Auto-Update: 2025-03-10T17:00:20.674386+00:00

This commit is contained in:
cad-safe-bot 2025-03-10 17:03:50 +00:00
parent 6f3f30e713
commit 9f8687e973
69 changed files with 4684 additions and 429 deletions

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-0582",
"sourceIdentifier": "psirt@forgerock.com",
"published": "2024-03-27T18:15:08.237",
"lastModified": "2024-11-21T07:37:26.337",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-03-10T15:50:32.850",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 5.2
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
@ -49,24 +69,69 @@
"value": "CWE-22"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:forgerock:access_management:*:*:*:*:*:*:*:*",
"versionEndExcluding": "7.1.4",
"matchCriteriaId": "478F1C63-04C4-4408-89B2-9BB8DCDEC3A7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:forgerock:access_management:7.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C87A61CB-EA7F-4898-AA4A-4E4A911D6942"
}
]
}
]
}
],
"references": [
{
"url": "https://backstage.forgerock.com/downloads/browse/am/featured",
"source": "psirt@forgerock.com"
"source": "psirt@forgerock.com",
"tags": [
"Product"
]
},
{
"url": "https://backstage.forgerock.com/knowledge/kb/article/a64088600",
"source": "psirt@forgerock.com"
"source": "psirt@forgerock.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://backstage.forgerock.com/downloads/browse/am/featured",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
]
},
{
"url": "https://backstage.forgerock.com/knowledge/kb/article/a64088600",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-20857",
"sourceIdentifier": "security@vmware.com",
"published": "2023-02-28T17:15:10.457",
"lastModified": "2024-11-21T07:41:42.380",
"lastModified": "2025-03-10T15:15:36.383",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 0.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"attackVector": "PHYSICAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 0.9,
"impactScore": 5.9
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-306"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-306"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-27295",
"sourceIdentifier": "vulnreport@tenable.com",
"published": "2023-02-28T17:15:11.547",
"lastModified": "2024-11-21T07:52:35.963",
"lastModified": "2025-03-10T15:15:36.603",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 2.5
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.5
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-352"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-38534",
"sourceIdentifier": "security@opentext.com",
"published": "2024-03-13T22:15:08.197",
"lastModified": "2024-11-21T08:13:46.917",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-03-10T15:09:26.080",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 4.0
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
@ -49,16 +69,54 @@
"value": "CWE-287"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-287"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:opentext:exceed_turbox:12.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DE9861EE-FAF9-4471-BF27-46E7A8B8F8B4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:opentext:exceed_turbox:12.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "69487C36-3ED3-4271-A55B-0A98D555BB02"
}
]
}
]
}
],
"references": [
{
"url": "https://support.opentext.com/csm?id=kb_article_view&sysparm_article=KB0796609",
"source": "security@opentext.com"
"source": "security@opentext.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://support.opentext.com/csm?id=kb_article_view&sysparm_article=KB0796609",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-38535",
"sourceIdentifier": "security@opentext.com",
"published": "2024-03-13T22:15:08.463",
"lastModified": "2024-11-21T08:13:47.050",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-03-10T15:09:26.080",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.0,
"impactScore": 3.6
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
@ -49,16 +69,54 @@
"value": "CWE-321"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-798"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:opentext:exceed_turbox:12.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DE9861EE-FAF9-4471-BF27-46E7A8B8F8B4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:opentext:exceed_turbox:12.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "69487C36-3ED3-4271-A55B-0A98D555BB02"
}
]
}
]
}
],
"references": [
{
"url": "https://support.opentext.com/csm?id=kb_article_view&sysparm_article=KB0801267",
"source": "security@opentext.com"
"source": "security@opentext.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://support.opentext.com/csm?id=kb_article_view&sysparm_article=KB0801267",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-38536",
"sourceIdentifier": "security@opentext.com",
"published": "2024-03-13T22:15:08.710",
"lastModified": "2024-11-21T08:13:47.197",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-03-10T15:09:26.080",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 0.9,
"impactScore": 5.5
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
@ -49,16 +69,54 @@
"value": "CWE-79"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:opentext:exceed_turbox:12.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DE9861EE-FAF9-4471-BF27-46E7A8B8F8B4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:opentext:exceed_turbox:12.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "69487C36-3ED3-4271-A55B-0A98D555BB02"
}
]
}
]
}
],
"references": [
{
"url": "https://support.opentext.com/csm?id=kb_article_view&sysparm_article=KB0796182",
"source": "security@opentext.com"
"source": "security@opentext.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://support.opentext.com/csm?id=kb_article_view&sysparm_article=KB0796182",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-44999",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-03-27T14:15:09.253",
"lastModified": "2024-11-21T08:26:12.467",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-03-10T15:50:32.850",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 2.5
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
@ -51,14 +71,38 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://patchstack.com/database/vulnerability/woocommerce-gateway-stripe/wordpress-woocommerce-stripe-gateway-plugin-7-6-0-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
},
"nodes": [
{
"url": "https://patchstack.com/database/vulnerability/woocommerce-gateway-stripe/wordpress-woocommerce-stripe-gateway-plugin-7-6-0-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:woocommerce:stripe_payment_gateway:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "7.6.0",
"matchCriteriaId": "5BFB7CAF-01E5-4890-8A27-59C3AB8891A1"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/woocommerce-gateway-stripe/wordpress-woocommerce-stripe-gateway-plugin-7-6-0-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://patchstack.com/database/vulnerability/woocommerce-gateway-stripe/wordpress-woocommerce-stripe-gateway-plugin-7-6-0-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-45824",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-03-25T19:15:57.027",
"lastModified": "2024-11-21T08:27:25.933",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-03-10T14:59:09.437",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
@ -49,24 +69,67 @@
"value": "CWE-200"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oroinc:oroplatform:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.2.0",
"versionEndExcluding": "5.1.4",
"matchCriteriaId": "89B3DB07-5C6E-45E1-9590-53DC197374FA"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/oroinc/platform/commit/cf94df7595afca052796e26b299d2ce031e289cd",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Product"
]
},
{
"url": "https://github.com/oroinc/platform/security/advisories/GHSA-vxq2-p937-3px3",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "https://github.com/oroinc/platform/commit/cf94df7595afca052796e26b299d2ce031e289cd",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
]
},
{
"url": "https://github.com/oroinc/platform/security/advisories/GHSA-vxq2-p937-3px3",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-48296",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-03-25T19:15:57.300",
"lastModified": "2024-11-21T08:31:25.800",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-03-10T14:59:09.437",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
@ -49,24 +69,65 @@
"value": "CWE-200"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oroinc:oroplatform:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.1.0",
"versionEndExcluding": "5.1.4",
"matchCriteriaId": "434D6C2A-C8EA-4667-99BB-564738EC3D0E"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/oroinc/orocommerce/commit/41c526498012d44cd88852c63697f1ef53b61db8",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/oroinc/orocommerce/security/advisories/GHSA-v7px-46v9-5qwp",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://github.com/oroinc/orocommerce/commit/41c526498012d44cd88852c63697f1ef53b61db8",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/oroinc/orocommerce/security/advisories/GHSA-v7px-46v9-5qwp",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-50168",
"sourceIdentifier": "security@pega.com",
"published": "2024-03-14T16:15:49.863",
"lastModified": "2024-11-21T08:36:36.050",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-03-10T15:10:00.520",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.1,
"impactScore": 4.0
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"baseScore": 7.7,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.1,
"impactScore": 4.0
}
]
},
@ -49,16 +69,50 @@
"value": "CWE-611"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-611"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pega:pega_platform:*:*:*:*:*:*:*:*",
"versionEndExcluding": "8.8.5",
"matchCriteriaId": "EEE0AA21-4E23-4A71-B128-589BA98C1108"
}
]
}
]
}
],
"references": [
{
"url": "https://support.pega.com/support-doc/pega-security-advisory-a24-vulnerability-remediation-note",
"source": "security@pega.com"
"source": "security@pega.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.pega.com/support-doc/pega-security-advisory-a24-vulnerability-remediation-note",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-50198",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-05-03T03:16:05.200",
"lastModified": "2024-11-21T08:36:38.610",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-10T16:26:06.647",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -16,6 +16,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
@ -49,24 +71,78 @@
"value": "CWE-78"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dlink:g416_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.09b01",
"matchCriteriaId": "9E44FE7B-CCEF-4118-9A02-810AFD0A22AE"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dlink:g416:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E6E65179-A6A8-4A3A-8422-7171AF05B0CD"
}
]
}
]
}
],
"references": [
{
"url": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10367",
"source": "zdi-disclosures@trendmicro.com"
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Mitigation",
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1814/",
"source": "zdi-disclosures@trendmicro.com"
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10367",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mitigation",
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1814/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-50199",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-05-03T03:16:05.387",
"lastModified": "2024-11-21T08:36:38.737",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-10T16:26:06.647",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -16,6 +16,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
@ -49,24 +71,78 @@
"value": "CWE-306"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-306"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dlink:g416_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.09b01",
"matchCriteriaId": "9E44FE7B-CCEF-4118-9A02-810AFD0A22AE"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dlink:g416:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E6E65179-A6A8-4A3A-8422-7171AF05B0CD"
}
]
}
]
}
],
"references": [
{
"url": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10367",
"source": "zdi-disclosures@trendmicro.com"
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Mitigation",
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1815/",
"source": "zdi-disclosures@trendmicro.com"
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10367",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mitigation",
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1815/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-50200",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-05-03T03:16:05.593",
"lastModified": "2024-11-21T08:36:38.860",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-10T16:26:06.647",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -16,6 +16,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
@ -49,24 +71,78 @@
"value": "CWE-78"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dlink:g416_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.09b01",
"matchCriteriaId": "9E44FE7B-CCEF-4118-9A02-810AFD0A22AE"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dlink:g416:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E6E65179-A6A8-4A3A-8422-7171AF05B0CD"
}
]
}
]
}
],
"references": [
{
"url": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10367",
"source": "zdi-disclosures@trendmicro.com"
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Mitigation",
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1816/",
"source": "zdi-disclosures@trendmicro.com"
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10367",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mitigation",
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1816/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-50201",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-05-03T03:16:05.770",
"lastModified": "2024-11-21T08:36:38.980",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-10T16:26:06.647",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -16,6 +16,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
@ -49,24 +71,78 @@
"value": "CWE-78"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dlink:g416_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.09b01",
"matchCriteriaId": "9E44FE7B-CCEF-4118-9A02-810AFD0A22AE"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dlink:g416:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E6E65179-A6A8-4A3A-8422-7171AF05B0CD"
}
]
}
]
}
],
"references": [
{
"url": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10367",
"source": "zdi-disclosures@trendmicro.com"
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Mitigation",
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1817/",
"source": "zdi-disclosures@trendmicro.com"
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10367",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mitigation",
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1817/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-50202",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-05-03T03:16:05.950",
"lastModified": "2024-11-21T08:36:39.103",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-10T16:26:06.647",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -16,6 +16,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
@ -49,24 +71,78 @@
"value": "CWE-78"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dlink:g416_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.09b01",
"matchCriteriaId": "9E44FE7B-CCEF-4118-9A02-810AFD0A22AE"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dlink:g416:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E6E65179-A6A8-4A3A-8422-7171AF05B0CD"
}
]
}
]
}
],
"references": [
{
"url": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10367",
"source": "zdi-disclosures@trendmicro.com"
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Mitigation",
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1818/",
"source": "zdi-disclosures@trendmicro.com"
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10367",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mitigation",
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1818/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-50203",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-05-03T03:16:06.127",
"lastModified": "2024-11-21T08:36:39.233",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-10T16:26:06.647",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -16,6 +16,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
@ -49,24 +71,78 @@
"value": "CWE-78"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dlink:g416_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.09b01",
"matchCriteriaId": "9E44FE7B-CCEF-4118-9A02-810AFD0A22AE"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dlink:g416:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E6E65179-A6A8-4A3A-8422-7171AF05B0CD"
}
]
}
]
}
],
"references": [
{
"url": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10367",
"source": "zdi-disclosures@trendmicro.com"
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Mitigation",
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1819/",
"source": "zdi-disclosures@trendmicro.com"
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10367",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mitigation",
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1819/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-50204",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-05-03T03:16:06.327",
"lastModified": "2024-11-21T08:36:39.353",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-10T16:26:06.647",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -16,6 +16,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
@ -49,24 +71,78 @@
"value": "CWE-78"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dlink:g416_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.09b01",
"matchCriteriaId": "9E44FE7B-CCEF-4118-9A02-810AFD0A22AE"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dlink:g416:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E6E65179-A6A8-4A3A-8422-7171AF05B0CD"
}
]
}
]
}
],
"references": [
{
"url": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10367",
"source": "zdi-disclosures@trendmicro.com"
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Mitigation",
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1820/",
"source": "zdi-disclosures@trendmicro.com"
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10367",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mitigation",
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1820/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-50205",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-05-03T03:16:06.500",
"lastModified": "2024-11-21T08:36:39.487",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-10T16:26:06.647",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -16,6 +16,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
@ -49,24 +71,78 @@
"value": "CWE-78"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dlink:g416_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.09b01",
"matchCriteriaId": "9E44FE7B-CCEF-4118-9A02-810AFD0A22AE"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dlink:g416:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E6E65179-A6A8-4A3A-8422-7171AF05B0CD"
}
]
}
]
}
],
"references": [
{
"url": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10367",
"source": "zdi-disclosures@trendmicro.com"
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Mitigation",
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1821/",
"source": "zdi-disclosures@trendmicro.com"
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10367",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mitigation",
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1821/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-50206",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-05-03T03:16:06.687",
"lastModified": "2024-11-21T08:36:39.617",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-10T16:26:06.647",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -16,6 +16,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
@ -49,24 +71,78 @@
"value": "CWE-78"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dlink:g416_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.09b01",
"matchCriteriaId": "9E44FE7B-CCEF-4118-9A02-810AFD0A22AE"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dlink:g416:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E6E65179-A6A8-4A3A-8422-7171AF05B0CD"
}
]
}
]
}
],
"references": [
{
"url": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10367",
"source": "zdi-disclosures@trendmicro.com"
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Mitigation",
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1822/",
"source": "zdi-disclosures@trendmicro.com"
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10367",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mitigation",
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1822/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-50207",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-05-03T03:16:06.860",
"lastModified": "2024-11-21T08:36:39.740",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-10T16:26:06.647",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -16,6 +16,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
@ -49,24 +71,78 @@
"value": "CWE-78"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dlink:g416_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.09b01",
"matchCriteriaId": "9E44FE7B-CCEF-4118-9A02-810AFD0A22AE"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dlink:g416:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E6E65179-A6A8-4A3A-8422-7171AF05B0CD"
}
]
}
]
}
],
"references": [
{
"url": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10367",
"source": "zdi-disclosures@trendmicro.com"
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Mitigation",
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1823/",
"source": "zdi-disclosures@trendmicro.com"
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10367",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mitigation",
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1823/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-50208",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-05-03T03:16:07.030",
"lastModified": "2024-11-21T08:36:39.863",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-10T16:26:06.647",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -16,6 +16,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
@ -49,24 +71,78 @@
"value": "CWE-121"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dlink:g416_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.09b01",
"matchCriteriaId": "9E44FE7B-CCEF-4118-9A02-810AFD0A22AE"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dlink:g416:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E6E65179-A6A8-4A3A-8422-7171AF05B0CD"
}
]
}
]
}
],
"references": [
{
"url": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10367",
"source": "zdi-disclosures@trendmicro.com"
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Mitigation",
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1824/",
"source": "zdi-disclosures@trendmicro.com"
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10367",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mitigation",
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1824/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-50209",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-05-03T03:16:07.407",
"lastModified": "2024-11-21T08:36:39.980",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-10T16:26:06.647",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -16,6 +16,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
@ -49,24 +71,78 @@
"value": "CWE-121"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dlink:g416_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.09b01",
"matchCriteriaId": "9E44FE7B-CCEF-4118-9A02-810AFD0A22AE"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dlink:g416:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E6E65179-A6A8-4A3A-8422-7171AF05B0CD"
}
]
}
]
}
],
"references": [
{
"url": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10367",
"source": "zdi-disclosures@trendmicro.com"
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Mitigation",
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1825/",
"source": "zdi-disclosures@trendmicro.com"
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10367",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mitigation",
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1825/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-50210",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-05-03T03:16:07.837",
"lastModified": "2024-11-21T08:36:40.110",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-10T16:26:06.647",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -16,6 +16,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
@ -49,24 +71,78 @@
"value": "CWE-121"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dlink:g416_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.09b01",
"matchCriteriaId": "9E44FE7B-CCEF-4118-9A02-810AFD0A22AE"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dlink:g416:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E6E65179-A6A8-4A3A-8422-7171AF05B0CD"
}
]
}
]
}
],
"references": [
{
"url": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10367",
"source": "zdi-disclosures@trendmicro.com"
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Mitigation",
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1826/",
"source": "zdi-disclosures@trendmicro.com"
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10367",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mitigation",
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1826/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-50211",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-05-03T03:16:08.303",
"lastModified": "2024-11-21T08:36:40.230",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-10T16:26:06.647",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -16,6 +16,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
@ -49,24 +71,78 @@
"value": "CWE-121"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dlink:g416_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.09b01",
"matchCriteriaId": "9E44FE7B-CCEF-4118-9A02-810AFD0A22AE"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dlink:g416:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E6E65179-A6A8-4A3A-8422-7171AF05B0CD"
}
]
}
]
}
],
"references": [
{
"url": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10367",
"source": "zdi-disclosures@trendmicro.com"
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Mitigation",
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1827/",
"source": "zdi-disclosures@trendmicro.com"
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10367",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mitigation",
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1827/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-50212",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-05-03T03:16:08.620",
"lastModified": "2024-11-21T08:36:40.353",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-10T16:26:06.647",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
@ -16,6 +16,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
],
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
@ -49,24 +71,78 @@
"value": "CWE-755"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-755"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dlink:g416_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.09b01",
"matchCriteriaId": "9E44FE7B-CCEF-4118-9A02-810AFD0A22AE"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dlink:g416:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E6E65179-A6A8-4A3A-8422-7171AF05B0CD"
}
]
}
]
}
],
"references": [
{
"url": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10367",
"source": "zdi-disclosures@trendmicro.com"
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Mitigation",
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1828/",
"source": "zdi-disclosures@trendmicro.com"
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10367",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mitigation",
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1828/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-50213",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-05-03T03:16:08.830",
"lastModified": "2024-11-21T08:36:40.470",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-10T16:26:06.647",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -16,6 +16,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
@ -49,24 +71,78 @@
"value": "CWE-78"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dlink:g416_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.09b01",
"matchCriteriaId": "9E44FE7B-CCEF-4118-9A02-810AFD0A22AE"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dlink:g416:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E6E65179-A6A8-4A3A-8422-7171AF05B0CD"
}
]
}
]
}
],
"references": [
{
"url": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10367",
"source": "zdi-disclosures@trendmicro.com"
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Mitigation",
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1829/",
"source": "zdi-disclosures@trendmicro.com"
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10367",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mitigation",
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1829/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-50214",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-05-03T03:16:09.007",
"lastModified": "2024-11-21T08:36:40.590",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-10T16:26:06.647",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -16,6 +16,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
@ -49,24 +71,78 @@
"value": "CWE-78"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dlink:g416_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.09b01",
"matchCriteriaId": "9E44FE7B-CCEF-4118-9A02-810AFD0A22AE"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dlink:g416:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E6E65179-A6A8-4A3A-8422-7171AF05B0CD"
}
]
}
]
}
],
"references": [
{
"url": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10367",
"source": "zdi-disclosures@trendmicro.com"
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Mitigation",
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1830/",
"source": "zdi-disclosures@trendmicro.com"
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10367",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mitigation",
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1830/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-50215",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-05-03T03:16:09.180",
"lastModified": "2024-11-21T08:36:40.720",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-10T16:26:06.647",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -16,6 +16,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
@ -49,24 +71,78 @@
"value": "CWE-78"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dlink:g416_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.09b01",
"matchCriteriaId": "9E44FE7B-CCEF-4118-9A02-810AFD0A22AE"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dlink:g416:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E6E65179-A6A8-4A3A-8422-7171AF05B0CD"
}
]
}
]
}
],
"references": [
{
"url": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10367",
"source": "zdi-disclosures@trendmicro.com"
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Mitigation",
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1831/",
"source": "zdi-disclosures@trendmicro.com"
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10367",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mitigation",
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1831/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-50216",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-05-03T03:16:09.367",
"lastModified": "2024-11-21T08:36:40.840",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-10T16:26:06.647",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -16,6 +16,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
@ -49,24 +71,78 @@
"value": "CWE-78"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dlink:g416_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.09b01",
"matchCriteriaId": "9E44FE7B-CCEF-4118-9A02-810AFD0A22AE"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dlink:g416:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E6E65179-A6A8-4A3A-8422-7171AF05B0CD"
}
]
}
]
}
],
"references": [
{
"url": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10367",
"source": "zdi-disclosures@trendmicro.com"
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Mitigation",
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1832/",
"source": "zdi-disclosures@trendmicro.com"
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10367",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mitigation",
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1832/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-50217",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-05-03T03:16:09.540",
"lastModified": "2024-11-21T08:36:40.980",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-10T16:26:06.647",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -16,6 +16,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
@ -49,24 +71,78 @@
"value": "CWE-78"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dlink:g416_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.09b01",
"matchCriteriaId": "9E44FE7B-CCEF-4118-9A02-810AFD0A22AE"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dlink:g416:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E6E65179-A6A8-4A3A-8422-7171AF05B0CD"
}
]
}
]
}
],
"references": [
{
"url": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10367",
"source": "zdi-disclosures@trendmicro.com"
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Mitigation",
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1833/",
"source": "zdi-disclosures@trendmicro.com"
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10367",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mitigation",
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1833/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-52214",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-03-26T13:15:44.857",
"lastModified": "2024-11-21T08:39:24.690",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-03-10T14:59:09.437",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
@ -51,14 +71,38 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://patchstack.com/database/vulnerability/cf7-widget-elementor/wordpress-void-contact-form-7-widget-for-elementor-page-builder-plugin-2-3-broken-access-control-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
},
"nodes": [
{
"url": "https://patchstack.com/database/vulnerability/cf7-widget-elementor/wordpress-void-contact-form-7-widget-for-elementor-page-builder-plugin-2-3-broken-access-control-vulnerability?_s_id=cve",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:voidcoders:void_contact_form_7_widget_for_elementor_page_builder:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "2.4",
"matchCriteriaId": "263DDEA0-209A-4487-9995-A6E9C1F5B1F9"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/cf7-widget-elementor/wordpress-void-contact-form-7-widget-for-elementor-page-builder-plugin-2-3-broken-access-control-vulnerability?_s_id=cve",
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://patchstack.com/database/vulnerability/cf7-widget-elementor/wordpress-void-contact-form-7-widget-for-elementor-page-builder-plugin-2-3-broken-access-control-vulnerability?_s_id=cve",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-52231",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-03-28T07:15:52.120",
"lastModified": "2024-11-21T08:39:26.930",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-03-10T15:50:32.850",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
@ -49,16 +69,50 @@
"value": "CWE-200"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:booster:booster_for_woocommerce:*:*:*:*:plus:wordpress:*:*",
"versionEndExcluding": "7.1.2",
"matchCriteriaId": "29AB23FF-349F-474C-9EBB-C52B6DD8EB2A"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/booster-plus-for-woocommerce/wordpress-booster-plus-for-woocommerce-plugin-7-1-2-authenticated-arbitrary-order-information-disclosure-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://patchstack.com/database/vulnerability/booster-plus-for-woocommerce/wordpress-booster-plus-for-woocommerce-plugin-7-1-2-authenticated-arbitrary-order-information-disclosure-vulnerability?_s_id=cve",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-52234",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-03-28T07:15:52.927",
"lastModified": "2024-11-21T08:39:27.303",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-03-10T15:50:32.850",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
@ -49,16 +69,50 @@
"value": "CWE-200"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:booster:booster_for_woocommerce:*:*:*:*:elite:wordpress:*:*",
"versionEndExcluding": "7.1.2",
"matchCriteriaId": "EE0A3A17-2BCC-43E1-A109-45927E7ED56E"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/booster-elite-for-woocommerce/wordpress-booster-elite-for-woocommerce-plugin-7-1-2-authenticated-arbitrary-order-information-disclosure-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://patchstack.com/database/vulnerability/booster-elite-for-woocommerce/wordpress-booster-elite-for-woocommerce-plugin-7-1-2-authenticated-arbitrary-order-information-disclosure-vulnerability?_s_id=cve",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-52609",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-03-18T11:15:07.743",
"lastModified": "2024-11-21T08:40:11.410",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-10T15:10:00.520",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,79 +15,260 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: binder: corrige la ejecuci\u00f3n entre mmput() y do_exit() La tarea A llama a binder_update_page_range() para asignar e insertar p\u00e1ginas en un espacio de direcciones remoto desde la tarea B. Para esto, la tarea A fija el mm remoto a trav\u00e9s de mmget_not_zero() primero. Esto puede competir con la Tarea B do_exit() y la disminuci\u00f3n final del recuento de mmput() provendr\u00e1 de la Tarea A. Tarea A | Tarea B ------------------+------------------ mmget_not_zero() | | hacer_salir() | salida_mm() | mmput() mmput() | salida_mmap() | eliminar_vma() | salida() | En este caso, el trabajo de ____fput() de la Tarea B se pone en cola en la Tarea A como TWA_RESUME. Entonces, en teor\u00eda, la Tarea A regresa al espacio de usuario y se ejecuta el trabajo de limpieza. Sin embargo, la Tarea A duerme, esperando una respuesta de la Tarea B que nunca llega (est\u00e1 muerta). Esto significa que binder_deferred_release() est\u00e1 bloqueado hasta que un evento de carpeta no relacionado obligue a la Tarea A a regresar al espacio de usuario. Todas las notificaciones de defunci\u00f3n asociadas tambi\u00e9n se retrasar\u00e1n hasta entonces. Para solucionar este problema, utilice mmput_async() que programar\u00e1 el trabajo en el mm->async_put_work WQ correspondiente en lugar de la Tarea A."
}
],
"metrics": {},
"references": [
"metrics": {
"cvssMetricV31": [
{
"url": "https://git.kernel.org/stable/c/252a2a5569eb9f8d16428872cc24dea1ac0bb097",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
{
"url": "https://git.kernel.org/stable/c/6696f76c32ff67fec26823fc2df46498e70d9bf3",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"exploitabilityScore": 1.0,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"url": "https://git.kernel.org/stable/c/67f16bf2cc1698fd50e01ee8a2becc5a8e6d3a3e",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"url": "https://git.kernel.org/stable/c/77d210e8db4d61d43b2d16df66b1ec46fad2ee01",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/7e7a0d86542b0ea903006d3f42f33c4f7ead6918",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/95b1d336b0642198b56836b89908d07b9a0c9608",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/98fee5bee97ad47b527a997d5786410430d1f0e9",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/9a9ab0d963621d9d12199df9817e66982582d5a5",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/252a2a5569eb9f8d16428872cc24dea1ac0bb097",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://git.kernel.org/stable/c/6696f76c32ff67fec26823fc2df46498e70d9bf3",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://git.kernel.org/stable/c/67f16bf2cc1698fd50e01ee8a2becc5a8e6d3a3e",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://git.kernel.org/stable/c/77d210e8db4d61d43b2d16df66b1ec46fad2ee01",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://git.kernel.org/stable/c/7e7a0d86542b0ea903006d3f42f33c4f7ead6918",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://git.kernel.org/stable/c/95b1d336b0642198b56836b89908d07b9a0c9608",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://git.kernel.org/stable/c/98fee5bee97ad47b527a997d5786410430d1f0e9",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://git.kernel.org/stable/c/9a9ab0d963621d9d12199df9817e66982582d5a5",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00016.html",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"lang": "en",
"value": "CWE-362"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2.6.29",
"versionEndExcluding": "4.19.306",
"matchCriteriaId": "D8EE6C94-F3E4-4963-8B5A-9BE8CD1565DF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.20",
"versionEndExcluding": "5.4.268",
"matchCriteriaId": "991BF737-6083-429B-ACD5-FB27D4143E2F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.5",
"versionEndExcluding": "5.10.209",
"matchCriteriaId": "74979A03-4B10-4815-AE3E-C8C0D2FDAA39"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11",
"versionEndExcluding": "5.15.148",
"matchCriteriaId": "2ED0CDB9-61B0-408E-B2A8-5199107F7868"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "6.1.75",
"matchCriteriaId": "070D0ED3-90D0-4F95-B1FF-57D7F46F332D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.2",
"versionEndExcluding": "6.6.14",
"matchCriteriaId": "5C6B50A6-3D8B-4CE2-BDCC-A098609CBA14"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7",
"versionEndExcluding": "6.7.2",
"matchCriteriaId": "7229C448-E0C9-488B-8939-36BA5254065E"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/252a2a5569eb9f8d16428872cc24dea1ac0bb097",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Mailing List",
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/6696f76c32ff67fec26823fc2df46498e70d9bf3",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Mailing List",
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/67f16bf2cc1698fd50e01ee8a2becc5a8e6d3a3e",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Mailing List",
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/77d210e8db4d61d43b2d16df66b1ec46fad2ee01",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Mailing List",
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/7e7a0d86542b0ea903006d3f42f33c4f7ead6918",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Mailing List",
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/95b1d336b0642198b56836b89908d07b9a0c9608",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Mailing List",
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/98fee5bee97ad47b527a997d5786410430d1f0e9",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Mailing List",
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/9a9ab0d963621d9d12199df9817e66982582d5a5",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Mailing List",
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/252a2a5569eb9f8d16428872cc24dea1ac0bb097",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/6696f76c32ff67fec26823fc2df46498e70d9bf3",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/67f16bf2cc1698fd50e01ee8a2becc5a8e6d3a3e",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/77d210e8db4d61d43b2d16df66b1ec46fad2ee01",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/7e7a0d86542b0ea903006d3f42f33c4f7ead6918",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/95b1d336b0642198b56836b89908d07b9a0c9608",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/98fee5bee97ad47b527a997d5786410430d1f0e9",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/9a9ab0d963621d9d12199df9817e66982582d5a5",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Patch"
]
},
{
"url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00016.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List"
]
},
{
"url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-52611",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-03-18T11:15:08.157",
"lastModified": "2024-11-21T08:40:11.703",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-10T15:41:09.180",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,31 +15,116 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: wifi: rtw88: sdio: respeta el host max_req_size en la ruta RX. Lukas informa errores skb_over_panic en su Banana Pi BPI-CM4 que viene con un SoC Amlogic A311D (G12B) y un RTL8822CS. Tarjeta combinada SDIO wifi/Bluetooth. El error que observ\u00f3 es id\u00e9ntico a lo que se solucion\u00f3 en el commit e967229ead0e (\"wifi: rtw88: sdio: verifique el bit HISR RX_REQUEST en rtw_sdio_rx_isr()\") pero esa confirmaci\u00f3n no solucion\u00f3 el problema de Lukas. Lukas descubri\u00f3 que deshabilitar o limitar la agregaci\u00f3n de RX soluciona el problema durante alg\u00fan tiempo (pero no lo soluciona por completo). En la siguiente discusi\u00f3n se discutieron algunos temas clave que tienen un impacto en este problema: - El SoC Amlogic A311D (G12B) tiene un error de hardware en el controlador SDIO que impide las transferencias DMA. En lugar de ello, todas las transferencias deben pasar por el controlador SRAM, que limita las transferencias a 1536 bytes. Los chips rtw88 no dividen los paquetes entrantes (RX), por lo que si se recibe un paquete grande, este se reenv\u00eda al host en su forma original. Los chips rtw88 pueden realice la agregaci\u00f3n RX, lo que significa que el host puede extraer m\u00e1s paquetes entrantes de la tarjeta con una transferencia MMC/SDIO. Esto depende de la configuraci\u00f3n en el registro REG_RXDMA_AGG_PG_TH (BIT_RXDMA_AGG_PG_TH limita la cantidad de paquetes que se agregar\u00e1n, BIT_DMA_AGG_TO_V1 configura un tiempo de espera para la agregaci\u00f3n y BIT_EN_PRE_CALC hace que el chip respete los l\u00edmites de manera m\u00e1s efectiva) Use m\u00faltiples lecturas consecutivas en rtw_sdio_read_port() y limite la cantidad de bytes que el host copia desde la tarjeta en una transferencia MMC/SDIO. Esto permite recibir un b\u00fafer que es mayor que el max_req_size del host (n\u00famero de bytes que se pueden transferir en una transferencia MMC/SDIO). Como resultado de esto, el error skb_over_panic desapareci\u00f3 ya que el controlador rtw88 ahora puede recibir m\u00e1s de 1536 bytes de la tarjeta (ya sea porque el paquete entrante es m\u00e1s grande o porque se han agregado varios paquetes). En caso de errores de recepci\u00f3n (Lukas ha observado -EILSEQ), debemos drenar los datos restantes del b\u00fafer de la tarjeta; de lo contrario, la tarjeta devolver\u00e1 datos corruptos para la siguiente llamada a rtw_sdio_read_port()."
}
],
"metrics": {},
"references": [
"metrics": {
"cvssMetricV31": [
{
"url": "https://git.kernel.org/stable/c/00384f565a91c08c4bedae167f749b093d10e3fe",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
{
"url": "https://git.kernel.org/stable/c/0e9ffff72a0674cd6656314dbd99cdd2123a3030",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"url": "https://git.kernel.org/stable/c/5b5ddf21b978ec315cab9d9e7e6ac7374791a8c7",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"url": "https://git.kernel.org/stable/c/00384f565a91c08c4bedae167f749b093d10e3fe",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://git.kernel.org/stable/c/0e9ffff72a0674cd6656314dbd99cdd2123a3030",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://git.kernel.org/stable/c/5b5ddf21b978ec315cab9d9e7e6ac7374791a8c7",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.4",
"versionEndExcluding": "6.6.14",
"matchCriteriaId": "A9E74EDC-6520-4AF7-BF2E-2259A9C10A79"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7",
"versionEndExcluding": "6.7.2",
"matchCriteriaId": "7229C448-E0C9-488B-8939-36BA5254065E"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/00384f565a91c08c4bedae167f749b093d10e3fe",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Mailing List",
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/0e9ffff72a0674cd6656314dbd99cdd2123a3030",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Mailing List",
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/5b5ddf21b978ec315cab9d9e7e6ac7374791a8c7",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Mailing List",
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/00384f565a91c08c4bedae167f749b093d10e3fe",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/0e9ffff72a0674cd6656314dbd99cdd2123a3030",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/5b5ddf21b978ec315cab9d9e7e6ac7374791a8c7",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-52616",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-03-18T11:15:08.967",
"lastModified": "2024-11-21T08:40:12.420",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-10T15:41:09.180",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,59 +15,207 @@
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: crypto: lib/mpi: corrige el acceso inesperado al puntero en mpi_ec_init Cuando se inicializa la estructura mpi_ec_ctx, algunos campos no se borran, lo que provoca un bloqueo al hacer referencia al campo cuando se lanz\u00f3 la estructura. Inicialmente, este problema se ignor\u00f3 porque la memoria para mpi_ec_ctx se asigna con el indicador __GFP_ZERO. Por ejemplo, este error se activar\u00e1 al calcular el valor Za para SM2 por separado."
}
],
"metrics": {},
"references": [
"metrics": {
"cvssMetricV31": [
{
"url": "https://git.kernel.org/stable/c/0c3687822259a7628c85cd21a3445cbe3c367165",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
{
"url": "https://git.kernel.org/stable/c/2bb86817b33c9d704e127f92b838035a72c315b6",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"url": "https://git.kernel.org/stable/c/7abdfd45a650c714d5ebab564bb1b988f14d9b49",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"url": "https://git.kernel.org/stable/c/7ebf812b7019fd2d4d5a7ca45ef4bf3a6f4bda0a",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/ba3c5574203034781ac4231acf117da917efcd2a",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/bb44477d4506e52785693a39f03cdc6a2c5e8598",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/0c3687822259a7628c85cd21a3445cbe3c367165",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://git.kernel.org/stable/c/2bb86817b33c9d704e127f92b838035a72c315b6",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://git.kernel.org/stable/c/7abdfd45a650c714d5ebab564bb1b988f14d9b49",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://git.kernel.org/stable/c/7ebf812b7019fd2d4d5a7ca45ef4bf3a6f4bda0a",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://git.kernel.org/stable/c/ba3c5574203034781ac4231acf117da917efcd2a",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://git.kernel.org/stable/c/bb44477d4506e52785693a39f03cdc6a2c5e8598",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.10",
"versionEndExcluding": "5.10.210",
"matchCriteriaId": "2D2F0709-60B3-49A5-80BB-D9815B21843F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11",
"versionEndExcluding": "5.15.149",
"matchCriteriaId": "0D0465BB-4053-4E15-9137-6696EBAE90FD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "6.1.79",
"matchCriteriaId": "656E2F29-1779-4EFC-AA64-8F984E2885B1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.2",
"versionEndExcluding": "6.6.15",
"matchCriteriaId": "87C718CB-AE3D-4B07-B4D9-BFF64183C468"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7",
"versionEndExcluding": "6.7.3",
"matchCriteriaId": "58FD5308-148A-40D3-B36A-0CA6B434A8BF"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/0c3687822259a7628c85cd21a3445cbe3c367165",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Mailing List",
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/2bb86817b33c9d704e127f92b838035a72c315b6",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Mailing List",
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/7abdfd45a650c714d5ebab564bb1b988f14d9b49",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Mailing List",
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/7ebf812b7019fd2d4d5a7ca45ef4bf3a6f4bda0a",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Mailing List",
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/ba3c5574203034781ac4231acf117da917efcd2a",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Mailing List",
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/bb44477d4506e52785693a39f03cdc6a2c5e8598",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Mailing List",
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/0c3687822259a7628c85cd21a3445cbe3c367165",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/2bb86817b33c9d704e127f92b838035a72c315b6",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/7abdfd45a650c714d5ebab564bb1b988f14d9b49",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/7ebf812b7019fd2d4d5a7ca45ef4bf3a6f4bda0a",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/ba3c5574203034781ac4231acf117da917efcd2a",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/bb44477d4506e52785693a39f03cdc6a2c5e8598",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Patch"
]
},
{
"url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-11638",
"sourceIdentifier": "contact@wpscan.com",
"published": "2025-03-10T06:15:20.797",
"lastModified": "2025-03-10T06:15:20.797",
"vulnStatus": "Received",
"lastModified": "2025-03-10T15:15:36.803",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
@ -11,7 +11,30 @@
"value": "The Gtbabel WordPress plugin before 6.6.9 does not ensure that the URL to perform code analysis upon belongs to the blog which could allow unauthenticated attackers to retrieve a logged in user (such as admin) cookies by making them open a crafted URL as the request made to analysed the URL contains such cookies."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"references": [
{
"url": "https://wpscan.com/vulnerability/2f20336f-e12e-4b09-bcaf-45f7249f6495/",

View File

@ -0,0 +1,71 @@
{
"id": "CVE-2024-12604",
"sourceIdentifier": "iletisim@usom.gov.tr",
"published": "2025-03-10T15:15:36.947",
"lastModified": "2025-03-10T15:15:36.947",
"vulnStatus": "Awaiting Analysis",
"cveTags": [
{
"sourceIdentifier": "iletisim@usom.gov.tr",
"tags": [
"exclusively-hosted-service"
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Cleartext Storage of Sensitive Information in an Environment Variable, Weak Password Recovery Mechanism for Forgotten Password vulnerability in Tapandsign Technologies Tap&Sign App allows Password Recovery Exploitation, Functionality Misuse.This issue affects Tap&Sign App: before V.1.025."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "iletisim@usom.gov.tr",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
}
]
},
"weaknesses": [
{
"source": "iletisim@usom.gov.tr",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-526"
},
{
"lang": "en",
"value": "CWE-640"
}
]
}
],
"references": [
{
"url": "https://docs.tapandsign.com/tap-and-sign/tap-and-sign-v.1.025-surum-notlari",
"source": "iletisim@usom.gov.tr"
},
{
"url": "https://www.usom.gov.tr/bildirim/tr-25-0063",
"source": "iletisim@usom.gov.tr"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-26634",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-03-18T11:15:10.053",
"lastModified": "2024-11-21T09:02:44.020",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-10T15:41:09.180",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,39 +15,144 @@
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: net: corrige la eliminaci\u00f3n de un espacio de nombres con nombres alternativos en conflicto. Mark informa un ERROR() cuando se elimina un espacio de nombres de red. \u00a1ERROR del kernel en net/core/dev.c:11520! Las interfaces f\u00edsicas movidas fuera de init_net se \"reembolsan\" a init_net cuando ese espacio de nombres desaparece. El nombre de la interfaz principal puede sobrescribirse en el proceso si hubiera entrado en conflicto. Tambi\u00e9n debemos descartar todos los nombres alternativos en conflicto. Las correcciones recientes abordaron garantizar que los nombres alternativos se movieran con la interfaz principal, lo que provoc\u00f3 este problema."
}
],
"metrics": {},
"references": [
"metrics": {
"cvssMetricV31": [
{
"url": "https://git.kernel.org/stable/c/8072699aa9e67d1727692cfb3c347263bb627fb9",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
{
"url": "https://git.kernel.org/stable/c/a2232f29bf52c24f827865b3c90829c44b6c695b",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"url": "https://git.kernel.org/stable/c/d09486a04f5da0a812c26217213b89a3b1acf836",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"url": "https://git.kernel.org/stable/c/e855dded4b70d1975ee7b9fed0c700391e3c8ea6",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/8072699aa9e67d1727692cfb3c347263bb627fb9",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://git.kernel.org/stable/c/a2232f29bf52c24f827865b3c90829c44b6c695b",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://git.kernel.org/stable/c/d09486a04f5da0a812c26217213b89a3b1acf836",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://git.kernel.org/stable/c/e855dded4b70d1975ee7b9fed0c700391e3c8ea6",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.1.60",
"versionEndExcluding": "6.1.76",
"matchCriteriaId": "669EF392-199C-46A8-997D-C976351952E0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.6",
"versionEndExcluding": "6.6.15",
"matchCriteriaId": "EB070897-9C4B-4820-AE94-31318C9F5D76"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7",
"versionEndExcluding": "6.7.3",
"matchCriteriaId": "58FD5308-148A-40D3-B36A-0CA6B434A8BF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*",
"matchCriteriaId": "B9F4EA73-0894-400F-A490-3A397AB7A517"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/8072699aa9e67d1727692cfb3c347263bb627fb9",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Mailing List",
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/a2232f29bf52c24f827865b3c90829c44b6c695b",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Mailing List",
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/d09486a04f5da0a812c26217213b89a3b1acf836",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Mailing List",
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/e855dded4b70d1975ee7b9fed0c700391e3c8ea6",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Mailing List",
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/8072699aa9e67d1727692cfb3c347263bb627fb9",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/a2232f29bf52c24f827865b3c90829c44b6c695b",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/d09486a04f5da0a812c26217213b89a3b1acf836",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/e855dded4b70d1975ee7b9fed0c700391e3c8ea6",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-26641",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-03-18T11:15:11.193",
"lastModified": "2024-11-21T09:02:44.853",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-10T16:58:35.783",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,63 +15,514 @@
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: ip6_tunnel: aseg\u00farese de extraer el encabezado interno en __ip6_tnl_rcv(). El syzbot encontr\u00f3 que __ip6_tnl_rcv() pod\u00eda acceder a datos unificados [1]. Llame a pskb_inet_may_pull() para solucionar este problema e inicialice la variable ipv6h despu\u00e9s de esta llamada, ya que puede cambiar skb->head. [1] ERROR: KMSAN: valor uninit en __INET_ECN_decapsulate include/net/inet_ecn.h:253 [en l\u00ednea] ERROR: KMSAN: valor uninit en INET_ECN_decapsulate include/net/inet_ecn.h:275 [en l\u00ednea] ERROR: KMSAN: uninit -valor en IP6_ECN_decapsulate+0x7df/0x1e50 include/net/inet_ecn.h:321 __INET_ECN_decapsulate include/net/inet_ecn.h:253 [en l\u00ednea] INET_ECN_decapsulate include/net/inet_ecn.h:275 [en l\u00ednea] IP6_ECN_decapsulate+0x7df/0x1e50 include/ net/inet_ecn.h:321 ip6ip6_dscp_ecn_decapsulate+0x178/0x1b0 net/ipv6/ip6_tunnel.c:727 __ip6_tnl_rcv+0xd4e/0x1590 net/ipv6/ip6_tunnel.c:845 ip6_tnl_rcv+0xce/0x100 net/ipv 6/ip6_tunnel.c:888 gre_rcv +0x143f/0x1870 ip6_protocol_deliver_rcu+0xda6/0x2a60 net/ipv6/ip6_input.c:438 ip6_input_finish net/ipv6/ip6_input.c:483 [en l\u00ednea] NF_HOOK include/linux/netfilter.h:314 [en l\u00ednea] ip6_input+0x15d/0x 430 netos /ipv6/ip6_input.c:492 ip6_mc_input+0xa7e/0xc80 net/ipv6/ip6_input.c:586 dst_input include/net/dst.h:461 [en l\u00ednea] ip6_rcv_finish+0x5db/0x870 net/ipv6/ip6_input.c:79 NF_HOOK include/linux/netfilter.h:314 [en l\u00ednea] ipv6_rcv+0xda/0x390 net/ipv6/ip6_input.c:310 __netif_receive_skb_one_core net/core/dev.c:5532 [en l\u00ednea] __netif_receive_skb+0x1a6/0x5a0 net/core/dev. c:5646 netif_receive_skb_internal net/core/dev.c:5732 [en l\u00ednea] netif_receive_skb+0x58/0x660 net/core/dev.c:5791 tun_rx_batched+0x3ee/0x980 drivers/net/tun.c:1555 tun_get_user+0x53af/0x66d0 drivers /net/tun.c:2002 tun_chr_write_iter+0x3af/0x5d0 drivers/net/tun.c:2048 call_write_iter include/linux/fs.h:2084 [en l\u00ednea] new_sync_write fs/read_write.c:497 [en l\u00ednea] vfs_write+0x786/ 0x1200 fs/read_write.c:590 ksys_write+0x20f/0x4c0 fs/read_write.c:643 __do_sys_write fs/read_write.c:655 [en l\u00ednea] __se_sys_write fs/read_write.c:652 [en l\u00ednea] __x64_sys_write+0x93/0xd0 fs/read _escribir .c:652 do_syscall_x64 arch/x86/entry/common.c:52 [en l\u00ednea] do_syscall_64+0x6d/0x140 arch/x86/entry/common.c:83 Entry_SYSCALL_64_after_hwframe+0x63/0x6b Uninit se cre\u00f3 en: slab_post_alloc_hook+0x129/0xa 70 mm/slab.h:768 slab_alloc_node mm/slub.c:3478 [en l\u00ednea] kmem_cache_alloc_node+0x5e9/0xb10 mm/slub.c:3523 kmalloc_reserve+0x13d/0x4a0 net/core/skbuff.c:560 __alloc_skb+0x318/0x740 net /core/skbuff.c:651 alloc_skb include/linux/skbuff.h:1286 [en l\u00ednea] alloc_skb_with_frags+0xc8/0xbd0 net/core/skbuff.c:6334 sock_alloc_send_pskb+0xa80/0xbf0 net/core/sock.c:2787 tun_alloc_skb drivers/net/tun.c:1531 [en l\u00ednea] tun_get_user+0x1e8a/0x66d0 drivers/net/tun.c:1846 tun_chr_write_iter+0x3af/0x5d0 drivers/net/tun.c:2048 call_write_iter include/linux/fs.h:2084 [en l\u00ednea] new_sync_write fs/read_write.c:497 [en l\u00ednea] vfs_write+0x786/0x1200 fs/read_write.c:590 ksys_write+0x20f/0x4c0 fs/read_write.c:643 __do_sys_write fs/read_write.c:655 [en l\u00ednea] __se_sys_write fs/read_write.c:652 [en l\u00ednea] __x64_sys_write+0x93/0xd0 fs/read_write.c:652 do_syscall_x64 arch/x86/entry/common.c:52 [en l\u00ednea] do_syscall_64+0x6d/0x140 arch/x86/entry/common. c:83 Entry_SYSCALL_64_after_hwframe+0x63/0x6b CPU: 0 PID: 5034 Comm: syz-executor331 No contaminado 6.7.0-syzkaller-00562-g9f8413c4a66f #0 Nombre del hardware: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/ 2023"
}
],
"metrics": {},
"references": [
"metrics": {
"cvssMetricV31": [
{
"url": "https://git.kernel.org/stable/c/350a6640fac4b53564ec20aa3f4a0922cb0ba5e6",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
{
"url": "https://git.kernel.org/stable/c/8d975c15c0cd744000ca386247432d57b21f9df0",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"url": "https://git.kernel.org/stable/c/a9bc32879a08f23cdb80a48c738017e39aea1080",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"url": "https://git.kernel.org/stable/c/af6b5c50d47ab43e5272ad61935d0ed2e264d3f0",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/c835df3bcc14858ae9b27315dd7de76370b94f3a",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/d54e4da98bbfa8c257bdca94c49652d81d18a4d8",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/350a6640fac4b53564ec20aa3f4a0922cb0ba5e6",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://git.kernel.org/stable/c/8d975c15c0cd744000ca386247432d57b21f9df0",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://git.kernel.org/stable/c/a9bc32879a08f23cdb80a48c738017e39aea1080",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://git.kernel.org/stable/c/af6b5c50d47ab43e5272ad61935d0ed2e264d3f0",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://git.kernel.org/stable/c/c835df3bcc14858ae9b27315dd7de76370b94f3a",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://git.kernel.org/stable/c/d54e4da98bbfa8c257bdca94c49652d81d18a4d8",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://security.netapp.com/advisory/ntap-20241108-0008/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"lang": "en",
"value": "CWE-908"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.7",
"versionEndExcluding": "5.10.210",
"matchCriteriaId": "EA72E37E-0124-4468-B383-C248577636B8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11",
"versionEndExcluding": "5.15.149",
"matchCriteriaId": "0D0465BB-4053-4E15-9137-6696EBAE90FD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "6.1.77",
"matchCriteriaId": "0FA28946-970D-4F4D-B759-4E77B28809B5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.2",
"versionEndExcluding": "6.6.16",
"matchCriteriaId": "A5007D6A-4B58-423A-8A3A-A1A656A263C8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7",
"versionEndExcluding": "6.7.4",
"matchCriteriaId": "848BC44C-9D25-4557-A50A-4B8BF310FA78"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*",
"matchCriteriaId": "B9F4EA73-0894-400F-A490-3A397AB7A517"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:*",
"matchCriteriaId": "056BD938-0A27-4569-B391-30578B309EE3"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*",
"matchCriteriaId": "3A756737-1CC4-42C2-A4DF-E1C893B4E2D5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E7CF3019-975D-40BB-A8A4-894E62BD3797"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:netapp:a800_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B36CECA5-4545-49C2-92EB-B739407B207F"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:netapp:a800:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5FE69B5A-CFC0-470E-9846-7D8086814986"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:netapp:c800_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B5AE3364-DB2D-4543-B1E2-175BF8BEBEE7"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:netapp:c800:*:*:*:*:*:*:*:*",
"matchCriteriaId": "11E837C7-F91E-4486-B0FD-3222E69AB17D"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:netapp:a900_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "93B9B933-7D69-4B33-8983-C1CEC000B38B"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:netapp:a900:*:*:*:*:*:*:*:*",
"matchCriteriaId": "048F04A2-5630-453A-A855-E9314B2BAB62"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:netapp:a9500_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DEAA16D1-1E27-4128-BA14-5A0C59340EAA"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:netapp:a9500:*:*:*:*:*:*:*:*",
"matchCriteriaId": "002F31D0-96E3-495F-8F86-7C9190F20248"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:netapp:c190_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "75A43965-CB2E-4C28-AFC3-1ADE7A6B845C"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:netapp:c190:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8D3202DD-7616-4C9E-AFA1-61A1311F6C42"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:netapp:a150_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "775078AE-16E0-4AF6-9022-372FC2852107"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:netapp:a150:*:*:*:*:*:*:*:*",
"matchCriteriaId": "23BA50E9-44A7-4443-AAE7-59911BB24EFE"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:netapp:a220_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4F2D2745-242C-4603-899E-70C9025BDDD2"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:netapp:a220:*:*:*:*:*:*:*:*",
"matchCriteriaId": "92AFCF5D-1291-4E75-A12B-B95BBDAC3440"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:netapp:fas2720_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B7FD1DA9-7980-4643-B378-7095892DA176"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:netapp:fas2720:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9C227886-9186-49C3-A2B1-A0C1D5E5705A"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:netapp:fas2750_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AD661062-0D5B-4671-9D92-FEF8D7395C1E"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:netapp:fas2750:*:*:*:*:*:*:*:*",
"matchCriteriaId": "50B5C295-3711-4002-9D6D-72B6A237F650"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:netapp:fas2820_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F997DB9A-AF66-4CE1-B33B-A04493ECBA19"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:netapp:fas2820:*:*:*:*:*:*:*:*",
"matchCriteriaId": "22D33DD7-EB3F-4B85-B9F8-1D744112C9E0"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/350a6640fac4b53564ec20aa3f4a0922cb0ba5e6",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Mailing List",
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/8d975c15c0cd744000ca386247432d57b21f9df0",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Mailing List",
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/a9bc32879a08f23cdb80a48c738017e39aea1080",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Mailing List",
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/af6b5c50d47ab43e5272ad61935d0ed2e264d3f0",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Mailing List",
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/c835df3bcc14858ae9b27315dd7de76370b94f3a",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Mailing List",
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/d54e4da98bbfa8c257bdca94c49652d81d18a4d8",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Mailing List",
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/350a6640fac4b53564ec20aa3f4a0922cb0ba5e6",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/8d975c15c0cd744000ca386247432d57b21f9df0",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/a9bc32879a08f23cdb80a48c738017e39aea1080",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/af6b5c50d47ab43e5272ad61935d0ed2e264d3f0",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/c835df3bcc14858ae9b27315dd7de76370b94f3a",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/d54e4da98bbfa8c257bdca94c49652d81d18a4d8",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Patch"
]
},
{
"url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List"
]
},
{
"url": "https://security.netapp.com/advisory/ntap-20241108-0008/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-28401",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-15T17:15:08.043",
"lastModified": "2024-11-21T09:06:17.097",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-03-10T15:10:00.520",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,23 +15,102 @@
"value": "TOTOLINK X2000R anterior a v1.0.0-B20231213.1013 contiene una vulnerabilidad de Cross-site scripting (XSS) Almacenado en el control de acceso ra\u00edz en la p\u00e1gina inal\u00e1mbrica."
}
],
"metrics": {},
"references": [
"metrics": {
"cvssMetricV31": [
{
"url": "https://github.com/4hsien/CVE-vulns/blob/main/TOTOLINK/X2000R/XSS_1_Root_Access_Control/XSS.md",
"source": "cve@mitre.org"
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
{
"url": "https://www.totolink.net/home/menu/detail/menu_listtpl/products/id/242/ids/33.html",
"source": "cve@mitre.org"
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"url": "https://github.com/4hsien/CVE-vulns/blob/main/TOTOLINK/X2000R/XSS_1_Root_Access_Control/XSS.md",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"url": "https://www.totolink.net/home/menu/detail/menu_listtpl/products/id/242/ids/33.html",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:totolink:x2000r_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.0.0-b20231213.1013",
"matchCriteriaId": "54DF0776-BD74-4FC1-B88E-EDACAA480F3B"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:totolink:x2000r:-:*:*:*:*:*:*:*",
"matchCriteriaId": "299F34FB-4D53-4846-B6F0-4431D61B5154"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/4hsien/CVE-vulns/blob/main/TOTOLINK/X2000R/XSS_1_Root_Access_Control/XSS.md",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://www.totolink.net/home/menu/detail/menu_listtpl/products/id/242/ids/33.html",
"source": "cve@mitre.org",
"tags": [
"Product"
]
},
{
"url": "https://github.com/4hsien/CVE-vulns/blob/main/TOTOLINK/X2000R/XSS_1_Root_Access_Control/XSS.md",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://www.totolink.net/home/menu/detail/menu_listtpl/products/id/242/ids/33.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-28403",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-15T16:15:08.583",
"lastModified": "2024-11-21T09:06:17.480",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-03-10T15:10:00.520",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,23 +15,102 @@
"value": "TOTOLINK X2000R V1.0.0-B20221128.1033 es vulnerable a Cross Site Scripting (XSS) a trav\u00e9s de la p\u00e1gina VPN."
}
],
"metrics": {},
"references": [
"metrics": {
"cvssMetricV31": [
{
"url": "https://github.com/4hsien/CVE-vulns/blob/main/TOTOLINK/X2000R/XSS_5_VPN/XSS.md",
"source": "cve@mitre.org"
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
{
"url": "https://www.totolink.net/home/menu/detail/menu_listtpl/products/id/242/ids/33.html",
"source": "cve@mitre.org"
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"url": "https://github.com/4hsien/CVE-vulns/blob/main/TOTOLINK/X2000R/XSS_5_VPN/XSS.md",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"url": "https://www.totolink.net/home/menu/detail/menu_listtpl/products/id/242/ids/33.html",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:totolink:x2000r_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.0.0-b20231213.1013",
"matchCriteriaId": "54DF0776-BD74-4FC1-B88E-EDACAA480F3B"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:totolink:x2000r:-:*:*:*:*:*:*:*",
"matchCriteriaId": "299F34FB-4D53-4846-B6F0-4431D61B5154"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/4hsien/CVE-vulns/blob/main/TOTOLINK/X2000R/XSS_5_VPN/XSS.md",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://www.totolink.net/home/menu/detail/menu_listtpl/products/id/242/ids/33.html",
"source": "cve@mitre.org",
"tags": [
"Product"
]
},
{
"url": "https://github.com/4hsien/CVE-vulns/blob/main/TOTOLINK/X2000R/XSS_5_VPN/XSS.md",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://www.totolink.net/home/menu/detail/menu_listtpl/products/id/242/ids/33.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-29112",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-03-19T15:15:08.050",
"lastModified": "2024-11-21T09:07:34.840",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-03-10T14:59:09.437",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.7,
"impactScore": 3.7
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
}
]
},
@ -51,14 +71,38 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://patchstack.com/database/vulnerability/wp-product-feed-manager/wordpress-woocommerce-google-feed-manager-plugin-2-2-0-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
},
"nodes": [
{
"url": "https://patchstack.com/database/vulnerability/wp-product-feed-manager/wordpress-woocommerce-google-feed-manager-plugin-2-2-0-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wpmarketingrobot:woocommerce_google_feed_manager:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "2.3.0",
"matchCriteriaId": "A4B296D6-ACDE-4053-941D-36503786C8E4"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/wp-product-feed-manager/wordpress-woocommerce-google-feed-manager-plugin-2-2-0-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://patchstack.com/database/vulnerability/wp-product-feed-manager/wordpress-woocommerce-google-feed-manager-plugin-2-2-0-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-29419",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-20T15:15:07.967",
"lastModified": "2024-11-21T09:08:01.520",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-03-10T14:59:09.437",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,23 +15,102 @@
"value": "Hay una vulnerabilidad de Cross Site Scripting (XSS) en la configuraci\u00f3n inal\u00e1mbrica en la p\u00e1gina de configuraci\u00f3n f\u00e1cil de TOTOLINK X2000R anterior a v1.0.0-B20231213.1013."
}
],
"metrics": {},
"references": [
"metrics": {
"cvssMetricV31": [
{
"url": "https://github.com/4hsien/CVE-vulns/blob/main/TOTOLINK/X2000R/XSS_6_Wireless_settings/XSS.md",
"source": "cve@mitre.org"
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
{
"url": "https://www.totolink.net/home/menu/detail/menu_listtpl/products/id/242/ids/33.html",
"source": "cve@mitre.org"
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"url": "https://github.com/4hsien/CVE-vulns/blob/main/TOTOLINK/X2000R/XSS_6_Wireless_settings/XSS.md",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"url": "https://www.totolink.net/home/menu/detail/menu_listtpl/products/id/242/ids/33.html",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:totolink:x2000r_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.0.0-b20231213.1013",
"matchCriteriaId": "54DF0776-BD74-4FC1-B88E-EDACAA480F3B"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:totolink:x2000r:-:*:*:*:*:*:*:*",
"matchCriteriaId": "299F34FB-4D53-4846-B6F0-4431D61B5154"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/4hsien/CVE-vulns/blob/main/TOTOLINK/X2000R/XSS_6_Wireless_settings/XSS.md",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://www.totolink.net/home/menu/detail/menu_listtpl/products/id/242/ids/33.html",
"source": "cve@mitre.org",
"tags": [
"Product"
]
},
{
"url": "https://github.com/4hsien/CVE-vulns/blob/main/TOTOLINK/X2000R/XSS_6_Wireless_settings/XSS.md",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://www.totolink.net/home/menu/detail/menu_listtpl/products/id/242/ids/33.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-29759",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-03-27T14:15:10.993",
"lastModified": "2024-11-21T09:08:16.050",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-03-10T15:50:32.850",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 3.7
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
@ -51,14 +71,38 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://patchstack.com/database/vulnerability/calculated-fields-form/wordpress-calculated-fields-form-plugin-1-2-54-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
},
"nodes": [
{
"url": "https://patchstack.com/database/vulnerability/calculated-fields-form/wordpress-calculated-fields-form-plugin-1-2-54-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:codepeople:calculated_fields_form:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "1.2.55",
"matchCriteriaId": "CAD776DB-4CD1-4A12-9F2D-3745A49E7BD0"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/calculated-fields-form/wordpress-calculated-fields-form-plugin-1-2-54-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://patchstack.com/database/vulnerability/calculated-fields-form/wordpress-calculated-fields-form-plugin-1-2-54-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-29921",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-03-27T08:15:39.390",
"lastModified": "2024-11-21T09:08:37.447",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-03-10T15:50:32.850",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.7,
"impactScore": 3.7
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
}
]
},
@ -51,14 +71,38 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://patchstack.com/database/vulnerability/gallery-by-supsystic/wordpress-photo-gallery-by-supsystic-plugin-1-15-16-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
},
"nodes": [
{
"url": "https://patchstack.com/database/vulnerability/gallery-by-supsystic/wordpress-photo-gallery-by-supsystic-plugin-1-15-16-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:supsystic:photo_gallery:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "1.15.17",
"matchCriteriaId": "FAF37CC5-60EA-46BC-A961-E6FCD54C11F3"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/gallery-by-supsystic/wordpress-photo-gallery-by-supsystic-plugin-1-15-16-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://patchstack.com/database/vulnerability/gallery-by-supsystic/wordpress-photo-gallery-by-supsystic-plugin-1-15-16-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-29925",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-03-27T08:15:40.270",
"lastModified": "2024-11-21T09:08:37.920",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-03-10T15:50:32.850",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.3,
"impactScore": 3.7
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
@ -51,14 +71,38 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://patchstack.com/database/vulnerability/post-grid-carousel-ultimate/wordpress-post-grid-slider-carousel-ultimate-plugin-1-6-6-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
},
"nodes": [
{
"url": "https://patchstack.com/database/vulnerability/post-grid-carousel-ultimate/wordpress-post-grid-slider-carousel-ultimate-plugin-1-6-6-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wpwax:post_grid\\,_slider_\\&_carousel_ultimate:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "1.6.7",
"matchCriteriaId": "BA6F290F-954F-4E4D-84CC-B8D1492B3EA1"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/post-grid-carousel-ultimate/wordpress-post-grid-slider-carousel-ultimate-plugin-1-6-6-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://patchstack.com/database/vulnerability/post-grid-carousel-ultimate/wordpress-post-grid-slider-carousel-ultimate-plugin-1-6-6-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-47109",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2025-03-10T16:15:12.703",
"lastModified": "2025-03-10T16:15:12.703",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "IBM Sterling File Gateway 6.0.0.0 through 6.1.2.6 and 6.2.0.0 through 6.2.0.3 UI could disclosure the installation path of the server which could aid in further attacks against the system."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-522"
}
]
}
],
"references": [
{
"url": "https://www.ibm.com/support/pages/node/7185259",
"source": "psirt@us.ibm.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-52905",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2025-03-10T16:15:12.887",
"lastModified": "2025-03-10T16:15:12.887",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "IBM Sterling B2B Integrator Standard Edition 6.0.0.0 through 6.1.2.6 and 6.2.0.0 through 6.2.0.3 could disclose sensitive database information to a privileged user."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N",
"baseScore": 2.7,
"baseSeverity": "LOW",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.2,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-497"
}
]
}
],
"references": [
{
"url": "https://www.ibm.com/support/pages/node/7185264",
"source": "psirt@us.ibm.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-5295",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-05-23T22:15:15.420",
"lastModified": "2024-11-21T09:47:22.707",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-10T16:26:06.647",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -16,6 +16,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
@ -49,16 +71,62 @@
"value": "CWE-78"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dlink:g416_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.09b01",
"matchCriteriaId": "9E44FE7B-CCEF-4118-9A02-810AFD0A22AE"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dlink:g416:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E6E65179-A6A8-4A3A-8422-7171AF05B0CD"
}
]
}
]
}
],
"references": [
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-446/",
"source": "zdi-disclosures@trendmicro.com"
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-446/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2025-0624",
"sourceIdentifier": "secalert@redhat.com",
"published": "2025-02-19T19:15:15.120",
"lastModified": "2025-02-19T19:15:15.120",
"lastModified": "2025-03-10T16:15:13.110",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -52,6 +52,10 @@
}
],
"references": [
{
"url": "https://access.redhat.com/errata/RHSA-2025:2521",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2025-0624",
"source": "secalert@redhat.com"

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-2112",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-03-08T22:15:36.443",
"lastModified": "2025-03-08T22:15:36.443",
"vulnStatus": "Received",
"lastModified": "2025-03-10T16:15:13.817",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
@ -59,7 +59,7 @@
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
@ -107,7 +107,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -136,6 +136,10 @@
{
"url": "https://vuldb.com/?submit.506085",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/xiaolian-11/code_demo/blob/main/yaoqishan-sql.md",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-2113",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-03-09T03:15:34.137",
"lastModified": "2025-03-09T03:15:34.137",
"vulnStatus": "Received",
"lastModified": "2025-03-10T16:15:13.950",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
@ -59,7 +59,7 @@
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
@ -107,7 +107,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -136,6 +136,10 @@
{
"url": "https://vuldb.com/?submit.506341",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.506341",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-2115",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-03-09T06:15:11.933",
"lastModified": "2025-03-09T06:15:11.933",
"vulnStatus": "Received",
"lastModified": "2025-03-10T16:15:14.147",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
@ -59,7 +59,7 @@
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
@ -107,7 +107,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -136,6 +136,10 @@
{
"url": "https://vuldb.com/?submit.506655",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/heiheixz/report/blob/main/sk_1.md",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-2120",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-03-09T11:15:35.023",
"lastModified": "2025-03-09T11:15:35.023",
"vulnStatus": "Received",
"lastModified": "2025-03-10T16:15:14.347",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
@ -59,7 +59,7 @@
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
@ -107,7 +107,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -136,6 +136,10 @@
{
"url": "https://vuldb.com/?submit.507327",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/geo-chen/Thinkware-Dashcam",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-2121",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-03-09T11:15:36.647",
"lastModified": "2025-03-09T11:15:36.647",
"vulnStatus": "Received",
"lastModified": "2025-03-10T16:15:14.483",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
@ -59,7 +59,7 @@
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
@ -107,7 +107,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -136,6 +136,10 @@
{
"url": "https://vuldb.com/?submit.507328",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/geo-chen/Thinkware-Dashcam",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-2122",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-03-09T14:15:15.430",
"lastModified": "2025-03-09T14:15:15.430",
"vulnStatus": "Received",
"lastModified": "2025-03-10T16:15:14.617",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
@ -59,7 +59,7 @@
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
@ -107,7 +107,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -128,6 +128,10 @@
{
"url": "https://vuldb.com/?id.299035",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/geo-chen/Thinkware-Dashcam",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-2123",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-03-09T15:15:36.413",
"lastModified": "2025-03-09T15:15:36.413",
"vulnStatus": "Received",
"lastModified": "2025-03-10T16:15:14.740",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
@ -59,7 +59,7 @@
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
@ -107,7 +107,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -140,6 +140,14 @@
{
"url": "https://vuldb.com/?submit.507418",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/GeSHi/geshi-1.0/issues/159",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
},
{
"url": "https://github.com/GeSHi/geshi-1.0/issues/159#issue-2880408694",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2025-25382",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-03-10T16:15:13.393",
"lastModified": "2025-03-10T16:15:13.393",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue in the Property Tax Payment Portal in Information Kerala Mission SANCHAYA v3.0.4 allows attackers to arbitrarily modify payment amounts via a crafted request."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/edwin-0990/CVE_ID/blob/main/CVE-2025-25382/README.md",
"source": "cve@mitre.org"
},
{
"url": "https://tax.lsgkerala.gov.in/epayment/QuickPaySearch.php",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2025-25614",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-03-10T15:15:37.330",
"lastModified": "2025-03-10T15:15:37.330",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Incorrect Access Control in Unifiedtransform 2.0 leads to Privilege Escalation, which allows teachers to update the personal data of fellow teachers."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/armaansidana2003/CVE-2025-25614",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/changeweb/Unifiedtransform",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2025-25620",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-03-10T15:15:37.490",
"lastModified": "2025-03-10T15:15:37.490",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Unifiedtransform 2.0 is vulnerable to Cross Site Scripting (XSS) in the Create assignment function."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/armaansidana2003/CVE-2025-25620",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/changeweb/Unifiedtransform",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2025-25940",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-03-10T16:15:13.520",
"lastModified": "2025-03-10T16:15:13.520",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "VisiCut 2.1 allows code execution via Insecure XML Deserialization in the loadPlfFile method of VisicutModel.java."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/t-oster/VisiCut",
"source": "cve@mitre.org"
},
{
"url": "https://royblume.github.io/CVE-2025-25940/",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2025-25977",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-03-10T16:15:13.633",
"lastModified": "2025-03-10T16:15:13.633",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue in canvg v.4.0.2 allows an attacker to execute arbitrary code via the Constructor of the class StyleElement."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/canvg/canvg/issues/1749",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-26910",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-03-10T15:15:37.660",
"lastModified": "2025-03-10T15:15:37.660",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in Iqonic Design WPBookit allows Stored XSS. This issue affects WPBookit: from n/a through 1.0.1."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/wpbookit/vulnerability/wordpress-wpbookit-plugin-1-0-1-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-26916",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-03-10T15:15:37.830",
"lastModified": "2025-03-10T15:15:37.830",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in EPC Massive Dynamic. This issue affects Massive Dynamic: from n/a through 8.2."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"baseScore": 9.0,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.2,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-98"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/theme/massive-dynamic/vulnerability/wordpress-massive-dynamic-theme-8-2-unauthenticated-local-file-inclusion-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-26933",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-03-10T15:15:37.997",
"lastModified": "2025-03-10T15:15:37.997",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Nitin Prakash WC Place Order Without Payment allows PHP Local File Inclusion. This issue affects WC Place Order Without Payment: from n/a through 2.6.7."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.6,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-98"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/wc-place-order-without-payment/vulnerability/wordpress-place-order-without-payment-for-woocommerce-plugin-2-6-7-local-file-inclusion-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-26936",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-03-10T15:15:38.177",
"lastModified": "2025-03-10T15:15:38.177",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Control of Generation of Code ('Code Injection') vulnerability in NotFound Fresh Framework allows Code Injection. This issue affects Fresh Framework: from n/a through 1.70.0."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
"baseScore": 10.0,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/fresh-framework/vulnerability/wordpress-fresh-framework-plugin-1-70-0-unauthenticated-remote-code-execution-rce-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2025-03-10T15:00:19.914944+00:00
2025-03-10T17:00:20.674386+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2025-03-10T14:15:26.737000+00:00
2025-03-10T16:58:35.783000+00:00
```
### Last Data Feed Release
@ -33,44 +33,56 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
284610
284622
```
### CVEs added in the last Commit
Recently added CVEs: `9`
Recently added CVEs: `12`
- [CVE-2024-57492](CVE-2024/CVE-2024-574xx/CVE-2024-57492.json) (`2025-03-10T14:15:24.387`)
- [CVE-2025-1497](CVE-2025/CVE-2025-14xx/CVE-2025-1497.json) (`2025-03-10T14:15:24.723`)
- [CVE-2025-2149](CVE-2025/CVE-2025-21xx/CVE-2025-2149.json) (`2025-03-10T13:15:36.290`)
- [CVE-2025-2151](CVE-2025/CVE-2025-21xx/CVE-2025-2151.json) (`2025-03-10T13:15:36.497`)
- [CVE-2025-2152](CVE-2025/CVE-2025-21xx/CVE-2025-2152.json) (`2025-03-10T14:15:26.543`)
- [CVE-2025-2153](CVE-2025/CVE-2025-21xx/CVE-2025-2153.json) (`2025-03-10T14:15:26.737`)
- [CVE-2025-25615](CVE-2025/CVE-2025-256xx/CVE-2025-25615.json) (`2025-03-10T14:15:24.960`)
- [CVE-2025-25616](CVE-2025/CVE-2025-256xx/CVE-2025-25616.json) (`2025-03-10T14:15:25.097`)
- [CVE-2025-26865](CVE-2025/CVE-2025-268xx/CVE-2025-26865.json) (`2025-03-10T14:15:25.220`)
- [CVE-2024-12604](CVE-2024/CVE-2024-126xx/CVE-2024-12604.json) (`2025-03-10T15:15:36.947`)
- [CVE-2024-47109](CVE-2024/CVE-2024-471xx/CVE-2024-47109.json) (`2025-03-10T16:15:12.703`)
- [CVE-2024-52905](CVE-2024/CVE-2024-529xx/CVE-2024-52905.json) (`2025-03-10T16:15:12.887`)
- [CVE-2025-25382](CVE-2025/CVE-2025-253xx/CVE-2025-25382.json) (`2025-03-10T16:15:13.393`)
- [CVE-2025-25614](CVE-2025/CVE-2025-256xx/CVE-2025-25614.json) (`2025-03-10T15:15:37.330`)
- [CVE-2025-25620](CVE-2025/CVE-2025-256xx/CVE-2025-25620.json) (`2025-03-10T15:15:37.490`)
- [CVE-2025-25940](CVE-2025/CVE-2025-259xx/CVE-2025-25940.json) (`2025-03-10T16:15:13.520`)
- [CVE-2025-25977](CVE-2025/CVE-2025-259xx/CVE-2025-25977.json) (`2025-03-10T16:15:13.633`)
- [CVE-2025-26910](CVE-2025/CVE-2025-269xx/CVE-2025-26910.json) (`2025-03-10T15:15:37.660`)
- [CVE-2025-26916](CVE-2025/CVE-2025-269xx/CVE-2025-26916.json) (`2025-03-10T15:15:37.830`)
- [CVE-2025-26933](CVE-2025/CVE-2025-269xx/CVE-2025-26933.json) (`2025-03-10T15:15:37.997`)
- [CVE-2025-26936](CVE-2025/CVE-2025-269xx/CVE-2025-26936.json) (`2025-03-10T15:15:38.177`)
### CVEs modified in the last Commit
Recently modified CVEs: `16`
Recently modified CVEs: `55`
- [CVE-2023-0487](CVE-2023/CVE-2023-04xx/CVE-2023-0487.json) (`2025-03-10T14:15:22.880`)
- [CVE-2023-25233](CVE-2023/CVE-2023-252xx/CVE-2023-25233.json) (`2025-03-10T14:15:23.970`)
- [CVE-2024-57064](CVE-2024/CVE-2024-570xx/CVE-2024-57064.json) (`2025-03-10T14:15:24.207`)
- [CVE-2025-1382](CVE-2025/CVE-2025-13xx/CVE-2025-1382.json) (`2025-03-10T14:15:24.567`)
- [CVE-2025-2130](CVE-2025/CVE-2025-21xx/CVE-2025-2130.json) (`2025-03-10T13:15:36.090`)
- [CVE-2025-2148](CVE-2025/CVE-2025-21xx/CVE-2025-2148.json) (`2025-03-10T14:15:26.130`)
- [CVE-2025-26594](CVE-2025/CVE-2025-265xx/CVE-2025-26594.json) (`2025-03-10T13:15:34.970`)
- [CVE-2025-26595](CVE-2025/CVE-2025-265xx/CVE-2025-26595.json) (`2025-03-10T13:15:35.167`)
- [CVE-2025-26596](CVE-2025/CVE-2025-265xx/CVE-2025-26596.json) (`2025-03-10T13:15:35.303`)
- [CVE-2025-26597](CVE-2025/CVE-2025-265xx/CVE-2025-26597.json) (`2025-03-10T13:15:35.443`)
- [CVE-2025-26598](CVE-2025/CVE-2025-265xx/CVE-2025-26598.json) (`2025-03-10T13:15:35.573`)
- [CVE-2025-26599](CVE-2025/CVE-2025-265xx/CVE-2025-26599.json) (`2025-03-10T13:15:35.703`)
- [CVE-2025-26600](CVE-2025/CVE-2025-266xx/CVE-2025-26600.json) (`2025-03-10T13:15:35.837`)
- [CVE-2025-26601](CVE-2025/CVE-2025-266xx/CVE-2025-26601.json) (`2025-03-10T13:15:35.960`)
- [CVE-2025-27636](CVE-2025/CVE-2025-276xx/CVE-2025-27636.json) (`2025-03-10T14:15:25.827`)
- [CVE-2025-27840](CVE-2025/CVE-2025-278xx/CVE-2025-27840.json) (`2025-03-10T14:15:25.943`)
- [CVE-2023-52214](CVE-2023/CVE-2023-522xx/CVE-2023-52214.json) (`2025-03-10T14:59:09.437`)
- [CVE-2023-52231](CVE-2023/CVE-2023-522xx/CVE-2023-52231.json) (`2025-03-10T15:50:32.850`)
- [CVE-2023-52234](CVE-2023/CVE-2023-522xx/CVE-2023-52234.json) (`2025-03-10T15:50:32.850`)
- [CVE-2023-52609](CVE-2023/CVE-2023-526xx/CVE-2023-52609.json) (`2025-03-10T15:10:00.520`)
- [CVE-2023-52611](CVE-2023/CVE-2023-526xx/CVE-2023-52611.json) (`2025-03-10T15:41:09.180`)
- [CVE-2023-52616](CVE-2023/CVE-2023-526xx/CVE-2023-52616.json) (`2025-03-10T15:41:09.180`)
- [CVE-2024-11638](CVE-2024/CVE-2024-116xx/CVE-2024-11638.json) (`2025-03-10T15:15:36.803`)
- [CVE-2024-26634](CVE-2024/CVE-2024-266xx/CVE-2024-26634.json) (`2025-03-10T15:41:09.180`)
- [CVE-2024-26641](CVE-2024/CVE-2024-266xx/CVE-2024-26641.json) (`2025-03-10T16:58:35.783`)
- [CVE-2024-28401](CVE-2024/CVE-2024-284xx/CVE-2024-28401.json) (`2025-03-10T15:10:00.520`)
- [CVE-2024-28403](CVE-2024/CVE-2024-284xx/CVE-2024-28403.json) (`2025-03-10T15:10:00.520`)
- [CVE-2024-29112](CVE-2024/CVE-2024-291xx/CVE-2024-29112.json) (`2025-03-10T14:59:09.437`)
- [CVE-2024-29419](CVE-2024/CVE-2024-294xx/CVE-2024-29419.json) (`2025-03-10T14:59:09.437`)
- [CVE-2024-29759](CVE-2024/CVE-2024-297xx/CVE-2024-29759.json) (`2025-03-10T15:50:32.850`)
- [CVE-2024-29921](CVE-2024/CVE-2024-299xx/CVE-2024-29921.json) (`2025-03-10T15:50:32.850`)
- [CVE-2024-29925](CVE-2024/CVE-2024-299xx/CVE-2024-29925.json) (`2025-03-10T15:50:32.850`)
- [CVE-2024-5295](CVE-2024/CVE-2024-52xx/CVE-2024-5295.json) (`2025-03-10T16:26:06.647`)
- [CVE-2025-0624](CVE-2025/CVE-2025-06xx/CVE-2025-0624.json) (`2025-03-10T16:15:13.110`)
- [CVE-2025-2112](CVE-2025/CVE-2025-21xx/CVE-2025-2112.json) (`2025-03-10T16:15:13.817`)
- [CVE-2025-2113](CVE-2025/CVE-2025-21xx/CVE-2025-2113.json) (`2025-03-10T16:15:13.950`)
- [CVE-2025-2115](CVE-2025/CVE-2025-21xx/CVE-2025-2115.json) (`2025-03-10T16:15:14.147`)
- [CVE-2025-2120](CVE-2025/CVE-2025-21xx/CVE-2025-2120.json) (`2025-03-10T16:15:14.347`)
- [CVE-2025-2121](CVE-2025/CVE-2025-21xx/CVE-2025-2121.json) (`2025-03-10T16:15:14.483`)
- [CVE-2025-2122](CVE-2025/CVE-2025-21xx/CVE-2025-2122.json) (`2025-03-10T16:15:14.617`)
- [CVE-2025-2123](CVE-2025/CVE-2025-21xx/CVE-2025-2123.json) (`2025-03-10T16:15:14.740`)
## Download and Usage

View File

@ -214390,7 +214390,7 @@ CVE-2023-0483,0,0,076aa122ad914c1164f82f3f9f173341f80591ee3542f2aef7ed6562b6f26e
CVE-2023-0484,0,0,8bbf0133f11289ba6dab230eb2ebc471707598c6dc2e7bd50d80f9b6868763d1,2025-02-19T20:15:33.520000
CVE-2023-0485,0,0,c94592c0a92f081c506f16872d53f1637abd06d2d748b9cc55aedabdb3c6af8d,2024-11-21T07:37:16.357000
CVE-2023-0486,0,0,79f862c17d6dd435ce4b6172df19c26a832def1ec531a28f8bb4e693b9a4b884,2025-02-13T17:15:55.600000
CVE-2023-0487,0,1,ab056dd6419a5f75db51e99abd4c40400923e2bc40533c48d9bb616ebbc9a15f,2025-03-10T14:15:22.880000
CVE-2023-0487,0,0,ab056dd6419a5f75db51e99abd4c40400923e2bc40533c48d9bb616ebbc9a15f,2025-03-10T14:15:22.880000
CVE-2023-0488,0,0,e1927f12e06abbd714f1592921e934aaf4c65af80824b7cfd1162a6fd6b257e4,2024-11-21T07:37:16.667000
CVE-2023-0489,0,0,ff94ed989ecf200ca9c9e93b2f43e5b73974735ffa1dec60779e8e34a66fa1cd,2024-11-21T07:37:16.783000
CVE-2023-0490,0,0,de5db187dc29d08e72001552229674aafbc72c7f1535c50224381914e9f169d3,2025-01-14T20:15:26.490000
@ -214481,7 +214481,7 @@ CVE-2023-0578,0,0,1b664a5f9087e1616dad80854d7095835d0ab88854a8196a7fe50c003be364
CVE-2023-0579,0,0,a9030806eb2c6a88cf9d4657f7bd32aa28a98c879cbc09d7f601d1f1c378ba9b,2024-11-21T07:37:26.030000
CVE-2023-0580,0,0,fb2903613cebd2dc46456b158d0e03dde7bc6f83ca3387673eba11cce6f53333,2024-11-21T07:37:26.137000
CVE-2023-0581,0,0,235330329aa9cb2413ff17de2e1747757523f4328b3fd3439758453dd9792730,2024-11-21T07:37:26.240000
CVE-2023-0582,0,0,b81939d48daf4b881fc0c2d4b8f6598502a6fa649da8701115d2b53a95c72fb6,2024-11-21T07:37:26.337000
CVE-2023-0582,0,1,d98ef0be504f0768a9b6e20b4bacf3f87fa947d58f24a759afe9734ed3312ef7,2025-03-10T15:50:32.850000
CVE-2023-0583,0,0,aecdf5bf075fe00bf28cdbb70dc4e17c1d3edbe8508537d39ebcdc1d79c2adc0,2024-11-21T07:37:26.457000
CVE-2023-0584,0,0,86d98ae13897aba2e27973d5ba25ca898414447a0e558495482aae224a1f3bda,2024-11-21T07:37:26.560000
CVE-2023-0585,0,0,49ac0e7f939629954485d621143f248a92ef053fa7893146e4d823a2591822c5,2024-11-21T07:37:26.653000
@ -216470,7 +216470,7 @@ CVE-2023-20853,0,0,a4a4925bb7d17dc151501c8aa321035678533d7956ae2d1bc1c5ee3469d5d
CVE-2023-20854,0,0,dacd2e665bd38bf4ba99d80576d86e64bbe079de09ee99a977ca737c5655d81d,2024-11-21T07:41:42.060000
CVE-2023-20855,0,0,f03026e1049b3344c34a6bcc1b12772374c4095cc8d63adbb19c5a88418e0228,2024-11-21T07:41:42.180000
CVE-2023-20856,0,0,5ae4aa033dbad19981a07ee21a2a125d884a36c4e68c92f5feffac991dac2d83,2024-11-21T07:41:42.283000
CVE-2023-20857,0,0,c25d90613d7fbb05e9c99852bf3d4fc04dae65733405726280e5ed45462fe07f,2024-11-21T07:41:42.380000
CVE-2023-20857,0,1,fefdaa2c60a821e74991439fecf2049da1cf72f21cbe6bd98ce3ea011f3513ae,2025-03-10T15:15:36.383000
CVE-2023-20858,0,0,427e18ddecdd57cabdcf7a2c3f0765b4fc6b3ef29cd70d30a73313181e34474c,2024-11-21T07:41:42.477000
CVE-2023-20859,0,0,a149fcc9e6b397e6867e61052fc9e57bb8ebda4b9da8d77d31122383a87a762f,2024-11-21T07:41:42.577000
CVE-2023-2086,0,0,4bd07e7f4519a004987d08259ec919f33db41e8bd2e5bac80d42e3053bac0b12,2024-11-21T07:57:54.533000
@ -220288,7 +220288,7 @@ CVE-2023-25223,0,0,e750c0702dfabc3dbe9f70410606162b90696b0cb0ec666d8afd755bff601
CVE-2023-2523,0,0,75ad7fe6a8390742f0b77c3e102425d78df453f57131497342e08e697f5d3493,2024-11-21T07:58:46.427000
CVE-2023-25230,0,0,c9e1672acab23ee6746f5a87d7cecb75e82e85c8037cde7bd29987838ac5d10e,2024-11-21T07:49:20.683000
CVE-2023-25231,0,0,88c61d385aa432e00fc3c0ad1089f0cddd7c90b8afad049aca3f8d335980af3f,2024-11-21T07:49:20.813000
CVE-2023-25233,0,1,5b3ff0021d60699fe20810b2eae7c5134ba438cf7c98451fa7b7425c26dbd3d4,2025-03-10T14:15:23.970000
CVE-2023-25233,0,0,5b3ff0021d60699fe20810b2eae7c5134ba438cf7c98451fa7b7425c26dbd3d4,2025-03-10T14:15:23.970000
CVE-2023-25234,0,0,a510bebe2375b1af45612a3ab2f3dac7b3dc7853220bc1cd50b6c5e9d04afedc,2024-11-21T07:49:21.077000
CVE-2023-25235,0,0,596c788630eb27db3d761bc92f36535d6f58c10a053690d1add9bf413ab2f052,2024-11-21T07:49:21.203000
CVE-2023-2524,0,0,a2726305bcea2f845a6096aa4d7886b789131c21fac5c5b2a82d5d0b3feb2601,2024-11-21T07:58:46.563000
@ -221836,7 +221836,7 @@ CVE-2023-27291,0,0,f15103f462a9934b3ac93d72050d98408ccebda0d448d74ff8c344a5fe434
CVE-2023-27292,0,0,97dcbe475305ce7caa822a272d7c9ae7ba2ff74ad54d20a927c7a39de32fb198,2024-11-21T07:52:35.623000
CVE-2023-27293,0,0,a6bd67d7f4699cf2b8a0eaf868b22b96444ff9300c334690ff1df27158d500f3,2024-11-21T07:52:35.733000
CVE-2023-27294,0,0,a8c2ed9f7bf316e1c8137f253452c0e613f7a6b7e34251d8285938c38d5a8709,2024-11-21T07:52:35.860000
CVE-2023-27295,0,0,404b478058137d80a51656a9ce298835ed99f8ed097a9e66008da66eb6f07a53,2024-11-21T07:52:35.963000
CVE-2023-27295,0,1,576d9de968bd51df200d9f288f1821e9b43ab98ad3fbb55bfbcd9987087b4cbc,2025-03-10T15:15:36.603000
CVE-2023-27296,0,0,7f5274562ccbbbb6af5e35f2605b8581df7cc1222d4fd056126d8ea79d3035b5,2024-11-21T07:52:36.060000
CVE-2023-27298,0,0,0fce4c894e225fbd7e4c5bb58306e8f69a7ae7ff803ff130bf62832af8167cfb,2024-11-21T07:52:36.240000
CVE-2023-2730,0,0,3311bc47a08de3cec2a39f64e644a5d5e79fe45fe6ccc5819deb28235498f05c,2024-11-21T07:59:11.053000
@ -230761,9 +230761,9 @@ CVE-2023-38530,0,0,4e4e66a2c24c9621836f71f66bc79096ab1c9791f030d61f091097512aeb6
CVE-2023-38531,0,0,f2ed48e07d4840ae6c56e55cb29ea3d8c8fb13a973f5d004638b1c054bb1d6ec,2024-11-21T08:13:46.483000
CVE-2023-38532,0,0,93e795319b21d595bc386ad4f7ab375ae9f1953850bb0258fa24bc5f3b5c1076,2024-11-21T08:13:46.620000
CVE-2023-38533,0,0,c16ba29eb2d545356ad441068c0d777daacf50687c7b9841b866bf45682b2c89,2024-11-21T08:13:46.767000
CVE-2023-38534,0,0,2b69e909a777c4e09ca35160ae25689beae3a1d13bb2a59e7b7d869cf3077c26,2024-11-21T08:13:46.917000
CVE-2023-38535,0,0,428e3c756a93aa80ca8dee74061029c646c7e0b28752bf31236047e6113e7399,2024-11-21T08:13:47.050000
CVE-2023-38536,0,0,bc42a49d2f6cd0b23955cf36f3dd93aca7cf8423253b9e2980178f2e5fc30044,2024-11-21T08:13:47.197000
CVE-2023-38534,0,1,8d28f84459bf3f165fb4079eb9d07c71ac1b6926d9580283297409c2baf14ede,2025-03-10T15:09:26.080000
CVE-2023-38535,0,1,db02b1a3c0ca63cc493b6d0de151a536cde5a20e781e04a7541df00b86ef576c,2025-03-10T15:09:26.080000
CVE-2023-38536,0,1,96e5b19b66d0a947123a455de26402a6be7d62953ec516b62788e3f9db675a3b,2025-03-10T15:09:26.080000
CVE-2023-38537,0,0,e06740b8037277dc127193a81a40981762064d56c04b903dd9547e9105b64cd2,2024-11-21T08:13:47.330000
CVE-2023-38538,0,0,8e58f8e949a1585b01725192a50b8257f2a8b0d94296dcbdb08e88289892cc4c,2024-11-21T08:13:47.463000
CVE-2023-3854,0,0,7b400fbfa45bcf9f9eb1433dc60d5d266ef5f190546d63957537ef59d6609ad1,2024-11-21T08:18:13.467000
@ -235479,7 +235479,7 @@ CVE-2023-44995,0,0,09b6031c8143bcb3dd8732530414f342c756d0f762cb4033139ead2113975
CVE-2023-44996,0,0,22eb9e1b1051547c27e8899f36155195706aa2759899c97aff28cf36873a0b8b,2024-11-21T08:26:12.090000
CVE-2023-44997,0,0,efbd2633cf4347525166f108807458b201a5cfcefdac55279eb2d650a026ef0a,2024-11-21T08:26:12.213000
CVE-2023-44998,0,0,50baa0ccce55be5da3f2afc62b780f6cf72c18ddd9a484e733a4e2b5811c8601,2024-11-21T08:26:12.340000
CVE-2023-44999,0,0,4f7501630a43c7d4750793398d2204b7429cd2f2d191a30f553f62f5c529b1a4,2024-11-21T08:26:12.467000
CVE-2023-44999,0,1,1ada106c655b6d6ef1dbb71a35ab8a2b0fd749e8bf40c0a55ff48e7ffaf0098c,2025-03-10T15:50:32.850000
CVE-2023-4500,0,0,e4e876677a323f721a42330b69404f9a5cdfbe31eb40b4ecc2dba9c49b3187ea,2024-11-21T08:35:17.893000
CVE-2023-45000,0,0,1a50b84c316432a912c8ad314433163a1b43fd68afe89719d2cb955ced2944c6,2025-03-06T15:00:11.560000
CVE-2023-45001,0,0,98537898ba3424c877ebf2faa54c0135532a4d94495084e2ad604b6c259509d9,2024-11-21T08:26:12.707000
@ -236105,7 +236105,7 @@ CVE-2023-45820,0,0,0f279d6051434e62af88a09aa9584ff189866c2fa6071bfd090ee65e61aaa
CVE-2023-45821,0,0,a5efc0cf09fbe0ffb997a5d9952a120426712f734319dcebcd5f558f82197dca,2024-11-21T08:27:25.503000
CVE-2023-45822,0,0,b8705e0d0b51b3169e64459069d4473b1901d07584912fde63fc8216205fbdd7,2024-11-21T08:27:25.650000
CVE-2023-45823,0,0,9cf2f9f9b608ff4330d5f4e9163895af0b4c72a268e8bc48c1079d139ae10904,2024-11-21T08:27:25.797000
CVE-2023-45824,0,0,286be4458a31638e5127840906a9a2155d0a987a203c80a88202eebf90f6b6ba,2024-11-21T08:27:25.933000
CVE-2023-45824,0,1,29884b9890bc82562f06e35ee63345404aae2cc9c0ecc27d0bcd2bafb744f128,2025-03-10T14:59:09.437000
CVE-2023-45825,0,0,cc4f775aec9a77cdb80822f190dfb31088087996aff99b7b525e09a3649bcb6e,2024-11-21T08:27:26.060000
CVE-2023-45826,0,0,2049fdcfacd49e62f3dee07525456735a2621cfb7b2b713331b170eaaa2c4f93,2024-11-21T08:27:26.227000
CVE-2023-45827,0,0,abaf7216d57163ffcb299f06a62cc36e0969e2f3d40b98189cc2564ddfd70e0b,2024-11-21T08:27:26.363000
@ -237923,7 +237923,7 @@ CVE-2023-48292,0,0,49b6ed3c7d82cc19d07f9b07faeae8eed968f0f9266280c60e9f10ad4e10a
CVE-2023-48293,0,0,7ec36e7fb2f0cd6575e1daab3edfac0587e55782822da6ae2d2ac5b84c8b6039,2024-11-21T08:31:25.337000
CVE-2023-48294,0,0,0823cef5ec1945423a2723001f0cbbc10811a1d7069f9e43f8bc302fbf48eb89,2024-11-21T08:31:25.490000
CVE-2023-48295,0,0,e3f7b0fabd467ba3d6d38c5a491e5d95e73fa412e4e67ec80fc391d92d9caaa6,2024-11-21T08:31:25.650000
CVE-2023-48296,0,0,0a15e48ad7844c9fa59bb7696fbcabfe945f7138cd12c884fe95e7b4cde1ee7f,2024-11-21T08:31:25.800000
CVE-2023-48296,0,1,903abecd157925dab479e1a9b8eb1615a76b874865832fde013c59cd80a022c0,2025-03-10T14:59:09.437000
CVE-2023-48297,0,0,5c29092d616aeb3553526d5d48e7236fe2eb36b7252a78c024845e2f7a8ca0b6,2024-11-21T08:31:25.937000
CVE-2023-48298,0,0,93a4e2a4bafe2888e8111342b6def94e2d2d08c80634f2badc050f7dd3bad50f,2024-11-21T08:31:26.090000
CVE-2023-48299,0,0,32b7b9547f9d8722df1b4409045acff64c8bf92421b88ca8d40dbfb2913b4da4,2024-11-21T08:31:26.243000
@ -239368,7 +239368,7 @@ CVE-2023-50164,0,0,8287e2c775d003ea8c29bab77ea8774ab6378fa22173ac3c8e2b13cc1c7db
CVE-2023-50165,0,0,f0f9c7ccf1e457e83f559bc213e758a4620263a795313eb97cd9fa622da413fe,2024-11-21T08:36:35.660000
CVE-2023-50166,0,0,0dcbea6361437caef094634aee7c12a95fcd6fe10938ebb89131abbf42b409e6,2024-11-21T08:36:35.803000
CVE-2023-50167,0,0,ccd6c241106be26cb9b4d66bcbf303ef2afb42ac4c132eb3aae0f40c4896e64d,2025-02-18T13:43:27.293000
CVE-2023-50168,0,0,839c58ebb67d0eff1d2b8b5a29b7775d811d7c03a6f89a1b449ff37e232b995c,2024-11-21T08:36:36.050000
CVE-2023-50168,0,1,a3ca312444e261a21b0fe92f05d01db88818150e1c5d5420ae68cf4f08ec1d71,2025-03-10T15:10:00.520000
CVE-2023-5017,0,0,71c6d4356e7fa788acf558b2e295dd7c9023f504871cad9a613399738594215d,2024-11-21T08:40:53.930000
CVE-2023-50170,0,0,35e958ca9e1e87a9a58954076b33cef095d0c7756fd04b778caa16ac161183d0,2024-02-14T18:15:46.610000
CVE-2023-50172,0,0,25c03c7011f73a3630332b712bf3e6e5aa0720bd78ba59ee21b22af315f1dd14,2024-11-21T08:36:36.190000
@ -239393,28 +239393,28 @@ CVE-2023-50194,0,0,648aeae0a443915f5d986b99757cc14e3d8fa6fb926bc094ed76392c5c041
CVE-2023-50195,0,0,0055bf9b102c1953a04fbdec2fda27ae9f3bbca29b798cf939095c9a948ea97c,2024-11-21T08:36:38.253000
CVE-2023-50196,0,0,76b1049dab48586a085df3c0a6ad1e28c4439753de6afae7bda2eb2c11ad1672,2024-11-21T08:36:38.370000
CVE-2023-50197,0,0,1d3b02b860128bb5029c41ac3776bf9f3c1ed8ab3f6bbf1e59772c2a98be0195,2024-11-21T08:36:38.490000
CVE-2023-50198,0,0,5e6280fedbd71287f3388ca0bc8d999e71f6cdfd0db273fffd6156697c8e46c1,2024-11-21T08:36:38.610000
CVE-2023-50199,0,0,006a4143e910cb9db8d161ec1d973fdf54541918a0d48688c6d3d7bc234e5d79,2024-11-21T08:36:38.737000
CVE-2023-50198,0,1,7a19f515359e13fa313363f52767fb3adc52a455c63be43ef5f3e66039c113c6,2025-03-10T16:26:06.647000
CVE-2023-50199,0,1,90859661f878ac18ce00ff03f9314ab6c8f2d45e6f49cd52f4d3773245fe3a5d,2025-03-10T16:26:06.647000
CVE-2023-5020,0,0,3ebfd312a63bb08213128d50313f23ce93215fe3c37de9d1421de1e39db29d89,2024-11-21T08:40:54.350000
CVE-2023-50200,0,0,8373233220283fd54d2070e77f13f8a00063236c7d24fa6cfc47a889982da830,2024-11-21T08:36:38.860000
CVE-2023-50201,0,0,62f641eb64d318c3539a5a5f68105889046d02d2c6029b689e97bd42606452d2,2024-11-21T08:36:38.980000
CVE-2023-50202,0,0,d180d7eb3b0bef572bdfe7e434f60eb5e154fa548c185e5b8e2c82dfae7e396c,2024-11-21T08:36:39.103000
CVE-2023-50203,0,0,483db6e9a2ea9eca4d196b6744908afb33c730a00fb4962cdc9038a3b6e39fd8,2024-11-21T08:36:39.233000
CVE-2023-50204,0,0,36eb51b8a8048c19d4b7df22668eae06ee9dfcb165c3110c9b344b1fbb1d3eed,2024-11-21T08:36:39.353000
CVE-2023-50205,0,0,c61e562ff4cf9a35648a8db294ea3f638d87ad887ae46ebb61a326d2a0cb1342,2024-11-21T08:36:39.487000
CVE-2023-50206,0,0,7b219eb9406518cae369ac7e7fafdbab1d76a1e7b1522a2db9815b395ec606e4,2024-11-21T08:36:39.617000
CVE-2023-50207,0,0,c86abbe8b92f98baf948cca45884269d458cbeeef484ca2ce68ddc7bf8dd9e33,2024-11-21T08:36:39.740000
CVE-2023-50208,0,0,4e6567245ec22c5e3d4553111aeb08ba5dfda080e92f87e9995d6d7cfc8cac73,2024-11-21T08:36:39.863000
CVE-2023-50209,0,0,99f2755be3b346891a689c02854b06751971cd341dd7d9937e137a9e3c735b73,2024-11-21T08:36:39.980000
CVE-2023-50200,0,1,4d8dd6a7529464c66381176afb853b6e8e8a2718a65c2c3a0a3a14420935f4b1,2025-03-10T16:26:06.647000
CVE-2023-50201,0,1,7d6906b3768b3869dfeea0a11edc3d2aea25f78fb8e5cc48408e55ed3db21026,2025-03-10T16:26:06.647000
CVE-2023-50202,0,1,f061da0feabf8922bdb40f8b3e1f668d0279f5acbbb7ffc5ace135220bde6d06,2025-03-10T16:26:06.647000
CVE-2023-50203,0,1,36a97005595c883e336e84a3e43c42a00df60f0bef2d237f253211c14af47a0e,2025-03-10T16:26:06.647000
CVE-2023-50204,0,1,3cd0869aafc3815b1d14881ecd137b723bf8d514ccc8fea519e86f9976216bd9,2025-03-10T16:26:06.647000
CVE-2023-50205,0,1,4067290f89744f83762a90342d9b5ff0ad8500229c6d518fea880f5c66f6565f,2025-03-10T16:26:06.647000
CVE-2023-50206,0,1,2c02bd008b90f9a5b96316edbdf959aca11de74d4b8783ae07d407f51be80413,2025-03-10T16:26:06.647000
CVE-2023-50207,0,1,65929ec45c07845ef32258c6a91dddaaf49d8d22a3455fc165b33c8fc5a706d6,2025-03-10T16:26:06.647000
CVE-2023-50208,0,1,1bbea70eb1891758e013fe61e6bd7a4356b57a2bd47cabdf6c1f8cfdbb01f02c,2025-03-10T16:26:06.647000
CVE-2023-50209,0,1,2e1b9b15b259929d1ab2afda166d8f86c00c39c0e2b65b98ed883dd3fcc178e8,2025-03-10T16:26:06.647000
CVE-2023-5021,0,0,d5ed528cd2d04cbb0f9c02d11ed404a1c1a5e7d82066d69d6067ce83108913da,2024-11-21T08:40:54.490000
CVE-2023-50210,0,0,c40dcf7e2a99bb8bd2c8e0c1aa2743abde9a67aeaf5acb490e4ba8fac9d964e0,2024-11-21T08:36:40.110000
CVE-2023-50211,0,0,90c1b79371746104cd5175cf3eee9753a3c4dde8dd03783e0e545f64510a4a8d,2024-11-21T08:36:40.230000
CVE-2023-50212,0,0,660967e488d5c35d19b8b90912455229dc99f5a5d283255b2bc4a4046e1f5b12,2024-11-21T08:36:40.353000
CVE-2023-50213,0,0,bf84b84ed0eaac09cbd91e956d59cd581b0a086993cb355527385be64dab1a15,2024-11-21T08:36:40.470000
CVE-2023-50214,0,0,f95c8312844dea14b73513327cce30a4d399a35267061fbd217e71bb1ea84e33,2024-11-21T08:36:40.590000
CVE-2023-50215,0,0,51b3c7166030ef77130d4afa7c25027aa45894aad31d46641276fe8e2886c231,2024-11-21T08:36:40.720000
CVE-2023-50216,0,0,4032f6a8fac9ea254fb9d0dfa2743e25deca5a561f9f04ca5cc6c97051dc6636,2024-11-21T08:36:40.840000
CVE-2023-50217,0,0,93e4fa06cfe09de19c8d114835b966e03d41c1d4c1ce08acc4cd79c4dd23f7e4,2024-11-21T08:36:40.980000
CVE-2023-50210,0,1,6d244a2c079487d7b33be255cf1fb9e8197987cf74371c2573983312a1c1aef3,2025-03-10T16:26:06.647000
CVE-2023-50211,0,1,b02adad60288c41511e94a7ba022165a57a346ffa83739d34318b5616cbfb226,2025-03-10T16:26:06.647000
CVE-2023-50212,0,1,ea3c4da5e75a60db07de8e076c9f28d2bf886269f9a2552099202272b48571d2,2025-03-10T16:26:06.647000
CVE-2023-50213,0,1,a83e1ee6369c3b10c8754dab303fc20a1967fd63ed41b288ba18cd6f9ff1e06c,2025-03-10T16:26:06.647000
CVE-2023-50214,0,1,8e18966eaf9bcfb06d8920a3c6ef8df6f85421ae39f0db617530f69f94a2001a,2025-03-10T16:26:06.647000
CVE-2023-50215,0,1,6d29327ec23ed79c03b2e0a4833cfb3c6a7165a411432917d15a8c459d4cb87c,2025-03-10T16:26:06.647000
CVE-2023-50216,0,1,6323db3fc2516221a4ae0f7abba22641c9fc5086d31d0c27f185befbb09e33d8,2025-03-10T16:26:06.647000
CVE-2023-50217,0,1,b88efa8a8f677eb0831a9db706d938a13759020777672cd8fcad59f843be6b46,2025-03-10T16:26:06.647000
CVE-2023-50218,0,0,4afe1ef0276133be7935638cbd2e85e1eb71072de1f8990a0f86eda896d50103,2024-11-21T08:36:41.120000
CVE-2023-50219,0,0,77041172f2802de8b9e4c7ab0da5d39ea410d34684f3114836da31ea96721cb7,2024-11-21T08:36:41.250000
CVE-2023-5022,0,0,77c514e21cf9d9288b8d50b5d4e761ef67e4cc58115e2c2e9a8541aee9ed20d0,2024-11-21T08:40:54.627000
@ -240793,7 +240793,7 @@ CVE-2023-52209,0,0,5cc49a8c9584ee3734b32a880f990b114eed31ffc8d335c9e91f0f26aefc7
CVE-2023-5221,0,0,ac593677b3376dde09bd34a833907807ada0e2a1e2a05727f4f5313a1311ef84,2024-11-21T08:41:19.317000
CVE-2023-52211,0,0,4fd3248f4c554c980821f389569db32dc9c558ea6ec811b2423a7ecef28bcc4f,2024-11-21T08:39:24.437000
CVE-2023-52213,0,0,3601be2f1a2926cded9245ab21da9f59f377ccf814013c5e8b2d3dc18f46cd1d,2024-11-21T08:39:24.560000
CVE-2023-52214,0,0,dc95caebbc19bbe35deb08bddf40d6503aa27c84c3bd4b4f2b0f62b7ad115c20,2024-11-21T08:39:24.690000
CVE-2023-52214,0,1,5be0569656ae6ebd8c334d7369937d6e92e6550235e7d003f573f68e74226476,2025-03-10T14:59:09.437000
CVE-2023-52215,0,0,65dd38763a56901fd2bf92818082f00e711bcdeb4b87c1f54143d565ece2e8e3,2024-11-21T08:39:24.820000
CVE-2023-52216,0,0,5b6f1089c088b9daa2fff83e5549313d7ca0def2a262e8c39c2c0c91f5d94203,2024-11-21T08:39:24.943000
CVE-2023-52217,0,0,447b3fd9aaf7581ab2dca3fde3150c58c3c612e636d6e3b2675dce7ceccb0017,2024-11-21T08:39:25.070000
@ -240812,10 +240812,10 @@ CVE-2023-52228,0,0,dbf758c4d88af4d9c17a754628ecb3f00f8342a2d36b444cb80a7668ca1b2
CVE-2023-52229,0,0,eb5ee1c9114ec221fefc0b5bdf04e6d232285e23dbc4e9fa68e1d805a6df4ef7,2024-11-21T08:39:26.680000
CVE-2023-5223,0,0,2fb00a8c39af0b009cca243d971676d52c15e47da332f24d74c2dc93b3b5f165,2024-11-21T08:41:19.617000
CVE-2023-52230,0,0,f74a4b7b498808aeca0a984a29729c461b3b795e9da7ce52049e0e1692c07a5d,2024-11-21T08:39:26.800000
CVE-2023-52231,0,0,1898ae72b4557d66d34412838f4eac948bee83dc48ddea1259f96624fd15c5fd,2024-11-21T08:39:26.930000
CVE-2023-52231,0,1,6a989c6c6fd5f334eff59c4f030f69494f93136d76eb0b6839d99d333595495f,2025-03-10T15:50:32.850000
CVE-2023-52232,0,0,25816897725e03b2601314f3c9389a2be7d7e262fad693583de240b223ce3938,2024-11-21T08:39:27.053000
CVE-2023-52233,0,0,2423e3afa7be038ccf2190464fe2d4c37e2d909a99b6b2c713bd1ae6e307c147,2024-11-21T08:39:27.173000
CVE-2023-52234,0,0,39a5bbe4db6b624413f844df3d1b1a3bf6bf3843620d3098c5576cc456c7da30,2024-11-21T08:39:27.303000
CVE-2023-52234,0,1,52810b8529a5123a1ba1ea3a3af103acb34cd679a281604f82998848fdeaf764,2025-03-10T15:50:32.850000
CVE-2023-52235,0,0,38fc0b124e8fbe66aaf7d1f1df9b950ee33f38eef712db18d6428c2cb89643d8,2025-02-27T20:15:37.787000
CVE-2023-52237,0,0,ec00cd5043a647583ae661e798908ac8aae8b8c80323fd5ded69d2879fe6e25e,2024-11-21T08:39:27.630000
CVE-2023-52238,0,0,8b91affaee9fe41fbb00a1a88e4e12c3ca7d1995b7642fbf22e7576aa0f87b25,2024-11-21T08:39:27.907000
@ -241148,15 +241148,15 @@ CVE-2023-52605,0,0,eef3cf44ce41a02a3399eb957485c8288751166988c05159972483b6e58d9
CVE-2023-52606,0,0,e71801b4f5a4981b2569467690ce52413eb8f37a0337e3baa8643032e9366860,2025-02-14T16:40:45.753000
CVE-2023-52607,0,0,4022b2f965be96edd122082d59ec69486998f3198a0825ca9c95b3fe6070d1de,2024-11-21T08:40:11.080000
CVE-2023-52608,0,0,1d16de97ff29d39dc7d22baf8d49dafff2272c15cb0f5687aeaf3537fafcbe02,2025-02-25T18:52:37.897000
CVE-2023-52609,0,0,68b6c722db826f8d3e573655c486ba16421d86e9e7c0510f6dc3171cefc3eb34,2024-11-21T08:40:11.410000
CVE-2023-52609,0,1,16d2a63db45d95bcc5c4040a7addf598310e72b425dbda6023b9f1d530ffd997,2025-03-10T15:10:00.520000
CVE-2023-5261,0,0,12a347f49e473c2171e63989f079cf4aa858b311ce4aa7919b57ad843edc6646,2024-11-21T08:41:23.970000
CVE-2023-52610,0,0,42e4932933a1b2b44e26dd827e869b81fe3fa11f7d288d5d9be953648fafefe9,2024-11-21T08:40:11.557000
CVE-2023-52611,0,0,5950f9de28ca701a6d877ef416e5b0da9f8ec02d7c89b8bab6bf8cc7164deff5,2024-11-21T08:40:11.703000
CVE-2023-52611,0,1,330152c1b221e2b7cc759a830648270d0698ae2b359283f7aa0502b6ad4fd800,2025-03-10T15:41:09.180000
CVE-2023-52612,0,0,d6d47cff640a52161b4f9351b162fb8859b2930a7044931b4890a50707eb6b85,2025-02-27T03:20:23.277000
CVE-2023-52613,0,0,96325267c27d73302c8edfb72e5ff60c5b387d18ebd2882583f0fdf9459cad86,2024-11-21T08:40:11.967000
CVE-2023-52614,0,0,52c94d505914b26a7b25e71d5a23d26488e4516b2dcce84229cb69170bc5bf85,2024-12-12T15:20:02.283000
CVE-2023-52615,0,0,d8d6425893b09196f356165ccca56dc5d14626c565c3defa9edaa655ca205929,2024-12-12T15:20:12.140000
CVE-2023-52616,0,0,1f55bb5e40a40abf9cea18a1d496803a21c38b82f69ff542219826caa6851f89,2024-11-21T08:40:12.420000
CVE-2023-52616,0,1,a9ba78ce1866347ee08e18d82dd36ef60fddc2ec75b345f6e0f635dddf7a02d9,2025-03-10T15:41:09.180000
CVE-2023-52617,0,0,43a6c3b54c97e95c95b1a3b856ce894a04e8e0998a4a6b1e4b1c3f666122ec07,2024-11-21T08:40:12.540000
CVE-2023-52618,0,0,a284d66a0a173675b029b5aee3ada2aa13bfa94d23d149bbf9319a57e50731a2,2024-11-21T08:40:12.740000
CVE-2023-52619,0,0,b2659b5699bfc1e111c9a9843d46194c0f86d0d7ec9412530eece4634db68a61,2024-11-21T08:40:12.933000
@ -245757,7 +245757,7 @@ CVE-2024-11634,0,0,14627ed8cbf95632caf8b74a22783ca02eb0bf7651aea5ed85be227c49580
CVE-2024-11635,0,0,ffacee27dce2a3419b3aa106b350e83d5585d5dcfe645774b0023dac2c389ee8,2025-01-08T08:15:24.117000
CVE-2024-11636,0,0,477a215831f10296b9ea3788441fcca038078cee1d80a9e966a40e92f5b59df4,2025-01-13T15:15:07.560000
CVE-2024-11637,0,0,5348ca65261140ae16ec15332c773ee06343664939e89530c0d5541b934692f4,2025-01-14T02:15:07.907000
CVE-2024-11638,0,0,552649984b67f5b1ef18257a0d06eb421eca6da700aa98bde360d18a4c898d04,2025-03-10T06:15:20.797000
CVE-2024-11638,0,1,b3f0fba6b9e57ad0eb73493a02c935ea4ba6428dd3e65c707db806293722fd2a,2025-03-10T15:15:36.803000
CVE-2024-11639,0,0,b0b1970767477e87b7cf619e96fa5cb2fbca7d53895c7bdaf49d93303071061e,2025-01-17T19:40:09.763000
CVE-2024-1164,0,0,d6b3223f31512976ce37113225736cbf014a2aac3d8c295ef68c5d3e3fda5f16,2025-01-16T15:08:00.773000
CVE-2024-11640,0,0,703b195ff151c253fbe91a68928542f3fce11ad9103611204a13abf98a6770f0,2025-03-08T12:15:34.510000
@ -246683,6 +246683,7 @@ CVE-2024-12600,0,0,25cdf4243a182c8f825652731ae4cdb22588842da143c4d91d8fa5b7ce663
CVE-2024-12601,0,0,f9b91f2d20d6914a3b5ca3c9af2a431f615ff9e20926a30171bf1c35967a6eba,2024-12-17T12:15:20.543000
CVE-2024-12602,0,0,6a6f401c6c4934c31c54c267328b5cfeb9b2f93f94e5b5a1cce33d5e69f2089d,2025-02-06T13:15:38.907000
CVE-2024-12603,0,0,b77b6c9527bd0798c4124cb6a67b3eb0384daf1c81bc149052bbc09ab0e74875,2024-12-13T03:15:05.187000
CVE-2024-12604,1,1,365eafd508bd0d30c9c0eae62d3ad0864e472e4672d7a16d9e686b8d021666c0,2025-03-10T15:15:36.947000
CVE-2024-12605,0,0,a0f2993b097a4c99b97e822aef9d508fcc987f27fa00acaa2c8fa4c5ee5e87b3,2025-01-09T15:15:14.150000
CVE-2024-12606,0,0,640593522db4b989e186e13bcaa1c8fc14a8675964d1b9990cbdc5261025156e,2025-01-10T04:15:19.667000
CVE-2024-12607,0,0,a778c1b19df180457278323673004b895cd04ef11611b1a21cf7e73706325fb5,2025-03-07T09:15:14.700000
@ -253542,7 +253543,7 @@ CVE-2024-26630,0,0,adde7411c6c89a1ccc138c9f1404cb16baf029b425dd47ea72b82cb8b0a9f
CVE-2024-26631,0,0,eb4c850fd5a6959a2922e5f8e3fdc1bab0839dca96694a777740412e05e949ce,2024-11-21T09:02:43.580000
CVE-2024-26632,0,0,7d5b9a41e5544a024d3fe43e030dd518d74e6fe0747c4fbe31f63afe56570152,2025-03-03T17:33:19.643000
CVE-2024-26633,0,0,53fb39ca7258086fde7e81877e5cc590f32c01622b87c853980b5069721d02f8,2024-12-20T13:15:19.710000
CVE-2024-26634,0,0,1f9eeabf8f133d86a691ddf2fa231459fd38dd0f521c36b94c4201dd9d3e3366,2024-11-21T09:02:44.020000
CVE-2024-26634,0,1,07d6fa98833a05abaecfbd7e472c45df8681df5aa0f728361828b4567b94ce61,2025-03-10T15:41:09.180000
CVE-2024-26635,0,0,a7edca2438cebac503d3d0a80a3b8ba894da4196ace5867bea23ec41425d9fe5,2024-11-21T09:02:44.140000
CVE-2024-26636,0,0,e040392dbf5dece5991bbd5b4813e4acf74491af81b2691222339ae1b7720289,2024-11-21T09:02:44.270000
CVE-2024-26637,0,0,33676b92619865021f629b461c2549985de282ac3ac30f360d4728cbdc20aa03,2024-11-21T09:02:44.403000
@ -253550,7 +253551,7 @@ CVE-2024-26638,0,0,6c83dc25b3412a9ff69e4abbfad53bbaa0a8b4f7b0192f35032c6bb4f6d46
CVE-2024-26639,0,0,77fa0c405097892d132b380250ada6d19d3c676da4410ce6e163a929de368582,2024-06-20T09:15:11.183000
CVE-2024-2664,0,0,b0442b4aa7a683f4310b6f35cff42de65a7954f7096565e1dffd40e9f9b315f7,2025-01-08T20:05:38.290000
CVE-2024-26640,0,0,54c5da3b229a93028da04fd82c4249df09909d6ac16876a131e19755de0888f3,2024-11-21T09:02:44.737000
CVE-2024-26641,0,0,5f47a642bf5ae3dc0f36324b4a1b8f7c8a7ca05295b1963f0b237d32cbae450a,2024-11-21T09:02:44.853000
CVE-2024-26641,0,1,99579385ab8663a71ddd606e1435108db4ec117d531652ca8fb25425f6073fcd,2025-03-10T16:58:35.783000
CVE-2024-26642,0,0,8cb6e40acb222e213a9c1b8fa4426c911d8cd03fc8028b52eacb65429f170b4d,2024-11-21T09:02:44.980000
CVE-2024-26643,0,0,265075385090bf0e4e7c3bf5dd42e26aa590c7fbf73f4fca758ef0cd3664df19,2024-11-21T09:02:45.103000
CVE-2024-26644,0,0,3e955ecc04cafd50770b4e01603b044ae0abf17da766c5be4deb9ef73da57365,2024-11-21T09:02:45.230000
@ -255087,9 +255088,9 @@ CVE-2024-28395,0,0,3ac36a8de3aa3d1fe4cc050c5fc46d41abb7ee090785aeaa767ac36e87a67
CVE-2024-28396,0,0,a9b920310b189713faaee0f6833442602f782d8326fdb8c04904df33448955ca,2024-11-21T09:06:16.637000
CVE-2024-28397,0,0,856f600076688d17f155d0b3de70eb9262cbb77397683a630edc0c5a3e4d66ec,2024-11-21T09:06:16.863000
CVE-2024-2840,0,0,a7ffe5d042ec7962cc81a2b23f8b42cf3a001089fe1f305bad6b8b30e2ca44e0,2024-11-21T09:10:39.107000
CVE-2024-28401,0,0,2802927e5ad9b082a6c099f44230ec67d2e7b0dc68f3c4abdb5e00577ed5f858,2024-11-21T09:06:17.097000
CVE-2024-28401,0,1,9f0dbbbe7a6ec84e7d4faab16829c35681918247fdaaf914064f4e00200084ab,2025-03-10T15:10:00.520000
CVE-2024-28402,0,0,e4c461d02368e4a31332b9277c7c7cfb13c17d92de94a00db2a5800e4b1e5806,2024-11-21T09:06:17.250000
CVE-2024-28403,0,0,860309db1aa80a38c13205a0c2daedf50384bd0d9a847292c61f38375d2f0dd5,2024-11-21T09:06:17.480000
CVE-2024-28403,0,1,81618e0ea8184e7980a777fc304e501742d1a0ee0b5eb76d1188a31fa424f013,2025-03-10T15:10:00.520000
CVE-2024-28404,0,0,d99e3ddfc43b88c6fd1b7fe400872ee4df4414379558c27f27e655b6a93ecbb2,2024-11-21T09:06:17.620000
CVE-2024-28405,0,0,37d5f19105b16a999a639ddd3ec5ffb2d785831e507091c0e23a8c30aeff75d5,2024-11-21T09:06:17.937000
CVE-2024-2841,0,0,2754de63b6cb01395935c9f4c03638ff20eb3e9e94e2e947e9011287acdc7fbc,2025-01-23T19:26:46.283000
@ -255576,7 +255577,7 @@ CVE-2024-29109,0,0,4d51f8f3341e8657e6c8c880f4f2d73bd95482441c6ac3a26d0a8cd436b3b
CVE-2024-2911,0,0,ea8e4206a3c0bfceb3e41c8a3a3622f0f3db1e83a81f091f5308d2a4dc3ff64f,2024-11-21T09:10:49.123000
CVE-2024-29110,0,0,188b12a44958677313d622a075fc663921a549ff0ec7192ae3aa84b867a019d1,2024-11-21T09:07:34.573000
CVE-2024-29111,0,0,43c01cdf3c81bdb08ab32728f1ab12bd4d113a32f12b5b11c5a8312b12fa01f2,2024-11-21T09:07:34.703000
CVE-2024-29112,0,0,22fbc807a608e11c3ab90c64425a997e5eb5ddfdf96a55d3fadff1c9efe3e429,2024-11-21T09:07:34.840000
CVE-2024-29112,0,1,7bf41a966eaae89ebefd5c8b4c7e1306d7f21a731d1056a111c69bd2a160ffe1,2025-03-10T14:59:09.437000
CVE-2024-29113,0,0,19f739df1e3ffd99c17ee5134c1916be038e1d6ab800d9edd222b9c315a4edf2,2025-02-04T20:59:42.987000
CVE-2024-29114,0,0,88300e212efe02d630837b11131224e74f01a0cd0f11f5165976518107e30b35,2024-11-21T09:07:35.123000
CVE-2024-29115,0,0,1adaa965c7fdbdcaea4d6c977d75e4c572bbddffd3cad1334aee32788318bda0,2025-02-07T17:21:05.720000
@ -255768,7 +255769,7 @@ CVE-2024-2941,0,0,791b6be749f54c80a94b45470542c13f79a740bb4377f7a50b4bf078bcbf68
CVE-2024-29413,0,0,e4856a49d0b9ba39155f8e7a02f85d7a362c6e1dae478077aa2043ac538afa2b,2024-11-21T09:08:00.883000
CVE-2024-29415,0,0,2a3b41c75a72df6c05646dae150ef4f5ab8cf2a6c172222d216a6c011a3d65c2,2025-01-17T20:15:27.950000
CVE-2024-29417,0,0,59ed7330a649e9c190a03d2824c71e319289766718abccd335aa458a7d2711a6,2024-11-21T09:08:01.307000
CVE-2024-29419,0,0,0ce606f5a5cf07356613fec2326ebde34442b78001dc20551d09af7fea8ca551,2024-11-21T09:08:01.520000
CVE-2024-29419,0,1,3d6442d0944c2f3dbf573e7842459e57abd01dc61b07d44258cf4f6e849723b5,2025-03-10T14:59:09.437000
CVE-2024-2942,0,0,26108ec70f2b46a3e343d5e817ecb446a8d832968925c86c71a2e6e00c547f59,2025-02-20T18:06:40.927000
CVE-2024-29421,0,0,beb9c3d391776927bc0509fe96d1996ccda24e4a7b2806b30c432e1112a2c867,2024-11-21T09:08:01.653000
CVE-2024-2943,0,0,beca67e7e14d7fa541ce7bb02133b5918a7ee95ca547f351aa0b1a0c61776892,2025-02-21T18:30:31.883000
@ -255896,7 +255897,7 @@ CVE-2024-29755,0,0,131508e7f31b5dd773300df31549782ce0ce017525cc3577b3551d26eabf9
CVE-2024-29756,0,0,e77feac16a93aca73ccbe8dcfafacd1ca46e891f6b1a10023dff30a1bdc4c245,2024-11-21T09:08:15.560000
CVE-2024-29757,0,0,bd7783b6715cff85d146b7f3bcffcb931e226d2a557937fa75537c3d9b443b55,2024-11-21T09:08:15.743000
CVE-2024-29758,0,0,6ea6f820d39944c9f593511e726a4e557f489b72484f2be43d28f1260dec212a,2024-11-21T09:08:15.927000
CVE-2024-29759,0,0,c2dfb00f6e1bc85acc51fca4c87b232f29bacf43ab7fb57706676573571deb58,2024-11-21T09:08:16.050000
CVE-2024-29759,0,1,ab262c2b0ceec01043067092edae533e60eb44e1368d3e01b32f3eb36aaa261f,2025-03-10T15:50:32.850000
CVE-2024-2976,0,0,be906ae6792b8669cd4d4b057f3766fd4a8c9c37d055d1b85958a80dc6b656bd,2025-01-15T18:15:32.177000
CVE-2024-29760,0,0,b6b4a1298fc92b00b03e641bbbad2c77a5d04ee4c0cc356527f4971362ab1ed2,2025-02-05T15:41:03.623000
CVE-2024-29761,0,0,768c3eca5f21654a3a2565d24ad5040669ec8be99a6791320fd6dff74c94e8c9,2024-11-21T09:08:16.287000
@ -256066,11 +256067,11 @@ CVE-2024-29918,0,0,a57618c3fb51dbee6f018076fd6e632fdeec606ca829af7180033f4e9040c
CVE-2024-29919,0,0,ac098cacaad21d239504a2c5ebecf9b813bc711e379f46354a8c421b03e7425c,2024-11-21T09:08:37.187000
CVE-2024-2992,0,0,55bbd6115b2de17ac5872344f17f9eecdf8654fc7cbe39085e40803186207c8b,2025-01-22T17:59:00.077000
CVE-2024-29920,0,0,e35d088a188e6bfa8190741a74c74b247349ba8f715ee70eaaedc435c2232bb7,2025-01-27T15:20:38.483000
CVE-2024-29921,0,0,b9c2dd4a6ac014b1d80df166ec8cf95b75954206dfe5823ed81b4aa10da07d17,2024-11-21T09:08:37.447000
CVE-2024-29921,0,1,e972cc140ebce7d247cad524d991e101a8614910bacf9680d1c950dc8c3c8178,2025-03-10T15:50:32.850000
CVE-2024-29922,0,0,72dae7d1c92fd306a11a646a4720aeaa6df484efff05a113be2d239141b3f2fa,2024-11-21T09:08:37.560000
CVE-2024-29923,0,0,a45a81b524b42be32edcb85a652cac38dc1e978ac5963a2acd47db1d0bf7d066,2025-01-31T18:23:56.537000
CVE-2024-29924,0,0,87db3b1eae3eb35152f68099374a0e872521a82a8e807d284e44cf4cc7045f92,2024-11-21T09:08:37.800000
CVE-2024-29925,0,0,741a1b83114336e7e00db1ac9c4ad6c0646d7c9b5cba9cea2fe9d5d0216d43e3,2024-11-21T09:08:37.920000
CVE-2024-29925,0,1,3699e901e2f7d0ef83c4982ad0536627ef263ff0faa1926d70f8cf0af46976f9,2025-03-10T15:50:32.850000
CVE-2024-29926,0,0,8512e864b6381f2f50156ef75c9e441435b4f2442a0f43c3157889780e88cdee,2024-11-21T09:08:38.053000
CVE-2024-29927,0,0,b05c91b5a51ff0462c21cea7bf9fa4d2ff4eb7231a790e54cdf56b9b255b7c09,2024-11-21T09:08:38.187000
CVE-2024-29928,0,0,cae0001505e95b812c21633d98b96b15f5b908a7cd513a5258817260411218f4,2024-11-21T09:08:38.310000
@ -269153,6 +269154,7 @@ CVE-2024-47103,0,0,6771e67ef5c816d19656e97b7a1b0ea749558ddc5479baa3c972619b096bd
CVE-2024-47104,0,0,9f2e725614bb591f1dee85b094aedf7e5ce884d4ec064c7905e6916502af1c82,2024-12-18T11:15:05.763000
CVE-2024-47106,0,0,5ade2f3c5d39fefc0f00abff980ec9cc063f3a12c8a4e05c1472820e919f3997,2025-01-18T16:15:37.883000
CVE-2024-47107,0,0,cbccf574787d61b4f6ca0e02b243f9353763dfcf6f42da1d1ab7d0498a1d160e,2024-12-07T15:15:04.123000
CVE-2024-47109,1,1,d621b048b89fb1b4567be75db094ed14a736130d33d5ef97b3380b15a8306aed,2025-03-10T16:15:12.703000
CVE-2024-4711,0,0,e4ef71037ebae75f1c7783581ae71eaf15c6142551362f95bff0adb8f63f9b15,2024-11-21T09:43:25.710000
CVE-2024-47113,0,0,e4a4b7ababf2602f5329349bd99728f33e6592d940c12e395d7099b940e40531,2025-01-18T16:15:38.897000
CVE-2024-47115,0,0,7a7f36fd4f42315d6d6861efa2fa7bf95141b001bf20215444f270c56375d7b4,2025-01-21T16:15:46.587000
@ -273386,6 +273388,7 @@ CVE-2024-52899,0,0,fd381e4ffbd82c5c3ae3119791a451a008b2780104bd8e38b6962694cf0bd
CVE-2024-5290,0,0,63b2ebbbc89fe3009e69f8f9e716432542a09cc7bbb7656b9181d2882b05d010,2024-09-17T13:09:13.683000
CVE-2024-52901,0,0,36d188f2446e50c3cb0f73c4dc9bb8995fd68fc57b5b23eb83b9c2e8f4d32395,2025-01-07T18:16:58.680000
CVE-2024-52902,0,0,a3380a1085a80da252bc071d60beac51ec60c4709d752c512c4410d14d967500,2025-02-19T15:15:14.660000
CVE-2024-52905,1,1,765c4d3461973ee00d14a1e8164972daef69e62a79523827ab9c3d6fb99db084,2025-03-10T16:15:12.887000
CVE-2024-52906,0,0,431d94d1b8f33effe6649fec1d40fce02705d36efd5f14a5de5395492c85ff96,2024-12-25T15:15:07.470000
CVE-2024-5291,0,0,59cced621ba81a9183b7024bcfca25ce68853e845d2185c7bff426c187f3d943,2024-11-21T09:47:22.270000
CVE-2024-52912,0,0,de0cdb8e2800d5227d67a2b677bd337b1802fb96c19fe1ed635449a3093fb257,2024-11-18T17:11:17.393000
@ -273420,7 +273423,7 @@ CVE-2024-52945,0,0,2be5483c630004e32670c1bf2df159c2fc165530e70f2dd74d5a6bc11ca63
CVE-2024-52946,0,0,4f1dfe8b6d1ba4959015bfa97e83493e2bb850117484cc15efcaa811c3e03c50,2024-11-21T18:15:13.120000
CVE-2024-52947,0,0,2aee58f94b954efaf5164df4a8e601015dc1edc796a589e4848762e3088ebedd,2024-11-18T18:35:09.517000
CVE-2024-52949,0,0,696d0f2d9f6f32b8f638cc01e3ed01b74797e84c628afddbb0ec84c427c07fde,2025-01-29T09:15:07.317000
CVE-2024-5295,0,0,2396dadecb35968608e7faeb909b9c67144b6a2007cc474b7ce69341811bcf77,2024-11-21T09:47:22.707000
CVE-2024-5295,0,1,cb8a26708b9a9483332c374cb3e6212b16da1fe7bc9688d6cac0cf935ed4c53d,2025-03-10T16:26:06.647000
CVE-2024-52951,0,0,88467df47cc32548afc6312c57f27d2a7d0655e1c934e59eb5eeea7c6be506ce,2024-11-27T21:15:07.997000
CVE-2024-52958,0,0,98e92315476166e2b33ba1e5334b4d282532d45d1556c1889e5c3ca4b973b75e,2024-11-27T06:15:18.590000
CVE-2024-52959,0,0,ab868f6da3782d67cb53183f2f781a21b6375778bdbc1b7f5893121d76931881,2024-11-27T06:15:19.083000
@ -275909,7 +275912,7 @@ CVE-2024-57055,0,0,10985f4d1644c583934097b7ec50c1a0dc3d6cc9f218e4bbfca50a2ea6ce6
CVE-2024-57056,0,0,5fa1c6daac1c565c60219576528f65f5f288f5ab9fda6e5efedccb351b0ddf0d,2025-02-18T22:15:14.653000
CVE-2024-5706,0,0,f09a3fc0306ab86b2dee756b4e00346daa3fb01dc12c33d9d6fa100062bc19ae,2025-02-19T23:15:10.960000
CVE-2024-57063,0,0,fa7a06800dd5ee4856efd324c0da0c074e3f1d402ee027ea56f36ed882b9a139,2025-02-06T16:15:39.023000
CVE-2024-57064,0,1,953de44e0e36081baa7edf9e5aca7e1f0d5a9c1bb014163def16194452722871,2025-03-10T14:15:24.207000
CVE-2024-57064,0,0,953de44e0e36081baa7edf9e5aca7e1f0d5a9c1bb014163def16194452722871,2025-03-10T14:15:24.207000
CVE-2024-57065,0,0,c1726d0070358bb3ea68f84c317d5e2bb80148f08f590add9a090f23b534aa2f,2025-02-06T16:15:39.603000
CVE-2024-57066,0,0,9f715954ea971b4d1d25c40c38035cabc1d38fcea115ceb055b4b2227dcd1941,2025-02-06T16:15:39.803000
CVE-2024-57067,0,0,cd7e64784c62ad9238926b63024a621c822b21b9ab52f7c517976f23a99e2eca,2025-02-06T16:15:39.980000
@ -276058,7 +276061,7 @@ CVE-2024-57483,0,0,d80de86b8577cf6f4a0d95e5f2ea9968ae2b8769217aa4f6a37a72d077531
CVE-2024-57487,0,0,7babb41ac17147ce892708b7e46321375976a25b6830def13d44a67b1829677d,2025-01-13T20:15:29.090000
CVE-2024-57488,0,0,cab6b66e7059e8f245e671e69563c712386f2de2b58d5eb8328ea47276f13531,2025-01-13T20:15:29.240000
CVE-2024-5749,0,0,36203d1040051e343d9d050a3c2e3f863a807627eb7d14e1470ca394531f4751,2024-10-16T16:38:43.170000
CVE-2024-57492,1,1,10e896439ca628346bec3a93067f4ded767c2995464cfeec7f486da187bd03f3,2025-03-10T14:15:24.387000
CVE-2024-57492,0,0,10e896439ca628346bec3a93067f4ded767c2995464cfeec7f486da187bd03f3,2025-03-10T14:15:24.387000
CVE-2024-57498,0,0,3826c405fd29f665f0ad91bf9f453f7e5685abcd0e2ddebcfe40540a3c6b47f2,2025-02-04T20:15:49.423000
CVE-2024-5750,0,0,476ad6c00a3180d456740d0beb63c2959ea56c746a3fc254c90c1eef52867b01,2024-06-18T14:15:11.383000
CVE-2024-57509,0,0,c607c9da29bfb31a3cf0e4d4a7622a993cd72daf6b5f7b6cf0694edfad6158b9,2025-01-31T21:15:11.630000
@ -280524,7 +280527,7 @@ CVE-2025-0617,0,0,f628b1ad73170d04122e24ddb3e888ab06e1591d9b8c499515e522c90868af
CVE-2025-0619,0,0,d6798daeef3d7924598dddc8037e69d4ae3bc1784ffc6b426878fbbb52aa2ee9,2025-01-23T11:15:10.700000
CVE-2025-0622,0,0,e47fbbd3a3a716f89e6a5dc5e99d39a7414dccef8758c28db6b0464c5f5b2e87,2025-02-18T20:15:23.570000
CVE-2025-0623,0,0,341d910d0f0f4575e107592c92f38288f68e01fe716af21df488a6d82193e481,2025-01-21T17:15:16.817000
CVE-2025-0624,0,0,40e303d9d1190ea3151af079fa636fe8ad6f27eeabbce833afeffc52d49290f2,2025-02-19T19:15:15.120000
CVE-2025-0624,0,1,3681056eba6f8e69f21f0f32e34b0e25f0040c1cfb5977910e8e31a65b5cc762,2025-03-10T16:15:13.110000
CVE-2025-0625,0,0,9d9d3d8170b51d99a85dfc09422efdaffda47b5baadb8c85253715ce0dc062af,2025-01-22T19:15:10.397000
CVE-2025-0626,0,0,16ee263c85f3aad6f9b7c5ed60390a064032d53adec3f9f8437b4c73151fb8c7,2025-03-01T18:15:34.140000
CVE-2025-0630,0,0,bb04cf8ef857d76c3a37bf8a5fa23865f63bacce52c7cbeba321e37955a961c9,2025-02-04T20:15:49.940000
@ -280986,7 +280989,7 @@ CVE-2025-1378,0,0,d0208345267ae9796dcf80d03ba8ecbf2300d71dbaf402ff968e0ce73cff89
CVE-2025-1379,0,0,c44b0567f6d42e02494f415a80eeeac6ce86521e3a7c055a79a4396e3ddebab8,2025-02-18T20:15:24.460000
CVE-2025-1380,0,0,7ec337c9b7d3226eb945ee86e72b56068996db39674e4d48869c07d60e2a44ac,2025-02-18T20:15:24.560000
CVE-2025-1381,0,0,a7ba87fad7a72f1bffe925c9548fe9143d4d449a7f8ce12fa978a99f26accdf5,2025-02-18T20:15:24.667000
CVE-2025-1382,0,1,6828cf58229feefc6e7f3d6dc190afb77cac9728dfe9830d56239f20313f5b79,2025-03-10T14:15:24.567000
CVE-2025-1382,0,0,6828cf58229feefc6e7f3d6dc190afb77cac9728dfe9830d56239f20313f5b79,2025-03-10T14:15:24.567000
CVE-2025-1383,0,0,3d6bb558842041d82d621f422104cb5c9be368f9bc9ceccf69a42cab81d3fdb5,2025-03-06T12:15:35.937000
CVE-2025-1387,0,0,b80cfff8816a5a4c7344419c24985cf6849d91e56da599c269854d931b93688f,2025-02-17T04:15:08.807000
CVE-2025-1388,0,0,8e601c55f63d7c4a99175dca26ea6e765f5666baba3a63fcb66bd4e1e37a8c84,2025-02-17T04:15:08.960000
@ -281028,7 +281031,7 @@ CVE-2025-1488,0,0,36fbf18b75b2cce073f977d40194bcef308218e50fd3898ed63fe17e537331
CVE-2025-1489,0,0,3008549e3d2861f78796256b763f59eec371226dd4b84353f864c64443cf0ecb,2025-02-24T19:45:21.653000
CVE-2025-1491,0,0,2c68d92a6f55bf529fa37ef19f65078661a466e3bd99edb0dd7d2a7b0419f292,2025-03-01T13:15:10.750000
CVE-2025-1492,0,0,b9223b4db500ae771be5ddc029bc738cd0c9e1261ad47ff66314ecd9bf92d1b3,2025-02-20T02:15:38.553000
CVE-2025-1497,1,1,90854fa7e3b09cd5d856abdba5f87800c800071ff960a82a0b6f4abdb709fdd1,2025-03-10T14:15:24.723000
CVE-2025-1497,0,0,90854fa7e3b09cd5d856abdba5f87800c800071ff960a82a0b6f4abdb709fdd1,2025-03-10T14:15:24.723000
CVE-2025-1502,0,0,87e6960c6bf75cc8b1380ef7c7e3303ad768ae7a5699ebb71505f60154582a17,2025-03-01T07:15:11.183000
CVE-2025-1504,0,0,0caf0fe296ba3de7804662f98b8d86d33ae80da3d9d2ad938f31b1ae97694007,2025-03-08T03:15:37.393000
CVE-2025-1505,0,0,1355264158a2ba11ce2fd21a6bc45f6ba2c7a41beba2055617c8a72a80e67517,2025-03-06T20:21:36.547000
@ -281508,7 +281511,7 @@ CVE-2025-21106,0,0,f21695bcd3dc50ebb62318d228568a1613cd20d1a89ae6dcd1f4af03df1c2
CVE-2025-21107,0,0,0827735892f4001f988a0739aad719c8ee1fb9144fe1da312da1da34f24b5ce6,2025-02-07T20:01:14.760000
CVE-2025-21111,0,0,36449c466fabe660f3fc2f10d8992e6a7d9c5e3d2cf72d3dce2cc840c6da552b,2025-01-24T19:11:42.417000
CVE-2025-21117,0,0,3c59ddab13aed7617d82cbb9fbab3c190cbfe8b424cc570d2e879fe06ca6cee2,2025-02-05T14:15:27.417000
CVE-2025-2112,0,0,85227d11e81908281475abb4c87b58749be99c2e996f8b7b4c8c362d9654e82a,2025-03-08T22:15:36.443000
CVE-2025-2112,0,1,5f77149442171744809539a428d973ad03b97deb512aa66cd024b8d02805c91c,2025-03-10T16:15:13.817000
CVE-2025-21121,0,0,1697e078ff9a5405d9a543461696c63d50506a646e18e458652be622eb5556f4,2025-03-03T14:54:17.487000
CVE-2025-21122,0,0,969e44e0224fb47d95b87aed16b2a93d9ca09db3ac6fe7fd40cad9e935dc7db9,2025-02-11T14:47:41.453000
CVE-2025-21123,0,0,0be58033a62e1c138323b992604392193cd26a8c4f221072c6847ce8703ed4eb,2025-03-03T14:54:17.487000
@ -281518,7 +281521,7 @@ CVE-2025-21126,0,0,10ba9f2eeb85ed246290b21f0c7e73660020f9c493ce656be1411dab877e2
CVE-2025-21127,0,0,6ca3d8cc02cdac3fbe512e4c8a13fe7008821b139ef240ca0adb0f0fb4680f8f,2025-02-11T14:55:09.333000
CVE-2025-21128,0,0,40945503866b9130c6c67e813bc72623208ffdfcd3f68f3f78dadfd34ec95930,2025-01-17T20:37:35.437000
CVE-2025-21129,0,0,e461eb72d0798775b4431b992e70379c16a549ecff183ae810c30304f7444aa5,2025-01-17T20:37:33.603000
CVE-2025-2113,0,0,198321c4bb2a71e92e596335b1432beb230188aac734caad5bf90de063af4008,2025-03-09T03:15:34.137000
CVE-2025-2113,0,1,55e1dec71d2842289ae725e7d4fc3d818c9d71c23afdeb77399d187fae7ae311,2025-03-10T16:15:13.950000
CVE-2025-21130,0,0,0a403dcee067b476ce6e2b56e8043f657d644fdd57d4c6dc048a515a53142fc0,2025-01-17T20:37:32.137000
CVE-2025-21131,0,0,bd9947447c6eaa1cc16f247aee5cb76a0ae540007c1234492add7170f98e9ee8,2025-01-17T20:37:30.750000
CVE-2025-21132,0,0,638462d9be187051a18a689c12e2e1ce1ddef5c76aec080f6deef373f9d944d3,2025-01-17T20:37:29.347000
@ -281530,7 +281533,7 @@ CVE-2025-21137,0,0,45139b02243d4b1da14a9edb94333c11b50a8560016fecd32028ca2a6372f
CVE-2025-21138,0,0,9175fd36c28710bcae9acb351f078e58c4e36962afaf9695ab07299ddfe97cfb,2025-01-21T17:49:57.513000
CVE-2025-21139,0,0,2997f9c80c926e4a0ccbf0529ea4d9ee2a8d2178744e4927ee6a077f342903ba,2025-01-21T17:50:10.023000
CVE-2025-2114,0,0,742b040392533f1a6cfa6d341fe3374fa2ff12cac643030e695f2a5f5d08022a,2025-03-09T05:15:30.270000
CVE-2025-2115,0,0,3021382c6741742138519b90c1ecc2ab1d1b6fcce8a4cc71b5453ea52ab138e8,2025-03-09T06:15:11.933000
CVE-2025-2115,0,1,fd18299636ce5f2bc38c51cf068829a7894b4fdfa24622983bc2f76959b52834,2025-03-10T16:15:14.147000
CVE-2025-21155,0,0,3b730fcf3884ebe69fa3cb10c79d458749d35e3fdc22e4031b3aa2f27e975e38,2025-03-03T16:52:20.953000
CVE-2025-21156,0,0,27b960f0b5b6864477f57a25e5df52b68937946efa0b6d1473b660f8b7066f80,2025-02-19T22:54:41.513000
CVE-2025-21157,0,0,dc11ff4b6b9e18e8b723fd7cd41934447880c05424133b5ef5cb6054de515224,2025-03-03T14:54:17.487000
@ -281564,14 +281567,14 @@ CVE-2025-21190,0,0,8b2db67cb947998b5b47f9d8f9638f01b53bd9f51551def40a37a7298cc49
CVE-2025-21193,0,0,f3dd779a9a437e46fb9f30ebcb1d8f684dbb5bb54fbad7b1b2971d455cbeaf6b,2025-01-27T18:42:17.480000
CVE-2025-21194,0,0,4cbf78ebc8712bf991c571b0aba8e62887ba280acbf4ff53a1e72f262be2e98d,2025-02-11T18:15:30.820000
CVE-2025-21198,0,0,409f66843b554eefbda1b14eaef7f0d6b61447a101bf7413282917ca002ecb4d,2025-02-28T16:02:50.353000
CVE-2025-2120,0,0,b533d65276850c88a6f68043d3c7cc2b8e635bf5331a78cad5aab688dffba10f,2025-03-09T11:15:35.023000
CVE-2025-2120,0,1,10248c9048201befa4f8181190c48cf1217aeca23433be817032d43a13b2d918,2025-03-10T16:15:14.347000
CVE-2025-21200,0,0,ac452cf5d8fd7ee078abc4bf9e8393b61bfd7da4b4c1364b02d5f65241a430a0,2025-02-28T16:02:50.353000
CVE-2025-21201,0,0,33cb4b63d3221b6237489bbb3ee9e268d6b471a2dc92fe795430f2b500e3c69e,2025-02-28T16:02:50.353000
CVE-2025-21202,0,0,ec4260bee4bd33c21d930aa9c88a20abd99a3045b6128e76b4237cf160037447,2025-01-27T18:41:27.647000
CVE-2025-21206,0,0,30db180b922f51f20ac3dc612188bb7e771e65f4b8b0475b70dd344d2e79140d,2025-02-28T16:02:50.353000
CVE-2025-21207,0,0,101f5aedceeec8e95c7aa4d154c4fe35b53d1787f61e5e9c69598a5be6aa3415,2025-01-27T18:41:10.137000
CVE-2025-21208,0,0,d6750a7a531b1a606c0d78d60d369b1fb895e79f9d7f1a5bd19ef4a9dbb91db7,2025-02-28T16:02:50.353000
CVE-2025-2121,0,0,5f6e6cafc8b053796282a2422f8f4ad4175988241f629294d1d4fcda459a8172,2025-03-09T11:15:36.647000
CVE-2025-2121,0,1,814899ae1d2eb84af8f25b992b134a50db8489b80b4a7974f517d4d245bd2b9f,2025-03-10T16:15:14.483000
CVE-2025-21210,0,0,c84a831bc35a18a87ded790fe8b815dc0d44394e8c6c6597dc3d56e3ec20caba,2025-01-27T18:41:01.470000
CVE-2025-21211,0,0,50fa81ea05a4c3005f4b83063356d13451968ba8d4fc749bb0a7fe76cb440e94,2025-01-27T18:40:51.233000
CVE-2025-21212,0,0,c3cf3d27935b08b1f99386820b4127d20504a527c2595f60d30d4416e217289b,2025-02-28T16:02:50.353000
@ -281582,7 +281585,7 @@ CVE-2025-21216,0,0,45d1d7bd112ffc38f5b77d54190bb31c57f5b75d109c891f1f43e2ff5b3e1
CVE-2025-21217,0,0,2a656e5f5fc07b78fa6836e5f8dacc4b8751a0a02e8cf075d2e4f1e57fc95b19,2025-01-27T18:45:20.030000
CVE-2025-21218,0,0,d47e4e79318ebd737fa658b56f12e5fb3e30018465210b7af2b0de06c0f4fa6e,2025-01-27T18:46:14.487000
CVE-2025-21219,0,0,424604839da721e4da825bd88d64a2416b0606f77e8b9a1190e69289c7bcf87d,2025-01-27T18:45:30.370000
CVE-2025-2122,0,0,693427cf7568fa096eba73cae872c6c4016e2931d02b54a434b5570972dee040,2025-03-09T14:15:15.430000
CVE-2025-2122,0,1,290547752a470d8da206a92c3e8e3368775c5b89590f8d1ea4998fa5f87483ca,2025-03-10T16:15:14.617000
CVE-2025-21220,0,0,82564910421308f385255df4786cde1003db7381c932ced5ca5e270285456183,2025-01-27T18:45:48.310000
CVE-2025-21223,0,0,60b46abe07e24569b5150fc60453c8604d1695be1750a046f165ca749c1035bc,2025-01-27T18:45:59.727000
CVE-2025-21224,0,0,e06076d4b37df15b101a61c764231d733771a75106b77973898a9e88711a2e24,2025-01-27T18:46:27.673000
@ -281591,7 +281594,7 @@ CVE-2025-21226,0,0,2f5f6ccc39acdfb2b7cec30e176e0e2f1dc141d4d0fd55d9540bbaff25e2e
CVE-2025-21227,0,0,e74cc881cc3f14638775245e0247523b50d3fe8f76ca0a79bf3911d59cf7d8a7,2025-01-27T18:47:16.717000
CVE-2025-21228,0,0,e66ffb1cd2f0c8e69939717342c89b3e470530ed77fe35b7d613be20fb5699e7,2025-01-27T18:47:27.603000
CVE-2025-21229,0,0,5b9d343c3675c785c1883befc5d74a71c8b6d41d9e72125678b91a16a5f7065e,2025-01-27T18:47:37.697000
CVE-2025-2123,0,0,4acb0fd53b16a2ca153ab60669e2444368e4297661d2e9c1e10749c06973c268,2025-03-09T15:15:36.413000
CVE-2025-2123,0,1,c1cf101a0a7411e29877dcdb4dc40119fa11040be147bbffa0b70d523e6b6fb2,2025-03-10T16:15:14.740000
CVE-2025-21230,0,0,bf3028f0f96a246b5ecbe951552b973bc02e0b51e420392170a1dd03d48b14e3,2025-01-27T18:47:46.557000
CVE-2025-21231,0,0,d044bbfe2f119bd723d5344cae8147732c3ad7961b5471c3a188b0d47573734f,2025-01-27T18:47:57.930000
CVE-2025-21232,0,0,23d68831fa0a23eddcf0b6ecfa974d8fa3f8ae535f8e37868367b2a8f7dabf73,2025-01-24T21:51:59.700000
@ -281665,7 +281668,7 @@ CVE-2025-21296,0,0,e6a1c9957561caf3c08496803c0d30c1ebf34930666c8fe32257ce9086419
CVE-2025-21297,0,0,3ab7b3c14f4caef771a6720deb6e250b1f436927d02f1b51343e4279e8f230d4,2025-01-24T21:48:42.703000
CVE-2025-21298,0,0,8777cfa0600445139c487075d5ab0c735aed30e39ea02043ecdccc9440939232,2025-01-24T21:48:49.880000
CVE-2025-21299,0,0,f36898ed7a072fb1bf3a66d319990cf8422e046997a77b84517942b1fed08dc7,2025-01-24T21:48:59.153000
CVE-2025-2130,0,1,0bccc294ae4c7277db16e5f25761dfe7003a8b93b93bc32794e22ed216503a7a,2025-03-10T13:15:36.090000
CVE-2025-2130,0,0,0bccc294ae4c7277db16e5f25761dfe7003a8b93b93bc32794e22ed216503a7a,2025-03-10T13:15:36.090000
CVE-2025-21300,0,0,37096ee2a4f954708906e2afd28314e98d8e4ab0c7ac8239b74c189373571d90,2025-01-24T21:49:29.857000
CVE-2025-21301,0,0,8953ad23567d52390e15e46d491856022afaf971fd601bd1a6ce8eed1c3fb533,2025-01-24T21:49:37.347000
CVE-2025-21302,0,0,884c6727a46036a58204ac04a3b80c31d9ebeb9d1b7ece8a19fc57a9180b92a6,2025-01-24T21:49:44.423000
@ -281786,9 +281789,9 @@ CVE-2025-21419,0,0,acdb4d37a32faa1cb0f65f0fbb7358475e2deb811438263e59eb8f6bcbeca
CVE-2025-21420,0,0,32a7e46f27d290c0e9a5b92e079c0424752a30e3cfa9e5d424062d7af6a66d41,2025-02-14T17:36:09.683000
CVE-2025-21424,0,0,8c4f3ff08fcd2bbfe99cfa90d5ebadccaf543f677e49ea14cef06557001215f9,2025-03-03T11:15:15.810000
CVE-2025-2147,0,0,ddb9ff2fab6cd02e2e5f72966eefcef9573206f3b8726de0ad1c2dc97e3bf31b,2025-03-10T11:15:38.157000
CVE-2025-2148,0,1,044dbab7d85177210c4ce21fe6d78c39f65cba21b3badcb532281dd68c41cd84,2025-03-10T14:15:26.130000
CVE-2025-2148,0,0,044dbab7d85177210c4ce21fe6d78c39f65cba21b3badcb532281dd68c41cd84,2025-03-10T14:15:26.130000
CVE-2025-21489,0,0,5d30c3b0acc3ddba1057df1a4f29e61d74be0ae611271efb1a2a3c05a60a8cda,2025-01-23T20:15:31.630000
CVE-2025-2149,1,1,b4a773eaaab877c4f2b815b6535ed9f8605593addcfe0315bf3b854bf7fc9635,2025-03-10T14:15:26.267000
CVE-2025-2149,0,0,b4a773eaaab877c4f2b815b6535ed9f8605593addcfe0315bf3b854bf7fc9635,2025-03-10T14:15:26.267000
CVE-2025-21490,0,0,7a3c0e9682e0e86e8a6979b8cc982eeb2dbfde70e212f3862711014520efbfca,2025-03-01T13:15:12.020000
CVE-2025-21491,0,0,6076cb457888ed12bac407cf717ae74e21970b3745c710f624ec3aea8e6322c5,2025-01-23T20:15:32.030000
CVE-2025-21492,0,0,175b05e4b6021ea2e9dabd82cb14ca0549d088227dfc44490c43cf779c0afb04,2025-01-24T20:15:34.390000
@ -281809,7 +281812,7 @@ CVE-2025-21506,0,0,b15a082cfb9b642182fa216ca2dc935119f2b7ff1700f5c5b40e9db4cd530
CVE-2025-21507,0,0,3c4d97b7a000801ae327a1e1ce8c0533b2db78864da71a309a9bca7bbf1def04,2025-01-23T17:15:24.297000
CVE-2025-21508,0,0,77d16baf9f8d14a680d396801ee4bbaa43bfb9b28cfbcf88a906be04f5238cd1,2025-01-22T19:15:10.767000
CVE-2025-21509,0,0,21a812b786cc6eba1f43d96ae439efec57e46377f98df4f2aa400b62d6b5770d,2025-01-23T16:15:36.777000
CVE-2025-2151,1,1,2642347f7015da9366ea3f56ab8d3eb281d14b395fa9bff7b08358d25b2cd514,2025-03-10T14:15:26.407000
CVE-2025-2151,0,0,2642347f7015da9366ea3f56ab8d3eb281d14b395fa9bff7b08358d25b2cd514,2025-03-10T14:15:26.407000
CVE-2025-21510,0,0,a9d4ed31cacc6780a953598023a9516bc432ebf53a4d880ebf8bed4d05eb13a9,2025-01-23T16:15:36.937000
CVE-2025-21511,0,0,a53b91609f0dde5b99ec85ee5e2f3015ee303e4f60a7051aed47d398a1b562cd,2025-01-23T22:15:15.583000
CVE-2025-21512,0,0,4eee0786dd6533099e7bc79f41166620e0d69b15829df1bc0a8a9db2b8b193d5,2025-01-23T22:15:15.720000
@ -281820,7 +281823,7 @@ CVE-2025-21516,0,0,1bff2e6fc2e4a75f5082374868c71f556093e04406da8a3f368eb942875b3
CVE-2025-21517,0,0,e6ce3ce90dfd2ca78ff83027905b529bbb9ea13ec96e6c8775fabfa89270d8d2,2025-01-22T19:15:10.990000
CVE-2025-21518,0,0,c9eaf260be716880ca796fe981cd87022ab8a92ceab0d36a88ce6c5ee05c86d3,2025-01-22T19:15:11.100000
CVE-2025-21519,0,0,953346c50dbdf4cef12c3fa84206e07ea88eb4d2d7232205446bca84001fdd28,2025-01-22T19:15:11.213000
CVE-2025-2152,1,1,096dd2ad4182fbc5ef9396ff42d68273ad11da7e0da3dbaaf09fc83b9a6516fb,2025-03-10T14:15:26.543000
CVE-2025-2152,0,0,096dd2ad4182fbc5ef9396ff42d68273ad11da7e0da3dbaaf09fc83b9a6516fb,2025-03-10T14:15:26.543000
CVE-2025-21520,0,0,a8393da1f727381379437de45c567aa2d807597d28fb46c2d614246a56f4d998,2025-01-22T19:15:11.340000
CVE-2025-21521,0,0,82cfbde2abe5d368e7cb3292856c6e197483ce94c21f4c3bf7942fb0fa7e28fa,2025-01-22T19:15:11.457000
CVE-2025-21522,0,0,cb66a3c1d1dfcbcb008084ba6cf867c8acb6791563e88e0edf7750492de7f060,2025-01-22T19:15:11.577000
@ -281831,7 +281834,7 @@ CVE-2025-21526,0,0,fdac7cf5aa22219ce3d30e2931ce86c3afca18afa9001cd9d592ceb99fd98
CVE-2025-21527,0,0,fe6e17ba8c4f9cbb7443f4ecebffc8123cb250add87fccb4e7a78b1549e18f3c,2025-02-04T16:15:41.537000
CVE-2025-21528,0,0,e4a89dd052a14e910c273cde2b54814a4717a3a651bc8b5657a5be581524c187,2025-02-04T16:15:41.670000
CVE-2025-21529,0,0,4c7a012163f04cc8de95049169013b919bfdfb658a06c133c7cff3a918912f76,2025-02-18T21:15:25.577000
CVE-2025-2153,1,1,32dc3c49aa710a9f787bb344b252aa19f9b37bdd01841ef27bce990fb70fb5c5,2025-03-10T14:15:26.737000
CVE-2025-2153,0,0,32dc3c49aa710a9f787bb344b252aa19f9b37bdd01841ef27bce990fb70fb5c5,2025-03-10T14:15:26.737000
CVE-2025-21530,0,0,aba8a6aa74e189f13322985a854d7fce1ce0609f6c2ff755aa082cda64c94c2c,2025-02-18T21:15:25.703000
CVE-2025-21531,0,0,a10f6ce71dcae33c91ea0d30cb2042611ddc0c276623a2f99632cda89a3d9a70,2025-01-22T19:15:11.807000
CVE-2025-21532,0,0,24d283ebf9e83eedc77bd765fab01c9d1c1c0ad92a193cdae6d8f4a7be52dad1,2025-02-18T21:15:25.820000
@ -283947,6 +283950,7 @@ CVE-2025-25361,0,0,dd0fd4c24b78008e91609d0ad78fcd088a6f876ce651fa9ebadb9ad2df525
CVE-2025-25362,0,0,9cdfc22f6fba81a660a23fb14358e78116e49805e8504ef86ce8786368248ff5,2025-03-06T15:15:17.277000
CVE-2025-25379,0,0,10c6b59b7ced1a65c44b725df73613b964204bd8bcc126008f75da9f2d8ec909,2025-03-04T16:15:39.433000
CVE-2025-25381,0,0,1a2bb06e970af8252b42b35cce67724a6bfba5c092f06ed50d25977950572c1a,2025-03-07T20:15:37.850000
CVE-2025-25382,1,1,f4d7357828629f0991d4a631820157d6dc805fb951d13516fbb79d6f3367f88e,2025-03-10T16:15:13.393000
CVE-2025-25387,0,0,8227bd6f57bafc5fc7f8bddfd6ec6a78dcca117ca404c22469842eba5d4e306c,2025-02-14T17:15:20.393000
CVE-2025-25388,0,0,e086cda7e4e5c05ccba48ad30906fb7e59dedc66fc1b83e5645bd434397a431f,2025-02-13T20:15:49.730000
CVE-2025-25389,0,0,c4fa8037812de3d612838c95ec3fcc9b936e3b28bc2aa3e854f709efa62e78c8,2025-02-14T17:15:20.663000
@ -283998,9 +284002,11 @@ CVE-2025-25604,0,0,7a8cc3234dfcf2fd463e6a54d1695816511ffd986519d0bafcb53e4f83d30
CVE-2025-25605,0,0,c0858a3094cad59e4cf6248dc23b2aa0633fe28bfdda9aca36970755a7dbfbce,2025-02-21T21:15:24.317000
CVE-2025-25609,0,0,266dd94a110ece3c3e14be6241a6b4dfd9dca67d8afeac437f4e4e876c6d5556,2025-03-05T16:15:39.460000
CVE-2025-25610,0,0,fe8057df3f08f41d60fe1ebc6a06e1b6051f3d9bb1f1a3b3ed10e5a9eef74dbc,2025-03-05T16:15:39.623000
CVE-2025-25615,1,1,986bdae7b0adb7aed092d2b5d085e2ba1027ce1007b67de14c453c095ac6733a,2025-03-10T14:15:24.960000
CVE-2025-25616,1,1,ea666550f20d27aba2fe037670d1f7afca9196f806e53b0b714782b8fa677d6a,2025-03-10T14:15:25.097000
CVE-2025-25614,1,1,c675990c7d380dd61a91c4658854dbebaa65b350bca03a6e567ad85dbe4d1974,2025-03-10T15:15:37.330000
CVE-2025-25615,0,0,986bdae7b0adb7aed092d2b5d085e2ba1027ce1007b67de14c453c095ac6733a,2025-03-10T14:15:24.960000
CVE-2025-25616,0,0,ea666550f20d27aba2fe037670d1f7afca9196f806e53b0b714782b8fa677d6a,2025-03-10T14:15:25.097000
CVE-2025-25617,0,0,aadd1592880ad6d511d461bb2e93fc58cd011b7a0023bcbd3ae23df0a4c6c5a8,2025-03-07T18:15:47.840000
CVE-2025-25620,1,1,c97dc91c74c9312565adbd3deb243defc9e4012573757fad1b98f7080f6f489f,2025-03-10T15:15:37.490000
CVE-2025-25632,0,0,fc07c1c8054a4d9104d3986b5c4aae35472ab79903ea3550918ece4e63e78a9f,2025-03-06T15:15:17.770000
CVE-2025-25634,0,0,c65724cf9c9f8a6f5918311d4cf2659bb1ddbd0a8ea6bef01873f68d34182505,2025-03-06T22:15:35.290000
CVE-2025-25635,0,0,0db247b70226e51b14344c6fcb3514df042659a07d0da107baaaba8517f711fd,2025-03-05T16:15:39.793000
@ -284076,6 +284082,7 @@ CVE-2025-25900,0,0,0a49592be1d696f5f901fb9602bc587e2d7d2fe0e68d036d6f9f545c33b03
CVE-2025-25901,0,0,dbbaa66456410cc814c13398a9419347a95d4c008549889e82c9e08064439afb,2025-02-20T15:15:14.380000
CVE-2025-25916,0,0,91ba974117f22dab8d3678a8beecd3ea90efc52e588600708e1af441e5e35add,2025-02-28T16:15:39.867000
CVE-2025-25939,0,0,7dbd849d533c834d2205e6078f0487c45587eccd9cff67e78aa1acfe6cb8ca0d,2025-03-06T12:21:35.360000
CVE-2025-25940,1,1,f334f2d66750e54c404e803d4cea64ae4d9a0e34417258e5cbd6420f47db59a8,2025-03-10T16:15:13.520000
CVE-2025-25942,0,0,abb06ac2462106029cbb8bb08119f5129d89323ab66d1de7f80d7b48f0130201,2025-02-20T15:15:14.587000
CVE-2025-25943,0,0,ddbf4f2120cdf8c0c6ec76a602b8a3405d44d5883b4cc9347335166be4d0cf63,2025-02-20T15:15:14.743000
CVE-2025-25944,0,0,ddbe030374d7cbb79a7eeac3a7fcb4800d8524e9c1e33154d3a9a0836431ffdc,2025-02-20T15:15:14.900000
@ -284094,6 +284101,7 @@ CVE-2025-25960,0,0,f81f6a42cc37f50d144da0c1d5b21881b06cbfd074736b0e8bb6bc8c20ba8
CVE-2025-25967,0,0,81784ba9feac0723a167c707a9320ff214d739b74a7e612ad514cf55aca18698,2025-03-06T12:21:35.360000
CVE-2025-25968,0,0,aa03a40375072b5ed2e0cc97eadb8b6a24b2d3fca5df43f3cc84fd5f8cf62db9,2025-02-20T20:15:46.993000
CVE-2025-25973,0,0,65ef8616835d158faacedce49a052fb547828e3d5a16eaa3b291d668b6b798cd,2025-02-20T20:15:47.153000
CVE-2025-25977,1,1,bb550a41eadbb916b3aa5352e596b02014414ea85adec399ddf53ebef816beca,2025-03-10T16:15:13.633000
CVE-2025-25988,0,0,2e4eb2e7125515f27fdfebdfe00a0ef8ddea99213605fc21d44aa06160606890,2025-02-14T19:15:14.497000
CVE-2025-25990,0,0,8b2b3adef615c73806983235252325f570b2dccda1b7c0643592bd465b468928,2025-02-18T15:15:18.790000
CVE-2025-25991,0,0,5e1156693b620548738bd3f03c659034c8fa7558a7d1a0f45f9ae1ea86e44f07,2025-02-14T20:15:37.210000
@ -284238,14 +284246,14 @@ CVE-2025-26586,0,0,2995618efb5bc786b623a073068ee53ca10ebf5a6af434abe477283701f8c
CVE-2025-26587,0,0,f182d8db53652dc68c3e8d08c04a29d1ba7ae50e8acecec3dbde839e0907bec0,2025-03-03T14:15:55.780000
CVE-2025-26588,0,0,bd02ba233979579f3c8028618005b5c036f8e9bb2db4aabcd7a57c2127440863,2025-03-03T14:15:55.920000
CVE-2025-26589,0,0,bed434e05d708700c2c5a6b977f599fcc267a2dd10919cb423bc182a13c41191,2025-03-03T14:15:56.067000
CVE-2025-26594,0,1,d618d3159198035f4c79737d60d96ff48c2aad9af54b6050c7c5f3cc12f98161,2025-03-10T13:15:34.970000
CVE-2025-26595,0,1,ccae3fc673379b44596456fc8c1caec7a59cf981261dc5d5f3f2f9164c498554,2025-03-10T13:15:35.167000
CVE-2025-26596,0,1,6d98e44d6894315f0df1b0aa38222986b9b35a0c5b1ec7644cb496630702d67f,2025-03-10T13:15:35.303000
CVE-2025-26597,0,1,f9cce4bde71a81f02f3cbf7413bb0adef7d573beb8c4c613092191c7b061fe03,2025-03-10T13:15:35.443000
CVE-2025-26598,0,1,4a99aa27f0c718493fdbebb795dd472db1c66382fd5545cf203cec47a6c2fddf,2025-03-10T13:15:35.573000
CVE-2025-26599,0,1,18f82eb3fa1037384d1df74e0e45289d05da1e59a91d83828a83c371acac2edc,2025-03-10T13:15:35.703000
CVE-2025-26600,0,1,4caa95a8d7401ee9a10363b3b7215080e841ee2250232967f67255c6a349af74,2025-03-10T13:15:35.837000
CVE-2025-26601,0,1,4de27db3202c380c106512d04a2639bb6587a2689b12d91eb7fb082ec09eeb7d,2025-03-10T13:15:35.960000
CVE-2025-26594,0,0,d618d3159198035f4c79737d60d96ff48c2aad9af54b6050c7c5f3cc12f98161,2025-03-10T13:15:34.970000
CVE-2025-26595,0,0,ccae3fc673379b44596456fc8c1caec7a59cf981261dc5d5f3f2f9164c498554,2025-03-10T13:15:35.167000
CVE-2025-26596,0,0,6d98e44d6894315f0df1b0aa38222986b9b35a0c5b1ec7644cb496630702d67f,2025-03-10T13:15:35.303000
CVE-2025-26597,0,0,f9cce4bde71a81f02f3cbf7413bb0adef7d573beb8c4c613092191c7b061fe03,2025-03-10T13:15:35.443000
CVE-2025-26598,0,0,4a99aa27f0c718493fdbebb795dd472db1c66382fd5545cf203cec47a6c2fddf,2025-03-10T13:15:35.573000
CVE-2025-26599,0,0,18f82eb3fa1037384d1df74e0e45289d05da1e59a91d83828a83c371acac2edc,2025-03-10T13:15:35.703000
CVE-2025-26600,0,0,4caa95a8d7401ee9a10363b3b7215080e841ee2250232967f67255c6a349af74,2025-03-10T13:15:35.837000
CVE-2025-26601,0,0,4de27db3202c380c106512d04a2639bb6587a2689b12d91eb7fb082ec09eeb7d,2025-03-10T13:15:35.960000
CVE-2025-26603,0,0,8ae2812ccc436075652a92b78482e86bdfeb5a0aad1aca77b0c194e6b06d7b51,2025-03-07T01:15:12.700000
CVE-2025-26604,0,0,720d50d971a81c5950fb5a1fe6bb95e5177eb2f3df88a35c072c70e62f5cf12d,2025-02-18T20:15:33.003000
CVE-2025-26605,0,0,fdd668972bd6651dbed3cd9f902a3b8b59140c82d14f8fce08f437a28193bf96,2025-02-18T22:15:19.387000
@ -284308,7 +284316,7 @@ CVE-2025-26803,0,0,407dfdf36bb29c1169c55a1bdf56c2857dbd1f6059de4d7853e727c76548a
CVE-2025-26819,0,0,265b05b0b6b085ef27d0e218dd5a0f79b1864b8a6c0004a23e6fa9575a3cdbeb,2025-02-15T00:15:28.510000
CVE-2025-26849,0,0,b01e97de5d13c5e322817bb01db0ae13a4e34f402b7f75a8f8b8da54efb28ebd,2025-03-05T04:15:12.367000
CVE-2025-26856,0,0,7824298cfc11aa81d23219a23487dd842dd5c11d44f90723ef1786188c90cd64,2025-02-20T06:15:21.673000
CVE-2025-26865,1,1,0e99f178191a1d25650bf48cec6b7aaf006874831e9998c13673326106b5c9d6,2025-03-10T14:15:25.220000
CVE-2025-26865,0,0,0e99f178191a1d25650bf48cec6b7aaf006874831e9998c13673326106b5c9d6,2025-03-10T14:15:25.220000
CVE-2025-26868,0,0,cba4f0d0c27029718e2b50a126041299a77ea3636d837c9614e50e9855b0878b,2025-02-25T15:15:23.903000
CVE-2025-26871,0,0,ab850536250644e42a3ba5d883350c3eff02f87d1e660abd32733c03a6449348,2025-02-25T15:15:24.040000
CVE-2025-26876,0,0,951eb7449b154de578d3128a59b04224fb75a7c7aa4bcfeca0a4c24d809c64ec,2025-02-25T15:15:24.180000
@ -284329,11 +284337,13 @@ CVE-2025-26900,0,0,059a3c3ee3ee2a5a8549e4b2d083087d5d389f3b34374b636a32cc0884702
CVE-2025-26904,0,0,cab9a4c8649e54f1340a29bbdf14f52168b5cc51065c592884d99916bd742bf3,2025-02-25T15:15:25.990000
CVE-2025-26905,0,0,3fd420b5cf6d35f2394ffb7c8b96279ea5b6a88032aa4ac13abb160d4bcc3b89,2025-02-25T15:15:26.127000
CVE-2025-26907,0,0,12cbcc5c8b9c8102e25a8b6b26b7cf51a11f16a102e0d9c393e6b591cd6460db,2025-02-25T15:15:26.263000
CVE-2025-26910,1,1,4dd8ff18e0ceed65e66990b8d198f071259fe37bcbce427ec021ca038a8b4226,2025-03-10T15:15:37.660000
CVE-2025-26911,0,0,69bc9028618de684f0fd93e47f869e941f72b06df9e8d8d5b5d7c83ef9d05729,2025-02-25T15:15:26.393000
CVE-2025-26912,0,0,e79b24db34788e23307e263a850245edf07e94d4a7f854cf9650116a3ca5b4f5,2025-02-25T15:15:26.530000
CVE-2025-26913,0,0,6404f4027080b1b189a02d4823943b3cde1c26a6a1695b9a80537c5a912ca3cc,2025-02-25T15:15:26.663000
CVE-2025-26914,0,0,e8e50bb802b33c4b312da6233f8df7199b76a4f553414230d6e4d4e0415c258c,2025-03-03T14:15:56.500000
CVE-2025-26915,0,0,e63561d7adcf992fc96846addce01208e0fc68636cda02f3f3ede272653e6e46,2025-02-25T15:15:26.793000
CVE-2025-26916,1,1,c4eb40a7c438db2a0841bf5dfe4e66f1b955790d3c50ca241216d4ff7c7a6139,2025-03-10T15:15:37.830000
CVE-2025-26917,0,0,c1097030fbcc9b94d267c252ddacbb859283ed99e922157cf435c49676b50741,2025-03-03T14:15:56.640000
CVE-2025-26918,0,0,23788357a0b6dd77631565c9d4f3eb930266dadf051f40a3a97eb14cd9ad37b2,2025-03-03T14:15:56.787000
CVE-2025-26925,0,0,d5e509c3100c8df66ee25704b916843165e5ea195a85927b6d7f6a9a10386673,2025-02-26T14:15:11.743000
@ -284341,7 +284351,9 @@ CVE-2025-26926,0,0,46670274056f543a2d8d831b8a506aef43cfadd1396d409b955b63f1e76e6
CVE-2025-26928,0,0,861f1ddc85c79a1a8d63021b4a752a7980136fff79059fb765bfdd66a75382c5,2025-02-25T15:15:27.067000
CVE-2025-26931,0,0,7680a16e5e4bc5cb7d571ec7522e8eb1da81a45543fb23fce8deb347b9f39cce,2025-02-25T15:15:27.200000
CVE-2025-26932,0,0,30e11ffe0fff9feb38697cc84d4135950611987600314e1279c1b8624ccdcf60,2025-02-25T15:15:27.337000
CVE-2025-26933,1,1,923c4c91aeec786aadd94fb7553873b1b9d45a3b48f857802839df0fbfee89b3,2025-03-10T15:15:37.997000
CVE-2025-26935,0,0,9a8d29558b30c8784ffd5f723fd7b9a597b88af12b658cf1d4aa9a2c8103a0f0,2025-02-25T15:15:27.470000
CVE-2025-26936,1,1,9d27fbfa1037e1a88a13f73270560d903b33ee9cc86389e8ebcad3245eccb6f5,2025-03-10T15:15:38.177000
CVE-2025-26937,0,0,fed4f7fb03e7e7397a66feffa07ed44235873cf8d6e3b0b63bd6710ca35b749c,2025-02-25T15:15:27.607000
CVE-2025-26938,0,0,ccee8025a5da0f5335768772061878090bde7e99bf569f115b93a00b9aeb222e,2025-02-25T15:15:27.747000
CVE-2025-26939,0,0,58ae7bfaf9694ba77b15898e6615a5486bcece1885e349ca30dab005e95021c4,2025-02-25T15:15:27.883000
@ -284549,7 +284561,7 @@ CVE-2025-27622,0,0,aab424c81f70efb6c2294313600d100f64e720f683885d3b6918b7e0d0c95
CVE-2025-27623,0,0,a7729605ea601dac947d3c9e9dda3f4cf0fc759f67e3d847999a08d4d426400f,2025-03-06T17:15:23.647000
CVE-2025-27624,0,0,386e769fd54c9c9e387001be90fa20a8140740d08fb61eb8c2dc8cbb750364f8,2025-03-06T17:15:23.797000
CVE-2025-27625,0,0,85889be78be476b146c5fda687cdd2b7a01a613eea674a60ada7a9651223e2d5,2025-03-06T17:15:23.960000
CVE-2025-27636,0,1,849e19f2691277a859aa7da4d64efd370cf0e46649cf02a26e8308d80bdb9f11,2025-03-10T14:15:25.827000
CVE-2025-27636,0,0,849e19f2691277a859aa7da4d64efd370cf0e46649cf02a26e8308d80bdb9f11,2025-03-10T14:15:25.827000
CVE-2025-27637,0,0,9c062615c8ec6a3ced4ee678ddb923b6d263f273f4e63f5f7bf9a46985accf21,2025-03-05T16:15:40.713000
CVE-2025-27638,0,0,799c839b25e9819e4ec80c30ab7682e659f557f1c902bc7211099cb508098b42,2025-03-05T17:15:16.853000
CVE-2025-27639,0,0,a0477d98f560583497b6432bc3e9038f2aa7b8df2110514ba2e616c075cb3f66,2025-03-05T17:15:17.027000
@ -284608,4 +284620,4 @@ CVE-2025-27824,0,0,bbbadd94bca912d17091ba5687790372eed06151266f5eb5403da18d55309
CVE-2025-27825,0,0,99e9b9d3befd54cbb55880416607fbc7e5d90c9fee9cdc2881cb2480979fee41,2025-03-07T22:15:38.380000
CVE-2025-27826,0,0,83fe28f5c1c38336a328c924367a016f575cf3bedee9c6070949943b515ded3d,2025-03-07T22:15:38.527000
CVE-2025-27839,0,0,212b3d30d2c1f53f372c7e143c6e03922deeb9da14f018db14d5749815db8000,2025-03-08T00:15:38.340000
CVE-2025-27840,0,1,31b43659fdf50a1c837def79b3ff8549c2485895c251972e0cf021cb5a031b4d,2025-03-10T14:15:25.943000
CVE-2025-27840,0,0,31b43659fdf50a1c837def79b3ff8549c2485895c251972e0cf021cb5a031b4d,2025-03-10T14:15:25.943000

Can't render this file because it is too large.