Auto-Update: 2025-04-01T14:00:20.034407+00:00

This commit is contained in:
cad-safe-bot 2025-04-01 14:03:54 +00:00
parent f1294f52bf
commit 96174c2347
59 changed files with 2187 additions and 212 deletions

View File

@ -2,7 +2,7 @@
"id": "CVE-2013-7285",
"sourceIdentifier": "cve@mitre.org",
"published": "2019-05-15T17:29:00.297",
"lastModified": "2024-11-21T02:00:39.317",
"lastModified": "2025-04-01T13:07:22.907",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -85,14 +85,14 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:xstream_project:xstream:*:*:*:*:*:*:*:*",
"versionEndIncluding": "1.4.6",
"matchCriteriaId": "6778C7B9-EA5D-44AA-8E26-FC292493D887"
"criteria": "cpe:2.3:a:x-stream:xstream:1.4.10:*:*:*:*:*:*:*",
"matchCriteriaId": "FCA4A48D-89A9-4020-90A5-6CB53F8D7529"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:xstream_project:xstream:1.4.10:*:*:*:*:*:*:*",
"matchCriteriaId": "3832CB4C-DDB8-439C-B396-1A1D91F70DEA"
"criteria": "cpe:2.3:a:xstream_project:xstream:*:*:*:*:*:*:*:*",
"versionEndIncluding": "1.4.6",
"matchCriteriaId": "6778C7B9-EA5D-44AA-8E26-FC292493D887"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2019-10173",
"sourceIdentifier": "secalert@redhat.com",
"published": "2019-07-23T13:15:13.177",
"lastModified": "2024-11-21T04:18:34.723",
"lastModified": "2025-04-01T13:07:22.907",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -117,8 +117,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:xstream_project:xstream:1.4.10:*:*:*:*:*:*:*",
"matchCriteriaId": "3832CB4C-DDB8-439C-B396-1A1D91F70DEA"
"criteria": "cpe:2.3:a:x-stream:xstream:1.4.10:*:*:*:*:*:*:*",
"matchCriteriaId": "FCA4A48D-89A9-4020-90A5-6CB53F8D7529"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-52047",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-02-28T20:15:41.590",
"lastModified": "2024-11-21T08:39:04.963",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-01T13:30:28.050",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,37 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://github.com/chongfujun/test/blob/main/2023-52047.docx",
"source": "cve@mitre.org"
},
"nodes": [
{
"url": "https://github.com/chongfujun/test/blob/main/2023-52047.docx",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:dedecms:dedecms:5.7.112:*:*:*:*:*:*:*",
"matchCriteriaId": "A03BA3DE-8692-483B-AD78-AC288D0250DD"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/chongfujun/test/blob/main/2023-52047.docx",
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "https://github.com/chongfujun/test/blob/main/2023-52047.docx",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
]
}
]
}

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2024-13553",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-04-01T12:15:14.643",
"lastModified": "2025-04-01T12:15:14.643",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The SMS Alert Order Notifications \u2013 WooCommerce plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 3.7.9. This is due to the plugin using the Host header to determine if the plugin is in a playground environment. This makes it possible for unauthenticated attackers to spoof the Host header to make the OTP code \"1234\" and authenticate as any user, including administrators."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-288"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3227241%40sms-alert&new=3227241%40sms-alert&sfp_email=&sfph_mail=",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3248017%40sms-alert&new=3248017%40sms-alert&sfp_email=&sfph_mail=",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/4e444a30-11c5-4219-b4fe-635084cbac3a?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-1381",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-03-05T02:15:26.620",
"lastModified": "2024-11-21T08:50:27.453",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-04-01T13:39:45.360",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,25 +36,87 @@
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pagebuildersandwich:page_builder_sandwich:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "5.1.0",
"matchCriteriaId": "D3BFF465-28EE-4E56-9C04-984E790DD567"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/page-builder-sandwich/trunk/class-inspector.php#L90",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Patch"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/8e98d92a-fe64-4591-972b-ed11542506b7?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://plugins.trac.wordpress.org/browser/page-builder-sandwich/trunk/class-inspector.php#L90",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/8e98d92a-fe64-4591-972b-ed11542506b7?source=cve",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-1437",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-02-29T06:15:46.593",
"lastModified": "2024-11-21T08:50:35.123",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-04-01T13:43:41.967",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 3.7
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
@ -51,14 +71,38 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://patchstack.com/database/vulnerability/adsensei-b30/wordpress-adsmonetizer-plugin-3-1-2-reflected-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
},
"nodes": [
{
"url": "https://patchstack.com/database/vulnerability/adsensei-b30/wordpress-adsmonetizer-plugin-3-1-2-reflected-xss-vulnerability?_s_id=cve",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adsplugin:adsmonetizer:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "3.1.3",
"matchCriteriaId": "58D129E1-363B-47C9-9994-3734A682FDD4"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/adsensei-b30/wordpress-adsmonetizer-plugin-3-1-2-reflected-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://patchstack.com/database/vulnerability/adsensei-b30/wordpress-adsmonetizer-plugin-3-1-2-reflected-xss-vulnerability?_s_id=cve",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-26333",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-05T08:15:39.500",
"lastModified": "2024-11-21T09:02:23.010",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-01T13:38:57.733",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,41 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://github.com/matthiaskramm/swftools/issues/219",
"source": "cve@mitre.org"
},
"nodes": [
{
"url": "https://github.com/matthiaskramm/swftools/issues/219",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:swftools:swftools:0.9.2:*:*:*:*:*:*:*",
"matchCriteriaId": "B6149BA0-2082-45B7-9B43-CAC2F1768770"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/matthiaskramm/swftools/issues/219",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory",
"Issue Tracking"
]
},
{
"url": "https://github.com/matthiaskramm/swftools/issues/219",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory",
"Issue Tracking"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-26334",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-05T09:15:45.040",
"lastModified": "2024-11-21T09:02:23.217",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-01T13:38:46.493",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,41 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://github.com/matthiaskramm/swftools/issues/221",
"source": "cve@mitre.org"
},
"nodes": [
{
"url": "https://github.com/matthiaskramm/swftools/issues/221",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:swftools:swftools:0.9.2:*:*:*:*:*:*:*",
"matchCriteriaId": "B6149BA0-2082-45B7-9B43-CAC2F1768770"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/matthiaskramm/swftools/issues/221",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory",
"Issue Tracking"
]
},
{
"url": "https://github.com/matthiaskramm/swftools/issues/221",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory",
"Issue Tracking"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-26335",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-05T09:15:45.100",
"lastModified": "2024-11-21T09:02:23.423",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-01T13:38:30.083",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,41 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://github.com/matthiaskramm/swftools/issues/222",
"source": "cve@mitre.org"
},
"nodes": [
{
"url": "https://github.com/matthiaskramm/swftools/issues/222",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:swftools:swftools:0.9.2:*:*:*:*:*:*:*",
"matchCriteriaId": "B6149BA0-2082-45B7-9B43-CAC2F1768770"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/matthiaskramm/swftools/issues/222",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory",
"Issue Tracking"
]
},
{
"url": "https://github.com/matthiaskramm/swftools/issues/222",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory",
"Issue Tracking"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-28429",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-13T13:15:47.837",
"lastModified": "2024-11-21T09:06:20.280",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-01T13:41:22.510",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,39 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://github.com/itsqian797/cms/blob/main/2.md",
"source": "cve@mitre.org"
},
"nodes": [
{
"url": "https://github.com/itsqian797/cms/blob/main/2.md",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:dedecms:dedecms:5.7:-:*:*:*:*:*:*",
"matchCriteriaId": "787DA248-344B-42CB-95C4-D664BCE46208"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/itsqian797/cms/blob/main/2.md",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://github.com/itsqian797/cms/blob/main/2.md",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-28430",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-13T13:15:47.897",
"lastModified": "2025-03-13T15:15:43.060",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-01T13:43:05.863",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,39 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://github.com/itsqian797/cms/blob/main/1.md",
"source": "cve@mitre.org"
},
"nodes": [
{
"url": "https://github.com/itsqian797/cms/blob/main/1.md",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:dedecms:dedecms:5.7:-:*:*:*:*:*:*",
"matchCriteriaId": "787DA248-344B-42CB-95C4-D664BCE46208"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/itsqian797/cms/blob/main/1.md",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://github.com/itsqian797/cms/blob/main/1.md",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-28431",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-13T13:15:47.943",
"lastModified": "2024-11-21T09:06:20.890",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-01T13:43:02.943",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,39 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://github.com/itsqian797/cms/blob/main/3.md",
"source": "cve@mitre.org"
},
"nodes": [
{
"url": "https://github.com/itsqian797/cms/blob/main/3.md",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:dedecms:dedecms:5.7:-:*:*:*:*:*:*",
"matchCriteriaId": "787DA248-344B-42CB-95C4-D664BCE46208"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/itsqian797/cms/blob/main/3.md",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://github.com/itsqian797/cms/blob/main/3.md",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-28432",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-13T13:15:47.987",
"lastModified": "2024-11-21T09:06:21.177",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-01T13:42:56.350",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,39 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://github.com/itsqian797/cms/blob/main/4.md",
"source": "cve@mitre.org"
},
"nodes": [
{
"url": "https://github.com/itsqian797/cms/blob/main/4.md",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:dedecms:dedecms:5.7:-:*:*:*:*:*:*",
"matchCriteriaId": "787DA248-344B-42CB-95C4-D664BCE46208"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/itsqian797/cms/blob/main/4.md",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://github.com/itsqian797/cms/blob/main/4.md",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-28665",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-13T13:15:48.033",
"lastModified": "2024-11-21T09:06:43.187",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-01T13:42:52.583",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,39 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://github.com/777erp/cms/blob/main/1.md",
"source": "cve@mitre.org"
},
"nodes": [
{
"url": "https://github.com/777erp/cms/blob/main/1.md",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:dedecms:dedecms:5.7:-:*:*:*:*:*:*",
"matchCriteriaId": "787DA248-344B-42CB-95C4-D664BCE46208"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/777erp/cms/blob/main/1.md",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://github.com/777erp/cms/blob/main/1.md",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-28666",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-13T13:15:48.080",
"lastModified": "2024-11-21T09:06:43.393",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-01T13:42:49.097",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,39 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://github.com/777erp/cms/blob/main/2.md",
"source": "cve@mitre.org"
},
"nodes": [
{
"url": "https://github.com/777erp/cms/blob/main/2.md",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:dedecms:dedecms:5.7:-:*:*:*:*:*:*",
"matchCriteriaId": "787DA248-344B-42CB-95C4-D664BCE46208"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/777erp/cms/blob/main/2.md",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://github.com/777erp/cms/blob/main/2.md",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-28667",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-13T13:15:48.127",
"lastModified": "2024-11-21T09:06:43.600",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-01T13:42:45.900",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,39 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://github.com/777erp/cms/blob/main/6.md",
"source": "cve@mitre.org"
},
"nodes": [
{
"url": "https://github.com/777erp/cms/blob/main/6.md",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:dedecms:dedecms:5.7:-:*:*:*:*:*:*",
"matchCriteriaId": "787DA248-344B-42CB-95C4-D664BCE46208"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/777erp/cms/blob/main/6.md",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://github.com/777erp/cms/blob/main/6.md",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-28668",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-13T13:15:48.170",
"lastModified": "2025-03-13T17:15:30.470",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-01T13:42:42.853",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,39 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://github.com/777erp/cms/blob/main/5.md",
"source": "cve@mitre.org"
},
"nodes": [
{
"url": "https://github.com/777erp/cms/blob/main/5.md",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:dedecms:dedecms:5.7:-:*:*:*:*:*:*",
"matchCriteriaId": "787DA248-344B-42CB-95C4-D664BCE46208"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/777erp/cms/blob/main/5.md",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://github.com/777erp/cms/blob/main/5.md",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-28669",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-13T16:15:30.100",
"lastModified": "2024-11-21T09:06:44.043",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-01T13:42:31.980",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,39 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://github.com/777erp/cms/blob/main/10.md",
"source": "cve@mitre.org"
},
"nodes": [
{
"url": "https://github.com/777erp/cms/blob/main/10.md",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:dedecms:dedecms:5.7:-:*:*:*:*:*:*",
"matchCriteriaId": "787DA248-344B-42CB-95C4-D664BCE46208"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/777erp/cms/blob/main/10.md",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://github.com/777erp/cms/blob/main/10.md",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-28670",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-13T16:15:30.147",
"lastModified": "2024-11-21T09:06:44.270",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-01T13:42:28.547",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,39 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://github.com/777erp/cms/blob/main/9.md",
"source": "cve@mitre.org"
},
"nodes": [
{
"url": "https://github.com/777erp/cms/blob/main/9.md",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:dedecms:dedecms:5.7:-:*:*:*:*:*:*",
"matchCriteriaId": "787DA248-344B-42CB-95C4-D664BCE46208"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/777erp/cms/blob/main/9.md",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://github.com/777erp/cms/blob/main/9.md",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-28671",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-13T16:15:30.197",
"lastModified": "2024-11-21T09:06:44.500",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-01T13:42:24.713",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,39 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://github.com/777erp/cms/blob/main/7.md",
"source": "cve@mitre.org"
},
"nodes": [
{
"url": "https://github.com/777erp/cms/blob/main/7.md",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:dedecms:dedecms:5.7:-:*:*:*:*:*:*",
"matchCriteriaId": "787DA248-344B-42CB-95C4-D664BCE46208"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/777erp/cms/blob/main/7.md",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://github.com/777erp/cms/blob/main/7.md",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-28672",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-13T16:15:30.247",
"lastModified": "2024-11-21T09:06:44.720",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-01T13:42:21.180",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,39 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://github.com/777erp/cms/blob/main/3.md",
"source": "cve@mitre.org"
},
"nodes": [
{
"url": "https://github.com/777erp/cms/blob/main/3.md",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:dedecms:dedecms:5.7:-:*:*:*:*:*:*",
"matchCriteriaId": "787DA248-344B-42CB-95C4-D664BCE46208"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/777erp/cms/blob/main/3.md",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://github.com/777erp/cms/blob/main/3.md",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-28673",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-13T16:15:30.297",
"lastModified": "2024-11-21T09:06:44.943",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-01T13:42:15.560",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,39 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://github.com/777erp/cms/blob/main/4.md",
"source": "cve@mitre.org"
},
"nodes": [
{
"url": "https://github.com/777erp/cms/blob/main/4.md",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:dedecms:dedecms:5.7:-:*:*:*:*:*:*",
"matchCriteriaId": "787DA248-344B-42CB-95C4-D664BCE46208"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/777erp/cms/blob/main/4.md",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://github.com/777erp/cms/blob/main/4.md",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-28675",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-13T14:15:07.770",
"lastModified": "2024-11-21T09:06:45.160",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-01T13:42:38.400",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,39 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://github.com/777erp/cms/blob/main/12.md",
"source": "cve@mitre.org"
},
"nodes": [
{
"url": "https://github.com/777erp/cms/blob/main/12.md",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:dedecms:dedecms:5.7:-:*:*:*:*:*:*",
"matchCriteriaId": "787DA248-344B-42CB-95C4-D664BCE46208"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/777erp/cms/blob/main/12.md",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://github.com/777erp/cms/blob/main/12.md",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-28676",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-13T16:15:30.347",
"lastModified": "2024-11-21T09:06:45.377",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-01T13:42:11.823",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,39 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://github.com/777erp/cms/blob/main/18.md",
"source": "cve@mitre.org"
},
"nodes": [
{
"url": "https://github.com/777erp/cms/blob/main/18.md",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:dedecms:dedecms:5.7:-:*:*:*:*:*:*",
"matchCriteriaId": "787DA248-344B-42CB-95C4-D664BCE46208"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/777erp/cms/blob/main/18.md",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://github.com/777erp/cms/blob/main/18.md",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-28677",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-13T16:15:30.390",
"lastModified": "2024-11-21T09:06:45.597",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-01T13:42:08.577",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,39 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://github.com/777erp/cms/blob/main/14.md",
"source": "cve@mitre.org"
},
"nodes": [
{
"url": "https://github.com/777erp/cms/blob/main/14.md",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:dedecms:dedecms:5.7:-:*:*:*:*:*:*",
"matchCriteriaId": "787DA248-344B-42CB-95C4-D664BCE46208"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/777erp/cms/blob/main/14.md",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://github.com/777erp/cms/blob/main/14.md",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-28678",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-13T16:15:30.440",
"lastModified": "2024-11-21T09:06:45.817",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-01T13:44:20.637",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,39 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://github.com/777erp/cms/blob/main/15.md",
"source": "cve@mitre.org"
},
"nodes": [
{
"url": "https://github.com/777erp/cms/blob/main/15.md",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:dedecms:dedecms:5.7:-:*:*:*:*:*:*",
"matchCriteriaId": "787DA248-344B-42CB-95C4-D664BCE46208"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/777erp/cms/blob/main/15.md",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://github.com/777erp/cms/blob/main/15.md",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-28679",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-13T16:15:30.483",
"lastModified": "2024-11-21T09:06:46.053",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-01T13:44:16.210",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,39 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://github.com/777erp/cms/blob/main/19.md",
"source": "cve@mitre.org"
},
"nodes": [
{
"url": "https://github.com/777erp/cms/blob/main/19.md",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:dedecms:dedecms:5.7:-:*:*:*:*:*:*",
"matchCriteriaId": "787DA248-344B-42CB-95C4-D664BCE46208"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/777erp/cms/blob/main/19.md",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://github.com/777erp/cms/blob/main/19.md",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-28680",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-13T16:15:30.530",
"lastModified": "2024-11-21T09:06:46.260",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-01T13:44:12.623",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,39 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://github.com/777erp/cms/blob/main/11.md",
"source": "cve@mitre.org"
},
"nodes": [
{
"url": "https://github.com/777erp/cms/blob/main/11.md",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:dedecms:dedecms:5.7:-:*:*:*:*:*:*",
"matchCriteriaId": "787DA248-344B-42CB-95C4-D664BCE46208"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/777erp/cms/blob/main/11.md",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://github.com/777erp/cms/blob/main/11.md",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-28681",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-13T16:15:30.570",
"lastModified": "2024-11-21T09:06:46.473",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-01T13:44:09.607",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,39 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://github.com/777erp/cms/blob/main/17.md",
"source": "cve@mitre.org"
},
"nodes": [
{
"url": "https://github.com/777erp/cms/blob/main/17.md",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:dedecms:dedecms:5.7:-:*:*:*:*:*:*",
"matchCriteriaId": "787DA248-344B-42CB-95C4-D664BCE46208"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/777erp/cms/blob/main/17.md",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://github.com/777erp/cms/blob/main/17.md",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-28682",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-13T16:15:30.620",
"lastModified": "2024-11-21T09:06:46.683",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-01T13:44:06.493",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,39 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://github.com/777erp/cms/blob/main/13.md",
"source": "cve@mitre.org"
},
"nodes": [
{
"url": "https://github.com/777erp/cms/blob/main/13.md",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:dedecms:dedecms:5.7:-:*:*:*:*:*:*",
"matchCriteriaId": "787DA248-344B-42CB-95C4-D664BCE46208"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/777erp/cms/blob/main/13.md",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://github.com/777erp/cms/blob/main/13.md",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-28683",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-13T16:15:30.667",
"lastModified": "2024-11-21T09:06:46.930",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-01T13:44:01.837",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,39 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://github.com/777erp/cms/blob/main/20.md",
"source": "cve@mitre.org"
},
"nodes": [
{
"url": "https://github.com/777erp/cms/blob/main/20.md",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:dedecms:dedecms:5.7:-:*:*:*:*:*:*",
"matchCriteriaId": "787DA248-344B-42CB-95C4-D664BCE46208"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/777erp/cms/blob/main/20.md",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://github.com/777erp/cms/blob/main/20.md",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-28684",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-13T14:15:07.820",
"lastModified": "2024-11-21T09:06:47.160",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-01T13:42:35.420",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,39 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://github.com/777erp/cms/blob/main/16.md",
"source": "cve@mitre.org"
},
"nodes": [
{
"url": "https://github.com/777erp/cms/blob/main/16.md",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:dedecms:dedecms:5.7:-:*:*:*:*:*:*",
"matchCriteriaId": "787DA248-344B-42CB-95C4-D664BCE46208"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/777erp/cms/blob/main/16.md",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://github.com/777erp/cms/blob/main/16.md",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-3302",
"sourceIdentifier": "security@mozilla.org",
"published": "2024-04-16T16:15:08.310",
"lastModified": "2025-03-29T00:15:22.850",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-04-01T13:39:33.140",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -40,6 +40,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-770"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -51,62 +61,134 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1881183",
"source": "security@mozilla.org"
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:esr:*:*:*",
"versionEndExcluding": "115.10",
"matchCriteriaId": "A9E787D0-BCFE-45BA-AC41-477D33CEBBE4"
},
{
"url": "https://kb.cert.org/vuls/id/421644",
"source": "security@mozilla.org"
"vulnerable": true,
"criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"versionEndExcluding": "125.0",
"matchCriteriaId": "7334A1C6-C6BF-4C70-ADF1-736BCE0EA227"
},
{
"url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00012.html",
"source": "security@mozilla.org"
},
{
"url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00013.html",
"source": "security@mozilla.org"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2024-18/",
"source": "security@mozilla.org"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2024-19/",
"source": "security@mozilla.org"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2024-20/",
"source": "security@mozilla.org"
},
{
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1881183",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://kb.cert.org/vuls/id/421644",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00012.html",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00013.html",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2024-18/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2024-19/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2024-20/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"vulnerable": true,
"criteria": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*",
"versionEndIncluding": "115.10",
"matchCriteriaId": "F7481AD2-CA76-4EE6-8162-78DE4C90C87D"
}
]
}
]
}
],
"references": [
{
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1881183",
"source": "security@mozilla.org",
"tags": [
"Issue Tracking"
]
},
{
"url": "https://kb.cert.org/vuls/id/421644",
"source": "security@mozilla.org",
"tags": [
"US Government Resource"
]
},
{
"url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00012.html",
"source": "security@mozilla.org",
"tags": [
"Mailing List"
]
},
{
"url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00013.html",
"source": "security@mozilla.org",
"tags": [
"Mailing List"
]
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2024-18/",
"source": "security@mozilla.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2024-19/",
"source": "security@mozilla.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2024-20/",
"source": "security@mozilla.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1881183",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking"
]
},
{
"url": "https://kb.cert.org/vuls/id/421644",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"US Government Resource"
]
},
{
"url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00012.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List"
]
},
{
"url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00013.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List"
]
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2024-18/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2024-19/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2024-20/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-3505",
"sourceIdentifier": "reefs@jfrog.com",
"published": "2024-04-15T08:15:18.180",
"lastModified": "2024-11-21T09:29:44.910",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-04-01T13:59:28.320",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
@ -49,16 +69,50 @@
"value": "CWE-200"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:jfrog:artifactory:*:*:*:*:*:-:*:*",
"versionEndExcluding": "7.77.3",
"matchCriteriaId": "4C1DE6A6-89C3-4E1F-A90D-CBEE0B9FB10B"
}
]
}
]
}
],
"references": [
{
"url": "https://jfrog.com/help/r/jfrog-release-information/jfrog-security-advisories",
"source": "reefs@jfrog.com"
"source": "reefs@jfrog.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://jfrog.com/help/r/jfrog-release-information/jfrog-security-advisories",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-3852",
"sourceIdentifier": "security@mozilla.org",
"published": "2024-04-16T16:15:08.357",
"lastModified": "2024-11-21T09:30:32.690",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-01T13:39:19.437",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,54 +51,120 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1883542",
"source": "security@mozilla.org"
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:esr:*:*:*",
"versionEndExcluding": "115.10",
"matchCriteriaId": "A9E787D0-BCFE-45BA-AC41-477D33CEBBE4"
},
{
"url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00012.html",
"source": "security@mozilla.org"
"vulnerable": true,
"criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"versionEndExcluding": "125.0",
"matchCriteriaId": "7334A1C6-C6BF-4C70-ADF1-736BCE0EA227"
},
{
"url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00013.html",
"source": "security@mozilla.org"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2024-18/",
"source": "security@mozilla.org"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2024-19/",
"source": "security@mozilla.org"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2024-20/",
"source": "security@mozilla.org"
},
{
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1883542",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00012.html",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00013.html",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2024-18/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2024-19/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2024-20/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"vulnerable": true,
"criteria": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*",
"versionEndExcluding": "115.10",
"matchCriteriaId": "E0E4DEC0-5D13-48E9-B6A5-2DC8F30785DE"
}
]
}
]
}
],
"references": [
{
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1883542",
"source": "security@mozilla.org",
"tags": [
"Issue Tracking"
]
},
{
"url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00012.html",
"source": "security@mozilla.org",
"tags": [
"Mailing List"
]
},
{
"url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00013.html",
"source": "security@mozilla.org",
"tags": [
"Mailing List"
]
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2024-18/",
"source": "security@mozilla.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2024-19/",
"source": "security@mozilla.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2024-20/",
"source": "security@mozilla.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1883542",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking"
]
},
{
"url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00012.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List"
]
},
{
"url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00013.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List"
]
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2024-18/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2024-19/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2024-20/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-1658",
"sourceIdentifier": "psirt@autodesk.com",
"published": "2025-04-01T13:15:39.753",
"lastModified": "2025-04-01T13:15:39.753",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A maliciously crafted DWFX file, when parsed through Autodesk Navisworks, can force an Out-of-Bounds Read vulnerability. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@autodesk.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "psirt@autodesk.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"references": [
{
"url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0002",
"source": "psirt@autodesk.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-1659",
"sourceIdentifier": "psirt@autodesk.com",
"published": "2025-04-01T13:15:39.913",
"lastModified": "2025-04-01T13:15:39.913",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A maliciously crafted DWFX file, when parsed through Autodesk Navisworks, can force an Out-of-Bounds Read vulnerability. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@autodesk.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "psirt@autodesk.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"references": [
{
"url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0002",
"source": "psirt@autodesk.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-1660",
"sourceIdentifier": "psirt@autodesk.com",
"published": "2025-04-01T13:15:40.053",
"lastModified": "2025-04-01T13:15:40.053",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A maliciously crafted DWFX file, when parsed through Autodesk Navisworks, can force a Memory Corruption vulnerability. A malicious actor can leverage this vulnerability to execute arbitrary code in the context of the current process."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@autodesk.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "psirt@autodesk.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"references": [
{
"url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0002",
"source": "psirt@autodesk.com"
}
]
}

View File

@ -0,0 +1,44 @@
{
"id": "CVE-2025-22231",
"sourceIdentifier": "security@vmware.com",
"published": "2025-04-01T13:15:40.197",
"lastModified": "2025-04-01T13:15:40.197",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "VMware Aria Operations contains a local privilege escalation vulnerability.\u00a0A malicious actor with local administrative privileges can escalate their privileges to root on the appliance running VMware Aria Operations."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@vmware.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"references": [
{
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25541",
"source": "security@vmware.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2025-2237",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-04-01T12:15:15.420",
"lastModified": "2025-04-01T12:15:15.420",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The WP RealEstate plugin for WordPress, used by the Homeo theme, is vulnerable to authentication bypass in all versions up to, and including, 1.6.26. This is due to insufficient role restrictions in the 'process_register' function. This makes it possible for unauthenticated attackers to register an account with the Administrator role."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-269"
}
]
}
],
"references": [
{
"url": "https://themeforest.net/item/homeo-real-estate-wordpress-theme/26372986#item-description__updates-history",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/f6f7bff6-3bc3-4572-97fd-a039d54ac0ff?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2025-23367",
"sourceIdentifier": "secalert@redhat.com",
"published": "2025-01-30T15:15:18.610",
"lastModified": "2025-01-31T21:15:13.613",
"lastModified": "2025-04-01T13:15:40.327",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -52,6 +52,10 @@
}
],
"references": [
{
"url": "https://access.redhat.com/errata/RHSA-2025:3467",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2025-23367",
"source": "secalert@redhat.com"

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2025-2906",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-04-01T12:15:15.580",
"lastModified": "2025-04-01T12:15:15.580",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Contempo Real Estate Core plugin for WordPress is vulnerable to Stored Cross-Site Scripting via shortcodes in versions up to, and including, 3.6.3 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://contempothemes.com/changelog/",
"source": "security@wordfence.com"
},
{
"url": "https://themeforest.net/item/wp-pro-real-estate-7-responsive-real-estate-wordpress-theme/12473778",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/39c651c3-a478-4f58-af51-fd73d2934bdf?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,41 @@
{
"id": "CVE-2025-30177",
"sourceIdentifier": "security@apache.org",
"published": "2025-04-01T12:15:15.747",
"lastModified": "2025-04-01T12:15:15.747",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Bypass/Injection vulnerability in Apache Camel in Camel-Undertow component under particular conditions.\n\nThis issue affects Apache Camel: from 4.10.0 before 4.10.3, from 4.8.0 before 4.8.6.\n\nUsers are recommended to upgrade to version 4.10.3 for 4.10.x LTS and 4.8.6 for 4.8.x LTS.\n\nCamel undertow component is vulnerable to Camel message header injection, in particular the custom header filter strategy used by the component only filter the \"out\" direction, while it doesn't filter the \"in\" direction.\n\n\nThis allows an attacker to include Camel specific headers that for some Camel components can alter the behaviour such as the camel-bean component, or the camel-exec component."
}
],
"metrics": {},
"weaknesses": [
{
"source": "security@apache.org",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-164"
}
]
}
],
"references": [
{
"url": "https://camel.apache.org/security/CVE-2025-27636.html",
"source": "security@apache.org"
},
{
"url": "https://camel.apache.org/security/CVE-2025-29891.html",
"source": "security@apache.org"
},
{
"url": "https://lists.apache.org/thread/dj79zdgw01j337lr9gvyy4sv8xfyw8py",
"source": "security@apache.org"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2025-30427",
"sourceIdentifier": "product-security@apple.com",
"published": "2025-03-31T23:15:25.037",
"lastModified": "2025-04-01T04:15:48.400",
"lastModified": "2025-04-01T13:15:40.463",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -42,7 +42,7 @@
"description": [
{
"lang": "en",
"value": "CWE-400"
"value": "CWE-416"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2025-30470",
"sourceIdentifier": "product-security@apple.com",
"published": "2025-03-31T23:15:28.247",
"lastModified": "2025-04-01T04:15:48.907",
"lastModified": "2025-04-01T13:15:40.650",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -42,7 +42,7 @@
"description": [
{
"lang": "en",
"value": "CWE-200"
"value": "CWE-22"
}
]
}

View File

@ -0,0 +1,41 @@
{
"id": "CVE-2025-3028",
"sourceIdentifier": "security@mozilla.org",
"published": "2025-04-01T13:15:41.190",
"lastModified": "2025-04-01T13:15:41.190",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "JavaScript code running while transforming a document with the XSLTProcessor could lead to a use-after-free. This vulnerability affects Firefox < 137, Firefox ESR < 115.22, Firefox ESR < 128.9, Thunderbird < 137, and Thunderbird ESR < 128.9."
}
],
"metrics": {},
"references": [
{
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1941002",
"source": "security@mozilla.org"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2025-20/",
"source": "security@mozilla.org"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2025-21/",
"source": "security@mozilla.org"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2025-22/",
"source": "security@mozilla.org"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2025-23/",
"source": "security@mozilla.org"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2025-24/",
"source": "security@mozilla.org"
}
]
}

View File

@ -0,0 +1,37 @@
{
"id": "CVE-2025-3029",
"sourceIdentifier": "security@mozilla.org",
"published": "2025-04-01T13:15:41.290",
"lastModified": "2025-04-01T13:15:41.290",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A crafted URL containing specific Unicode characters could have hidden the true origin of the page, resulting in a potential spoofing attack. This vulnerability affects Firefox < 137, Firefox ESR < 128.9, Thunderbird < 137, and Thunderbird ESR < 128.9."
}
],
"metrics": {},
"references": [
{
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1952213",
"source": "security@mozilla.org"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2025-20/",
"source": "security@mozilla.org"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2025-22/",
"source": "security@mozilla.org"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2025-23/",
"source": "security@mozilla.org"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2025-24/",
"source": "security@mozilla.org"
}
]
}

View File

@ -0,0 +1,37 @@
{
"id": "CVE-2025-3030",
"sourceIdentifier": "security@mozilla.org",
"published": "2025-04-01T13:15:41.390",
"lastModified": "2025-04-01T13:15:41.390",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Memory safety bugs present in Firefox 136, Thunderbird 136, Firefox ESR 128.8, and Thunderbird 128.8. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 137, Firefox ESR < 128.9, Thunderbird < 137, and Thunderbird ESR < 128.9."
}
],
"metrics": {},
"references": [
{
"url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1850615%2C1932468%2C1942551%2C1951017%2C1951494",
"source": "security@mozilla.org"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2025-20/",
"source": "security@mozilla.org"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2025-22/",
"source": "security@mozilla.org"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2025-23/",
"source": "security@mozilla.org"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2025-24/",
"source": "security@mozilla.org"
}
]
}

View File

@ -0,0 +1,29 @@
{
"id": "CVE-2025-3031",
"sourceIdentifier": "security@mozilla.org",
"published": "2025-04-01T13:15:41.493",
"lastModified": "2025-04-01T13:15:41.493",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An attacker could read 32 bits of values spilled onto the stack in a JIT compiled function. This vulnerability affects Firefox < 137 and Thunderbird < 137."
}
],
"metrics": {},
"references": [
{
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1947141",
"source": "security@mozilla.org"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2025-20/",
"source": "security@mozilla.org"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2025-23/",
"source": "security@mozilla.org"
}
]
}

View File

@ -0,0 +1,29 @@
{
"id": "CVE-2025-3032",
"sourceIdentifier": "security@mozilla.org",
"published": "2025-04-01T13:15:41.587",
"lastModified": "2025-04-01T13:15:41.587",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Leaking of file descriptors from the fork server to web content processes could allow for privilege escalation attacks. This vulnerability affects Firefox < 137 and Thunderbird < 137."
}
],
"metrics": {},
"references": [
{
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1949987",
"source": "security@mozilla.org"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2025-20/",
"source": "security@mozilla.org"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2025-23/",
"source": "security@mozilla.org"
}
]
}

View File

@ -0,0 +1,29 @@
{
"id": "CVE-2025-3033",
"sourceIdentifier": "security@mozilla.org",
"published": "2025-04-01T13:15:41.697",
"lastModified": "2025-04-01T13:15:41.697",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "After selecting a malicious Windows `.url` shortcut from the local filesystem, an unexpected file could be uploaded. \n*This bug only affects Firefox on Windows. Other operating systems are unaffected.* This vulnerability affects Firefox < 137 and Thunderbird < 137."
}
],
"metrics": {},
"references": [
{
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1950056",
"source": "security@mozilla.org"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2025-20/",
"source": "security@mozilla.org"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2025-23/",
"source": "security@mozilla.org"
}
]
}

View File

@ -0,0 +1,29 @@
{
"id": "CVE-2025-3034",
"sourceIdentifier": "security@mozilla.org",
"published": "2025-04-01T13:15:41.790",
"lastModified": "2025-04-01T13:15:41.790",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Memory safety bugs present in Firefox 136 and Thunderbird 136. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 137 and Thunderbird < 137."
}
],
"metrics": {},
"references": [
{
"url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1894100%2C1934086%2C1950360",
"source": "security@mozilla.org"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2025-20/",
"source": "security@mozilla.org"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2025-23/",
"source": "security@mozilla.org"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2025-3035",
"sourceIdentifier": "security@mozilla.org",
"published": "2025-04-01T13:15:41.893",
"lastModified": "2025-04-01T13:15:41.893",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "By first using the AI chatbot in one tab and later activating it in another tab, the document title of the previous tab would leak into the chat prompt. This vulnerability affects Firefox < 137."
}
],
"metrics": {},
"references": [
{
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1952268",
"source": "security@mozilla.org"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2025-20/",
"source": "security@mozilla.org"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-3083",
"sourceIdentifier": "cna@mongodb.com",
"published": "2025-04-01T12:15:15.883",
"lastModified": "2025-04-01T12:15:15.883",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Specifically crafted MongoDB wire protocol messages can cause mongos to crash during command validation. This can occur without using an authenticated connection. This issue affects MongoDB v5.0 versions prior to 5.0.31, \u00a0MongoDB v6.0 versions prior to\u00a06.0.20 and MongoDB v7.0 versions prior to 7.0.16"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@mongodb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "cna@mongodb.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-248"
}
]
}
],
"references": [
{
"url": "https://jira.mongodb.org/browse/SERVER-103152",
"source": "cna@mongodb.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-3084",
"sourceIdentifier": "cna@mongodb.com",
"published": "2025-04-01T12:15:16.037",
"lastModified": "2025-04-01T12:15:16.037",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "When run on commands with certain arguments set, explain may fail to validate these arguments before using them. This can lead to crashes in router servers. This affects MongoDB Server v5.0 prior to 5.0.31, MongoDB Server v6.0 prior to 6.0.20, MongoDB Server v7.0 prior to 7.0.16 and MongoDB Server v8.0 prior to 8.0.4"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@mongodb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "cna@mongodb.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-703"
}
]
}
],
"references": [
{
"url": "https://jira.mongodb.org/browse/SERVER-103153",
"source": "cna@mongodb.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-3085",
"sourceIdentifier": "cna@mongodb.com",
"published": "2025-04-01T12:15:16.187",
"lastModified": "2025-04-01T12:15:16.187",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A MongoDB server under specific conditions running on Linux with TLS and CRL revocation status checking enabled, fails to check the revocation status of the intermediate certificates in the peer's certificate chain. In cases of MONGODB-X509, which is not enabled by default, this may lead to improper authentication. This issue may also affect intra-cluster authentication. This issue affects MongoDB Server v5.0 versions prior to 5.0.31, MongoDB Server v6.0 versions prior to 6.0.20, MongoDB Server v7.0 versions prior to 7.0.16 and MongoDB Server v8.0 versions prior to 8.0.4.\nRequired Configuration :\u00a0MongoDB Server must be running on Linux Operating Systems and CRL revocation status checking must be enabled"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@mongodb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.2,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "cna@mongodb.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-299"
}
]
}
],
"references": [
{
"url": "https://jira.mongodb.org/browse/SERVER-95445",
"source": "cna@mongodb.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-31408",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-04-01T13:15:41.037",
"lastModified": "2025-04-01T13:15:41.037",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Missing Authorization vulnerability in Zoho Flow allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Zoho Flow: from n/a through 2.13.3."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/zoho-flow/vulnerability/wordpress-zoho-flow-plugin-2-13-3-broken-access-control-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2025-04-01T12:00:20.331088+00:00
2025-04-01T14:00:20.034407+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2025-04-01T11:15:39.517000+00:00
2025-04-01T13:59:28.320000+00:00
```
### Last Data Feed Release
@ -33,21 +33,64 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
287807
287827
```
### CVEs added in the last Commit
Recently added CVEs: `1`
Recently added CVEs: `20`
- [CVE-2025-3082](CVE-2025/CVE-2025-30xx/CVE-2025-3082.json) (`2025-04-01T11:15:39.517`)
- [CVE-2024-13553](CVE-2024/CVE-2024-135xx/CVE-2024-13553.json) (`2025-04-01T12:15:14.643`)
- [CVE-2025-1658](CVE-2025/CVE-2025-16xx/CVE-2025-1658.json) (`2025-04-01T13:15:39.753`)
- [CVE-2025-1659](CVE-2025/CVE-2025-16xx/CVE-2025-1659.json) (`2025-04-01T13:15:39.913`)
- [CVE-2025-1660](CVE-2025/CVE-2025-16xx/CVE-2025-1660.json) (`2025-04-01T13:15:40.053`)
- [CVE-2025-22231](CVE-2025/CVE-2025-222xx/CVE-2025-22231.json) (`2025-04-01T13:15:40.197`)
- [CVE-2025-2237](CVE-2025/CVE-2025-22xx/CVE-2025-2237.json) (`2025-04-01T12:15:15.420`)
- [CVE-2025-2906](CVE-2025/CVE-2025-29xx/CVE-2025-2906.json) (`2025-04-01T12:15:15.580`)
- [CVE-2025-30177](CVE-2025/CVE-2025-301xx/CVE-2025-30177.json) (`2025-04-01T12:15:15.747`)
- [CVE-2025-3028](CVE-2025/CVE-2025-30xx/CVE-2025-3028.json) (`2025-04-01T13:15:41.190`)
- [CVE-2025-3029](CVE-2025/CVE-2025-30xx/CVE-2025-3029.json) (`2025-04-01T13:15:41.290`)
- [CVE-2025-3030](CVE-2025/CVE-2025-30xx/CVE-2025-3030.json) (`2025-04-01T13:15:41.390`)
- [CVE-2025-3031](CVE-2025/CVE-2025-30xx/CVE-2025-3031.json) (`2025-04-01T13:15:41.493`)
- [CVE-2025-3032](CVE-2025/CVE-2025-30xx/CVE-2025-3032.json) (`2025-04-01T13:15:41.587`)
- [CVE-2025-3033](CVE-2025/CVE-2025-30xx/CVE-2025-3033.json) (`2025-04-01T13:15:41.697`)
- [CVE-2025-3034](CVE-2025/CVE-2025-30xx/CVE-2025-3034.json) (`2025-04-01T13:15:41.790`)
- [CVE-2025-3035](CVE-2025/CVE-2025-30xx/CVE-2025-3035.json) (`2025-04-01T13:15:41.893`)
- [CVE-2025-3083](CVE-2025/CVE-2025-30xx/CVE-2025-3083.json) (`2025-04-01T12:15:15.883`)
- [CVE-2025-3084](CVE-2025/CVE-2025-30xx/CVE-2025-3084.json) (`2025-04-01T12:15:16.037`)
- [CVE-2025-3085](CVE-2025/CVE-2025-30xx/CVE-2025-3085.json) (`2025-04-01T12:15:16.187`)
- [CVE-2025-31408](CVE-2025/CVE-2025-314xx/CVE-2025-31408.json) (`2025-04-01T13:15:41.037`)
### CVEs modified in the last Commit
Recently modified CVEs: `1`
Recently modified CVEs: `37`
- [CVE-2024-56325](CVE-2024/CVE-2024-563xx/CVE-2024-56325.json) (`2025-04-01T10:15:15.360`)
- [CVE-2024-28665](CVE-2024/CVE-2024-286xx/CVE-2024-28665.json) (`2025-04-01T13:42:52.583`)
- [CVE-2024-28666](CVE-2024/CVE-2024-286xx/CVE-2024-28666.json) (`2025-04-01T13:42:49.097`)
- [CVE-2024-28667](CVE-2024/CVE-2024-286xx/CVE-2024-28667.json) (`2025-04-01T13:42:45.900`)
- [CVE-2024-28668](CVE-2024/CVE-2024-286xx/CVE-2024-28668.json) (`2025-04-01T13:42:42.853`)
- [CVE-2024-28669](CVE-2024/CVE-2024-286xx/CVE-2024-28669.json) (`2025-04-01T13:42:31.980`)
- [CVE-2024-28670](CVE-2024/CVE-2024-286xx/CVE-2024-28670.json) (`2025-04-01T13:42:28.547`)
- [CVE-2024-28671](CVE-2024/CVE-2024-286xx/CVE-2024-28671.json) (`2025-04-01T13:42:24.713`)
- [CVE-2024-28672](CVE-2024/CVE-2024-286xx/CVE-2024-28672.json) (`2025-04-01T13:42:21.180`)
- [CVE-2024-28673](CVE-2024/CVE-2024-286xx/CVE-2024-28673.json) (`2025-04-01T13:42:15.560`)
- [CVE-2024-28675](CVE-2024/CVE-2024-286xx/CVE-2024-28675.json) (`2025-04-01T13:42:38.400`)
- [CVE-2024-28676](CVE-2024/CVE-2024-286xx/CVE-2024-28676.json) (`2025-04-01T13:42:11.823`)
- [CVE-2024-28677](CVE-2024/CVE-2024-286xx/CVE-2024-28677.json) (`2025-04-01T13:42:08.577`)
- [CVE-2024-28678](CVE-2024/CVE-2024-286xx/CVE-2024-28678.json) (`2025-04-01T13:44:20.637`)
- [CVE-2024-28679](CVE-2024/CVE-2024-286xx/CVE-2024-28679.json) (`2025-04-01T13:44:16.210`)
- [CVE-2024-28680](CVE-2024/CVE-2024-286xx/CVE-2024-28680.json) (`2025-04-01T13:44:12.623`)
- [CVE-2024-28681](CVE-2024/CVE-2024-286xx/CVE-2024-28681.json) (`2025-04-01T13:44:09.607`)
- [CVE-2024-28682](CVE-2024/CVE-2024-286xx/CVE-2024-28682.json) (`2025-04-01T13:44:06.493`)
- [CVE-2024-28683](CVE-2024/CVE-2024-286xx/CVE-2024-28683.json) (`2025-04-01T13:44:01.837`)
- [CVE-2024-28684](CVE-2024/CVE-2024-286xx/CVE-2024-28684.json) (`2025-04-01T13:42:35.420`)
- [CVE-2024-3302](CVE-2024/CVE-2024-33xx/CVE-2024-3302.json) (`2025-04-01T13:39:33.140`)
- [CVE-2024-3505](CVE-2024/CVE-2024-35xx/CVE-2024-3505.json) (`2025-04-01T13:59:28.320`)
- [CVE-2024-3852](CVE-2024/CVE-2024-38xx/CVE-2024-3852.json) (`2025-04-01T13:39:19.437`)
- [CVE-2025-23367](CVE-2025/CVE-2025-233xx/CVE-2025-23367.json) (`2025-04-01T13:15:40.327`)
- [CVE-2025-30427](CVE-2025/CVE-2025-304xx/CVE-2025-30427.json) (`2025-04-01T13:15:40.463`)
- [CVE-2025-30470](CVE-2025/CVE-2025-304xx/CVE-2025-30470.json) (`2025-04-01T13:15:40.650`)
## Download and Usage

View File

@ -64292,7 +64292,7 @@ CVE-2013-7281,0,0,8414f8e6a52ac16fc1a3ad2b6fb96130564ecd206bc82bb48fb25b29b8e911
CVE-2013-7282,0,0,d56e230ab562a569a2f0498d1c0718526c0b604e6c6d1e05dd34a00c4b767019,2024-11-21T02:00:38.903000
CVE-2013-7283,0,0,1d59fc50e9fe3d5bc966cdd30114268b80949a468737ae3b4980998fa3984275,2024-11-21T02:00:39.047000
CVE-2013-7284,0,0,2825d7c406db013808ec90b02c946f85496c12af0196e8bcd1ef28dacd3a6289,2024-11-21T02:00:39.197000
CVE-2013-7285,0,0,8afcf92966a68ba021dc1cd4609170df59dc5e9eacd242aecff3c30e106e8765,2024-11-21T02:00:39.317000
CVE-2013-7285,0,1,8ef097ed01d62ecb0587d4fa746c0ecd0afd3066423743e69957b16209fb1e02,2025-04-01T13:07:22.907000
CVE-2013-7286,0,0,34fc856351f776eb47e5ef4c3bb4e0f7f1847a0a1acd4fc85bd479ef5a26760e,2024-11-21T02:00:39.553000
CVE-2013-7287,0,0,dfd8414dcef17b9efbc491e583acaf43abc4eaadf32c45e408ad49364d9073ed,2024-11-21T02:00:39.693000
CVE-2013-7288,0,0,595bb20fc7448d787f3b466e856f135740bc88dc169f2d5cb7f1155af8eedd18,2024-11-21T02:00:39.860000
@ -128540,7 +128540,7 @@ CVE-2019-1017,0,0,76f87e83dc83dafe61e162ce6c2a97169557972584d1d13601651b6b5ebb17
CVE-2019-10170,0,0,ddf2a74c533bdedd723fedb9f282caad8030c6929dbbf5f2d1dc7303d4154da0,2024-11-21T04:18:34.220000
CVE-2019-10171,0,0,5000a3b223bdd5cd70c7ddc50d756130a892941c7ae78c0b5776c757bec80e48,2024-11-21T04:18:34.347000
CVE-2019-10172,0,0,c1a9f7f83c615a05be933cee6c3fee2cd3ee2a7ac76168e20a99a0d2bed74721,2024-11-21T04:18:34.477000
CVE-2019-10173,0,0,d34feb949150a4571b43ef5b054630f49f875a2e2c0d0036b982585f10fa1ad6,2024-11-21T04:18:34.723000
CVE-2019-10173,0,1,908dc41ab5d0f8587c63c544f7b3da74b78b2ce6f7f2b98e490f0115a75e0082,2025-04-01T13:07:22.907000
CVE-2019-10174,0,0,c7efb509df372b5759ef76da901f09a98b2ec22d90c2bc31b26f8775ec7d35ce,2024-11-21T04:18:34.940000
CVE-2019-10175,0,0,14a85a9f5f29e7d8bc938412453e7182fd73e4bd3f61380a8013d96ebd98ba1c,2024-11-21T04:18:35.090000
CVE-2019-10176,0,0,991fec9163e2e9793503c207ef6bf3d7341bce43f51705bcf7acf8d3b7365a62,2024-11-21T04:18:35.207000
@ -240762,7 +240762,7 @@ CVE-2023-52043,0,0,90e54dc8f5faefeb0db40410720bff86ff8cbfce9cd09d50903f4f37ff56e
CVE-2023-52044,0,0,27f01b802a56820e7cdc263c3cdc3f3f5710cce365b33699f214a04aa98efeab,2024-11-01T16:35:05.760000
CVE-2023-52045,0,0,e001878c4739bcc44b6d7cd402aee402c8b408536d7fff79df0d108c46bb8121,2024-11-01T18:35:02.070000
CVE-2023-52046,0,0,194849462bf429fc749f298b05a36377ff7074363e301b433cd9950d69c4c501,2024-11-21T08:39:04.817000
CVE-2023-52047,0,0,ec74edf8f9f1203b85e2e02252b36297bb7ed9a6eaefff9c228d60c298b0cc63,2024-11-21T08:39:04.963000
CVE-2023-52047,0,1,d56b5255bbf43ce833425482d3a7c4458ee12e08ce88fc91b5b4e4a71c62ee74,2025-04-01T13:30:28.050000
CVE-2023-52048,0,0,ef196fbe22a158873fe068671233b84bc4c47c84ad85cca18f115c471c37eb26,2024-11-26T16:15:08.977000
CVE-2023-5205,0,0,ad9e6403ed51d32e238949552f23850cd3c894ce7b700f7f43181c17b96bcabf,2024-11-21T08:41:17.900000
CVE-2023-52059,0,0,631fc170b23676a9d5a914e1efcd033aa6ac461afd7c0cbe7ba670738271ca23,2024-11-21T08:39:05.367000
@ -247989,6 +247989,7 @@ CVE-2024-1355,0,0,b2f1b87d4539641a8b428dd70f8c417d220c7c7d389eb6cfd2926afaae656b
CVE-2024-13550,0,0,a4fead6d03b6144abe5ac40b03d52a1da2858d08b4f2df68e9fe9b57926c0bff,2025-02-04T19:25:13.807000
CVE-2024-13551,0,0,f33e7c8a852a6d083a09098b1d843f7d8ea7b10d57054b5491904a28cbe42e06,2025-02-05T16:28:42.900000
CVE-2024-13552,0,0,727d2501f561c703e4b830bea73318d02ecb82132ce891ff47b177cb8690df66,2025-03-07T10:15:14.493000
CVE-2024-13553,1,1,89f04b8687ba3dd70134ecf1125b6b57d41efc81297b94aa54e650e504c6dca0,2025-04-01T12:15:14.643000
CVE-2024-13554,0,0,7c6792ed304320bad6afd2ef20fd307ba91eff7957375903da0bd819567a9045,2025-02-25T03:52:20.300000
CVE-2024-13555,0,0,49b73d745edef53131648713ff0454df654c61bc1fe448679f0e83788ee99801,2025-02-24T14:54:29.683000
CVE-2024-13556,0,0,227f79da3d8af7739955eed8b3ebf27bbbf505836c230601eee8e2a82464e9ab,2025-02-21T15:41:41.720000
@ -248228,7 +248229,7 @@ CVE-2024-13804,0,0,546456cd578710618758b971a00a524b9b7f35326179380b6ee7971c53734
CVE-2024-13805,0,0,ab23ddffd79c9236654dca87d416c22cef2f181f71a6522374ad6bbab1e39bf2,2025-03-07T10:15:16.123000
CVE-2024-13806,0,0,2b103acb686ba11654b3e2c5ab41948ab81fbeb9ed340b778f561b48dfe3cc2f,2025-03-01T08:15:33.653000
CVE-2024-13809,0,0,0560f3b13a50d69c775a261a59e91c9ab0b720365e711ebd048429107113c32d,2025-03-05T10:15:17.313000
CVE-2024-1381,0,0,f79abe04d98fb58eb4a1bc15edce6ddf9cf798d335c45513b35103feeb919d6b,2024-11-21T08:50:27.453000
CVE-2024-1381,0,1,029377302d4050442312d0ea5700149ec4187470e4ad3d8cfad55037f8e5ed9f,2025-04-01T13:39:45.360000
CVE-2024-13810,0,0,fdf2d49dfa34debf8ee34b4921f174214e4829a57323b43cd52f342f23da5598,2025-03-05T10:15:17.503000
CVE-2024-13811,0,0,57806b80d84984ab0707eab6f87b5409b8e69c8b4253d9d4911055373b8edd93,2025-03-05T10:15:17.877000
CVE-2024-13813,0,0,fdc4ad5ea8556267af57de167767e42189cf8d83fe0a9d1183500203243c2b38,2025-02-20T15:56:04.087000
@ -248379,7 +248380,7 @@ CVE-2024-1433,0,0,87f22d20b32269d8237d95a25fad63601c11890ef469b28ff99ec357c5b212
CVE-2024-1434,0,0,994306318c9619745c98e64e5ddfaccba02b019ac9eb788f705f9a9a37523dc6,2025-03-25T17:10:49.277000
CVE-2024-1435,0,0,05097425ab6a682df0dc5e92a5543b615afc6198979b7e6e75ea44b19ea50815,2025-02-27T02:57:30
CVE-2024-1436,0,0,d4783e68c2b586c1835f2526883611a05c5ff1439060402eeecc1dda96caa007,2025-02-27T03:15:54.380000
CVE-2024-1437,0,0,48f9317293466e50e9270a7a4c2ee4c7fe04a4aa3c804e8a49c32b35bb2e257b,2024-11-21T08:50:35.123000
CVE-2024-1437,0,1,7a0c00c0a0d1d939ac1126e623fc7cd789a21419d9c99a096b6ac554e5041e24,2025-04-01T13:43:41.967000
CVE-2024-1438,0,0,fb430c357e1d68126b60f1d8048d93feaf0a298b7940bd08e7f1ba2d2923a492,2024-11-21T08:50:35.250000
CVE-2024-1439,0,0,f018ca5c79044eb8d371c019838f427bc56a525451022c350168bc4b20b8a53d,2024-11-21T08:50:35.387000
CVE-2024-1441,0,0,8524643e4a58354b4c6d975cbc4efa93d311c9d367be16dec8b7308fac65f976,2024-11-21T08:50:35.540000
@ -253909,9 +253910,9 @@ CVE-2024-26329,0,0,220d0b86ce94a766397733f6ce3a3cf797489720133134e3ff765be44ac0f
CVE-2024-2633,0,0,34e287e3b165005dc093379b5285b328642852573ae2cefe2ab0987f5b28ba29,2024-11-21T09:10:10.873000
CVE-2024-26330,0,0,c46c610b23495d4faa106b5b245b71ada340c670fa8084ba1f5df40f3c1ef570,2024-11-21T09:02:22.580000
CVE-2024-26331,0,0,01fc177211530416d3cc8b96511a3301b539df9ba84fd5c3ba0f077e004ddd49,2024-11-21T09:02:22.793000
CVE-2024-26333,0,0,d3f374ff46f8253215537b40e92de00d5d8c68453f98c4f4db02905ac0a8ac1a,2024-11-21T09:02:23.010000
CVE-2024-26334,0,0,70c5ca6e0bb4802e3c384c8026eab9602827df826155f97520e12bf8f5a32f8a,2024-11-21T09:02:23.217000
CVE-2024-26335,0,0,d828962b3ef53400326348f6f8af16a43b0c16e3c8d1bd05a26ecfa3ca20e249,2024-11-21T09:02:23.423000
CVE-2024-26333,0,1,25972d57d455b8ec425507b1cecb503ae52cd423eef7eb95c246938c67828113,2025-04-01T13:38:57.733000
CVE-2024-26334,0,1,553ce5febbbf3ba40742d4632d06f2581a5f2bad594295b098e9d03971e6a933,2025-04-01T13:38:46.493000
CVE-2024-26335,0,1,d935f588a5f25fc8eb3a1cad35a0e183dcfe3bb620dcbf94cb5db283d0be674f,2025-04-01T13:38:30.083000
CVE-2024-26337,0,0,67808c7f961a991c278f2b13996d5a00c80294ee39051abcc80934bd3c1a7d27,2024-11-26T16:15:14.620000
CVE-2024-26339,0,0,7ce8d4e4aeff23307a6b8f87da0e44a312fed8e5097587567c8366eba75a6f06,2024-11-21T09:02:23.777000
CVE-2024-2634,0,0,f23d5a69439faf8e582a9c275f183d86336ce7e598134e5aefd6ea8385c5e2eb,2024-11-21T09:10:10.983000
@ -255609,11 +255610,11 @@ CVE-2024-28421,0,0,ce829c3928a8bd5eedeabe1cac8e130c580ae7339accf262ba0cdf8590d1c
CVE-2024-28423,0,0,03e791c7d95281686418dfb48fab328a816c52873637287d2158a6b0e815b0f3,2024-11-21T09:06:19.313000
CVE-2024-28424,0,0,1bee11d59730c0beb0f5a2d758b688d13d007502eab82ecda0090926fa370f32,2024-11-21T09:06:19.643000
CVE-2024-28425,0,0,2e7ca7955f3200f3627ecb06dac5ba7d3ac676325016bb19aa1d31821f6906c5,2024-11-21T09:06:19.970000
CVE-2024-28429,0,0,df938c67eea87a243c47b7aa8bda03e1c5cdf75daeaf005bd7f39ab979eb36ac,2024-11-21T09:06:20.280000
CVE-2024-28429,0,1,f1bc99480895abf6bc4caf32af1c796e27f5ca64f4ad6892c9855b9941f3f4d7,2025-04-01T13:41:22.510000
CVE-2024-2843,0,0,82c82ac855f305bfe3ef4cdbfcc5cf82cda6bf4be251e6d0ffd253c65b2fa266,2024-08-07T20:35:16.833000
CVE-2024-28430,0,0,44c40fdd48fb7b6dd45a86d4bd66897ee485f34d63291579d28696eb8df91960,2025-03-13T15:15:43.060000
CVE-2024-28431,0,0,ea25091f9bd313ab6e8e9b8dc9d03c01c6b5a0512c4793d86a1cb59cd325f1b7,2024-11-21T09:06:20.890000
CVE-2024-28432,0,0,da1f82e1e8772a9b8ac00f8c5126d8e5127ee09510def4e88254ccf20640bc7c,2024-11-21T09:06:21.177000
CVE-2024-28430,0,1,1620f12ce414c61c726aaeb1192a9f7c84a01ebe763061fb1f08a4c8c77ec171,2025-04-01T13:43:05.863000
CVE-2024-28431,0,1,1e452394c32e3861316c1a522650c54a56659dda35d21fa15a9655c99ceb4306,2025-04-01T13:43:02.943000
CVE-2024-28432,0,1,fafb694e081f9e7340d4601ab9bcb8c40aa028427c000e64c789eed741152145,2025-04-01T13:42:56.350000
CVE-2024-28434,0,0,b4ec98e1977770c102909c7a0d588aabc57ecbb170e993639452a9a8542bb11e,2024-11-21T09:06:21.480000
CVE-2024-28435,0,0,c1eb3631efd3094abec5049eb4a799f488ec927a573dc60d97c11961b18410a7,2024-11-21T09:06:21.787000
CVE-2024-28436,0,0,fa5bd980c28c3f8f08d759f37ba571df3d374a0601a509206b0b069f844ed82f,2024-11-21T09:06:22.120000
@ -255696,27 +255697,27 @@ CVE-2024-28640,0,0,990c29eb8c733a819b0a31dbb2e2b0510b47e9a808edbc4e02611ff94875e
CVE-2024-2865,0,0,5829b9f895a4ba79b3592f650e6f3b7b48b361c5424fd86986d5cdb1471edc67,2024-11-21T09:10:42.747000
CVE-2024-2866,0,0,0b9e7e6b190edc1fb6f92975c3f997f504dfccfc4fc2eb0b51cfe7935d053241,2024-04-11T16:15:24.870000
CVE-2024-28662,0,0,f68c2c27b397b62f70a53b7a140601f1da5f18f70a32ca321d8038d451cb9ee3,2024-11-21T09:06:42.960000
CVE-2024-28665,0,0,791ff851a4e808d2a209ff036731e994aec36f5c70b4e2cb4da728f4d63e976f,2024-11-21T09:06:43.187000
CVE-2024-28666,0,0,624b6b2b388bce85a975ce3a777bfae7ed3108996cd956dca2a209f1f4b660e9,2024-11-21T09:06:43.393000
CVE-2024-28667,0,0,7954c82a1b134d6d11512799a170b0f0e3d568e6c2821e6dbe8090b84dd30387,2024-11-21T09:06:43.600000
CVE-2024-28668,0,0,9f9b00695d18c8b71f1ef89dfe9a4c206ef5b2a8460ef8d2184b221d7d0cd3f2,2025-03-13T17:15:30.470000
CVE-2024-28669,0,0,fee252bc5a362683de5d6620bf53622d90aae197f4d777ecf6aa8875c3ca93be,2024-11-21T09:06:44.043000
CVE-2024-28665,0,1,8027731b0abd0b67fc6063fe816cbc46f793c4c89baddb9a1cc4c90847cb0d74,2025-04-01T13:42:52.583000
CVE-2024-28666,0,1,cbc12cd408e2944036d7bf89664cc7cff8cc4298a37589040909c9208b722b69,2025-04-01T13:42:49.097000
CVE-2024-28667,0,1,81ad48e51647484bfecd440392a39fd3cf20c719a1a168e540d1028d22d24fa8,2025-04-01T13:42:45.900000
CVE-2024-28668,0,1,26170fc5fd7788b16fc0d8588a3dcc46fbbdb6030649301d333b99d0ff987f19,2025-04-01T13:42:42.853000
CVE-2024-28669,0,1,462fce18d67a7c1584abbea493601cec20188f2fc1aabe4a05e2d4de257411bb,2025-04-01T13:42:31.980000
CVE-2024-2867,0,0,695fb3cef52f8c43c4514aa63d89e2f41f7dd2846ca1454a5970d54e2aad2119,2025-02-03T21:31:46.770000
CVE-2024-28670,0,0,ab1611ec1ccd2f7d119446b2099a2f6fb91c67e9ea96502c09668ca7e90eeafe,2024-11-21T09:06:44.270000
CVE-2024-28671,0,0,e25733fa67de3d649f7259e16738d845a6db94b940dd14d343831edd5a38fae4,2024-11-21T09:06:44.500000
CVE-2024-28672,0,0,182cb4e0c7a8ffda160916a5cb3c7781dca562943a914d3c5dacdeb9e9903ade,2024-11-21T09:06:44.720000
CVE-2024-28673,0,0,a7e45ec3235bf0c068f36b47677aa67d0d39c35a2ec367e18e9c4b3f143bd5a4,2024-11-21T09:06:44.943000
CVE-2024-28675,0,0,e1855456c60dab77d20f2e2601564532dfe57961063f3f05f418dfe8203f2626,2024-11-21T09:06:45.160000
CVE-2024-28676,0,0,f0e87c474f5cd94c9c0a360ae3e4b29f0c55c5b9cf00b4c9204038ea97ae4866,2024-11-21T09:06:45.377000
CVE-2024-28677,0,0,8135ecd2860e9918720503a973e6b70ae86292a85588521142ee4270ffbdc123,2024-11-21T09:06:45.597000
CVE-2024-28678,0,0,b297beb058ef2954362c94584a9c654b760016ed6fb653bfe093f1f20dd79e10,2024-11-21T09:06:45.817000
CVE-2024-28679,0,0,6f8b96e72bc5d8aed16297df3fc8d835288ed1497cc3fbe7b3bf726aa4d75453,2024-11-21T09:06:46.053000
CVE-2024-28670,0,1,72b1bab7f28eba16da4a16ac821861c54ebb1b7a86b17393630d1c1744965edf,2025-04-01T13:42:28.547000
CVE-2024-28671,0,1,45decdf7b653b158759b51f8365fd225391a212b349b94549db6f17a9d2f4838,2025-04-01T13:42:24.713000
CVE-2024-28672,0,1,5083100588c37885c7c7d244798c805f1bd6bdde81654de65f601f3f292de6ee,2025-04-01T13:42:21.180000
CVE-2024-28673,0,1,4ecf7c3d7c362b4a43c79dd52a43fd8c1c97edad73999a9bf73212166dadc031,2025-04-01T13:42:15.560000
CVE-2024-28675,0,1,f4446dba18ac8b592350a7851a20f97b4d8824b957878f84d2d5c74500222f38,2025-04-01T13:42:38.400000
CVE-2024-28676,0,1,3da4faae53e5f9aef257459fade567911fb502934a1e18ae6ce0826ee838c495,2025-04-01T13:42:11.823000
CVE-2024-28677,0,1,d3c086cb28ba5df464150d9467af4c9aab0454b73043ea46fb3e9dd84cd936b9,2025-04-01T13:42:08.577000
CVE-2024-28678,0,1,49e4390f02ce5022fe12716a64c4082a5d6e03062a61485e1b5b6d9cb6bd23c6,2025-04-01T13:44:20.637000
CVE-2024-28679,0,1,2f5c3ff5e85fc4c18e8587c1ff9cf8efdbef80c2d9e8001b213b67a2bbbae37d,2025-04-01T13:44:16.210000
CVE-2024-2868,0,0,d502b3cd735e7e71df62431b994767df23282d99f025ad51317114201a7dd744,2025-03-24T17:15:11.790000
CVE-2024-28680,0,0,bb616bee4faaaca8abafc5c68ee983a737f77186f2373e9fa937b02412501f37,2024-11-21T09:06:46.260000
CVE-2024-28681,0,0,d052c8b2f46496beb9ba179784cc8722289cb35e4cd4f371958f4d19cfd3d908,2024-11-21T09:06:46.473000
CVE-2024-28682,0,0,eba1627157a7a3a72608d0b3ee7a5e137d680076206e467179ea2ca655b76ff0,2024-11-21T09:06:46.683000
CVE-2024-28683,0,0,bd3ebc7cd2defbc47dfd620685d89e3857bca20832536a1f8d0b97a90c6d8dd7,2024-11-21T09:06:46.930000
CVE-2024-28684,0,0,0b39b67814403ed28a9b69c6df298687c3e3168028840d71e5d4fe0885cd1b11,2024-11-21T09:06:47.160000
CVE-2024-28680,0,1,8f0ce523ff7fbbfc523318339e29b0eb3269a347ebc15d32455af8a06c0fb3e8,2025-04-01T13:44:12.623000
CVE-2024-28681,0,1,763056724a78897617cd823f80d7cadf11cddb3e697b3a32061fa05010e0d0f9,2025-04-01T13:44:09.607000
CVE-2024-28682,0,1,fbd89570710747e223e1c252cfd649eba3de0e3d2409798f4878672ebb908b84,2025-04-01T13:44:06.493000
CVE-2024-28683,0,1,36afdff582fc6dd6f46160c7c0632e5ca3dfd5371a3cd5fd2d5ac02760d2def3,2025-04-01T13:44:01.837000
CVE-2024-28684,0,1,a93787560cdebeff55892aa855df59e2544178c1a016db88bf713fbef9421899,2025-04-01T13:42:35.420000
CVE-2024-28698,0,0,7bff9eb853be399d28016dddd4d7e7e54435955f08e0f77f0342480a34ee490c,2024-11-21T09:06:47.377000
CVE-2024-28699,0,0,3ff33c05d94c8b0350bde38df7088a1cf466d3f4147165d5d130599d3542fed6,2024-11-21T09:06:47.597000
CVE-2024-2870,0,0,957a2e28128daad4167a4d5c33a553c0681763d782c86767172e6d01c011f13d,2024-11-21T09:10:43.113000
@ -259093,7 +259094,7 @@ CVE-2024-33015,0,0,4d28a33fe94fa845981d525573fc7210cfbe7ac5572720df2dd2e769c2c70
CVE-2024-33016,0,0,b7a691d3f8a5769370cabebaa1c6baf77303bb19298c145d4a87a2d0e8cf5b35,2024-09-03T12:59:02.453000
CVE-2024-33018,0,0,675563cbcaa2ef92e6e204ac05e73112bfff759fc8ebf3d9fef6548ae8c58cd8,2024-11-20T19:40:37.843000
CVE-2024-33019,0,0,65b55195b6d36305a457ef79b35dd005b5584918c532a4eb6d0a59f0c7b2c587,2024-11-20T19:21:14.377000
CVE-2024-3302,0,0,e5ce1030a00c312419a4c7be643155cff256b56cfc3b72469b84b30ef8fafc5a,2025-03-29T00:15:22.850000
CVE-2024-3302,0,1,a9c0bfefabd7cdf9ff7de4a85277bce4c59f99071b0902d3e7ee22e187969944,2025-04-01T13:39:33.140000
CVE-2024-33020,0,0,78b282015d00523f763bba8047dc79e2477faf3042afc98a3f20038a1514be26,2024-11-20T19:24:57.907000
CVE-2024-33021,0,0,d1bf10fabd8a7aa65a410180cecde661706f392b167b1431ee831c1ae3f61c9e,2024-11-20T19:28:00.557000
CVE-2024-33022,0,0,2f91e8e22bd3cb4680d129ffaba868cdca7b1d0f09cfba7e3a1db029d8e75c0f,2024-11-20T19:30:31.947000
@ -260558,7 +260559,7 @@ CVE-2024-35039,0,0,e5bb0b6ad9478238e5b8c321f2985e8d49ff0d9031464abf584ca60b90c2e
CVE-2024-3504,0,0,1e76ca030a65692dbb6d630449e59791e5c57b83588b9e0692b4e2aa7884c7fa,2024-11-21T09:29:44.783000
CVE-2024-35048,0,0,135119f59dfaf319a97db7bd2c1bc169012c9a11400da34d4bae48ab413bd01a,2024-11-21T09:19:42.657000
CVE-2024-35049,0,0,e6c6e38cc256db6dc51e364334cbcdbc9df2120c52b12d9d4124206d8dc2bc94,2024-11-21T09:19:42.880000
CVE-2024-3505,0,0,49106f376deb58288a725a5c5c02529aac8964759b5fb0e2d0485df7a7553485,2024-11-21T09:29:44.910000
CVE-2024-3505,0,1,b0e518dbdaaf48c704866354ca2287d24bf142f790f45dca79b53d52c65303e2,2025-04-01T13:59:28.320000
CVE-2024-35050,0,0,682e2b49a90053eeaaa040f2386a827602cbca3817b62e9690c3226261c9e6ad,2024-11-21T09:19:43.100000
CVE-2024-35056,0,0,20a0d7a15bbc69847cd094f6795a20a0a09a1b1a168cc43625695f103e0d3d0a,2024-11-21T09:19:43.337000
CVE-2024-35057,0,0,c19e75355d2af0fd3bb115ae7bb599429fa7122b7441a85b6126975bcf84bf8b,2024-11-21T09:19:43.570000
@ -263425,7 +263426,7 @@ CVE-2024-38516,0,0,c3b92d1f806c0367acf8d206ed141fceaa7f7feef0fd85eecaa0abd26fd8d
CVE-2024-38517,0,0,05cb050616d5cf2096e9fb9f9719f45ce62d1ca16a9cefeee68cea881fcce0c1,2024-11-21T09:26:08.690000
CVE-2024-38518,0,0,067ab11c1d2cd2eaa1f30492cbeeb98240e06fe0a06ad3a6e7c8162218088dd7,2024-11-21T09:26:09.023000
CVE-2024-38519,0,0,ff68aceab6101a4a2d444b329975a23165283302e03ac2bb297bf786534c3a0d,2024-11-21T09:26:09.370000
CVE-2024-3852,0,0,eef34f8c306acd6931a1f303a7de001d6bfc59fdc14757bee285c7dd1e646ed6,2024-11-21T09:30:32.690000
CVE-2024-3852,0,1,b4d5201a2c82b44b2ac39046b63a4f751fc043738800e3f24abf9006fdcd4ccf,2025-04-01T13:39:19.437000
CVE-2024-38520,0,0,13714aae8a893cb0cb37ad2183ce57b54c82c46e9436fcf730682b217fb72994,2024-11-21T09:26:09.807000
CVE-2024-38521,0,0,fe59af26beafb1d6ac3c84b505b695c437a2d939550b13e48891788719e24788,2024-11-21T09:26:10.227000
CVE-2024-38522,0,0,163a0807e895af008e0356107c0ee6a4fe30e3d99691e9f9320a4c7a70b91c5e,2024-11-21T09:26:10.720000
@ -276068,7 +276069,7 @@ CVE-2024-56321,0,0,74f6aaba2312f358c8612f649e79b3518a2426ea72dd60ae831d7b708032a
CVE-2024-56322,0,0,0e3135ff21764520d5633cd3f61e61097988472a18e3a364fe45daa5a3f3f8e3,2025-01-03T16:15:26.480000
CVE-2024-56323,0,0,4d7e760b1fcd669a470d40b9026794b15b60e0764a30b5d7449fce19b8900b0d,2025-01-13T22:15:14.447000
CVE-2024-56324,0,0,a08049cfd3a2aafc3d9d1e1d3bb8e00ce236badc8e05a5e1ec35b8e21dc91a5e,2025-01-03T16:15:26.643000
CVE-2024-56325,0,1,534674c0dec22b296138146fda6dcb2e707c1bb880fb5423119f5ee632b4c57c,2025-04-01T10:15:15.360000
CVE-2024-56325,0,0,534674c0dec22b296138146fda6dcb2e707c1bb880fb5423119f5ee632b4c57c,2025-04-01T10:15:15.360000
CVE-2024-56326,0,0,a8a6b261057c1f8537eceacbb1f4ed32049ab9589d4f4c5db55a4163b2928c32,2024-12-27T18:15:38.947000
CVE-2024-56327,0,0,928e223be8bc0630fd740137b1fbb300d0c36c5b8420c69dddd568c70eb8ddc4,2024-12-20T18:15:31.083000
CVE-2024-56328,0,0,15361150e4c4eddd938c28dee0249fee42e046eac1018161ed075ca63881925e,2025-02-04T21:15:27.400000
@ -282151,6 +282152,9 @@ CVE-2025-1651,0,0,dc02b23df4eb433cfaae6381155dd744e0ca82e8901f8e7d30555b36cffdf1
CVE-2025-1652,0,0,40ae07eb9aa50c5b6645abc9188293b11d3a3751f84fa68087927a34dfc8a3ac,2025-03-13T17:15:36.297000
CVE-2025-1653,0,0,81399ad7d0a3dd190eaf3e76c57ec1bd3ec75f06763142e168c62e4df94036c7,2025-03-28T13:17:33.270000
CVE-2025-1657,0,0,00b8c4fa900fcbf8fcc8352570319a690900e4acdb978bf02695203588721ccc,2025-03-28T12:59:00.413000
CVE-2025-1658,1,1,f6867ed4950a11445bf014dc15faf8f0b581c7c14df7f3b902a7679a321532db,2025-04-01T13:15:39.753000
CVE-2025-1659,1,1,daad1057cadcac39c103aed99c56d0eb47abb8662b675adebf84fa7f6c19c873,2025-04-01T13:15:39.913000
CVE-2025-1660,1,1,a4a254a8fc6121f9a950308e2300db322ccfccab431bb188ae89c5b64b4dded4,2025-04-01T13:15:40.053000
CVE-2025-1661,0,0,fc56e5229eb6ac1a864e12ea87f6baac0d11f126c1fe50c79da09acd396fb73c,2025-03-19T20:48:03.360000
CVE-2025-1662,0,0,0b069e39d7b9c2cac3bb89ddd5f385bc750d1df17050dae193b4f39dcff51d62,2025-03-06T15:30:52.347000
CVE-2025-1664,0,0,2ddafd8220da97f286feaff6915cac1d1018546efd24c59b88969afcb5318c21,2025-03-11T21:25:56.700000
@ -283416,6 +283420,7 @@ CVE-2025-22225,0,0,9e556bc7c3e33618b4b1fd67c232b5ec5342c22fd8db1a86d6c7512033ee8
CVE-2025-22226,0,0,d8b6281876fd003f404f7031a16d8be8c66b83496a9c80b329f6cf341e4f4e88,2025-03-05T16:22:52.433000
CVE-2025-22228,0,0,fa7f165a4b7ea7a15cc95ee04c8cc8a48940b5c217d39b7a5efd68469d6e9030,2025-03-20T18:15:18.663000
CVE-2025-22230,0,0,3e91dce00139a0364993ef91e4dc70d3b6016fb8a3b6eea2cbe343e4ad228132,2025-03-27T16:45:46.410000
CVE-2025-22231,1,1,154df2d9ff355fc487b4b3aacd2785ed6b8e0965b71a65a1c0e78ddd19c1485d,2025-04-01T13:15:40.197000
CVE-2025-2224,0,0,a251902d7a3f4027222d02a92ceecc551380ed3d87526ebb058f0bdbf9a04b21,2025-03-27T16:45:46.410000
CVE-2025-22260,0,0,6bffdd50ff1b9a95889c1f9bea94c0f7f92eb9097aa6e2dd07529a5cbb0d5ce1,2025-02-03T15:15:17.503000
CVE-2025-22261,0,0,cabefa2bbb4850682fa8dc2dd04543561914d58490173d75f62166401d731c68,2025-02-26T15:15:24.877000
@ -283522,6 +283527,7 @@ CVE-2025-22366,0,0,97374946d476a1e08535f722893bb8acd198d9f71f967181dcb7a41966417
CVE-2025-22367,0,0,f6b48e4e6414fa9f75650108ce2f805446a91f752f88d5798591a48240cb180f,2025-03-11T14:15:24.480000
CVE-2025-22368,0,0,15868b6e5746df64ac40f74359090d3c138a5fc4277e3491f8b4d3153bda9a6c,2025-03-11T14:15:24.627000
CVE-2025-22369,0,0,914da155da04583b64bbcd7efb69cdb65cf9b4fa1a7a93f57111b5e36bed452e,2025-03-11T14:15:24.767000
CVE-2025-2237,1,1,48c83d35042731e789070b6b95cfe508969457829b21062a9f7d04fcde4c231e,2025-04-01T12:15:15.420000
CVE-2025-22370,0,0,e3b9834ee83fce05ff2df07009571f711e0033889d2c52add2c8f53db29092f5,2025-03-11T14:15:24.917000
CVE-2025-22376,0,0,0b599d4fbe0b053f67328db02ad6a56c3b1af5acbc775b8d4fa33614fa96b0bf,2025-01-21T18:15:15.473000
CVE-2025-22383,0,0,971c2012aab2f3f792cbdd2c68df4004dd1217088db2d92a7bb003d39ddd9443,2025-01-06T15:15:16.103000
@ -284102,7 +284108,7 @@ CVE-2025-23360,0,0,44ec4858c221e4e9b3ef85a446da660e97979bf1d4ef5b7d7efaafadb38d1
CVE-2025-23362,0,0,f1b04109bb5a53f0fa12693fb841988a838f82d29d11cab82e724120097242c3,2025-01-29T02:15:27.910000
CVE-2025-23363,0,0,b9bdb2f5570a42ae3d8b5d6f5614156fb3bb4c04b93a61bb990c205c4501f432,2025-03-20T17:15:38.153000
CVE-2025-23366,0,0,19d3d492f06020aadbd27d64e622d5ed1c347260739b5074a05d263b32a748da,2025-01-14T18:16:06.290000
CVE-2025-23367,0,0,7754a5b5a7ef7b20fc4ec39ada85296b1a92f1ca2476a6564c884bf68763656c,2025-01-31T21:15:13.613000
CVE-2025-23367,0,1,7ac8ae847fdcafee193b5e9900f7ab7848ded8672b304c5f6c90b48f80701747,2025-04-01T13:15:40.327000
CVE-2025-23368,0,0,3fba7751170fbf245919938130180b8631c2c01153566e23c5e60aa4599df312,2025-03-04T16:15:39.270000
CVE-2025-23369,0,0,74f04427c8261f575e3b46a10e2c572c85dddb2e090b01cedc0f322610f8f68b,2025-02-05T19:15:45.747000
CVE-2025-2337,0,0,7d9e5607ad2b02dfc242a3305f849e66226e5392d822e3a7a605b0e9bacb542e,2025-03-17T15:15:44.983000
@ -286967,6 +286973,7 @@ CVE-2025-29029,0,0,39541c2aec3ae7c63f9d62e0a3860448d6ebc46233cbb2f267704a4d9534c
CVE-2025-29030,0,0,5c6a6bbb988d8463666139df5df874e45be8a953aa025e17f70aff541e298642,2025-03-19T19:15:47.790000
CVE-2025-29031,0,0,fc79f4214f85e8c2dc7f22a3d332d338110c9a0fc6645f125dc5ea2077bdeb39,2025-03-19T19:15:47.940000
CVE-2025-29032,0,0,de0e6dba36725e7eb376f4f499583a9ba773e23f18ca4062299593c1211d4783,2025-03-19T19:15:48.083000
CVE-2025-2906,1,1,1b052d092c19d31c189404b137fbab69d51e261d2d1ec9663958a817333720e4,2025-04-01T12:15:15.580000
CVE-2025-29072,0,0,49c945210f3f78e56e41b3df1156a5372b970d771a90cb3e84f3b7747252dacb,2025-03-28T16:15:29.640000
CVE-2025-2908,0,0,041eb1fa89a8461da19bf701f06a30feb1f340b875a2b47541929394f018f7d6,2025-03-28T18:11:40.180000
CVE-2025-2909,0,0,97c0fe7ab6ec975ef24a907a995721890d6b9e4b583a692182e886d15cd6b91b,2025-03-28T18:11:40.180000
@ -287217,6 +287224,7 @@ CVE-2025-30163,0,0,655322787d885aa61d50ea5e7ecff74dc9237e2c1710cc57eaf106a5eadfb
CVE-2025-30164,0,0,c838231ddadd650538b91334381739f0e5f84496049f4ab61b98fedaf2408f7b,2025-03-27T16:45:27.850000
CVE-2025-30168,0,0,650d771cf97916a28afc5f172eb3b832385c1c5e1b844b714aca8ef5a55b9cbc,2025-03-21T15:15:43.440000
CVE-2025-3017,0,0,083378d5c52a6935f1814e6fc98f820b5479d558d92d618c62143e49c5cbcf53,2025-03-31T22:15:22.807000
CVE-2025-30177,1,1,c0fcceb133765dada6eccd5558df60320f3f3ef30ac7f883249c4e8d25ed724e,2025-04-01T12:15:15.747000
CVE-2025-30179,0,0,e6188b5cfe41efd4be24afd0a9be97fe3cad7c2aaaf7dc5206b7ef410f616059,2025-03-27T14:45:47.520000
CVE-2025-3018,0,0,00344f460929f0982b2461abe2875f6b9e8536bc87aca06ccb922f2dfcd90499,2025-03-31T22:15:22.993000
CVE-2025-3019,0,0,9b9c69522dd584e9fa82131200a6442717b6558a8bb9867e6a05476c0b32a39e,2025-03-31T07:15:19.133000
@ -287248,7 +287256,14 @@ CVE-2025-30258,0,0,cc431d0d4fe6a8b6881434ff2ad3ef316269606a3845b529c54a958324c9a
CVE-2025-30259,0,0,e7ad748a07d97a3ed7d8fd479d0bd66cf98f38cbfee97910d52cd90aa0d3bed9,2025-03-20T00:15:13.780000
CVE-2025-3026,0,0,fb11ad07ceb162c9bd05d34d2f12da6e9d8c7f6a617203df1de3172900425d8d,2025-03-31T11:15:40.127000
CVE-2025-3027,0,0,5f4724b184d1d897e1bfc60266adcc89adf8febf9fb0fa6c8ae1b826171629c0,2025-03-31T11:15:40.273000
CVE-2025-3028,1,1,178947b9cb2a616c5fdb1fd875901d8b67246ff02e47b187eaf42e5e0ea3d11c,2025-04-01T13:15:41.190000
CVE-2025-3029,1,1,c84282acea475047d658940b01207c9a5f9997201f15e8012ffc5efa6bd5ca75,2025-04-01T13:15:41.290000
CVE-2025-3030,1,1,aa29bb3b9a4d9ba962918fae9d16a0da5ccaf30a87f66ff09579a7942116e0ea,2025-04-01T13:15:41.390000
CVE-2025-3031,1,1,84ca20236dc951f22f876a60da076220f55d0e1e05e3e6082942a749c1303324,2025-04-01T13:15:41.493000
CVE-2025-3032,1,1,791e585182f0c6b5f5269913b4a4f6ec3ffb885971f020dd8aa31d49ef4aa729,2025-04-01T13:15:41.587000
CVE-2025-3033,1,1,c0beb2439a9bcbbae11fc26a26f9d530daeb9290cd3a523fcdd0f489ebdc1e39,2025-04-01T13:15:41.697000
CVE-2025-30334,0,0,caf534fd1627734422d4cc985cab7fc3cb378766099fee597920edabdedb5eb9,2025-03-20T22:15:14.453000
CVE-2025-3034,1,1,424a78f7ebf23cd551602839abb51c87d94110c5b9a745d808de3d9e013e21a3,2025-04-01T13:15:41.790000
CVE-2025-30342,0,0,a82c09d47a90d84f34fb1e813a5c0fac2da3bb3c52e4eebc7be6b04000e23625,2025-03-27T13:35:33.940000
CVE-2025-30343,0,0,e985bd70edeba16d72f3a97a5b4503ce537b67f2c8ec7141c78018584bb14ff6,2025-03-27T14:00:35.087000
CVE-2025-30344,0,0,eee318218de480648fe7936077da37cc5a3c42a31c295bcaccd5481a9b270c1b,2025-03-27T14:40:42.177000
@ -287257,6 +287272,7 @@ CVE-2025-30346,0,0,a5ab4f3d9ba1cce34693c27771a45fbf120b9b80a448e75dfe49bd2a7ac1a
CVE-2025-30347,0,0,ed9763d5b530026684262273e310ca4c964268ef0ffc4c726547353dbc6770db,2025-03-24T14:19:23.963000
CVE-2025-30348,0,0,0fb0e9fd503e8730c9a3857e63ee0ac5611b8bb7632a64f763dd19e4ff36427c,2025-03-24T14:08:36.513000
CVE-2025-30349,0,0,526c950cc64a333e84d55e644a88fdd602691a361484b453eb0de28202e3ad5c,2025-03-28T01:15:16.323000
CVE-2025-3035,1,1,0029389ce37d1068c431299d6f47e6f4b4d8795d941d2b6c930361c8090f4c8a,2025-04-01T13:15:41.893000
CVE-2025-30350,0,0,769aed62b7c52c7efff0910786b1540702d43c431a2629a37c544cf6ab27d2c0,2025-03-27T16:45:27.850000
CVE-2025-30351,0,0,41323de04c59da9296c71c6a7df779e6c0c767b4bcb8b455ab5524ba6b0475be,2025-03-27T16:45:27.850000
CVE-2025-30352,0,0,2de13b7ea6496a9753fe04c1b9f1d1f6040e23740e41cd04836f25b10e4f3884,2025-03-27T16:45:27.850000
@ -287285,7 +287301,7 @@ CVE-2025-3042,0,0,5da867943f344ea897444a858f0a4772d61216fb9db5d54bf0de06c700ec7e
CVE-2025-30424,0,0,7e2724cad9826458f33af5386b5a1a4f9c6861b32027c20d5cb6e25ba7c7ee8a,2025-03-31T23:15:24.757000
CVE-2025-30425,0,0,60b572fb89ec688717379e9ebbcd135d9b23ce86ee894f11cf2922fc6df79751,2025-03-31T23:15:24.847000
CVE-2025-30426,0,0,581c97aeab2c16be5f0b7176d14da4dc8d887128ad4b58171c92c2a12140ed20,2025-04-01T05:15:47.587000
CVE-2025-30427,0,0,d81f96d8e241afc042a49c4b425517dea411054f34eee47c3d4ada118dd1399e,2025-04-01T04:15:48.400000
CVE-2025-30427,0,1,985c6e703f96835d501436fced6bcf126a04f6dc0eaba98a83160f8cc940e1e8,2025-04-01T13:15:40.463000
CVE-2025-30428,0,0,14851a55adbe0f2bcf519aabf203dccdad5a72bcd67d424690cf1f6ee71a64ab,2025-03-31T23:15:25.133000
CVE-2025-30429,0,0,b3ad0928a2ea60c1b24c5bf13e88cf4cf1c8660ad08680137252f3f759d7f523,2025-03-31T23:15:25.220000
CVE-2025-3043,0,0,e2927b24baedd66813c8c968fa2b997b52bd8633c607924521c6abb353badd6b,2025-04-01T01:15:21.073000
@ -287321,7 +287337,7 @@ CVE-2025-30465,0,0,e2b7a8ca55e53a28282e292780413c1f4acbe7742c4181526f89cdab8df96
CVE-2025-30467,0,0,f5b3243e6d32e26be0bd1758fbefd7d1f139d3cbc767b74bf87669426cb44025,2025-03-31T23:15:27.967000
CVE-2025-30469,0,0,81b27913828079d5c20985511e114b5a456ba132a627f467e29a63fed3445481,2025-03-31T23:15:28.107000
CVE-2025-3047,0,0,e0ce3b6e746fdadd6a211e2a7875b834c4eeb4396cc6bf0028a03eb50c077df9,2025-03-31T17:15:43.953000
CVE-2025-30470,0,0,6c33644c19be078c35df3d5d698cdbe6a2037eb50a37400e4c77501a8a48ef5b,2025-04-01T04:15:48.907000
CVE-2025-30470,0,1,0f872e41f6b142c6410b764c405a8d2b285855fe3a245880ea54ccff74e1f1fa,2025-04-01T13:15:40.650000
CVE-2025-30471,0,0,b9cce8b42291c21b8a7b4b6f0edb79f1b88ac267cdc529699a0a1c9465f48233,2025-03-31T23:15:28.347000
CVE-2025-30472,0,0,2ebab4b860069e7704c45b0afdbc37111cef0ce9e224a566e03ddd40410e1a00,2025-03-25T16:15:27.337000
CVE-2025-30474,0,0,1e288c28c7a9253d8007962ed83d55ed1c6a50132909d1d77f3fa1d8a9ee1e62,2025-03-23T19:15:14.973000
@ -287487,7 +287503,7 @@ CVE-2025-30816,0,0,86aa62d22d26c1677b8fbc2d5a26ff69334a638d0cbfc8a040d084b98bf55
CVE-2025-30817,0,0,8c68dd2359bc8b223264bcaf130261b6d50fa50dce54e42de4a27d598222577c,2025-03-27T16:45:12.210000
CVE-2025-30818,0,0,7f151ca2e67c18f616fc2b6e730a099fa2d6c72d321d27dddb7e52dc62180bc2,2025-03-27T16:45:12.210000
CVE-2025-30819,0,0,c839e0d4cc216303e77cb7edd2f52d654e10b42f866c0977df833188fb042da7,2025-03-27T16:45:12.210000
CVE-2025-3082,1,1,aaa8fb1f0776222cd9c881ef16a5448fbeafa7c5821dbfe26da3b3cd5a654cb6,2025-04-01T11:15:39.517000
CVE-2025-3082,0,0,aaa8fb1f0776222cd9c881ef16a5448fbeafa7c5821dbfe26da3b3cd5a654cb6,2025-04-01T11:15:39.517000
CVE-2025-30820,0,0,cfaf7e7f7d246bbb9c6ee13438bde2745fbdfcc3d7cca50ed220e792b3e82478,2025-03-27T16:45:12.210000
CVE-2025-30821,0,0,31ae51095c59dfaf0eed02ba626cb6b09bad176ab8cebd93fc6a5a1e0e640269,2025-03-27T16:45:12.210000
CVE-2025-30822,0,0,2207bcc8796316ad3958896a7f3e7034d296ff6fa4db22429bec71d22783cbfa,2025-03-27T16:45:12.210000
@ -287497,6 +287513,7 @@ CVE-2025-30826,0,0,75257443e76f09bc6627b81604675fc61a36199453aa13dd9dc8031e1e683
CVE-2025-30827,0,0,f3cff7138735ca3258e66a7dea50f5659bd66a2ae694ae2fddd37d05a3e2169a,2025-04-01T06:15:52.220000
CVE-2025-30828,0,0,13165c8a3d6127400e5dc61cd3acbdd0c00ff2da92174ed76ef5b12c0fb111b2,2025-03-27T16:45:12.210000
CVE-2025-30829,0,0,d778319af23c16bef5b797ee777aa1f3cf2ab5ec8837ae52469c3024592e73c0,2025-03-27T16:45:12.210000
CVE-2025-3083,1,1,8b5b60b008755174030596a8371acdd4bdffb9a68ff6774697b9e7a9ae4c87af,2025-04-01T12:15:15.883000
CVE-2025-30830,0,0,757146686939893abbafce7567881d6582c1c8891bb29b2eb8a3e312165fff05,2025-03-27T16:45:12.210000
CVE-2025-30831,0,0,58d6659c79961b1bd4ecff4586ae2944853bee5fcbb0265f99091764205fbfcf,2025-03-27T16:45:12.210000
CVE-2025-30832,0,0,872225febe12961ed121a80db974e1743a077eecf1159ceea59c5ee8994e141c,2025-03-27T16:45:12.210000
@ -287507,6 +287524,7 @@ CVE-2025-30836,0,0,6504eb324a1ec096686c876af4abf58ae341b41fb408f47abc7dd4fc1ed7b
CVE-2025-30837,0,0,57db230ad23c0670ac7752a0ca67441da205d0eb5b463502fe20545911bf87bb,2025-04-01T06:15:52.563000
CVE-2025-30838,0,0,c8224637914836764520188e48d3be333661d703c0aec303d3408c4a2082d067,2025-03-27T16:45:12.210000
CVE-2025-30839,0,0,7f84e9cce6914ca3519aebb5888dab9272dcac0726c7c6911a57af687fe3a8b5,2025-03-27T16:45:12.210000
CVE-2025-3084,1,1,50c0c9dedd9aeb8b6bb598ba4c6b9a4afac34183ca0fc7e34f523091d2120040,2025-04-01T12:15:16.037000
CVE-2025-30840,0,0,efa4ce5954239af2e53cc52ec7800b40a58b22e5edf4791d4029dd3cd6d4bdb5,2025-04-01T06:15:52.733000
CVE-2025-30842,0,0,93eb0fde9f95676ed20551d6eae16bb95a1afd32e8be327515370b50c4c34a12,2025-03-27T16:45:12.210000
CVE-2025-30843,0,0,817ee1e3c6dba384583fac96ece79c5548c0e04c4c65dd836b1a65d52b79eab1,2025-03-27T16:45:12.210000
@ -287515,6 +287533,7 @@ CVE-2025-30846,0,0,1f57df704f5b7b54a04e45d88dc76b7d3db79fd5b263d95d056743b064a78
CVE-2025-30847,0,0,fc961a502cdbb5e3e70606a6f8d637679f8552339c8080ad8895748b861656dd,2025-03-27T16:45:12.210000
CVE-2025-30848,0,0,e6bfad8b887e8d6e9a84720e896870d6e856639b805053a0313373d0d28f178a,2025-04-01T06:15:52.907000
CVE-2025-30849,0,0,b2ea72491b37b05de2f460f11025818cc477eb4fe4ba2c81735852fb8cea82bf,2025-04-01T06:15:53.063000
CVE-2025-3085,1,1,6c7dda5108fb6a4e92d06dbd7af88690225a9035edeef3301e7432bf272cc06d,2025-04-01T12:15:16.187000
CVE-2025-30850,0,0,760a1d8de33f40d499c33ff5bcfd7dc023a854aa3c9dd3ed4b3e1e844b1c5114,2025-03-27T16:45:12.210000
CVE-2025-30851,0,0,f31de6d06feb28cbb6d2ae0384a043c45d36984af50b98b70a1d34611d3389bf,2025-03-27T16:45:12.210000
CVE-2025-30854,0,0,49883421d6e5d7495d5181f7f5d3f9d094e10890825ab2510b96e7c898c09b58,2025-03-27T16:45:12.210000
@ -287661,6 +287680,7 @@ CVE-2025-31376,0,0,5d62da0cfe6b7435f71c655d217e6a75ce4a0a595484860a4e7e1f5bb1ff7
CVE-2025-31386,0,0,048c3505cf885b167c96d5bf95237b0045305d453ce992679e22ecd91082b5fe,2025-03-31T10:15:16.733000
CVE-2025-31387,0,0,3841e4b5f54acc054c2ceaf19088553e0ecb932d7404adff78288f7d2e95e424,2025-03-31T06:15:30.990000
CVE-2025-31406,0,0,40121456e359323fae5399657864763e75bc8a1475964af89f5af2b320c34e86,2025-03-31T09:15:17.143000
CVE-2025-31408,1,1,87a20ebbc28fc01a11d0e83f2c6b4e4553dc4d19342293483d557ec21599cdec,2025-04-01T13:15:41.037000
CVE-2025-31409,0,0,f62ba2971bd5b4f14c31faf8c83a5ed6291da2be1a8743c6af0048d344174f14,2025-04-01T06:15:56.730000
CVE-2025-31410,0,0,8ce1db5b18a0ba333461b5e8fbd6becd92780c874f64956192c5fcb2f1aa018e,2025-03-31T09:15:17.297000
CVE-2025-31412,0,0,68905eddf189835df947aca9eb7e8ddc2513cb1fb1efc35f69ef4b2ecd8c238e,2025-03-31T06:15:31.147000

Can't render this file because it is too large.