mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-19 17:31:42 +00:00
Auto-Update: 2025-04-28T16:00:20.643077+00:00
This commit is contained in:
parent
e7618c3201
commit
7e4b7aa9ce
60
CVE-2015/CVE-2015-20xx/CVE-2015-2079.json
Normal file
60
CVE-2015/CVE-2015-20xx/CVE-2015-2079.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2015-2079",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-04-28T15:15:44.007",
|
||||
"lastModified": "2025-04-28T15:15:44.007",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Usermin 0.980 through 1.x before 1.660 allows uconfig_save.cgi sig_file_free remote code execution because it uses the two argument (not three argument) form of Perl open."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cve@mitre.org",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
|
||||
"baseScore": 9.9,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 6.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cve@mitre.org",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-96"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://code-white.com/blog/2015-05-cve-2015-2079-rce-usermin/",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://code-white.com/public-vulnerability-list/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-23740",
|
||||
"sourceIdentifier": "product-cna@github.com",
|
||||
"published": "2022-11-23T18:15:11.130",
|
||||
"lastModified": "2024-11-21T06:49:12.987",
|
||||
"lastModified": "2025-04-28T15:15:44.577",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-45422",
|
||||
"sourceIdentifier": "product.security@lge.com",
|
||||
"published": "2022-11-21T17:15:30.857",
|
||||
"lastModified": "2024-11-21T07:29:13.907",
|
||||
"lastModified": "2025-04-28T15:15:44.910",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-25837",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-16T18:15:08.907",
|
||||
"lastModified": "2024-10-30T15:35:08.810",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-04-28T14:06:50.453",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,14 +51,38 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "https://github.com/RatMD/bloghub-plugin/blob/master/CHANGELOG.md#version-139---stable",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
"nodes": [
|
||||
{
|
||||
"url": "https://www.getastra.com/blog/vulnerability/stored-xss-vulnerability-in-bloghub-plugin/",
|
||||
"source": "cve@mitre.org"
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:octobercms:october:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "1.3.8",
|
||||
"matchCriteriaId": "94235FE2-576B-4EDB-B53C-F087DE499A6A"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/RatMD/bloghub-plugin/blob/master/CHANGELOG.md#version-139---stable",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.getastra.com/blog/vulnerability/stored-xss-vulnerability-in-bloghub-plugin/",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-27717",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-07-05T17:15:11.423",
|
||||
"lastModified": "2024-11-21T09:04:56.707",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-04-28T14:47:26.353",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,14 +51,38 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "https://blog.be-hacktive.com/eskooly-cve/cve-2024-27717-cross-site-request-forgery-csrf-in-eskooly-web-product-less-than-v3.0",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
"nodes": [
|
||||
{
|
||||
"url": "https://blog.be-hacktive.com/eskooly-cve/cve-2024-27717-cross-site-request-forgery-csrf-in-eskooly-web-product-less-than-v3.0",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:eskooly:eskooly:*:*:*:*:-:-:*:*",
|
||||
"versionEndIncluding": "3.0",
|
||||
"matchCriteriaId": "DFA23144-8E06-4F22-AE7F-2A3D06F2C4CD"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://blog.be-hacktive.com/eskooly-cve/cve-2024-27717-cross-site-request-forgery-csrf-in-eskooly-web-product-less-than-v3.0",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://blog.be-hacktive.com/eskooly-cve/cve-2024-27717-cross-site-request-forgery-csrf-in-eskooly-web-product-less-than-v3.0",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-35538",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-19T21:15:09.850",
|
||||
"lastModified": "2024-08-20T15:44:20.567",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-04-28T14:00:34.500",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -55,14 +55,39 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "https://cyberaz0r.info/2024/08/typecho-multiple-vulnerabilities/",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
"nodes": [
|
||||
{
|
||||
"url": "https://typecho.org",
|
||||
"source": "cve@mitre.org"
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:typecho:typecho:1.3.0:-:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "95BE475D-DE29-4126-ABF3-FC9BB0382419"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://cyberaz0r.info/2024/08/typecho-multiple-vulnerabilities/",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory",
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://typecho.org",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-38909",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-07-30T14:15:02.897",
|
||||
"lastModified": "2025-03-14T19:15:46.707",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-04-28T14:35:52.783",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -40,6 +40,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -51,22 +61,51 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "http://elfinder.com",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
"nodes": [
|
||||
{
|
||||
"url": "https://github.com/B0D0B0P0T/CVE/blob/main/CVE-2024-38909",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"url": "http://elfinder.com",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/B0D0B0P0T/CVE/blob/main/CVE-2024-38909",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:std42:elfinder:2.1.64:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6C76D05F-90D4-4EF5-B048-D517C949E461"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://elfinder.com",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/B0D0B0P0T/CVE/blob/main/CVE-2024-38909",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://elfinder.com",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/B0D0B0P0T/CVE/blob/main/CVE-2024-38909",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-38996",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-07-01T13:15:05.103",
|
||||
"lastModified": "2024-11-21T09:27:04.387",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-04-28T14:37:52.810",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,30 +51,72 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "https://gist.github.com/mestrtee/18e8c27f3a6376e7cf082cfe1ca766fa",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
"nodes": [
|
||||
{
|
||||
"url": "https://gist.github.com/mestrtee/c1590660750744f25e86ba1bf240844b",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"url": "https://gist.github.com/mestrtee/f8037d492dab0d77bca719e05d31c08b",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://gist.github.com/mestrtee/18e8c27f3a6376e7cf082cfe1ca766fa",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
},
|
||||
{
|
||||
"url": "https://gist.github.com/mestrtee/c1590660750744f25e86ba1bf240844b",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
},
|
||||
{
|
||||
"url": "https://gist.github.com/mestrtee/f8037d492dab0d77bca719e05d31c08b",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ag-grid:ag-grid:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "31.3.4",
|
||||
"matchCriteriaId": "4DC27DDE-3069-432F-9A7B-EB5F7957EE78"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/mestrtee/18e8c27f3a6376e7cf082cfe1ca766fa",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://gist.github.com/mestrtee/c1590660750744f25e86ba1bf240844b",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://gist.github.com/mestrtee/f8037d492dab0d77bca719e05d31c08b",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://gist.github.com/mestrtee/18e8c27f3a6376e7cf082cfe1ca766fa",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://gist.github.com/mestrtee/c1590660750744f25e86ba1bf240844b",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://gist.github.com/mestrtee/f8037d492dab0d77bca719e05d31c08b",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-40425",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-07-16T18:15:08.433",
|
||||
"lastModified": "2024-11-21T09:31:05.133",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-04-28T14:46:31.877",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,14 +51,38 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "https://gist.github.com/J1rrY-learn/26524d4714a81cf2d64583069e96f765",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
"nodes": [
|
||||
{
|
||||
"url": "https://gist.github.com/J1rrY-learn/26524d4714a81cf2d64583069e96f765",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sparkshop:sparkshop:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "1.1.7",
|
||||
"matchCriteriaId": "7B591554-F401-4A89-8DA6-1425B7D63B13"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/J1rrY-learn/26524d4714a81cf2d64583069e96f765",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://gist.github.com/J1rrY-learn/26524d4714a81cf2d64583069e96f765",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-40455",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-07-16T20:15:03.587",
|
||||
"lastModified": "2025-03-13T15:15:46.557",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-04-28T14:44:33.090",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,14 +51,39 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "https://gold-textbook-8ff.notion.site/ThinkSAAS-Arbitrary-folder-deletion-vulnerability-f992ed6124bc46ccaa8c2982274b17e2?pvs=25",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
"nodes": [
|
||||
{
|
||||
"url": "https://gold-textbook-8ff.notion.site/ThinkSAAS-Arbitrary-folder-deletion-vulnerability-f992ed6124bc46ccaa8c2982274b17e2?pvs=25",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:thinksaas:thinksaas:3.70:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4886BF91-72D0-4758-A534-20C33E4219A8"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gold-textbook-8ff.notion.site/ThinkSAAS-Arbitrary-folder-deletion-vulnerability-f992ed6124bc46ccaa8c2982274b17e2?pvs=25",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://gold-textbook-8ff.notion.site/ThinkSAAS-Arbitrary-folder-deletion-vulnerability-f992ed6124bc46ccaa8c2982274b17e2?pvs=25",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-40456",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-07-16T20:15:03.687",
|
||||
"lastModified": "2024-11-21T09:31:07.020",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-04-28T14:43:04.063",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,14 +51,39 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "https://www.notion.so/ThinkSAAS-administrator-backend-SQL-injection-3a5c8c72fc374446892f8dc81ec94923?pvs=4",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
"nodes": [
|
||||
{
|
||||
"url": "https://www.notion.so/ThinkSAAS-administrator-backend-SQL-injection-3a5c8c72fc374446892f8dc81ec94923?pvs=4",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:thinksaas:thinksaas:3.70:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4886BF91-72D0-4758-A534-20C33E4219A8"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.notion.so/ThinkSAAS-administrator-backend-SQL-injection-3a5c8c72fc374446892f8dc81ec94923?pvs=4",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.notion.so/ThinkSAAS-administrator-backend-SQL-injection-3a5c8c72fc374446892f8dc81ec94923?pvs=4",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-40482",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-12T13:38:29.180",
|
||||
"lastModified": "2024-08-13T01:13:50.130",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-04-28T14:32:00.203",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,10 +51,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "https://github.com/takekaramey/CVE_Writeup/blob/main/Kashipara/Live%20Membership%20System%20v1.0/Unrestricted%20File%20Upload.pdf",
|
||||
"source": "cve@mitre.org"
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:lopalopa:live_membership_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "933687D6-2726-4893-A846-11C853AF1412"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/takekaramey/CVE_Writeup/blob/main/Kashipara/Live%20Membership%20System%20v1.0/Unrestricted%20File%20Upload.pdf",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-40486",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-12T13:38:29.360",
|
||||
"lastModified": "2024-08-13T01:13:52.383",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-04-28T14:29:24.907",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,14 +51,38 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "https://github.com/takekaramey/CVE_Writeup/blob/main/Kashipara/Live%20Membership%20System%20v1.0/SQL%20Injection.pdf",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
"nodes": [
|
||||
{
|
||||
"url": "https://www.kashipara.com/project/php/12997/live-membership-system-in-php-php-project-source-code",
|
||||
"source": "cve@mitre.org"
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:lopalopa:live_membership_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "933687D6-2726-4893-A846-11C853AF1412"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/takekaramey/CVE_Writeup/blob/main/Kashipara/Live%20Membership%20System%20v1.0/SQL%20Injection.pdf",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.kashipara.com/project/php/12997/live-membership-system-in-php-php-project-source-code",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-40487",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-12T13:38:29.447",
|
||||
"lastModified": "2024-08-23T15:35:06.307",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-04-28T14:28:51.710",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,14 +51,38 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "https://github.com/takekaramey/CVE_Writeup/blob/main/Kashipara/Live%20Membership%20System%20v1.0/Stored%20XSS.pdf",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
"nodes": [
|
||||
{
|
||||
"url": "https://www.kashipara.com/project/php/12997/live-membership-system-in-php-php-project-source-code",
|
||||
"source": "cve@mitre.org"
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:lopalopa:live_membership_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "933687D6-2726-4893-A846-11C853AF1412"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/takekaramey/CVE_Writeup/blob/main/Kashipara/Live%20Membership%20System%20v1.0/Stored%20XSS.pdf",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.kashipara.com/project/php/12997/live-membership-system-in-php-php-project-source-code",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-40488",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-12T13:38:29.537",
|
||||
"lastModified": "2024-08-13T01:13:53.230",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-04-28T14:24:28.293",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,14 +51,38 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "https://capec.mitre.org/data/definitions/62.html",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
"nodes": [
|
||||
{
|
||||
"url": "https://github.com/takekaramey/CVE_Writeup/blob/main/Kashipara/Live%20Membership%20System%20v1.0/CSRF.pdf",
|
||||
"source": "cve@mitre.org"
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:lopalopa:live_membership_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "933687D6-2726-4893-A846-11C853AF1412"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://capec.mitre.org/data/definitions/62.html",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/takekaramey/CVE_Writeup/blob/main/Kashipara/Live%20Membership%20System%20v1.0/CSRF.pdf",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-42794",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-09-16T20:15:46.770",
|
||||
"lastModified": "2024-09-20T12:31:20.110",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-04-28T15:09:59.570",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -40,6 +40,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -51,14 +61,38 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "https://github.com/takekaramey/CVE_Writeup/blob/main/Kashipara/Music%20Management%20System%20v1.0/Broken%20Access%20Control%20-%20Save%20User%20%26%20Account%20Takeover.pdf",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
"nodes": [
|
||||
{
|
||||
"url": "https://www.kashipara.com/project/php/12978/music-management-system-in-php-php-project-source-code",
|
||||
"source": "cve@mitre.org"
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:lopalopa:music_management_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B9E63270-AF05-41C1-8464-61ECA2425ABA"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/takekaramey/CVE_Writeup/blob/main/Kashipara/Music%20Management%20System%20v1.0/Broken%20Access%20Control%20-%20Save%20User%20%26%20Account%20Takeover.pdf",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.kashipara.com/project/php/12978/music-management-system-in-php-php-project-source-code",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-42795",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-09-16T20:15:46.830",
|
||||
"lastModified": "2024-09-20T12:31:20.110",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-04-28T15:08:25.213",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -40,6 +40,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -51,14 +61,38 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "https://github.com/takekaramey/CVE_Writeup/blob/main/Kashipara/Music%20Management%20System%20v1.0/Broken%20Access%20Control%20-%20View%20User.pdf",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
"nodes": [
|
||||
{
|
||||
"url": "https://www.kashipara.com/",
|
||||
"source": "cve@mitre.org"
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:lopalopa:music_management_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B9E63270-AF05-41C1-8464-61ECA2425ABA"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/takekaramey/CVE_Writeup/blob/main/Kashipara/Music%20Management%20System%20v1.0/Broken%20Access%20Control%20-%20View%20User.pdf",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.kashipara.com/",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-42796",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-09-16T20:15:46.890",
|
||||
"lastModified": "2024-09-20T12:31:20.110",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-04-28T14:56:46.983",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -40,6 +40,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -51,14 +61,38 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "https://github.com/takekaramey/CVE_Writeup/blob/main/Kashipara/Music%20Management%20System%20v1.0/Broken%20Access%20Control%20-%20Delete%20Genre.pdf",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
"nodes": [
|
||||
{
|
||||
"url": "https://www.kashipara.com/project/php/12978/music-management-system-in-php-php-project-source-code",
|
||||
"source": "cve@mitre.org"
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:lopalopa:music_management_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B9E63270-AF05-41C1-8464-61ECA2425ABA"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/takekaramey/CVE_Writeup/blob/main/Kashipara/Music%20Management%20System%20v1.0/Broken%20Access%20Control%20-%20Delete%20Genre.pdf",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.kashipara.com/project/php/12978/music-management-system-in-php-php-project-source-code",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-42798",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-09-16T20:15:46.957",
|
||||
"lastModified": "2024-09-20T12:31:20.110",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-04-28T14:56:09.830",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -40,6 +40,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -51,14 +61,38 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "https://github.com/takekaramey/CVE_Writeup/blob/main/Kashipara/Music%20Management%20System%20v1.0/Broken%20Access%20Control%20-%20Priv%20Esc%20-%20Save%20Edit%20User%20-%20AC%20Takeover.pdf",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
"nodes": [
|
||||
{
|
||||
"url": "https://www.kashipara.com/",
|
||||
"source": "cve@mitre.org"
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:lopalopa:music_management_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B9E63270-AF05-41C1-8464-61ECA2425ABA"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/takekaramey/CVE_Writeup/blob/main/Kashipara/Music%20Management%20System%20v1.0/Broken%20Access%20Control%20-%20Priv%20Esc%20-%20Save%20Edit%20User%20-%20AC%20Takeover.pdf",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.kashipara.com/",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-42994",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-16T17:15:15.153",
|
||||
"lastModified": "2024-08-19T13:00:23.117",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-04-28T14:10:13.853",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,10 +51,32 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "https://www.shielder.com/advisories/vtiger-mailmanager-sqli/",
|
||||
"source": "cve@mitre.org"
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:vtiger:vtiger_crm:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "8.1.0",
|
||||
"matchCriteriaId": "55C5E8CB-FCC4-4211-A9ED-1AFDE2F99280"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.shielder.com/advisories/vtiger-mailmanager-sqli/",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-42995",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-16T17:15:15.273",
|
||||
"lastModified": "2024-08-19T13:00:23.117",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-04-28T14:09:10.273",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -40,6 +40,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +61,32 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "https://www.shielder.com/advisories/vtiger-migration-bac/",
|
||||
"source": "cve@mitre.org"
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:vtiger:vtiger_crm:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "8.1.0",
|
||||
"matchCriteriaId": "55C5E8CB-FCC4-4211-A9ED-1AFDE2F99280"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.shielder.com/advisories/vtiger-migration-bac/",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-44571",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-09-11T17:15:13.630",
|
||||
"lastModified": "2024-09-12T12:35:54.013",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-04-28T15:22:14.460",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -40,6 +40,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -51,14 +61,51 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "http://system-on-chip.com",
|
||||
"source": "cve@mitre.org"
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:relyum:rely-pcie_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "22.2.1",
|
||||
"versionEndIncluding": "23.1.0",
|
||||
"matchCriteriaId": "293D0284-65A6-43B4-9E25-5B6F06F4350B"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.relyum.com/web/support/vulnerability-report/",
|
||||
"source": "cve@mitre.org"
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:relyum:rely-pcie:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "56F42305-83EB-4393-95A4-268E3C1DEB81"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://system-on-chip.com",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.relyum.com/web/support/vulnerability-report/",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-44572",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-09-11T17:15:13.677",
|
||||
"lastModified": "2024-09-12T12:35:54.013",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-04-28T15:20:25.193",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,14 +51,51 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "http://system-on-chip.com",
|
||||
"source": "cve@mitre.org"
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:relyum:rely-pcie_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "22.2.1",
|
||||
"versionEndIncluding": "23.1.0",
|
||||
"matchCriteriaId": "293D0284-65A6-43B4-9E25-5B6F06F4350B"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.relyum.com/web/support/vulnerability-report/",
|
||||
"source": "cve@mitre.org"
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:relyum:rely-pcie:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "56F42305-83EB-4393-95A4-268E3C1DEB81"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://system-on-chip.com",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.relyum.com/web/support/vulnerability-report/",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-44573",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-09-11T17:15:13.727",
|
||||
"lastModified": "2024-11-01T19:35:27.177",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-04-28T15:18:27.100",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,14 +51,51 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "http://system-on-chip.com",
|
||||
"source": "cve@mitre.org"
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:relyum:rely-pcie_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "22.2.1",
|
||||
"versionEndIncluding": "23.1.0",
|
||||
"matchCriteriaId": "293D0284-65A6-43B4-9E25-5B6F06F4350B"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.relyum.com/web/support/vulnerability-report/",
|
||||
"source": "cve@mitre.org"
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:relyum:rely-pcie:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "56F42305-83EB-4393-95A4-268E3C1DEB81"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://system-on-chip.com",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.relyum.com/web/support/vulnerability-report/",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-44574",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-09-11T17:15:13.770",
|
||||
"lastModified": "2024-09-12T12:35:54.013",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-04-28T15:16:15.657",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,14 +51,51 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "http://system-on-chip.com",
|
||||
"source": "cve@mitre.org"
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:relyum:rely-pcie_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "22.2.1",
|
||||
"versionEndIncluding": "23.1.0",
|
||||
"matchCriteriaId": "293D0284-65A6-43B4-9E25-5B6F06F4350B"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.relyum.com/web/support/vulnerability-report/",
|
||||
"source": "cve@mitre.org"
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:relyum:rely-pcie:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "56F42305-83EB-4393-95A4-268E3C1DEB81"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://system-on-chip.com",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.relyum.com/web/support/vulnerability-report/",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-44575",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-09-11T17:15:13.820",
|
||||
"lastModified": "2024-11-25T18:15:12.667",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-04-28T15:14:44.490",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,14 +51,51 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "http://system-on-chip.com",
|
||||
"source": "cve@mitre.org"
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:relyum:rely-pcie_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "22.2.1",
|
||||
"versionEndIncluding": "23.1.0",
|
||||
"matchCriteriaId": "293D0284-65A6-43B4-9E25-5B6F06F4350B"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.relyum.com/web/support/vulnerability-report/",
|
||||
"source": "cve@mitre.org"
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:relyum:rely-pcie:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "56F42305-83EB-4393-95A4-268E3C1DEB81"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://system-on-chip.com",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.relyum.com/web/support/vulnerability-report/",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-44577",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-09-11T17:15:13.870",
|
||||
"lastModified": "2024-09-12T12:35:54.013",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-04-28T15:13:42.720",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,14 +51,51 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "http://system-on-chip.com",
|
||||
"source": "cve@mitre.org"
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:relyum:rely-pcie_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "22.2.1",
|
||||
"versionEndIncluding": "23.1.0",
|
||||
"matchCriteriaId": "293D0284-65A6-43B4-9E25-5B6F06F4350B"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.relyum.com/web/support/vulnerability-report/",
|
||||
"source": "cve@mitre.org"
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:relyum:rely-pcie:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "56F42305-83EB-4393-95A4-268E3C1DEB81"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://system-on-chip.com",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.relyum.com/web/support/vulnerability-report/",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-8372",
|
||||
"sourceIdentifier": "36c7be3b-2937-45df-85ea-ca7133ea542c",
|
||||
"published": "2024-09-09T15:15:12.560",
|
||||
"lastModified": "2025-02-12T20:14:39.330",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2025-04-28T14:15:20.107",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [
|
||||
{
|
||||
"sourceIdentifier": "36c7be3b-2937-45df-85ea-ca7133ea542c",
|
||||
@ -15,7 +15,7 @@
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper sanitization of the value of the '[srcset]' attribute in AngularJS allows attackers to bypass common image source restrictions, which can also lead to a form of Content Spoofing https://owasp.org/www-community/attacks/Content_Spoofing .\n\nThis issue affects AngularJS versions 1.3.0-rc.4 and greater.\n\nNote:\nThe AngularJS project is End-of-Life and will not receive any updates to address this issue. For more information see here https://docs.angularjs.org/misc/version-support-status ."
|
||||
"value": "Improper sanitization of the value of the 'srcset' attribute in AngularJS allows attackers to bypass common image source restrictions, which can also lead to a form of Content Spoofing https://owasp.org/www-community/attacks/Content_Spoofing .\n\nThis issue affects AngularJS versions 1.3.0-rc.4 and greater.\n\nNote:\nThe AngularJS project is End-of-Life and will not receive any updates to address this issue. For more information see here https://docs.angularjs.org/misc/version-support-status ."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
56
CVE-2025/CVE-2025-233xx/CVE-2025-23375.json
Normal file
56
CVE-2025/CVE-2025-233xx/CVE-2025-23375.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-23375",
|
||||
"sourceIdentifier": "security_alert@emc.com",
|
||||
"published": "2025-04-28T15:15:45.157",
|
||||
"lastModified": "2025-04-28T15:15:45.157",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Dell PowerProtect Data Manager Reporting, version(s) 19.17, contain(s) an Incorrect Use of Privileged APIs vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Elevation of privileges."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security_alert@emc.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security_alert@emc.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-648"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.dell.com/support/kbdoc/en-us/000311083/dsa-2025-062-security-update-for-dell-powerprotect-data-manager-multiple-security-vulnerabilities",
|
||||
"source": "security_alert@emc.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2025/CVE-2025-233xx/CVE-2025-23376.json
Normal file
56
CVE-2025/CVE-2025-233xx/CVE-2025-23376.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-23376",
|
||||
"sourceIdentifier": "security_alert@emc.com",
|
||||
"published": "2025-04-28T15:15:45.303",
|
||||
"lastModified": "2025-04-28T15:15:45.303",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Dell PowerProtect Data Manager Reporting, version(s) 19.16, 19.17, 19.18, contain(s) an Improper Neutralization of Special Elements Used in a Template Engine vulnerability. A high privileged attacker with local access could potentially exploit this vulnerability, leading to information disclosure."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security_alert@emc.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N",
|
||||
"baseScore": 2.3,
|
||||
"baseSeverity": "LOW",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security_alert@emc.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-1336"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.dell.com/support/kbdoc/en-us/000311083/dsa-2025-062-security-update-for-dell-powerprotect-data-manager-multiple-security-vulnerabilities",
|
||||
"source": "security_alert@emc.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2025/CVE-2025-233xx/CVE-2025-23377.json
Normal file
56
CVE-2025/CVE-2025-233xx/CVE-2025-23377.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-23377",
|
||||
"sourceIdentifier": "security_alert@emc.com",
|
||||
"published": "2025-04-28T15:15:45.437",
|
||||
"lastModified": "2025-04-28T15:15:45.437",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Dell PowerProtect Data Manager Reporting, version(s) 19.17, 19.18 contain(s) an Improper Encoding or Escaping of Output vulnerability. A high privileged attacker with local access could potentially exploit this vulnerability to inject arbitrary web script or html in reporting outputs."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security_alert@emc.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 4.2,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 0.6,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security_alert@emc.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-116"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.dell.com/support/kbdoc/en-us/000311083/dsa-2025-062-security-update-for-dell-powerprotect-data-manager-multiple-security-vulnerabilities",
|
||||
"source": "security_alert@emc.com"
|
||||
}
|
||||
]
|
||||
}
|
25
CVE-2025/CVE-2025-257xx/CVE-2025-25776.json
Normal file
25
CVE-2025/CVE-2025-257xx/CVE-2025-25776.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2025-25776",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-04-28T15:15:45.587",
|
||||
"lastModified": "2025-04-28T15:15:45.587",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cross-Site Scripting (XSS) vulnerability exists in the User Registration and User Profile features of Codeastro Bus Ticket Booking System v1.0 allows an attacker to execute arbitrary code into the Full Name and Address fields during user registration or profile editing."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://codeastro.com/bus-ticket-booking-system-in-php-codeigniter-with-source-code/",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/arunmodi/Vulnerability-Research/tree/main/CVE-2025-25776",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-39735",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2025-04-18T07:15:44.150",
|
||||
"lastModified": "2025-04-21T14:23:45.950",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-04-28T14:37:34.487",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,43 +15,187 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: jfs: correcci\u00f3n de lectura fuera de los l\u00edmites de slab en ea_get(). Durante la etiqueta \"size_check\" en ea_get(), el c\u00f3digo comprueba si el tama\u00f1o de la lista de atributos extendidos (xattr) coincide con ea_size. De lo contrario, registra \"ea_get: atributo extendido no v\u00e1lido\" y llama a print_hex_dump(). En este caso, EALIST_SIZE(ea_buf->xattr) devuelve 4110417968, que excede INT_MAX (2147483647). A continuaci\u00f3n, se fija ea_size: int size = clamp_t(int, ea_size, 0, EALIST_SIZE(ea_buf->xattr)); Aunque clamp_t busca limitar ea_size entre 0 y 4110417968, el l\u00edmite superior se trata como un entero, lo que provoca un desbordamiento por encima de 2^31 - 1. Esto hace que \"size\" se repita y se vuelva negativo (-184549328). El \"size\" se pasa a print_hex_dump() (llamado \"len\" en print_hex_dump()) como tipo size_t (un tipo sin signo). Este se almacena en una variable llamada \"int remaining\", que se asigna a \"int linelen\", que a su vez se pasa a hex_dump_to_buffer(). En print_hex_dump(), el bucle for itera desde 0 hasta len-1, donde len es 18446744073525002176 y llama a hex_dump_to_buffer() en cada iteraci\u00f3n: for (i = 0; i < len; i += rowsize) { linelen = min(remaining, rowsize); remaining -= rowsize; hex_dump_to_buffer(ptr + i, linelen, rowsize, groupsize, linebuf, sizeof(linebuf), ascii); ... } La condici\u00f3n de detenci\u00f3n esperada (i < len) se rompe efectivamente ya que len est\u00e1 da\u00f1ado y es muy grande. Esto eventualmente lleva a que \"ptr+i\" se pase a hex_dump_to_buffer() para acercarse al final de los l\u00edmites reales de \"ptr\", eventualmente se realiza un acceso fuera de los l\u00edmites en hex_dump_to_buffer() en el siguiente bucle for: for (j = 0; j < len; j++) { if (linebuflen < lx + 2) goto overflow2; ch = ptr[j]; ... } Para solucionar esto debemos validar \"EALIST_SIZE(ea_buf->xattr)\" antes de utilizarlo."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/0beddc2a3f9b9cf7d8887973041e36c2d0fa3652",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/16d3d36436492aa248b2d8045e75585ebcc2f34d",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/3d6fd5b9c6acbc005e53d0211c7381f566babec1",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/46e2c031aa59ea65128991cbca474bd5c0c2ecdb",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/50afcee7011155933d8d5e8832f52eeee018cfd3",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/5263822558a8a7c0d0248d5679c2dcf4d5cda61f",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/78c9cbde8880ec02d864c166bcb4fe989ce1d95f",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/a8c31808925b11393a6601f534bb63bac5366bab",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/fdf480da5837c23b146c4743c18de97202fcab37",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"lang": "en",
|
||||
"value": "CWE-125"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.19.325",
|
||||
"versionEndExcluding": "4.20",
|
||||
"matchCriteriaId": "3C960EB7-4E90-49E0-BB92-BE6F1B8CF26F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.4.287",
|
||||
"versionEndExcluding": "5.4.292",
|
||||
"matchCriteriaId": "16E1C46D-7C0B-4307-928A-8D0ABDF8D1B8"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.10.231",
|
||||
"versionEndExcluding": "5.10.236",
|
||||
"matchCriteriaId": "8F0C4A9A-87C3-4779-923D-5E19C9A26EA9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.15.174",
|
||||
"versionEndExcluding": "5.15.180",
|
||||
"matchCriteriaId": "B6B383DC-5ED6-4326-885D-2F161A71E2D5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.1.120",
|
||||
"versionEndExcluding": "6.1.134",
|
||||
"matchCriteriaId": "B9344B2D-88D1-4540-9748-8CC37D3B25C8"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.6.64",
|
||||
"versionEndExcluding": "6.6.87",
|
||||
"matchCriteriaId": "042FFA18-3C6A-4999-AB8F-4F6F5902BEEA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.11.11",
|
||||
"versionEndExcluding": "6.12",
|
||||
"matchCriteriaId": "4CBF5F6E-D446-4CAE-AAA4-413442319824"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.12.2",
|
||||
"versionEndExcluding": "6.12.23",
|
||||
"matchCriteriaId": "B5C71FC9-A61C-431A-9215-38D09F5A2FF3"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.13",
|
||||
"versionEndExcluding": "6.13.11",
|
||||
"matchCriteriaId": "E7E864B0-8C00-4679-BA55-659B4C9C3AD3"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.14",
|
||||
"versionEndExcluding": "6.14.2",
|
||||
"matchCriteriaId": "FADAE5D8-4808-442C-B218-77B2CE8780A0"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/0beddc2a3f9b9cf7d8887973041e36c2d0fa3652",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/16d3d36436492aa248b2d8045e75585ebcc2f34d",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/3d6fd5b9c6acbc005e53d0211c7381f566babec1",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/46e2c031aa59ea65128991cbca474bd5c0c2ecdb",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/50afcee7011155933d8d5e8832f52eeee018cfd3",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/5263822558a8a7c0d0248d5679c2dcf4d5cda61f",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/78c9cbde8880ec02d864c166bcb4fe989ce1d95f",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/a8c31808925b11393a6601f534bb63bac5366bab",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/fdf480da5837c23b146c4743c18de97202fcab37",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-39755",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2025-04-18T07:15:44.263",
|
||||
"lastModified": "2025-04-21T14:23:45.950",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-04-28T15:32:46.553",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,19 +15,89 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: staging: gpib: Fix cb7210 pcmcia Oops. La estructura pcmcia_driver segu\u00eda usando \u00fanicamente la inicializaci\u00f3n anterior de .name en el campo drv. Esto provocaba un puntero nulo deref Oops en strcmp llamado desde pcmcia_register_driver. Inicialice el campo name de la estructura pcmcia_driver."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/7ec50077d7f6647cb6ba3a2a20a6c26f51259c7d",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/c1baf6528bcfd6a86842093ff3f8ff8caf309c12",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/c82ae06f49e70d1c14ee9c76c392345856d050c9",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-476"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.13",
|
||||
"versionEndExcluding": "6.13.11",
|
||||
"matchCriteriaId": "E7E864B0-8C00-4679-BA55-659B4C9C3AD3"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.14",
|
||||
"versionEndExcluding": "6.14.2",
|
||||
"matchCriteriaId": "FADAE5D8-4808-442C-B218-77B2CE8780A0"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/7ec50077d7f6647cb6ba3a2a20a6c26f51259c7d",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/c1baf6528bcfd6a86842093ff3f8ff8caf309c12",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/c82ae06f49e70d1c14ee9c76c392345856d050c9",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-39778",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2025-04-18T07:15:44.363",
|
||||
"lastModified": "2025-04-21T14:23:45.950",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-04-28T15:37:34.230",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,23 +15,103 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: objtool, nvmet: Se corrige el acceso a la pila fuera de los l\u00edmites en nvmet_ctrl_state_show(). La matriz csts_state_names[] solo tiene seis entradas dispersas, pero el c\u00f3digo de iteraci\u00f3n en nvmet_ctrl_state_show() itera siete, lo que resulta en una posible lectura de la pila fuera de los l\u00edmites. Se soluciona. Se corrige la siguiente advertencia con un kernel UBSAN: vmlinux.o: advertencia: objtool: .text.nvmet_ctrl_state_show: final inesperado de secci\u00f3n."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/0cc0efc58d6c741b2868d4af24874d7fec28a575",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/107a23185d990e3df6638d9a84c835f963fe30a6",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/1adc93a525fdee8e2b311e6d5fd93eb69714ca05",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/8fbf37a3577b4d64c150cafde338eee17b2f2ea4",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"lang": "en",
|
||||
"value": "CWE-125"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.11",
|
||||
"versionEndExcluding": "6.12.23",
|
||||
"matchCriteriaId": "36AF5265-52FA-43B1-996B-D05FDF2FCCDF"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.13",
|
||||
"versionEndExcluding": "6.13.11",
|
||||
"matchCriteriaId": "E7E864B0-8C00-4679-BA55-659B4C9C3AD3"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.14",
|
||||
"versionEndExcluding": "6.14.2",
|
||||
"matchCriteriaId": "FADAE5D8-4808-442C-B218-77B2CE8780A0"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/0cc0efc58d6c741b2868d4af24874d7fec28a575",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/107a23185d990e3df6638d9a84c835f963fe30a6",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/1adc93a525fdee8e2b311e6d5fd93eb69714ca05",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/8fbf37a3577b4d64c150cafde338eee17b2f2ea4",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-3960",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-04-27T06:15:14.870",
|
||||
"lastModified": "2025-04-27T06:15:14.870",
|
||||
"lastModified": "2025-04-28T15:15:45.817",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [
|
||||
{
|
||||
@ -16,6 +16,10 @@
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in withstars Books-Management-System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /allreaders.html of the component Background Interface. The manipulation leads to missing authorization. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se encontr\u00f3 una vulnerabilidad en withstars Books-Management-System 1.0. Se ha clasificado como cr\u00edtica. Este problema afecta a una funcionalidad desconocida del archivo /allreaders.html del componente Background Interface. La manipulaci\u00f3n provoca la p\u00e9rdida de autorizaci\u00f3n. El ataque puede ejecutarse remotamente. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Esta vulnerabilidad solo afecta a los productos que ya no reciben soporte del fabricante."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -66,7 +70,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||||
@ -114,7 +118,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -143,6 +147,10 @@
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.557230",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/caigo8/CVE-md/blob/main/Books-Management-System/%E6%9C%AA%E6%8E%88%E6%9D%83%E8%AE%BF%E9%97%AE.md",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-3961",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-04-27T07:15:15.307",
|
||||
"lastModified": "2025-04-27T07:15:15.307",
|
||||
"lastModified": "2025-04-28T15:15:45.943",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [
|
||||
{
|
||||
@ -16,6 +16,10 @@
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability classified as problematic has been found in withstars Books-Management-System 1.0. This affects an unknown part of the file /admin/article/add/do. The manipulation of the argument Title leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well. This vulnerability only affects products that are no longer supported by the maintainer."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se ha detectado una vulnerabilidad clasificada como problem\u00e1tica en withstars Books-Management-System 1.0. Esta afecta a una parte desconocida del archivo /admin/article/add/do. La manipulaci\u00f3n del argumento \"T\u00edtulo\" provoca ataques de cross-site scripting. Es posible iniciar el ataque de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Otros par\u00e1metros tambi\u00e9n podr\u00edan verse afectados. Esta vulnerabilidad solo afecta a los productos que ya no reciben soporte del fabricante."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -66,7 +70,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
|
||||
@ -114,7 +118,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -143,6 +147,10 @@
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.557231",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/caigo8/CVE-md/blob/main/Blog-System/XSS1.md",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-3962",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-04-27T07:15:15.580",
|
||||
"lastModified": "2025-04-27T07:15:15.580",
|
||||
"lastModified": "2025-04-28T15:15:46.060",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [
|
||||
{
|
||||
@ -16,6 +16,10 @@
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability classified as problematic was found in withstars Books-Management-System 1.0. This vulnerability affects unknown code of the file /api/comment/add of the component Comment Handler. The manipulation of the argument content leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se encontr\u00f3 una vulnerabilidad clasificada como problem\u00e1tica en withstars Books-Management-System 1.0. Esta vulnerabilidad afecta al c\u00f3digo desconocido del archivo /api/comment/add del componente Comment Handler. La manipulaci\u00f3n del contenido del argumento provoca ataques de cross site scripting. El ataque puede iniciarse remotamente. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Esta vulnerabilidad solo afecta a los productos que ya no reciben soporte del fabricante."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -66,7 +70,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
|
||||
@ -114,7 +118,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -143,6 +147,10 @@
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.557236",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/caigo8/CVE-md/blob/main/Blog-System/XSS2.md",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-3963",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-04-27T08:15:14.353",
|
||||
"lastModified": "2025-04-27T08:15:14.353",
|
||||
"lastModified": "2025-04-28T15:15:46.180",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [
|
||||
{
|
||||
@ -16,6 +16,10 @@
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability, which was classified as critical, has been found in withstars Books-Management-System 1.0. This issue affects some unknown processing of the file /admin/article/list of the component Background Interface. The manipulation leads to missing authorization. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se ha detectado una vulnerabilidad clasificada como cr\u00edtica en withstars Books-Management-System 1.0. Este problema afecta a un procesamiento desconocido del archivo /admin/article/list del componente Background Interface. La manipulaci\u00f3n provoca la omisi\u00f3n de la autorizaci\u00f3n. El ataque puede iniciarse remotamente. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Esta vulnerabilidad solo afecta a los productos que ya no reciben soporte del fabricante."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -66,7 +70,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||||
@ -114,7 +118,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -143,6 +147,10 @@
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.557237",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/caigo8/CVE-md/blob/main/Blog-System/%E6%9C%AA%E6%8E%88%E6%9D%83%E8%AE%BF%E9%97%AE.md",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2025-3966",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-04-27T10:15:15.717",
|
||||
"lastModified": "2025-04-27T10:15:15.717",
|
||||
"lastModified": "2025-04-28T15:15:46.290",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in itwanger paicoding 1.0.3 and classified as problematic. Affected by this issue is some unknown functionality of the file /user/home?userId=1&homeSelectType=read of the component Browsing History Handler. The manipulation leads to information disclosure. The attack may be launched remotely. The exploit has been disclosed to the public and may be used."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se encontr\u00f3 una vulnerabilidad en itwanger paicing 1.0.3 y se clasific\u00f3 como problem\u00e1tica. Este problema afecta a una funcionalidad desconocida del archivo /user/home?userId=1&homeSelectType=read del componente Browsing History Handler. La manipulaci\u00f3n provoca la divulgaci\u00f3n de informaci\u00f3n. El ataque podr\u00eda ejecutarse remotamente. Se ha hecho p\u00fablico el exploit y puede que sea utilizado."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -59,7 +63,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
||||
@ -107,7 +111,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -140,6 +144,14 @@
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.557250",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/uglory-gll/javasec/blob/main/paicoding.md",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/uglory-gll/javasec/blob/main/paicoding.md#21userhomeuserid1homeselecttyperead-view-browsing-history-of-others",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2025-3967",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-04-27T11:15:16.743",
|
||||
"lastModified": "2025-04-27T11:15:16.743",
|
||||
"lastModified": "2025-04-28T15:15:46.410",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in itwanger paicoding 1.0.3. It has been classified as critical. This affects an unknown part of the file /article/api/post of the component Article Handler. The manipulation of the argument articleId leads to improper authorization. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se encontr\u00f3 una vulnerabilidad en itwanger paicing 1.0.3. Se ha clasificado como cr\u00edtica. Afecta una parte desconocida del archivo /article/api/post del componente Article Handler. La manipulaci\u00f3n del argumento articleId provoca una autorizaci\u00f3n incorrecta. Es posible iniciar el ataque de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -59,7 +63,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
|
||||
@ -107,7 +111,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -140,6 +144,10 @@
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.557251",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/uglory-gll/javasec/blob/main/paicoding.md",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2025-3968",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-04-27T11:15:16.950",
|
||||
"lastModified": "2025-04-27T11:15:16.950",
|
||||
"lastModified": "2025-04-28T15:15:46.527",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in codeprojects News Publishing Site Dashboard 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /api.php. The manipulation of the argument cat_id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se encontr\u00f3 una vulnerabilidad en codeprojects News Publishing Site Dashboard 1.0. Se ha declarado cr\u00edtica. Esta vulnerabilidad afecta al c\u00f3digo desconocido del archivo /api.php. La manipulaci\u00f3n del argumento cat_id provoca una inyecci\u00f3n SQL. El ataque puede iniciarse remotamente. Se ha hecho p\u00fablico el exploit y puede que sea utilizado."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -59,7 +63,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
@ -107,7 +111,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -136,6 +140,10 @@
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.557286",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/zzZxby/Vulnerability-Exploration/blob/main/%E4%BB%A3%E7%A0%81%E5%AE%A1%E8%AE%A11.md",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2025-3975",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-04-27T16:15:15.260",
|
||||
"lastModified": "2025-04-27T16:15:15.260",
|
||||
"lastModified": "2025-04-28T15:15:46.760",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in ScriptAndTools eCommerce-website-in-PHP 3.0 and classified as problematic. This issue affects some unknown processing of the file /admin/subscriber-csv.php. The manipulation leads to information disclosure. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se encontr\u00f3 una vulnerabilidad en ScriptAndTools eCommerce-website-in-PHP 3.0 y se clasific\u00f3 como problem\u00e1tica. Este problema afecta a un procesamiento desconocido del archivo /admin/subscriber-csv.php. La manipulaci\u00f3n provoca la divulgaci\u00f3n de informaci\u00f3n. El ataque podr\u00eda iniciarse remotamente. Se ha hecho p\u00fablico el exploit y puede que sea utilizado."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -59,7 +63,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||||
@ -107,7 +111,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -136,6 +140,10 @@
|
||||
{
|
||||
"url": "https://www.websecurityinsights.my.id/2025/04/script-and-tools-ecommerce-30_53.html",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.websecurityinsights.my.id/2025/04/script-and-tools-ecommerce-30_53.html",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2025-3977",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-04-27T17:15:15.853",
|
||||
"lastModified": "2025-04-27T17:15:15.853",
|
||||
"lastModified": "2025-04-28T14:15:21.520",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in iteachyou Dreamer CMS up to 4.1.3. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /admin/attachment/download of the component Attachment Handler. The manipulation of the argument ID leads to improper authorization. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se encontr\u00f3 una vulnerabilidad en iteachyou Dreamer CMS hasta la versi\u00f3n 4.1.3. Se ha declarado problem\u00e1tica. Esta vulnerabilidad afecta a una funcionalidad desconocida del archivo /admin/attachment/download del componente Attachment Handler. La manipulaci\u00f3n del ID del argumento provoca una autorizaci\u00f3n indebida. El ataque puede ejecutarse remotamente. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Se contact\u00f3 al proveedor con antelaci\u00f3n para informarle sobre esta divulgaci\u00f3n, pero no respondi\u00f3."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -59,7 +63,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
||||
@ -107,7 +111,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -136,6 +140,10 @@
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.557639",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://gitee.com/iteachyou/dreamer_cms/issues/IC13O1",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2025-3978",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-04-27T17:15:16.030",
|
||||
"lastModified": "2025-04-27T17:15:16.030",
|
||||
"lastModified": "2025-04-28T14:15:21.640",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in dazhouda lecms 3.0.3. It has been rated as problematic. Affected by this issue is some unknown functionality of the file admin/view/default/user_set.htm. The manipulation leads to information disclosure. The attack may be launched remotely. The exploit has been disclosed to the public and may be used."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se encontr\u00f3 una vulnerabilidad en dazhouda lecms 3.0.3. Se ha clasificado como problem\u00e1tica. Este problema afecta a una funcionalidad desconocida del archivo admin/view/default/user_set.htm. La manipulaci\u00f3n conlleva la divulgaci\u00f3n de informaci\u00f3n. El ataque podr\u00eda ejecutarse remotamente. Se ha hecho p\u00fablico el exploit y puede que sea utilizado."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -59,7 +63,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
||||
@ -107,7 +111,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -136,6 +140,10 @@
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.557748",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/dtwin88/cve-md/blob/main/lecms%20V3.0.3/lecms_2.md",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2025-3979",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-04-27T18:15:16.020",
|
||||
"lastModified": "2025-04-27T18:15:16.020",
|
||||
"lastModified": "2025-04-28T14:15:21.767",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability classified as problematic has been found in dazhouda lecms 3.0.3. This affects an unknown part of the file /index.php?my-password-ajax-1 of the component Password Change Handler. The manipulation leads to cross-site request forgery. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se ha detectado una vulnerabilidad clasificada como problem\u00e1tica en dazhouda lecms 3.0.3. Esta afecta a una parte desconocida del archivo /index.php?my-password-ajax-1 del componente Password Change Handler. Esta manipulaci\u00f3n provoca Cross-Site Request Forgery. Es posible iniciar el ataque de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -59,7 +63,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||||
@ -107,7 +111,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -136,6 +140,10 @@
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.557787",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/dtwin88/cve-md/blob/main/lecms%20V3.0.3/lecms_3.md",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2025-3980",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-04-27T18:15:16.237",
|
||||
"lastModified": "2025-04-27T18:15:16.237",
|
||||
"lastModified": "2025-04-28T14:15:21.890",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability classified as problematic was found in wowjoy \u6d59\u6c5f\u6e56\u5dde\u534e\u5353\u4fe1\u606f\u79d1\u6280\u6709\u9650\u516c\u53f8 Internet Doctor Workstation System 1.0. This vulnerability affects unknown code of the file /v1/prescription/list. The manipulation leads to improper authorization. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se encontr\u00f3 una vulnerabilidad clasificada como problem\u00e1tica en wowjoy ?????????????? Internet Doctor Workstation System 1.0. Esta vulnerabilidad afecta al c\u00f3digo desconocido del archivo /v1/prescription/list. La manipulaci\u00f3n da lugar a una autorizaci\u00f3n indebida. El ataque puede iniciarse remotamente. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Se contact\u00f3 al proveedor con antelaci\u00f3n sobre esta divulgaci\u00f3n, pero no respondi\u00f3."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -59,7 +63,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
||||
@ -107,7 +111,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -136,6 +140,10 @@
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.557930",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/38279/3/issues/1",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2025-3981",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-04-27T19:15:15.750",
|
||||
"lastModified": "2025-04-27T19:15:15.750",
|
||||
"lastModified": "2025-04-28T14:15:22.013",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability, which was classified as problematic, has been found in wowjoy \u6d59\u6c5f\u6e56\u5dde\u534e\u5353\u4fe1\u606f\u79d1\u6280\u6709\u9650\u516c\u53f8 Internet Doctor Workstation System 1.0. This issue affects some unknown processing of the file /v1/prescription/details/. The manipulation leads to improper authorization. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se ha detectado una vulnerabilidad clasificada como problem\u00e1tica en wowjoy ?????????????? Internet Doctor Workstation System 1.0. Este problema afecta a un procesamiento desconocido del archivo /v1/prescription/details/. La manipulaci\u00f3n da lugar a una autorizaci\u00f3n indebida. El ataque podr\u00eda iniciarse remotamente. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Se contact\u00f3 al proveedor con antelaci\u00f3n para informarle sobre esta divulgaci\u00f3n, pero no respondi\u00f3."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -59,7 +63,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
||||
@ -107,7 +111,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -132,6 +136,10 @@
|
||||
{
|
||||
"url": "https://vuldb.com/?id.306317",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/38279/3/issues/1",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
145
CVE-2025/CVE-2025-40xx/CVE-2025-4022.json
Normal file
145
CVE-2025/CVE-2025-40xx/CVE-2025-4022.json
Normal file
@ -0,0 +1,145 @@
|
||||
{
|
||||
"id": "CVE-2025-4022",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-04-28T14:15:22.867",
|
||||
"lastModified": "2025-04-28T14:15:22.867",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in web-arena-x webarena up to 0.2.0. It has been declared as critical. This vulnerability affects the function HTMLContentEvaluator of the file webarena/evaluation_harness/evaluators.py. The manipulation of the argument target[\"url\"] leads to code injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "LOW",
|
||||
"vulnIntegrityImpact": "LOW",
|
||||
"vulnAvailabilityImpact": "LOW",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
||||
"baseScore": 6.5,
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL"
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-74"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-94"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/web-arena-x/webarena/issues/194",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/web-arena-x/webarena/issues/194#issuecomment-2796165922",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.306376",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.306376",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.558415",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
145
CVE-2025/CVE-2025-40xx/CVE-2025-4023.json
Normal file
145
CVE-2025/CVE-2025-40xx/CVE-2025-4023.json
Normal file
@ -0,0 +1,145 @@
|
||||
{
|
||||
"id": "CVE-2025-4023",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-04-28T14:15:23.043",
|
||||
"lastModified": "2025-04-28T14:15:23.043",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in itsourcecode Placement Management System 1.0. It has been rated as critical. This issue affects some unknown processing of the file /add_company.php. The manipulation of the argument Name leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 6.9,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "LOW",
|
||||
"vulnIntegrityImpact": "LOW",
|
||||
"vulnAvailabilityImpact": "LOW",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||||
"baseScore": 7.3,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||||
"baseScore": 7.5,
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "NONE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL"
|
||||
},
|
||||
"baseSeverity": "HIGH",
|
||||
"exploitabilityScore": 10.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-74"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/xingyu-wu4678/cve/issues/1",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://itsourcecode.com/",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.306377",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.306377",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.558546",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
145
CVE-2025/CVE-2025-40xx/CVE-2025-4024.json
Normal file
145
CVE-2025/CVE-2025-40xx/CVE-2025-4024.json
Normal file
@ -0,0 +1,145 @@
|
||||
{
|
||||
"id": "CVE-2025-4024",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-04-28T15:15:47.600",
|
||||
"lastModified": "2025-04-28T15:15:47.600",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability classified as critical has been found in itsourcecode Placement Management System 1.0. Affected is an unknown function of the file /add_drive.php. The manipulation of the argument drive_title leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 6.9,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "LOW",
|
||||
"vulnIntegrityImpact": "LOW",
|
||||
"vulnAvailabilityImpact": "LOW",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||||
"baseScore": 7.3,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||||
"baseScore": 7.5,
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "NONE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL"
|
||||
},
|
||||
"baseSeverity": "HIGH",
|
||||
"exploitabilityScore": 10.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-74"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/xingyu-wu4678/cve/issues/2",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://itsourcecode.com/",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.306378",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.306378",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.558616",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
145
CVE-2025/CVE-2025-40xx/CVE-2025-4025.json
Normal file
145
CVE-2025/CVE-2025-40xx/CVE-2025-4025.json
Normal file
@ -0,0 +1,145 @@
|
||||
{
|
||||
"id": "CVE-2025-4025",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-04-28T15:15:47.767",
|
||||
"lastModified": "2025-04-28T15:15:47.767",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability classified as critical was found in itsourcecode Placement Management System 1.0. Affected by this vulnerability is an unknown functionality of the file /registration.php. The manipulation of the argument Name leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 6.9,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "LOW",
|
||||
"vulnIntegrityImpact": "LOW",
|
||||
"vulnAvailabilityImpact": "LOW",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||||
"baseScore": 7.3,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||||
"baseScore": 7.5,
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "NONE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL"
|
||||
},
|
||||
"baseSeverity": "HIGH",
|
||||
"exploitabilityScore": 10.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-74"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/xingyu-wu4678/cve/issues/3",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://itsourcecode.com/",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.306379",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.306379",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.558621",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,20 @@
|
||||
"id": "CVE-2025-43919",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-04-20T01:15:45.233",
|
||||
"lastModified": "2025-04-24T16:22:37.117",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"lastModified": "2025-04-28T14:15:22.137",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [
|
||||
{
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"tags": [
|
||||
"disputed"
|
||||
]
|
||||
}
|
||||
],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "GNU Mailman 2.1.39, as bundled in cPanel (and WHM), allows unauthenticated attackers to read arbitrary files via ../ directory traversal at /mailman/private/mailman (aka the private archive authentication endpoint) via the username parameter."
|
||||
"value": "GNU Mailman 2.1.39, as bundled in cPanel (and WHM), allows unauthenticated attackers to read arbitrary files via ../ directory traversal at /mailman/private/mailman (aka the private archive authentication endpoint) via the username parameter. NOTE: multiple third parties report that they are unable to reproduce this, regardless of whether cPanel or WHM is used."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -113,9 +120,17 @@
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory",
|
||||
"Mitigation"
|
||||
"Mitigation",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/cpanel/mailman2-python3",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.openwall.com/lists/oss-security/2025/04/21/6",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,20 @@
|
||||
"id": "CVE-2025-43920",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-04-20T01:15:45.867",
|
||||
"lastModified": "2025-04-24T16:20:36.953",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"lastModified": "2025-04-28T14:15:22.323",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [
|
||||
{
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"tags": [
|
||||
"disputed"
|
||||
]
|
||||
}
|
||||
],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "GNU Mailman 2.1.39, as bundled in cPanel (and WHM), in certain external archiver configurations, allows unauthenticated attackers to execute arbitrary OS commands via shell metacharacters in an email Subject line."
|
||||
"value": "GNU Mailman 2.1.39, as bundled in cPanel (and WHM), in certain external archiver configurations, allows unauthenticated attackers to execute arbitrary OS commands via shell metacharacters in an email Subject line. NOTE: multiple third parties report that they are unable to reproduce this, regardless of whether cPanel or WHM is used."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -115,6 +122,14 @@
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/cpanel/mailman2-python3",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.openwall.com/lists/oss-security/2025/04/21/6",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,20 @@
|
||||
"id": "CVE-2025-43921",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-04-20T01:15:46.043",
|
||||
"lastModified": "2025-04-24T16:16:59.597",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"lastModified": "2025-04-28T14:15:22.477",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [
|
||||
{
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"tags": [
|
||||
"disputed"
|
||||
]
|
||||
}
|
||||
],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "GNU Mailman 2.1.39, as bundled in cPanel (and WHM), allows unauthenticated attackers to create lists via the /mailman/create endpoint."
|
||||
"value": "GNU Mailman 2.1.39, as bundled in cPanel (and WHM), allows unauthenticated attackers to create lists via the /mailman/create endpoint. NOTE: multiple third parties report that they are unable to reproduce this, regardless of whether cPanel or WHM is used."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -115,6 +122,14 @@
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/cpanel/mailman2-python3",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.openwall.com/lists/oss-security/2025/04/21/6",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2025-46333",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-04-25T21:15:39.577",
|
||||
"lastModified": "2025-04-25T21:15:39.577",
|
||||
"lastModified": "2025-04-28T15:15:47.057",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "z2d is a pure Zig 2D graphics library. In version 0.6.0, when writing from one surface to another using `z2d.compositor.StrideCompositor.run`, the source surface can be completely out-of-bounds on the x-axis (but not on the y-axis) by way of a negative offset. This results in an overflow of the value controlling the length of the stride. In non-safe optimization modes (consumers compiling with `ReleaseFast` or `ReleaseSmall`), this could potentially lead to invalid memory accesses or corruption. This issue is patched in version 0.6.1."
|
||||
"value": "z2d is a pure Zig 2D graphics library. Versions of z2d after `0.5.1` and up to and including `0.6.0`, when writing from one surface to another using `z2d.compositor.StrideCompositor.run`, and higher-level operations when the anti-aliasing mode is set to `.default` (such as `Context.fill`, `Context.stroke`, `painter.fill`, and `painter.stroke`), the source surface can be completely out-of-bounds on the x-axis, but not on the y-axis, by way of a negative offset. This results in an overflow of the value controlling the length of the stride. In non-safe optimization modes (consumers compiling with `ReleaseFast` or `ReleaseSmall`), this could potentially lead to invalid memory accesses or corruption.\n\nThis issue is patched in version `0.6.1`. Users on an untagged version after `v0.5.1` and before `v0.6.1` are advised to update to address the vulnerability. Those still on Zig `0.13.0` are recommended to downgrade to `v0.5.1`."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "z2d es una librer\u00eda de gr\u00e1ficos Zig 2D pura. En la versi\u00f3n 0.6.0, al escribir de una superficie a otra usando `z2d.compositor.StrideCompositor.run`, la superficie de origen puede estar completamente fuera de los l\u00edmites en el eje x (pero no en el eje y) debido a un desplazamiento negativo. Esto provoca un desbordamiento del valor que controla la longitud de la zancada. En modos de optimizaci\u00f3n no seguros (consumidores que compilan con `ReleaseFast` o `ReleaseSmall`), esto podr\u00eda provocar accesos no v\u00e1lidos a memoria o corrupci\u00f3n. Este problema se solucion\u00f3 en la versi\u00f3n 0.6.1."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -60,7 +64,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,16 +2,51 @@
|
||||
"id": "CVE-2025-46661",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-04-28T13:15:24.117",
|
||||
"lastModified": "2025-04-28T13:15:24.117",
|
||||
"lastModified": "2025-04-28T14:15:22.637",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "IPW Systems Metazo through 8.1.3 allows unauthenticated Remote Code Execution because smartyValidator.php enables the attacker to provide template expressions, aka Server-Side Template-Injection."
|
||||
"value": "IPW Systems Metazo through 8.1.3 allows unauthenticated Remote Code Execution because smartyValidator.php enables the attacker to provide template expressions, aka Server-Side Template-Injection. All instances have been patched by the Supplier."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cve@mitre.org",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N",
|
||||
"baseScore": 10.0,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.8
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cve@mitre.org",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-1336"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://code-white.com/public-vulnerability-list/",
|
||||
|
55
README.md
55
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2025-04-28T14:00:19.945572+00:00
|
||||
2025-04-28T16:00:20.643077+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2025-04-28T13:45:09.357000+00:00
|
||||
2025-04-28T15:37:34.230000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,30 +33,53 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
291587
|
||||
291596
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `6`
|
||||
Recently added CVEs: `9`
|
||||
|
||||
- [CVE-2025-32472](CVE-2025/CVE-2025-324xx/CVE-2025-32472.json) (`2025-04-28T13:15:23.053`)
|
||||
- [CVE-2025-4018](CVE-2025/CVE-2025-40xx/CVE-2025-4018.json) (`2025-04-28T12:15:31.913`)
|
||||
- [CVE-2025-4019](CVE-2025/CVE-2025-40xx/CVE-2025-4019.json) (`2025-04-28T12:15:32.093`)
|
||||
- [CVE-2025-4020](CVE-2025/CVE-2025-40xx/CVE-2025-4020.json) (`2025-04-28T13:15:24.603`)
|
||||
- [CVE-2025-4021](CVE-2025/CVE-2025-40xx/CVE-2025-4021.json) (`2025-04-28T13:15:24.773`)
|
||||
- [CVE-2025-46661](CVE-2025/CVE-2025-466xx/CVE-2025-46661.json) (`2025-04-28T13:15:24.117`)
|
||||
- [CVE-2015-2079](CVE-2015/CVE-2015-20xx/CVE-2015-2079.json) (`2025-04-28T15:15:44.007`)
|
||||
- [CVE-2025-23375](CVE-2025/CVE-2025-233xx/CVE-2025-23375.json) (`2025-04-28T15:15:45.157`)
|
||||
- [CVE-2025-23376](CVE-2025/CVE-2025-233xx/CVE-2025-23376.json) (`2025-04-28T15:15:45.303`)
|
||||
- [CVE-2025-23377](CVE-2025/CVE-2025-233xx/CVE-2025-23377.json) (`2025-04-28T15:15:45.437`)
|
||||
- [CVE-2025-25776](CVE-2025/CVE-2025-257xx/CVE-2025-25776.json) (`2025-04-28T15:15:45.587`)
|
||||
- [CVE-2025-4022](CVE-2025/CVE-2025-40xx/CVE-2025-4022.json) (`2025-04-28T14:15:22.867`)
|
||||
- [CVE-2025-4023](CVE-2025/CVE-2025-40xx/CVE-2025-4023.json) (`2025-04-28T14:15:23.043`)
|
||||
- [CVE-2025-4024](CVE-2025/CVE-2025-40xx/CVE-2025-4024.json) (`2025-04-28T15:15:47.600`)
|
||||
- [CVE-2025-4025](CVE-2025/CVE-2025-40xx/CVE-2025-4025.json) (`2025-04-28T15:15:47.767`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `5`
|
||||
Recently modified CVEs: `48`
|
||||
|
||||
- [CVE-2023-51533](CVE-2023/CVE-2023-515xx/CVE-2023-51533.json) (`2025-04-28T13:13:33.597`)
|
||||
- [CVE-2023-52048](CVE-2023/CVE-2023-520xx/CVE-2023-52048.json) (`2025-04-28T13:08:59.177`)
|
||||
- [CVE-2024-24714](CVE-2024/CVE-2024-247xx/CVE-2024-24714.json) (`2025-04-28T12:48:10.637`)
|
||||
- [CVE-2024-25170](CVE-2024/CVE-2024-251xx/CVE-2024-25170.json) (`2025-04-28T13:45:09.357`)
|
||||
- [CVE-2024-26342](CVE-2024/CVE-2024-263xx/CVE-2024-26342.json) (`2025-04-28T13:15:09.927`)
|
||||
- [CVE-2024-44574](CVE-2024/CVE-2024-445xx/CVE-2024-44574.json) (`2025-04-28T15:16:15.657`)
|
||||
- [CVE-2024-44575](CVE-2024/CVE-2024-445xx/CVE-2024-44575.json) (`2025-04-28T15:14:44.490`)
|
||||
- [CVE-2024-44577](CVE-2024/CVE-2024-445xx/CVE-2024-44577.json) (`2025-04-28T15:13:42.720`)
|
||||
- [CVE-2024-8372](CVE-2024/CVE-2024-83xx/CVE-2024-8372.json) (`2025-04-28T14:15:20.107`)
|
||||
- [CVE-2025-3960](CVE-2025/CVE-2025-39xx/CVE-2025-3960.json) (`2025-04-28T15:15:45.817`)
|
||||
- [CVE-2025-3961](CVE-2025/CVE-2025-39xx/CVE-2025-3961.json) (`2025-04-28T15:15:45.943`)
|
||||
- [CVE-2025-3962](CVE-2025/CVE-2025-39xx/CVE-2025-3962.json) (`2025-04-28T15:15:46.060`)
|
||||
- [CVE-2025-3963](CVE-2025/CVE-2025-39xx/CVE-2025-3963.json) (`2025-04-28T15:15:46.180`)
|
||||
- [CVE-2025-3966](CVE-2025/CVE-2025-39xx/CVE-2025-3966.json) (`2025-04-28T15:15:46.290`)
|
||||
- [CVE-2025-3967](CVE-2025/CVE-2025-39xx/CVE-2025-3967.json) (`2025-04-28T15:15:46.410`)
|
||||
- [CVE-2025-3968](CVE-2025/CVE-2025-39xx/CVE-2025-3968.json) (`2025-04-28T15:15:46.527`)
|
||||
- [CVE-2025-39735](CVE-2025/CVE-2025-397xx/CVE-2025-39735.json) (`2025-04-28T14:37:34.487`)
|
||||
- [CVE-2025-3975](CVE-2025/CVE-2025-39xx/CVE-2025-3975.json) (`2025-04-28T15:15:46.760`)
|
||||
- [CVE-2025-39755](CVE-2025/CVE-2025-397xx/CVE-2025-39755.json) (`2025-04-28T15:32:46.553`)
|
||||
- [CVE-2025-3977](CVE-2025/CVE-2025-39xx/CVE-2025-3977.json) (`2025-04-28T14:15:21.520`)
|
||||
- [CVE-2025-39778](CVE-2025/CVE-2025-397xx/CVE-2025-39778.json) (`2025-04-28T15:37:34.230`)
|
||||
- [CVE-2025-3978](CVE-2025/CVE-2025-39xx/CVE-2025-3978.json) (`2025-04-28T14:15:21.640`)
|
||||
- [CVE-2025-3979](CVE-2025/CVE-2025-39xx/CVE-2025-3979.json) (`2025-04-28T14:15:21.767`)
|
||||
- [CVE-2025-3980](CVE-2025/CVE-2025-39xx/CVE-2025-3980.json) (`2025-04-28T14:15:21.890`)
|
||||
- [CVE-2025-3981](CVE-2025/CVE-2025-39xx/CVE-2025-3981.json) (`2025-04-28T14:15:22.013`)
|
||||
- [CVE-2025-43919](CVE-2025/CVE-2025-439xx/CVE-2025-43919.json) (`2025-04-28T14:15:22.137`)
|
||||
- [CVE-2025-43920](CVE-2025/CVE-2025-439xx/CVE-2025-43920.json) (`2025-04-28T14:15:22.323`)
|
||||
- [CVE-2025-43921](CVE-2025/CVE-2025-439xx/CVE-2025-43921.json) (`2025-04-28T14:15:22.477`)
|
||||
- [CVE-2025-46333](CVE-2025/CVE-2025-463xx/CVE-2025-46333.json) (`2025-04-28T15:15:47.057`)
|
||||
- [CVE-2025-46661](CVE-2025/CVE-2025-466xx/CVE-2025-46661.json) (`2025-04-28T14:15:22.637`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
125
_state.csv
125
_state.csv
@ -75559,6 +75559,7 @@ CVE-2015-2075,0,0,e2b9cfdccf5716685cc1e4d8cc1bc3a54797e772b0a1447d55a8f318c3576a
|
||||
CVE-2015-2076,0,0,3d8b112a5706df5d84310bb9b8ed104e56569c2923fa69b716ed38a355a69b2a,2025-04-12T10:46:40.837000
|
||||
CVE-2015-2077,0,0,4411d36c64e75264ae4b5cd885f8ca45fd6474dc1e2b6cd680bb1a19f78a7f18,2025-04-12T10:46:40.837000
|
||||
CVE-2015-2078,0,0,2611ed6e45a1c171159eb27c59a79256a622d5f057d44ff7975c92201c58de46,2025-04-12T10:46:40.837000
|
||||
CVE-2015-2079,1,1,f2f765cafa57b5c53cfac166351fda648b78b5622810f6e5e02e217e7c1564e0,2025-04-28T15:15:44.007000
|
||||
CVE-2015-2080,0,0,1269de43ed4c4370565793a28753d3e81328a5b9b90e6133a8ceb967b3d23093,2025-04-12T10:46:40.837000
|
||||
CVE-2015-2081,0,0,dbf23d9a94c6e7e32fefef8d65be0a4a8bd93470966a94df1e50b94d9db43619,2024-11-21T02:26:43.660000
|
||||
CVE-2015-2082,0,0,7f5418dc360570b72eb84eefc32bc34eba854d22b1b5f25bc2ee784686888094,2025-04-12T10:46:40.837000
|
||||
@ -193427,7 +193428,7 @@ CVE-2022-23737,0,0,00bd5b8e77776c824d9367fe4e3bd6f356e3bcbf490141f8b74768cefd021
|
||||
CVE-2022-23738,0,0,0eaa47d3d4006afa09ec7cb704b1f8468722477b8e76ecdafe6acdf69b5eb977,2024-11-21T06:49:12.737000
|
||||
CVE-2022-23739,0,0,f6dd41fc9b18ff225249e63ed3de75d4f78a2a0eabee0e65e248c438d071d051,2025-04-08T21:15:44.423000
|
||||
CVE-2022-2374,0,0,e8aea41fb4969ca1ce97b6b67b3414e0f25ada9e4b58edf35238b03b9dccf668,2024-11-21T07:00:51.853000
|
||||
CVE-2022-23740,0,0,73df818fba6a5db1c781b7a253d13fa4858bc42c8aaba1b97da3002f3df83d42,2024-11-21T06:49:12.987000
|
||||
CVE-2022-23740,0,1,3e1be9444a6173f399b977ddfb22aac75d5bb2d7c58fa44294560eefe333620e,2025-04-28T15:15:44.577000
|
||||
CVE-2022-23741,0,0,3a64d91448bd62035134cb767623d94872c48ddd1ec46258ed91d43ab47820cc,2025-04-22T16:15:21.053000
|
||||
CVE-2022-23742,0,0,7dea878edb5ad2cbdb3abc4beeb51490a987e35f3a4f8363cd49f2a2e7c043a1,2024-11-21T06:49:13.227000
|
||||
CVE-2022-23743,0,0,a7454e6467ca11378287d0671c5f75d14fde2b38947403f7a5ca829d4c6db62b,2024-11-21T06:49:13.347000
|
||||
@ -210607,7 +210608,7 @@ CVE-2022-45419,0,0,e5e80247049cf7154de037d9e58ef6fb0998b7ad2c529e1ca7b6c319fab16
|
||||
CVE-2022-4542,0,0,1e8daab49fb467c0edc9286efcd4cbc9b024e0d6f613c2ff20ca5238d9ed329d,2025-04-03T20:15:18.443000
|
||||
CVE-2022-45420,0,0,f1eff6696caa2e5ae623f262112221f1b06b603256e633ff4d1368d68d1794ee,2025-04-15T15:16:03.193000
|
||||
CVE-2022-45421,0,0,5454303fe1616edea179c1a907dc0b9588624264b8c1c40f842ce8b70dbbd8e0,2025-04-15T15:16:03.357000
|
||||
CVE-2022-45422,0,0,1b36c85fe2672583a3ef0eda64ee1cd537bbee4b3a3cd5639f8e7b843dc1fbf9,2024-11-21T07:29:13.907000
|
||||
CVE-2022-45422,0,1,cbaa4e97ba94b306f8ff8fba0c5d4711702ae46e5916b688dbd38829f7250a40,2025-04-28T15:15:44.910000
|
||||
CVE-2022-45423,0,0,1f033df1fc4960b99357cb040b9af81355eeabbedd198749f65aa65f3ad0d51f,2025-04-14T13:15:15.970000
|
||||
CVE-2022-45424,0,0,2c9d05b22d8c4b9c1e6d273139d88262e63599a434074936adacad9cb44fafe0,2025-04-14T14:15:20.313000
|
||||
CVE-2022-45425,0,0,520990494cde392487585b2b2277647d9ae6ee50312a99a0315937862c6404ea,2025-04-14T14:15:20.493000
|
||||
@ -240449,7 +240450,7 @@ CVE-2023-5153,0,0,9c9af9ee0585ae99c11dc28be44a3d285d24f0e534e56e6e3bc49f885c490b
|
||||
CVE-2023-51530,0,0,10aa7972ebcc143fc175a676ecc0636cfb1bd808ee825b8d1ba9998f1ed6f97f,2025-02-27T02:51:16.947000
|
||||
CVE-2023-51531,0,0,ed65fb56698b1668a229da16713fbb3a00de61d6cd1c84cc2b94de89c27c7bfa,2025-02-27T02:55:35.553000
|
||||
CVE-2023-51532,0,0,ab7508cc452da5caaa84a729d614de6dcf5a6b68199b1a01ad6bed86c7b79196,2024-11-21T08:38:19.377000
|
||||
CVE-2023-51533,0,1,2ef6b746e3ae13092e5325bb7897fb9a47cf6eafaf6307c389e0af4501a290f9,2025-04-28T13:13:33.597000
|
||||
CVE-2023-51533,0,0,2ef6b746e3ae13092e5325bb7897fb9a47cf6eafaf6307c389e0af4501a290f9,2025-04-28T13:13:33.597000
|
||||
CVE-2023-51534,0,0,674283aa9bee476e3f518de07ee15ce728e3ea64deca08374beae81fdb205f23,2024-11-21T08:38:19.663000
|
||||
CVE-2023-51535,0,0,b4ee7d4c77008fec43e7a917d42277372a9bc28a04a14adf861b98934323efbd,2024-11-21T08:38:19.803000
|
||||
CVE-2023-51536,0,0,5459c09b4b1682eae7f140dbb92e6e712692b6c8c3fc2399e747fac5b9fd78de,2024-11-21T08:38:19.930000
|
||||
@ -240823,7 +240824,7 @@ CVE-2023-52044,0,0,5b5e70107668847bba1d6062e34c0bf4eaededd76c0935abbe5da27ca0360
|
||||
CVE-2023-52045,0,0,b95570fd6064d2fac3cb39dff45979071738bfc47c15c31d200252b85a2f3e9f,2025-04-17T19:11:05.073000
|
||||
CVE-2023-52046,0,0,194849462bf429fc749f298b05a36377ff7074363e301b433cd9950d69c4c501,2024-11-21T08:39:04.817000
|
||||
CVE-2023-52047,0,0,d56b5255bbf43ce833425482d3a7c4458ee12e08ce88fc91b5b4e4a71c62ee74,2025-04-01T13:30:28.050000
|
||||
CVE-2023-52048,0,1,dc6a64e99c990ac71e2e5fd5c1632b65bf305feb3beb43bad667892a5fedb150,2025-04-28T13:08:59.177000
|
||||
CVE-2023-52048,0,0,dc6a64e99c990ac71e2e5fd5c1632b65bf305feb3beb43bad667892a5fedb150,2025-04-28T13:08:59.177000
|
||||
CVE-2023-5205,0,0,ad9e6403ed51d32e238949552f23850cd3c894ce7b700f7f43181c17b96bcabf,2024-11-21T08:41:17.900000
|
||||
CVE-2023-52059,0,0,631fc170b23676a9d5a914e1efcd033aa6ac461afd7c0cbe7ba670738271ca23,2024-11-21T08:39:05.367000
|
||||
CVE-2023-52060,0,0,916b6d0023ba25356201b349f9585af7af15e0ab89951480565e91e01992b734,2025-03-13T20:15:16.240000
|
||||
@ -252729,7 +252730,7 @@ CVE-2024-24710,0,0,3e1e20a8dfa79a8b78b75c17d13801e5e4aa6e91804fe24acce34eb915d0b
|
||||
CVE-2024-24711,0,0,22ae5814b6f1b3b16c3d1525f8fcb2be9e6f73b9bf83108e69c5d785af0e14a5,2024-11-21T08:59:33.490000
|
||||
CVE-2024-24712,0,0,efc844b6aac243f9d2a4e2fa0e4f20ffb1fa53d6800923dfed2d946c95888150,2024-11-21T08:59:33.620000
|
||||
CVE-2024-24713,0,0,9b6abef33bc7d884bbcfe7f84a8de01ffd604fe1e84fadee5fa6903c498a1f90,2024-11-21T08:59:33.757000
|
||||
CVE-2024-24714,0,1,fa6f31994511f691ec58d6cd25d830472c6518df8eb14d92ad8a1216e17c5ef2,2025-04-28T12:48:10.637000
|
||||
CVE-2024-24714,0,0,fa6f31994511f691ec58d6cd25d830472c6518df8eb14d92ad8a1216e17c5ef2,2025-04-28T12:48:10.637000
|
||||
CVE-2024-24715,0,0,0e1efbeecdbbc67506e62ff0a15195fb63b9939321818a7128fc2e9bb4370e11,2024-11-21T08:59:34.020000
|
||||
CVE-2024-24716,0,0,2a1681202601d9e99709e6831ac4b63ea8c43e8b87405bb1f57ab626394c187f,2024-11-21T08:59:34.150000
|
||||
CVE-2024-24717,0,0,75805cbf14610b8ac5098a39951fb1a53c50c5d54fe991e08ae0e81f017efa6f,2024-11-21T08:59:34.317000
|
||||
@ -253137,7 +253138,7 @@ CVE-2024-25167,0,0,6680c9ae0b5f0e6a56ae0f989b9e9129826f63fc1c07b9d46b893bd2a5ea0
|
||||
CVE-2024-25168,0,0,8cefebfb25cf73bfbc7148eb27cdd7832e378fc25a13306a6452184972fcdac6,2024-11-21T09:00:23.370000
|
||||
CVE-2024-25169,0,0,99447ba0d35007c05de0bb325e4f626f2e771e1210f38989dc4b7d60408a0543,2025-03-28T19:15:19.433000
|
||||
CVE-2024-2517,0,0,295e66015290670d17656ff58cb1c4da5fc5fa5488e00738c41044e38528f829,2025-02-14T17:00:42.847000
|
||||
CVE-2024-25170,0,1,4c56b2b9fe4a87cb80c5dee02642b875be800d1c7ec89e66c4b2e2df368f00c2,2025-04-28T13:45:09.357000
|
||||
CVE-2024-25170,0,0,4c56b2b9fe4a87cb80c5dee02642b875be800d1c7ec89e66c4b2e2df368f00c2,2025-04-28T13:45:09.357000
|
||||
CVE-2024-25175,0,0,d202acf4b9d186a327285b02335009822d657110c4d7975ee8e4ed90ceea8ae1,2024-11-21T09:00:23.977000
|
||||
CVE-2024-2518,0,0,218e6d38201830e4f08ae52d79ac56db7a7b552c444bda2da7a3568e50b7a7a6,2025-02-14T16:59:49.713000
|
||||
CVE-2024-25180,0,0,0d4a542b02265d3f9b8201e343a419b397fe0f87ee7decd85beea8db7b2a744c,2024-11-21T09:00:24.200000
|
||||
@ -253549,7 +253550,7 @@ CVE-2024-25830,0,0,48f111b9df759d41453a93b4045c2ff567a72cf519523820b0bdb3651b119
|
||||
CVE-2024-25831,0,0,bd8cc628942f0cfec3cd605617d2c1225f2d77c4bfbb5c43b8cabd63ea5984ac,2025-01-16T17:50:46.660000
|
||||
CVE-2024-25832,0,0,0359e72eed9b587f1da939ee2b4f202d62bdd6b390e2936728c43fb3aef82845,2025-03-27T15:15:50.607000
|
||||
CVE-2024-25833,0,0,50dde66bc691dda473a0e2525b2d4cb41dc2484c7572d20b63fa74d0870cf5ff,2025-01-16T17:50:18.237000
|
||||
CVE-2024-25837,0,0,9324aae20b150fb712a45f0d12f866250e517905551e94092fb5dfb75742ad97,2024-10-30T15:35:08.810000
|
||||
CVE-2024-25837,0,1,7bbde50123e9dad85e59add4941e11a3c0f989fc362143f8cbc962577f00d521,2025-04-28T14:06:50.453000
|
||||
CVE-2024-25839,0,0,a6951a161c8400420691d40a579c87f91e6e0f1f8f29502c5d7b5cde306b0917,2024-11-21T09:01:24.383000
|
||||
CVE-2024-2584,0,0,147866b6cc23dcf59e36f6b74e2eee47e7c2220f33f9e8fd97c35cfd9a0a049d,2025-04-11T14:47:05.300000
|
||||
CVE-2024-25840,0,0,8953a162377158948ebf7583b7c44850336b1c32eb8d66824e9b6ea8a16712b3,2024-11-21T09:01:24.607000
|
||||
@ -254039,7 +254040,7 @@ CVE-2024-26335,0,0,d935f588a5f25fc8eb3a1cad35a0e183dcfe3bb620dcbf94cb5db283d0be6
|
||||
CVE-2024-26337,0,0,8f97136a32143d7c5cb4e695fc03098705d0a94d9a4445524aede82b9c17fb81,2025-04-01T15:48:49.013000
|
||||
CVE-2024-26339,0,0,50901e7be8d4dc2f1ae969674b464222e6c5cb243f33556cac70b86975fdb414,2025-04-01T15:48:23.610000
|
||||
CVE-2024-2634,0,0,f23d5a69439faf8e582a9c275f183d86336ce7e598134e5aefd6ea8385c5e2eb,2024-11-21T09:10:10.983000
|
||||
CVE-2024-26342,0,1,da6762122e9027a78d524f6ee4cae5691172afa8889ba4ddcc1104b2ff0a8e3b,2025-04-28T13:15:09.927000
|
||||
CVE-2024-26342,0,0,da6762122e9027a78d524f6ee4cae5691172afa8889ba4ddcc1104b2ff0a8e3b,2025-04-28T13:15:09.927000
|
||||
CVE-2024-26349,0,0,1bbbf3597c87b9929fc5eb4bb026f97edb7f2e0b4184399ebdf8842d543c4e8f,2025-03-25T17:00:12.093000
|
||||
CVE-2024-2635,0,0,5fc435b0b5b40519e84566e07c1fce38fb260b472efb6bf37eb63fcc0934d662,2024-11-21T09:10:11.093000
|
||||
CVE-2024-26350,0,0,aafbc8f10bb2284d20ad7acc10a6c83f87626d2b046e77e8585f67ff9e4808a2,2025-03-28T19:15:20.007000
|
||||
@ -255161,7 +255162,7 @@ CVE-2024-27712,0,0,39c268969bc18b1f885f38f09190df12ceb146b6e360b90342f96472616f2
|
||||
CVE-2024-27713,0,0,b65152a8721dfc398af59bf6c393bf5fdd8d930eac7a2b15f4d417361b801ba6,2025-04-16T19:15:12.260000
|
||||
CVE-2024-27715,0,0,588f0129d251c25a62c6758efd788f377fccf8c1d3855c585b3b6fa48c2014b3,2025-04-16T19:15:07.433000
|
||||
CVE-2024-27716,0,0,4e33ff7b1a83f51fed4b80a3d94c6d3a9ee0c5bb94137c0b4ce8ff1d81d644a3,2024-11-21T09:04:56.483000
|
||||
CVE-2024-27717,0,0,2bfbcd1fda90d99c6d9799ec5f6ea4a1024e40e784a07aae7d197f311065a041,2024-11-21T09:04:56.707000
|
||||
CVE-2024-27717,0,1,7c5360378c1c098145273942daac7e3b2041c6891631d0b1d163bd0d3e72c1e7,2025-04-28T14:47:26.353000
|
||||
CVE-2024-27718,0,0,6fd0ecf52683c3600c47787d4abfe093befe302da46880121fb7e6cebae4c848,2024-11-21T09:04:56.920000
|
||||
CVE-2024-27719,0,0,341c9c74660e8da6c3b635ee840b9ff7db619da44f18728b3cc02c5bde0fae9d,2024-11-21T09:04:57.123000
|
||||
CVE-2024-2772,0,0,02f750b020a1c0ddcf10a0cbf86dad19edb566b57ce2911796231437ddd08a75,2025-02-06T18:38:03.913000
|
||||
@ -261015,7 +261016,7 @@ CVE-2024-35527,0,0,d802d5954ff7f9b39a6b2dc0af26915bbf794a29707ccef9cebcfa3c1be1e
|
||||
CVE-2024-3553,0,0,685d6a9bec12f61a7106ff31505bbc229bf16d433649e9dec535a367c421d912,2025-01-15T18:36:47.993000
|
||||
CVE-2024-35532,0,0,feed18e3e5768cea1f19bf7390d6eac06db80fa1667c8f051e007dd8daab0194,2025-01-08T15:15:17.793000
|
||||
CVE-2024-35537,0,0,a64f8ae8ab86725040f9e1b6d109b67b42cd2d40678fcb31e32a5fa325e35c6c,2025-03-13T15:15:44.547000
|
||||
CVE-2024-35538,0,0,96eff6484fca11848a83b78627b6ae787a7804df3fd835a8374ef951bb6f2ad1,2024-08-20T15:44:20.567000
|
||||
CVE-2024-35538,0,1,f53475906dfdb17612612ecb2abd6bf10186d205bd4d089601d9c5c2b22789cf,2025-04-28T14:00:34.500000
|
||||
CVE-2024-35539,0,0,97ada96f796dc4b3f1c0d706963a18d7205ef36dca04b0052b95398f16195ac9,2024-08-21T14:35:10.017000
|
||||
CVE-2024-3554,0,0,b7f3e638ef3a822354fb7124a5277075531fad510bfdcd6faa19f3ac09434bf0,2024-11-21T09:29:51.930000
|
||||
CVE-2024-35540,0,0,7617ec41b467bc5de8aa2d05744dbd4fc53e6d5d057c21556d6cac0d34e12490,2024-08-21T16:05:06.290000
|
||||
@ -263945,7 +263946,7 @@ CVE-2024-38897,0,0,b43024c8c4cd5005ae2c3ac6e382f0314f8925a2efba660eda76a12caae34
|
||||
CVE-2024-3890,0,0,fce70548afac71463049803d99839c76f83c3f99644b737e71452f11bf39c15a,2025-01-07T18:13:29.557000
|
||||
CVE-2024-38902,0,0,4f43d793db0c62321cf943185d9719a34e2b038e0d34991b7e0e1a885b3d56ec,2025-03-13T15:15:46.197000
|
||||
CVE-2024-38903,0,0,5ac36a5d0829f2d9338553ce3926f23b23b26a430d990d436d81e63cebcf3b1a,2024-11-21T09:26:59.357000
|
||||
CVE-2024-38909,0,0,7a534ed14d1ecaec78a6d0eb2287c1e617529c12447aed6a1bc518a184ec1064,2025-03-14T19:15:46.707000
|
||||
CVE-2024-38909,0,1,e855d3e4bcc6debe8825dcac1f84960c0ea9fdd610320e92597c28f7d4585441,2025-04-28T14:35:52.783000
|
||||
CVE-2024-3891,0,0,4d72bc4ea7906c74fa96e7962b045759b217e44e525621a88b5a5a6135790d8b,2025-01-07T18:11:13.230000
|
||||
CVE-2024-38910,0,0,d2dff3af8a966f6c22ba1ee4e9572a11e68c5f4930901faf724b461844929ff4,2024-12-06T20:15:26.337000
|
||||
CVE-2024-3892,0,0,d29e438e1d0c06b67fbb683ee1ad1805f7ecf63a0185dbf87e1e3c4e7505b0f6,2025-01-28T16:39:55.417000
|
||||
@ -263986,7 +263987,7 @@ CVE-2024-38991,0,0,40100092f65cabc0a38a9cd2fc9407a2ace7ce781b9a81c291e5aad2037b1
|
||||
CVE-2024-38992,0,0,3fe46fe53ebbd61cbcbeb026b882a36c55f7df74d80bd73da297882e8a29fda8,2024-11-21T09:27:03.730000
|
||||
CVE-2024-38993,0,0,172de65e7240c6a5f6bf645e694b0d2e344b70f8de661fa2be14422eb43b5e24,2024-11-21T09:27:03.943000
|
||||
CVE-2024-38994,0,0,2a61e436904a48b4ded58b92d6bc8b107cabc4ea861dff38f3dcd8ff23c78c3a,2024-11-21T09:27:04.170000
|
||||
CVE-2024-38996,0,0,8fd4a7ef6b42b1a63cd868322179bb9481740ea02fd238379ee386c0fbf6a026,2024-11-21T09:27:04.387000
|
||||
CVE-2024-38996,0,1,3f9d786844732d7b8465ea56f6ffca091cbc25ebc4440147a358ddbf759f2b49,2025-04-28T14:37:52.810000
|
||||
CVE-2024-38997,0,0,29421658f8acbee523241d363ca96c6a4d61054e874bc93ac98fb62157248214,2024-11-21T09:27:04.613000
|
||||
CVE-2024-38998,0,0,1ddfa2c100a7af4725f52a46bac654024fff6a96a1ee34fbb54fd0ca70641bb2,2025-01-28T20:15:31.103000
|
||||
CVE-2024-38999,0,0,7f217baaa25d7f40b740199108f4604ad2f09c6c0fdc981cabbaf727e9dace92,2024-11-21T09:27:05.063000
|
||||
@ -264881,7 +264882,7 @@ CVE-2024-40417,0,0,52920b59587ee59d8965c4a5b0b101605d7bbbf1f449f954819cec48760aa
|
||||
CVE-2024-4042,0,0,cecab8b1687d6be49a591036e1f884eeaaaac74f662dec1e0d521caf21f5dd55,2024-11-21T09:42:05.310000
|
||||
CVE-2024-40420,0,0,2cc64060c56a9cd8ae43221cc949a39e78df1f9a724e5e5fe2d1f288499041f6,2024-12-18T20:15:22.773000
|
||||
CVE-2024-40422,0,0,6808f4638a336c49c8bee4ab2c82ba14479baa38f197ca7d031042a0e1bcff02,2025-01-29T22:15:29.260000
|
||||
CVE-2024-40425,0,0,6aeac73ee2eae081e2470f06e1862d7c95ccca07478d222a6faa8bdbe87a2e48,2024-11-21T09:31:05.133000
|
||||
CVE-2024-40425,0,1,81a735aa760a40f04f27a92364bcdd5799b5ae544ac617e40c579d873b6adcfa,2025-04-28T14:46:31.877000
|
||||
CVE-2024-40427,0,0,edb2ed6f04ab924988a6c43762419200f816f91f867e2f61b6ea78a526ec38ae,2025-01-08T19:15:31.043000
|
||||
CVE-2024-4043,0,0,d4b5f95f306543d879cec12e990f7b6a12bdbc75a98caec12c24a6e719c63084,2024-11-21T09:42:05.460000
|
||||
CVE-2024-40430,0,0,546dc110e07f45ee3ffd84e8af87c8ef8c5f6d93dcd27e587cb3a3c5233f7799,2024-09-13T21:15:10.357000
|
||||
@ -264896,8 +264897,8 @@ CVE-2024-40445,0,0,acf4cbc29ae92f9a56fdef6f118c1427fc2f07e0ad7c091d1b4352b9172a5
|
||||
CVE-2024-40446,0,0,06e9b4334aa4360577a217b606b4c757a9efe0ad1ca34b90bc04789a404c59c4,2025-04-23T15:15:59.513000
|
||||
CVE-2024-4045,0,0,f4ea98769850930c051ddc885b28524cc4af702b69cedf5723780c9f7bd76361,2024-11-21T09:42:05.710000
|
||||
CVE-2024-40453,0,0,44028ded5df7ca69cdf493f195db9cc0d99fa7bb7b128c31936f66f8a0891140,2024-08-23T17:35:05.463000
|
||||
CVE-2024-40455,0,0,ebb560c70d34d188402c3c6b014cf93d1b00bcbb7dab920ce20724d469ccb1c5,2025-03-13T15:15:46.557000
|
||||
CVE-2024-40456,0,0,75e9cec6fc0fd65f300d988b660b459ac55c19cbe24788956c572edbb27e0987,2024-11-21T09:31:07.020000
|
||||
CVE-2024-40455,0,1,de7fbbe58f22122912bb4505b4fac34aed399683e93e39080dcf369a911444ce,2025-04-28T14:44:33.090000
|
||||
CVE-2024-40456,0,1,b282c3faed2b169890d7c393ead6de175fbbf60b11c5017118af2cac3eb0aed1,2025-04-28T14:43:04.063000
|
||||
CVE-2024-40457,0,0,390d8a58e2d154cd9c58a3e4748ba4c5a47c1d045aaef6fb95193c7f046d0256,2024-10-31T20:15:05.173000
|
||||
CVE-2024-4046,0,0,138bf9d15d808a387f1842c46e6552085e59aca18c14e013e3ba3c3747ce3bc9,2024-12-09T19:01:57.977000
|
||||
CVE-2024-40464,0,0,24a2b11fcc0b71c0371d2caf323eabbeaed9510a92bc85a0da1ff652186f468c,2024-08-15T13:02:33
|
||||
@ -264912,11 +264913,11 @@ CVE-2024-40478,0,0,18f9d2601b45b0155659911e0ae2c29ee23e133c8cb47ee86400e795a0ae6
|
||||
CVE-2024-40479,0,0,ed772cf67a46ac3c7e9bc9693937a7eef7702ab77b807ded4bc39bba120db634,2024-08-13T01:13:47.860000
|
||||
CVE-2024-40480,0,0,2e13e61f572f387adfee6973f14487ab73725a0b4fc14a2193599bd0e9b21708,2025-03-14T16:15:33.230000
|
||||
CVE-2024-40481,0,0,d82f9452819eeadc6328f6b92c8888f503a8260a868e9cfae3c7009725c43c4b,2024-08-15T13:58:16.033000
|
||||
CVE-2024-40482,0,0,266582d1863cb6f9cacd62450b573030e5accf0b5228135aa6d1f7c171d7bab5,2024-08-13T01:13:50.130000
|
||||
CVE-2024-40482,0,1,6a6efb225f2d1df9f4214be70a3ce35675a07dc191321a4d71af6b98e29aaf40,2025-04-28T14:32:00.203000
|
||||
CVE-2024-40484,0,0,1b66c3eaa0e6379cfa70f895317e11d73e311cd0bc5454c518db9b1e0b2cd179,2024-08-15T13:59:35.813000
|
||||
CVE-2024-40486,0,0,d698075353303498a2db5d19141e90d62f8a7e4fb3f59884deee03e270025f14,2024-08-13T01:13:52.383000
|
||||
CVE-2024-40487,0,0,80f40b446727615aa7e23f0d132a3666dbc5775dc8a0bbcc5d383612b5712a97,2024-08-23T15:35:06.307000
|
||||
CVE-2024-40488,0,0,d28f79bf5316ea5f1cca14b30243cbda5679bfde1552dc26f219c697d2ef444e,2024-08-13T01:13:53.230000
|
||||
CVE-2024-40486,0,1,cde41397685b1b76952cb8ca4c533c5be95452075620945321445f9b77c4a148,2025-04-28T14:29:24.907000
|
||||
CVE-2024-40487,0,1,c1c444c493c45a57e2593b7c8ca9d88dc5ae2268819fae610a46ec7876ed6500,2025-04-28T14:28:51.710000
|
||||
CVE-2024-40488,0,1,ad22cf5d2ab3c9ffc78f1597bec32960e2b4fbdd5e0d003a7a7a0e08f406b162,2025-04-28T14:24:28.293000
|
||||
CVE-2024-40490,0,0,dff45e8b937b0d43e514699f6678cc1eb9310868386eff11863fd2135561092a,2024-11-04T21:35:05.530000
|
||||
CVE-2024-40492,0,0,15d7a965787ba65f0b0c3a9bed6ce34898e8762185902bff45ae0d0229ab4c68,2024-11-21T09:31:10.977000
|
||||
CVE-2024-40493,0,0,d8cc68a495620dcb2d28bb34338d4bad4b040e899e98ffb2db4c475330153317,2024-10-25T17:01:22.433000
|
||||
@ -266769,11 +266770,11 @@ CVE-2024-42790,0,0,539360a9beda973ab08fb912d592087f677c6fb9a6fff6589cd7f5b776b9b
|
||||
CVE-2024-42791,0,0,02ed9b68cf0104e47b6bfe6d7010a50b9ef1323336267bf9e897fa9cd2d940d2,2024-08-26T19:35:30.910000
|
||||
CVE-2024-42792,0,0,d46d80558cda01ef420339b2588d51cdd59e10dffb1a2c4145461835bf0c2904,2024-09-05T18:35:24.220000
|
||||
CVE-2024-42793,0,0,c32fe29f81a44e565c3a5216abb9d035104b36adb22a5629ff920d51df01d239,2024-08-30T15:56:51.510000
|
||||
CVE-2024-42794,0,0,cb31f4d1d3a65655a7981910b73b7afb3f70bfecfb91294cb64754ea3d033a46,2024-09-20T12:31:20.110000
|
||||
CVE-2024-42795,0,0,dc95748e45ada2ed6217b8e00be53860a7a0b08b00faa6bbacb60135635b53bc,2024-09-20T12:31:20.110000
|
||||
CVE-2024-42796,0,0,519ab154d872fb06894f2be4372dfddd252381e87cf9c061dd6fa4e1b48c0873,2024-09-20T12:31:20.110000
|
||||
CVE-2024-42794,0,1,1388760710e98e4dd9825c92a0c1b25ba5d76a571c56cd23ab0c01d9cfa0bd60,2025-04-28T15:09:59.570000
|
||||
CVE-2024-42795,0,1,4b1825186993e94584d1caa74cd7c10ecb55f2957c94abd67a0e8bfcfe5a76c2,2025-04-28T15:08:25.213000
|
||||
CVE-2024-42796,0,1,f3013659b81b414b232c6879971f4ee4e0d060103a8264ca54b3014f1fe3f548,2025-04-28T14:56:46.983000
|
||||
CVE-2024-42797,0,0,b0ffe521c0bda597641c9c63f096241cab44c6e592ff9c6671135d9a88355e07,2024-09-26T13:32:02.803000
|
||||
CVE-2024-42798,0,0,7641c62fd524e532def64c945e40bae6882a3bef91b1594b00330f3ffdf8d905,2024-09-20T12:31:20.110000
|
||||
CVE-2024-42798,0,1,b6a15ed14ab901d8f830c1c2ca39552d9c52c3ccb25a03c7d550c70943dff7af,2025-04-28T14:56:09.830000
|
||||
CVE-2024-4280,0,0,b3797ff2151727941d9c366b289b5d3e0b88350afb872404e2bdcfe0d7122163,2024-11-21T09:42:32.167000
|
||||
CVE-2024-4281,0,0,61e5371b0a3255e76472e43eacd6c1c0207d9397155487a12c704d61028dcc77,2025-02-03T18:53:40.487000
|
||||
CVE-2024-42812,0,0,163e07a54ddac84e7821d0efc800bc7e7d10ae1d47903174af8c3b5ac8976f4b,2025-03-17T16:15:22.480000
|
||||
@ -266866,8 +266867,8 @@ CVE-2024-42988,0,0,5fef959cbc78ebe08189d85f59ac43355192595ed5bb119fd152c126c45c0
|
||||
CVE-2024-4299,0,0,06ff6656c614a1eb297948d61726a31acef16b15b4f4cc0e0cfb9d02f54c7a70,2024-11-21T09:42:34.330000
|
||||
CVE-2024-42991,0,0,8c4440572b8c1b15f9e28e1fd419725aea046bc3d3f09f5e12a0e76f85c0bdaf,2024-09-03T19:40:46.783000
|
||||
CVE-2024-42992,0,0,922ec86108ffde155b16bab8bce05d736126b3c84831d9a4ac12e72887280de3,2024-08-26T15:15:08.593000
|
||||
CVE-2024-42994,0,0,47a47d7a4496fbb4be0c8919660a2bc390f162500de5ed0c546e02d118a1f1d5,2024-08-19T13:00:23.117000
|
||||
CVE-2024-42995,0,0,73928fa11894c7bb88c7b00b60cb9e97c2f3d2eacbbb9d748c7e65dceed81641,2024-08-19T13:00:23.117000
|
||||
CVE-2024-42994,0,1,9d999392425042623e15f7faa35559c12373567a5bd93ad11d5f5b767f6d9226,2025-04-28T14:10:13.853000
|
||||
CVE-2024-42995,0,1,68c4e42f2f1f42bc08e5e10ffbd4b4428bbbaf157c94fda70fbf4af56c25082e,2025-04-28T14:09:10.273000
|
||||
CVE-2024-4300,0,0,91c6796b7b00ac208d0ef970c233086a0adcf2f87abd1ccbd0345b3366886d09,2024-11-21T09:42:34.457000
|
||||
CVE-2024-43005,0,0,90be3bacc36bee38568ac0616e5a259a15f0b18f629aac335dac5a60c517ea07,2025-04-21T14:59:47.323000
|
||||
CVE-2024-43006,0,0,6f99e55991478cb76d4ae41fc977e7ae067e6c2daf2293b36eecaf1e69677bdf,2025-04-21T14:59:34.717000
|
||||
@ -268192,12 +268193,12 @@ CVE-2024-4456,0,0,9e256113ce6b5f434b1029225d9b7c490634452bbac2479c1f026431fd87fe
|
||||
CVE-2024-44563,0,0,5199f8441754771b5dda361a721b2fbc485484332750808462a845349142050c,2024-08-27T13:43:26.300000
|
||||
CVE-2024-44565,0,0,704a4a34e28ec3aed8b7d29891a7e7fd22dbe7a4261cd86983a70f86adbf6dad,2024-08-27T13:43:46.897000
|
||||
CVE-2024-44570,0,0,c3f413693b0a67d171f5237e75f3598ab991dbf250c04c0e42a3fd54e1bea849,2024-09-12T12:35:54.013000
|
||||
CVE-2024-44571,0,0,a9c13e11ec32d25cabe568516bc80bba8663f3b06e2d2dc5f53fcc749d66a0fc,2024-09-12T12:35:54.013000
|
||||
CVE-2024-44572,0,0,4a32f91d55e111790347c15e6c383a7d7bcdb78371e1cc25bcba1170473f2ab0,2024-09-12T12:35:54.013000
|
||||
CVE-2024-44573,0,0,2f0de06f30df5693ea0832bd1477898fe876fe09e8b1c397168545c7d90f980c,2024-11-01T19:35:27.177000
|
||||
CVE-2024-44574,0,0,0ac30f53a8403481d3e53068e545f9d6b0d9848f97ca5145343590384ace9338,2024-09-12T12:35:54.013000
|
||||
CVE-2024-44575,0,0,a2dfcd30da86654b1601cf89030c855e53ba6b1465846e0f94ea255214477420,2024-11-25T18:15:12.667000
|
||||
CVE-2024-44577,0,0,86ef7b12524494f408d6e73b8d9a0cc3a595a4f00b0e6d5c87753c9c6567cbb6,2024-09-12T12:35:54.013000
|
||||
CVE-2024-44571,0,1,2c40131898ec7a9c56a91e7756c62636f116dc6e5677a39ddcbe54a5c651cbea,2025-04-28T15:22:14.460000
|
||||
CVE-2024-44572,0,1,4f4ead38e06948d091f8d1e12c653b9f93f098030647a6be11450d4901ec7d86,2025-04-28T15:20:25.193000
|
||||
CVE-2024-44573,0,1,cc255c259019816f3146a3ebd697d11943657aabe2dbb9f6bc11d051c40e07f3,2025-04-28T15:18:27.100000
|
||||
CVE-2024-44574,0,1,250840f6a5b68f0596aadb312c28af191e71501ff153313f8404b9b56d3dcb80,2025-04-28T15:16:15.657000
|
||||
CVE-2024-44575,0,1,2fdb4523fb93480e17a81cb2289c26fd5b8fb4bd885808938c0dc8387a7e0173,2025-04-28T15:14:44.490000
|
||||
CVE-2024-44577,0,1,012cd3687489f6b683572bfff38cebfa29461ab1df5e35223241e335c2144a6f,2025-04-28T15:13:42.720000
|
||||
CVE-2024-4458,0,0,d181cdfe1239b7370e0229e24ced49e59c93df8ded36a14106b44f2e538fe3b1,2024-11-21T09:42:52.170000
|
||||
CVE-2024-44587,0,0,a5e1f3ebd4d6bf6589458feb9c709eaa46f4397db0fc7239eceb5c9b4e9301cb,2024-09-05T17:44:56.007000
|
||||
CVE-2024-44589,0,0,efe6dd10612c3f4023c557d137bbb3d918a6e4892340cf75c11b9c76638fa63e,2024-09-20T12:30:17.483000
|
||||
@ -279887,7 +279888,7 @@ CVE-2024-8368,0,0,cbd58d02608421226ccc3e5ed1266e5c25af06684456963a09ab875beeb4b4
|
||||
CVE-2024-8369,0,0,a6d05ac94fd162bcee8803884a010b60435524cf6e0d9e13d056a1897ad22b6c,2024-09-26T15:43:20.720000
|
||||
CVE-2024-8370,0,0,6ff247f0498c9a9b7066f4ad89c0a9d54e8c78b0a7b7e46d47dc3aa51aeb81d2,2024-09-03T14:15:17.787000
|
||||
CVE-2024-8371,0,0,7b748619aff48ca851aaa4522abab6772c72472a7e35dd23e50368b3e3907681,2024-09-03T13:15:05.500000
|
||||
CVE-2024-8372,0,0,44c699b1f3a3e29a193bc9101ff8d192db8f9758ab2c51fe9fafb4abd6243d71,2025-02-12T20:14:39.330000
|
||||
CVE-2024-8372,0,1,712ae3556095fe97ae3ecc479945a9ea4cf01b8730ea7b80d21ea609bf958a8e,2025-04-28T14:15:20.107000
|
||||
CVE-2024-8373,0,0,11487d08657f4ba3b88ea7448ca7eeca5854e7d9e363edc87b0e7b98253dceda,2025-02-12T20:15:05.360000
|
||||
CVE-2024-8374,0,0,ca02cb1d8f9493301326b3f2ebcbf769706c4933bc89729cb22baf7e425cf724,2024-09-16T16:44:42.403000
|
||||
CVE-2024-8375,0,0,6d034a249584f3f3249aac9575cef27d1b8e645fd1ceb9646e6f860db02d62b5,2024-09-20T12:30:17.483000
|
||||
@ -284959,6 +284960,9 @@ CVE-2025-23368,0,0,3fba7751170fbf245919938130180b8631c2c01153566e23c5e60aa4599df
|
||||
CVE-2025-23369,0,0,74f04427c8261f575e3b46a10e2c572c85dddb2e090b01cedc0f322610f8f68b,2025-02-05T19:15:45.747000
|
||||
CVE-2025-2337,0,0,7d9e5607ad2b02dfc242a3305f849e66226e5392d822e3a7a605b0e9bacb542e,2025-03-17T15:15:44.983000
|
||||
CVE-2025-23374,0,0,dc7fc0938dfddbb9f9d96945d0cf484d16ace6397f0b6d455113dea4502470b2,2025-02-07T20:09:28.717000
|
||||
CVE-2025-23375,1,1,60a30d666f924aa2a1fbd0b350cf2ba4f1fb00c61bf50d7a92b2da19469c598f,2025-04-28T15:15:45.157000
|
||||
CVE-2025-23376,1,1,99e3f948ddf7a678d5b136c1473e9784a345dad6cf941a73ebe22baa711ae193,2025-04-28T15:15:45.303000
|
||||
CVE-2025-23377,1,1,c7548c88f400297aaf76213175c31e191929777001aa7062816fa34d035e2829,2025-04-28T15:15:45.437000
|
||||
CVE-2025-23378,0,0,7d1f583ba2fbd4a87629a0c6e9b1a82753dab9032ddd798f8461f250af5dc576,2025-04-11T15:40:10.277000
|
||||
CVE-2025-2338,0,0,d6a145ee9d99f0b331d4e327057f954207c4362f81df3d1dbf4d76a1b480aa57,2025-03-17T15:15:45.113000
|
||||
CVE-2025-23382,0,0,22d0333b6ebd7b3c598a3add3cb34bf6adf53ccfd12bc4731614dfff20d58612,2025-03-19T16:15:30.787000
|
||||
@ -286784,6 +286788,7 @@ CVE-2025-25770,0,0,97e9cbcf9f5eb368db8f03cd6097bc99f8f3fab4a945a4e034edb2a9ce72d
|
||||
CVE-2025-25772,0,0,049a4d8ccd7e92d8a6c37014ca81c63552e30fbd0e2bdc0e271ff3963136769b,2025-02-21T22:15:12.813000
|
||||
CVE-2025-25774,0,0,217aaab1390f6b1eba60d1bc1ee5dcd1167d8b5507491fd4cc7d4a7ca3945256,2025-03-12T19:15:39.777000
|
||||
CVE-2025-25775,0,0,5544670cc9a7add259c6e5cbf53cd850470977944146ac06f99bc3b124b05057,2025-04-25T18:15:25.937000
|
||||
CVE-2025-25776,1,1,569bad96221a4fb7f5d7ff11127e82bd4d257fb2f6a6b6e71240b92b84243bf0,2025-04-28T15:15:45.587000
|
||||
CVE-2025-25777,0,0,45f8b3c1c1f9d7109212dde9ce59be38e9992e6e24b2477c4857a0d7ca8e285e,2025-04-25T17:15:18.143000
|
||||
CVE-2025-2578,0,0,d4dee3e12d3294c1c6910c7eef7307144aa2b73a2adfa63b47bbc637e9cbd042,2025-03-28T18:11:40.180000
|
||||
CVE-2025-25783,0,0,6329df69fd0a54ba6d0f31849a17600b168da9709376108915818dc3764ea037,2025-04-07T19:11:53.150000
|
||||
@ -290315,7 +290320,7 @@ CVE-2025-32464,0,0,d585900889b901117e0fe728cc5e64b12123c28db643e71ecaab58b676037
|
||||
CVE-2025-3247,0,0,de417f93083f53a095a331b7f7a4a52b9b1338fe061d7ed48128d633e68ff031,2025-04-16T13:25:37.340000
|
||||
CVE-2025-32470,0,0,7dbeb6b6cb094fd7f696e62a410c872fc392f11a7c72598439cf161f2bb1ead2,2025-04-28T09:15:20.643000
|
||||
CVE-2025-32471,0,0,d22d1b90bf02f3583666588af972e5f20ef3a20c8b44c857c2696eed80c41065,2025-04-28T09:15:21.263000
|
||||
CVE-2025-32472,1,1,fce3c184bf175e1d727111b51d6fafe6a64818eddd51d33f1f21b4c8d2601bd8,2025-04-28T13:15:23.053000
|
||||
CVE-2025-32472,0,0,fce3c184bf175e1d727111b51d6fafe6a64818eddd51d33f1f21b4c8d2601bd8,2025-04-28T13:15:23.053000
|
||||
CVE-2025-32475,0,0,cf74498a36221a51f220d05d078ed063eee4c8ce48d68258cae808bc296530bd,2025-04-17T20:21:48.243000
|
||||
CVE-2025-32476,0,0,9d54d65167184e122be5c3a790d5ad19d5abaa6b052713e592bcb27d26085427,2025-04-09T20:02:41.860000
|
||||
CVE-2025-32477,0,0,6aaeb344af7fac729d48ed1cd0817d6c11c34e76428c0bd5b074c3df21934506,2025-04-09T20:02:41.860000
|
||||
@ -291259,18 +291264,18 @@ CVE-2025-39596,0,0,e173976a1c0999b01b788ac1a4c5ae24f6505527b92ae9fe5f45ca8a72d79
|
||||
CVE-2025-39597,0,0,b362997db93d9bfea0d7af44af4fd221eb0b25a2a82395ff55df61546df84055,2025-04-16T13:25:37.340000
|
||||
CVE-2025-39598,0,0,73d622048aeed09278774e13f22cb598b1a5cb08b2f1dd7ec3313a376059ffea,2025-04-16T13:25:37.340000
|
||||
CVE-2025-39599,0,0,091138247dcd1675bb93a1a469c4c7e89efe9b80c6a9739e4d163c5f536db88d,2025-04-16T13:25:37.340000
|
||||
CVE-2025-3960,0,0,0a205fc71590454f80109f0a1ee8ee5a9fa54132db4db7c45917814b38948f8d,2025-04-27T06:15:14.870000
|
||||
CVE-2025-3960,0,1,9677322420fe33e07dfc504ad7254ea1d626cb41f3d5bf0542d2405976ebbf7a,2025-04-28T15:15:45.817000
|
||||
CVE-2025-39600,0,0,71f55bfcced2bb7d7f35d4ab207853635aec1cc4573a3ee9f10ef122db1f0de7,2025-04-16T13:25:37.340000
|
||||
CVE-2025-39601,0,0,4f2eb6f0c2c624c12002346e13c479a2ea3b462ff0c42b3b14b9783c236c648a,2025-04-16T13:25:37.340000
|
||||
CVE-2025-39602,0,0,372857ab0b3fa589d5d3849a523521babea3aee49aea0f2c09c05c2852655522,2025-04-16T13:25:37.340000
|
||||
CVE-2025-3961,0,0,45a7ac44f384c30e3fbb9f668e36f375f4d1331a1daa19419d9d2a8c22592190,2025-04-27T07:15:15.307000
|
||||
CVE-2025-3962,0,0,346464949fea6dd25a02f68fe26d10089c971b819db5bc3379dd490e49dc640e,2025-04-27T07:15:15.580000
|
||||
CVE-2025-3963,0,0,08e91f8172cd60fb1f81af6801be8a8df69f0b804a3726797c783fc055a1c6e2,2025-04-27T08:15:14.353000
|
||||
CVE-2025-3961,0,1,4bac8fa6ffd06eead33e6e370e63a9d828b21c8d9f02a9990e5d2f449b575654,2025-04-28T15:15:45.943000
|
||||
CVE-2025-3962,0,1,509120d034512bf7590ee71a042f7320fc22247348ecd1057a0702893aabd58a,2025-04-28T15:15:46.060000
|
||||
CVE-2025-3963,0,1,71c436a30c3b10d07aaef3ba1920b96268b7af99010ea47f98671a9f77ec2757,2025-04-28T15:15:46.180000
|
||||
CVE-2025-3964,0,0,b21fb1af90e49351c094d0c93db5350a4a1ed4c9c3c93e6bf7307e295306726c,2025-04-27T09:15:15.540000
|
||||
CVE-2025-3965,0,0,a17d5bd0b47e8064ef7c9d5e1993630e1dc56ecc7264405e35a73c3f20bfee4c,2025-04-27T10:15:14.627000
|
||||
CVE-2025-3966,0,0,ec73bdd3843a77f5bf4f961981167ab50a0b1b584f442db8a5830f6f3af37085,2025-04-27T10:15:15.717000
|
||||
CVE-2025-3967,0,0,a757485c83f7ad3ae23444f7f56db24945a9a40f1e3d1780685fe14f9596cb56,2025-04-27T11:15:16.743000
|
||||
CVE-2025-3968,0,0,ae59d296b5fd013d095aff5042674e9e502e1410c13e6a6da34c3026db0e7c21,2025-04-27T11:15:16.950000
|
||||
CVE-2025-3966,0,1,1d09051196710df394b8716799ff77adb1274f7749209046c5ec89183797b557,2025-04-28T15:15:46.290000
|
||||
CVE-2025-3967,0,1,375e3af67e01a929adfbae270af5ba8b0cc708d97363f459d8438dd196930c84,2025-04-28T15:15:46.410000
|
||||
CVE-2025-3968,0,1,9a203e8ad808a1fd51353ba4c2b2977bd9e3577749fb00ee64ccbcdb0f779556,2025-04-28T15:15:46.527000
|
||||
CVE-2025-39688,0,0,98c7c61fe32c2ce6358a9d7ef0df54915bb47bee498593264d8ad933fcce6211,2025-04-21T14:23:45.950000
|
||||
CVE-2025-3969,0,0,e13cfaa079ae5e2ea512c3bd056969d8efef50ef70aac260842aa3e5c549567b,2025-04-27T12:15:14.077000
|
||||
CVE-2025-3970,0,0,7dfe31de7823dca76a8f72ec4f37c8d851a494db013815863a946195bede5d97,2025-04-27T13:15:14.550000
|
||||
@ -291278,17 +291283,17 @@ CVE-2025-3971,0,0,b6a0911b8d8d327777a5907887cb538046833daa6c5cee410dad7fc2d8c291
|
||||
CVE-2025-3972,0,0,575245ec139ee05243662ecc4693f08b08894c5030048b9cb53fdb6e9c2ce858,2025-04-27T14:15:16.240000
|
||||
CVE-2025-39728,0,0,1aabeb48c74961651a085e70675ac1fbb7850a26c8e3690479606fce3eed8d57,2025-04-21T14:23:45.950000
|
||||
CVE-2025-3973,0,0,7185a71a7968bab05d8a7ab2de6648dc249e6a8df96171e643478fc72e2bd846,2025-04-27T15:15:15.577000
|
||||
CVE-2025-39735,0,0,685f7725750b068bcf70f45c9b43584f95555d2cf42375499465209022c1892a,2025-04-21T14:23:45.950000
|
||||
CVE-2025-39735,0,1,96f9db3a9cd8ed512fd20eb50b496781a9c7b7582664dceb1a9693b9f654ce9e,2025-04-28T14:37:34.487000
|
||||
CVE-2025-3974,0,0,cc88a5551cfeb7a6ea2c180ac6862f1a69f07ceda7e1534a180ace6214ee67cb,2025-04-27T15:15:15.750000
|
||||
CVE-2025-3975,0,0,ccd2090e0033c3182f35c42461c91b7420600b4065a04085380e97e54751f7a5,2025-04-27T16:15:15.260000
|
||||
CVE-2025-39755,0,0,1f38e61cb827ac50879084bd3bf4c59efb9767371f960520c29d85a66c57d533,2025-04-21T14:23:45.950000
|
||||
CVE-2025-3975,0,1,62bf110e98456b96adbb0e1d79c9b53117e1bf71d76b6104b5a677fa2f81ce42,2025-04-28T15:15:46.760000
|
||||
CVE-2025-39755,0,1,9592dfcb27feea4aabb5a7ba0dc0c6514650aa209fd5fe2f3ededbb735ed12fd,2025-04-28T15:32:46.553000
|
||||
CVE-2025-3976,0,0,13905d0f00709e6872151e7ad1b1a6c91b55e9419f2a701304870aa7e8e601fd,2025-04-27T16:15:15.433000
|
||||
CVE-2025-3977,0,0,5e645294bea4f955dbd0c8bfe2e4d659f8a6cbaeaef4d07a6abec039717e4035,2025-04-27T17:15:15.853000
|
||||
CVE-2025-39778,0,0,fe7c9bb969991c6f8bd7e817623bae52cecda002e042590bfe971c7c81dc9221,2025-04-21T14:23:45.950000
|
||||
CVE-2025-3978,0,0,2ae726000475a1877b6d2b2bc2bce0aefd6ddc7a5b797a2eec055d71b6e4c1a9,2025-04-27T17:15:16.030000
|
||||
CVE-2025-3979,0,0,f4d2791ebc027f4f4851dce9ea15411bb525aa09eceed7cb069e5ffd2cf0f1ab,2025-04-27T18:15:16.020000
|
||||
CVE-2025-3980,0,0,c60e8fd71f58158175a8f0778b502b82e82edff0ca359aaa3a416b667c30a069,2025-04-27T18:15:16.237000
|
||||
CVE-2025-3981,0,0,e00538d9c56dd754fe25e8b3e5c7f162e04e282f768ed8abdbece459893339eb,2025-04-27T19:15:15.750000
|
||||
CVE-2025-3977,0,1,c1e50e78d343274621129f20445321598604c72f47885898eb78406f21e52a8a,2025-04-28T14:15:21.520000
|
||||
CVE-2025-39778,0,1,fc2e9a1fb637bb73885f33b2d5ce93fc454f2a441f142db493ef48df409e1554,2025-04-28T15:37:34.230000
|
||||
CVE-2025-3978,0,1,bc92ce55af996f6b405f8d8b6d897abb53d44677d7371d599fe1529394f5a206,2025-04-28T14:15:21.640000
|
||||
CVE-2025-3979,0,1,3eed181a4a18815f5d24e2e7c49bc0dfd20618c1736a3e4c48366a678e45673f,2025-04-28T14:15:21.767000
|
||||
CVE-2025-3980,0,1,ba3e464d7879015ce3f1e955f56f48a0c9c49dc48a63db59cfbd3db7bbe9d790,2025-04-28T14:15:21.890000
|
||||
CVE-2025-3981,0,1,a9636669d8d4cb9261149c2b06c3c7be44e8490c89b8b9be4fb90813c912214f,2025-04-28T14:15:22.013000
|
||||
CVE-2025-3982,0,0,4f8f549d1d80deb736d2fa8a9bf8c95ff99706664721ec9ea5e797ffff0b5328,2025-04-27T19:15:15.923000
|
||||
CVE-2025-3983,0,0,25cef30fdb4fe10ba7219695edb63044f6f8ab36f7472ef6a7410a1f5e2146f4,2025-04-27T20:15:15.350000
|
||||
CVE-2025-3984,0,0,c91dac686fb472be23da0ee0c6a53588be8c31d73e3e88b2f873b4f69af09b70,2025-04-27T20:15:15.537000
|
||||
@ -291326,10 +291331,14 @@ CVE-2025-4014,0,0,f259da298f4f8af0d94e8db357ade1efd3596c515c364d9d5ad548177efecd
|
||||
CVE-2025-4015,0,0,232ad8d07784c7f62ca3c92d0470dbab847354aba047abbda5ccbbb5a53b9ce5,2025-04-28T10:15:17.057000
|
||||
CVE-2025-4016,0,0,16f701a218e4c9c52d5777c88e9d05fa414760ac751896fa6c1b284b8a014d10,2025-04-28T11:15:38.657000
|
||||
CVE-2025-4017,0,0,9f05b4a2eb6e84cc88a7e99ef8ccfa2b8d02b26e170cf3daf0c31a72832baaaa,2025-04-28T11:15:38.847000
|
||||
CVE-2025-4018,1,1,b12b51cf30fc2db7d195c2c9ee830ba57f48502213630f4d9ad39d9d3bfacbe7,2025-04-28T12:15:31.913000
|
||||
CVE-2025-4019,1,1,026f93b3c776aee8c544c5f460bdd25f6379836f2a5d55dda570425a7ee6b846,2025-04-28T12:15:32.093000
|
||||
CVE-2025-4020,1,1,511fd7ea80791808b10d31addcf8c936b71df14f2c24338c3857d1e24f7e838a,2025-04-28T13:15:24.603000
|
||||
CVE-2025-4021,1,1,c6b32e73983711a929174c81d1269e862674efafae7a66852d16c04025876af8,2025-04-28T13:15:24.773000
|
||||
CVE-2025-4018,0,0,b12b51cf30fc2db7d195c2c9ee830ba57f48502213630f4d9ad39d9d3bfacbe7,2025-04-28T12:15:31.913000
|
||||
CVE-2025-4019,0,0,026f93b3c776aee8c544c5f460bdd25f6379836f2a5d55dda570425a7ee6b846,2025-04-28T12:15:32.093000
|
||||
CVE-2025-4020,0,0,511fd7ea80791808b10d31addcf8c936b71df14f2c24338c3857d1e24f7e838a,2025-04-28T13:15:24.603000
|
||||
CVE-2025-4021,0,0,c6b32e73983711a929174c81d1269e862674efafae7a66852d16c04025876af8,2025-04-28T13:15:24.773000
|
||||
CVE-2025-4022,1,1,a011d38395c9e900e4bcada9858b098f8d7441fd9b3e763ec79c0a9945d82071,2025-04-28T14:15:22.867000
|
||||
CVE-2025-4023,1,1,85c9398c80f20a209b25f610ddf665ce3506d1e4fe920218361ca91662c22eb5,2025-04-28T14:15:23.043000
|
||||
CVE-2025-4024,1,1,0ac57cf9887f802b63cc7c5701c4d82c5287aedf4b9f1ab63ff42a695cbedb85,2025-04-28T15:15:47.600000
|
||||
CVE-2025-4025,1,1,1b1b49f00b16e2bf6d2e9a008bc6dc606c5611760e84fe2041b0af8493c82b9a,2025-04-28T15:15:47.767000
|
||||
CVE-2025-40325,0,0,21d661e5b65e79dd3cd00a7c9db2e14d6a6a65a1394969a7ad07f16fa08c79ce,2025-04-21T14:23:45.950000
|
||||
CVE-2025-40364,0,0,e1468b00bb22572a62ec1b141065bed37efcb85f9368d87c29b0ce5bc57ec67c,2025-04-21T14:23:45.950000
|
||||
CVE-2025-41395,0,0,c0d9bccd77abd47bebe5c3b7233aa41647dd331b6362659738a8c7fec7081455,2025-04-24T07:15:31.600000
|
||||
@ -291374,9 +291383,9 @@ CVE-2025-43903,0,0,00b37505e4bad1c011979aeeb7ac0f46d600f0a3a2ddd582ccd8bfed7356e
|
||||
CVE-2025-43916,0,0,681d8be38d92746749b1aa52bc81a99ae8dcb7d5c6c1be22a9ecf0d141bf9654,2025-04-21T14:23:45.950000
|
||||
CVE-2025-43917,0,0,6cbc8a0cc4b5f4a260ea1bcaa2e61bc873dc43de357e9552c071e8ec2a49bca5,2025-04-21T14:23:45.950000
|
||||
CVE-2025-43918,0,0,c6804f12f91fd2a33114034d2a7e21d55151c0cf36b011a784bd1cc327d47c14,2025-04-21T14:23:45.950000
|
||||
CVE-2025-43919,0,0,55ad852a78495f6e218472fc33e0acbc71b7ed92ab828e832d69c95ea803d68c,2025-04-24T16:22:37.117000
|
||||
CVE-2025-43920,0,0,05b3e4c1a5c3a0593ddd3faa440158c8a71103e88ab91b374b9c65df4142c52d,2025-04-24T16:20:36.953000
|
||||
CVE-2025-43921,0,0,860aba6699eab477405736f86cb620ec9a60d3be813cd4186e40b0b2a10867ed,2025-04-24T16:16:59.597000
|
||||
CVE-2025-43919,0,1,755abcb8d09616a195e9d6af1306163e6a8ac43b52edd282a6c37eaf3c4a6f2b,2025-04-28T14:15:22.137000
|
||||
CVE-2025-43920,0,1,a93ea085d5c9b285842c20a6cabb6e3bd669bd42c39c42462b7c06195a41f1d6,2025-04-28T14:15:22.323000
|
||||
CVE-2025-43921,0,1,4042bcd81d7e3864da5b8ba4d01fe494ca12b33f201fc6021c6725eb890091e8,2025-04-28T14:15:22.477000
|
||||
CVE-2025-43922,0,0,78ba59a603bfb99812991a8e1a7955ce6faa943c6ec5cbadbdfa1e2ab9c91614,2025-04-23T14:08:13.383000
|
||||
CVE-2025-43928,0,0,ada37df9b018408af843f1b1cc9151f6f5a494aafca776d997eba7b7d4788264,2025-04-24T16:00:50.257000
|
||||
CVE-2025-43929,0,0,867435a167581ab99f3a2b85e0ea6073e3538639a37e0ae43a9f94228cfe9a85,2025-04-24T15:46:35.757000
|
||||
@ -291452,7 +291461,7 @@ CVE-2025-46272,0,0,6723f88845cee1e1cbb0cc8f1bfd044966d04b97767ef53e121be0034a68b
|
||||
CVE-2025-46273,0,0,d17f1c243c8f331f47f487cb9b89ff51d5b9a1113a60ac7af8fce23396651144,2025-04-24T23:15:15.673000
|
||||
CVE-2025-46274,0,0,6278bbb431335706a41e3628a533ceb0ce48f92d57ea7b392bf579f553e8b8c6,2025-04-24T23:15:15.827000
|
||||
CVE-2025-46275,0,0,a7109528e796df3e754eeba6ee8017193e4e96b7dbaf347dc967b55909d9e9a5,2025-04-24T23:15:15.977000
|
||||
CVE-2025-46333,0,0,4717c7f4cce97ab4f0a603aa816c1dd9bf72647fab1bd9590976420890c69a90,2025-04-25T21:15:39.577000
|
||||
CVE-2025-46333,0,1,3f604e4ec484052a98804d8813a23cfbac08509ef9dc35db23d61edbd2f31482,2025-04-28T15:15:47.057000
|
||||
CVE-2025-46374,0,0,0df9474f29e53d817d13f584af47eb0c12cf27caea3c45635f75daa159094ef3,2025-04-24T03:15:15.797000
|
||||
CVE-2025-46375,0,0,c7cadd24d0c0ef6263c2e4f0e993c1b14e1cbac838119ad2f4f42dcfb3b1b113,2025-04-24T03:15:15.867000
|
||||
CVE-2025-46376,0,0,4a4eb88dda9426fffae031e9cc4c1cb39c01ffb8fef76394b4584f59d8624ab6,2025-04-24T03:15:15.917000
|
||||
@ -291577,7 +291586,7 @@ CVE-2025-46654,0,0,572c4d63fa2f8afca64ec12e1381813d160fa2c2ee84d4e0448e47cdcd412
|
||||
CVE-2025-46655,0,0,a9f672e75f586721e3ec47d88a24167a5da40f45a10ccbe0303bfb6061c72944,2025-04-26T21:15:15.260000
|
||||
CVE-2025-46656,0,0,696b18d293f3e47530d9a462ec4dcce6fe7c7473fa83e2a90e8336464b46aa30,2025-04-26T22:15:17.260000
|
||||
CVE-2025-46657,0,0,61b5714a3945d18f5b1028d9d01f06343b4f515928a414fd8f4acc9db2248fff,2025-04-27T17:15:16.193000
|
||||
CVE-2025-46661,1,1,1b88a1421b991af9f83e00012e017bc52e3d2608548a1f64585fab31eb98f621,2025-04-28T13:15:24.117000
|
||||
CVE-2025-46661,0,1,2337e0af0721676a9a8551219ea6d6cbd8b1bdbec9e22e2c7f7acea8c59de4a9,2025-04-28T14:15:22.637000
|
||||
CVE-2025-46672,0,0,a515f04f2684525b908fbd5bf52c62317ae3f104cec7ce6d3fbe0f544f2f50f4,2025-04-27T01:15:44.327000
|
||||
CVE-2025-46673,0,0,b4b185c7af04fb38cea193788026d34ee5cbd860f38177d871857854e4306632,2025-04-27T01:15:44.477000
|
||||
CVE-2025-46674,0,0,46444152edd713c1307e6ccc5d1033b322cbe1d07cb6f10dea38fc2301d3d28e,2025-04-27T01:15:44.623000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user