mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-06 18:52:58 +00:00
Auto-Update: 2025-03-27T05:00:36.103363+00:00
This commit is contained in:
parent
d30a31a4b4
commit
8cb0c9d332
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2017-12637",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2017-08-07T20:29:01.120",
|
||||
"lastModified": "2025-03-20T01:00:01.543",
|
||||
"lastModified": "2025-03-27T03:15:12.880",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -129,20 +129,8 @@
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://www.sh0w.top/index.php/archives/7/",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"URL Repurposed"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.sh0w.top/index.php/archives/7/",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"URL Repurposed"
|
||||
]
|
||||
"url": "https://web.archive.org/web/20170807202056/http://www.sh0w.top/index.php/archives/7/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
141
CVE-2025/CVE-2025-28xx/CVE-2025-2831.json
Normal file
141
CVE-2025/CVE-2025-28xx/CVE-2025-2831.json
Normal file
@ -0,0 +1,141 @@
|
||||
{
|
||||
"id": "CVE-2025-2831",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-03-27T03:15:14.080",
|
||||
"lastModified": "2025-03-27T03:15:14.080",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability has been found in mingyuefusu \u660e\u6708\u590d\u82cf tushuguanlixitong \u56fe\u4e66\u7ba1\u7406\u7cfb\u7edf up to d4836f6b49cd0ac79a4021b15ce99ff7229d4694 and classified as critical. This vulnerability affects the function getBookList of the file /admin/bookList?page=1&limit=10. The manipulation of the argument condition leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "LOW",
|
||||
"vulnIntegrityImpact": "LOW",
|
||||
"vulnAvailabilityImpact": "LOW",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
||||
"baseScore": 6.5,
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL"
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-74"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gitee.com/mingyuefusu/tushuguanlixitong/issues/IBTSJL",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.301468",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.301468",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.521458",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
141
CVE-2025/CVE-2025-28xx/CVE-2025-2832.json
Normal file
141
CVE-2025/CVE-2025-28xx/CVE-2025-2832.json
Normal file
@ -0,0 +1,141 @@
|
||||
{
|
||||
"id": "CVE-2025-2832",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-03-27T04:15:21.717",
|
||||
"lastModified": "2025-03-27T04:15:21.717",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in mingyuefusu \u660e\u6708\u590d\u82cf tushuguanlixitong \u56fe\u4e66\u7ba1\u7406\u7cfb\u7edf up to d4836f6b49cd0ac79a4021b15ce99ff7229d4694 and classified as problematic. This issue affects some unknown processing. The manipulation leads to cross-site request forgery. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "PASSIVE",
|
||||
"vulnConfidentialityImpact": "NONE",
|
||||
"vulnIntegrityImpact": "LOW",
|
||||
"vulnAvailabilityImpact": "NONE",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
|
||||
"baseScore": 5.0,
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "NONE",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 10.0,
|
||||
"impactScore": 2.9,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gitee.com/mingyuefusu/tushuguanlixitong/issues/IBTSPH",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.301469",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.301469",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.521460",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
145
CVE-2025/CVE-2025-28xx/CVE-2025-2833.json
Normal file
145
CVE-2025/CVE-2025-28xx/CVE-2025-2833.json
Normal file
@ -0,0 +1,145 @@
|
||||
{
|
||||
"id": "CVE-2025-2833",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-03-27T04:15:23.847",
|
||||
"lastModified": "2025-03-27T04:15:23.847",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in zhangyd-c OneBlog up to 2.3.9. It has been classified as problematic. Affected is an unknown function of the component HTTP Header Handler. The manipulation of the argument X-Forwarded-For leads to inefficient regular expression complexity. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 6.9,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "NONE",
|
||||
"vulnIntegrityImpact": "NONE",
|
||||
"vulnAvailabilityImpact": "LOW",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
|
||||
"baseScore": 5.0,
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "NONE",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "PARTIAL"
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 10.0,
|
||||
"impactScore": 2.9,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-400"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-1333"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/zhangyd-c/OneBlog/issues/35",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/zhangyd-c/OneBlog/issues/35#issue-2914268214",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.301470",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.301470",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.521813",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
141
CVE-2025/CVE-2025-28xx/CVE-2025-2835.json
Normal file
141
CVE-2025/CVE-2025-28xx/CVE-2025-2835.json
Normal file
@ -0,0 +1,141 @@
|
||||
{
|
||||
"id": "CVE-2025-2835",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-03-27T04:15:25.520",
|
||||
"lastModified": "2025-03-27T04:15:25.520",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in zhangyd-c OneBlog up to 2.3.9. It has been declared as problematic. Affected by this vulnerability is the function autoLink of the file com/zyd/blog/controller/RestApiController.java. The manipulation leads to server-side request forgery. The attack can be launched remotely. The exploit has been disclosed to the public and may be used."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "NONE",
|
||||
"vulnIntegrityImpact": "LOW",
|
||||
"vulnAvailabilityImpact": "NONE",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
|
||||
"baseScore": 4.0,
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 2.9,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-918"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/zhangyd-c/OneBlog/issues/36",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/zhangyd-c/OneBlog/issues/36#issue-2923097259",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.301471",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.301471",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.521815",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
16
CVE-2025/CVE-2025-311xx/CVE-2025-31105.json
Normal file
16
CVE-2025/CVE-2025-311xx/CVE-2025-31105.json
Normal file
@ -0,0 +1,16 @@
|
||||
{
|
||||
"id": "CVE-2025-31105",
|
||||
"sourceIdentifier": "psirt@fortinet.com",
|
||||
"published": "2025-03-27T04:15:27.447",
|
||||
"lastModified": "2025-03-27T04:15:27.447",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Rejected reason: Not used"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
16
CVE-2025/CVE-2025-311xx/CVE-2025-31106.json
Normal file
16
CVE-2025/CVE-2025-311xx/CVE-2025-31106.json
Normal file
@ -0,0 +1,16 @@
|
||||
{
|
||||
"id": "CVE-2025-31106",
|
||||
"sourceIdentifier": "psirt@fortinet.com",
|
||||
"published": "2025-03-27T04:15:28.007",
|
||||
"lastModified": "2025-03-27T04:15:28.007",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Rejected reason: Not used"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
16
CVE-2025/CVE-2025-311xx/CVE-2025-31107.json
Normal file
16
CVE-2025/CVE-2025-311xx/CVE-2025-31107.json
Normal file
@ -0,0 +1,16 @@
|
||||
{
|
||||
"id": "CVE-2025-31107",
|
||||
"sourceIdentifier": "psirt@fortinet.com",
|
||||
"published": "2025-03-27T04:15:28.073",
|
||||
"lastModified": "2025-03-27T04:15:28.073",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Rejected reason: Not used"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
16
CVE-2025/CVE-2025-311xx/CVE-2025-31108.json
Normal file
16
CVE-2025/CVE-2025-311xx/CVE-2025-31108.json
Normal file
@ -0,0 +1,16 @@
|
||||
{
|
||||
"id": "CVE-2025-31108",
|
||||
"sourceIdentifier": "psirt@fortinet.com",
|
||||
"published": "2025-03-27T04:15:28.140",
|
||||
"lastModified": "2025-03-27T04:15:28.140",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Rejected reason: Not used"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
16
CVE-2025/CVE-2025-311xx/CVE-2025-31109.json
Normal file
16
CVE-2025/CVE-2025-311xx/CVE-2025-31109.json
Normal file
@ -0,0 +1,16 @@
|
||||
{
|
||||
"id": "CVE-2025-31109",
|
||||
"sourceIdentifier": "psirt@fortinet.com",
|
||||
"published": "2025-03-27T04:15:28.717",
|
||||
"lastModified": "2025-03-27T04:15:28.717",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Rejected reason: Not used"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
16
CVE-2025/CVE-2025-311xx/CVE-2025-31110.json
Normal file
16
CVE-2025/CVE-2025-311xx/CVE-2025-31110.json
Normal file
@ -0,0 +1,16 @@
|
||||
{
|
||||
"id": "CVE-2025-31110",
|
||||
"sourceIdentifier": "psirt@fortinet.com",
|
||||
"published": "2025-03-27T04:15:28.787",
|
||||
"lastModified": "2025-03-27T04:15:28.787",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Rejected reason: Not used"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
16
CVE-2025/CVE-2025-311xx/CVE-2025-31111.json
Normal file
16
CVE-2025/CVE-2025-311xx/CVE-2025-31111.json
Normal file
@ -0,0 +1,16 @@
|
||||
{
|
||||
"id": "CVE-2025-31111",
|
||||
"sourceIdentifier": "psirt@fortinet.com",
|
||||
"published": "2025-03-27T04:15:29.310",
|
||||
"lastModified": "2025-03-27T04:15:29.310",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Rejected reason: Not used"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
16
CVE-2025/CVE-2025-311xx/CVE-2025-31112.json
Normal file
16
CVE-2025/CVE-2025-311xx/CVE-2025-31112.json
Normal file
@ -0,0 +1,16 @@
|
||||
{
|
||||
"id": "CVE-2025-31112",
|
||||
"sourceIdentifier": "psirt@fortinet.com",
|
||||
"published": "2025-03-27T04:15:29.427",
|
||||
"lastModified": "2025-03-27T04:15:29.427",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Rejected reason: Not used"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
16
CVE-2025/CVE-2025-311xx/CVE-2025-31113.json
Normal file
16
CVE-2025/CVE-2025-311xx/CVE-2025-31113.json
Normal file
@ -0,0 +1,16 @@
|
||||
{
|
||||
"id": "CVE-2025-31113",
|
||||
"sourceIdentifier": "psirt@fortinet.com",
|
||||
"published": "2025-03-27T04:15:29.493",
|
||||
"lastModified": "2025-03-27T04:15:29.493",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Rejected reason: Not used"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-31160",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-03-26T21:15:23.323",
|
||||
"lastModified": "2025-03-27T02:15:16.217",
|
||||
"lastModified": "2025-03-27T03:15:14.270",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -67,6 +67,18 @@
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2025/03/26/3",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2025/03/27/1",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2025/03/27/2",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2025/03/27/3",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
}
|
||||
]
|
||||
}
|
78
CVE-2025/CVE-2025-311xx/CVE-2025-31165.json
Normal file
78
CVE-2025/CVE-2025-311xx/CVE-2025-31165.json
Normal file
@ -0,0 +1,78 @@
|
||||
{
|
||||
"id": "CVE-2025-31165",
|
||||
"sourceIdentifier": "5ac195ad-69e7-48e7-9c1e-bfc958c39761",
|
||||
"published": "2025-03-27T04:15:29.567",
|
||||
"lastModified": "2025-03-27T04:15:29.567",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cross-Site Scripting (XSS) vulnerability in the Logbug module of NightWolf Penetration Testing Platform 1.2.2 allows attackers to execute JavaScript through the markdown editor feature."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "5ac195ad-69e7-48e7-9c1e-bfc958c39761",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:H/VA:N/SC:N/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 6.9,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "PASSIVE",
|
||||
"vulnConfidentialityImpact": "NONE",
|
||||
"vulnIntegrityImpact": "HIGH",
|
||||
"vulnAvailabilityImpact": "NONE",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "LOW",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "5ac195ad-69e7-48e7-9c1e-bfc958c39761",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://bug.report.night-wolf.io/changelogs",
|
||||
"source": "5ac195ad-69e7-48e7-9c1e-bfc958c39761"
|
||||
}
|
||||
]
|
||||
}
|
39
README.md
39
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2025-03-27T03:00:19.573269+00:00
|
||||
2025-03-27T05:00:36.103363+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2025-03-27T02:15:16.217000+00:00
|
||||
2025-03-27T04:15:29.567000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,32 +33,35 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
286741
|
||||
286755
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `3`
|
||||
Recently added CVEs: `14`
|
||||
|
||||
- [CVE-2024-45352](CVE-2024/CVE-2024-453xx/CVE-2024-45352.json) (`2025-03-27T02:15:15.873`)
|
||||
- [CVE-2025-2481](CVE-2025/CVE-2025-24xx/CVE-2025-2481.json) (`2025-03-27T02:15:16.053`)
|
||||
- [CVE-2025-30355](CVE-2025/CVE-2025-303xx/CVE-2025-30355.json) (`2025-03-27T01:15:12.500`)
|
||||
- [CVE-2025-2831](CVE-2025/CVE-2025-28xx/CVE-2025-2831.json) (`2025-03-27T03:15:14.080`)
|
||||
- [CVE-2025-2832](CVE-2025/CVE-2025-28xx/CVE-2025-2832.json) (`2025-03-27T04:15:21.717`)
|
||||
- [CVE-2025-2833](CVE-2025/CVE-2025-28xx/CVE-2025-2833.json) (`2025-03-27T04:15:23.847`)
|
||||
- [CVE-2025-2835](CVE-2025/CVE-2025-28xx/CVE-2025-2835.json) (`2025-03-27T04:15:25.520`)
|
||||
- [CVE-2025-31105](CVE-2025/CVE-2025-311xx/CVE-2025-31105.json) (`2025-03-27T04:15:27.447`)
|
||||
- [CVE-2025-31106](CVE-2025/CVE-2025-311xx/CVE-2025-31106.json) (`2025-03-27T04:15:28.007`)
|
||||
- [CVE-2025-31107](CVE-2025/CVE-2025-311xx/CVE-2025-31107.json) (`2025-03-27T04:15:28.073`)
|
||||
- [CVE-2025-31108](CVE-2025/CVE-2025-311xx/CVE-2025-31108.json) (`2025-03-27T04:15:28.140`)
|
||||
- [CVE-2025-31109](CVE-2025/CVE-2025-311xx/CVE-2025-31109.json) (`2025-03-27T04:15:28.717`)
|
||||
- [CVE-2025-31110](CVE-2025/CVE-2025-311xx/CVE-2025-31110.json) (`2025-03-27T04:15:28.787`)
|
||||
- [CVE-2025-31111](CVE-2025/CVE-2025-311xx/CVE-2025-31111.json) (`2025-03-27T04:15:29.310`)
|
||||
- [CVE-2025-31112](CVE-2025/CVE-2025-311xx/CVE-2025-31112.json) (`2025-03-27T04:15:29.427`)
|
||||
- [CVE-2025-31113](CVE-2025/CVE-2025-311xx/CVE-2025-31113.json) (`2025-03-27T04:15:29.493`)
|
||||
- [CVE-2025-31165](CVE-2025/CVE-2025-311xx/CVE-2025-31165.json) (`2025-03-27T04:15:29.567`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `10`
|
||||
Recently modified CVEs: `2`
|
||||
|
||||
- [CVE-2019-9874](CVE-2019/CVE-2019-98xx/CVE-2019-9874.json) (`2025-03-27T01:00:02.327`)
|
||||
- [CVE-2019-9875](CVE-2019/CVE-2019-98xx/CVE-2019-9875.json) (`2025-03-27T01:00:02.343`)
|
||||
- [CVE-2020-6572](CVE-2020/CVE-2020-65xx/CVE-2020-6572.json) (`2025-03-27T01:00:02.343`)
|
||||
- [CVE-2024-12810](CVE-2024/CVE-2024-128xx/CVE-2024-12810.json) (`2025-03-27T01:33:31.260`)
|
||||
- [CVE-2024-13737](CVE-2024/CVE-2024-137xx/CVE-2024-13737.json) (`2025-03-27T00:56:46.017`)
|
||||
- [CVE-2024-13771](CVE-2024/CVE-2024-137xx/CVE-2024-13771.json) (`2025-03-27T01:27:47.273`)
|
||||
- [CVE-2024-13772](CVE-2024/CVE-2024-137xx/CVE-2024-13772.json) (`2025-03-27T01:22:24.920`)
|
||||
- [CVE-2024-13773](CVE-2024/CVE-2024-137xx/CVE-2024-13773.json) (`2025-03-27T01:07:51.827`)
|
||||
- [CVE-2025-1507](CVE-2025/CVE-2025-15xx/CVE-2025-1507.json) (`2025-03-27T01:35:44.843`)
|
||||
- [CVE-2025-31160](CVE-2025/CVE-2025-311xx/CVE-2025-31160.json) (`2025-03-27T02:15:16.217`)
|
||||
- [CVE-2017-12637](CVE-2017/CVE-2017-126xx/CVE-2017-12637.json) (`2025-03-27T03:15:12.880`)
|
||||
- [CVE-2025-31160](CVE-2025/CVE-2025-311xx/CVE-2025-31160.json) (`2025-03-27T03:15:14.270`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
42
_state.csv
42
_state.csv
@ -96408,7 +96408,7 @@ CVE-2017-12633,0,0,85930a2bf778b4f4f57357436c86ab256c46744871048698c82901a2fcb3e
|
||||
CVE-2017-12634,0,0,285fa30501b95fd53aff13c49a313d2354c790284dfb455fff910e16905e8854,2024-11-21T03:09:56.363000
|
||||
CVE-2017-12635,0,0,ef5830d432984d0f0a23c315dc13e543960e983cd8544c887f73d7e90991e23d,2024-11-21T03:09:56.480000
|
||||
CVE-2017-12636,0,0,d1dc922161316d5bf30343a79f560dc7590c7dc5e131b4739914d7cd825b4a40,2024-11-21T03:09:56.593000
|
||||
CVE-2017-12637,0,0,2020f941677ff9e4957153fa9ecce979f5c59946cc5a25c5f8837c0458a0ac48,2025-03-20T01:00:01.543000
|
||||
CVE-2017-12637,0,1,d5190a54a3d9e1be93902b98c0edf2a8839bd73e40a9cf228eb9a5a2894923f1,2025-03-27T03:15:12.880000
|
||||
CVE-2017-12638,0,0,95f4d9075726c3dad3050ad010c865ba00b979be48ef168b1a789aded5bcc9f3,2024-11-21T03:09:56.837000
|
||||
CVE-2017-12639,0,0,44b0ae40eb65ce63a9e70a0d6bfcaa7064777a627e9853ee1888fb1639a9523b,2024-11-21T03:09:56.960000
|
||||
CVE-2017-1264,0,0,01d2f39bf96f3f81c69f7d13a8cea1c49d8936ff57f7f6846754b9f4979ca941,2024-11-21T03:21:36.107000
|
||||
@ -144212,8 +144212,8 @@ CVE-2019-9870,0,0,062347afaead72fa94abc21c33a5861fb0027ef274aac86f640300ed7ac52d
|
||||
CVE-2019-9871,0,0,ecbf9a2a46bdc0f0799295372974f7e4fb138b086b11240520c5e86a9feb2c22,2024-11-21T04:52:28.770000
|
||||
CVE-2019-9872,0,0,69dc93bfc540144bf7909b63e971badc086b537b667706e81f569fb276514791,2024-11-21T04:52:28.907000
|
||||
CVE-2019-9873,0,0,af140e2a7d17703fab34c4880c5a574af4e50539c38e7eb27174aef7f9fc441b,2024-11-21T04:52:29.043000
|
||||
CVE-2019-9874,0,1,c9569a020600d75a3c9f21065f165bcd3dce6b7e37d729741e058561c4415a6a,2025-03-27T01:00:02.327000
|
||||
CVE-2019-9875,0,1,8927a1962705d95aba3b9def0b99201f2116c11ed2d06509e1e0f9b1e97ed7f3,2025-03-27T01:00:02.343000
|
||||
CVE-2019-9874,0,0,c9569a020600d75a3c9f21065f165bcd3dce6b7e37d729741e058561c4415a6a,2025-03-27T01:00:02.327000
|
||||
CVE-2019-9875,0,0,8927a1962705d95aba3b9def0b99201f2116c11ed2d06509e1e0f9b1e97ed7f3,2025-03-27T01:00:02.343000
|
||||
CVE-2019-9877,0,0,d70a742f8560436a6bad08feb159e670d666fe63a3e521d5e75ac5bb80ac8ee7,2024-11-21T04:52:29.453000
|
||||
CVE-2019-9878,0,0,92bf0deac9abf1727596d30937bb1d1dae4e81d73f4d0b1a0f322a153d61e024,2024-11-21T04:52:29.583000
|
||||
CVE-2019-9879,0,0,3bacaf9b0b5d86c2556ab398cef4a166e3cd91d22d54e6a93d8cb3b250b49a89,2024-11-21T04:52:29.720000
|
||||
@ -162014,7 +162014,7 @@ CVE-2020-6568,0,0,0d06ac2d74579c9841c223e03809605179c185b1cd93859e050e309f31fee0
|
||||
CVE-2020-6569,0,0,dd7acd9fc556b7b252c05b52dfba75961e01f6fda7326f72f03c9cb506d91b0e,2024-11-21T05:35:58.860000
|
||||
CVE-2020-6570,0,0,40c1c23d973add53721be1be2de9a2c4c86cb53d72938de93810d8529c9d0198,2024-11-21T05:35:58.973000
|
||||
CVE-2020-6571,0,0,735d3a790133bdd740d6dd33af2c2857cf73a47d1fede83582c7291195240a26,2024-11-21T05:35:59.090000
|
||||
CVE-2020-6572,0,1,dd6eeaf3dfffd36594e2861bfe85ecfea53f4aa9c565ab6d306516ada3746fb4,2025-03-27T01:00:02.343000
|
||||
CVE-2020-6572,0,0,dd6eeaf3dfffd36594e2861bfe85ecfea53f4aa9c565ab6d306516ada3746fb4,2025-03-27T01:00:02.343000
|
||||
CVE-2020-6573,0,0,7047a584fd32b6b671bfff5b08be624a4e9187010bd11257c53f2886f046384b,2024-11-21T05:35:59.293000
|
||||
CVE-2020-6574,0,0,303ad55fcb736769f4cf9ea3ed4a390f8f37dd9323d86dff170695ea9dcaf2bf,2024-11-21T05:35:59.420000
|
||||
CVE-2020-6575,0,0,62024afcd971a1d42c6d1ce843a96019408fb91a7a5f300a21805d0cdf3b1172,2024-11-21T05:35:59.543000
|
||||
@ -247129,7 +247129,7 @@ CVE-2024-12805,0,0,e53ccf7e5ed7d4029905e02b94c08493035711f3a6fbf1927b3a1f3594c5d
|
||||
CVE-2024-12806,0,0,d3ad8b949669d01946d03cf78ae2e87493233ba523f3d23e253ed03518cfb676,2025-01-17T03:15:07.337000
|
||||
CVE-2024-12807,0,0,1d134b4e10fd5c2df6e8d1acfd31e14ba142e002cf7d83d94986fb0c56cb2884,2025-01-28T16:15:37.633000
|
||||
CVE-2024-12809,0,0,612259b2cda97c5061140929bc611da24ff06e8922b144348f21ead0b174d40b,2025-03-07T07:15:21.380000
|
||||
CVE-2024-12810,0,1,9bbffebac38110592c1786faed3007af91859a7eb270b29f500e0f7471999e10,2025-03-27T01:33:31.260000
|
||||
CVE-2024-12810,0,0,9bbffebac38110592c1786faed3007af91859a7eb270b29f500e0f7471999e10,2025-03-27T01:33:31.260000
|
||||
CVE-2024-12811,0,0,cbebe7e51738cd8bd29e461cde6a0001affb6783b830fde9fb7108c4a80fc1a2,2025-02-28T00:15:35.790000
|
||||
CVE-2024-12813,0,0,3b639e8b48ce8f9359f78eb0fcbfb138e695095dcc7dc21b7df78520a10ef17d,2025-02-24T14:24:12.300000
|
||||
CVE-2024-12814,0,0,9d88ed8035fdc2fe3c6fe32e0accb8f4976205d682521fcc6260cfe967c9dc43,2024-12-24T07:15:10.800000
|
||||
@ -248054,7 +248054,7 @@ CVE-2024-13733,0,0,4ca526af1929c133c0fe46b638ac9c59d6820bc471060a7321cdbca576df0
|
||||
CVE-2024-13734,0,0,17fab3f74e78896a40ac1961915d61db429551aa26d55adeda206fce66c88861,2025-03-11T15:55:48.603000
|
||||
CVE-2024-13735,0,0,3547c31c6d72f19019bc47ce66440b94aad2dbe68a07077b91d9f59acae687cd,2025-02-25T03:45:15.060000
|
||||
CVE-2024-13736,0,0,3362a69c50f09f93ac1b8892771db3d9d5410b27ce15edc8013225c7425828fe,2025-03-06T15:08:38
|
||||
CVE-2024-13737,0,1,3a0a6a4e9311e69c694504178165fb386a940d8fbd4d83c8600dd61fd4e2edef,2025-03-27T00:56:46.017000
|
||||
CVE-2024-13737,0,0,3a0a6a4e9311e69c694504178165fb386a940d8fbd4d83c8600dd61fd4e2edef,2025-03-27T00:56:46.017000
|
||||
CVE-2024-13739,0,0,bfdb9f2fe55c8ac00c8481b32b628ed6835cb3ca616f5bee1128858a8562c075,2025-03-27T00:51:56.443000
|
||||
CVE-2024-1374,0,0,8b967aad89e76e7b7285732fb028781ee942f5f6a3c1468dd34bb1833f269dd3,2024-11-21T08:50:26.443000
|
||||
CVE-2024-13740,0,0,7ff99f97d425424bdc9a3d1a435df988f74877e53c6e3d16169a71dec8c37f3b,2025-02-24T12:41:27.353000
|
||||
@ -248078,9 +248078,9 @@ CVE-2024-13768,0,0,65f9efb98da5492354189d6fbc823165fa39f9d576ed31c97572c09ab668b
|
||||
CVE-2024-13769,0,0,6fa2e289d8cf3e90cab0c96a01fffe9940909434acbdd1bee567bf2a5e72cf56,2025-02-24T15:54:05.167000
|
||||
CVE-2024-1377,0,0,76446229d1bded69224cd2e98212f244bd2380b3470adb0152ce2b85f9216c33,2025-01-07T18:20:57.347000
|
||||
CVE-2024-13770,0,0,eedd6cc35f686f8347a61efabc64272551833ee2e82bdd330567f722ff99ade8,2025-02-24T17:08:04.307000
|
||||
CVE-2024-13771,0,1,949738633d703300748648fb69f661517bd96978bb56c94eead1be99afb2462f,2025-03-27T01:27:47.273000
|
||||
CVE-2024-13772,0,1,e18724330a936d4d790bad539c0685998ca571e65ae4da14273706ffc70edac4,2025-03-27T01:22:24.920000
|
||||
CVE-2024-13773,0,1,acdd0a13ab662eb153e0e047745f468f0c691fa835346ca4efc9e7240c863343,2025-03-27T01:07:51.827000
|
||||
CVE-2024-13771,0,0,949738633d703300748648fb69f661517bd96978bb56c94eead1be99afb2462f,2025-03-27T01:27:47.273000
|
||||
CVE-2024-13772,0,0,e18724330a936d4d790bad539c0685998ca571e65ae4da14273706ffc70edac4,2025-03-27T01:22:24.920000
|
||||
CVE-2024-13773,0,0,acdd0a13ab662eb153e0e047745f468f0c691fa835346ca4efc9e7240c863343,2025-03-27T01:07:51.827000
|
||||
CVE-2024-13774,0,0,7926f46cbbe245fc4b69a913b305cdf8d086f57fe42cd5293333d393cb9ec93a,2025-03-12T17:01:06.413000
|
||||
CVE-2024-13775,0,0,4f9074e732a3ab519a109b5697b6e141a486c1977d56f68019ad553f34df5449,2025-02-24T19:04:52.170000
|
||||
CVE-2024-13777,0,0,e95e92048e929c187fcb10d876bc7666966c67f194b150a2f5d7dbd9a477d6cc,2025-03-05T10:15:15.367000
|
||||
@ -268424,7 +268424,7 @@ CVE-2024-45346,0,0,556b0325369db812da5d3ca351593663eeefcc15146e049af11d00d6b0f23
|
||||
CVE-2024-45348,0,0,1e1db77a5a16312aa537fb47b5ac485ad4a9ec1edf7b08e9d1addf2cc98471e9,2024-11-25T17:14:11.713000
|
||||
CVE-2024-4535,0,0,78f0543f36f54882e03e81f0faf12704615c89d5497f070efb8f0b2a49e7c790,2025-03-25T15:15:23.147000
|
||||
CVE-2024-45351,0,0,9798bc02eb0ba83db1ec479e2565390e6f6e7ab4d219551bf7245075b78bfee8,2025-03-26T14:15:31.457000
|
||||
CVE-2024-45352,1,1,de7c306e0645174ec78d434495a14130b165ebf334e095efc8cf412f3b8d78ad,2025-03-27T02:15:15.873000
|
||||
CVE-2024-45352,0,0,de7c306e0645174ec78d434495a14130b165ebf334e095efc8cf412f3b8d78ad,2025-03-27T02:15:15.873000
|
||||
CVE-2024-4536,0,0,d554a9fba63153c422b87ae2d4b0219537ca1cbc00fd943074006c5d6a843426,2025-02-06T17:32:48.777000
|
||||
CVE-2024-45366,0,0,d13f4b03dcbe654ea752888fe69e44580333b063ff67391732408feaba64beb9,2024-11-05T22:35:10.920000
|
||||
CVE-2024-45367,0,0,64e84bc9ed60e849e1ae71705aae4a59b4ff0cb910f064adb8ff87e0d48d255e,2024-10-04T13:50:43.727000
|
||||
@ -281865,7 +281865,7 @@ CVE-2025-1503,0,0,2ca03eefe6e9ae5c9c7fbf3c0a67f53490f3fa4743fc5d41f8919dbe81c8e9
|
||||
CVE-2025-1504,0,0,63c59f8b26cf8b21f0390a21fa6fac2c1c23d38ed0b94a4990b2f1de80d8483e,2025-03-24T18:27:10.747000
|
||||
CVE-2025-1505,0,0,941d3b1ae0c992e2675a622234390037253a212a5d42d0d53217112bc5422121,2025-03-06T20:36:32.810000
|
||||
CVE-2025-1506,0,0,0f896eaadc8a073897781bc944e7b39e9f71c9b2af47691e38ab32de0cbb6c36,2025-03-06T18:54:45.667000
|
||||
CVE-2025-1507,0,1,1d81dcd81d7714294007126db512dbf0cb7786fda01d7c32c2cb46eeed18f5a8,2025-03-27T01:35:44.843000
|
||||
CVE-2025-1507,0,0,1d81dcd81d7714294007126db512dbf0cb7786fda01d7c32c2cb46eeed18f5a8,2025-03-27T01:35:44.843000
|
||||
CVE-2025-1508,0,0,ec65239dbe7ffdef1a707b5ab0a34ed1dc416b8a5207f584ccfbef8fe7fc9ef6,2025-03-20T13:57:41.123000
|
||||
CVE-2025-1509,0,0,dd42a33d90057770cc0fff8a787b9ce6f9b83b6dcef0adadc46d0dded06e7aa0,2025-03-06T15:12:33.540000
|
||||
CVE-2025-1510,0,0,908b98a8ee37341a28713a06694a08e53c25ab91ce664e9dcc93619135ea532a,2025-03-06T15:13:33.280000
|
||||
@ -284937,7 +284937,7 @@ CVE-2025-24805,0,0,ec139300c8aba94d67e6328d56741782b279b0f8fae86fc167a59b6e24537
|
||||
CVE-2025-24806,0,0,09fa1e87d8fedd5d28ff5cb9bac6bc7267715c2451739d08475197db5a3aa60a,2025-02-19T18:15:24.467000
|
||||
CVE-2025-24807,0,0,a9342833f23aca9efb5658eaedc615b0791a1b8d97d1be177e79dcc0108d2f91,2025-02-21T15:26:57.507000
|
||||
CVE-2025-24808,0,0,eb8c03a85e5a0b4334ba1721c4f793b5b4f69a07bcb40be207ceebe068e6f853,2025-03-26T15:16:07.630000
|
||||
CVE-2025-2481,1,1,c670ab5414c9b50b45c90dccf21b7f800c9d25c4c2c263f1f02a0d8e9b956377,2025-03-27T02:15:16.053000
|
||||
CVE-2025-2481,0,0,c670ab5414c9b50b45c90dccf21b7f800c9d25c4c2c263f1f02a0d8e9b956377,2025-03-27T02:15:16.053000
|
||||
CVE-2025-24810,0,0,5dc96a04891b646d8f099d1fa627e0a60065bb9f47866c74211a0f5415867e23,2025-01-28T05:15:11.413000
|
||||
CVE-2025-24811,0,0,2da7e99907675b0c3b84fff601eb43c4c4c27c662d95c7205901bce5bb8705d8,2025-02-11T11:15:16.907000
|
||||
CVE-2025-24812,0,0,3542fd62679fcd1754aabe0f38d924c5bd34578dfc13aa46aeaa150dd810a16a,2025-02-11T11:15:17.080000
|
||||
@ -286388,6 +286388,10 @@ CVE-2025-28015,0,0,648b242f524f2d1e65282c0d2ade8d5979df5a4c9cf086b42e2449484b2f9
|
||||
CVE-2025-2819,0,0,acbdd40072154ca830b290ceacb5b4dfa8632a0dc4fb036216485a9f43aa9098,2025-03-26T15:16:21.970000
|
||||
CVE-2025-2820,0,0,db88335214767762df1b2f8e431df8129ca3f932fce4bd110305a19756d1fc23,2025-03-26T15:16:22.167000
|
||||
CVE-2025-2825,0,0,e6427ab25f643e9540d2d84fde005640737b39dcba63576f9ebc553d622b325a,2025-03-26T17:15:26.410000
|
||||
CVE-2025-2831,1,1,112e7bcf438e27aecc368a9bead7a0207662e204e20ec549a6b4c06647b56d61,2025-03-27T03:15:14.080000
|
||||
CVE-2025-2832,1,1,8a2ec7783d6f35938c331c535280dea2c55c862164d46554aef04ee626102dad,2025-03-27T04:15:21.717000
|
||||
CVE-2025-2833,1,1,34448dd05e0726910943d8f965ccedbdfec257a43ff87a1933dd0e3d84ca31ba,2025-03-27T04:15:23.847000
|
||||
CVE-2025-2835,1,1,c2484dcd441f9b9a4deb2f3627065353b22e3174f7d2344dae993d19671beedf,2025-03-27T04:15:25.520000
|
||||
CVE-2025-28361,0,0,f1926e11eefb15c5724190c91705dc2507ef4938d88d1ef61acfa42328a8fde7,2025-03-26T20:15:22.583000
|
||||
CVE-2025-2837,0,0,83748a321fd3f4fe987ea6841e9a82c8bdc4323731935e0471ba9e28f41690aa,2025-03-26T22:15:15.660000
|
||||
CVE-2025-2838,0,0,0fd38740cb7aa95fb48830ccb54e7211d7829af3f0b211ad699529bb75de1e83,2025-03-26T22:15:15.803000
|
||||
@ -286650,7 +286654,7 @@ CVE-2025-30350,0,0,fc6dfae9ed53f849f2c80ec7c33acba2fc43fe016314dc3b9c7a9bafc6032
|
||||
CVE-2025-30351,0,0,8c298fbc24349bf30fef1820a52621a7ea9c7b126c442b6cffbd5514a19bab95,2025-03-26T18:15:26.873000
|
||||
CVE-2025-30352,0,0,acace4f88241090f81090668d9b6b1228cf47971d34911ceaf508195b90eb4ac,2025-03-26T18:15:27.080000
|
||||
CVE-2025-30353,0,0,91060a041c779605c7d571039c263e57e127e0d08447255d79e2cb97ee12286f,2025-03-26T18:15:27.327000
|
||||
CVE-2025-30355,1,1,e8f7797b12bcd17931ea1a0b1fb9cba7219c4ef9c5b7f178a647716bbe7d4e02,2025-03-27T01:15:12.500000
|
||||
CVE-2025-30355,0,0,e8f7797b12bcd17931ea1a0b1fb9cba7219c4ef9c5b7f178a647716bbe7d4e02,2025-03-27T01:15:12.500000
|
||||
CVE-2025-30407,0,0,d8f56632a4d90f52f0afd91ca90b001309e11d692546c6b5c62e4f5dff058d63,2025-03-26T22:15:15.943000
|
||||
CVE-2025-30472,0,0,2ebab4b860069e7704c45b0afdbc37111cef0ce9e224a566e03ddd40410e1a00,2025-03-25T16:15:27.337000
|
||||
CVE-2025-30474,0,0,1e288c28c7a9253d8007962ed83d55ed1c6a50132909d1d77f3fa1d8a9ee1e62,2025-03-23T19:15:14.973000
|
||||
@ -286739,4 +286743,14 @@ CVE-2025-30621,0,0,5d4cdbcdb4b4fcd90b5f2b2106f218b95148d82610e047fabd8c26e50f6e3
|
||||
CVE-2025-30623,0,0,1d1d541570cee9e8bd680cf66c388813ad97d6b9db28e22b406d83cc5fc8feed,2025-03-24T14:15:34.797000
|
||||
CVE-2025-30741,0,0,7e28be04c44c5eca306e67e9d56487026b2aeeec1bb89000fe389b1b3e3b5fba,2025-03-25T21:15:43.527000
|
||||
CVE-2025-30742,0,0,82bfc8ccfda2836c34319d2240fc7c5a7c72b6e004211ac7d9c3d7d639962089,2025-03-26T05:15:40.593000
|
||||
CVE-2025-31160,0,1,94bb3277cdc98903949beacfdd67b1cdce014e635915caadf67c778dc186a2c5,2025-03-27T02:15:16.217000
|
||||
CVE-2025-31105,1,1,3ea420eb0f78514b1d8574d41cb07f9b0316bbcde24f1aa0f802339e7a9adf19,2025-03-27T04:15:27.447000
|
||||
CVE-2025-31106,1,1,9cd943c74a3d3aeb9d7fce7b86609160c2b3b46f9adb8d4161fa966b85a9a529,2025-03-27T04:15:28.007000
|
||||
CVE-2025-31107,1,1,8505daa1494574bd4bf6fc3a5ca5fa621c0917e37c7c10d9dd14774eec62a678,2025-03-27T04:15:28.073000
|
||||
CVE-2025-31108,1,1,f06c368779299032c329689ae6843ea6338a7eff3ee92a60d5b0197ff26b4c0b,2025-03-27T04:15:28.140000
|
||||
CVE-2025-31109,1,1,9d72d20f00b754812a20f5857381edeb14d6d83a999dff9708446b36140c2ad5,2025-03-27T04:15:28.717000
|
||||
CVE-2025-31110,1,1,9c1e095e916574b5bad3dc98545645eb35bcfc3a15748b26a91c4242863758ff,2025-03-27T04:15:28.787000
|
||||
CVE-2025-31111,1,1,708ed17ed7ca590b80cc7bf7efff771b88139eb264b9a4c93912c661b895b119,2025-03-27T04:15:29.310000
|
||||
CVE-2025-31112,1,1,19710893cdeca6b79e6ed61173b8773b8204171d0fa597c5282b3a5c8595c248,2025-03-27T04:15:29.427000
|
||||
CVE-2025-31113,1,1,e197f9731c7d6bd9e53ba8f025a3a8ac307f507846eecfd137f3c958a7e0d19f,2025-03-27T04:15:29.493000
|
||||
CVE-2025-31160,0,1,c4d26cd39b22c1eb60b511d116139849ae72eca61a146878ebb8742a164c4465,2025-03-27T03:15:14.270000
|
||||
CVE-2025-31165,1,1,a3590b636506a483e689b549fb117036abcb2f3b83a41aaf2fd828f17eb41c91,2025-03-27T04:15:29.567000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user