mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-19 17:31:42 +00:00
Auto-Update: 2025-06-11T16:00:23.482082+00:00
This commit is contained in:
parent
adb3d5b8f1
commit
9a9b3e0e5d
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2020-18305",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-05-14T06:36:01.630",
|
||||
"lastModified": "2024-11-21T05:08:31.600",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-06-11T14:57:21.840",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,14 +51,43 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:extremenetworks:extremexos:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "22.7",
|
||||
"matchCriteriaId": "37518AD5-2C1D-4987-A763-C7FC979DE85E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:extremenetworks:extremexos:30.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "346C9759-A35D-4310-B8F1-2CBB50F183C8"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/yasinyilmaz/1fe3fe58dd275edb77dcbe890fce2f2c",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://gist.github.com/yasinyilmaz/1fe3fe58dd275edb77dcbe890fce2f2c",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-43905",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2021-12-15T15:15:11.467",
|
||||
"lastModified": "2024-11-21T06:30:00.253",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2025-06-11T15:27:02.517",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -105,9 +105,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microsoft:office:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:a:microsoft:365_copilot:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "18.2110.13110.0",
|
||||
"matchCriteriaId": "401A8F0F-CE48-4D97-871E-93952CBC8A3D"
|
||||
"matchCriteriaId": "AFC8F04D-114D-45C9-B41F-6A22E6EA9A85"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-43591",
|
||||
"sourceIdentifier": "security@zoom.us",
|
||||
"published": "2023-11-15T00:15:09.237",
|
||||
"lastModified": "2024-11-21T08:24:27.223",
|
||||
"lastModified": "2025-06-11T15:15:26.057",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -79,16 +79,6 @@
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-269"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-46849",
|
||||
"sourceIdentifier": "security@openvpn.net",
|
||||
"published": "2023-11-11T01:15:07.270",
|
||||
"lastModified": "2024-11-21T08:29:25.337",
|
||||
"lastModified": "2025-06-11T15:15:26.793",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-47335",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-11-16T06:15:31.923",
|
||||
"lastModified": "2024-11-21T08:30:10.297",
|
||||
"lastModified": "2025-06-11T15:15:27.043",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-276"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-276"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-47488",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-11-09T06:15:24.290",
|
||||
"lastModified": "2024-11-21T08:30:20.677",
|
||||
"lastModified": "2025-06-11T15:15:27.260",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-47674",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2023-11-16T08:15:33.147",
|
||||
"lastModified": "2024-11-21T08:30:39.267",
|
||||
"lastModified": "2025-06-11T15:15:27.487",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-306"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-306"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-48197",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-11-15T23:15:08.903",
|
||||
"lastModified": "2024-11-21T08:31:11.990",
|
||||
"lastModified": "2025-06-11T15:15:27.713",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2024-1243",
|
||||
"sourceIdentifier": "41c37e40-543d-43a2-b660-2fee83ea851a",
|
||||
"published": "2025-06-11T02:15:20.270",
|
||||
"lastModified": "2025-06-11T02:15:20.270",
|
||||
"lastModified": "2025-06-11T15:15:28.230",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper input validation in the Wazuh agent for Windows prior to version 4.8.0 allows an attacker with control over the Wazuh server or agent key to configure the agent to connect to a malicious UNC path. This results in the leakage of the machine account NetNTLMv2 hash, which can be relayed for remote code execution or used to escalate privileges to SYSTEM via AD CS certificate forging and other similar attacks."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "La validaci\u00f3n de entrada incorrecta en el agente de Wazuh para Windows anterior a la versi\u00f3n 4.8.0 permite que un atacante con control sobre el servidor o la clave del agente de Wazuh configure el agente para conectarse a una ruta UNC maliciosa. Esto provoca la filtraci\u00f3n del hash NetNTLMv2 de la cuenta de la m\u00e1quina, que puede retransmitirse para la ejecuci\u00f3n remota de c\u00f3digo o utilizarse para escalar privilegios al SYSTEM mediante la falsificaci\u00f3n de certificados de AD CS y otros ataques similares."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -85,6 +89,10 @@
|
||||
{
|
||||
"url": "https://pentraze.com/vulnerability-reports/CVE-2024-1243/",
|
||||
"source": "41c37e40-543d-43a2-b660-2fee83ea851a"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/wazuh/wazuh/security/advisories/GHSA-3crh-39qv-fxj7",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-13865",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2025-05-15T20:15:40.247",
|
||||
"lastModified": "2025-05-20T20:15:36.660",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-06-11T14:55:38.617",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -39,14 +39,52 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:s3bubble:s3player:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndIncluding": "4.2.1",
|
||||
"matchCriteriaId": "638239B7-7E77-4A5F-A6F9-BC720D52B828"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/9cc7c5cb-983f-4593-abc5-7e224b275a23/",
|
||||
"source": "contact@wpscan.com"
|
||||
"source": "contact@wpscan.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/9cc7c5cb-983f-4593-abc5-7e224b275a23/",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-1663",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2025-05-15T20:15:41.293",
|
||||
"lastModified": "2025-05-20T15:16:03.367",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-06-11T14:48:53.673",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -39,14 +39,52 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:texttheater:ultimate_noindex_nofollow_tool_ii:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "1.3.6",
|
||||
"matchCriteriaId": "AFAC5D11-C185-4A63-9F31-586C76139542"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/6d101f2b-e903-4e64-92cc-e550abb52d6f/",
|
||||
"source": "contact@wpscan.com"
|
||||
"source": "contact@wpscan.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/6d101f2b-e903-4e64-92cc-e550abb52d6f/",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-2643",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2025-05-15T20:15:49.837",
|
||||
"lastModified": "2025-05-20T15:16:04.070",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-06-11T14:45:57.147",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -39,14 +39,52 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:premio:my_sticky_bar:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "2.6.8",
|
||||
"matchCriteriaId": "283CEB14-D05B-484F-8121-EF109834DFA0"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/194ebf81-8fe4-4c74-8174-35d0ac00ac93/",
|
||||
"source": "contact@wpscan.com"
|
||||
"source": "contact@wpscan.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/194ebf81-8fe4-4c74-8174-35d0ac00ac93/",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-27628",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-06-28T19:15:05.180",
|
||||
"lastModified": "2024-11-21T09:04:49.920",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-06-11T15:22:56.587",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,22 +51,53 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:offis:dcmtk:3.6.8:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B4A80B78-3210-466A-B051-3516CBDD6B84"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/DCMTK/dcmtk/commit/ec52e99e1e33fc39810560421c0833b02da567b3",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.dcmtk.org/redmine/issues/1108",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/DCMTK/dcmtk/commit/ec52e99e1e33fc39810560421c0833b02da567b3",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.dcmtk.org/redmine/issues/1108",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-33788",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-05-06T13:15:49.667",
|
||||
"lastModified": "2024-11-21T09:17:29.797",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-06-11T15:39:33.297",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,14 +51,49 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linksys:e5600_firmware:1.1.0.26:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6E8CA102-9DA8-4F5A-A80F-2E6EBE4D64B8"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:linksys:e5600:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CA6D6638-5946-4B18-B071-32E262754420"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/ymkyu/CVE/tree/main/CVE-2024-33788",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/ymkyu/CVE/tree/main/CVE-2024-33788",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-34500",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-05-05T19:15:07.123",
|
||||
"lastModified": "2024-12-04T21:15:23.877",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-06-11T14:44:14.040",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,30 +51,99 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:mediawiki:mediawiki:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "1.39.6",
|
||||
"matchCriteriaId": "6A7D7611-D088-4AF6-8CE0-EACBE4FF4492"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:mediawiki:mediawiki:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "1.40.0",
|
||||
"versionEndExcluding": "1.40.2",
|
||||
"matchCriteriaId": "3EF19DE5-1D79-4001-ABA1-D648AD6610D6"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:mediawiki:mediawiki:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "1.41.0",
|
||||
"versionEndExcluding": "1.41.1",
|
||||
"matchCriteriaId": "314B0F2D-27BD-486B-B528-FD8A7AAE53E6"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CA277A6C-83EC-4536-9125-97B84C4FAF59"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gerrit.wikimedia.org/r/c/mediawiki/extensions/UnlinkedWikibase/+/1002175",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FU2FGUXXK6TMV6R52VRECLC6XCSQQISY/",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://phabricator.wikimedia.org/T357203",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Issue Tracking",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://gerrit.wikimedia.org/r/c/mediawiki/extensions/UnlinkedWikibase/+/1002175",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FU2FGUXXK6TMV6R52VRECLC6XCSQQISY/",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://phabricator.wikimedia.org/T357203",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Issue Tracking",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-34509",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-05-05T20:15:07.367",
|
||||
"lastModified": "2024-11-21T09:18:50.360",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-06-11T15:35:22.570",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -39,30 +39,97 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:offis:dcmtk:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "3.6.9",
|
||||
"matchCriteriaId": "469288BA-64CF-4825-A5A9-843595A8E58E"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/DCMTK/dcmtk/commit/c78e434c0c5f9d932874f0b17a8b4ce305ca01f5",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00022.html",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.dcmtk.org/redmine/issues/1114",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/DCMTK/dcmtk/commit/c78e434c0c5f9d932874f0b17a8b4ce305ca01f5",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00022.html",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.dcmtk.org/redmine/issues/1114",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2024-37394",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-06-10T18:15:29.527",
|
||||
"lastModified": "2025-06-10T18:15:29.527",
|
||||
"lastModified": "2025-06-11T15:15:28.363",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A stored cross-site scripting (XSS) vulnerability in the Project Dashboards of REDCap 13.1.9 allows authenticated users to execute arbitrary web script or HTML by injecting a crafted payload into the 'Dashboard title' and 'Dashboard content' text boxes. This can lead to the execution of malicious scripts when the dashboard is viewed. Users are recommended to update to version 14.2.1 or later to mitigate this vulnerability."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Una vulnerabilidad de cross site scripting (XSS) almacenado en los paneles de control del proyecto REDCap 13.1.9 permite a los usuarios autenticados ejecutar scripts web o HTML arbitrarios mediante la inyecci\u00f3n de un payload manipulado en los cuadros de texto \"T\u00edtulo del panel\" y \"Contenido del panel\". Esto puede provocar la ejecuci\u00f3n de scripts maliciosos al acceder al panel. Se recomienda a los usuarios actualizar a la versi\u00f3n 14.2.1 o posterior para mitigar esta vulnerabilidad."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.evms.edu/research/resources_services/redcap/redcap_change_log/",
|
||||
@ -24,6 +63,10 @@
|
||||
{
|
||||
"url": "https://www.trustwave.com/hubfs/Web/Library/Advisories_txt/TWSL2024-003_XSS_REDCap_1.txt",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/multiple-cross-site-scripting-xss-vulnerabilities-in-redcap-cve-2024-37394-cve-2024-37395-and-cve-2024-37396/",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2024-37395",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-06-10T18:15:29.660",
|
||||
"lastModified": "2025-06-10T18:15:29.660",
|
||||
"lastModified": "2025-06-11T15:15:28.567",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A stored cross-site scripting (XSS) vulnerability in the Public Survey function of REDCap 13.1.9 allows authenticated users to execute arbitrary web script or HTML by injecting a crafted payload into the 'Survey Title' and 'Survey Instructions' fields. This vulnerability could be exploited by attackers to execute malicious scripts when the survey is accessed through its public link. It is advised to update to version 14.2.1 or later to fix this issue."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Una vulnerabilidad de cross site scripting (XSS) almacenado en la funci\u00f3n de Encuesta P\u00fablica de REDCap 13.1.9 permite a usuarios autenticados ejecutar scripts web o HTML arbitrarios mediante la inyecci\u00f3n de un payload manipulado en los campos \"T\u00edtulo de la encuesta\" e \"Instrucciones de la encuesta\". Esta vulnerabilidad podr\u00eda ser explotada por atacantes para ejecutar scripts maliciosos al acceder a la encuesta a trav\u00e9s de su enlace p\u00fablico. Se recomienda actualizar a la versi\u00f3n 14.2.1 o posterior para solucionar este problema."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.evms.edu/research/resources_services/redcap/redcap_change_log/",
|
||||
@ -24,6 +63,10 @@
|
||||
{
|
||||
"url": "https://www.trustwave.com/hubfs/Web/Library/Advisories_txt/TWSL2024-003_XSS_REDCap_1.txt",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/multiple-cross-site-scripting-xss-vulnerabilities-in-redcap-cve-2024-37394-cve-2024-37395-and-cve-2024-37396/",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2024-37396",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-06-10T18:15:29.773",
|
||||
"lastModified": "2025-06-10T18:15:29.773",
|
||||
"lastModified": "2025-06-11T15:15:28.753",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A stored cross-site scripting (XSS) vulnerability in the Calendar function of REDCap 13.1.9 allows authenticated users to execute arbitrary web script or HTML by injecting a crafted payload into the 'Notes' field of a calendar event. This could lead to the execution of malicious scripts when the event is viewed. Updating to version 14.2.1 or later is recommended to remediate this vulnerability."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Una vulnerabilidad de cross site scripting (XSS) almacenado en la funci\u00f3n Calendario de REDCap 13.1.9 permite a usuarios autenticados ejecutar scripts web o HTML arbitrarios mediante la inyecci\u00f3n de un payload manipulado en el campo \"Notas\" de un evento del calendario. Esto podr\u00eda provocar la ejecuci\u00f3n de scripts maliciosos al visualizar el evento. Se recomienda actualizar a la versi\u00f3n 14.2.1 o posterior para corregir esta vulnerabilidad."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.evms.edu/research/resources_services/redcap/redcap_change_log/",
|
||||
@ -24,6 +63,10 @@
|
||||
{
|
||||
"url": "https://www.trustwave.com/hubfs/Web/Library/Advisories_txt/TWSL2024-003_XSS_REDCap_1.txt",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/multiple-cross-site-scripting-xss-vulnerabilities-in-redcap-cve-2024-37394-cve-2024-37395-and-cve-2024-37396/",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2024-3932",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-04-18T00:15:08.033",
|
||||
"lastModified": "2024-11-21T09:30:43.703",
|
||||
"lastModified": "2025-06-11T14:15:29.120",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability classified as problematic has been found in Totara LMS 18.0.1 Build 20231128.01. This affects an unknown part. The manipulation leads to cross-site request forgery. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-261369 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
|
||||
"value": "A vulnerability classified as problematic has been found in Totara LMS up to 18.7. This affects an unknown part of the component User Selector. The manipulation leads to cross-site request forgery. It is possible to initiate the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. Upgrading to version 13.46, 14.38, 15.33, 16.27, 17.21 and 18.8 is able to address this issue. It is recommended to upgrade the affected component."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -16,17 +16,61 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 2.3,
|
||||
"baseSeverity": "LOW",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackComplexity": "HIGH",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "PASSIVE",
|
||||
"vulnConfidentialityImpact": "NONE",
|
||||
"vulnIntegrityImpact": "LOW",
|
||||
"vulnAvailabilityImpact": "NONE",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "PROOF_OF_CONCEPT",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||||
"baseScore": 3.1,
|
||||
"baseSeverity": "LOW",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
@ -34,7 +78,7 @@
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"exploitabilityScore": 1.6,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
],
|
||||
@ -44,17 +88,17 @@
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
|
||||
"baseScore": 5.0,
|
||||
"vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N",
|
||||
"baseScore": 2.6,
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"accessComplexity": "HIGH",
|
||||
"authentication": "NONE",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 10.0,
|
||||
"baseSeverity": "LOW",
|
||||
"exploitabilityScore": 4.9,
|
||||
"impactScore": 2.9,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
@ -67,16 +111,24 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://totara.community/mod/forum/discuss.php?d=27644",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.261369",
|
||||
"source": "cna@vuldb.com"
|
||||
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2024-41502",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-06-10T20:15:21.470",
|
||||
"lastModified": "2025-06-10T20:15:21.470",
|
||||
"lastModified": "2025-06-11T14:15:29.773",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Jetimob Plataforma Imobiliaria 20240627-0 is vulnerable to Cross Site Scripting (XSS) via the form field \"Observaces\" (observances) in the \"Pessoas\" (persons) section when creating or editing either a legal or a natural person."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Jetimob Plataforma Imobiliaria 20240627-0 es vulnerable a Cross Site Scripting (XSS) a trav\u00e9s del campo de formulario \"Observaces\" (observancias) en la secci\u00f3n \"Pessoas\" (personas) al crear o editar una persona jur\u00eddica o f\u00edsica."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "http://jetimob.com",
|
||||
@ -20,6 +59,10 @@
|
||||
{
|
||||
"url": "https://github.com/rafaelbaldasso/CVE-2024-41502",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/rafaelbaldasso/CVE-2024-41502",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2024-41503",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-06-10T20:15:21.610",
|
||||
"lastModified": "2025-06-10T20:15:21.610",
|
||||
"lastModified": "2025-06-11T14:15:29.950",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Jetimob Plataforma Imobiliaria 20240627-0 is vulnerable to Cross Site Scripting (XSS) in the field \"Ttulo\" (title) inside the filter Save option in the \"Busca\" (search) function."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Jetimob Plataforma Imobiliaria 20240627-0 es vulnerable a Cross Site Scripting (XSS) en el campo \"Ttulo\" (t\u00edtulo) dentro de la opci\u00f3n Guardar filtro de la funci\u00f3n \"Busca\"."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "http://jetimob.com",
|
||||
@ -20,6 +59,10 @@
|
||||
{
|
||||
"url": "https://github.com/rafaelbaldasso/CVE-2024-41503",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/rafaelbaldasso/CVE-2024-41503",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2024-41504",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-06-10T20:15:21.733",
|
||||
"lastModified": "2025-06-10T20:15:21.733",
|
||||
"lastModified": "2025-06-11T14:15:30.113",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Jetimob Plataforma Imobiliaria 20240627-0 is vulnerable to Cross Site Scripting (XSS). In the \"Oportunidades\" (opportunities) section of the application when creating or editing an \"Atividade\" (activity), the form field \"Descrico\" allows injection of JavaScript."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Jetimob Plataforma Imobiliaria 20240627-0 es vulnerable a ataques de cross site scripting (XSS). En la secci\u00f3n \"Oportunidades\" de la aplicaci\u00f3n, al crear o editar una \"Actividad\", el campo de formulario \"Descripci\u00f3n\" permite la inyecci\u00f3n de JavaScript."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "http://jetimob.com",
|
||||
@ -20,6 +59,10 @@
|
||||
{
|
||||
"url": "https://github.com/rafaelbaldasso/CVE-2024-41504",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/rafaelbaldasso/CVE-2024-41504",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2024-41505",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-06-10T20:15:21.850",
|
||||
"lastModified": "2025-06-10T20:15:21.850",
|
||||
"lastModified": "2025-06-11T14:15:30.277",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Jetimob Plataforma Imobiliaria 20240627-0 is vulnerable to Cross Site Scripting (XSS) in the \"Pessoas\" (persons) section via the field \"Profisso\" (professor)."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Jetimob Plataforma Imobiliaria 20240627-0 es vulnerable a Cross Site Scripting (XSS) en la secci\u00f3n \"Pessoas\" (personas) a trav\u00e9s del campo \"Profisso\" (profesor)."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "http://jetimob.com",
|
||||
@ -20,6 +59,10 @@
|
||||
{
|
||||
"url": "https://github.com/rafaelbaldasso/CVE-2024-41505",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/rafaelbaldasso/CVE-2024-41505",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-42009",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-08-05T19:15:38.220",
|
||||
"lastModified": "2025-06-10T01:00:02.087",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2025-06-11T15:46:19.810",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -143,7 +143,8 @@
|
||||
"url": "https://sonarsource.com/blog/government-emails-at-risk-critical-cross-site-scripting-vulnerability-in-roundcube-webmail/",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Technical Description"
|
||||
"Technical Description",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-45194",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-11-21T17:15:15.440",
|
||||
"lastModified": "2024-11-21T18:15:07.483",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-06-11T15:40:45.710",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,22 +51,268 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "10.0.0",
|
||||
"versionEndExcluding": "10.0.9",
|
||||
"matchCriteriaId": "CC78301D-6403-496F-A349-1C7BAC37797D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:9.0.0:-:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "32AFCE22-5ADA-4FF7-A165-5EC12B325DEF"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:9.0.0:p1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D3577FE6-F1F4-4555-8D27-84D6DE731EA3"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:9.0.0:p10:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "931BD98E-1A5F-4634-945B-BDD7D2FAA8B0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:9.0.0:p11:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2E7C0A57-A887-4D29-B601-4275313F46B3"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:9.0.0:p12:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B7248B91-D136-4DD5-A631-737E4C220A02"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:9.0.0:p13:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "494F6FD4-36ED-4E40-8336-7F077FA80FA8"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:9.0.0:p14:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9DF8C0CE-A71D-4BB1-83FB-1EA5ED77E0C9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:9.0.0:p15:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E0648498-2EE5-4B68-8360-ED5914285356"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:9.0.0:p16:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "24282FF8-548B-415B-95CA-1EFD404D21D3"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:9.0.0:p17:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "ACFDF2D9-ED72-4969-AA3B-E8D48CB1922D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:9.0.0:p18:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2B7D0A8B-7A72-4C1A-85F2-BE336CA47E0B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:9.0.0:p19:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "019AFC34-289E-4A01-B08B-A5807F7F909A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:9.0.0:p2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7E7B3976-DA6F-4285-93E6-2328006F7F4D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:9.0.0:p20:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "062E586F-0E02-45A6-93AD-895048FC2D4C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:9.0.0:p21:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3EE37BEE-4BDB-4E62-8DE3-98CF74DFBE01"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:9.0.0:p22:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "ADF51BCA-37DD-4642-B201-74A6D1A545FF"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:9.0.0:p23:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "39611F3D-A898-4C35-8915-3334CDFB78E5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:9.0.0:p24:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "40AB56B7-7222-4C44-A271-45DFE3673F72"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:9.0.0:p24.1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2AE8F501-4528-4F15-AE50-D4F11FB462DE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:9.0.0:p25:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AB9E054B-7790-4E74-A771-40BF6EC71610"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:9.0.0:p26:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DD924E57-C77B-430B-A615-537BB39CEA9C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:9.0.0:p27:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F43F4AC0-7C82-4CF4-B0C7-3A4C567BC985"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:9.0.0:p28:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7991F602-41D7-4377-B888-D66A467EAD67"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:9.0.0:p29:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2193FCA2-1AE3-497D-B0ED-5B89727410E3"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:9.0.0:p3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FA310AFA-492D-4A6C-A7F6-740E82CB6E57"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:9.0.0:p30:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FF95618B-0BFB-403C-83BE-C97879FC866D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:9.0.0:p31:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A82346A9-9CC2-4B91-BA2F-A815AAA92A7F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:9.0.0:p32:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2E800348-E139-418D-910B-7B3A9E1E721C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:9.0.0:p33:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C7DE1A7E-573B-42F3-B0A4-D2E676954FE0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:9.0.0:p34:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E60BC1D0-8552-4E6B-B2C5-96038448C238"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:9.0.0:p35:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3924251E-13B0-420E-8080-D3312C3D54AF"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:9.0.0:p36:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AEBE75F9-A494-4C78-927A-EA564BDCCE0B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:9.0.0:p37:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "900BECBA-7FDB-4E35-9603-29706FB87BD2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:9.0.0:p38:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5024FD58-A3ED-43B1-83EF-F4570C2573BA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:9.0.0:p39:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3CC9D046-4EB4-4608-8AB7-B60AC330A770"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:9.0.0:p4:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2AF337B5-B296-449B-8848-7636EC7C46C5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:9.0.0:p40:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A4535EC5-74D5-41E8-95F1-5C033ADB043E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:9.0.0:p5:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "52232ACA-C158-48C8-A0DB-7689040CB8FB"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:9.0.0:p6:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3B4D0040-86D0-46C3-8A9A-3DD12138B9ED"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:9.0.0:p7:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D2BB9BC7-078D-4E08-88E4-9432D74CA9BA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:9.0.0:p8:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F04D4B77-D386-4BC8-8169-9846693F6F11"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:9.0.0:p9:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "992370FA-F171-4FB3-9C1C-58AC37038CE4"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:10.1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C936B30B-C717-442B-8656-CF9EE3FC7C10"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wiki.zimbra.com/wiki/Zimbra_Releases/10.0.9#Security_Fixes",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://wiki.zimbra.com/wiki/Zimbra_Releases/10.1.1#Security_Fixes",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://wiki.zimbra.com/wiki/Zimbra_Releases/9.0.0/P41#Security_Fixes",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://wiki.zimbra.com/wiki/Zimbra_Responsible_Disclosure_Policy",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-50564",
|
||||
"sourceIdentifier": "psirt@fortinet.com",
|
||||
"published": "2025-01-14T14:15:33.490",
|
||||
"lastModified": "2025-02-03T22:11:08.317",
|
||||
"lastModified": "2025-06-11T14:55:09.987",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -92,8 +92,13 @@
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:fortinet:forticlient:*:*:*:*:*:windows:*:*",
|
||||
"versionStartIncluding": "6.4.0",
|
||||
"versionEndExcluding": "7.4.1",
|
||||
"matchCriteriaId": "6089DAFE-EBC1-4082-BBFE-72D88B53A430"
|
||||
"versionEndExcluding": "7.2.9",
|
||||
"matchCriteriaId": "82E4143C-57CE-40F5-BBBE-F82B89153749"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:fortinet:forticlient:7.4.0:*:*:*:*:windows:*:*",
|
||||
"matchCriteriaId": "6B512696-8596-4458-ADC9-24DD3C6C377B"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-51406",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-11-01T14:15:07.073",
|
||||
"lastModified": "2024-11-04T19:35:17.410",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-06-11T14:15:56.927",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -39,18 +39,57 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-290"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:projectfloodlight:open_sdn_controller:1.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "77E9C7A7-16A2-4634-95C8-F54852F36396"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/floodlight/floodlight",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/floodlight/floodlight/issues/870",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://ieeexplore.ieee.org/document/10246976",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Technical Description"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-6335",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2025-05-15T20:15:54.923",
|
||||
"lastModified": "2025-05-20T20:15:37.317",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-06-11T15:46:57.620",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -39,14 +39,52 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:data443:tracking_code_manager:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "2.3.0",
|
||||
"matchCriteriaId": "1B600CE7-27B7-4154-BCFA-38F156C90DE7"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/3bfb6b3f-8642-4807-b6b3-f214b26e96c2/",
|
||||
"source": "contact@wpscan.com"
|
||||
"source": "contact@wpscan.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/3bfb6b3f-8642-4807-b6b3-f214b26e96c2/",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-6462",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2025-05-15T20:15:55.007",
|
||||
"lastModified": "2025-05-20T20:15:37.467",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-06-11T15:43:50.453",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -39,14 +39,52 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:dyadyalesha:dl_yandex_metrika:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndIncluding": "1.2",
|
||||
"matchCriteriaId": "950A2803-25BD-489B-AF1B-6783850F3258"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/0880fa33-3efa-4f50-83c8-4c90cb805eb9/",
|
||||
"source": "contact@wpscan.com"
|
||||
"source": "contact@wpscan.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/0880fa33-3efa-4f50-83c8-4c90cb805eb9/",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-6478",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2025-05-15T20:15:55.120",
|
||||
"lastModified": "2025-05-20T20:15:37.603",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-06-11T15:41:54.610",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -39,14 +39,52 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:thisfunctional:ctt_expresso_para_woocommerce:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "3.2.13",
|
||||
"matchCriteriaId": "9736EDF6-3A35-4684-9B60-6F6907E657CE"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/39a78741-eeae-4a27-8136-7d0bb0bf2263/",
|
||||
"source": "contact@wpscan.com"
|
||||
"source": "contact@wpscan.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/39a78741-eeae-4a27-8136-7d0bb0bf2263/",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-6486",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2025-05-15T20:15:55.220",
|
||||
"lastModified": "2025-05-20T20:15:37.750",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-06-11T15:40:01.067",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -39,14 +39,52 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-78"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:orangelab:imagemagick_engine:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "1.7.11",
|
||||
"matchCriteriaId": "22542741-483D-44AE-9A47-87ADD3CDB1F5"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/a57c0c59-8b5c-4221-a9db-19f141650d9b/",
|
||||
"source": "contact@wpscan.com"
|
||||
"source": "contact@wpscan.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/a57c0c59-8b5c-4221-a9db-19f141650d9b/",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-6690",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2025-05-15T20:15:55.700",
|
||||
"lastModified": "2025-05-20T20:15:38.047",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-06-11T14:59:33.023",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -39,14 +39,52 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-601"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:wp-buy:wp_content_copy_protection_\\&_no_right_click:*:*:*:*:pro:wordpress:*:*",
|
||||
"versionEndExcluding": "15.3",
|
||||
"matchCriteriaId": "89176D33-3BF5-4C73-8405-21A41A09A590"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/09c6848d-30dc-4382-ae74-b470f586e142/",
|
||||
"source": "contact@wpscan.com"
|
||||
"source": "contact@wpscan.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/09c6848d-30dc-4382-ae74-b470f586e142/",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2025/CVE-2025-01xx/CVE-2025-0163.json
Normal file
56
CVE-2025/CVE-2025-01xx/CVE-2025-0163.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-0163",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2025-06-11T15:15:29.177",
|
||||
"lastModified": "2025-06-11T15:15:29.177",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "IBM Security Verify Access Appliance and Docker 10.0 through 10.0.8 could allow a remote attacker to enumerate usernames due to an observable response discrepancy of disabled accounts."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-204"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7236314",
|
||||
"source": "psirt@us.ibm.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-22996",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-01-15T00:15:45.053",
|
||||
"lastModified": "2025-01-15T17:15:21.837",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-06-11T15:38:44.620",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,14 +51,51 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linksys:e5600_firmware:1.1.0.26:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6E8CA102-9DA8-4F5A-A80F-2E6EBE4D64B8"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:linksys:e5600:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CA6D6638-5946-4B18-B071-32E262754420"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/SunnyYANGyaya/firmcrosser/blob/main/Linksys/E5600-2.md",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Exploit"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/SunnyYANGyaya/firmcrosser/blob/main/Linksys/E5600-2.md",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Exploit"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-22997",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-01-15T00:15:45.167",
|
||||
"lastModified": "2025-01-15T17:15:22.193",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-06-11T15:35:40.463",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,14 +51,51 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linksys:e5600_firmware:1.1.0.26:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6E8CA102-9DA8-4F5A-A80F-2E6EBE4D64B8"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:linksys:e5600:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CA6D6638-5946-4B18-B071-32E262754420"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/SunnyYANGyaya/firmcrosser/blob/main/Linksys/E5600-1.md",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Exploit"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/SunnyYANGyaya/firmcrosser/blob/main/Linksys/E5600-1.md",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Exploit"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-25193",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-02-10T22:15:38.450",
|
||||
"lastModified": "2025-03-26T13:14:32.087",
|
||||
"lastModified": "2025-06-11T15:36:22.693",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -73,6 +73,7 @@
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
@ -85,6 +86,17 @@
|
||||
"matchCriteriaId": "A71F5AEF-CB1E-41D1-A0D8-804DCF674542"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,16 +2,43 @@
|
||||
"id": "CVE-2025-26412",
|
||||
"sourceIdentifier": "551230f0-3615-47bd-b7cc-93e92e730bbf",
|
||||
"published": "2025-06-11T09:15:22.067",
|
||||
"lastModified": "2025-06-11T09:15:22.067",
|
||||
"lastModified": "2025-06-11T14:15:30.987",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The SIMCom SIM7600G modem supports an undocumented AT command, which allows an attacker to execute system commands with root permission on the modem. An attacker needs either physical access or remote shell access to a device that interacts directly with the modem via AT commands."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El m\u00f3dem SIMCom SIM7600G admite un comando AT no documentado que permite a un atacante ejecutar comandos del sistema con permisos de root en el m\u00f3dem. Un atacante necesita acceso f\u00edsico o acceso remoto a un dispositivo que interact\u00fae directamente con el m\u00f3dem mediante comandos AT."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 6.8,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "PHYSICAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 0.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "551230f0-3615-47bd-b7cc-93e92e730bbf",
|
||||
|
@ -2,20 +2,47 @@
|
||||
"id": "CVE-2025-26521",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2025-06-10T23:15:23.840",
|
||||
"lastModified": "2025-06-10T23:15:23.840",
|
||||
"lastModified": "2025-06-11T14:15:31.137",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "When an Apache CloudStack user-account creates a CKS-based Kubernetes cluster in a project, the API key and the secret key of the 'kubeadmin' user of the caller account are used to create the secret config in the CKS-based Kubernetes cluster. A member of the project who can access the CKS-based Kubernetes cluster, can also access the API key and secret key of the 'kubeadmin' user of the CKS cluster's creator's account. An attacker who's a member of the project can exploit this to impersonate and perform privileged actions that can result in complete compromise of the confidentiality, integrity, and availability of resources owned by the creator's account.\n\nCKS users are recommended to upgrade to version 4.19.3.0 or 4.20.1.0, which fixes this issue.Updating Existing Kubernetes Clusters in ProjectsA service account should be created for each project to provide limited access specifically for Kubernetes cluster providers and autoscaling. Follow the steps below to create a new service account, update the secret inside the cluster, and regenerate existing API and service keys:1. Create a New Service AccountCreate a new account using the role \"Project Kubernetes Service Role\" with the following details:\n\nAccount Name\nkubeadmin-<FIRST_EIGHT_CHARACTERS_OF_PROJECT_ID>\nFirst Name\nKubernetes\nLast Name\nService User\nAccount Type\n0 (Normal User)\nRole ID\n<ID_OF_SERVICE_ROLE>\n\n\n\n2. Add the Service Account to the ProjectAdd this account to the project where the Kubernetes cluster(s) are hosted.\n3. Generate API and Secret KeysGenerate API Key and Secret Key for the default user of this account.\n4. Update the CloudStack Secret in the Kubernetes ClusterCreate a temporary file `/tmp/cloud-config` with the following data:\n\u00a0\u00a0\u00a0api-url = <API_URL> \u00a0 \u00a0 # For example: <MS_URL>/client/api\n\u00a0 api-key = <SERVICE_USER_API_KEY>\n\u00a0 secret-key = <SERVICE_USER_SECRET_KEY>\n\u00a0 project-id = <PROJECT_ID>\n\n\n\n\nDelete the existing secret using kubectl and Kubernetes cluster config:\n\u00a0\u00a0\u00a0./kubectl --kubeconfig kube.conf -n kube-system delete secret cloudstack-secret\n\n\n\n\nCreate a new secret using kubectl and Kubernetes cluster config:\n\u00a0 \u00a0 ./kubectl --kubeconfig kube.conf -n kube-system create secret generic cloudstack-secret --from-file=/tmp/cloud-config\n\n\n\n\nRemove the temporary file:\n\u00a0 \u00a0 rm /tmp/cloud-config5. Regenerate API and Secret KeysRegenerate the API and secret keys for the original user account that was used to create the Kubernetes cluster."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Cuando una cuenta de usuario de Apache CloudStack crea un cl\u00faster de Kubernetes basado en CKS en un proyecto, la clave API y la clave secreta del usuario \"kubeadmin\" de la cuenta del autor de la llamada se utilizan para crear la configuraci\u00f3n secreta en el cl\u00faster de Kubernetes basado en CKS. Un miembro del proyecto con acceso al cl\u00faster de Kubernetes basado en CKS tambi\u00e9n puede acceder a la clave API y la clave secreta del usuario \"kubeadmin\" de la cuenta del creador del cl\u00faster. Un atacante miembro del proyecto puede aprovechar esto para suplantar la identidad y realizar acciones privilegiadas que pueden comprometer por completo la confidencialidad, integridad y disponibilidad de los recursos de la cuenta del creador. Se recomienda a los usuarios de CKS actualizar a la versi\u00f3n 4.19.3.0 o 4.20.1.0, que soluciona este problema. Actualizaci\u00f3n de cl\u00fasteres de Kubernetes existentes en proyectos. Se debe crear una cuenta de servicio para cada proyecto a fin de proporcionar acceso limitado, espec\u00edficamente para los proveedores de cl\u00fasteres de Kubernetes y el escalado autom\u00e1tico. Siga los pasos a continuaci\u00f3n para crear una nueva cuenta de servicio, actualizar el secreto dentro del cl\u00faster y regenerar las claves de API y de servicio existentes: 1. Cree una nueva cuenta de servicio. Cree una nueva cuenta con el rol \"Rol de servicio de Kubernetes del proyecto\" con la siguiente informaci\u00f3n: Nombre de la cuenta: kubeadmin- Nombre: Kubernetes Apellido: Usuario de servicio Tipo de cuenta: 0 (Usuario normal) ID de rol: 2. Agregue la cuenta de servicio al proyecto. Agregue esta cuenta al proyecto donde se alojan los cl\u00fasteres de Kubernetes. 3. Genere las claves de API y secretas. Genere la clave de API y la clave secreta para el usuario predeterminado de esta cuenta. 4. Actualice el secreto de CloudStack en el cl\u00faster de Kubernetes. Cree un archivo temporal `/tmp/cloud-config` con los siguientes datos: api-url = # Por ejemplo: /client/api api-key = secret-key = project-id = Elimine el secreto existente usando kubectl y la configuraci\u00f3n del cl\u00faster de Kubernetes: ./kubectl --kubeconfig kube.conf -n kube-system delete secret cloudstack-secret Cree un nuevo secreto usando kubectl y la configuraci\u00f3n del cl\u00faster de Kubernetes: ./kubectl --kubeconfig kube.conf -n kube-system create secret generic cloudstack-secret --from-file=/tmp/cloud-config Elimine el archivo temporal: rm /tmp/cloud-config5. Regenerar API y claves secretasRegenere la API y las claves secretas para la cuenta de usuario original que se utiliz\u00f3 para crear el cl\u00faster de Kubernetes."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
|
||||
"baseScore": 8.1,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@apache.org",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2025-2884",
|
||||
"sourceIdentifier": "cret@cert.org",
|
||||
"published": "2025-06-10T18:15:30.617",
|
||||
"lastModified": "2025-06-10T19:15:28.847",
|
||||
"lastModified": "2025-06-11T15:15:29.487",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "TCG TPM2.0 Reference implementation's CryptHmacSign helper function is vulnerable to Out-of-Bounds read due to the lack of validation the signature scheme with the signature key's algorithm. See Errata 1.83 of TCG standard TPM2.0"
|
||||
"value": "TCG TPM2.0 Reference implementation's CryptHmacSign helper function is vulnerable to Out-of-Bounds read due to the lack of validation the signature scheme with the signature key's algorithm. See Errata 1.83 and advisory VRT0009 of TCG standard TPM2.0"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "La funci\u00f3n auxiliar CryptHmacSign de la implementaci\u00f3n de referencia TCG TPM2.0 es vulnerable a lecturas fuera de los l\u00edmites debido a la falta de validaci\u00f3n del esquema de firma con el algoritmo de la clave de firma. Consulte la errata 1.83 del est\u00e1ndar TCG TPM2.0."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-125"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://trustedcomputinggroup.org/about/security/",
|
||||
@ -21,6 +60,10 @@
|
||||
"url": "https://trustedcomputinggroup.org/wp-content/uploads/TPM2.0-Library-Spec-v1.83-Errata_v1_pub.pdf",
|
||||
"source": "cret@cert.org"
|
||||
},
|
||||
{
|
||||
"url": "https://trustedcomputinggroup.org/wp-content/uploads/VRT0009-Advisory-FINAL.pdf",
|
||||
"source": "cret@cert.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01209.html",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
|
63
CVE-2025/CVE-2025-327xx/CVE-2025-32711.json
Normal file
63
CVE-2025/CVE-2025-327xx/CVE-2025-32711.json
Normal file
@ -0,0 +1,63 @@
|
||||
{
|
||||
"id": "CVE-2025-32711",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2025-06-11T14:15:31.530",
|
||||
"lastModified": "2025-06-11T14:15:31.530",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [
|
||||
{
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"exclusively-hosted-service"
|
||||
]
|
||||
}
|
||||
],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Ai command injection in M365 Copilot allows an unauthorized attacker to disclose information over a network."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "secure@microsoft.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:N",
|
||||
"baseScore": 9.3,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 4.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "secure@microsoft.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-77"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32711",
|
||||
"source": "secure@microsoft.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2025-33053",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2025-06-10T17:22:18.853",
|
||||
"lastModified": "2025-06-11T01:00:01.443",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-06-11T14:11:11.517",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "External control of file name or path in WebDAV allows an unauthorized attacker to execute code over a network."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El control externo del nombre o ruta del archivo en WebDAV permite que un atacante no autorizado ejecute c\u00f3digo a trav\u00e9s de una red."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
56
CVE-2025/CVE-2025-34xx/CVE-2025-3473.json
Normal file
56
CVE-2025/CVE-2025-34xx/CVE-2025-3473.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-3473",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2025-06-11T15:15:29.827",
|
||||
"lastModified": "2025-06-11T15:15:29.827",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "IBM Security Guardium 12.1 could allow a local privileged user to escalate their privileges to root due to insecure inherited permissions created by the program."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 6.7,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-277"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7236356",
|
||||
"source": "psirt@us.ibm.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2025-35940",
|
||||
"sourceIdentifier": "vulnreport@tenable.com",
|
||||
"published": "2025-06-10T21:15:22.210",
|
||||
"lastModified": "2025-06-10T21:15:22.210",
|
||||
"lastModified": "2025-06-11T14:15:33.690",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The ArchiverSpaApi\u00a0ASP.NET application uses a hard-coded JWT signing key. An unauthenticated remote attacker can generate and use a verifiable JWT token to access protected ArchiverSpaApi URL endpoints."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "La aplicaci\u00f3n ASP.NET ArchiverSpaApi utiliza una clave de firma JWT codificada de forma r\u00edgida. Un atacante remoto no autenticado puede generar y usar un token JWT verificable para acceder a los endpoints URL protegidos de ArchiverSpaApi."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -51,6 +55,10 @@
|
||||
{
|
||||
"url": "https://www.tenable.com/security/research/tra-2025-17",
|
||||
"source": "vulnreport@tenable.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.tenable.com/security/research/tra-2025-17",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2025/CVE-2025-359xx/CVE-2025-35941.json
Normal file
56
CVE-2025/CVE-2025-359xx/CVE-2025-35941.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-35941",
|
||||
"sourceIdentifier": "vulnreport@tenable.com",
|
||||
"published": "2025-06-11T14:15:33.797",
|
||||
"lastModified": "2025-06-11T14:15:33.797",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A password is exposed locally."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "vulnreport@tenable.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-522"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.tenable.com/security/research/tra-2025-18",
|
||||
"source": "vulnreport@tenable.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2025/CVE-2025-409xx/CVE-2025-40914.json
Normal file
56
CVE-2025/CVE-2025-409xx/CVE-2025-40914.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-40914",
|
||||
"sourceIdentifier": "9b29abf9-4ab0-4765-b253-1875cd9b441e",
|
||||
"published": "2025-06-11T14:15:34.007",
|
||||
"lastModified": "2025-06-11T15:15:29.990",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Perl CryptX before version 0.087 contains a dependency that may be susceptible to an integer overflow.\n\nCryptX embeds a version of the libtommath library that is susceptible to an integer overflow associated with CVE-2023-36328."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/advisories/GHSA-j3xv-6967-cv88",
|
||||
"source": "9b29abf9-4ab0-4765-b253-1875cd9b441e"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/libtom/libtommath/pull/546",
|
||||
"source": "9b29abf9-4ab0-4765-b253-1875cd9b441e"
|
||||
},
|
||||
{
|
||||
"url": "https://metacpan.org/release/MIK/CryptX-0.086/source/src/ltm/bn_mp_grow.c",
|
||||
"source": "9b29abf9-4ab0-4765-b253-1875cd9b441e"
|
||||
},
|
||||
{
|
||||
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36328",
|
||||
"source": "9b29abf9-4ab0-4765-b253-1875cd9b441e"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,16 +2,43 @@
|
||||
"id": "CVE-2025-43697",
|
||||
"sourceIdentifier": "security@salesforce.com",
|
||||
"published": "2025-06-10T12:15:24.097",
|
||||
"lastModified": "2025-06-10T12:15:24.097",
|
||||
"lastModified": "2025-06-11T14:15:34.253",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Preservation of Permissions vulnerability in Salesforce OmniStudio (DataMapper) allows exposure of encrypted data.\nThis impacts OmniStudio: before Spring 2025"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "La vulnerabilidad de conservaci\u00f3n inadecuada de permisos en Salesforce OmniStudio (DataMapper) permite la exposici\u00f3n de datos cifrados. Esto afecta a OmniStudio: antes de la primavera de 2025."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@salesforce.com",
|
||||
|
@ -2,16 +2,43 @@
|
||||
"id": "CVE-2025-43698",
|
||||
"sourceIdentifier": "security@salesforce.com",
|
||||
"published": "2025-06-10T12:15:24.227",
|
||||
"lastModified": "2025-06-10T12:15:24.227",
|
||||
"lastModified": "2025-06-11T14:15:34.417",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Preservation of Permissions vulnerability in Salesforce OmniStudio (FlexCards) allows bypass of field level security controls for Salesforce objects. \nThis impacts OmniStudio: before Spring 2025"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "La vulnerabilidad de conservaci\u00f3n incorrecta de permisos en Salesforce OmniStudio (FlexCards) permite eludir los controles de seguridad de campo para objetos de Salesforce. Esto afecta a OmniStudio: antes de la primavera de 2025."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
|
||||
"baseScore": 9.1,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@salesforce.com",
|
||||
|
56
CVE-2025/CVE-2025-46xx/CVE-2025-4605.json
Normal file
56
CVE-2025/CVE-2025-46xx/CVE-2025-4605.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-4605",
|
||||
"sourceIdentifier": "psirt@autodesk.com",
|
||||
"published": "2025-06-11T14:15:36.847",
|
||||
"lastModified": "2025-06-11T14:15:36.847",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A maliciously crafted .usdc file, when loaded through Autodesk Maya, can force an uncontrolled memory allocation vulnerability. A malicious actor may leverage this vulnerability to cause a denial-of-service (DoS), or cause data corruption."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@autodesk.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:H",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 4.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@autodesk.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-789"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0011",
|
||||
"source": "psirt@autodesk.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,20 +2,47 @@
|
||||
"id": "CVE-2025-47713",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2025-06-10T23:15:58.320",
|
||||
"lastModified": "2025-06-10T23:15:58.320",
|
||||
"lastModified": "2025-06-11T14:15:35.560",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A privilege escalation vulnerability exists in Apache CloudStack versions 4.10.0.0 through 4.20.0.0 where a malicious Domain Admin user in the ROOT domain can reset the password of user-accounts of Admin role type. This operation is not appropriately restricted and allows the attacker to assume control over higher-privileged user-accounts.\u00a0A malicious Domain Admin attacker can impersonate an Admin user-account and gain access to sensitive APIs and resources that\u00a0could result in the compromise of resource integrity and confidentiality, data loss, denial of service, and availability of infrastructure managed by CloudStack.\n\n\n\nUsers are recommended to upgrade to Apache CloudStack 4.19.3.0 or 4.20.1.0, which fixes the issue with the following:\n * Strict validation on Role Type hierarchy: the caller's user-account role must be equal to or higher than the target user-account's role.\n * API privilege comparison: the caller must possess all privileges of the user they are operating on. \n * Two new domain-level settings (restricted to the default Admin): \n\u2003- role.types.allowed.for.operations.on.accounts.of.same.role.type: Defines which role types are allowed to act on users of the same role type. Default: \"Admin, DomainAdmin, ResourceAdmin\". \n\u00a0 \u00a0- allow.operations.on.users.in.same.account: Allows/disallows user operations within the same account. Default: true."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Existe una vulnerabilidad de escalada de privilegios en Apache CloudStack, versiones 4.10.0.0 a 4.20.0.0, donde un usuario administrador de dominio malintencionado en el dominio ROOT puede restablecer la contrase\u00f1a de las cuentas de usuario con el rol de administrador. Esta operaci\u00f3n no est\u00e1 restringida adecuadamente y permite al atacante asumir el control de cuentas de usuario con privilegios m\u00e1s altos. Un atacante malintencionado de dominio puede suplantar una cuenta de usuario administrador y obtener acceso a API y recursos confidenciales, lo que podr\u00eda comprometer la integridad y confidencialidad de los recursos, la p\u00e9rdida de datos, la denegaci\u00f3n de servicio y la disponibilidad de la infraestructura administrada por CloudStack. Se recomienda a los usuarios actualizar a Apache CloudStack 4.19.3.0 o 4.20.1.0, que soluciona el problema con lo siguiente: * Validaci\u00f3n estricta en la jerarqu\u00eda de tipos de rol: el rol de la cuenta de usuario del llamante debe ser igual o superior al rol de la cuenta de usuario de destino. * Comparaci\u00f3n de privilegios de API: el usuario que realiza la llamada debe tener todos los privilegios del usuario con el que opera. * Dos nuevas configuraciones a nivel de dominio (restringidas al administrador predeterminado): - role.types.allowed.for.operations.on.accounts.of.same.role.type: Define qu\u00e9 tipos de rol pueden actuar sobre usuarios del mismo tipo. Predeterminado: \"Admin, DomainAdmin, ResourceAdmin\". - allow.operations.on.users.in.same.account: Permite o impide las operaciones de usuario dentro de la misma cuenta. Predeterminado: true."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@apache.org",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,20 +2,47 @@
|
||||
"id": "CVE-2025-47849",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2025-06-10T23:15:58.453",
|
||||
"lastModified": "2025-06-10T23:15:58.453",
|
||||
"lastModified": "2025-06-11T14:15:35.727",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A privilege escalation vulnerability exists in Apache CloudStack versions 4.10.0.0 through 4.20.0.0 where a malicious Domain Admin user in the ROOT domain can get the API key and secret key of user-accounts of Admin role type in the same domain. This operation is not appropriately restricted and allows the attacker to assume control over higher-privileged user-accounts. A malicious Domain Admin attacker can impersonate an Admin user-account and gain access to sensitive APIs and resources that could result in the compromise of resource integrity and confidentiality, data loss, denial of service, and availability of infrastructure managed by CloudStack.\n\nUsers are recommended to upgrade to Apache CloudStack 4.19.3.0 or 4.20.1.0, which fixes the issue with the following:\n\n\n * Strict validation on Role Type hierarchy: the caller's role must be equal to or higher than the target user's role.\u00a0\n * API privilege comparison: the caller must possess all privileges of the user they are operating on.\u00a0\n * Two new domain-level settings (restricted to the default admin):\u00a0\n\u2003- role.types.allowed.for.operations.on.accounts.of.same.role.type: Defines which role types are allowed to act on users of the same role type. Default: \"Admin, DomainAdmin, ResourceAdmin\".\u00a0\n\u2003- allow.operations.on.users.in.same.account: Allows/disallows user operations within the same account. Default: true."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Existe una vulnerabilidad de escalada de privilegios en Apache CloudStack, versiones 4.10.0.0 a 4.20.0.0, donde un usuario administrador de dominio malintencionado en el dominio ROOT puede obtener la clave API y la clave secreta de las cuentas de usuario con el rol de administrador en el mismo dominio. Esta operaci\u00f3n no est\u00e1 restringida adecuadamente y permite al atacante asumir el control sobre cuentas de usuario con mayores privilegios. Un atacante malintencionado de dominio puede suplantar una cuenta de usuario administrador y obtener acceso a API y recursos confidenciales que podr\u00edan comprometer la integridad y confidencialidad de los recursos, la p\u00e9rdida de datos, la denegaci\u00f3n de servicio y la disponibilidad de la infraestructura administrada por CloudStack. Se recomienda a los usuarios actualizar a Apache CloudStack 4.19.3.0 o 4.20.1.0, que soluciona el problema con lo siguiente: * Validaci\u00f3n estricta en la jerarqu\u00eda de tipos de rol: el rol del llamante debe ser igual o superior al rol del usuario objetivo. * Comparaci\u00f3n de privilegios de API: el usuario que realiza la llamada debe tener todos los privilegios del usuario con el que opera. * Dos nuevas configuraciones a nivel de dominio (restringidas al administrador predeterminado): - role.types.allowed.for.operations.on.accounts.of.same.role.type: Define qu\u00e9 tipos de rol pueden actuar sobre usuarios del mismo tipo. Predeterminado: \"Admin, DomainAdmin, ResourceAdmin\". - allow.operations.on.users.in.same.account: Permite o impide las operaciones de usuario dentro de la misma cuenta. Predeterminado: true."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@apache.org",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
33
CVE-2025/CVE-2025-480xx/CVE-2025-48013.json
Normal file
33
CVE-2025/CVE-2025-480xx/CVE-2025-48013.json
Normal file
@ -0,0 +1,33 @@
|
||||
{
|
||||
"id": "CVE-2025-48013",
|
||||
"sourceIdentifier": "mlhess@drupal.org",
|
||||
"published": "2025-06-11T15:15:41.830",
|
||||
"lastModified": "2025-06-11T15:15:41.830",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Missing Authorization vulnerability in Drupal Quick Node Block allows Forceful Browsing.This issue affects Quick Node Block: from 0.0.0 before 2.0.0."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "mlhess@drupal.org",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.drupal.org/sa-contrib-2025-065",
|
||||
"source": "mlhess@drupal.org"
|
||||
}
|
||||
]
|
||||
}
|
33
CVE-2025/CVE-2025-484xx/CVE-2025-48444.json
Normal file
33
CVE-2025/CVE-2025-484xx/CVE-2025-48444.json
Normal file
@ -0,0 +1,33 @@
|
||||
{
|
||||
"id": "CVE-2025-48444",
|
||||
"sourceIdentifier": "mlhess@drupal.org",
|
||||
"published": "2025-06-11T15:15:42.143",
|
||||
"lastModified": "2025-06-11T15:15:42.143",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Missing Authorization vulnerability in Drupal Quick Node Block allows Forceful Browsing.This issue affects Quick Node Block: from 0.0.0 before 2.0.0."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "mlhess@drupal.org",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.drupal.org/sa-contrib-2025-064",
|
||||
"source": "mlhess@drupal.org"
|
||||
}
|
||||
]
|
||||
}
|
33
CVE-2025/CVE-2025-484xx/CVE-2025-48445.json
Normal file
33
CVE-2025/CVE-2025-484xx/CVE-2025-48445.json
Normal file
@ -0,0 +1,33 @@
|
||||
{
|
||||
"id": "CVE-2025-48445",
|
||||
"sourceIdentifier": "mlhess@drupal.org",
|
||||
"published": "2025-06-11T15:15:42.270",
|
||||
"lastModified": "2025-06-11T15:15:42.270",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Incorrect Authorization vulnerability in Drupal Commerce Eurobank (Redirect) allows Functionality Misuse.This issue affects Commerce Eurobank (Redirect): from 0.0.0 before 2.1.1."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "mlhess@drupal.org",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-863"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.drupal.org/sa-contrib-2025-066",
|
||||
"source": "mlhess@drupal.org"
|
||||
}
|
||||
]
|
||||
}
|
33
CVE-2025/CVE-2025-484xx/CVE-2025-48446.json
Normal file
33
CVE-2025/CVE-2025-484xx/CVE-2025-48446.json
Normal file
@ -0,0 +1,33 @@
|
||||
{
|
||||
"id": "CVE-2025-48446",
|
||||
"sourceIdentifier": "mlhess@drupal.org",
|
||||
"published": "2025-06-11T15:15:42.427",
|
||||
"lastModified": "2025-06-11T15:15:42.427",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Incorrect Authorization vulnerability in Drupal Commerce Alphabank Redirect allows Functionality Misuse.This issue affects Commerce Alphabank Redirect: from 0.0.0 before 1.0.3."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "mlhess@drupal.org",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-863"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.drupal.org/sa-contrib-2025-067",
|
||||
"source": "mlhess@drupal.org"
|
||||
}
|
||||
]
|
||||
}
|
33
CVE-2025/CVE-2025-484xx/CVE-2025-48447.json
Normal file
33
CVE-2025/CVE-2025-484xx/CVE-2025-48447.json
Normal file
@ -0,0 +1,33 @@
|
||||
{
|
||||
"id": "CVE-2025-48447",
|
||||
"sourceIdentifier": "mlhess@drupal.org",
|
||||
"published": "2025-06-11T15:15:42.607",
|
||||
"lastModified": "2025-06-11T15:15:42.607",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Drupal Lightgallery allows Cross-Site Scripting (XSS).This issue affects Lightgallery: from 0.0.0 before 1.6.0."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "mlhess@drupal.org",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.drupal.org/sa-contrib-2025-069",
|
||||
"source": "mlhess@drupal.org"
|
||||
}
|
||||
]
|
||||
}
|
33
CVE-2025/CVE-2025-484xx/CVE-2025-48448.json
Normal file
33
CVE-2025/CVE-2025-484xx/CVE-2025-48448.json
Normal file
@ -0,0 +1,33 @@
|
||||
{
|
||||
"id": "CVE-2025-48448",
|
||||
"sourceIdentifier": "mlhess@drupal.org",
|
||||
"published": "2025-06-11T15:15:42.733",
|
||||
"lastModified": "2025-06-11T15:15:42.733",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Allocation of Resources Without Limits or Throttling vulnerability in Drupal Admin Audit Trail allows Excessive Allocation.This issue affects Admin Audit Trail: from 0.0.0 before 1.0.5."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "mlhess@drupal.org",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-770"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.drupal.org/sa-contrib-2025-068",
|
||||
"source": "mlhess@drupal.org"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2025/CVE-2025-491xx/CVE-2025-49146.json
Normal file
60
CVE-2025/CVE-2025-491xx/CVE-2025-49146.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2025-49146",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-06-11T15:15:42.850",
|
||||
"lastModified": "2025-06-11T15:15:42.850",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "pgjdbc is an open source postgresql JDBC Driver. From 42.7.4 and until 42.7.7, when the PostgreSQL JDBC driver is configured with channel binding set to required (default value is prefer), the driver would incorrectly allow connections to proceed with authentication methods that do not support channel binding (such as password, MD5, GSS, or SSPI authentication). This could allow a man-in-the-middle attacker to intercept connections that users believed were protected by channel binding requirements. This vulnerability is fixed in 42.7.7."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N",
|
||||
"baseScore": 8.2,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 4.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-287"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/pgjdbc/pgjdbc/commit/9217ed16cb2918ab1b6b9258ae97e6ede244d8a0",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/pgjdbc/pgjdbc/security/advisories/GHSA-hq9p-pm7w-8p54",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2025/CVE-2025-491xx/CVE-2025-49148.json
Normal file
56
CVE-2025/CVE-2025-491xx/CVE-2025-49148.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-49148",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-06-11T15:15:43.043",
|
||||
"lastModified": "2025-06-11T15:15:43.043",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "ClipShare is a lightweight and cross-platform tool for clipboard sharing. Prior to 3.8.5, ClipShare Server for Windows uses the default Windows DLL search order and loads system libraries like CRYPTBASE.dll and WindowsCodecs.dll from its own directory before the system path. A local, non-privileged user who can write to the folder containing clip_share.exe can place malicious DLLs there, leading to arbitrary code execution in the context of the server, and, if launched by an Administrator (or another elevated user), it results in a reliable local privilege escalation. This vulnerability is fixed in 3.8.5."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.3,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.3,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-427"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/thevindu-w/clip_share_server/security/advisories/GHSA-rc47-h83g-2r8j",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-49709",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2025-06-11T12:15:26.977",
|
||||
"lastModified": "2025-06-11T12:15:26.977",
|
||||
"lastModified": "2025-06-11T14:15:36.387",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Ciertas operaciones de canvas podr\u00edan haber provocado corrupci\u00f3n de memoria. Esta vulnerabilidad afecta a Firefox anterior a la versi\u00f3n 139.0.4."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1966083",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-49710",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2025-06-11T12:15:27.083",
|
||||
"lastModified": "2025-06-11T12:15:27.083",
|
||||
"lastModified": "2025-06-11T14:15:36.527",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Se produjo un desbordamiento de entero en `OrderedHashTable` utilizado por el motor JavaScript. Esta vulnerabilidad afecta a Firefox < 139.0.4."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-190"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1970095",
|
||||
|
56
CVE-2025/CVE-2025-49xx/CVE-2025-4922.json
Normal file
56
CVE-2025/CVE-2025-49xx/CVE-2025-4922.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-4922",
|
||||
"sourceIdentifier": "security@hashicorp.com",
|
||||
"published": "2025-06-11T14:15:37.140",
|
||||
"lastModified": "2025-06-11T14:15:37.140",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Nomad Community and Nomad Enterprise (\u201cNomad\u201d) prefix-based ACL policy lookup can lead to incorrect rule application and shadowing. This vulnerability, identified as CVE-2025-4922, is fixed in Nomad Community Edition 1.10.2 and Nomad Enterprise 1.10.2, 1.9.10, and 1.8.14."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@hashicorp.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
|
||||
"baseScore": 8.1,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@hashicorp.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-266"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://discuss.hashicorp.com/t/hcsec-2025-12-nomad-vulnerable-to-incorrect-acl-policy-lookup-attached-to-a-job/75396",
|
||||
"source": "security@hashicorp.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-4929",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-05-19T11:15:19.493",
|
||||
"lastModified": "2025-05-21T17:42:52.510",
|
||||
"lastModified": "2025-06-11T14:54:00.567",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -163,9 +163,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:huggingface:transformers:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "4.48.3",
|
||||
"matchCriteriaId": "8C6BB08B-59CD-4524-AC16-55130113AE69"
|
||||
"criteria": "cpe:2.3:a:campcodes:online_shopping_portal:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "ED169AA3-FE94-46F0-B54D-379A46F9F19D"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,16 +2,43 @@
|
||||
"id": "CVE-2025-4954",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2025-06-10T06:15:22.403",
|
||||
"lastModified": "2025-06-10T06:15:22.403",
|
||||
"lastModified": "2025-06-11T14:15:37.287",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Axle Demo Importer WordPress plugin through 1.0.3 does not validate files to be uploaded, which could allow authenticated users (author and above) to upload arbitrary files such as PHP on the server"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El complemento Axle Demo Importer de WordPress hasta la versi\u00f3n 1.0.3 no valida los archivos que se cargar\u00e1n, lo que podr\u00eda permitir que usuarios autenticados (autor y superiores) carguen archivos arbitrarios como PHP en el servidor."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/673f35ff-e1d5-4099-86e7-8b6e3e410ef8/",
|
||||
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2025-5139",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-05-25T01:15:23.710",
|
||||
"lastModified": "2025-05-28T14:58:52.920",
|
||||
"lastModified": "2025-06-11T14:15:37.437",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in Qualitor 8.20. It has been rated as critical. Affected by this issue is some unknown functionality of the file /html/ad/adconexaooffice365/request/testaConexaoOffice365.php. The manipulation of the argument nmconexao leads to command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
|
||||
"value": "A vulnerability was found in Qualitor 8.20/8.24. It has been rated as critical. Affected by this issue is some unknown functionality of the file /html/ad/adconexaooffice365/request/testaConexaoOffice365.php of the component Office 365-type Connection Handler. The manipulation of the argument nmconexao leads to command injection. The attack may be launched remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. Upgrading to version 8.20.56 and 8.24.31 is able to address this issue. It is recommended to upgrade the affected component."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -22,11 +22,11 @@
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 6.9,
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackComplexity": "HIGH",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
@ -36,7 +36,7 @@
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"exploitMaturity": "PROOF_OF_CONCEPT",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
@ -66,11 +66,11 @@
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||||
"baseScore": 7.3,
|
||||
"baseSeverity": "HIGH",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||||
"baseScore": 5.6,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
@ -78,7 +78,7 @@
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
@ -88,17 +88,17 @@
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||||
"baseScore": 7.5,
|
||||
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||||
"baseScore": 6.8,
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"accessComplexity": "MEDIUM",
|
||||
"authentication": "NONE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL"
|
||||
},
|
||||
"baseSeverity": "HIGH",
|
||||
"exploitabilityScore": 10.0,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.6,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
@ -111,7 +111,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-5268",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2025-05-27T13:15:22.610",
|
||||
"lastModified": "2025-06-11T12:15:28.087",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2025-06-11T14:51:14.950",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -67,14 +67,21 @@
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:-:*:*:*",
|
||||
"versionEndExcluding": "130.0",
|
||||
"matchCriteriaId": "474427D8-84E9-4C4B-8B0B-D5961AF6B28E"
|
||||
"versionEndExcluding": "139.0",
|
||||
"matchCriteriaId": "E2C0FE7C-6F8E-4F1D-A768-914194586E0C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "128.11.0",
|
||||
"matchCriteriaId": "1495D4C0-92D7-4384-8730-B59560AD0BEE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "129.0",
|
||||
"versionEndExcluding": "139.0",
|
||||
"matchCriteriaId": "2BC51636-40B4-4FB9-975F-CBF61A91A8AC"
|
||||
"matchCriteriaId": "D3A0DDA7-A6CB-43C3-BF53-F21FFB089AD6"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -105,11 +112,17 @@
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2025-45/",
|
||||
"source": "security@mozilla.org"
|
||||
"source": "security@mozilla.org",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2025-46/",
|
||||
"source": "security@mozilla.org"
|
||||
"source": "security@mozilla.org",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-5687",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2025-06-11T12:15:29.023",
|
||||
"lastModified": "2025-06-11T12:15:29.023",
|
||||
"lastModified": "2025-06-11T14:15:37.730",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Una vulnerabilidad en Mozilla VPN para macOS permite la escalada de privilegios de un usuario normal a root. *Este error solo afecta a Mozilla VPN en macOS. Otros sistemas operativos no se ven afectados.* Esta vulnerabilidad afecta a Mozilla VPN 2.28.0 < (macOS)."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-269"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1953736",
|
||||
|
@ -2,16 +2,43 @@
|
||||
"id": "CVE-2025-5958",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2025-06-11T01:15:20.890",
|
||||
"lastModified": "2025-06-11T01:15:20.890",
|
||||
"lastModified": "2025-06-11T14:15:37.870",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Use after free in Media in Google Chrome prior to 137.0.7151.103 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Use After Free en Multimedia en Google Chrome anterior a la versi\u00f3n 137.0.7151.103 permit\u00eda a un atacante remoto explotar la corrupci\u00f3n del mont\u00f3n mediante una p\u00e1gina HTML manipulada. (Gravedad de seguridad de Chromium: Alta)"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
@ -22,6 +49,16 @@
|
||||
"value": "CWE-416"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-416"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
|
@ -2,16 +2,43 @@
|
||||
"id": "CVE-2025-5959",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2025-06-11T01:15:21.030",
|
||||
"lastModified": "2025-06-11T01:15:21.030",
|
||||
"lastModified": "2025-06-11T14:15:38.037",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Type Confusion in V8 in Google Chrome prior to 137.0.7151.103 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "La confusi\u00f3n de tipos en la versi\u00f3n 8 de Google Chrome anterior a la versi\u00f3n 137.0.7151.103 permit\u00eda a un atacante remoto ejecutar c\u00f3digo arbitrario dentro de un entorno de pruebas mediante una p\u00e1gina HTML manipulada. (Gravedad de seguridad de Chromium: Alta)"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
@ -22,6 +49,16 @@
|
||||
"value": "CWE-843"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-843"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2025-5978",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-06-10T21:15:22.793",
|
||||
"lastModified": "2025-06-10T21:15:22.793",
|
||||
"lastModified": "2025-06-11T14:15:38.197",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in Tenda FH1202 1.2.0.14. It has been classified as critical. Affected is the function fromVirtualSer of the file /goform/VirtualSer. The manipulation of the argument page leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se encontr\u00f3 una vulnerabilidad en Tenda FH1202 1.2.0.14. Se ha clasificado como cr\u00edtica. La funci\u00f3n fromVirtualSer del archivo /goform/VirtualSer est\u00e1 afectada. La manipulaci\u00f3n de la p\u00e1gina de argumentos provoca un desbordamiento del b\u00fafer basado en la pila. Es posible ejecutar el ataque de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -59,7 +63,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
@ -107,7 +111,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -140,6 +144,10 @@
|
||||
{
|
||||
"url": "https://www.tenda.com.cn/",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://lavender-bicycle-a5a.notion.site/Tenda-FH1202-fromVirtualSer-20b53a41781f80b7a6c7e727f93d7d9f",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2025-5979",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-06-10T21:15:22.970",
|
||||
"lastModified": "2025-06-10T21:15:22.970",
|
||||
"lastModified": "2025-06-11T14:15:38.320",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability classified as critical has been found in code-projects School Fees Payment System 1.0. This affects an unknown part of the file /branch.php. The manipulation of the argument ID leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se ha encontrado una vulnerabilidad clasificada como cr\u00edtica en code-projects School Fees Payment System 1.0. Esta afecta a una parte desconocida del archivo /branch.php. La manipulaci\u00f3n del ID del argumento provoca una inyecci\u00f3n SQL. Es posible iniciar el ataque de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -59,7 +63,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||||
@ -107,7 +111,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -140,6 +144,10 @@
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.592463",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/jiangffffd/cve/issues/2",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2025-5980",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-06-10T21:15:23.150",
|
||||
"lastModified": "2025-06-10T21:15:23.150",
|
||||
"lastModified": "2025-06-11T14:15:38.623",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability classified as critical was found in code-projects Restaurant Order System 1.0. This vulnerability affects unknown code of the file /order.php. The manipulation of the argument tabidNoti leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se encontr\u00f3 una vulnerabilidad clasificada como cr\u00edtica en code-projects Restaurant Order System 1.0. Esta vulnerabilidad afecta al c\u00f3digo desconocido del archivo /order.php. La manipulaci\u00f3n del argumento tabidNoti provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -59,7 +63,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||||
@ -107,7 +111,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -140,6 +144,10 @@
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.592467",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/jiangffffd/cve/issues/3",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-5986",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2025-06-11T12:15:29.183",
|
||||
"lastModified": "2025-06-11T12:15:29.183",
|
||||
"lastModified": "2025-06-11T14:15:38.880",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Un correo electr\u00f3nico HTML manipulado que utiliza enlaces mailbox:/// puede desencadenar descargas autom\u00e1ticas no solicitadas de archivos .pdf al escritorio o directorio personal del usuario sin previo aviso, incluso con el guardado autom\u00e1tico desactivado. Este comportamiento puede utilizarse para llenar el disco con datos innecesarios (p. ej., usando /dev/urandom en Linux) o para filtrar credenciales de Windows mediante enlaces SMB al visualizar el correo electr\u00f3nico en modo HTML. Si bien se requiere la interacci\u00f3n del usuario para descargar el archivo .pdf, la ofuscaci\u00f3n visual puede ocultar el desencadenador de la descarga. Ver el correo electr\u00f3nico en modo HTML es suficiente para cargar contenido externo. Esta vulnerabilidad afecta a Thunderbird (versi\u00f3n anterior a la 128.11.1) y Thunderbird (versi\u00f3n anterior a la 139.0.2)."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-451"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1958580%2C1968012",
|
||||
|
77
README.md
77
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2025-06-11T14:00:19.698145+00:00
|
||||
2025-06-11T16:00:23.482082+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2025-06-11T13:58:02.947000+00:00
|
||||
2025-06-11T15:46:57.620000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,46 +33,59 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
297718
|
||||
297733
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `6`
|
||||
Recently added CVEs: `15`
|
||||
|
||||
- [CVE-2025-3302](CVE-2025/CVE-2025-33xx/CVE-2025-3302.json) (`2025-06-11T12:15:25.377`)
|
||||
- [CVE-2025-49709](CVE-2025/CVE-2025-497xx/CVE-2025-49709.json) (`2025-06-11T12:15:26.977`)
|
||||
- [CVE-2025-49710](CVE-2025/CVE-2025-497xx/CVE-2025-49710.json) (`2025-06-11T12:15:27.083`)
|
||||
- [CVE-2025-5144](CVE-2025/CVE-2025-51xx/CVE-2025-5144.json) (`2025-06-11T13:15:24.823`)
|
||||
- [CVE-2025-5687](CVE-2025/CVE-2025-56xx/CVE-2025-5687.json) (`2025-06-11T12:15:29.023`)
|
||||
- [CVE-2025-5986](CVE-2025/CVE-2025-59xx/CVE-2025-5986.json) (`2025-06-11T12:15:29.183`)
|
||||
- [CVE-2025-0163](CVE-2025/CVE-2025-01xx/CVE-2025-0163.json) (`2025-06-11T15:15:29.177`)
|
||||
- [CVE-2025-32711](CVE-2025/CVE-2025-327xx/CVE-2025-32711.json) (`2025-06-11T14:15:31.530`)
|
||||
- [CVE-2025-3473](CVE-2025/CVE-2025-34xx/CVE-2025-3473.json) (`2025-06-11T15:15:29.827`)
|
||||
- [CVE-2025-35941](CVE-2025/CVE-2025-359xx/CVE-2025-35941.json) (`2025-06-11T14:15:33.797`)
|
||||
- [CVE-2025-40914](CVE-2025/CVE-2025-409xx/CVE-2025-40914.json) (`2025-06-11T14:15:34.007`)
|
||||
- [CVE-2025-4605](CVE-2025/CVE-2025-46xx/CVE-2025-4605.json) (`2025-06-11T14:15:36.847`)
|
||||
- [CVE-2025-48013](CVE-2025/CVE-2025-480xx/CVE-2025-48013.json) (`2025-06-11T15:15:41.830`)
|
||||
- [CVE-2025-48444](CVE-2025/CVE-2025-484xx/CVE-2025-48444.json) (`2025-06-11T15:15:42.143`)
|
||||
- [CVE-2025-48445](CVE-2025/CVE-2025-484xx/CVE-2025-48445.json) (`2025-06-11T15:15:42.270`)
|
||||
- [CVE-2025-48446](CVE-2025/CVE-2025-484xx/CVE-2025-48446.json) (`2025-06-11T15:15:42.427`)
|
||||
- [CVE-2025-48447](CVE-2025/CVE-2025-484xx/CVE-2025-48447.json) (`2025-06-11T15:15:42.607`)
|
||||
- [CVE-2025-48448](CVE-2025/CVE-2025-484xx/CVE-2025-48448.json) (`2025-06-11T15:15:42.733`)
|
||||
- [CVE-2025-49146](CVE-2025/CVE-2025-491xx/CVE-2025-49146.json) (`2025-06-11T15:15:42.850`)
|
||||
- [CVE-2025-49148](CVE-2025/CVE-2025-491xx/CVE-2025-49148.json) (`2025-06-11T15:15:43.043`)
|
||||
- [CVE-2025-4922](CVE-2025/CVE-2025-49xx/CVE-2025-4922.json) (`2025-06-11T14:15:37.140`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `21`
|
||||
Recently modified CVEs: `58`
|
||||
|
||||
- [CVE-2024-27447](CVE-2024/CVE-2024-274xx/CVE-2024-27447.json) (`2025-06-11T12:53:35.083`)
|
||||
- [CVE-2024-33117](CVE-2024/CVE-2024-331xx/CVE-2024-33117.json) (`2025-06-11T12:04:14.130`)
|
||||
- [CVE-2024-33752](CVE-2024/CVE-2024-337xx/CVE-2024-33752.json) (`2025-06-11T12:06:35.033`)
|
||||
- [CVE-2024-41588](CVE-2024/CVE-2024-415xx/CVE-2024-41588.json) (`2025-06-11T13:54:06.133`)
|
||||
- [CVE-2024-41590](CVE-2024/CVE-2024-415xx/CVE-2024-41590.json) (`2025-06-11T13:49:57.290`)
|
||||
- [CVE-2024-41596](CVE-2024/CVE-2024-415xx/CVE-2024-41596.json) (`2025-06-11T13:40:06.773`)
|
||||
- [CVE-2024-9529](CVE-2024/CVE-2024-95xx/CVE-2024-9529.json) (`2025-06-11T13:58:02.947`)
|
||||
- [CVE-2025-3877](CVE-2025/CVE-2025-38xx/CVE-2025-3877.json) (`2025-06-11T13:15:24.007`)
|
||||
- [CVE-2025-49651](CVE-2025/CVE-2025-496xx/CVE-2025-49651.json) (`2025-06-11T13:15:24.483`)
|
||||
- [CVE-2025-49652](CVE-2025/CVE-2025-496xx/CVE-2025-49652.json) (`2025-06-11T13:15:24.613`)
|
||||
- [CVE-2025-49653](CVE-2025/CVE-2025-496xx/CVE-2025-49653.json) (`2025-06-11T13:15:24.720`)
|
||||
- [CVE-2025-5263](CVE-2025/CVE-2025-52xx/CVE-2025-5263.json) (`2025-06-11T12:15:27.183`)
|
||||
- [CVE-2025-5264](CVE-2025/CVE-2025-52xx/CVE-2025-5264.json) (`2025-06-11T12:15:27.373`)
|
||||
- [CVE-2025-5265](CVE-2025/CVE-2025-52xx/CVE-2025-5265.json) (`2025-06-11T12:15:27.553`)
|
||||
- [CVE-2025-5266](CVE-2025/CVE-2025-52xx/CVE-2025-5266.json) (`2025-06-11T12:15:27.730`)
|
||||
- [CVE-2025-5267](CVE-2025/CVE-2025-52xx/CVE-2025-5267.json) (`2025-06-11T12:15:27.910`)
|
||||
- [CVE-2025-5268](CVE-2025/CVE-2025-52xx/CVE-2025-5268.json) (`2025-06-11T12:15:28.087`)
|
||||
- [CVE-2025-5269](CVE-2025/CVE-2025-52xx/CVE-2025-5269.json) (`2025-06-11T12:15:28.270`)
|
||||
- [CVE-2025-5270](CVE-2025/CVE-2025-52xx/CVE-2025-5270.json) (`2025-06-11T12:15:28.457`)
|
||||
- [CVE-2025-5271](CVE-2025/CVE-2025-52xx/CVE-2025-5271.json) (`2025-06-11T12:15:28.647`)
|
||||
- [CVE-2025-5272](CVE-2025/CVE-2025-52xx/CVE-2025-5272.json) (`2025-06-11T12:15:28.840`)
|
||||
- [CVE-2025-22996](CVE-2025/CVE-2025-229xx/CVE-2025-22996.json) (`2025-06-11T15:38:44.620`)
|
||||
- [CVE-2025-22997](CVE-2025/CVE-2025-229xx/CVE-2025-22997.json) (`2025-06-11T15:35:40.463`)
|
||||
- [CVE-2025-25193](CVE-2025/CVE-2025-251xx/CVE-2025-25193.json) (`2025-06-11T15:36:22.693`)
|
||||
- [CVE-2025-26412](CVE-2025/CVE-2025-264xx/CVE-2025-26412.json) (`2025-06-11T14:15:30.987`)
|
||||
- [CVE-2025-26521](CVE-2025/CVE-2025-265xx/CVE-2025-26521.json) (`2025-06-11T14:15:31.137`)
|
||||
- [CVE-2025-2884](CVE-2025/CVE-2025-28xx/CVE-2025-2884.json) (`2025-06-11T15:15:29.487`)
|
||||
- [CVE-2025-33053](CVE-2025/CVE-2025-330xx/CVE-2025-33053.json) (`2025-06-11T14:11:11.517`)
|
||||
- [CVE-2025-35940](CVE-2025/CVE-2025-359xx/CVE-2025-35940.json) (`2025-06-11T14:15:33.690`)
|
||||
- [CVE-2025-43697](CVE-2025/CVE-2025-436xx/CVE-2025-43697.json) (`2025-06-11T14:15:34.253`)
|
||||
- [CVE-2025-43698](CVE-2025/CVE-2025-436xx/CVE-2025-43698.json) (`2025-06-11T14:15:34.417`)
|
||||
- [CVE-2025-47713](CVE-2025/CVE-2025-477xx/CVE-2025-47713.json) (`2025-06-11T14:15:35.560`)
|
||||
- [CVE-2025-47849](CVE-2025/CVE-2025-478xx/CVE-2025-47849.json) (`2025-06-11T14:15:35.727`)
|
||||
- [CVE-2025-4929](CVE-2025/CVE-2025-49xx/CVE-2025-4929.json) (`2025-06-11T14:54:00.567`)
|
||||
- [CVE-2025-4954](CVE-2025/CVE-2025-49xx/CVE-2025-4954.json) (`2025-06-11T14:15:37.287`)
|
||||
- [CVE-2025-49709](CVE-2025/CVE-2025-497xx/CVE-2025-49709.json) (`2025-06-11T14:15:36.387`)
|
||||
- [CVE-2025-49710](CVE-2025/CVE-2025-497xx/CVE-2025-49710.json) (`2025-06-11T14:15:36.527`)
|
||||
- [CVE-2025-5139](CVE-2025/CVE-2025-51xx/CVE-2025-5139.json) (`2025-06-11T14:15:37.437`)
|
||||
- [CVE-2025-5268](CVE-2025/CVE-2025-52xx/CVE-2025-5268.json) (`2025-06-11T14:51:14.950`)
|
||||
- [CVE-2025-5687](CVE-2025/CVE-2025-56xx/CVE-2025-5687.json) (`2025-06-11T14:15:37.730`)
|
||||
- [CVE-2025-5958](CVE-2025/CVE-2025-59xx/CVE-2025-5958.json) (`2025-06-11T14:15:37.870`)
|
||||
- [CVE-2025-5959](CVE-2025/CVE-2025-59xx/CVE-2025-5959.json) (`2025-06-11T14:15:38.037`)
|
||||
- [CVE-2025-5978](CVE-2025/CVE-2025-59xx/CVE-2025-5978.json) (`2025-06-11T14:15:38.197`)
|
||||
- [CVE-2025-5979](CVE-2025/CVE-2025-59xx/CVE-2025-5979.json) (`2025-06-11T14:15:38.320`)
|
||||
- [CVE-2025-5980](CVE-2025/CVE-2025-59xx/CVE-2025-5980.json) (`2025-06-11T14:15:38.623`)
|
||||
- [CVE-2025-5986](CVE-2025/CVE-2025-59xx/CVE-2025-5986.json) (`2025-06-11T14:15:38.880`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
175
_state.csv
175
_state.csv
@ -152159,7 +152159,7 @@ CVE-2020-18280,0,0,a9cfb6ea53a948cf0e342ecc74a2dca2fdaa7c7b9c577376593dea94ce260
|
||||
CVE-2020-18282,0,0,fe4eba486f70f3a3cc1bb03e6652192f2f18e2129c2628985cfedb2aca0116fe,2025-01-29T17:15:10.627000
|
||||
CVE-2020-1829,0,0,4400c1c20020eb794399c17dd64935689a5a7a7d2746f03b085f845dd3cb71c6,2024-11-21T05:11:26.960000
|
||||
CVE-2020-1830,0,0,0ddce4b6a7b14fd50fb01fd83ac721a18ad075608807f694e075ac74b09960bc,2024-11-21T05:11:27.083000
|
||||
CVE-2020-18305,0,0,f3b0647b6159a86952b6442e3b6532af547f436496dadc4128ecdf1fe6d9110a,2024-11-21T05:08:31.600000
|
||||
CVE-2020-18305,0,1,78e88e61eeac2d0f895e6f06b9ee5211070c6670f420b83d3548d910f3b39c5a,2025-06-11T14:57:21.840000
|
||||
CVE-2020-1831,0,0,bf047f809ce06f3652b0ad05858afab7c0a10d9bdd8deb5396a064f23b190d96,2024-11-21T05:11:27.207000
|
||||
CVE-2020-1832,0,0,a5379d3de9d87ca1f4c2f3c869d9df03d88d520fc4adc307c04a099c784520d5,2024-11-21T05:11:27.330000
|
||||
CVE-2020-18324,0,0,f27a404289abbb4dd3bff4d8964c2865181bea9a08ee9c8e021397de4d101543,2024-11-21T05:08:31.823000
|
||||
@ -185229,7 +185229,7 @@ CVE-2021-43893,0,0,83c2b062c1bf318433a78f16824511f05a8e975f4509d93564b2672be6494
|
||||
CVE-2021-43896,0,0,5a5de57168b4daf05754a217ea61d4778ae325d6caa5a5f558b7b41691048a65,2024-11-21T06:30:00.013000
|
||||
CVE-2021-43899,0,0,f98df78e0f6a9d56123d89aee7e2089e0298067fdca83f4ec45a79af53338ec4,2024-11-21T06:30:00.137000
|
||||
CVE-2021-4390,0,0,f480971a47a33e54aadb44c3bfffba7d444515713962bf1728f577c64be9d2cd,2024-11-21T06:37:34.873000
|
||||
CVE-2021-43905,0,0,cb114456ba8acd11de724d84eef3dc3431add41fac4b657ee212db1d6b30528b,2024-11-21T06:30:00.253000
|
||||
CVE-2021-43905,0,1,3caa28adc749d6ee8faee4b16c19e43afb080bcde35d0f4090aa5ea92829fb13,2025-06-11T15:27:02.517000
|
||||
CVE-2021-43907,0,0,84c7124b996d2741fd86d8fae9c03ba9e8ecb5e7f360f5baf94ec75222ca0e29,2024-11-21T06:30:00.367000
|
||||
CVE-2021-43908,0,0,938da751d1a63ef167c78541cda960e411157cb3ab02ffb97d3ccd76c8075a51,2024-11-21T06:30:00.473000
|
||||
CVE-2021-4391,0,0,820923a9ae9bad29e982f47ca4386e54fe0a49316963a7abf8a208f4d6872a69,2024-11-21T06:37:35.053000
|
||||
@ -235164,7 +235164,7 @@ CVE-2023-43586,0,0,0b179b1973420f89695bd4033aa5b4a7070a9f607b4d363509cf96797c77e
|
||||
CVE-2023-43588,0,0,779f8c46f256b6dc6c509095540e7cca1b778b261a9122490bb338004c250d70,2024-11-21T08:24:26.977000
|
||||
CVE-2023-4359,0,0,c526edc2eda072a9f787def5c5634b44a07e8f184f5668a09865baa12054ef85,2024-11-21T08:34:55.737000
|
||||
CVE-2023-43590,0,0,a24b0a4d4fbd849cf9c8576934def2996908e56c45e589c0a4718de3c52b705a,2024-11-21T08:24:27.107000
|
||||
CVE-2023-43591,0,0,7089bdd917ed1a6d5c9808def1f484fb67c2e6a88e9a9ee81ab645fde8d2e80f,2024-11-21T08:24:27.223000
|
||||
CVE-2023-43591,0,1,861183d95cbe5163fd4eaffaf48e44beda937f7ad3929622dbe4bec2b13503ba,2025-06-11T15:15:26.057000
|
||||
CVE-2023-4360,0,0,bf776b564f3d9f4caa1d912b4d5307249bcc398bd846123f845e5bb5ceeeb373,2024-11-21T08:34:55.873000
|
||||
CVE-2023-43608,0,0,6c27dbdafa55f2b7aa33c3b628ee6a7a91ecbd84b5bb3689ac1f00133224f13b,2024-11-21T08:24:27.367000
|
||||
CVE-2023-43609,0,0,75f30095c4f4e4e457e17ae12eff03d46c5fbd1c1d424a29e6514e4d8050cc7c,2025-06-10T19:15:26.357000
|
||||
@ -237500,7 +237500,7 @@ CVE-2023-46845,0,0,8cca69f35c18b37d1e400c1780d51f45ac93f2d00dcfe2123c24403e52459
|
||||
CVE-2023-46846,0,0,b73bc8a6a9a81e5c869755df7f9ec3e498228884dcb6e74b5679aa1ec816512a,2024-12-18T01:15:06.010000
|
||||
CVE-2023-46847,0,0,25226d6c3ea5f3ae387efea28db924389911d043f96c3ee615accfee7a912619,2024-11-21T08:29:25
|
||||
CVE-2023-46848,0,0,fc1a3cbe733e7d75d5767c3bf972500d8208d1d249d69703d688044c0e53a543,2024-11-21T08:29:25.190000
|
||||
CVE-2023-46849,0,0,d939db9ad23b15e2c76e72ad352b3bf6d630c9fe03bd4a9ee0d93213deca79b3,2024-11-21T08:29:25.337000
|
||||
CVE-2023-46849,0,1,feab4a74864884fe4c1f0bc90f1c801b388b79ae3c68ce83cc030b25eae0192b,2025-06-11T15:15:26.793000
|
||||
CVE-2023-4685,0,0,01f57904079cf1486cf9c3b39be3f5ef970724886f67adcadb32146d37100d87,2024-11-21T08:35:40.977000
|
||||
CVE-2023-46850,0,0,d3e49645b8e5224f7ccc9a68e9bc661c5d6870d2a7540848cc979d9532ef9df1,2024-11-21T08:29:25.480000
|
||||
CVE-2023-46851,0,0,95521f9ee5bfe22433c7bdb3d910a9994749139964e2e9dc9b9f71db17626997,2024-11-21T08:29:25.597000
|
||||
@ -237848,7 +237848,7 @@ CVE-2023-47325,0,0,64c4a3c263fdb1b7b2856ddcac672fcec2e6bdc32fd55784f6f9223aa35de
|
||||
CVE-2023-47326,0,0,f8ae019487cdb5a73bdaf9901b0c7c8370bd0eae62e999d224b4ead1cd422864,2024-11-21T08:30:10.017000
|
||||
CVE-2023-47327,0,0,7e1735cd8110b984c51f8790c647d737852287cb7ddabda3f7101ec50e44b751,2024-11-21T08:30:10.157000
|
||||
CVE-2023-4733,0,0,f64bc1cd14515c3e2f0ffd57a2c6ddf0ebb49770cbcd875940ceea7d5922513c,2024-11-21T08:35:51.280000
|
||||
CVE-2023-47335,0,0,d507cff56867e141e9b35e917d642811138f4f3418bbdb0b2bda100510e4ec09,2024-11-21T08:30:10.297000
|
||||
CVE-2023-47335,0,1,7f0f1b3ede790346f8fdc95c28bd4aafa8ce52c0d8ba1eb98786b97523ac59b0,2025-06-11T15:15:27.043000
|
||||
CVE-2023-4734,0,0,fa674d9bfa6149b4cd75315307dcee77ad9f41f1eb4299d08b9ed964b7651e72,2024-11-21T08:35:51.477000
|
||||
CVE-2023-47345,0,0,c1afca5fed4bd2fea915f1410e3af656e88ec1a4f8a86fac2c05cfee6023b97a,2024-11-21T08:30:10.440000
|
||||
CVE-2023-47346,0,0,f0345c801d164d12b269122c80a5ca2bc3338a6ea8f01bfc839bdd5327c36e73,2024-11-21T08:30:10.577000
|
||||
@ -237922,7 +237922,7 @@ CVE-2023-47471,0,0,32f43880fab73f05f590bf4ae7a80f5aae9c2e32aa967e7aee7491151341c
|
||||
CVE-2023-47473,0,0,d622eae7627e9a5cab25305aab5189a781012f765170cec24ebf78583cecf7f9,2024-11-21T08:30:20.240000
|
||||
CVE-2023-4748,0,0,8663095fccf5eff2d0970e24775dfab925ddc57ca3819cd539c72d83d5072af8,2024-11-21T08:35:53.580000
|
||||
CVE-2023-47480,0,0,5f1bc70735285e7f17e688622b8302ddd92cfe9fa40c1ad6149d2b2ea01d7f12,2024-11-21T08:30:20.460000
|
||||
CVE-2023-47488,0,0,1530eb6da15eb63c7f014815704b70974b4f5a7e99aa62f9d0484837b8894197,2024-11-21T08:30:20.677000
|
||||
CVE-2023-47488,0,1,1e55d1d8648bcc44ad730e4706833754dd03b7c6f8a0dbc969fd67bb265443b6,2025-06-11T15:15:27.260000
|
||||
CVE-2023-47489,0,0,e90a28b4fe0f175eb4ea0e3160524e16396ee8b9ead64f7259cb2e16cf8380ac,2024-11-21T08:30:20.820000
|
||||
CVE-2023-4749,0,0,ca6e00963a427aee3acbbc8d24dc61f96bd67c4c853715d4eab60b5c01e7a8e9,2024-11-21T08:35:53.720000
|
||||
CVE-2023-4750,0,0,9d45405700fae72668fa764ee604d5c3a396ef6133cf85d1aafea757c35ead25,2024-11-21T08:35:53.867000
|
||||
@ -238085,7 +238085,7 @@ CVE-2023-47670,0,0,7645b4d9cd07d33c825e377864a7ee069ca2942aba7ebaf883928a7f6bf6b
|
||||
CVE-2023-47671,0,0,150f2889cf9716f4330007aabcea7dc3947d225a0fdf861656db93facb2c4aad,2024-11-21T08:30:38.880000
|
||||
CVE-2023-47672,0,0,7a32ee70b53201a29d0fb10a0628e7c1f353340f632da50099e170710e302eff,2024-11-21T08:30:39.013000
|
||||
CVE-2023-47673,0,0,521b4a22397c0b0b603c5b9c441b52d38a22242d3767568bb9889bfd3c0299c3,2024-11-21T08:30:39.140000
|
||||
CVE-2023-47674,0,0,13e92f1c68ee32fccae49e819128ad8764f72000557cd58de7f6c9bd5ef885b3,2024-11-21T08:30:39.267000
|
||||
CVE-2023-47674,0,1,8588486fc47222e8a69584a304b545b0c53386704bf80ce94bb3abfdc7b41fc8,2025-06-11T15:15:27.487000
|
||||
CVE-2023-47675,0,0,c86344aaed815eec4ee17290ba6358516495f8d51a918dee1a4e4b6eee2fa5fc,2024-11-21T08:30:39.423000
|
||||
CVE-2023-47677,0,0,3caebbd65cda08c6ddb656fd37c737c3e9211c156e00b441627180836d2293b8,2024-11-21T08:30:39.543000
|
||||
CVE-2023-47678,0,0,bd43ee5401534c70b4dd1db98e6c2d8e8ef452acc10c37d537580fa6a5a6a699,2024-11-21T08:30:39.673000
|
||||
@ -238386,7 +238386,7 @@ CVE-2023-4819,0,0,071e675aad05bfa8cb649b9b25d4c0c3f5a75f8cb8287b9cc5279791856262
|
||||
CVE-2023-48192,0,0,4240cd8250bfc3eb14f439d678088098f9702795e0b43f8d895e1ca458b6137c,2024-11-21T08:31:11.440000
|
||||
CVE-2023-48193,0,0,527bc3f183def1e9c17e3340d1cf773745c4085555f2641c3faa604e93f7ac4e,2024-11-21T08:31:11.587000
|
||||
CVE-2023-48194,0,0,89ed483ac6c22c85dd7489b795e294c3a4fb1883ed272f16d543b939692756f7,2024-11-21T08:31:11.740000
|
||||
CVE-2023-48197,0,0,541e2e2dbadf4c1fc33a37b79d38875bdb81d89915a88dc61cd7177cc00c0dd6,2024-11-21T08:31:11.990000
|
||||
CVE-2023-48197,0,1,2a8d5fa0eeb5fb5d829e67c9d58f8f5cfd2ad44c21835b251cbbd84f8b166774,2025-06-11T15:15:27.713000
|
||||
CVE-2023-48198,0,0,e914d510dc94ba3802fedfbde5ce0c09e7bbfb1ed10c2616609647a73a58c5bc,2024-11-21T08:31:12.140000
|
||||
CVE-2023-48199,0,0,02d93cf4dc9ab71c968304332cfbd654d91ace976c5191aacfefe4728b8d3636,2024-11-21T08:31:12.297000
|
||||
CVE-2023-4820,0,0,a231d8e236cec098509c357874409b1b9aff7f97a915cf7a95f688fac9290237,2025-03-05T17:15:12.883000
|
||||
@ -247569,7 +247569,7 @@ CVE-2024-12426,0,0,e28649f93ee0f137724688a87f52bd9672834bc574f6f02af35105ba38dad
|
||||
CVE-2024-12427,0,0,86507f7f094bd68cc6d848d7d1a03f7517cc83f79982983f55ec3c43fb57f866,2025-03-04T17:24:20.370000
|
||||
CVE-2024-12428,0,0,0dc42c82097510dcd67ba200f4a63250bd059d1ff61bcff7d39f7b5f34a5af10,2024-12-25T05:15:06.920000
|
||||
CVE-2024-12429,0,0,df12f7abbef94c2382f1dae8fbc46ef25fa72524515700b274279ec69b985d4c,2025-01-07T17:15:20.527000
|
||||
CVE-2024-1243,0,0,6ca5350df3abbfb06b377ab24d0559ebadb310b91ffad1201598980b13c2dcc7,2025-06-11T02:15:20.270000
|
||||
CVE-2024-1243,0,1,390c6bcaa6fe14d46e623a93ee7f54c5976f87585670b1e2585fac75e06a0df6,2025-06-11T15:15:28.230000
|
||||
CVE-2024-12430,0,0,3623fd73564e8c219fafc425eac3c2c16708d4d7c0f61297e30059f08601a297,2025-01-07T17:15:20.703000
|
||||
CVE-2024-12431,0,0,5644edd69c348df2239cdc93e705cfed1755dba38cc5e3639c6fa22724a9f624,2025-01-08T21:15:11.760000
|
||||
CVE-2024-12432,0,0,3d67b932349f6253a91fa970f1501aba586896a462aba17731bbe90a2499433d,2024-12-18T04:15:07.947000
|
||||
@ -249052,7 +249052,7 @@ CVE-2024-13861,0,0,360211110586d48dd70dc723db2b58a14ced33576691ad94d58c50e823722
|
||||
CVE-2024-13862,0,0,a57c4fd8f73c8f2ef94b8d9a3f5417da4d83ca39674a155ef66d664233e36faf,2025-05-21T19:33:15.200000
|
||||
CVE-2024-13863,0,0,c7caee7e5c93d81b9af8b0138e75c688fb9febb3d7538b5b3534c3b224573bb9,2025-04-29T17:35:22.800000
|
||||
CVE-2024-13864,0,0,c8005b10478f0295163ea4c5800d8b7b3333680590f2b8cc9e73f5cd9636efe3,2025-05-06T15:05:46.537000
|
||||
CVE-2024-13865,0,0,43bd178e19baead4cb7ac71c7cec0c8d0b10d0e9d09c994c9739aa715cdd0945,2025-05-20T20:15:36.660000
|
||||
CVE-2024-13865,0,1,50363ee1a4dd2aad050e587c8479124b097c749bbfa0e978e0deb9bccb0eac8f,2025-06-11T14:55:38.617000
|
||||
CVE-2024-13866,0,0,a701a4a58094c13382e4ccc07ff53f8edcaa8a7b85d65b60e80e37b7129c441c,2025-03-05T09:15:09.587000
|
||||
CVE-2024-13867,0,0,d1ccd3c88095b1998a7fe8f4f64aebb963278c8b08e66fe2014f445cd5f48e2a,2025-02-18T18:41:21.660000
|
||||
CVE-2024-13868,0,0,5f90da423a6fd804019ae30399be671545219c7108740f7ff15c5b00d0b55e4b,2025-05-21T15:28:50.360000
|
||||
@ -249401,7 +249401,7 @@ CVE-2024-1659,0,0,89ae27a5a9ba7c42d9a91c4b580358dd8ae6b774fde1ed1f21377fc2426997
|
||||
CVE-2024-1660,0,0,bcc7a96f40649c3702a4d488bfefc13113e0fc4577fc23a0f7fcc4b75f320a14,2025-05-08T16:48:49.267000
|
||||
CVE-2024-1661,0,0,57419dfac19fc8b1117ab03280b3c2a88810749b66775f5fc9b43a910e481cd7,2024-11-21T08:51:01.803000
|
||||
CVE-2024-1662,0,0,147b493f649bc748f75384551192827ffc56f17812a25b829b7ebf0a1ed43a45,2024-11-21T08:51:01.957000
|
||||
CVE-2024-1663,0,0,18b59c28a9054f4610ca76e76fd8125e8b963a367dbb4128ba7f29df0d0e6592,2025-05-20T15:16:03.367000
|
||||
CVE-2024-1663,0,1,399541b36c7116de33186c7cee0ffafbb6e6d644b9c5d194c0e56fd4b5a72071,2025-06-11T14:48:53.673000
|
||||
CVE-2024-1664,0,0,1445c655402916291b15040a6ae8d2de79ad43087a8039e72ecfdff51d852516,2025-05-13T00:44:51.903000
|
||||
CVE-2024-1665,0,0,a3c3185e1ed099faa2439b0c30b394f32019efc90b2215de07a537212ac7a098,2024-06-07T17:15:49.850000
|
||||
CVE-2024-1666,0,0,089335f87a6dcbe16f454cd776a838285b6d754521e9a0f8137d17bef352cfba,2025-01-10T14:34:01.473000
|
||||
@ -254763,7 +254763,7 @@ CVE-2024-2639,0,0,45a532020fe06674d823d0b4e264d15e0ee33a5111617c7171979d4c53ef78
|
||||
CVE-2024-2640,0,0,2d97cdb3e462b6f0c784d4db1a7d7c20cbceea5fa11206e832577d8c929d2bf6,2024-11-21T09:10:11.623000
|
||||
CVE-2024-2641,0,0,70a70be0b042731ccdc73536925161bf9a9aa50cb2b7e715353e185314654c4e,2024-11-21T09:10:11.820000
|
||||
CVE-2024-2642,0,0,52ad972556cc065c34954675f727e5508f8caab5590185ce6cde82cc71dc74fb,2024-11-21T09:10:11.963000
|
||||
CVE-2024-2643,0,0,ce30534635125a64f23d3444d51d6d5c210731228d7b19e111eda7d15cdd9ea7,2025-05-20T15:16:04.070000
|
||||
CVE-2024-2643,0,1,05a64080cba78cf699d29a6069ac5af707170ffbce5faa54487afbdb0e9edb1e,2025-06-11T14:45:57.147000
|
||||
CVE-2024-2644,0,0,4048e8752f27add71acd228a0d07e2962cd563fe85cb710df0b865d642724f8c,2025-02-07T15:07:30.080000
|
||||
CVE-2024-26445,0,0,1e1692a3ab92c100abf93e1b088c041121edd2a6fdb5057ec8a7e9ed1a7b0946,2025-03-25T16:59:36.567000
|
||||
CVE-2024-2645,0,0,6fb823d4a9b88e90db41973fcb8e2b731f2971c605b6e0b00e416d679a1621d0,2025-01-30T15:39:23.947000
|
||||
@ -255746,7 +255746,7 @@ CVE-2024-27441,0,0,8627ee176bbd8db9047f0ac2824f85227251736cca8356f59d7164883e716
|
||||
CVE-2024-27442,0,0,b113225cd79b3d0b44b8bc15a83e3bd1b29f742e07843ffbf5a451ca58f7ad33,2024-08-13T17:30:36.833000
|
||||
CVE-2024-27443,0,0,3c0a90cacc761474c320235ca1b019a4cad7bf02e5db3b5bcee9676fec4b0c87,2025-05-21T18:43:52.287000
|
||||
CVE-2024-27444,0,0,f2782679746ac825122096e332d365a1377f937908fa850657f47ae7562722ec,2024-11-21T09:04:37.470000
|
||||
CVE-2024-27447,0,1,f6d6d9fad48a31686fdab5f9950d31651bead604f5590caf8910094e154c5642,2025-06-11T12:53:35.083000
|
||||
CVE-2024-27447,0,0,f6d6d9fad48a31686fdab5f9950d31651bead604f5590caf8910094e154c5642,2025-06-11T12:53:35.083000
|
||||
CVE-2024-27448,0,0,8d84df435d462af3b84b4a4f1503868d7e64fb34bcf7329beab88ef9e1029260,2025-03-13T15:15:42.293000
|
||||
CVE-2024-2745,0,0,28743d3482c4dc2cc7e95a6a28bdb765faa2729a76e91dd4c556600c182f0f12,2025-02-25T18:36:41.020000
|
||||
CVE-2024-27453,0,0,d7a686cd701b8be9d28be91ce51b1a48b487049402a86408c25fdcdc51bc0bfb,2025-06-10T17:58:18.297000
|
||||
@ -255827,7 +255827,7 @@ CVE-2024-27623,0,0,0b8613e0438e050befc8caafef4caeb2c7fedf67a19158500b4830afaf3b8
|
||||
CVE-2024-27625,0,0,6b594fcfc101fa835d824b87493f4b5d8cf00a7664f013cc884858d547c79926,2025-03-28T16:07:53.420000
|
||||
CVE-2024-27626,0,0,9a1abf5d0b8cb2d3b863768b43ec83911190b875da99fdca947dfb8d0f43eff6,2024-11-21T09:04:49.480000
|
||||
CVE-2024-27627,0,0,64e619d9251dac6d6016764b95186a6975a71f8714a3967a40144f57f22acc23,2024-11-21T09:04:49.697000
|
||||
CVE-2024-27628,0,0,1f8afca8560984d1e89d56d5ba3d725ffacfb46d6fb433f79a414003de710b28,2024-11-21T09:04:49.920000
|
||||
CVE-2024-27628,0,1,46387e1fb6677fef5f092ea931a292681d4b56138363088d2c6117deec1853a1,2025-06-11T15:22:56.587000
|
||||
CVE-2024-27629,0,0,925d6c515470e75988e5c00e502d5ff2d6b8836f5e5c3c8e1facf7db93bb0b30,2024-11-21T09:04:50.130000
|
||||
CVE-2024-2763,0,0,3f18bfa4fd358968aa90c50d9ee28b19b5412989c011c855e39ada9c410ddc2c,2024-12-12T17:31:50.877000
|
||||
CVE-2024-27630,0,0,87a64c68353f0154cf4feee5b64e5623b367aa0302eeabb3b4300ca1b5a106e5,2025-03-13T17:15:30.070000
|
||||
@ -260018,7 +260018,7 @@ CVE-2024-33110,0,0,6ffbc94f167a52dfbd0ed621b524235b74f27a94f81d2620691ca07e335ee
|
||||
CVE-2024-33111,0,0,17f4a588b6771453aae4fc0d8fe54488d2c27b36ab3b37893b9ded6fd2912f18,2025-05-21T13:02:32.660000
|
||||
CVE-2024-33112,0,0,f8ad2bcf8d7e340ab8b56d4ec4e1bfe3463c718134abce8b16f9a87aaa63e418,2025-05-21T13:02:30.203000
|
||||
CVE-2024-33113,0,0,7cf7987cc0dd6caecd85afedffd5aa13c551f5a0cf5e90dfd19e9f43dd0dd370,2025-05-21T13:02:27.457000
|
||||
CVE-2024-33117,0,1,528352eca85edaf59d5ef88e311d6c940ccae0f464a8c238d0cc95b7c6f9cd01,2025-06-11T12:04:14.130000
|
||||
CVE-2024-33117,0,0,528352eca85edaf59d5ef88e311d6c940ccae0f464a8c238d0cc95b7c6f9cd01,2025-06-11T12:04:14.130000
|
||||
CVE-2024-33118,0,0,72c8999c88c2b5558e4a8f33a58e566f4eb8caa38d2e54a61703d28769d04715,2025-06-10T19:43:40.383000
|
||||
CVE-2024-3312,0,0,5f7abfea07e26708b46deb725eba9cf7ab27075e45367056ede9366567e02312,2024-11-21T09:29:22.277000
|
||||
CVE-2024-33120,0,0,6059ae7834dce7456d75514ab19c32a74ce0bc8de7f67b7ab7f5e8e4997c2e7a,2025-05-01T14:55:22.393000
|
||||
@ -260413,7 +260413,7 @@ CVE-2024-3374,0,0,420f73150af02275166b9c440c567922c144b0ea7f73169b89eb730ef81c3a
|
||||
CVE-2024-33748,0,0,acc248d0cfbd8692cea48635d656011bb983fa9bd242614a24fa39140acf6529,2024-11-21T09:17:26.140000
|
||||
CVE-2024-33749,0,0,2749a1eef01de8a6200de4cabc78dc3e00a5a4d8cb932c669d1e90435b0ca346,2025-04-01T18:05:32.370000
|
||||
CVE-2024-3375,0,0,9705036410c25948012494141e27b48a4ee424b1500d49272b52c98930b4fb01,2024-11-21T09:29:29.443000
|
||||
CVE-2024-33752,0,1,cb9a92a990be6bf2f2831adfde5bc6f3b734cb86e9dd2d39a6e6c3426345c897,2025-06-11T12:06:35.033000
|
||||
CVE-2024-33752,0,0,cb9a92a990be6bf2f2831adfde5bc6f3b734cb86e9dd2d39a6e6c3426345c897,2025-06-11T12:06:35.033000
|
||||
CVE-2024-33753,0,0,d6dd9a560aacef7fbfdb8e582f966b14086954aa85705d5f248034003e649ad3,2024-11-21T09:17:26.740000
|
||||
CVE-2024-3376,0,0,d0b726129a0cb4aa357ddbea81c1414fafc204c7b2176615db21f058e6802519,2025-01-17T17:41:21.647000
|
||||
CVE-2024-33763,0,0,efdd783f0638df5aefc0de37545ea93326aee139131b46e1d8e52abd6f3fb384,2025-04-15T17:14:08.027000
|
||||
@ -260434,7 +260434,7 @@ CVE-2024-33782,0,0,7fd2e15e493f98e5511ac2818217f87418960726424b1be6b5b59f20ba784
|
||||
CVE-2024-33783,0,0,3efb6717dc071bcd4966a7972f6670fd4553a3d85347d37b83769ae70d5d4aa4,2024-11-21T09:17:29.247000
|
||||
CVE-2024-33786,0,0,e1fb385dd8747da32e59253a9ffdea319cd8cdf03f2ca73f386cdc040ae670ac,2024-11-21T09:17:29.420000
|
||||
CVE-2024-33787,0,0,c49a88a43a707c2472f311af9a25d218e0650695fd55867c121db961e1d0f0a5,2024-11-21T09:17:29.593000
|
||||
CVE-2024-33788,0,0,43883aa11c8f8d9e2b0e9c2a3228de314f0cbb5388933699b91e2c176c156f8e,2024-11-21T09:17:29.797000
|
||||
CVE-2024-33788,0,1,d9e631d68ae2203702b7e708decaf819d9af63c25e4d0516bd7f43a761e5472b,2025-06-11T15:39:33.297000
|
||||
CVE-2024-33789,0,0,5986e92c6ccb4c451262b2b9902891f0ea70e1b2b0fa3b4355e2c35998fcde42,2025-06-10T18:01:58.607000
|
||||
CVE-2024-3379,0,0,ff4b29a94fdd9578584432ff10eeb3895455cc484ac7d59b569ca6f419a0ff31,2024-11-18T21:30:49.947000
|
||||
CVE-2024-33791,0,0,cd712f1b08608ec404f57f0c2d9228e781ce3c7f5333a295e303b9e9ebade340,2024-11-21T09:17:30.170000
|
||||
@ -261005,12 +261005,12 @@ CVE-2024-34488,0,0,1c8363a756b1db7c16aa9d13bb9481a58a515d14b8b4ad97e6464e737eefc
|
||||
CVE-2024-34489,0,0,e38724172e0a0c52a247f1048d162135594d6d51d73ed3946e5efab6231bf9c3,2025-04-15T17:39:08.930000
|
||||
CVE-2024-3449,0,0,e1530ccb36d47a9f2f107bc6ba4716b9b546171ff116ec5264773a56f263e670,2025-02-11T02:15:34.650000
|
||||
CVE-2024-34490,0,0,99bee308a871b5c1e5cc8ac5d90e0aff0732098a9a5af8f52bdfc4827b12fbed,2024-11-21T09:18:49.207000
|
||||
CVE-2024-34500,0,0,ad0d4277fb282ffeba130e48b29d422feab82a804fbd90a55147b70fa341bf7e,2024-12-04T21:15:23.877000
|
||||
CVE-2024-34500,0,1,890c3fc863628ee6244d3590d0d4f94a07e3f72d4f15b7f39f4ce19c729fc4da,2025-06-11T14:44:14.040000
|
||||
CVE-2024-34502,0,0,76aeea82543e0b722fdedcdb5720bd94dbdd5a58653d6c0fe9797dd2b1c558cc,2024-11-21T09:18:49.567000
|
||||
CVE-2024-34506,0,0,765d28adb88f0afe403385b61b81ec66e649746dec0e99fdef13c9e005ff0645,2024-11-21T09:18:49.790000
|
||||
CVE-2024-34507,0,0,d148d49269b067aac1ed2e5c7c327d93c5f56910a5e7ae430eca8a9fbf2ef9eb,2024-11-21T09:18:49.997000
|
||||
CVE-2024-34508,0,0,c837d85f215debfd4876cf202e711a6ae35fdcbae2f4f24a57d2ef7ef10c5af2,2025-06-10T17:44:33.870000
|
||||
CVE-2024-34509,0,0,18b67055124fa20b0e91c183169f58ecae6378de7abdd8b999f1e0307f71e986,2024-11-21T09:18:50.360000
|
||||
CVE-2024-34509,0,1,244a1e513fdb31a71b9a2847887cf351dcaa2d407387468ade35178704c29e41,2025-06-11T15:35:22.570000
|
||||
CVE-2024-34510,0,0,0cd296a8ed9ad583e4681fc3af8f3a5c25699e2d2db65e494d34dafe2b8c0615,2024-11-21T09:18:50.597000
|
||||
CVE-2024-34511,0,0,c1d20a47728b6c5526364d02e8958d8fb0539448423cf5c76333bac10d97f143,2024-05-14T15:39:15.780000
|
||||
CVE-2024-34515,0,0,b2a5f6a619eb7e9f032aeb367dbb16cc9eea3104e0bc1ce005d69ffe8c66635e,2024-11-21T09:18:50.773000
|
||||
@ -263350,9 +263350,9 @@ CVE-2024-3739,0,0,e485b7726bfb9c0e0538daf95db79a608df3dc6996a1c1fff88cd1b1e128d7
|
||||
CVE-2024-37391,0,0,83604059a0a3493e2890c3d7d2ec3ff1f78123fc0b5c774b0cb9659167e26236,2025-03-13T15:15:45.533000
|
||||
CVE-2024-37392,0,0,2ddcfdda121ccf673d3c3575ba342373b49a9baac2c6a11d1f9b50a7a51a719f,2025-03-20T14:15:19.487000
|
||||
CVE-2024-37393,0,0,59f9709c253a77f24571bf0211deb5a06ff1bfae384e16dec166534c4a1c2a5e,2024-11-21T09:23:46.627000
|
||||
CVE-2024-37394,0,0,8659e7677c2e6a6b5663456a11183774f367d0f5f5c99a0e7ee7c8cc4159dda3,2025-06-10T18:15:29.527000
|
||||
CVE-2024-37395,0,0,fbc3f124796da6de01089ac670eed86fa687af889d780a1b50b5136c8c1fa4d8,2025-06-10T18:15:29.660000
|
||||
CVE-2024-37396,0,0,ecc5302a6eb03fa788bfa1b2bb89251461d308c62303a273d379d93f827194ba,2025-06-10T18:15:29.773000
|
||||
CVE-2024-37394,0,1,c396580351084a76f64893ffc3fbae6cbf4d916fac300f0625e760c38ae7779e,2025-06-11T15:15:28.363000
|
||||
CVE-2024-37395,0,1,9b1b4238374b8a3a078af760cc5f8279324e38e6bdbc11e60f9342e52b652c2b,2025-06-11T15:15:28.567000
|
||||
CVE-2024-37396,0,1,f604338138787f47fc5eafce537dc52b61f551d3945633e08dc1ff1b419d3eb0,2025-06-11T15:15:28.753000
|
||||
CVE-2024-37397,0,0,645394d57366af4d14bd72b0f709a5f25542d1f984f3b92daf1f425614dbe561,2024-09-13T16:35:09.630000
|
||||
CVE-2024-37398,0,0,0f42760c0326cdea8f98f78b855bbf63b71770b97a72517371b459e84e271523,2024-11-18T15:23:23.543000
|
||||
CVE-2024-37399,0,0,91513a99b1995bb678a44db233b24968cd7625f00c77086c4c8d80914d8fefca,2024-08-15T17:31:49.067000
|
||||
@ -264896,7 +264896,7 @@ CVE-2024-39316,0,0,45ccc4606c1ced74f32c315d82c11378f05d7721ddef5999e7262273275ce
|
||||
CVE-2024-39317,0,0,a0fc4d71b5cabdaeb3b999c76cc981eac10eecf8294b24aaf6ecf119a554904f,2024-11-21T09:27:26.850000
|
||||
CVE-2024-39318,0,0,6764e76c817e87d695ea3993b86a3354d209bb056859b5c07dcb19565385d010,2024-08-01T12:42:36.933000
|
||||
CVE-2024-39319,0,0,6b3c8929f0aadf0dfeafabdb305420267b5eaf52a130cb6d182c3fd60933f087,2025-03-05T15:16:44.403000
|
||||
CVE-2024-3932,0,0,e1e6e934d506d463f318dcd7b6195b8fede3f030a5382e5fa87592a6b9829b2f,2024-11-21T09:30:43.703000
|
||||
CVE-2024-3932,0,1,bf553d895b692d20f52023342a9d74746f30bd6954940b547fda40e0807d0ed4,2025-06-11T14:15:29.120000
|
||||
CVE-2024-39320,0,0,e4877e1d00ea378952f1c53c996ffb9e5141d5f98d9781e6944ef5bef1cdbd3c,2024-11-21T09:27:27.230000
|
||||
CVE-2024-39321,0,0,801cf361a46239e192f4acfd721bba0cfca689a711cbfe4c715ecc082a7cb3ff,2024-11-21T09:27:27.390000
|
||||
CVE-2024-39322,0,0,68c3b3a36d7457c8578c4e6cf1f0ffa507f2e1e008544080cce5882e03d76176,2024-11-21T09:27:27.537000
|
||||
@ -266451,10 +266451,10 @@ CVE-2024-41482,0,0,0a596a5cf7b27067c86547cf8e385cb1be782f18b5f9b3af58ba9ccf7350b
|
||||
CVE-2024-4149,0,0,ce35c5dabaf9e62f62b27cc2db90363703ad2249bc96cfb9d4c9aa830d3e1498,2025-03-26T15:15:52.433000
|
||||
CVE-2024-41492,0,0,0f8b4f7028b46594d815901b3c46f498a5d62420cc14f100e4b212c233005a09,2025-04-07T17:27:14.087000
|
||||
CVE-2024-4150,0,0,2e8c0a57bcb392581939b062355027d1d8486c47fcac2388b6838611dbf235a6,2024-11-21T09:42:17.333000
|
||||
CVE-2024-41502,0,0,5029d7ae53258a3cbf50ec4c92c2614074d439128dd03a3ee865a2a5eaf5fd4d,2025-06-10T20:15:21.470000
|
||||
CVE-2024-41503,0,0,3f2bf3e731d782e3e7ef0d8c1c0b40b826a768bdc0773a433e02bd2f6c25b5fb,2025-06-10T20:15:21.610000
|
||||
CVE-2024-41504,0,0,37067d42d1b425849206a99c4fa3d1a775facce230487c29a50bf5bc10a01177,2025-06-10T20:15:21.733000
|
||||
CVE-2024-41505,0,0,123247ab5738cc46457400910d8683f2f005356335856263f36c4cc9a0d308a4,2025-06-10T20:15:21.850000
|
||||
CVE-2024-41502,0,1,035d055d0e91c1527d137373b8062b2150c5cd7aa2dc7be14e3cacd66fa5a35e,2025-06-11T14:15:29.773000
|
||||
CVE-2024-41503,0,1,8da4af5d3a50d54b27269f49fa1056a51abe7cb78e69c01744b410880ee07958,2025-06-11T14:15:29.950000
|
||||
CVE-2024-41504,0,1,cce64627de2833ddfd9a8fa00aa06bb5e2cfad2aa56ce998456ee0b655d2b2e4,2025-06-11T14:15:30.113000
|
||||
CVE-2024-41505,0,1,38b74bf275a77be87813a8a3b3a4c994cb401dc3608de63a6be612a5f2abcf29,2025-06-11T14:15:30.277000
|
||||
CVE-2024-4151,0,0,337c26dffc6a0b1164159cb60fac00060ef9443ae253113be62690b03c8c28be,2025-01-31T11:15:10.620000
|
||||
CVE-2024-41511,0,0,6347d6e8bdca9e61881aa8b3e3ce915cd91cf5be437f01825e5d12236e6d66dd,2025-06-02T17:41:35.250000
|
||||
CVE-2024-41512,0,0,6c48f03f5a62a673b28167efa2657e1883db56964e6cb4fe91d57cc6cf6d0d2b,2025-06-02T17:40:46.877000
|
||||
@ -266485,16 +266485,16 @@ CVE-2024-41584,0,0,8ee9ae082d5209bf32a9612fbd142972ee3d4ff51fed2ea5dd87a62b3ae6a
|
||||
CVE-2024-41585,0,0,f603abcc7adc50c0f0418039db97e6157e5d644c828ff6d6a43a1148e2cbdcd7,2025-04-10T13:41:39.553000
|
||||
CVE-2024-41586,0,0,2ca5c96a0d26f43109380a195dfb7e58cb016f80ea656e1dca0934dfc33fbe62,2025-04-10T13:41:46.850000
|
||||
CVE-2024-41587,0,0,49423dacd1b4227d5ab73e5f650b6e45277b0abc6417b9dfb6a350665edb1b90,2025-03-18T16:15:22.733000
|
||||
CVE-2024-41588,0,1,43c1fa557b9ca13f5d6e637d1577733d0e70b7fd248ce3a14c85fc6e91bf133e,2025-06-11T13:54:06.133000
|
||||
CVE-2024-41588,0,0,43c1fa557b9ca13f5d6e637d1577733d0e70b7fd248ce3a14c85fc6e91bf133e,2025-06-11T13:54:06.133000
|
||||
CVE-2024-41589,0,0,e9c30a32e1d5bd5f4b6364fc650d57d72e5e61f9fa07da023f0932b49a18787a,2025-04-10T13:43:37.377000
|
||||
CVE-2024-4159,0,0,79fc1543f1260705e74b8deeae175c555b129f183a9014a6e4288a6f9681a384,2025-02-06T17:49:55.727000
|
||||
CVE-2024-41590,0,1,4bd11c0a5a16ea227fdd8eebb5961a9e31a379af597a578b269e3cd5b756015e,2025-06-11T13:49:57.290000
|
||||
CVE-2024-41590,0,0,4bd11c0a5a16ea227fdd8eebb5961a9e31a379af597a578b269e3cd5b756015e,2025-06-11T13:49:57.290000
|
||||
CVE-2024-41591,0,0,fbe56be2c7d21e58694890c979fd5b2525d6606e74bcf44af4f4eb9ebfc7cb62,2025-03-14T16:15:34.730000
|
||||
CVE-2024-41592,0,0,da34ad5373a3e4f26de17396b443b16c2b3db924958258ea30640b9d1bddd551,2025-06-03T13:52:04.560000
|
||||
CVE-2024-41593,0,0,4c655fb675e2e26beb224f3146b60f9a593776c70e4428cbb9b0d5eb10e9c063,2025-03-13T19:15:47.260000
|
||||
CVE-2024-41594,0,0,0fa2ba762c2fbc09f3e5499bc08c98877b67fafe9367aa7a338ecace00d5bdc7,2025-03-19T16:15:26.387000
|
||||
CVE-2024-41595,0,0,55147bb2c7f980be0e8dfce69050f7ac0e8d3bd44beedc81b56dc3a9145dbb12,2025-04-10T14:37:24.073000
|
||||
CVE-2024-41596,0,1,4c9a2c20ad07ecda2ee244a2fc0a6001029f77098a96d1bb2f0e364c0927f005,2025-06-11T13:40:06.773000
|
||||
CVE-2024-41596,0,0,4c9a2c20ad07ecda2ee244a2fc0a6001029f77098a96d1bb2f0e364c0927f005,2025-06-11T13:40:06.773000
|
||||
CVE-2024-41597,0,0,8bc3478a40fad9fe08a5b14f99fcfb65827e68ea30f05fc2a19957f05a35e7ba,2024-11-21T09:32:49.140000
|
||||
CVE-2024-41599,0,0,19010d159a05e51c251b0e87e5efe7d7695f4c30ed161561b8ad7fb41917cdd4,2025-03-19T18:15:21.827000
|
||||
CVE-2024-4160,0,0,77018d19c3c59babab69bb4c4bd714918ace7f45db9fbec548c4760db9a196a9,2025-03-21T19:16:41.813000
|
||||
@ -266864,7 +266864,7 @@ CVE-2024-42005,0,0,4b7a03a62388d79840f1dbc20489aec0bae7f52ed889bdc9e9f4ed295e447
|
||||
CVE-2024-42006,0,0,757a5058e2b20a07332e18e1715746958f2fc29b54fe8104fb4e99ba507aa82a,2025-03-18T20:15:23.103000
|
||||
CVE-2024-42007,0,0,18023dc0188646143bd9484c36c6b41c6281c494fdb0237aba0cd6dd52e9a082,2024-11-21T09:33:24.887000
|
||||
CVE-2024-42008,0,0,de59590c5b8ea2dcb20a78d933da654dd773353d185cc7aa221b80b9d6c81d30,2025-03-13T16:15:21.240000
|
||||
CVE-2024-42009,0,0,02c0fe508080971857c7db434c0f0da2e38c91601d9214f3de7a413be892a884,2025-06-10T01:00:02.087000
|
||||
CVE-2024-42009,0,1,10993e2bf6b23d2ff0e1d3487dcfdf278ed8ac849a52251c7979ea0a9e3512c8,2025-06-11T15:46:19.810000
|
||||
CVE-2024-4201,0,0,caa8de420bccc88e064fd619fe08f6837c80c46ab6ceb4db233139f54456b674,2024-11-21T09:42:22.800000
|
||||
CVE-2024-42010,0,0,03e7dee0af7871a1319da5b152346d87a38864f6270cfec745878dfc136b3e64,2024-08-12T14:15:07.370000
|
||||
CVE-2024-42011,0,0,266d3b924a10f9b724bb81458292feaa2d0436def0bdd21429b955b06ed88aca,2024-10-30T18:35:10.283000
|
||||
@ -269377,7 +269377,7 @@ CVE-2024-45190,0,0,0f9f782c7151454e0d4128d12af9212beba44978a9aed3b521bd26751a906
|
||||
CVE-2024-45191,0,0,85750924302de32758668d824c400f03ec874589b01e5f9cc93263d9b344cd0d,2024-09-10T19:35:09.727000
|
||||
CVE-2024-45192,0,0,43a7c431a16c707384aad36a7c459b5416237a7f09d05eece76501eccaa0c165,2024-09-10T19:35:09.943000
|
||||
CVE-2024-45193,0,0,97e23cf5bb2e50a369e95a1523b175851171783613d8e26e1d3a20ce3e5a05bc,2024-09-10T19:35:10.143000
|
||||
CVE-2024-45194,0,0,77254ca1b6587eb5e8e927e61ac00c230760a8a07d84f59977c03150f9f0d924,2024-11-21T18:15:07.483000
|
||||
CVE-2024-45194,0,1,9783d58640443ee6c7d2887d64899b280a28c39c9bf615b886231c0519c40c7c,2025-06-11T15:40:45.710000
|
||||
CVE-2024-45195,0,0,66d7d17610be0ce972b0de44bf228f2798ff0c35e717addb513b69a67e048bdf,2025-03-06T20:29:26.130000
|
||||
CVE-2024-45198,0,0,134993cac349ebf82d298e5073984534c7242ddbcd9101d3655d2204b035998d,2025-04-07T14:18:34.453000
|
||||
CVE-2024-45199,0,0,c6602917531b3a4a24fe09da269c6b74fc73422a338a1c1c0a7fd7dffcb01ea2,2025-04-07T14:18:34.453000
|
||||
@ -273516,7 +273516,7 @@ CVE-2024-50560,0,0,e5560d8e099bbdb75ebe3a313d5a07fb60056609d630bea2b282b04cbeaa1
|
||||
CVE-2024-50561,0,0,51d6a6886183d861209a55cd82d08c7368f7ca6eecb96cadd88bb86e0f75077f,2025-02-11T11:15:14.037000
|
||||
CVE-2024-50562,0,0,042b4aeddf47a9bcff9798cf964b7b33e5086afb18b03d175d7830e3a694130b,2025-06-10T17:19:25.360000
|
||||
CVE-2024-50563,0,0,b5495e4d9248024f07eadfb97b72f88f39265d3dc21b8de2fb9485f4a9fc5cd8,2025-02-03T21:54:17.977000
|
||||
CVE-2024-50564,0,0,9f92111f34b8a3f04643692b4b87512c1b9c808d088ae5cb493fe5eba0ae69cd,2025-02-03T22:11:08.317000
|
||||
CVE-2024-50564,0,1,0e1e7fec697ee256225ff7e16bee08bf2f06557383d2dd0ee126195057be5996,2025-06-11T14:55:09.987000
|
||||
CVE-2024-50565,0,0,0052767052bb2f202b3f6a2bb66a26d0a376b1c95ba46901bccf288399e729ed,2025-04-08T18:13:53.347000
|
||||
CVE-2024-50566,0,0,73abc3a7ec0e89e7710714feab3590ac47ec6fd819b92c2c02e99292bb887750,2025-02-03T22:09:31.510000
|
||||
CVE-2024-50567,0,0,fb2bfcdd677b57b5f254c8ba8bdb8b89df3eceeb887ef580d5f0711d99cce207,2025-02-11T17:15:22.980000
|
||||
@ -273931,7 +273931,7 @@ CVE-2024-51382,0,0,b29a41a05c02a579a31b439784c85636e755f22c82dcce149f258b89de6db
|
||||
CVE-2024-51392,0,0,c28913cf9578463f4763dccada8773c2d0b70c039999d2c8d3d568551fd804da,2025-05-30T16:31:03.107000
|
||||
CVE-2024-51398,0,0,cea8f8f4881380dbaa2cfe732dffbd060c56c48b06b04f4d982be54dbdad46e4,2024-11-05T18:35:17.420000
|
||||
CVE-2024-51399,0,0,7797cfea236d02f4c030090ec48621397eecdb65349aff9b28f04a876b406896,2024-11-05T18:35:18.260000
|
||||
CVE-2024-51406,0,0,f0c5227154ac5602f5879eec080ba39cd868714523a47e46ddfa70a2bcc161e3,2024-11-04T19:35:17.410000
|
||||
CVE-2024-51406,0,1,ff7f5bed93e0663e64325b72687508a30c88e876c1fbe113aa4481856c831ede,2025-06-11T14:15:56.927000
|
||||
CVE-2024-51407,0,0,c0aa8974878c98334b1faedb8239e3516705bb72c5942bd1756bad8c0fbb4d24,2025-05-27T20:26:46.583000
|
||||
CVE-2024-51408,0,0,7abace5757c3676b38c24efc3b646081438e7b877d38f1cc5dedc735e58c63f0,2024-11-06T22:06:43.100000
|
||||
CVE-2024-51409,0,0,cd9d1809dedee806ed461a1ec4b55cc7a32280d7a8caa4ca197781f860925802,2025-04-11T15:04:42.957000
|
||||
@ -278975,7 +278975,7 @@ CVE-2024-6331,0,0,772eddbeab74e601c91d9e66a54877a39bfee2ccfd2127fd1320d8b1de466d
|
||||
CVE-2024-6332,0,0,71321842be6854901825e6d202d86e613e3a01b657ba056279e33400be9b7fba,2024-09-12T12:45:37.917000
|
||||
CVE-2024-6333,0,0,7736e33d674f924b13c6c3992b2833d5607d1a4f69fe6597724045c2bfc36fb9,2024-11-21T09:49:27.033000
|
||||
CVE-2024-6334,0,0,e7609a76396a51aa6736d9d83a9522b392f46b7ee8c3a77686e795c0dc0753bf,2025-05-21T19:11:47.023000
|
||||
CVE-2024-6335,0,0,71e0ae9edb81dd50cf0694793267e523cec364805fcca0ea49bab4f2c0f60013,2025-05-20T20:15:37.317000
|
||||
CVE-2024-6335,0,1,d7ccbd0672458e87e9e90c63226f6f73ed1cd4bce0d6c75e2ec3a5ee89c477ba,2025-06-11T15:46:57.620000
|
||||
CVE-2024-6336,0,0,26517f2e20d4fb8ecd3c1f8bc7496625a0971605d0451d59c8cc6ca534ab9907,2024-11-21T09:49:27.270000
|
||||
CVE-2024-6337,0,0,272172a7579d97389777f5f196faaa6e46e696b9238bb3d61e675c02f4ed1da5,2024-09-27T17:48:00.977000
|
||||
CVE-2024-6338,0,0,66a83af084575500ee819176a1b51e0408d0568ef8a208443ffad480bc0c423b,2024-11-21T09:49:27.480000
|
||||
@ -279096,7 +279096,7 @@ CVE-2024-6458,0,0,b11ced7b48e4999cb2402c171f587f9305fd15589abc8a139c63445b66e9d6
|
||||
CVE-2024-6459,0,0,02da8f469a7fce55d4b5322dd98716cc4dad8ed243a9ca848d0651f501b6d543,2025-05-27T17:48:22.140000
|
||||
CVE-2024-6460,0,0,4a5b5776701d673ed02efe26edfd5560edf8cba65f5cfdd74c96f161b28fb3a6,2025-05-27T18:04:55.703000
|
||||
CVE-2024-6461,0,0,86a214d0c7bd3f57cea37cd567b01f1a0e55f8d4342f6c7c46fd15b8942c8d90,2024-07-03T21:15:04.580000
|
||||
CVE-2024-6462,0,0,7eb67d80f606d7cc126245724a0550a023d01fea849142b7dc667cdb8eb5da9a,2025-05-20T20:15:37.467000
|
||||
CVE-2024-6462,0,1,bca90aee5abe34e7cf1e13c1c4ec816335a558f87a928abc5700f53135bdfe7a,2025-06-11T15:43:50.453000
|
||||
CVE-2024-6463,0,0,f8d7d80ca565804c0caafdbc8214fe1eca7dc83d43861affc813af07365c0cc0,2024-07-03T21:15:04.640000
|
||||
CVE-2024-6464,0,0,8fab89d1b3aef32a257cf0d7fb909cce6ac18d5ef8dc898bb9f0cc6c52356cbf,2024-07-03T21:15:04.697000
|
||||
CVE-2024-6465,0,0,68d8747a1edb551a38d59b6ec4dd4815476646c814dc40035dcb46acd92026f8,2024-11-21T09:49:42.103000
|
||||
@ -279110,7 +279110,7 @@ CVE-2024-6472,0,0,e26f0ed33b9352737fba2c7a5901be2204823366dc7f964b880fceddc7f136
|
||||
CVE-2024-6473,0,0,1dafd6b50b11af3a55a60927aceae7fdee5db46502c399f03ce389e747a46480,2024-09-05T14:19:45.153000
|
||||
CVE-2024-6476,0,0,a0cbdf8db7abbf40af298419f002b432eaa0907f370a1f5866689f4a683a61f6,2024-11-26T07:15:05.697000
|
||||
CVE-2024-6477,0,0,f8f6847d32a610415a7c2ca805a1a46e2c4ada6ffccb0f2d3fc8c2c8f1cf2f4b,2025-06-06T16:12:25.440000
|
||||
CVE-2024-6478,0,0,d355f87d3d08b7198675f904b84d8494a8a121b6cd2dde7851c549ddd2d28d25,2025-05-20T20:15:37.603000
|
||||
CVE-2024-6478,0,1,d5c89c514729f7d3a87caf1cfa92ac2829fe96ec3b0309bbbe410913dac39ffd,2025-06-11T15:41:54.610000
|
||||
CVE-2024-6479,0,0,e61c30f16f0abfc9f93099b9bc147874bff7bedf1b6bcc46dd42e617eef67181,2024-11-01T12:57:03.417000
|
||||
CVE-2024-6480,0,0,4266a2448f7419be28cb4214e61c8f9e0c911904bbcd8a264d7b98190c25fc16,2024-11-01T12:57:03.417000
|
||||
CVE-2024-6481,0,0,f62914d193bbade2d691f703d4d0b1ff9521548f9a943b29212b08069c7f73c7,2025-05-28T19:35:54.520000
|
||||
@ -279118,7 +279118,7 @@ CVE-2024-6482,0,0,4d53ead5e6325e4c3d18efe067c9e334be2a3f79da1bea9751adecc767a7d1
|
||||
CVE-2024-6483,0,0,1c0fe2a973a2c4a1c74a0f15ec1936460845aedf2e4fbff62d44c77b139ab2a5,2025-03-20T10:15:32.863000
|
||||
CVE-2024-6484,0,0,2321b3e4cac43e4cb38252b77fbd5ab74d6875fab07b3d2a29d1bb66c757d2cc,2025-02-07T20:22:49.117000
|
||||
CVE-2024-6485,0,0,5de38639f840b10385a78b6c25abdb8a0ace1dba6d9d706af40210e5d356fe95,2024-11-21T09:49:43.863000
|
||||
CVE-2024-6486,0,0,77b36134bae3fedd62d4eaf5dbb50da10a2950728aa18338706c3b9cc71a3906,2025-05-20T20:15:37.750000
|
||||
CVE-2024-6486,0,1,e3e8287edf58aebbb325462088534af79c8c5b34fb9e80e3b3c36ce91d99ed46,2025-06-11T15:40:01.067000
|
||||
CVE-2024-6487,0,0,a2c8cd4457ed5bbd74124022b13e31b4932a2b8cb2e05c9f365ffeaf9708b2d7,2025-05-30T16:55:49.913000
|
||||
CVE-2024-6488,0,0,0c5ecb49d7296b409f5d61bd70a5d017ad6f69068345855a00f0bd7c78566faa,2024-07-04T21:15:10.403000
|
||||
CVE-2024-6489,0,0,231e9813e515f1abdef06bf7e87ae67da0b47c391d532eef0539e6f69c239697,2025-02-04T18:04:39.737000
|
||||
@ -279308,7 +279308,7 @@ CVE-2024-6685,0,0,acc7767f83fdbfe4c0fb5ba835f368c963250f5aaf7c65cf81f0787fc28c42
|
||||
CVE-2024-6687,0,0,87c94841e1b3441b473f4dee1081640b0718b68a0f4720cc6a84faf16a103b21,2024-11-23T00:50:45.110000
|
||||
CVE-2024-6688,0,0,138f7669c50b5717eb30bf085e4de138dfdabfc0c6e798fc83a2112dc36bbf73,2024-08-27T13:01:37.913000
|
||||
CVE-2024-6689,0,0,d3f1c978802e38e7ab22e4ab168036a480da837e523ef6438c9b42604f0fc4b9,2024-11-21T09:50:08.143000
|
||||
CVE-2024-6690,0,0,99a94a6785ee88e3de908cb60f4e053ceeceb40866229f09850c0bd71f17c263,2025-05-20T20:15:38.047000
|
||||
CVE-2024-6690,0,1,f415c11b87cd6811eab628cbbad4b655985ce33419cef0be8be9cfc0d567c653,2025-06-11T14:59:33.023000
|
||||
CVE-2024-6691,0,0,f4b0c8ba9d849a887a840b11a7ced71b334b6811834c4c0436e7f424db226869,2025-02-07T17:06:37.413000
|
||||
CVE-2024-6692,0,0,b93ab5a4c1a77950586e4d26ff9d5ac1dc50208142450c48467964da3007a929,2025-02-07T17:07:33.633000
|
||||
CVE-2024-6693,0,0,28eab152ce9e10a577535de17ed173510cba4df1dc884c3da07cb2ac8e6a6517,2025-05-20T20:15:38.207000
|
||||
@ -281984,7 +281984,7 @@ CVE-2024-9522,0,0,81a7015961146d67081255db9702f745971d5b01a572ccb06cd379a82785f7
|
||||
CVE-2024-9524,0,0,c0e0025075860eb301ff4ff643bd32cf5eb6831d27ec91d35b567d38c9af7c09,2025-05-12T17:32:32.760000
|
||||
CVE-2024-9526,0,0,acc606f8e9195e546a271d256c6ec9cc804f4a841580ecb828b473fe7b0b33c3,2024-11-18T17:11:17.393000
|
||||
CVE-2024-9528,0,0,324f5a9bfc4a37c1aeda9587a3d9c2b641c0fbccff333ce06df06554eda75394,2025-02-06T18:35:28.637000
|
||||
CVE-2024-9529,0,1,e0835773ff2868f746ad772bca71cef0b4d7976759453aa0ec2fad83ec18fe03,2025-06-11T13:58:02.947000
|
||||
CVE-2024-9529,0,0,e0835773ff2868f746ad772bca71cef0b4d7976759453aa0ec2fad83ec18fe03,2025-06-11T13:58:02.947000
|
||||
CVE-2024-9530,0,0,d9770d6d9d81aca35282dd37cad0ec897a8e52cf92a99657df0b6283cc63f82d,2024-10-25T18:52:10.810000
|
||||
CVE-2024-9531,0,0,bd5dea9af3b5acebc7a9498df783f0aa08a3c09d57316df4d5faf9fd73c9b899,2025-06-05T16:56:56.240000
|
||||
CVE-2024-9532,0,0,ee74e81fcd3228028851cbf05d2cfbe5eea8f3421ccb07415d383b1bab6b2af5,2024-10-09T11:18:49.027000
|
||||
@ -282518,6 +282518,7 @@ CVE-2025-0159,0,0,e878c306d924e00caaf50d08be8d3cef60f47ec75963a54fd0c4c0498de9a2
|
||||
CVE-2025-0160,0,0,d2a1a9a81dbc562cf72d3714c2e19889ce873a845cafc839bb81925c9c9f5573,2025-02-28T19:15:36.393000
|
||||
CVE-2025-0161,0,0,ecccbf64eabc969a96e8026ae7428266ca821c6b81d8fc8ad6251d9383b3dc89,2025-02-20T16:15:36.333000
|
||||
CVE-2025-0162,0,0,bfc97d5f6ed4ab16ebe8a6375b0a746ab06e7cd3ea0b56d09c090c3478f06f58,2025-03-13T02:22:58.683000
|
||||
CVE-2025-0163,1,1,85d2f9d0c7d45f5de5d0462db5f35ca226d1d9eb0bf5279e96141b3f41725fc9,2025-06-11T15:15:29.177000
|
||||
CVE-2025-0167,0,0,ed36d641b1afaa7c32911291bfc917507cd4d73e70e05d582a250550abe355b0,2025-03-07T01:15:12.110000
|
||||
CVE-2025-0168,0,0,a3bb306c5c1038cf3ae7cdc9fefc0119ef962391dad7848c675894c708a175c1,2025-02-25T21:26:07.113000
|
||||
CVE-2025-0169,0,0,a5d0b3b918a183dd75efd99915b694a33b31e217f0fac0641a3f178803662807,2025-02-11T18:15:24.260000
|
||||
@ -286220,8 +286221,8 @@ CVE-2025-22984,0,0,18fe379899d6b594231ed65cfa5066d6988b73d940081f95379b94407f66b
|
||||
CVE-2025-2299,0,0,e5251f8f8b5480e3d6b1edda7846f7e604c0e4f1539fa12e57972bd741386bf2,2025-05-15T19:54:41.610000
|
||||
CVE-2025-22992,0,0,9c2224e338558ccc5fdf942d723bafbe861c5e19d73a3269c58858cc57989795,2025-02-06T21:15:23.317000
|
||||
CVE-2025-22994,0,0,d9527179d5c850c6866754d31e77f1c2fd06d9e1a13bd3d3f0bd861c8c0f83ff,2025-03-19T15:15:53.990000
|
||||
CVE-2025-22996,0,0,c50cf62284cf751584047e7a98111e31ae9d7e05423e0e28a6dfeca6772a6ab9,2025-01-15T17:15:21.837000
|
||||
CVE-2025-22997,0,0,cbf89797792d4ad66a4f37050995306b66d6d3563ae5ce9db2b5b27779f4d42b,2025-01-15T17:15:22.193000
|
||||
CVE-2025-22996,0,1,4e06fe7c28c86750661bce485b34b36a54b344f7aacd75b38774e4741d9661fa,2025-06-11T15:38:44.620000
|
||||
CVE-2025-22997,0,1,4e109c31d40a3d1d29cc0bcfb1e52b19c2b7198f22da9a6cbc1072f86f1f6a98,2025-06-11T15:35:40.463000
|
||||
CVE-2025-2300,0,0,c13f99b53ddc4e83bf9bce2feb564c630777b7016e2470e35d22e31f3440ca55,2025-04-23T14:08:13.383000
|
||||
CVE-2025-23001,0,0,a661c9ff25c543dcf089dc4c4188fedb40f499aceeca183680e7eb66234e4f62,2025-02-21T17:15:14.103000
|
||||
CVE-2025-23006,0,0,7a5bf6bad719976a640fb90f39e240f5ae9344d4363a556047b151d1633075a7,2025-04-02T20:32:48.097000
|
||||
@ -288138,7 +288139,7 @@ CVE-2025-2519,0,0,53e1da806e7009c99eda2ae100302d54ee976e1f2e910b31b9e64f58222ac8
|
||||
CVE-2025-25190,0,0,96316be3801ea8e34db1f71f151e934e00015e5d1a34196dfd79e3e824fb1a50,2025-02-11T16:15:52.420000
|
||||
CVE-2025-25191,0,0,ebaa2bdb1f2b2bf394317ef2b89f43fe1aabf1dfa6c9b80b2c9248cedeac6aa0,2025-03-06T19:15:27.113000
|
||||
CVE-2025-25192,0,0,7a6038d36a5b17930d67880843054b23e0b2ef4833586c77fe6880c7c0ea5e18,2025-04-23T18:46:00.540000
|
||||
CVE-2025-25193,0,0,88436b550c54718a716525af3a09ec30c4fcff693af51cc8d334b1b5bb6550de,2025-03-26T13:14:32.087000
|
||||
CVE-2025-25193,0,1,961c67f86d66ace3d4b80d79cd8b2d770203dc068405393f7990a5600d26feb2,2025-06-11T15:36:22.693000
|
||||
CVE-2025-25194,0,0,278bc98c8a0ffe0e8a7e96acea34ed9bc50825c485f6cab1eaf41889a2da8034,2025-02-10T23:15:16.067000
|
||||
CVE-2025-25195,0,0,6422ab465e1e4500e1fe77efd7e4b259d61944cface94edb31eac51bdeddd22d,2025-02-13T22:15:13.100000
|
||||
CVE-2025-25196,0,0,5196aba0be3d543377128b43ddee4b3fe123287a21ab5155a82a956ba8a5209f,2025-02-19T21:15:15.577000
|
||||
@ -288682,7 +288683,7 @@ CVE-2025-26409,0,0,cdf29866235215f5068aacbcbdb6f999e9c9f7adf8baf249758a0e54e8048
|
||||
CVE-2025-2641,0,0,0c4e7f6e917c2684e1ef81919020337c8afbfd73d5a46107cea6f98fc25ffc5c,2025-04-02T14:32:40.757000
|
||||
CVE-2025-26410,0,0,e0a8c1ecc38adad5db47008cfe5d8287500ec3cbba2c1f9a4a60a8e1051c525e,2025-03-18T19:15:50.450000
|
||||
CVE-2025-26411,0,0,3c8f066d5451ad6ef36a27d64d17719d6f654697fa56337f49dfc83e42e73333,2025-03-14T18:15:31.947000
|
||||
CVE-2025-26412,0,0,e439f02063f036d3657a0bf05afa8e0aae7f2989029f4b795f42ec34bbfc4505,2025-06-11T09:15:22.067000
|
||||
CVE-2025-26412,0,1,d24092353fa68246014d74a20edcdc2b37b6e0cd740ffb34337ce84b79e0b577,2025-06-11T14:15:30.987000
|
||||
CVE-2025-26413,0,0,2158c3399ea37dae246e6333a0208fa039262ef589c11e6030057cf377da68cd,2025-05-12T16:15:23.023000
|
||||
CVE-2025-2642,0,0,9fd74d08c30eb46678d329dd538a5586185726ca4d8ec1276ca17b4f6bd06bab,2025-04-02T13:48:31.510000
|
||||
CVE-2025-2643,0,0,f96a1e9165c8c6b99a098f4d86d5cf57a75b6fe768e009b644ffd8b873a80653,2025-04-02T13:42:29.387000
|
||||
@ -288721,7 +288722,7 @@ CVE-2025-26512,0,0,27e124c5aa10b0f0b92c8ca055b8cbe842cdfbec5e8c61f840784c35c80d5
|
||||
CVE-2025-26519,0,0,189b0c6946f901ee4eed556955000825a3005cbd4fd73b84bf5b1493f77b4b5d,2025-02-14T17:15:23.090000
|
||||
CVE-2025-2652,0,0,ae6e16616be52d3538ce00377479a8c5ef0414a0c53d8e7631810155f48f2da5,2025-03-26T15:16:11.270000
|
||||
CVE-2025-26520,0,0,292c9caba6f38831a4be980034f0f7cdde695fdbb1f85a1136d15679c0c9d4ba,2025-03-03T14:52:47.173000
|
||||
CVE-2025-26521,0,0,cdc81ec5afb63914ad407c304994a2b4e474bebe302d8fe6d668dcbca4d44fc5,2025-06-10T23:15:23.840000
|
||||
CVE-2025-26521,0,1,c064c96336798f8f9725a52058709587b311086ff1698335df3c838db2580ed4,2025-06-11T14:15:31.137000
|
||||
CVE-2025-26522,0,0,15654b8dc281e5e95b6cb8d0b0449d89135cfca68e40163629b408b401b71985,2025-02-14T12:15:29.583000
|
||||
CVE-2025-26523,0,0,9eb8004a3f0db5f271f82a4160bc199ec38e8d40fc177becbe2105cc644170be,2025-02-14T12:15:29.723000
|
||||
CVE-2025-26524,0,0,e4675579756d8bf50fc8a11fc92dcb6c0f4393fb284e95c0369d48074177af48,2025-02-14T12:15:29.887000
|
||||
@ -290016,7 +290017,7 @@ CVE-2025-2880,0,0,e389725818c992645d02e6070b5c39fb3800bf8237a4c9078a3291c23ae543
|
||||
CVE-2025-2881,0,0,fdb559a0489fd102237eb30f41f019d2f5c2b3faa82f877e9abc8e7c02b82b2c,2025-04-15T18:39:43.697000
|
||||
CVE-2025-2882,0,0,c97b3f3ea8d4bf1b525408e9c0aeb5839e6b1dab2a43ddecf7ef1915f34a41ad,2025-04-08T18:13:53.347000
|
||||
CVE-2025-2883,0,0,de11120bf19ac8735b713769da981d898702017cd1ccc7eb0f5a880098b288b6,2025-04-08T18:13:53.347000
|
||||
CVE-2025-2884,0,0,5e072d72f816ed35616d5f52cc6f7b9f5b38ba09182083cab62d4e2073153ed3,2025-06-10T19:15:28.847000
|
||||
CVE-2025-2884,0,1,c3ae40f192f5d373357063a0eee213aee0cdedc73f50a138bcdb33c2a0b09678,2025-06-11T15:15:29.487000
|
||||
CVE-2025-2885,0,0,d7e6b0bcc2bde4b9a153bfaf9504a6fe34cca823b62dab5c29aeb4ff68d351e8,2025-03-28T18:11:40.180000
|
||||
CVE-2025-28855,0,0,75330c0a82318338b0154938e1fd86b9e7a50bcf39b7166c9aad55a9af1a4355,2025-03-27T16:45:27.850000
|
||||
CVE-2025-28856,0,0,49facbda8e3a831c26c726b61bef1fcd0c7982f3fa2f79e25ef260adf4085d93,2025-04-09T14:05:44.960000
|
||||
@ -292818,6 +292819,7 @@ CVE-2025-32706,0,0,db50af2cfe521d05a7c486c059aaaae863796e45bb101d6939f7e49800872
|
||||
CVE-2025-32707,0,0,0470f05f4fed72a6e68669a459995637394b48e5dcea8b21ff00bd0a5a2faa24,2025-05-19T18:25:06.003000
|
||||
CVE-2025-32709,0,0,cca61055dac0e837033032ad28a6f880a090dfc86e492b563e0bcb7f31d81d17,2025-05-16T16:29:34.783000
|
||||
CVE-2025-32710,0,0,8aa4d60921f6dde1a890bc70c8e33d99b94c5d41ddcdcf72b3be6ab66adba5da,2025-06-10T17:21:45.853000
|
||||
CVE-2025-32711,1,1,7d3eeefcad19449b59513a507f4884917f1c6f6422cbafbb2beb41b279b3bea5,2025-06-11T14:15:31.530000
|
||||
CVE-2025-32712,0,0,c5735fcc1bb8d2d8b8ff88cf2cf7bc8cd02910bed85fb27b9d8fa93cc565de62,2025-06-10T17:21:47.883000
|
||||
CVE-2025-32713,0,0,1f55ff03a98c6f4a137fcd8cd370b450b5268acfb42631808df84938f4956e57,2025-06-10T17:21:49.897000
|
||||
CVE-2025-32714,0,0,a92f17a0e588c2a134397f8038fc20f2e3a2d4fa89569159b3cacc267d8a2399,2025-06-10T17:21:51.843000
|
||||
@ -293053,7 +293055,7 @@ CVE-2025-3300,0,0,71838a45e38cfd4f9033706465f5d20314584bcf58aabb1bb7ca5cab40d521
|
||||
CVE-2025-33004,0,0,0dbcf8f4552332912f870f20d881c87d766919198baf5864e35f56c668cfa064,2025-06-09T18:08:21.600000
|
||||
CVE-2025-33005,0,0,cc36f120cbed36c030ac1a468cb0a7afdae6956296ad02b259f7e3a82ab309a5,2025-06-09T18:07:39.407000
|
||||
CVE-2025-3301,0,0,b2cbbbf942710dc17dd30bf45e19011afe7becbc724cdeebd3bb45dd2691a5aa,2025-05-02T13:53:49.480000
|
||||
CVE-2025-3302,1,1,38fc44d8b6ab8b7fd1331287581e06949fb4e0b7f6684587b3a21ec43e33b278,2025-06-11T12:15:25.377000
|
||||
CVE-2025-3302,0,0,38fc44d8b6ab8b7fd1331287581e06949fb4e0b7f6684587b3a21ec43e33b278,2025-06-11T12:15:25.377000
|
||||
CVE-2025-33024,0,0,a929691d5533595a80202115459e86f84fc81996ba9c41d2a68880f3e6fcf59f,2025-05-13T19:35:18.080000
|
||||
CVE-2025-33025,0,0,4b295e88dd02f429bce7f4aed7e0b1b7ea585aae960bbc6de9d4364036c40d6c,2025-05-13T19:35:18.080000
|
||||
CVE-2025-33026,0,0,16823ea87e15ed5dd06862f606f290dd47fd68e96dd8b001f96144de8d0bef0f,2025-04-22T17:37:37.900000
|
||||
@ -293067,7 +293069,7 @@ CVE-2025-33043,0,0,044f6c7834f7eed1d82fb6b8377e155f5c1ae51cb36f952b6bba03be184e2
|
||||
CVE-2025-3305,0,0,caed50d99616da9f2a70f5ff8ff690cbc48b6002cca415c3290f8e367603d490,2025-04-08T16:46:55.203000
|
||||
CVE-2025-33050,0,0,05e6d757b225696d2814d59d4f1c971c8d0e7d5b6ad7a1f98f3325b5ab9caf61,2025-06-10T17:22:12.643000
|
||||
CVE-2025-33052,0,0,b1993549d564c5c9981bc4b05cb64d0a2d456f60ff295f87620c17f2cd44433b,2025-06-10T17:22:16.713000
|
||||
CVE-2025-33053,0,0,a38de63924e4c14d9d85c34c156b3cdea7a876863613a95aa4b4306ad100eec2,2025-06-11T01:00:01.443000
|
||||
CVE-2025-33053,0,1,7c0fb55424eeeb8186ec8527c37004cb04dcd8c08591616fb06c74862faf1323,2025-06-11T14:11:11.517000
|
||||
CVE-2025-33055,0,0,13d9e39692b08b1b320db5a5ecccbe43815806407f2b3cc535308d642cb2e613,2025-06-10T17:22:21.100000
|
||||
CVE-2025-33056,0,0,c67dfbe06f555af10b25758d9a6160cb2f910935ced8e27cd9da40fc740b6166,2025-06-10T17:22:23.163000
|
||||
CVE-2025-33057,0,0,205438b56590147889b44322c2f014a7f7d594c5c377234a2f1d03b95a58afc8,2025-06-10T17:22:25.360000
|
||||
@ -293248,6 +293250,7 @@ CVE-2025-3469,0,0,4bca5426f9919f93dad9a4b1c330f34d47eacab0082cc9b29903729bbc1390
|
||||
CVE-2025-3470,0,0,19aa6171d68cb7df7c1f3be18d7bfe917a85b5b7f1d5f3673d31726045a39093,2025-04-15T18:39:27.967000
|
||||
CVE-2025-3471,0,0,7540bf9b66a7c3d2886148e18ad0354d6f76696c333def82e90f9e267caa6c25,2025-05-09T13:48:03.503000
|
||||
CVE-2025-3472,0,0,8edf39375c9ab0caa46bc4f64a877600d35e92d464dc8269fd628758acc904e2,2025-04-30T14:01:15.660000
|
||||
CVE-2025-3473,1,1,c764c4e2a3da0055a44b6998e909894226d269d0be1d00bdf90db31787cee713,2025-06-11T15:15:29.827000
|
||||
CVE-2025-3474,0,0,f3d4b355c6b48145dca2a43881241ecb1e655d9dbdb96be4731ac7b40121a4fa,2025-05-01T14:38:00.023000
|
||||
CVE-2025-3475,0,0,cacee959c6fec9a049e3301810eab743cc7a027bdc5a60847b12828010037e16,2025-06-02T17:23:36.020000
|
||||
CVE-2025-3476,0,0,e9ff7dadd87cc1b5d38c6f4b90861333cdc35e0f0e9f56330696f9a142f8fe8c,2025-05-08T14:39:09.683000
|
||||
@ -293361,7 +293364,8 @@ CVE-2025-3591,0,0,9faf0d8d54afa4d861e787bba12e728bac4244da2f6db382b13f6aac7674e6
|
||||
CVE-2025-3592,0,0,3766f02a8a9b7546b3744ae601fb2a46406e95eb867e2ef9712274445e3cdb7b,2025-04-15T18:39:27.967000
|
||||
CVE-2025-3593,0,0,a01f66982e63d1a9077a22fb9d3bb17c3788e9968a5ce8acfaa25734a955883b,2025-04-15T18:39:27.967000
|
||||
CVE-2025-35939,0,0,6a840d2678de0b0635b0f573a4e0aa98890f3ce611bcae157f676530014eaaf6,2025-06-03T20:59:34.117000
|
||||
CVE-2025-35940,0,0,99035063dad9daa4cf8431584bdae2d17fb96f782e0199a539be51e489d8b53f,2025-06-10T21:15:22.210000
|
||||
CVE-2025-35940,0,1,3ee52df4bacbf4fdc5e57802853fb2f251a95cb49b544ab41a6d0298e2dea5bc,2025-06-11T14:15:33.690000
|
||||
CVE-2025-35941,1,1,eaaa668a7246915ba01e31891a0eeb989a936dd53db85c8a3ce111baf2a98c87,2025-06-11T14:15:33.797000
|
||||
CVE-2025-35965,0,0,4aa642d84377cde687111c4598cf1eaeacbb56cf1c939bfc9602ea66c09fbf1f,2025-04-29T13:52:47.470000
|
||||
CVE-2025-3597,0,0,d7f16eae83f55d018cc2fc04d9f80eccf613371d509c7f99733ac01645d2c6f1,2025-06-05T14:27:53.477000
|
||||
CVE-2025-35975,0,0,ff6f53919e1d0edd41e3d119f9454f71c4e7dd5f4908d853817e3fb24cd36fe2,2025-05-02T13:52:51.693000
|
||||
@ -293890,7 +293894,7 @@ CVE-2025-3872,0,0,26604960001ce7e7efc01090e0c7f3ace8c54075c9f64bec667f2f9d611a1c
|
||||
CVE-2025-3874,0,0,48404b5920dfb8e9d0e9a6f6c853dfae3dfd8be20985f098e8a46e30a37014f9,2025-05-06T15:39:29.083000
|
||||
CVE-2025-3875,0,0,1b7ebae355c4f48c8dddf4fcdd6fc15c745cdda51dd1f8022d95692c7a83a312,2025-06-05T14:27:05.837000
|
||||
CVE-2025-3876,0,0,98fa4965cd0fb5896f08763a0582c93ea252014e67d6fd79d41bdf5071b00a40,2025-05-21T13:35:09.450000
|
||||
CVE-2025-3877,0,1,a620192bb17052afd6333e66b5a40238ba021cbb671fc7173692c585e43df3dd,2025-06-11T13:15:24.007000
|
||||
CVE-2025-3877,0,0,a620192bb17052afd6333e66b5a40238ba021cbb671fc7173692c585e43df3dd,2025-06-11T13:15:24.007000
|
||||
CVE-2025-3878,0,0,6edc0413060b870ca8db342e4d416bc7330af04d97c4384be96b3d4817bff1e1,2025-05-21T13:36:16.070000
|
||||
CVE-2025-3879,0,0,d832e10f3f5a35fa6f778cb83701763ba1ca0a6464dece4429751c1aa0bef5fb,2025-05-05T20:54:19.760000
|
||||
CVE-2025-3881,0,0,24b54933e846a45dd97d5a9a438a485d3ead998ef41689a70b444bb5ab176e29,2025-05-23T15:55:02.040000
|
||||
@ -294401,6 +294405,7 @@ CVE-2025-40908,0,0,91c9c68cf03ca27da56ba2aec4b379519e7063cfa4c8bc0832dfb5079fdf6
|
||||
CVE-2025-40909,0,0,0168f158a69247acbaffa8dbdbed8b439b77a336030b06418e5511e5db476ff8,2025-06-03T04:15:40.470000
|
||||
CVE-2025-4091,0,0,798a4cccfe2006913bea941ae05240fec836c7335fe01bd824f887f2a82ba4a5,2025-05-09T19:32:09.470000
|
||||
CVE-2025-40911,0,0,fcf4deedf6cc79e67d521479df45c4b1f5ac81bf8605fcf0e3b318f0c121b089,2025-05-28T15:01:30.720000
|
||||
CVE-2025-40914,1,1,af01d276c0ae500ffb244e9fb8d7f00960a88649527b7ab4383e0ba94e831d0f,2025-06-11T15:15:29.990000
|
||||
CVE-2025-4092,0,0,5c481b9edaa4dc01b6e2af0355fb37068b547aa3807c69c17d8381f725e9d766,2025-05-09T19:32:00.773000
|
||||
CVE-2025-4093,0,0,426d6945e92bfa0f6784cfac27262306e33a71ed38b9d14699e5d2c984a980bf,2025-05-09T19:31:46.917000
|
||||
CVE-2025-4094,0,0,9389e1771cac6e6188e563be99dd04161be542f25f3d0fbc50799f1a765f05af,2025-06-09T20:13:20.070000
|
||||
@ -294772,8 +294777,8 @@ CVE-2025-4363,0,0,cfc7942feeb9a0f9f6312b42fa943d50981f3a9d84068f01e49e58a260df8f
|
||||
CVE-2025-4364,0,0,7abc96b4496bfef1269854d9d4450b426753c52eb291c976d683ed2fcf48245a,2025-05-21T20:24:58.133000
|
||||
CVE-2025-4366,0,0,231ab1d570625e15497e22d5b442eb1495badc7a98e284eaa21b6f30c183c146,2025-05-23T15:55:02.040000
|
||||
CVE-2025-4368,0,0,5060346bbf213853af51c9b1f1ab82f240c6c047743a52b24483fa7453a5d04f,2025-05-13T20:19:54.440000
|
||||
CVE-2025-43697,0,0,e9ffc798fea053198fb17bed37bab0c158ecec381f08a3543087469e372613ed,2025-06-10T12:15:24.097000
|
||||
CVE-2025-43698,0,0,65fb003d23e6d635c0b01ee008fb0dd98fed725cdf56451a4ef99df38c52e29a,2025-06-10T12:15:24.227000
|
||||
CVE-2025-43697,0,1,8ed523a26e112c862f96538810a2a4c570c2053b73cdea8198463e4b54adcc35,2025-06-11T14:15:34.253000
|
||||
CVE-2025-43698,0,1,cf4777478ec0ce5399bd6b1048836b4f4ebfdaf4a45b2e635662f00a4bb98bbb,2025-06-11T14:15:34.417000
|
||||
CVE-2025-43699,0,0,a2d22ee4b8d68eb026c86782bf500857da584950b48fd4e2d9625d502c59ab55,2025-06-10T16:15:40.353000
|
||||
CVE-2025-43700,0,0,f91ad89a18eacfda649ab209d4f29d9dde450c39d5a449eccc3a29c15f6e5dbd,2025-06-10T16:15:40.513000
|
||||
CVE-2025-43701,0,0,75a984ac714c135ecbf90c66a4c841f2f5525dff3c0315e5d515084f3c5ab270,2025-06-10T16:15:40.667000
|
||||
@ -295223,6 +295228,7 @@ CVE-2025-46011,0,0,c1776a78cb3800147b82714f56c78717ef81a5a9688b212486314b1695383
|
||||
CVE-2025-4602,0,0,409776dd4d3f5aa956641458acdab541ced8aee4cc4b0cac3a447338c59994d1,2025-05-28T14:58:52.920000
|
||||
CVE-2025-4603,0,0,353abd9188b7471dff5b9b62f88597abbd29f78728037be18e8dafefcd5f4d4e,2025-05-28T14:58:52.920000
|
||||
CVE-2025-46041,0,0,dc7ed8d00840600a9f5f28d0044f0bcf7424f5e106bcbf4fb8ec3d746dd238fd,2025-06-09T20:15:24.113000
|
||||
CVE-2025-4605,1,1,1115f0d5652d8285f8fb5c7fefef07cf745e94cf97ee2c4d9fe05f25574b329e,2025-06-11T14:15:36.847000
|
||||
CVE-2025-46052,0,0,ab7d3250787ede688cd6b355d8aec0cc3dda171eb18d9b03fdd032c02ce8c40d,2025-05-16T14:43:26.160000
|
||||
CVE-2025-46053,0,0,a812a9fd2122f294cfbb7de5fd43b870987b1f7127ab686b037255809ebad4e4,2025-05-19T19:15:51.580000
|
||||
CVE-2025-4607,0,0,7929f7497a2f3fdbdefa5c40c24e8dfb722bcbca57929b42733b89c15e0bc1dd,2025-06-02T17:32:17.397000
|
||||
@ -296258,7 +296264,7 @@ CVE-2025-4771,0,0,098fa6c5f50ab00bca1e41fbaecb02800df7623ac7bf2fda48146206c10d34
|
||||
CVE-2025-47710,0,0,efb080a2ca87d31fc53e84646807eb619dd8ffb84063c97064b1c37508c6b60a,2025-06-10T15:24:50.570000
|
||||
CVE-2025-47711,0,0,84134213c5152e1def5667fee36ba3a5b2be995d24d7708c58e002afb898ec35,2025-06-09T12:15:47.880000
|
||||
CVE-2025-47712,0,0,36ab066e163c4ffc449059531315de23291a62b1378074f34cd0681da81a794c,2025-06-09T12:15:47.880000
|
||||
CVE-2025-47713,0,0,73cdc94bb93d27aed7526d48c29082a31e3da6594c1320cec78e4716519d2504,2025-06-10T23:15:58.320000
|
||||
CVE-2025-47713,0,1,e7b1e676acaff8c3a5093a4ba694f663f5a44fc63c9472c508efc502d61c3fe6,2025-06-11T14:15:35.560000
|
||||
CVE-2025-4772,0,0,d0f3fa4362a8236e85b8ffd939fd0423a16232ac9a4ecc1b20eb2790c7640e3f,2025-05-21T20:59:39.237000
|
||||
CVE-2025-47724,0,0,c392ae279a9c6e1324e9d9c71628ad9f2bd31920b4d617428838fa9f83dc2fa5,2025-06-04T14:54:33.783000
|
||||
CVE-2025-47725,0,0,889f3515c44952cf57a8d17f0356726e20588e99515827ba927156d41cc6af64,2025-06-04T14:54:33.783000
|
||||
@ -296329,7 +296335,7 @@ CVE-2025-4782,0,0,7ad1545eb9e016317ccf1371b442ca29cb62e72aa504ad708f7f2767909134
|
||||
CVE-2025-47827,0,0,e8e7d1db0126d69a3b1ce4ce3cd4a43b2b63ba3f83e4b78ec9433a4d6806ed2f,2025-06-10T15:15:25.270000
|
||||
CVE-2025-47828,0,0,164436fe84b8d833a71f3fa8e7f3f39b64e2df889f4579512ca4cd1f99b4e769,2025-05-12T17:32:32.760000
|
||||
CVE-2025-4783,0,0,bd5695c741cd6c06c07a958617e5fade1eea7d7c38bb9f2f382e0e33491cd176,2025-05-28T15:01:30.720000
|
||||
CVE-2025-47849,0,0,d80fcc52b5328cf7208f1ac68e6e8877930ba70982938ef3174ab9db8146f45b,2025-06-10T23:15:58.453000
|
||||
CVE-2025-47849,0,1,c2e2bbdcf05b9d5fb97ebf1ca233103fed6d72696ade8e5ed7911ea284c9c625,2025-06-11T14:15:35.727000
|
||||
CVE-2025-4785,0,0,11af03bace6c1c04331c5dddb8e99f128f61109ba1a035e35492e3dbcae57560,2025-05-21T21:00:19.110000
|
||||
CVE-2025-47850,0,0,6ffc73421957f99914a384dd377153330e8c59407b63d74450ed145d56da1d54,2025-05-21T20:24:58.133000
|
||||
CVE-2025-47851,0,0,bae42746a3d0b7b8a748ca2f4220c01f83bf85343adefcd6c74910e655b0981c,2025-05-28T21:13:48.670000
|
||||
@ -296410,6 +296416,7 @@ CVE-2025-4801,0,0,fc6ec83b7f99dbba6d1228da70489464cc23b7a30d8f01ad6791644a180c45
|
||||
CVE-2025-48010,0,0,4819d2e93ad3442257f70fb7864093e1a4200a7b0a7fba4a346e3f36d3da9e5b,2025-06-10T14:13:51.267000
|
||||
CVE-2025-48011,0,0,258b9fec7bb0d96eb7155a40013213737fe713d9c9fbe682bbd078d999f91910,2025-06-10T14:28:15.027000
|
||||
CVE-2025-48012,0,0,71d63bd70525687602bc234fe1b79ef8d4a14328f61a484c736f611a8ad14409,2025-06-10T14:28:52.893000
|
||||
CVE-2025-48013,1,1,56d76151678247bbd4f469dc2159584042c5f83cf64cccf07e84ead3e86e31c9,2025-06-11T15:15:41.830000
|
||||
CVE-2025-48014,0,0,b9d2079ba78dd708b6501c98bcfc8c530a41a6a42eec8a9e644487633db1d02d,2025-05-21T20:24:58.133000
|
||||
CVE-2025-48015,0,0,97195b1375e738b78c3c892de114d387c5901e8ee163a174bd7cc7d86bb801d6,2025-05-21T20:24:58.133000
|
||||
CVE-2025-48016,0,0,7f338d05ff0bf5457b003e53823b639de05c7abe792c9baaaefb3f53dc116634,2025-05-21T20:24:58.133000
|
||||
@ -296629,6 +296636,11 @@ CVE-2025-48427,0,0,7b7d0b24d905cbea3b50146b37b4cf62666de442b9ee6475e1cabe343e0aa
|
||||
CVE-2025-4843,0,0,5890e4c47a5552e18a9be038fa9194d6f64cc12e48ceed25f7f3e1b0ba45bf6f,2025-06-04T20:11:36.947000
|
||||
CVE-2025-48432,0,0,5f6d8752b6215d1c6c6ed176249453d7202995237846ebecf3edfe940755446e,2025-06-10T18:15:32.790000
|
||||
CVE-2025-4844,0,0,c912eb5a20c5346c9f6d6c3e57f91f3a367b50a9f461c9f08439baff48bc8fef,2025-06-04T20:11:19.110000
|
||||
CVE-2025-48444,1,1,ef2eb1da23c8d96d03a87fcd8d328e862d9485eaa988c50fbdcf0d7e572a2f9f,2025-06-11T15:15:42.143000
|
||||
CVE-2025-48445,1,1,53213dbf4f875bf1e256a194dc0f1d5b36be13a3e9f8270c446dbb581459c668,2025-06-11T15:15:42.270000
|
||||
CVE-2025-48446,1,1,59cb264358d5d9d97b6953edc8c8a093ad2ae3aff698cf08e72258ef6b7f9799,2025-06-11T15:15:42.427000
|
||||
CVE-2025-48447,1,1,e6c4213a4256e6dc39a71496ec19a54a54152079678fbbc0b2a482be1f11f7c7,2025-06-11T15:15:42.607000
|
||||
CVE-2025-48448,1,1,7429abe0813bb5e0c4a4b49796f402fde9ff88d156185bb09a100e46774a8c38,2025-06-11T15:15:42.733000
|
||||
CVE-2025-4845,0,0,5d1b81810c6ca4083e9e97cb1e8cb24890cd9aa68161fff1d9a41ed5b829a66e,2025-06-04T20:11:09.500000
|
||||
CVE-2025-4846,0,0,4dd97835f28bce0c2a0646c496f88035dc9f48717c734fc8fd3222164cab7575,2025-05-19T13:35:20.460000
|
||||
CVE-2025-4847,0,0,6fb9786d7d0457ea8b5c8f209062b29242bda3291cd69f18d9d7b36a0b0e46d5,2025-06-04T20:11:01.580000
|
||||
@ -296872,6 +296884,8 @@ CVE-2025-49140,0,0,41fcec6243aa5d7f5df8648df8084e34894ac7ed31a6ee04e5726a36fd81c
|
||||
CVE-2025-49141,0,0,c27a5db8847ba6463beeffc0f33ecced17eb646ef426e9c77fae0b5a96f645b7,2025-06-10T16:15:42.193000
|
||||
CVE-2025-49142,0,0,b6552c867dcdae934f4510e82e6caaa381511e720ec6623ff0ffb45ff0c083a8,2025-06-10T16:15:42.293000
|
||||
CVE-2025-49143,0,0,9d062967241f50913064a334ed49b074edc4a399d0d32df3945192529f45fc06,2025-06-10T16:15:42.450000
|
||||
CVE-2025-49146,1,1,bf8fcfd2e71318c98e6d0d098b9753fdbed7a70096e9376cc478a1e6bc1dfb24,2025-06-11T15:15:42.850000
|
||||
CVE-2025-49148,1,1,631b0aa9580b38e2d95b5ddbe35fc4e80e64a71b9fb1b7e7f39651aee675f4f5,2025-06-11T15:15:43.043000
|
||||
CVE-2025-4915,0,0,46c7fa6aa65dcb339a70ae5c3381e0e409573ebed627552c1d75e88ea8911815,2025-05-19T17:37:39.277000
|
||||
CVE-2025-4916,0,0,f4f666575ba307bca9e4be1cb48057a5262f7335ea23c5ca4141ce76f034cc3f,2025-05-19T17:37:50.063000
|
||||
CVE-2025-49162,0,0,30d8f0e974a690ba3faf665b7cd4695ab5fb985c2cad4bb0465fb4c9980fa7c1,2025-06-04T14:54:33.783000
|
||||
@ -296891,6 +296905,7 @@ CVE-2025-49208,0,0,a8e96108da8f9e7efa92e227e5541e40bf6024b1bdd55d38cbd0bffbcfb12
|
||||
CVE-2025-49209,0,0,293d4b58934d7545b7379d142ec4ec0556406a7f545f40e2a06e2176fbaac700,2025-06-04T03:15:27.057000
|
||||
CVE-2025-4921,0,0,6764dccda373512b657fe3c8300f9213acc595572fe2b42c347ebcd82da48e2d,2025-05-18T20:15:19.273000
|
||||
CVE-2025-49210,0,0,0d98b9f5865953f1015e0875c4ef02572a5474d0f348f574d55b17a2fdab9325,2025-06-04T03:15:27.127000
|
||||
CVE-2025-4922,1,1,240820cc7731a21e664c34b2ce9fbe4123442bc1d58c6804b9dce72455a31633,2025-06-11T14:15:37.140000
|
||||
CVE-2025-49223,0,0,648cfa7c40c96de295e183f0ea98c44bf314195a3ae5c64b8746fcff08134939,2025-06-06T19:30:16.060000
|
||||
CVE-2025-4923,0,0,9beba7071c51eba6c1d71d0a324059e1f5260406f92dc4aea21591df042815db,2025-05-28T12:50:28.590000
|
||||
CVE-2025-49235,0,0,8c9fd6d5e7a7c75e9718e9d71425868ac554e5b2c4e799bbc755c0b8dcf21e57,2025-06-06T14:06:58.193000
|
||||
@ -296934,7 +296949,7 @@ CVE-2025-49286,0,0,0c3f98e47f6b48b3e0e84b2c0a66a43c574c16be1a5a57ed596d579641877
|
||||
CVE-2025-49287,0,0,d582e9741824478fed543ad16f5e4fde0ce4d63284bc6d280c033891572377ac,2025-06-06T14:06:58.193000
|
||||
CVE-2025-49288,0,0,97ac98290dbbce6e9c1cc88246bf869a83494ce71b21b087c18bc155d2acfd94,2025-06-06T14:06:58.193000
|
||||
CVE-2025-49289,0,0,fd792354de84cf9d0669b41ca31d9bfae3bbf12279fe8d7bb8414b6b637fbb13,2025-06-06T14:06:58.193000
|
||||
CVE-2025-4929,0,0,9aa7f26cd205a99fea5ff2d7bff4801aceb991149094badf93f19647e42edf94,2025-05-21T17:42:52.510000
|
||||
CVE-2025-4929,0,1,a8e593e93f40512d4e00d2cf8b1f6bcbb5d53e9a2cd29f3fc687456ae4295712,2025-06-11T14:54:00.567000
|
||||
CVE-2025-49291,0,0,8134d1964dff1f1760992dbc201fbfd8d79201074def3a1c1fac78050d47f0c4,2025-06-06T14:06:58.193000
|
||||
CVE-2025-49292,0,0,0ca180db220c352852a434aec97e01e62813479b97501ec49f80b986aca4a599,2025-06-06T14:06:58.193000
|
||||
CVE-2025-49293,0,0,945e3d8bbfdfc4a328a4438a25692fd2557e65fe18072af826e236c0461cd9e5,2025-06-06T14:06:58.193000
|
||||
@ -297011,20 +297026,20 @@ CVE-2025-49509,0,0,1518f93f1ee224f1f100bcee71d6ba948043b73035e7eb346a997192f9c2e
|
||||
CVE-2025-4951,0,0,8d2965f90ffa46a261e1b06cd533aeb358abbd5115dc1f57a5b34acf12ab582b,2025-05-21T20:25:16.407000
|
||||
CVE-2025-49510,0,0,380506e2ae8c03ebf1a0d58576260eadb6379c51baddcca2c48765ccd61fe5a4,2025-06-10T13:15:23.583000
|
||||
CVE-2025-49511,0,0,89f9e9e06a92ee36a7fcee42b322bef8df2556399087804f516e0b0f17a65447,2025-06-10T13:15:23.747000
|
||||
CVE-2025-4954,0,0,4f8b18e50e35fbfc0cb799c772c703df1c5ec3452b90f5bc7c961ccbbcb5c026,2025-06-10T06:15:22.403000
|
||||
CVE-2025-4954,0,1,9b67173de6a4b8213182ed4ceb49024d3aa79e4cb7e72692c8f9984c1acc24c3,2025-06-11T14:15:37.287000
|
||||
CVE-2025-49599,0,0,cd0748db942732a0e968c564ce05d560bd51611e52e8cb06dc26ca9e65d8d9b0,2025-06-09T16:15:46.830000
|
||||
CVE-2025-49619,0,0,bf456b7c74aaa6eab01b4c779d57de166fafc9ff7198338c147fed153e2c86a7,2025-06-09T16:15:46.937000
|
||||
CVE-2025-4963,0,0,bcea30a5657c56e720740d0c1da3f6ecccc2ea27495c62c19f4e987237e46939,2025-05-28T15:01:30.720000
|
||||
CVE-2025-4964,0,0,9a4175fc819c8903aae087508d79cb283240d351bb7e4f3f9bd0bc9b58a9f683,2025-06-06T14:07:28.330000
|
||||
CVE-2025-49651,0,1,3dc40157fb10bae7243a77ac51b211b66ba5acc56dee973c3a32b5a2ba7b366d,2025-06-11T13:15:24.483000
|
||||
CVE-2025-49652,0,1,4e7502c990624f15263178caeb248d6dfded2ce2c251ff5e53411eb5a9308d20,2025-06-11T13:15:24.613000
|
||||
CVE-2025-49653,0,1,1ecfe673ed5ad877726cedd55cefd4c60f1c99abefcd145ee08bdc016366d375,2025-06-11T13:15:24.720000
|
||||
CVE-2025-49651,0,0,3dc40157fb10bae7243a77ac51b211b66ba5acc56dee973c3a32b5a2ba7b366d,2025-06-11T13:15:24.483000
|
||||
CVE-2025-49652,0,0,4e7502c990624f15263178caeb248d6dfded2ce2c251ff5e53411eb5a9308d20,2025-06-11T13:15:24.613000
|
||||
CVE-2025-49653,0,0,1ecfe673ed5ad877726cedd55cefd4c60f1c99abefcd145ee08bdc016366d375,2025-06-11T13:15:24.720000
|
||||
CVE-2025-4966,0,0,8884eb97bbdf1a18517bed6dc84588ccbd4cf19bb3dff5ec3aa5d29bc4c7285b,2025-06-06T14:07:28.330000
|
||||
CVE-2025-4967,0,0,108222a9fb8d269319085d1510581dfa0458c27c4448fa960791612bde83ca72,2025-05-30T16:31:03.107000
|
||||
CVE-2025-4969,0,0,4f90cc424a2a0f4e9ed8afa3693879db2394c134460b9fa8753024f2852d3968,2025-05-21T20:24:58.133000
|
||||
CVE-2025-49709,1,1,746dffc6d2c5432d7e4eba087556ee9d62a1593fe8d9f284a73de26c2354176d,2025-06-11T12:15:26.977000
|
||||
CVE-2025-49709,0,1,b77d5424288dcc0bed80e77e1927d6b441744d6c0d21e8a94d2316ea54f0de01,2025-06-11T14:15:36.387000
|
||||
CVE-2025-4971,0,0,ec01b010a198b670732c969d73dfa53bbd76f2e075f866245cc573c614982079,2025-05-21T20:25:16.407000
|
||||
CVE-2025-49710,1,1,e16065f68a1c3ecdcf2117f4df50c2fccdd2d13a0cce4d1033f135418707e259,2025-06-11T12:15:27.083000
|
||||
CVE-2025-49710,0,1,3bfd7fdb4da0e1ab3a8c31ff1b5a2b77e7a67d42631f74776c5e53ec20cb3a19,2025-06-11T14:15:36.527000
|
||||
CVE-2025-4975,0,0,e6592341c2d044f9e5e990b69dac44d61e569344ba65d2de38b936ca41ba415e,2025-05-23T15:54:42.643000
|
||||
CVE-2025-4977,0,0,bd1fd849d67fd76fbcb9bab811ae102c8a3ea5945e2e64bb03121997ef69d512,2025-05-21T20:25:16.407000
|
||||
CVE-2025-4978,0,0,d098f546d229ff0b8b6c1c02e6df2a8e7e88cccb563b41e18115eb4da78ff2f6,2025-05-21T20:25:16.407000
|
||||
@ -297139,10 +297154,10 @@ CVE-2025-5135,0,0,ff5e4b4f352f002c704ddb4fec56d312bfa70e7ac4d7428009d05887b065c4
|
||||
CVE-2025-5136,0,0,bd0c27de50ee06fcb71ffb69b26d594d7fa702a9a559c430c5d629f3be8d9822,2025-05-28T18:15:29.530000
|
||||
CVE-2025-5137,0,0,a461b4cd382da5c206010b8729faf9840aa41b3d9e8c8cf8ba7880897f06f378,2025-06-10T19:33:16.710000
|
||||
CVE-2025-5138,0,0,3bae41860cd01f5b3b29a66081652cec538a389d28958af017b419d06b38908c,2025-05-28T14:58:52.920000
|
||||
CVE-2025-5139,0,0,1f6b6d6f74654497d336b663b2d16a5fe2eea3d0378c7d1c3577dfaa66e63c83,2025-05-28T14:58:52.920000
|
||||
CVE-2025-5139,0,1,478cd92def8402421385452923781dbb1e2d7c36d24453f72439415b1b27838f,2025-06-11T14:15:37.437000
|
||||
CVE-2025-5140,0,0,7eb8851e623e7595aeb04f88f3b17c4f06b9055459a202a999065089d465d23f,2025-05-28T14:58:52.920000
|
||||
CVE-2025-5142,0,0,cfb77a196d5255a5a436db83dff520eaaa1d53cc832ec32bce9b0d13a0b8d87b,2025-06-04T18:29:34.470000
|
||||
CVE-2025-5144,1,1,1a91210a39f37e90277264f7461097da3f9ae047ad04d93d74703664d1f3c808,2025-06-11T13:15:24.823000
|
||||
CVE-2025-5144,0,0,1a91210a39f37e90277264f7461097da3f9ae047ad04d93d74703664d1f3c808,2025-06-11T13:15:24.823000
|
||||
CVE-2025-5145,0,0,79eef495ab65fcf81286a635001443af56e362b501d3db2d9a57e69f802a1c67,2025-05-28T14:58:52.920000
|
||||
CVE-2025-5146,0,0,30dc5c61e39c6bb48e155d9bcd0fd66e2395886111a482cc56b330fb6c74d9f8,2025-05-29T07:15:25.120000
|
||||
CVE-2025-5147,0,0,0d68c3226bde9ea189f2d3e4a81d7d02206c36b54e63b2ea80685be3458a5459,2025-05-29T07:15:25.330000
|
||||
@ -297238,16 +297253,16 @@ CVE-2025-5256,0,0,8e276989283383806f3abf5c20dbe67142f0dc8ca07046605c539922633ebc
|
||||
CVE-2025-5257,0,0,75d358e3d2bbe3761b44e1bc4ce97e0b1726e1521e4fab98ee61ac2e91cdcfa1,2025-05-29T14:29:50.247000
|
||||
CVE-2025-5259,0,0,762eb0e82b940f038c9de9747260da22e83abc89d044ade4d08f1060ed5d681a,2025-05-30T16:31:03.107000
|
||||
CVE-2025-5262,0,0,8d158d6fd94524fd413794cf0b5bc75dd7b83edc10bc60eca4a90ef0afe5fb85,2025-05-27T18:15:31.980000
|
||||
CVE-2025-5263,0,1,aa86671b7ea99b1d0dfc0c6352f8f2192817a359ea9bf4567f068ac38cd6af34,2025-06-11T12:15:27.183000
|
||||
CVE-2025-5264,0,1,5acf980c26362c26ab94ae3c7ae821049757c87d0eefb697447d18253fa00440,2025-06-11T12:15:27.373000
|
||||
CVE-2025-5265,0,1,28606bb83a73b4f9d7dede4858210717150080ffa1d142904c522b1757edcd5e,2025-06-11T12:15:27.553000
|
||||
CVE-2025-5266,0,1,86469d529066a0232f0c8eb07f8e9f67c94f247bc436f8d1062b8a0475806c9b,2025-06-11T12:15:27.730000
|
||||
CVE-2025-5267,0,1,8716e9a87e0f688cdc06fb8b4836782dc60cade2df62eba24b97b33d9115e8be,2025-06-11T12:15:27.910000
|
||||
CVE-2025-5268,0,1,d57c0308433fa204e62ae9e945a3726f05cee3787137e819d7cdad3d4005c86c,2025-06-11T12:15:28.087000
|
||||
CVE-2025-5269,0,1,b922f617fbcbba106d44af23edcbb0031488ab18b41d436f84ab099755898527,2025-06-11T12:15:28.270000
|
||||
CVE-2025-5270,0,1,96297246b7606c4dbbeaaf8f99515d023221026a42fbd39003eb5516a389c3ab,2025-06-11T12:15:28.457000
|
||||
CVE-2025-5271,0,1,e8162e6d0dc193ebe9401a5dcd034fa2e97416454d77b1504f9845da76fee3ef,2025-06-11T12:15:28.647000
|
||||
CVE-2025-5272,0,1,b1d0c7e19ac36597fb989e72bcee09751441797b45636fb052ca12e726df56d9,2025-06-11T12:15:28.840000
|
||||
CVE-2025-5263,0,0,aa86671b7ea99b1d0dfc0c6352f8f2192817a359ea9bf4567f068ac38cd6af34,2025-06-11T12:15:27.183000
|
||||
CVE-2025-5264,0,0,5acf980c26362c26ab94ae3c7ae821049757c87d0eefb697447d18253fa00440,2025-06-11T12:15:27.373000
|
||||
CVE-2025-5265,0,0,28606bb83a73b4f9d7dede4858210717150080ffa1d142904c522b1757edcd5e,2025-06-11T12:15:27.553000
|
||||
CVE-2025-5266,0,0,86469d529066a0232f0c8eb07f8e9f67c94f247bc436f8d1062b8a0475806c9b,2025-06-11T12:15:27.730000
|
||||
CVE-2025-5267,0,0,8716e9a87e0f688cdc06fb8b4836782dc60cade2df62eba24b97b33d9115e8be,2025-06-11T12:15:27.910000
|
||||
CVE-2025-5268,0,1,e9f59b14522cad4c6fd38501962b508cda347cb1089d8cbaeee3eacb6c967577,2025-06-11T14:51:14.950000
|
||||
CVE-2025-5269,0,0,b922f617fbcbba106d44af23edcbb0031488ab18b41d436f84ab099755898527,2025-06-11T12:15:28.270000
|
||||
CVE-2025-5270,0,0,96297246b7606c4dbbeaaf8f99515d023221026a42fbd39003eb5516a389c3ab,2025-06-11T12:15:28.457000
|
||||
CVE-2025-5271,0,0,e8162e6d0dc193ebe9401a5dcd034fa2e97416454d77b1504f9845da76fee3ef,2025-06-11T12:15:28.647000
|
||||
CVE-2025-5272,0,0,b1d0c7e19ac36597fb989e72bcee09751441797b45636fb052ca12e726df56d9,2025-06-11T12:15:28.840000
|
||||
CVE-2025-5273,0,0,7a172885547dbfa68292354132d6eab77847bfdd0e0f37bfe0a33c637c28685a,2025-05-29T14:29:50.247000
|
||||
CVE-2025-5276,0,0,39d67915dab7ad2300f3ccd3a288fcee1075e32b914c45ad140eb6b7725be52b,2025-05-29T14:29:50.247000
|
||||
CVE-2025-5277,0,0,ba5aa3a145e9e2e34ac18c63e7fe60e94ac49ba4d7121cc0bc36eebe3309abbf,2025-05-28T15:01:30.720000
|
||||
@ -297530,7 +297545,7 @@ CVE-2025-5680,0,0,951e9727eb6f85cb1826e5addda531b5a3ed92e200dcd69a9572852fb51b7d
|
||||
CVE-2025-5683,0,0,1a3b3cb960b03a08fa5b7c4079149ff9fe6c9f4a5d5c8b0f22c43f750a1037ab,2025-06-05T20:12:23.777000
|
||||
CVE-2025-5685,0,0,9300f7d7685cfc359ac44cb8501f97431249edd5f4608a9c2df4c4def6573138,2025-06-10T15:01:39.320000
|
||||
CVE-2025-5686,0,0,ceecb4c8c9b6240c3c4cf6461703c0b505d1b9b8eeadd71aabaf7a72390230d4,2025-06-06T14:07:28.330000
|
||||
CVE-2025-5687,1,1,c421add6eee3470a0c8dd4c0cfabac86c20482eace4697dc1de0a9f06f87c7e8,2025-06-11T12:15:29.023000
|
||||
CVE-2025-5687,0,1,292ba6f1554d37b3cbf8506ac631bee8568c04e2764e21ee6a0ae1222781f5bf,2025-06-11T14:15:37.730000
|
||||
CVE-2025-5688,0,0,8859de4a9377955821b5e59f7a118128be39b8ffcd1a35e1ff851cd9073a522a,2025-06-05T20:12:23.777000
|
||||
CVE-2025-5690,0,0,2e6ec95a91973b0c3c4a92b7ee6f9cd8669b2bfbe2e8890344ec60c22753f2e7,2025-06-05T20:12:23.777000
|
||||
CVE-2025-5693,0,0,3eb6fccacf1bd20f2333db0bbaacd99059fce8b8a971e8a4304fa128bcdb0cb9,2025-06-10T15:01:27.903000
|
||||
@ -297699,8 +297714,8 @@ CVE-2025-5935,0,0,bca6b82aff793b09175597d3d76faef10a884937cddad66c78fab2ba223eb2
|
||||
CVE-2025-5943,0,0,571906ffe14a79e22d0036c86683c5a92f8c755e9133387c395960e0afa9c11b,2025-06-10T18:15:33.020000
|
||||
CVE-2025-5945,0,0,c7e4d5fd43d260b09c3d268ba39649757ca6834ec123b67f85c953ef50c7c56d,2025-06-10T09:15:25.930000
|
||||
CVE-2025-5952,0,0,89b97adc3e12e17ca18b9484f2cc0cbac7f8ea34e27cce81e859e2ad09b23e1a,2025-06-10T16:15:45.717000
|
||||
CVE-2025-5958,0,0,881203d72e5ff9dec1d36edbffe80ff56b2ff61971d68af539fac81daa5fb5c6,2025-06-11T01:15:20.890000
|
||||
CVE-2025-5959,0,0,bd8633464c7a0c0b351dfe476239cef2ce42ae529b390cb1de676ca144a4abb7,2025-06-11T01:15:21.030000
|
||||
CVE-2025-5958,0,1,96c847f1fcedfcbc1a4a3cb442c43d2d7018595ed5552138040384b10ef2f717,2025-06-11T14:15:37.870000
|
||||
CVE-2025-5959,0,1,82dedbdbfb3124c73cac0939bd9a9e757e9b2adfb2c48acae92ddfb7c18666c5,2025-06-11T14:15:38.037000
|
||||
CVE-2025-5969,0,0,0cb5f1eef226658325ae1059818aba7cb4928688bc7acca6d60e3f96dc260577,2025-06-10T17:25:20.293000
|
||||
CVE-2025-5970,0,0,d7c94f11149aa2d1fa422037b5710258375a5e88a21be20512abe255cca0c035,2025-06-10T17:25:24.033000
|
||||
CVE-2025-5971,0,0,a585731e3dcf519d6d97e5105421f7765406419a5d86aa36be35cba576add91e,2025-06-10T19:15:35.400000
|
||||
@ -297710,10 +297725,10 @@ CVE-2025-5974,0,0,339321be4c5ac9108cce5e98767fc5970ae083450218fa354fd8033f05a252
|
||||
CVE-2025-5975,0,0,9008eeb9527e9693001a3be4b45aa5cf8a88c8a44caffd0e0b12ea03a78b8ee2,2025-06-10T20:15:25.117000
|
||||
CVE-2025-5976,0,0,6867fdd2eea80fafea5defe2bbd68074fcd28406e4e3c12b1e1b2d17570ffa73,2025-06-10T20:15:25.297000
|
||||
CVE-2025-5977,0,0,f304c9ff5770b6781d3f20efc156d80096139af8a0274e3045f16c5bb9d0173f,2025-06-10T20:15:25.480000
|
||||
CVE-2025-5978,0,0,4e4d69a73c249e0a4a5dd907dae67dfe13fdf168bd6154e3a3a2e85793f26d9e,2025-06-10T21:15:22.793000
|
||||
CVE-2025-5979,0,0,d27c61690a89a70834e1ac7ec79b55e9c00b548ee2fa9335cb0305161ad45244,2025-06-10T21:15:22.970000
|
||||
CVE-2025-5980,0,0,e040dd481b18254b8331cc7db878c5d64b7a6be5a4fa7521d9ea11a576b92997,2025-06-10T21:15:23.150000
|
||||
CVE-2025-5978,0,1,833468fafff899f09b44b3f8512c6da898f71d16442bcf518b12d7261792bab5,2025-06-11T14:15:38.197000
|
||||
CVE-2025-5979,0,1,949ef8eb455e4068bca42c4c3d743edb0ab1ceb773f9800b8141d70bb61874a5,2025-06-11T14:15:38.320000
|
||||
CVE-2025-5980,0,1,5e8c433ab9210c16ea0a5bd79d3eeebd09b12dfc93a863467a89df0063df20fc,2025-06-11T14:15:38.623000
|
||||
CVE-2025-5984,0,0,23b7a2e2427c55d6b8b71bdfb3210e81fbbb4de6329b5126e67b10ed13442fce,2025-06-10T23:15:58.583000
|
||||
CVE-2025-5985,0,0,6446d10df39548f8cc9543e4c4495bd4e0a246e2b8805b29cf25763ee00bb5ed,2025-06-10T23:15:58.770000
|
||||
CVE-2025-5986,1,1,b188af1bd59926106ceca49db67102e84e5873a91ec7194d797228e2ae3e438a,2025-06-11T12:15:29.183000
|
||||
CVE-2025-5986,0,1,1990e16fb8c462afd3f99f716f6335400ec441a8016940956e56aaac259aed8c,2025-06-11T14:15:38.880000
|
||||
CVE-2025-5991,0,0,63a683acbdc0ee08246e1a037b74c64c0c9a5c11210d84e35e546c14a58c12d4,2025-06-11T08:15:22.933000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user