mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-05 18:30:48 +00:00
Auto-Update: 2025-04-04T14:00:19.568674+00:00
This commit is contained in:
parent
491746a95e
commit
955530be35
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2020-0041",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2020-03-10T20:15:21.383",
|
||||
"lastModified": "2025-02-07T13:15:28.600",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-04-04T13:01:37.253",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2020-0069",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2020-03-10T20:15:21.947",
|
||||
"lastModified": "2025-02-07T13:15:28.787",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2025-04-04T13:01:47.817",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2020-0787",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2020-03-12T16:15:15.203",
|
||||
"lastModified": "2025-02-07T16:15:31.970",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2025-04-04T13:01:58.867",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-1048",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2021-12-15T19:15:14.917",
|
||||
"lastModified": "2025-02-04T20:15:39.623",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-04-04T13:05:45.083",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-20248",
|
||||
"sourceIdentifier": "psirt@cisco.com",
|
||||
"published": "2024-04-24T21:15:46.510",
|
||||
"lastModified": "2024-11-21T07:40:59.390",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-04-04T13:00:29.450",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -49,16 +49,50 @@
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:telepresence_management_suite:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "15.13.6",
|
||||
"matchCriteriaId": "657B8E82-E583-483E-A27B-FEB834F78B8E"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-tms-portal-xss-AXNeVg3s",
|
||||
"source": "psirt@cisco.com"
|
||||
"source": "psirt@cisco.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-tms-portal-xss-AXNeVg3s",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-40493",
|
||||
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
|
||||
"published": "2024-05-03T03:15:23.120",
|
||||
"lastModified": "2024-11-21T08:19:35.597",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-04-04T13:47:04.490",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -16,6 +16,28 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "zdi-disclosures@trendmicro.com",
|
||||
@ -51,14 +73,37 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:lg:simple_editor:3.21.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DFDB5FD9-3D29-48CB-85C5-B96A573E58FC"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1199/",
|
||||
"source": "zdi-disclosures@trendmicro.com"
|
||||
"source": "zdi-disclosures@trendmicro.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1199/",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-40494",
|
||||
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
|
||||
"published": "2024-05-03T03:15:23.303",
|
||||
"lastModified": "2024-11-21T08:19:35.730",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-04-04T13:42:10.263",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -16,6 +16,28 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
|
||||
"baseScore": 9.1,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
],
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "zdi-disclosures@trendmicro.com",
|
||||
@ -51,14 +73,37 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:lg:simple_editor:3.21.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DFDB5FD9-3D29-48CB-85C5-B96A573E58FC"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1200/",
|
||||
"source": "zdi-disclosures@trendmicro.com"
|
||||
"source": "zdi-disclosures@trendmicro.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1200/",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-40495",
|
||||
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
|
||||
"published": "2024-05-03T03:15:23.477",
|
||||
"lastModified": "2025-02-04T17:15:16.380",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-04-04T13:33:58.703",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -83,14 +83,37 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:lg:simple_editor:3.21.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DFDB5FD9-3D29-48CB-85C5-B96A573E58FC"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1201/",
|
||||
"source": "zdi-disclosures@trendmicro.com"
|
||||
"source": "zdi-disclosures@trendmicro.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1201/",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-28890",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2024-04-23T05:15:49.260",
|
||||
"lastModified": "2024-11-21T09:07:07.400",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-04-04T13:12:03.720",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,30 +51,66 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:incsub:forminator:*:*:*:*:free:wordpress:*:*",
|
||||
"versionEndExcluding": "1.29.0",
|
||||
"matchCriteriaId": "59D7B250-32D4-4B3D-BC2E-70CCC6A1B767"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://jvn.jp/en/jp/JVN50132400/",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
"source": "vultures@jpcert.or.jp",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://wordpress.org/plugins/forminator/",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
"source": "vultures@jpcert.or.jp",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://wpmudev.com/",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
"source": "vultures@jpcert.or.jp",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://jvn.jp/en/jp/JVN50132400/",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://wordpress.org/plugins/forminator/",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://wpmudev.com/",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-30938",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-19T00:15:10.623",
|
||||
"lastModified": "2024-11-21T09:12:36.783",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-04-04T13:25:20.460",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,14 +51,37 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sem-cms:semcms:4.8:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BD382DC4-F472-49F5-AA7E-939EC76D4E8F"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/lampSEC/semcms/blob/main/semcms.md",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/lampSEC/semcms/blob/main/semcms.md",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-31077",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2024-04-23T05:15:49.323",
|
||||
"lastModified": "2024-11-21T09:12:48.273",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-04-04T13:09:27.250",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,30 +51,66 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:incsub:forminator:*:*:*:*:free:wordpress:*:*",
|
||||
"versionEndExcluding": "1.29.3",
|
||||
"matchCriteriaId": "50690F82-3240-4FCA-B4AC-A21CAF3C4691"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://jvn.jp/en/jp/JVN50132400/",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
"source": "vultures@jpcert.or.jp",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://wordpress.org/plugins/forminator/",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
"source": "vultures@jpcert.or.jp",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://wpmudev.com/",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
"source": "vultures@jpcert.or.jp",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://jvn.jp/en/jp/JVN50132400/",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://wordpress.org/plugins/forminator/",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://wpmudev.com/",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-31857",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2024-04-23T05:15:49.377",
|
||||
"lastModified": "2024-11-21T09:14:01.880",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-04-04T13:03:08.680",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,30 +51,66 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:incsub:forminator:*:*:*:*:free:wordpress:*:*",
|
||||
"versionEndExcluding": "1.15.4",
|
||||
"matchCriteriaId": "C88D1D40-B2B6-4645-BA37-13B49807BD91"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://jvn.jp/en/jp/JVN50132400/",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
"source": "vultures@jpcert.or.jp",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://wordpress.org/plugins/forminator/",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
"source": "vultures@jpcert.or.jp",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://wpmudev.com/",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
"source": "vultures@jpcert.or.jp",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://jvn.jp/en/jp/JVN50132400/",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://wordpress.org/plugins/forminator/",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://wpmudev.com/",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-32409",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-19T16:15:10.883",
|
||||
"lastModified": "2024-11-21T09:14:53.293",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-04-04T13:23:40.187",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,30 +51,65 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sem-cms:semcms:4.8:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BD382DC4-F472-49F5-AA7E-939EC76D4E8F"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://semcms.com",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.sem-cms.com/",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://gitee.com/whats-the-bad-idea/cve",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://semcms.com",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.sem-cms.com/",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://gitee.com/whats-the-bad-idea/cve",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2024-8600",
|
||||
"sourceIdentifier": "psirt@autodesk.com",
|
||||
"published": "2024-10-29T22:15:08.330",
|
||||
"lastModified": "2025-02-03T17:15:24.650",
|
||||
"lastModified": "2025-04-04T13:15:44.070",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A maliciously crafted SLDPRT file when parsed in odxsw_dll.dll through Autodesk AutoCAD can force a Memory Corruption vulnerability. A malicious actor can leverage this vulnerability to cause a crash, write sensitive data, or execute arbitrary code in the context of the current process."
|
||||
"value": "A maliciously crafted SLDPRT file when parsed in odxsw_dll.dll through Autodesk affected applications can force a Memory Corruption vulnerability. A malicious actor can leverage this vulnerability to cause a crash, write sensitive data, or execute arbitrary code in the context of the current process."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2025-1428",
|
||||
"sourceIdentifier": "psirt@autodesk.com",
|
||||
"published": "2025-03-13T17:15:34.900",
|
||||
"lastModified": "2025-03-13T17:15:34.900",
|
||||
"lastModified": "2025-04-04T13:15:45.193",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A maliciously crafted CATPART file, when parsed through Autodesk AutoCAD, can force an Out-of-Bounds Read vulnerability. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process."
|
||||
"value": "A maliciously crafted CATPART file, when parsed through Autodesk AutoCAD, can force an Out-of-Bounds Read vulnerability. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2025-1430",
|
||||
"sourceIdentifier": "psirt@autodesk.com",
|
||||
"published": "2025-03-13T17:15:35.217",
|
||||
"lastModified": "2025-03-13T17:15:35.217",
|
||||
"lastModified": "2025-04-04T13:15:45.440",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A maliciously crafted SLDPRT file, when parsed through Autodesk AutoCAD, can force a Memory Corruption vulnerability. A malicious actor can leverage this vulnerability to execute arbitrary code in the context of the current process."
|
||||
"value": "A maliciously crafted SLDPRT file, when parsed through Autodesk AutoCAD, can force a Memory Corruption vulnerability.A malicious actor can leverage this vulnerability to execute arbitrary code in the context of the current process."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2025-2859",
|
||||
"sourceIdentifier": "cve-coordination@incibe.es",
|
||||
"published": "2025-03-28T14:15:20.810",
|
||||
"lastModified": "2025-03-28T18:11:40.180",
|
||||
"lastModified": "2025-04-04T13:15:46.493",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An attacker with access to the network where the vulnerable device is located could capture traffic and obtain cookies from the user, allowing them to steal a user's active session and make changes to the device via the web, depending on the privileges obtained by the user."
|
||||
"value": "An attacker with network\u00a0access,\u00a0could capture traffic and obtain user cookies, allowing the attacker to steal the active user session and make changes to the device via web, depending on the privileges obtained by the user."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Un atacante con acceso a la red donde se encuentra el dispositivo vulnerable podr\u00eda capturar tr\u00e1fico y obtener cookies del usuario, lo que le permitir\u00eda robar la sesi\u00f3n activa de un usuario y realizar cambios en el dispositivo v\u00eda web, dependiendo de los privilegios obtenidos por el usuario."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -60,7 +64,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cve-coordination@incibe.es",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
56
CVE-2025/CVE-2025-314xx/CVE-2025-31420.json
Normal file
56
CVE-2025/CVE-2025-314xx/CVE-2025-31420.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-31420",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2025-04-04T13:15:46.630",
|
||||
"lastModified": "2025-04-04T13:15:46.630",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Incorrect Privilege Assignment vulnerability in Tomdever wpForo Forum allows Privilege Escalation.This issue affects wpForo Forum: from n/a through 2.4.2."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L",
|
||||
"baseScore": 7.6,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 4.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-266"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/wordpress/plugin/wpforo/vulnerability/wordpress-wpforo-forum-plugin-2-4-2-privilege-escalation-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2025/CVE-2025-314xx/CVE-2025-31421.json
Normal file
56
CVE-2025/CVE-2025-314xx/CVE-2025-31421.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-31421",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2025-04-04T13:15:46.780",
|
||||
"lastModified": "2025-04-04T13:15:46.780",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Insertion of Sensitive Information into Externally-Accessible File or Directory vulnerability in Oblak Studio Srbtranslatin allows Retrieve Embedded Sensitive Data.This issue affects Srbtranslatin: from n/a through 3.2.0."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N",
|
||||
"baseScore": 5.8,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-538"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/wordpress/plugin/srbtranslatin/vulnerability/wordpress-srbtranslatin-plugin-3-2-0-sensitive-data-exposure-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
78
CVE-2025/CVE-2025-31xx/CVE-2025-3189.json
Normal file
78
CVE-2025/CVE-2025-31xx/CVE-2025-3189.json
Normal file
@ -0,0 +1,78 @@
|
||||
{
|
||||
"id": "CVE-2025-3189",
|
||||
"sourceIdentifier": "cve-coordination@incibe.es",
|
||||
"published": "2025-04-04T13:15:46.940",
|
||||
"lastModified": "2025-04-04T13:15:46.940",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Stored Cross-Site Scripting (XSS) in DoWISP in versions prior to 1.16.2.50, which consists of an stored XSS through the upload of a profile picture in SVG format with malicious Javascript code in it."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cve-coordination@incibe.es",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 4.8,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "PASSIVE",
|
||||
"vulnConfidentialityImpact": "NONE",
|
||||
"vulnIntegrityImpact": "NONE",
|
||||
"vulnAvailabilityImpact": "NONE",
|
||||
"subConfidentialityImpact": "LOW",
|
||||
"subIntegrityImpact": "LOW",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cve-coordination@incibe.es",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-78"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/stored-cross-site-scripting-xss-dowisp",
|
||||
"source": "cve-coordination@incibe.es"
|
||||
}
|
||||
]
|
||||
}
|
145
CVE-2025/CVE-2025-32xx/CVE-2025-3243.json
Normal file
145
CVE-2025/CVE-2025-32xx/CVE-2025-3243.json
Normal file
@ -0,0 +1,145 @@
|
||||
{
|
||||
"id": "CVE-2025-3243",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-04-04T12:15:15.530",
|
||||
"lastModified": "2025-04-04T12:15:15.530",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in code-projects Patient Record Management System 1.0 and classified as critical. This issue affects some unknown processing of the file /dental_form.php. The manipulation of the argument itr_no leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "LOW",
|
||||
"vulnIntegrityImpact": "LOW",
|
||||
"vulnAvailabilityImpact": "LOW",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
||||
"baseScore": 6.5,
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL"
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-74"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://code-projects.org/",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/BinBall/cve/blob/master/README.md",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.303269",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.303269",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.547882",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
145
CVE-2025/CVE-2025-32xx/CVE-2025-3244.json
Normal file
145
CVE-2025/CVE-2025-32xx/CVE-2025-3244.json
Normal file
@ -0,0 +1,145 @@
|
||||
{
|
||||
"id": "CVE-2025-3244",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-04-04T12:15:16.217",
|
||||
"lastModified": "2025-04-04T12:15:16.217",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in SourceCodester Web-based Pharmacy Product Management System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /add-admin.php of the component Create User Page. The manipulation of the argument Avatar leads to unrestricted upload. The attack can be launched remotely. The exploit has been disclosed to the public and may be used."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "LOW",
|
||||
"vulnIntegrityImpact": "LOW",
|
||||
"vulnAvailabilityImpact": "LOW",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
||||
"baseScore": 6.5,
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL"
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-284"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-434"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/6s6-630/CVE/blob/main/yaofang.md",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.303271",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.303271",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.547916",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.sourcecodester.com/",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
145
CVE-2025/CVE-2025-32xx/CVE-2025-3245.json
Normal file
145
CVE-2025/CVE-2025-32xx/CVE-2025-3245.json
Normal file
@ -0,0 +1,145 @@
|
||||
{
|
||||
"id": "CVE-2025-3245",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-04-04T12:15:16.400",
|
||||
"lastModified": "2025-04-04T12:15:16.400",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in itsourcecode Library Management System 1.0. It has been rated as critical. Affected by this issue is the function Search of the file library_management/src/Library_Management/Forgot.java. The manipulation of the argument txtuname leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "LOW",
|
||||
"vulnIntegrityImpact": "LOW",
|
||||
"vulnAvailabilityImpact": "LOW",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
||||
"baseScore": 6.5,
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL"
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-74"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/wlingze/IRify_scan/issues/1",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://itsourcecode.com/",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.303272",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.303272",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.548087",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
46
README.md
46
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2025-04-04T12:00:21.499406+00:00
|
||||
2025-04-04T14:00:19.568674+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2025-04-04T11:15:40.980000+00:00
|
||||
2025-04-04T13:47:04.490000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,32 +33,42 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
288506
|
||||
288512
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `13`
|
||||
Recently added CVEs: `6`
|
||||
|
||||
- [CVE-2025-1865](CVE-2025/CVE-2025-18xx/CVE-2025-1865.json) (`2025-04-04T10:15:15.277`)
|
||||
- [CVE-2025-22282](CVE-2025/CVE-2025-222xx/CVE-2025-22282.json) (`2025-04-04T11:15:39.680`)
|
||||
- [CVE-2025-2243](CVE-2025/CVE-2025-22xx/CVE-2025-2243.json) (`2025-04-04T10:15:16.313`)
|
||||
- [CVE-2025-2244](CVE-2025/CVE-2025-22xx/CVE-2025-2244.json) (`2025-04-04T10:15:16.580`)
|
||||
- [CVE-2025-2245](CVE-2025/CVE-2025-22xx/CVE-2025-2245.json) (`2025-04-04T10:15:16.740`)
|
||||
- [CVE-2025-3235](CVE-2025/CVE-2025-32xx/CVE-2025-3235.json) (`2025-04-04T10:15:16.900`)
|
||||
- [CVE-2025-3236](CVE-2025/CVE-2025-32xx/CVE-2025-3236.json) (`2025-04-04T10:15:17.177`)
|
||||
- [CVE-2025-3237](CVE-2025/CVE-2025-32xx/CVE-2025-3237.json) (`2025-04-04T10:15:17.383`)
|
||||
- [CVE-2025-3238](CVE-2025/CVE-2025-32xx/CVE-2025-3238.json) (`2025-04-04T10:15:17.577`)
|
||||
- [CVE-2025-3239](CVE-2025/CVE-2025-32xx/CVE-2025-3239.json) (`2025-04-04T11:15:40.393`)
|
||||
- [CVE-2025-3240](CVE-2025/CVE-2025-32xx/CVE-2025-3240.json) (`2025-04-04T11:15:40.603`)
|
||||
- [CVE-2025-3241](CVE-2025/CVE-2025-32xx/CVE-2025-3241.json) (`2025-04-04T11:15:40.783`)
|
||||
- [CVE-2025-3242](CVE-2025/CVE-2025-32xx/CVE-2025-3242.json) (`2025-04-04T11:15:40.980`)
|
||||
- [CVE-2025-31420](CVE-2025/CVE-2025-314xx/CVE-2025-31420.json) (`2025-04-04T13:15:46.630`)
|
||||
- [CVE-2025-31421](CVE-2025/CVE-2025-314xx/CVE-2025-31421.json) (`2025-04-04T13:15:46.780`)
|
||||
- [CVE-2025-3189](CVE-2025/CVE-2025-31xx/CVE-2025-3189.json) (`2025-04-04T13:15:46.940`)
|
||||
- [CVE-2025-3243](CVE-2025/CVE-2025-32xx/CVE-2025-3243.json) (`2025-04-04T12:15:15.530`)
|
||||
- [CVE-2025-3244](CVE-2025/CVE-2025-32xx/CVE-2025-3244.json) (`2025-04-04T12:15:16.217`)
|
||||
- [CVE-2025-3245](CVE-2025/CVE-2025-32xx/CVE-2025-3245.json) (`2025-04-04T12:15:16.400`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `0`
|
||||
Recently modified CVEs: `17`
|
||||
|
||||
- [CVE-2020-0041](CVE-2020/CVE-2020-00xx/CVE-2020-0041.json) (`2025-04-04T13:01:37.253`)
|
||||
- [CVE-2020-0069](CVE-2020/CVE-2020-00xx/CVE-2020-0069.json) (`2025-04-04T13:01:47.817`)
|
||||
- [CVE-2020-0787](CVE-2020/CVE-2020-07xx/CVE-2020-0787.json) (`2025-04-04T13:01:58.867`)
|
||||
- [CVE-2021-1048](CVE-2021/CVE-2021-10xx/CVE-2021-1048.json) (`2025-04-04T13:05:45.083`)
|
||||
- [CVE-2023-20248](CVE-2023/CVE-2023-202xx/CVE-2023-20248.json) (`2025-04-04T13:00:29.450`)
|
||||
- [CVE-2023-40493](CVE-2023/CVE-2023-404xx/CVE-2023-40493.json) (`2025-04-04T13:47:04.490`)
|
||||
- [CVE-2023-40494](CVE-2023/CVE-2023-404xx/CVE-2023-40494.json) (`2025-04-04T13:42:10.263`)
|
||||
- [CVE-2023-40495](CVE-2023/CVE-2023-404xx/CVE-2023-40495.json) (`2025-04-04T13:33:58.703`)
|
||||
- [CVE-2024-28890](CVE-2024/CVE-2024-288xx/CVE-2024-28890.json) (`2025-04-04T13:12:03.720`)
|
||||
- [CVE-2024-30938](CVE-2024/CVE-2024-309xx/CVE-2024-30938.json) (`2025-04-04T13:25:20.460`)
|
||||
- [CVE-2024-31077](CVE-2024/CVE-2024-310xx/CVE-2024-31077.json) (`2025-04-04T13:09:27.250`)
|
||||
- [CVE-2024-31857](CVE-2024/CVE-2024-318xx/CVE-2024-31857.json) (`2025-04-04T13:03:08.680`)
|
||||
- [CVE-2024-32409](CVE-2024/CVE-2024-324xx/CVE-2024-32409.json) (`2025-04-04T13:23:40.187`)
|
||||
- [CVE-2024-8600](CVE-2024/CVE-2024-86xx/CVE-2024-8600.json) (`2025-04-04T13:15:44.070`)
|
||||
- [CVE-2025-1428](CVE-2025/CVE-2025-14xx/CVE-2025-1428.json) (`2025-04-04T13:15:45.193`)
|
||||
- [CVE-2025-1430](CVE-2025/CVE-2025-14xx/CVE-2025-1430.json) (`2025-04-04T13:15:45.440`)
|
||||
- [CVE-2025-2859](CVE-2025/CVE-2025-28xx/CVE-2025-2859.json) (`2025-04-04T13:15:46.493`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
66
_state.csv
66
_state.csv
@ -144345,7 +144345,7 @@ CVE-2020-0037,0,0,41e403094ba6a045322d7e04b4f87a730b779ebf04b4050c31f74ed32cdd08
|
||||
CVE-2020-0038,0,0,0be6c0237b437b6eb08224027fdb8b3bb69f2322ae8b62c3c669d28e1845a906,2024-11-21T04:52:47.583000
|
||||
CVE-2020-0039,0,0,7618b44bd3ba6b7cdfd0a64c9c872de5e78ba00f57fc793fd15f4a2523350163,2024-11-21T04:52:47.683000
|
||||
CVE-2020-0040,0,0,327fccd97e3de4721dac876f3f81f6a391401dd9264bed98ab70cdb9f6b7a506,2025-01-18T00:15:25.273000
|
||||
CVE-2020-0041,0,0,6eec7bd3aea7b5fd3bfcd5951820b693b9e1023127a2b78d60a5596062d99bda,2025-02-07T13:15:28.600000
|
||||
CVE-2020-0041,0,1,9b2955412ad02669f6f881510992b21e6ab6391b989bbf3ea8fc970cbb7169ce,2025-04-04T13:01:37.253000
|
||||
CVE-2020-0042,0,0,d7f0e064e5fbb278776d2d7faf4fb87c5d172ac4e2dead292c3f85cc4c813703,2024-11-21T04:52:47.887000
|
||||
CVE-2020-0043,0,0,14bcc8466d5c443021e087cfb66517016dab13c49e05cf9e560a89cb40ee4afe,2024-11-21T04:52:48.003000
|
||||
CVE-2020-0044,0,0,42c44fa02306848dbeaff538a0f2ddecaedf0417b561902ea28e0b9b3c5c8e09,2024-11-21T04:52:48.107000
|
||||
@ -144373,7 +144373,7 @@ CVE-2020-0065,0,0,f7ca8e09b2764d2b41b8fdde746a1805d10e35a728ccb4009cb8724efad028
|
||||
CVE-2020-0066,0,0,1d19fd7de8f94f88b1c4805320f198d81987096cfadc34ae614f20f6405ad2b6,2024-11-21T04:52:50.453000
|
||||
CVE-2020-0067,0,0,d2410847056d5dc825c4019a7ba8d9efccc48dda195d2be1d4ed3d9672ee76bc,2024-11-21T04:52:50.563000
|
||||
CVE-2020-0068,0,0,945e0e73a8608c6f0fc295b6a88fbba7fd6d1511e7b8a2a979993924666b1a48,2024-11-21T04:52:50.690000
|
||||
CVE-2020-0069,0,0,d68f135d6fced2f4472f9284747e90e125e063981b77e057f42b344e93999ba8,2025-02-07T13:15:28.787000
|
||||
CVE-2020-0069,0,1,15eb0d8e3b0ef0843fa0bd15166c329eb316034c7a03d2bbc49484fa981f1b86,2025-04-04T13:01:47.817000
|
||||
CVE-2020-0070,0,0,34dfdee23ce22fc7cc584db33451557b31e46405456845f804f5a2810fbdc6a8,2024-11-21T04:52:50.967000
|
||||
CVE-2020-0071,0,0,fa891ab3869d3eb9ed0de28ab158679b3e1a7c4514e4f53def5ef01e39337b6c,2024-11-21T04:52:51.077000
|
||||
CVE-2020-0072,0,0,68bc0b162b140c51ac81be1b05e0cd0d73a744d939c5e87e3f04a3c009867cab,2024-11-21T04:52:51.190000
|
||||
@ -145082,7 +145082,7 @@ CVE-2020-0783,0,0,de20629ee4d0e27392fc4f55b7cee09919ac95363a03fc294d09d37e667ce8
|
||||
CVE-2020-0784,0,0,b8096a0a427408558c58cfd476af1cb068e4e16704d8fac38333b7005793608c,2024-11-21T04:54:12.520000
|
||||
CVE-2020-0785,0,0,e3bc815874c300dac45f2a60b6afd50bb47141d5eaea85a5ced8837fc16fda18,2024-11-21T04:54:12.640000
|
||||
CVE-2020-0786,0,0,1bed435bb92f832bf1ed719b475b3b0afb85071392e0acb82a3aa00675b3b1f3,2024-11-21T04:54:12.763000
|
||||
CVE-2020-0787,0,0,b5b8107f1168f075e15f520fc59d9b67d8344b2565a0c0207dde5de4a8f61958,2025-02-07T16:15:31.970000
|
||||
CVE-2020-0787,0,1,bdd0753bbb29cbf69eaf7ff10c662b4c1458c8d017aacb1d8076dde1677cf5c6,2025-04-04T13:01:58.867000
|
||||
CVE-2020-0788,0,0,45144fe5748834f81b3b97d9be9799087c20c5e97eda233bd95e7f833f7bd84a,2024-11-21T04:54:12.997000
|
||||
CVE-2020-0789,0,0,5841d77cb261e3595b8f4791c4e18c399f4cc3d6d297a5609d9cbb1b15ed80ea,2024-11-21T04:54:13.133000
|
||||
CVE-2020-0790,0,0,35ab8fdf2d0cd8da0474a9a16ee6ceca6b0b4a13bee1673f39e17d2fd91d42af,2024-11-21T04:54:13.253000
|
||||
@ -165743,7 +165743,7 @@ CVE-2021-1044,0,0,1d2a70bf34022fcf540f0f165bf74f063999f10981f2d8661a432c505e6558
|
||||
CVE-2021-1045,0,0,52c86b88026600c46c0feb022cf0953ee0d0ec5852efc20082c99f693afb3529,2024-11-21T05:43:27.370000
|
||||
CVE-2021-1046,0,0,a1c9c7ab089ff8d2b016f85bfbe48d340de900d2cc828cbea2f155986a389b45,2024-11-21T05:43:27.470000
|
||||
CVE-2021-1047,0,0,4f00b24d3c322ea115fb217d0a6847a7e1a67fb1b0b0b860a3e955bd7fada2c2,2024-11-21T05:43:27.577000
|
||||
CVE-2021-1048,0,0,b934b5fe088ec4f1958a04103c4ce0bd59b50a24f847f810b6597f32b8bb4836,2025-02-04T20:15:39.623000
|
||||
CVE-2021-1048,0,1,bd8c7e5c734b94d390f55e6bd8dbd6a16cceff7cf4741260090228c088b58268,2025-04-04T13:05:45.083000
|
||||
CVE-2021-1049,0,0,c9fa9781e361534a0500d0b54cefbcc1bc5e3a4edceff32900661c129722c95d,2024-11-21T05:43:27.770000
|
||||
CVE-2021-1050,0,0,5f1d1cb96547724c36cf1bdccfc0c0363ae554179dd9624741147c7a8b4d1beb,2024-11-21T05:43:27.877000
|
||||
CVE-2021-1051,0,0,d111531949be4a2667a7cabccccad754da75b2de44fa6f5f9a8aaa6b47a0ad45,2024-11-21T05:43:27.983000
|
||||
@ -216194,7 +216194,7 @@ CVE-2023-20244,0,0,04d06cc910e8622ed4582c8bd365231315a3a7773630ed77fe4b6e8996960
|
||||
CVE-2023-20245,0,0,9f7d0684fcd3dc88fd4b6a3fa68ecf02841f70db54f8fbf5c3bfa4f335ba39e2,2024-11-21T07:40:58.890000
|
||||
CVE-2023-20246,0,0,6d2b37f5c6ac086ceda5bb29e8646cadf5c50f638a870e23c0dbdcde6ad30bed,2024-11-21T07:40:59.063000
|
||||
CVE-2023-20247,0,0,14bf4b27e0fd5450e104dae5e7cf40f4887a3f17c84342c9769adaf9047c3e20,2024-11-21T07:40:59.200000
|
||||
CVE-2023-20248,0,0,4a58281cd1b4cf53d0679ec99d2f9f43ac54b1d7c3834a6509a8a10b26d131b1,2024-11-21T07:40:59.390000
|
||||
CVE-2023-20248,0,1,3a4cc8786bf48587de2c29993072c2d412e2b1fe651247a9c003ca1ec3e61f23,2025-04-04T13:00:29.450000
|
||||
CVE-2023-20249,0,0,711e541b7a7ffeed6af09a65e2ed00262343e253e3ac8a5f9545057f1f77bb44,2024-11-21T07:40:59.573000
|
||||
CVE-2023-2025,0,0,f2ee56fa364f118987b4743945088cc9b4233edd69248c0556648598d17b0711,2024-11-21T07:57:47.043000
|
||||
CVE-2023-20250,0,0,f1bfbe430c90a1e77a0e3bab5e445960f08b5671ac0822c192f18f5e8778d7fe,2024-11-21T07:40:59.683000
|
||||
@ -232444,9 +232444,9 @@ CVE-2023-4049,0,0,64349c7d7728318992b9d8ac9bc063772f37e3ff89dcb54aadcdbc8bdf210d
|
||||
CVE-2023-40490,0,0,b305530e1cd192949fc426741c848a099bb11b4d204df0ebc5381f6e6d249826,2024-11-21T08:19:35.203000
|
||||
CVE-2023-40491,0,0,2a908a50f6204b8e3c02efcdc72acad622579cd988ae66d3f56ae77f2a332961,2024-11-21T08:19:35.340000
|
||||
CVE-2023-40492,0,0,1e2c820f786ac4cbc2504f8b86b120ed0260685829e28ba8d52ed6cce83707b2,2024-11-21T08:19:35.467000
|
||||
CVE-2023-40493,0,0,4d38f9d04ac779d50c45e78dab0b0eec826676238f9c726263382caf012e171e,2024-11-21T08:19:35.597000
|
||||
CVE-2023-40494,0,0,b475f7b9b176816fba77ad16a4c162f2ccee1eb744b244a10f67524ccf8c4097,2024-11-21T08:19:35.730000
|
||||
CVE-2023-40495,0,0,4de5b40abe746d1dfac91545d29fb61c3cb5528d4305faccf2d595266a7353f4,2025-02-04T17:15:16.380000
|
||||
CVE-2023-40493,0,1,8c8c2798b046bd53589f6b4e0ad98e19ade803bf152c491c3f238aa122d46fc8,2025-04-04T13:47:04.490000
|
||||
CVE-2023-40494,0,1,601b019f06f304ee99d6982b6230e27aea81e366cb541b7b7ac03fa3ad3dcb30,2025-04-04T13:42:10.263000
|
||||
CVE-2023-40495,0,1,4b7f4a7a18cd0edfbb72d9a1c73805fee1bfa7493317bfefe3d89f67da52ca91,2025-04-04T13:33:58.703000
|
||||
CVE-2023-40496,0,0,c05214a4beff0efc426be383f47e603c524ea6a24a74be7d02966bc130a33eb1,2024-11-21T08:19:36.013000
|
||||
CVE-2023-40497,0,0,52bd73661eeea436a79bc8e9940335105120d4eec20fc48bfafb094252ca8956,2024-11-21T08:19:36.157000
|
||||
CVE-2023-40498,0,0,f36254e3b26721241b5f240decf47a69479a61fad8b76a81f651f4ac34db40ac,2024-11-21T08:19:36.283000
|
||||
@ -255883,7 +255883,7 @@ CVE-2024-28887,0,0,c3ca1b3d7a62186763846c5cd9ca8eaefd4f2b80d7ff47790f3655a062e62
|
||||
CVE-2024-28888,0,0,ebbb3a65d0d5e986be41d82152364fcda8a869f51d8deddd91ac98fd34888cbf,2024-11-21T09:07:07.100000
|
||||
CVE-2024-28889,0,0,56e4da21fbc62908e65bc9d6315a2b989ea164aaccf23dde236dcd94fbd502c6,2024-11-21T09:07:07.260000
|
||||
CVE-2024-2889,0,0,1885c0f2ecfe4bdb417129f70852e4157a6de85584ef6ee4549701263ae39757,2024-11-21T09:10:45.900000
|
||||
CVE-2024-28890,0,0,3bbdab4f532fab507ef698fd11be91e1ccfe6d2327e03eb3fd78e1be839e0795,2024-11-21T09:07:07.400000
|
||||
CVE-2024-28890,0,1,eca2de8dcd01c6acf30a292021531961571db838e2603d2599373b293773d39d,2025-04-04T13:12:03.720000
|
||||
CVE-2024-28891,0,0,89149026c6e5f7e226ede146241710be24ae96a683eeb359126523d37dd3135e,2024-11-21T09:07:07.617000
|
||||
CVE-2024-28892,0,0,2e191531e41f7891094b87fe8cebe43719428c7eea4b56c908156d0a86b2616d,2024-12-20T17:05:48.707000
|
||||
CVE-2024-28893,0,0,af3c6467d810236b8f22b401cc7bbcfe893a3ccf1e1cf36778afb8e9bb65fec9,2025-03-27T15:15:51.380000
|
||||
@ -257450,7 +257450,7 @@ CVE-2024-30928,0,0,5b79e5750f6c7878ce52be4234b1efc12eb7d9c9b9f616dec536a86871f39
|
||||
CVE-2024-30929,0,0,ca6fc83d263a440f702c6f59d54a14988d9d3577d12e8c28e17f1b62456ed34c,2024-11-21T09:12:36.360000
|
||||
CVE-2024-3093,0,0,fe746195c4e2001fde57b14e03afb6f54529d797bc86f2aa9c4028e9fadd8f82,2024-05-07T13:15:48.260000
|
||||
CVE-2024-30931,0,0,e7f92a3bf6da27812eb57cfbe43def6f2d5e4701d41c61760d71792a7b76604c,2024-11-21T09:12:36.580000
|
||||
CVE-2024-30938,0,0,84db941aea113a12f79b6bd4c401c3082aa309dbface7b4b799fa38c3d85107b,2024-11-21T09:12:36.783000
|
||||
CVE-2024-30938,0,1,9009dc01caa7aeffb7dcce25e73dd1fc51b559609e021b8542c536639b2cd09d,2025-04-04T13:25:20.460000
|
||||
CVE-2024-30939,0,0,c09450d6fbdf180599d8aa90a71eee8592202cdaeff38c062b16f67a0a29459f,2024-11-21T09:12:36.997000
|
||||
CVE-2024-3094,0,0,b9e85c0248ef2cd036bdd4cbb530b96250054f5e14f6d51439fbf04202b0fd31,2025-02-06T09:15:10.820000
|
||||
CVE-2024-30946,0,0,377a4d69a3316def640c171befad2d35850a0a77388338767e966f749486eb06,2025-04-01T18:05:53.003000
|
||||
@ -257524,7 +257524,7 @@ CVE-2024-31070,0,0,1c611948de1365114224205017306826df6e14c3741670ceac64efb86dc1f
|
||||
CVE-2024-31071,0,0,d588fd52b561587765d8d52346268042bc1c49cbc106c6b370e0c836853f77c7,2024-11-21T09:12:47.910000
|
||||
CVE-2024-31074,0,0,a2f238abb53e6d12a2f868f2cb51afa58ab2d87eab5b0d20d91ca0ad2c12fd72,2024-11-15T14:00:09.720000
|
||||
CVE-2024-31076,0,0,1293d87671585f621e57738a562115aa8563ab94cc4beb2163a9d49bb681d6cc,2024-11-21T09:12:48.140000
|
||||
CVE-2024-31077,0,0,289d0fa87ed9966f075d7cf387e3721edb9b2f366b0ec4a722be692dbf847080,2024-11-21T09:12:48.273000
|
||||
CVE-2024-31077,0,1,3478e0b66574ac38fc54e164834c3535d63b6475aa6e95b2b89a99e7036e51ad,2025-04-04T13:09:27.250000
|
||||
CVE-2024-31078,0,0,c685657ef2ddb5a5f6950813502d56bfa1502d3b4d479876fa59d79cc3cba853,2025-01-02T19:04:58.017000
|
||||
CVE-2024-31079,0,0,165a2aa326e41b281850472925f9b409c38425124b3d29959aeb9d8da9b7e905,2025-01-24T16:01:04.653000
|
||||
CVE-2024-3108,0,0,0a457dab289bbab6cbbf64df7736b6d0a7c3250fc6713e73c93a6029760a47aa,2024-11-21T09:28:54.970000
|
||||
@ -258113,7 +258113,7 @@ CVE-2024-31850,0,0,3cf28f7334b4de0542e5428e9e2adb543da6f22147b194d3fb612012e6aa1
|
||||
CVE-2024-31851,0,0,e45f336d82b2d3d9adbf3a8bac0b970c5266b3cdbe6939aeace9733f93a83fdc,2024-11-21T09:14:01.463000
|
||||
CVE-2024-31852,0,0,ba9051f6bc6d3b5aba3b4d7f2092d68c6a17eb29edddb549caa75380b0b647ce,2024-12-04T21:15:23.467000
|
||||
CVE-2024-31856,0,0,b0ae28b2cf04a3d57b1162c504882bace010687db30d97cb579a93bed060de40,2024-11-21T09:14:01.757000
|
||||
CVE-2024-31857,0,0,8ccaeff2e48a5a06dc8b607f81d3ae85f8bd08deb2ade42799168b9bafd37d10,2024-11-21T09:14:01.880000
|
||||
CVE-2024-31857,0,1,20dfb12af53dc65b264ed20f498f15824869d4ee981fc0225fa3ba43b44587e3,2025-04-04T13:03:08.680000
|
||||
CVE-2024-31858,0,0,fb7ea5972ca29ef5dbb01c13ffa0f30c065ee6f5e39915061b97fa7a1c736b37,2025-02-12T22:15:33.340000
|
||||
CVE-2024-31859,0,0,5188bfcb73daa943c532580bcafd9e1ae4e11ae27457e4083ab53378c72ba6e7,2024-11-21T09:14:02.070000
|
||||
CVE-2024-3186,0,0,6a202e3b12d67ed267f46ad36df1ad5893d1c9a9eec4366d9174b91b675690fe,2024-10-18T12:52:33.507000
|
||||
@ -258499,7 +258499,7 @@ CVE-2024-32404,0,0,74a4e470851f7065c54824eefb65f28406cfe534ec539cba27c7d9ad4f1d2
|
||||
CVE-2024-32405,0,0,d6cebee4f160fbfebcd1643d9266858f67b5ac275a62bd0c0eb14ec6bc477ccb,2024-11-21T09:14:52.610000
|
||||
CVE-2024-32406,0,0,adc8cb262025358dc4dfe8f438d40cf02ab2906d5eddacd2f331ca567828e67d,2024-11-21T09:14:52.837000
|
||||
CVE-2024-32407,0,0,0df07e739a8ca11adc8e64033efd14a2769f0d1340e998db62e6a377858daa19,2024-11-21T09:14:53.060000
|
||||
CVE-2024-32409,0,0,18b0f3062892cdbdf03588220ff6b6036159d6e3762a6fad7fa112af7d603be7,2024-11-21T09:14:53.293000
|
||||
CVE-2024-32409,0,1,bf9e59848caae45d0cc6872d258056c0c656eeada01f508a560f9f71f7f2c3bf,2025-04-04T13:23:40.187000
|
||||
CVE-2024-3241,0,0,b1badc4f1f5873ff7ca017fdd306f21fc66be32391b8d27fe7739f7ab8ee3128,2024-11-21T09:29:13.510000
|
||||
CVE-2024-32418,0,0,d8130dedbe76cdd228daed362bf2d1aca28a9841235dbcc9e6fc321e75783a23,2024-11-21T09:14:53.523000
|
||||
CVE-2024-3242,0,0,5f9a392d5baa5578fca1ab76c564a35b8fe07ebbba529c9b61373bb8ee0e2f7d,2025-01-16T15:08:00.773000
|
||||
@ -279837,7 +279837,7 @@ CVE-2024-8596,0,0,22e87c05a881144248073e39d597b5379dfc78f98b055324b92268561474ba
|
||||
CVE-2024-8597,0,0,4bdf3980e94f272c2937a9011ae04eb189d04ed8b16c1f1ae4fbae13c13a831f,2025-02-03T17:15:24.297000
|
||||
CVE-2024-8598,0,0,65e114fef269c3e148fd3d6c3c67dcb79837e4f920c870586eed56a88095fa3b,2025-02-03T17:15:24.413000
|
||||
CVE-2024-8599,0,0,34f5b9d9d6f8575360ec482776d3a2f1d00ec2089f5e9b2b2b434a9d0cfaeff9,2025-02-03T17:15:24.537000
|
||||
CVE-2024-8600,0,0,b93a2f0133ecc6c1f4d95330748e0842c2c972d18c9727af8894ae29ab019d6b,2025-02-03T17:15:24.650000
|
||||
CVE-2024-8600,0,1,5909cb8fbb5868f1b93fa16c0b5494f065b67c989958daedb9d75904ae719abc,2025-04-04T13:15:44.070000
|
||||
CVE-2024-8601,0,0,0926d345ee13eaf1f1cd351ae0c9b59ed8151694e14d0d1c9aaf73b0a718a214,2024-09-17T17:54:39.767000
|
||||
CVE-2024-8602,0,0,de8dccdf870e3101b819a150a22cd3b990f9026c7bfa5293a315af8d994b8878,2024-12-11T09:15:05.890000
|
||||
CVE-2024-8603,0,0,ad533194a238e7e4d06b8b70ae4b1b2ef8e12abb7905d0c1ce979a1390f5e50b,2025-01-15T16:15:32.190000
|
||||
@ -282054,9 +282054,9 @@ CVE-2025-1424,0,0,028aeccf06b420fd3ae1e41e07745fbc6608efab9b9570b82ad820d0434865
|
||||
CVE-2025-1425,0,0,5581bc90886ae6a96bcdd3391932814fcfec4b3e066f6fbd2840021651a3a39d,2025-03-04T16:15:36.803000
|
||||
CVE-2025-1426,0,0,2876b3a8dca30380599d9579c9abf35d17096290894ef7cda88e0e95c5efa326,2025-02-19T20:15:36.467000
|
||||
CVE-2025-1427,0,0,b7e473094712eef353836f4dde44e4c76d523f8b97e423856aa00a1873196c89,2025-03-13T17:15:34.743000
|
||||
CVE-2025-1428,0,0,a24edc1900e2037eca1697d853a9c3a7a365dd6871ccbd3e92089041366e0a1a,2025-03-13T17:15:34.900000
|
||||
CVE-2025-1428,0,1,2f08e5c3fe8253a6c4a3240306a5b36c7e9ce35b373973ea3a582bb4384dbfa9,2025-04-04T13:15:45.193000
|
||||
CVE-2025-1429,0,0,a48d6ec582d2dad82c65a4daa1cedeefccc3b069798b0ebae06e65b05843be71,2025-03-13T17:15:35.053000
|
||||
CVE-2025-1430,0,0,33dbb475df7942ea8f3e7704cf91befc5308feee95ef4d2792bd71bcc1f7182c,2025-03-13T17:15:35.217000
|
||||
CVE-2025-1430,0,1,3a88959b8a2b6d6c00221dfa1f4e8d1f46d17417652a6eca853dc32dcc8ce865,2025-04-04T13:15:45.440000
|
||||
CVE-2025-1431,0,0,94ea65fbb42352fa40eb2a0db95e32214ef7a7b91e7c98bab1ba1f7102862083,2025-03-13T17:15:35.377000
|
||||
CVE-2025-1432,0,0,230507126806f849e3915bac4bc192105fa5d833fd312f680552b0c8cb74cd90,2025-03-13T17:15:35.533000
|
||||
CVE-2025-1433,0,0,e4257b265cb0fea8237bfb54d6e25ede0c1cfc291c5042720840e13d6e6532c4,2025-03-13T17:15:35.683000
|
||||
@ -282348,7 +282348,7 @@ CVE-2025-1859,0,0,70eed6aa2ae7042bee5e2f20f0d8c842e42ef5f3e1a1b3da126361521cdde1
|
||||
CVE-2025-1860,0,0,7736a4cb2a2d2c15bb0706bffc9efba228a43975c53e60863c3f3d89ec467e3c,2025-04-02T22:15:18.623000
|
||||
CVE-2025-1861,0,0,e574c7a5998a3dbf2cb6ce42d9de675d2d94a4e25a0eacc37130096101f987d1,2025-04-01T20:26:30.593000
|
||||
CVE-2025-1864,0,0,c92fc87cd84b99acae49e648c1289b46612421f948d2c6533ab7724af225a718,2025-03-03T09:15:39.210000
|
||||
CVE-2025-1865,1,1,8ed8bddbb51a3fac0589def8fb3b0d6b7c4b5dd1f1e5d2d5891da0bb29e4be07,2025-04-04T10:15:15.277000
|
||||
CVE-2025-1865,0,0,8ed8bddbb51a3fac0589def8fb3b0d6b7c4b5dd1f1e5d2d5891da0bb29e4be07,2025-04-04T10:15:15.277000
|
||||
CVE-2025-1866,0,0,6d645070e86ae70b91e6d45d95a260c1e9eb1ae7937ef173d0ea19de235adb52,2025-03-03T09:15:39.370000
|
||||
CVE-2025-1867,0,0,a65a0cea20f97468944d29f6ba9795de8029e0ca08dd1a9572fb100876a713fb,2025-03-03T09:15:39.520000
|
||||
CVE-2025-1868,0,0,33eb58dac94a982acb086671165958ead51bdf581c5edfedb494a4e91abd786e,2025-03-03T12:15:34.610000
|
||||
@ -283621,7 +283621,7 @@ CVE-2025-22277,0,0,d3953de33b0251c415d71264a93a8d08d09a60d984824c8d1bfdf7718d25e
|
||||
CVE-2025-22278,0,0,cc8f354bce230092658929ccab2063a437175395281c0a62d02df7bef8385557,2025-03-27T16:45:12.210000
|
||||
CVE-2025-2228,0,0,b8e082346d4d2d148e6a99881a0d1d5f06a659dc8972867638956a785b9cdf28,2025-03-27T16:45:27.850000
|
||||
CVE-2025-22280,0,0,7e887d74f1380d8cf0e36667690a3957b0ae26b7cf636de27c1eae24280ecf11,2025-02-27T14:15:36.033000
|
||||
CVE-2025-22282,1,1,bd66d4b687544e2b13caf35aff6698f43fd54fd66dfa60396ba9b69f61c2d4e8,2025-04-04T11:15:39.680000
|
||||
CVE-2025-22282,0,0,bd66d4b687544e2b13caf35aff6698f43fd54fd66dfa60396ba9b69f61c2d4e8,2025-04-04T11:15:39.680000
|
||||
CVE-2025-22283,0,0,c6e0038bc1265de2aebb3206299f123b1602ed0ab9f0a11ae0639273d1681a40,2025-03-27T16:45:27.850000
|
||||
CVE-2025-22284,0,0,141756b91553288d6d3b7a6baecfb796de636cfa27171ddd3204c869f7233bc2,2025-02-16T23:15:09.280000
|
||||
CVE-2025-22286,0,0,a057abc87f895feda50fc222dd31de7ff11581af126698bf58f0b63b8d8dc92a,2025-02-16T23:15:09.427000
|
||||
@ -283730,13 +283730,13 @@ CVE-2025-2240,0,0,2a3ccc213981a0c7a04acca32ee567b557068e9dccba83e3d74fc058a2aa56
|
||||
CVE-2025-22402,0,0,6f8fff7283a94f5896b11ef84f302b0565ff570b2cada8e73fd3faea43645321,2025-03-04T16:24:09.313000
|
||||
CVE-2025-2241,0,0,6926f2fa842474fe6a55e7174f46044c3c08c97e12f8e662d0b323e4fb945b10,2025-03-17T17:15:40.393000
|
||||
CVE-2025-2242,0,0,02569f538af68313d2c79f3ea63f2697b367e188a2ca3eaefd938c12f3f7055f,2025-03-27T16:45:12.210000
|
||||
CVE-2025-2243,1,1,c90737c56da556138b477400deeb05313f318917a55e72cab185064ea0c581b4,2025-04-04T10:15:16.313000
|
||||
CVE-2025-2244,1,1,791ac96582fe066cf46a80807b8d6f3a3a3ff30321083a3c8d19de7087001d5c,2025-04-04T10:15:16.580000
|
||||
CVE-2025-2243,0,0,c90737c56da556138b477400deeb05313f318917a55e72cab185064ea0c581b4,2025-04-04T10:15:16.313000
|
||||
CVE-2025-2244,0,0,791ac96582fe066cf46a80807b8d6f3a3a3ff30321083a3c8d19de7087001d5c,2025-04-04T10:15:16.580000
|
||||
CVE-2025-22443,0,0,090cd1f4946368fc1e9eb5b6ab55668fbc2f20256169bdd81ac865305ea8e57a,2025-03-06T18:08:17.313000
|
||||
CVE-2025-22445,0,0,b624e4e02bffb5e86c49cb4f27a7947d07caad44049ae2738e6a5025f36e7b72,2025-01-09T07:15:28.617000
|
||||
CVE-2025-22447,0,0,14015e645ec113cec25abf1a777870417d62c167fc494c4315fe7d69805523a2,2025-03-06T04:15:25.377000
|
||||
CVE-2025-22449,0,0,bbe6983ada373fe96f2acc3f2babe8a504c2fad76654b8fe6101ea89ee7b3f6f,2025-01-09T07:15:28.777000
|
||||
CVE-2025-2245,1,1,a9ff9699ae5a41975d2184fc91caaffa9dfd762f8ebe8ce30741f7eef46a88f6,2025-04-04T10:15:16.740000
|
||||
CVE-2025-2245,0,0,a9ff9699ae5a41975d2184fc91caaffa9dfd762f8ebe8ce30741f7eef46a88f6,2025-04-04T10:15:16.740000
|
||||
CVE-2025-22450,0,0,08efaa8a0b7289f6e07d2143106d9ab0ee4947a312acaf42c999e908a6f4e398,2025-01-22T06:15:14.327000
|
||||
CVE-2025-22454,0,0,04f15e88e5a975efe8c2b32608cedcfad6c31392d1260fbd49043c6c8c78ea98,2025-03-11T15:15:44.737000
|
||||
CVE-2025-22457,0,0,d15ae9efc4d84549a102fdac173000023601aa5d5cf3a5e807d8e19a71b8f59b,2025-04-03T16:15:35.370000
|
||||
@ -287095,7 +287095,7 @@ CVE-2025-2854,0,0,281d4fc379506fb237df8903b8089035b874fedbc255b747985b9c9923b31a
|
||||
CVE-2025-2855,0,0,5aaa475d5b8aab66a1ff02a7daf81660e986d985c8ef92681c11f5951c238f6a,2025-03-27T16:45:12.210000
|
||||
CVE-2025-2857,0,0,8c7f8ac266f15d25c9af4fc5e517cf8a450da35ae1d4923b3d1c4b2dbd19ab2e,2025-03-28T16:15:30.180000
|
||||
CVE-2025-2858,0,0,2e4b5f87bba94151b8774bfb4ece0ee9ed37a427c4372ccf2d59be0c4734d06d,2025-03-28T18:11:40.180000
|
||||
CVE-2025-2859,0,0,ed3cdbae9f5da0c21f6653f091dc072a8e330a6bdc40c117d4a69a844bea1c9a,2025-03-28T18:11:40.180000
|
||||
CVE-2025-2859,0,1,e65abd0b60f7827efad318631d07986b97bfd6a357c0604e2e3311a9d74c8481,2025-04-04T13:15:46.493000
|
||||
CVE-2025-2860,0,0,2925b9644f166b8592fa371a02cb9c9e8b48780b6a0fbc61a9674b845b1d1e9c,2025-03-28T18:11:40.180000
|
||||
CVE-2025-2861,0,0,7dad4c2c440266b98ec3759b932eef5f284ec025d86a17d9bc5b9d07901246c6,2025-03-28T18:11:40.180000
|
||||
CVE-2025-2862,0,0,ad3586de27adfb4a89c83bf812f10d08ad110fe40d81b5c935b824380cef3797,2025-03-28T18:11:40.180000
|
||||
@ -288037,6 +288037,8 @@ CVE-2025-31415,0,0,414e63d224a09cd075a83b960b86b86bc2238dd067741c725e74f34715621
|
||||
CVE-2025-31417,0,0,0d3c1b109fae4b739454cb1a0b8eb7abc566c168fc7a86169fb95a201cbbcd1f,2025-04-01T20:26:30.593000
|
||||
CVE-2025-31419,0,0,86daefd4cfae6cd0bc5dfe16310f6844d1f9e0f956e501ba1300c694a97deb9e,2025-04-01T20:26:30.593000
|
||||
CVE-2025-3142,0,0,89dad725a78f99af9996b26eb4fd0b6e3130ff2cdf8b39de58f0a92b7681d0ad,2025-04-03T06:15:43.200000
|
||||
CVE-2025-31420,1,1,b1e62500f59f82b3c0e41319b0be822dd95b1c52c179f4ea3f0c6d3a0c4c9e17,2025-04-04T13:15:46.630000
|
||||
CVE-2025-31421,1,1,18b0871652150cdc4d60cde21b02ab562675125f486033750c92b6e45ba68815,2025-04-04T13:15:46.780000
|
||||
CVE-2025-3143,0,0,94ecb7e4d681183309e1820ee8aa59c723a65e9bcb295db0aa131fd273d1f89e,2025-04-03T06:15:43.467000
|
||||
CVE-2025-31431,0,0,9b65447f095eb6450cd16ceaae607c3f49ad8abcc8b0a8029061fac7fc7f6b63,2025-04-02T14:58:07.527000
|
||||
CVE-2025-31432,0,0,66cb912d57f88bc72b111a0fcfbe419506a386c0afd760e3d30a46c5880e1d8f,2025-03-28T18:11:40.180000
|
||||
@ -288440,6 +288442,7 @@ CVE-2025-31886,0,0,c73d86de86d3dc81b1c40f856db66f0a60956c38dbc4709d4ad0d4bf832e0
|
||||
CVE-2025-31887,0,0,d54c33d517591b302b00ebc4e45735e58a8050b413372297cdc25b43fb40c5f8,2025-04-01T20:26:01.990000
|
||||
CVE-2025-31888,0,0,6b4b44419e886eaa88230ec92a6476d580d8851b0d61dc8e06e42f2f45ce30b6,2025-04-01T20:26:01.990000
|
||||
CVE-2025-31889,0,0,578b38d2dc9b6570f94ad6c848a3be4aed02c44ccbf0e3efa8a83b22f79d15a2,2025-04-02T14:58:07.527000
|
||||
CVE-2025-3189,1,1,0bd3ea66e0743728b4646f02961dad6a7ffa30b4db28792bb1114c8d5d3f5cb9,2025-04-04T13:15:46.940000
|
||||
CVE-2025-31890,0,0,b65898ce0553e8ce7fd4ab06e6cf7313e7f14c0d47bfb9ba085b4557bfb68295,2025-04-01T20:26:01.990000
|
||||
CVE-2025-31891,0,0,0d5532363eae4a56d554bccc6fd0a90dca74503bbed8f03648dd943cb45d4007,2025-04-01T20:26:01.990000
|
||||
CVE-2025-31892,0,0,3486378412c30d4b31ffeaa1b02f9c09ebdef5d6229cdf9d3eb7c7c44d1231e7,2025-04-01T20:26:01.990000
|
||||
@ -288497,11 +288500,14 @@ CVE-2025-3219,0,0,dcfa632dff9e94c092f2d73b57763caab9c8b78bb5cc723e30d512c5a10d78
|
||||
CVE-2025-3220,0,0,ba171ffb9f57124578c57e06aaab81ada82d0720d186647156c5c4abaa6f4704,2025-04-04T08:15:14.767000
|
||||
CVE-2025-3229,0,0,09347180a6a7f828e0747f2ed45b00fdd7a1f719f9ab350e19aecf2c1c123a1d,2025-04-04T09:15:17.357000
|
||||
CVE-2025-3231,0,0,de2ff2a8c76e38c6b06f54c3981a381c63043cd187dc0f869ed608d2e9e7696c,2025-04-04T09:15:17.677000
|
||||
CVE-2025-3235,1,1,d022d5157edbac8fbfeb9141a3748050787bdf76ed78cf441cd594af050e5131,2025-04-04T10:15:16.900000
|
||||
CVE-2025-3236,1,1,5d4e067380b83b38fff7db048531cbbf8dd6b43b2fc6d26b5d090f351b090b28,2025-04-04T10:15:17.177000
|
||||
CVE-2025-3237,1,1,2b0634913d301c0209a0690fb90ddcaa8b200550805a1d4ec2db149b30fd4af2,2025-04-04T10:15:17.383000
|
||||
CVE-2025-3238,1,1,49b7638c423114327b5e6867f71919ab552663d9bb2b5517ae05eef59b2968e0,2025-04-04T10:15:17.577000
|
||||
CVE-2025-3239,1,1,a890b57275ecd0351eb57a0ff486b7b7ddc21d7a21c77a8b45094fdc21902b92,2025-04-04T11:15:40.393000
|
||||
CVE-2025-3240,1,1,5b17439a0d44f5ff15b1b29eb52afc1b18c24e4ea281876bb94711a18baa0212,2025-04-04T11:15:40.603000
|
||||
CVE-2025-3241,1,1,6109a3416c31e472988921dc354b6985d4f1985e340f34f97f9d234f6989df73,2025-04-04T11:15:40.783000
|
||||
CVE-2025-3242,1,1,60be5ba649ac775f082baeb48a3ba854460f9aca2f32b24fcfec33ebf86a1f6c,2025-04-04T11:15:40.980000
|
||||
CVE-2025-3235,0,0,d022d5157edbac8fbfeb9141a3748050787bdf76ed78cf441cd594af050e5131,2025-04-04T10:15:16.900000
|
||||
CVE-2025-3236,0,0,5d4e067380b83b38fff7db048531cbbf8dd6b43b2fc6d26b5d090f351b090b28,2025-04-04T10:15:17.177000
|
||||
CVE-2025-3237,0,0,2b0634913d301c0209a0690fb90ddcaa8b200550805a1d4ec2db149b30fd4af2,2025-04-04T10:15:17.383000
|
||||
CVE-2025-3238,0,0,49b7638c423114327b5e6867f71919ab552663d9bb2b5517ae05eef59b2968e0,2025-04-04T10:15:17.577000
|
||||
CVE-2025-3239,0,0,a890b57275ecd0351eb57a0ff486b7b7ddc21d7a21c77a8b45094fdc21902b92,2025-04-04T11:15:40.393000
|
||||
CVE-2025-3240,0,0,5b17439a0d44f5ff15b1b29eb52afc1b18c24e4ea281876bb94711a18baa0212,2025-04-04T11:15:40.603000
|
||||
CVE-2025-3241,0,0,6109a3416c31e472988921dc354b6985d4f1985e340f34f97f9d234f6989df73,2025-04-04T11:15:40.783000
|
||||
CVE-2025-3242,0,0,60be5ba649ac775f082baeb48a3ba854460f9aca2f32b24fcfec33ebf86a1f6c,2025-04-04T11:15:40.980000
|
||||
CVE-2025-3243,1,1,6cc184b6e9c2da2a9036a96f34024776eea63025e8c651f8f4b858c84c5a62f4,2025-04-04T12:15:15.530000
|
||||
CVE-2025-3244,1,1,f40fcae26782bbc07fea6b0fd93020e8bffc63cfce19c9be4fcd9d216f2366f1,2025-04-04T12:15:16.217000
|
||||
CVE-2025-3245,1,1,55a4666052abbcba093004e177627f630dc2b418996c95946336b62bce428aae,2025-04-04T12:15:16.400000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user