447fa54,2025-03-03T16:15:43.820000
CVE-2025-27418,1,1,95d40949cc41880d5e8884f774a33f7f897b5b967ed3adfce78866d647a990ee,2025-03-03T16:15:43.960000
CVE-2025-27419,1,1,55e62c002b978adac6247e565a20ef9edbd5cdd15575177be89a6632879d00e7,2025-03-03T16:15:44.090000
CVE-2025-27420,1,1,9d526a7e533e1150de46ca6280cff846925c1fbe0c81b3eaf5526bd6ed1ef822,2025-03-03T16:15:44.223000
CVE-2025-27417,0,0,5c589d1a1bba9dd4dfbe6007cf98586df4e847d94a8f2b250e5956247447fa54,2025-03-03T16:15:43.820000
CVE-2025-27418,0,0,95d40949cc41880d5e8884f774a33f7f897b5b967ed3adfce78866d647a990ee,2025-03-03T16:15:43.960000
CVE-2025-27419,0,0,55e62c002b978adac6247e565a20ef9edbd5cdd15575177be89a6632879d00e7,2025-03-03T16:15:44.090000
CVE-2025-27420,0,0,9d526a7e533e1150de46ca6280cff846925c1fbe0c81b3eaf5526bd6ed1ef822,2025-03-03T16:15:44.223000
CVE-2025-27421,1,1,c5f8cbb8f9ad5af14f93e4ff38fc97a2222c7110d039eea8083f6d3839df358a,2025-03-03T17:15:15.630000
CVE-2025-27422,1,1,bcd8a473455936a2a24238f0c36bf9a7c4201ca34fa1348e7e22e5b4114dc5b5,2025-03-03T17:15:15.787000
CVE-2025-27423,1,1,88e83c39a3504ab732d13ded688593dc0fb5c684cb5e5c6337b81425bc853482,2025-03-03T17:15:15.943000
CVE-2025-27498,1,1,5abce51fa5a892a16b00a0cc6ce6e1fd8dbe5c06f14b98e0dedb5a5e4ad38ec0,2025-03-03T17:15:16.443000
CVE-2025-27554,0,0,47bde4f4167aaccaa05d2d034a78839ca444a85000927aab5c407b820ef1320c,2025-03-01T06:15:34.693000
CVE-2025-27579,0,0,1e17d16504251ae47acc90d9c67b6caae5e3d8109a892a4d76197d339c767b90,2025-03-03T00:15:43.210000
CVE-2025-27583,0,0,18dfdb5a0ae261632796dbd76e99b9a1ffc071aa6c00449a4d28af735e378f81,2025-03-03T01:15:12.030000

Can't render this file because it is too large.