Auto-Update: 2025-03-10T17:00:20.674386+00:00

This commit is contained in:
cad-safe-bot 2025-03-10 17:03:50 +00:00
parent 6f3f30e713
commit 9f8687e973
69 changed files with 4684 additions and 429 deletions

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-0582",
"sourceIdentifier": "psirt@forgerock.com",
"published": "2024-03-27T18:15:08.237",
"lastModified": "2024-11-21T07:37:26.337",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-03-10T15:50:32.850",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 5.2
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
@ -49,24 +69,69 @@
"value": "CWE-22"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:forgerock:access_management:*:*:*:*:*:*:*:*",
"versionEndExcluding": "7.1.4",
"matchCriteriaId": "478F1C63-04C4-4408-89B2-9BB8DCDEC3A7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:forgerock:access_management:7.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C87A61CB-EA7F-4898-AA4A-4E4A911D6942"
}
]
}
]
}
],
"references": [
{
"url": "https://backstage.forgerock.com/downloads/browse/am/featured",
"source": "psirt@forgerock.com"
"source": "psirt@forgerock.com",
"tags": [
"Product"
]
},
{
"url": "https://backstage.forgerock.com/knowledge/kb/article/a64088600",
"source": "psirt@forgerock.com"
"source": "psirt@forgerock.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://backstage.forgerock.com/downloads/browse/am/featured",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
]
},
{
"url": "https://backstage.forgerock.com/knowledge/kb/article/a64088600",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-20857",
"sourceIdentifier": "security@vmware.com",
"published": "2023-02-28T17:15:10.457",
"lastModified": "2024-11-21T07:41:42.380",
"lastModified": "2025-03-10T15:15:36.383",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 0.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"attackVector": "PHYSICAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 0.9,
"impactScore": 5.9
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-306"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-306"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-27295",
"sourceIdentifier": "vulnreport@tenable.com",
"published": "2023-02-28T17:15:11.547",
"lastModified": "2024-11-21T07:52:35.963",
"lastModified": "2025-03-10T15:15:36.603",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 2.5
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.5
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-352"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-38534",
"sourceIdentifier": "security@opentext.com",
"published": "2024-03-13T22:15:08.197",
"lastModified": "2024-11-21T08:13:46.917",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-03-10T15:09:26.080",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 4.0
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
@ -49,16 +69,54 @@
"value": "CWE-287"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-287"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:opentext:exceed_turbox:12.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DE9861EE-FAF9-4471-BF27-46E7A8B8F8B4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:opentext:exceed_turbox:12.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "69487C36-3ED3-4271-A55B-0A98D555BB02"
}
]
}
]
}
],
"references": [
{
"url": "https://support.opentext.com/csm?id=kb_article_view&sysparm_article=KB0796609",
"source": "security@opentext.com"
"source": "security@opentext.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://support.opentext.com/csm?id=kb_article_view&sysparm_article=KB0796609",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-38535",
"sourceIdentifier": "security@opentext.com",
"published": "2024-03-13T22:15:08.463",
"lastModified": "2024-11-21T08:13:47.050",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-03-10T15:09:26.080",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.0,
"impactScore": 3.6
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
@ -49,16 +69,54 @@
"value": "CWE-321"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-798"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:opentext:exceed_turbox:12.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DE9861EE-FAF9-4471-BF27-46E7A8B8F8B4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:opentext:exceed_turbox:12.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "69487C36-3ED3-4271-A55B-0A98D555BB02"
}
]
}
]
}
],
"references": [
{
"url": "https://support.opentext.com/csm?id=kb_article_view&sysparm_article=KB0801267",
"source": "security@opentext.com"
"source": "security@opentext.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://support.opentext.com/csm?id=kb_article_view&sysparm_article=KB0801267",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-38536",
"sourceIdentifier": "security@opentext.com",
"published": "2024-03-13T22:15:08.710",
"lastModified": "2024-11-21T08:13:47.197",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-03-10T15:09:26.080",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 0.9,
"impactScore": 5.5
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
@ -49,16 +69,54 @@
"value": "CWE-79"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:opentext:exceed_turbox:12.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DE9861EE-FAF9-4471-BF27-46E7A8B8F8B4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:opentext:exceed_turbox:12.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "69487C36-3ED3-4271-A55B-0A98D555BB02"
}
]
}
]
}
],
"references": [
{
"url": "https://support.opentext.com/csm?id=kb_article_view&sysparm_article=KB0796182",
"source": "security@opentext.com"
"source": "security@opentext.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://support.opentext.com/csm?id=kb_article_view&sysparm_article=KB0796182",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-44999",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-03-27T14:15:09.253",
"lastModified": "2024-11-21T08:26:12.467",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-03-10T15:50:32.850",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 2.5
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
@ -51,14 +71,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:woocommerce:stripe_payment_gateway:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "7.6.0",
"matchCriteriaId": "5BFB7CAF-01E5-4890-8A27-59C3AB8891A1"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/woocommerce-gateway-stripe/wordpress-woocommerce-stripe-gateway-plugin-7-6-0-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://patchstack.com/database/vulnerability/woocommerce-gateway-stripe/wordpress-woocommerce-stripe-gateway-plugin-7-6-0-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-45824",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-03-25T19:15:57.027",
"lastModified": "2024-11-21T08:27:25.933",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-03-10T14:59:09.437",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
@ -49,24 +69,67 @@
"value": "CWE-200"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oroinc:oroplatform:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.2.0",
"versionEndExcluding": "5.1.4",
"matchCriteriaId": "89B3DB07-5C6E-45E1-9590-53DC197374FA"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/oroinc/platform/commit/cf94df7595afca052796e26b299d2ce031e289cd",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Product"
]
},
{
"url": "https://github.com/oroinc/platform/security/advisories/GHSA-vxq2-p937-3px3",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "https://github.com/oroinc/platform/commit/cf94df7595afca052796e26b299d2ce031e289cd",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
]
},
{
"url": "https://github.com/oroinc/platform/security/advisories/GHSA-vxq2-p937-3px3",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-48296",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-03-25T19:15:57.300",
"lastModified": "2024-11-21T08:31:25.800",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-03-10T14:59:09.437",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
@ -49,24 +69,65 @@
"value": "CWE-200"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oroinc:oroplatform:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.1.0",
"versionEndExcluding": "5.1.4",
"matchCriteriaId": "434D6C2A-C8EA-4667-99BB-564738EC3D0E"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/oroinc/orocommerce/commit/41c526498012d44cd88852c63697f1ef53b61db8",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/oroinc/orocommerce/security/advisories/GHSA-v7px-46v9-5qwp",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://github.com/oroinc/orocommerce/commit/41c526498012d44cd88852c63697f1ef53b61db8",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/oroinc/orocommerce/security/advisories/GHSA-v7px-46v9-5qwp",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-50168",
"sourceIdentifier": "security@pega.com",
"published": "2024-03-14T16:15:49.863",
"lastModified": "2024-11-21T08:36:36.050",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-03-10T15:10:00.520",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.1,
"impactScore": 4.0
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"baseScore": 7.7,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.1,
"impactScore": 4.0
}
]
},
@ -49,16 +69,50 @@
"value": "CWE-611"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-611"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pega:pega_platform:*:*:*:*:*:*:*:*",
"versionEndExcluding": "8.8.5",
"matchCriteriaId": "EEE0AA21-4E23-4A71-B128-589BA98C1108"
}
]
}
]
}
],
"references": [
{
"url": "https://support.pega.com/support-doc/pega-security-advisory-a24-vulnerability-remediation-note",
"source": "security@pega.com"
"source": "security@pega.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.pega.com/support-doc/pega-security-advisory-a24-vulnerability-remediation-note",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-50198",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-05-03T03:16:05.200",
"lastModified": "2024-11-21T08:36:38.610",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-10T16:26:06.647",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -16,6 +16,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
@ -49,24 +71,78 @@
"value": "CWE-78"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dlink:g416_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.09b01",
"matchCriteriaId": "9E44FE7B-CCEF-4118-9A02-810AFD0A22AE"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dlink:g416:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E6E65179-A6A8-4A3A-8422-7171AF05B0CD"
}
]
}
]
}
],
"references": [
{
"url": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10367",
"source": "zdi-disclosures@trendmicro.com"
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Mitigation",
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1814/",
"source": "zdi-disclosures@trendmicro.com"
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10367",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mitigation",
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1814/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-50199",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-05-03T03:16:05.387",
"lastModified": "2024-11-21T08:36:38.737",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-10T16:26:06.647",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -16,6 +16,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
@ -49,24 +71,78 @@
"value": "CWE-306"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-306"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dlink:g416_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.09b01",
"matchCriteriaId": "9E44FE7B-CCEF-4118-9A02-810AFD0A22AE"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dlink:g416:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E6E65179-A6A8-4A3A-8422-7171AF05B0CD"
}
]
}
]
}
],
"references": [
{
"url": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10367",
"source": "zdi-disclosures@trendmicro.com"
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Mitigation",
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1815/",
"source": "zdi-disclosures@trendmicro.com"
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10367",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mitigation",
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1815/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-50200",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-05-03T03:16:05.593",
"lastModified": "2024-11-21T08:36:38.860",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-10T16:26:06.647",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -16,6 +16,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
@ -49,24 +71,78 @@
"value": "CWE-78"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dlink:g416_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.09b01",
"matchCriteriaId": "9E44FE7B-CCEF-4118-9A02-810AFD0A22AE"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dlink:g416:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E6E65179-A6A8-4A3A-8422-7171AF05B0CD"
}
]
}
]
}
],
"references": [
{
"url": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10367",
"source": "zdi-disclosures@trendmicro.com"
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Mitigation",
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1816/",
"source": "zdi-disclosures@trendmicro.com"
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10367",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mitigation",
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1816/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-50201",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-05-03T03:16:05.770",
"lastModified": "2024-11-21T08:36:38.980",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-10T16:26:06.647",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -16,6 +16,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
@ -49,24 +71,78 @@
"value": "CWE-78"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dlink:g416_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.09b01",
"matchCriteriaId": "9E44FE7B-CCEF-4118-9A02-810AFD0A22AE"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dlink:g416:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E6E65179-A6A8-4A3A-8422-7171AF05B0CD"
}
]
}
]
}
],
"references": [
{
"url": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10367",
"source": "zdi-disclosures@trendmicro.com"
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Mitigation",
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1817/",
"source": "zdi-disclosures@trendmicro.com"
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10367",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mitigation",
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1817/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-50202",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-05-03T03:16:05.950",
"lastModified": "2024-11-21T08:36:39.103",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-10T16:26:06.647",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -16,6 +16,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
@ -49,24 +71,78 @@
"value": "CWE-78"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dlink:g416_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.09b01",
"matchCriteriaId": "9E44FE7B-CCEF-4118-9A02-810AFD0A22AE"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dlink:g416:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E6E65179-A6A8-4A3A-8422-7171AF05B0CD"
}
]
}
]
}
],
"references": [
{
"url": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10367",
"source": "zdi-disclosures@trendmicro.com"
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Mitigation",
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1818/",
"source": "zdi-disclosures@trendmicro.com"
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10367",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mitigation",
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1818/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-50203",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-05-03T03:16:06.127",
"lastModified": "2024-11-21T08:36:39.233",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-10T16:26:06.647",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -16,6 +16,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
@ -49,24 +71,78 @@
"value": "CWE-78"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dlink:g416_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.09b01",
"matchCriteriaId": "9E44FE7B-CCEF-4118-9A02-810AFD0A22AE"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dlink:g416:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E6E65179-A6A8-4A3A-8422-7171AF05B0CD"
}
]
}
]
}
],
"references": [
{
"url": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10367",
"source": "zdi-disclosures@trendmicro.com"
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Mitigation",
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1819/",
"source": "zdi-disclosures@trendmicro.com"
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10367",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mitigation",
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1819/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-50204",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-05-03T03:16:06.327",
"lastModified": "2024-11-21T08:36:39.353",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-10T16:26:06.647",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -16,6 +16,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
@ -49,24 +71,78 @@
"value": "CWE-78"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dlink:g416_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.09b01",
"matchCriteriaId": "9E44FE7B-CCEF-4118-9A02-810AFD0A22AE"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dlink:g416:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E6E65179-A6A8-4A3A-8422-7171AF05B0CD"
}
]
}
]
}
],
"references": [
{
"url": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10367",
"source": "zdi-disclosures@trendmicro.com"
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Mitigation",
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1820/",
"source": "zdi-disclosures@trendmicro.com"
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10367",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mitigation",
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1820/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-50205",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-05-03T03:16:06.500",
"lastModified": "2024-11-21T08:36:39.487",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-10T16:26:06.647",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -16,6 +16,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
@ -49,24 +71,78 @@
"value": "CWE-78"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dlink:g416_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.09b01",
"matchCriteriaId": "9E44FE7B-CCEF-4118-9A02-810AFD0A22AE"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dlink:g416:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E6E65179-A6A8-4A3A-8422-7171AF05B0CD"
}
]
}
]
}
],
"references": [
{
"url": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10367",
"source": "zdi-disclosures@trendmicro.com"
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Mitigation",
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1821/",
"source": "zdi-disclosures@trendmicro.com"
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10367",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mitigation",
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1821/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-50206",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-05-03T03:16:06.687",
"lastModified": "2024-11-21T08:36:39.617",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-10T16:26:06.647",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -16,6 +16,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
@ -49,24 +71,78 @@
"value": "CWE-78"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dlink:g416_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.09b01",
"matchCriteriaId": "9E44FE7B-CCEF-4118-9A02-810AFD0A22AE"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dlink:g416:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E6E65179-A6A8-4A3A-8422-7171AF05B0CD"
}
]
}
]
}
],
"references": [
{
"url": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10367",
"source": "zdi-disclosures@trendmicro.com"
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Mitigation",
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1822/",
"source": "zdi-disclosures@trendmicro.com"
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10367",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mitigation",
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1822/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-50207",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-05-03T03:16:06.860",
"lastModified": "2024-11-21T08:36:39.740",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-10T16:26:06.647",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -16,6 +16,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
@ -49,24 +71,78 @@
"value": "CWE-78"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dlink:g416_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.09b01",
"matchCriteriaId": "9E44FE7B-CCEF-4118-9A02-810AFD0A22AE"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dlink:g416:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E6E65179-A6A8-4A3A-8422-7171AF05B0CD"
}
]
}
]
}
],
"references": [
{
"url": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10367",
"source": "zdi-disclosures@trendmicro.com"
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Mitigation",
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1823/",
"source": "zdi-disclosures@trendmicro.com"
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10367",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mitigation",
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1823/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-50208",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-05-03T03:16:07.030",
"lastModified": "2024-11-21T08:36:39.863",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-10T16:26:06.647",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -16,6 +16,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
@ -49,24 +71,78 @@
"value": "CWE-121"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dlink:g416_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.09b01",
"matchCriteriaId": "9E44FE7B-CCEF-4118-9A02-810AFD0A22AE"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dlink:g416:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E6E65179-A6A8-4A3A-8422-7171AF05B0CD"
}
]
}
]
}
],
"references": [
{
"url": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10367",
"source": "zdi-disclosures@trendmicro.com"
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Mitigation",
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1824/",
"source": "zdi-disclosures@trendmicro.com"
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10367",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mitigation",
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1824/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-50209",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-05-03T03:16:07.407",
"lastModified": "2024-11-21T08:36:39.980",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-10T16:26:06.647",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -16,6 +16,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
@ -49,24 +71,78 @@
"value": "CWE-121"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dlink:g416_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.09b01",
"matchCriteriaId": "9E44FE7B-CCEF-4118-9A02-810AFD0A22AE"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dlink:g416:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E6E65179-A6A8-4A3A-8422-7171AF05B0CD"
}
]
}
]
}
],
"references": [
{
"url": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10367",
"source": "zdi-disclosures@trendmicro.com"
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Mitigation",
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1825/",
"source": "zdi-disclosures@trendmicro.com"
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10367",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mitigation",
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1825/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-50210",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-05-03T03:16:07.837",
"lastModified": "2024-11-21T08:36:40.110",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-10T16:26:06.647",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -16,6 +16,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
@ -49,24 +71,78 @@
"value": "CWE-121"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dlink:g416_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.09b01",
"matchCriteriaId": "9E44FE7B-CCEF-4118-9A02-810AFD0A22AE"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dlink:g416:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E6E65179-A6A8-4A3A-8422-7171AF05B0CD"
}
]
}
]
}
],
"references": [
{
"url": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10367",
"source": "zdi-disclosures@trendmicro.com"
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Mitigation",
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1826/",
"source": "zdi-disclosures@trendmicro.com"
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10367",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mitigation",
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1826/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-50211",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-05-03T03:16:08.303",
"lastModified": "2024-11-21T08:36:40.230",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-10T16:26:06.647",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -16,6 +16,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
@ -49,24 +71,78 @@
"value": "CWE-121"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dlink:g416_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.09b01",
"matchCriteriaId": "9E44FE7B-CCEF-4118-9A02-810AFD0A22AE"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dlink:g416:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E6E65179-A6A8-4A3A-8422-7171AF05B0CD"
}
]
}
]
}
],
"references": [
{
"url": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10367",
"source": "zdi-disclosures@trendmicro.com"
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Mitigation",
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1827/",
"source": "zdi-disclosures@trendmicro.com"
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10367",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mitigation",
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1827/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-50212",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-05-03T03:16:08.620",
"lastModified": "2024-11-21T08:36:40.353",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-10T16:26:06.647",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
@ -16,6 +16,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
],
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
@ -49,24 +71,78 @@
"value": "CWE-755"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-755"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dlink:g416_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.09b01",
"matchCriteriaId": "9E44FE7B-CCEF-4118-9A02-810AFD0A22AE"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dlink:g416:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E6E65179-A6A8-4A3A-8422-7171AF05B0CD"
}
]
}
]
}
],
"references": [
{
"url": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10367",
"source": "zdi-disclosures@trendmicro.com"
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Mitigation",
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1828/",
"source": "zdi-disclosures@trendmicro.com"
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10367",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mitigation",
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1828/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-50213",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-05-03T03:16:08.830",
"lastModified": "2024-11-21T08:36:40.470",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-10T16:26:06.647",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -16,6 +16,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
@ -49,24 +71,78 @@
"value": "CWE-78"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dlink:g416_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.09b01",
"matchCriteriaId": "9E44FE7B-CCEF-4118-9A02-810AFD0A22AE"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dlink:g416:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E6E65179-A6A8-4A3A-8422-7171AF05B0CD"
}
]
}
]
}
],
"references": [
{
"url": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10367",
"source": "zdi-disclosures@trendmicro.com"
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Mitigation",
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1829/",
"source": "zdi-disclosures@trendmicro.com"
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10367",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mitigation",
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1829/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-50214",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-05-03T03:16:09.007",
"lastModified": "2024-11-21T08:36:40.590",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-10T16:26:06.647",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -16,6 +16,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
@ -49,24 +71,78 @@
"value": "CWE-78"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dlink:g416_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.09b01",
"matchCriteriaId": "9E44FE7B-CCEF-4118-9A02-810AFD0A22AE"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dlink:g416:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E6E65179-A6A8-4A3A-8422-7171AF05B0CD"
}
]
}
]
}
],
"references": [
{
"url": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10367",
"source": "zdi-disclosures@trendmicro.com"
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Mitigation",
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1830/",
"source": "zdi-disclosures@trendmicro.com"
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10367",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mitigation",
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1830/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-50215",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-05-03T03:16:09.180",
"lastModified": "2024-11-21T08:36:40.720",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-10T16:26:06.647",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -16,6 +16,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
@ -49,24 +71,78 @@
"value": "CWE-78"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dlink:g416_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.09b01",
"matchCriteriaId": "9E44FE7B-CCEF-4118-9A02-810AFD0A22AE"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dlink:g416:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E6E65179-A6A8-4A3A-8422-7171AF05B0CD"
}
]
}
]
}
],
"references": [
{
"url": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10367",
"source": "zdi-disclosures@trendmicro.com"
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Mitigation",
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1831/",
"source": "zdi-disclosures@trendmicro.com"
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10367",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mitigation",
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1831/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-50216",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-05-03T03:16:09.367",
"lastModified": "2024-11-21T08:36:40.840",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-10T16:26:06.647",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -16,6 +16,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
@ -49,24 +71,78 @@
"value": "CWE-78"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dlink:g416_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.09b01",
"matchCriteriaId": "9E44FE7B-CCEF-4118-9A02-810AFD0A22AE"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dlink:g416:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E6E65179-A6A8-4A3A-8422-7171AF05B0CD"
}
]
}
]
}
],
"references": [
{
"url": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10367",
"source": "zdi-disclosures@trendmicro.com"
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Mitigation",
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1832/",
"source": "zdi-disclosures@trendmicro.com"
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10367",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mitigation",
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1832/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-50217",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-05-03T03:16:09.540",
"lastModified": "2024-11-21T08:36:40.980",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-10T16:26:06.647",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -16,6 +16,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
@ -49,24 +71,78 @@
"value": "CWE-78"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dlink:g416_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.09b01",
"matchCriteriaId": "9E44FE7B-CCEF-4118-9A02-810AFD0A22AE"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dlink:g416:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E6E65179-A6A8-4A3A-8422-7171AF05B0CD"
}
]
}
]
}
],
"references": [
{
"url": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10367",
"source": "zdi-disclosures@trendmicro.com"
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Mitigation",
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1833/",
"source": "zdi-disclosures@trendmicro.com"
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10367",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mitigation",
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1833/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-52214",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-03-26T13:15:44.857",
"lastModified": "2024-11-21T08:39:24.690",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-03-10T14:59:09.437",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
@ -51,14 +71,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:voidcoders:void_contact_form_7_widget_for_elementor_page_builder:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "2.4",
"matchCriteriaId": "263DDEA0-209A-4487-9995-A6E9C1F5B1F9"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/cf7-widget-elementor/wordpress-void-contact-form-7-widget-for-elementor-page-builder-plugin-2-3-broken-access-control-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://patchstack.com/database/vulnerability/cf7-widget-elementor/wordpress-void-contact-form-7-widget-for-elementor-page-builder-plugin-2-3-broken-access-control-vulnerability?_s_id=cve",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-52231",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-03-28T07:15:52.120",
"lastModified": "2024-11-21T08:39:26.930",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-03-10T15:50:32.850",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
@ -49,16 +69,50 @@
"value": "CWE-200"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:booster:booster_for_woocommerce:*:*:*:*:plus:wordpress:*:*",
"versionEndExcluding": "7.1.2",
"matchCriteriaId": "29AB23FF-349F-474C-9EBB-C52B6DD8EB2A"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/booster-plus-for-woocommerce/wordpress-booster-plus-for-woocommerce-plugin-7-1-2-authenticated-arbitrary-order-information-disclosure-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://patchstack.com/database/vulnerability/booster-plus-for-woocommerce/wordpress-booster-plus-for-woocommerce-plugin-7-1-2-authenticated-arbitrary-order-information-disclosure-vulnerability?_s_id=cve",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-52234",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-03-28T07:15:52.927",
"lastModified": "2024-11-21T08:39:27.303",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-03-10T15:50:32.850",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
@ -49,16 +69,50 @@
"value": "CWE-200"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:booster:booster_for_woocommerce:*:*:*:*:elite:wordpress:*:*",
"versionEndExcluding": "7.1.2",
"matchCriteriaId": "EE0A3A17-2BCC-43E1-A109-45927E7ED56E"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/booster-elite-for-woocommerce/wordpress-booster-elite-for-woocommerce-plugin-7-1-2-authenticated-arbitrary-order-information-disclosure-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://patchstack.com/database/vulnerability/booster-elite-for-woocommerce/wordpress-booster-elite-for-woocommerce-plugin-7-1-2-authenticated-arbitrary-order-information-disclosure-vulnerability?_s_id=cve",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-52609",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-03-18T11:15:07.743",
"lastModified": "2024-11-21T08:40:11.410",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-10T15:10:00.520",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,79 +15,260 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: binder: corrige la ejecuci\u00f3n entre mmput() y do_exit() La tarea A llama a binder_update_page_range() para asignar e insertar p\u00e1ginas en un espacio de direcciones remoto desde la tarea B. Para esto, la tarea A fija el mm remoto a trav\u00e9s de mmget_not_zero() primero. Esto puede competir con la Tarea B do_exit() y la disminuci\u00f3n final del recuento de mmput() provendr\u00e1 de la Tarea A. Tarea A | Tarea B ------------------+------------------ mmget_not_zero() | | hacer_salir() | salida_mm() | mmput() mmput() | salida_mmap() | eliminar_vma() | salida() | En este caso, el trabajo de ____fput() de la Tarea B se pone en cola en la Tarea A como TWA_RESUME. Entonces, en teor\u00eda, la Tarea A regresa al espacio de usuario y se ejecuta el trabajo de limpieza. Sin embargo, la Tarea A duerme, esperando una respuesta de la Tarea B que nunca llega (est\u00e1 muerta). Esto significa que binder_deferred_release() est\u00e1 bloqueado hasta que un evento de carpeta no relacionado obligue a la Tarea A a regresar al espacio de usuario. Todas las notificaciones de defunci\u00f3n asociadas tambi\u00e9n se retrasar\u00e1n hasta entonces. Para solucionar este problema, utilice mmput_async() que programar\u00e1 el trabajo en el mm->async_put_work WQ correspondiente en lugar de la Tarea A."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.0,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-362"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2.6.29",
"versionEndExcluding": "4.19.306",
"matchCriteriaId": "D8EE6C94-F3E4-4963-8B5A-9BE8CD1565DF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.20",
"versionEndExcluding": "5.4.268",
"matchCriteriaId": "991BF737-6083-429B-ACD5-FB27D4143E2F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.5",
"versionEndExcluding": "5.10.209",
"matchCriteriaId": "74979A03-4B10-4815-AE3E-C8C0D2FDAA39"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11",
"versionEndExcluding": "5.15.148",
"matchCriteriaId": "2ED0CDB9-61B0-408E-B2A8-5199107F7868"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "6.1.75",
"matchCriteriaId": "070D0ED3-90D0-4F95-B1FF-57D7F46F332D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.2",
"versionEndExcluding": "6.6.14",
"matchCriteriaId": "5C6B50A6-3D8B-4CE2-BDCC-A098609CBA14"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7",
"versionEndExcluding": "6.7.2",
"matchCriteriaId": "7229C448-E0C9-488B-8939-36BA5254065E"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/252a2a5569eb9f8d16428872cc24dea1ac0bb097",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Mailing List",
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/6696f76c32ff67fec26823fc2df46498e70d9bf3",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Mailing List",
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/67f16bf2cc1698fd50e01ee8a2becc5a8e6d3a3e",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Mailing List",
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/77d210e8db4d61d43b2d16df66b1ec46fad2ee01",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Mailing List",
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/7e7a0d86542b0ea903006d3f42f33c4f7ead6918",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Mailing List",
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/95b1d336b0642198b56836b89908d07b9a0c9608",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Mailing List",
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/98fee5bee97ad47b527a997d5786410430d1f0e9",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Mailing List",
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/9a9ab0d963621d9d12199df9817e66982582d5a5",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Mailing List",
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/252a2a5569eb9f8d16428872cc24dea1ac0bb097",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/6696f76c32ff67fec26823fc2df46498e70d9bf3",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/67f16bf2cc1698fd50e01ee8a2becc5a8e6d3a3e",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/77d210e8db4d61d43b2d16df66b1ec46fad2ee01",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/7e7a0d86542b0ea903006d3f42f33c4f7ead6918",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/95b1d336b0642198b56836b89908d07b9a0c9608",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/98fee5bee97ad47b527a997d5786410430d1f0e9",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/9a9ab0d963621d9d12199df9817e66982582d5a5",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Patch"
]
},
{
"url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00016.html",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List"
]
},
{
"url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-52611",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-03-18T11:15:08.157",
"lastModified": "2024-11-21T08:40:11.703",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-10T15:41:09.180",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,31 +15,116 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: wifi: rtw88: sdio: respeta el host max_req_size en la ruta RX. Lukas informa errores skb_over_panic en su Banana Pi BPI-CM4 que viene con un SoC Amlogic A311D (G12B) y un RTL8822CS. Tarjeta combinada SDIO wifi/Bluetooth. El error que observ\u00f3 es id\u00e9ntico a lo que se solucion\u00f3 en el commit e967229ead0e (\"wifi: rtw88: sdio: verifique el bit HISR RX_REQUEST en rtw_sdio_rx_isr()\") pero esa confirmaci\u00f3n no solucion\u00f3 el problema de Lukas. Lukas descubri\u00f3 que deshabilitar o limitar la agregaci\u00f3n de RX soluciona el problema durante alg\u00fan tiempo (pero no lo soluciona por completo). En la siguiente discusi\u00f3n se discutieron algunos temas clave que tienen un impacto en este problema: - El SoC Amlogic A311D (G12B) tiene un error de hardware en el controlador SDIO que impide las transferencias DMA. En lugar de ello, todas las transferencias deben pasar por el controlador SRAM, que limita las transferencias a 1536 bytes. Los chips rtw88 no dividen los paquetes entrantes (RX), por lo que si se recibe un paquete grande, este se reenv\u00eda al host en su forma original. Los chips rtw88 pueden realice la agregaci\u00f3n RX, lo que significa que el host puede extraer m\u00e1s paquetes entrantes de la tarjeta con una transferencia MMC/SDIO. Esto depende de la configuraci\u00f3n en el registro REG_RXDMA_AGG_PG_TH (BIT_RXDMA_AGG_PG_TH limita la cantidad de paquetes que se agregar\u00e1n, BIT_DMA_AGG_TO_V1 configura un tiempo de espera para la agregaci\u00f3n y BIT_EN_PRE_CALC hace que el chip respete los l\u00edmites de manera m\u00e1s efectiva) Use m\u00faltiples lecturas consecutivas en rtw_sdio_read_port() y limite la cantidad de bytes que el host copia desde la tarjeta en una transferencia MMC/SDIO. Esto permite recibir un b\u00fafer que es mayor que el max_req_size del host (n\u00famero de bytes que se pueden transferir en una transferencia MMC/SDIO). Como resultado de esto, el error skb_over_panic desapareci\u00f3 ya que el controlador rtw88 ahora puede recibir m\u00e1s de 1536 bytes de la tarjeta (ya sea porque el paquete entrante es m\u00e1s grande o porque se han agregado varios paquetes). En caso de errores de recepci\u00f3n (Lukas ha observado -EILSEQ), debemos drenar los datos restantes del b\u00fafer de la tarjeta; de lo contrario, la tarjeta devolver\u00e1 datos corruptos para la siguiente llamada a rtw_sdio_read_port()."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.4",
"versionEndExcluding": "6.6.14",
"matchCriteriaId": "A9E74EDC-6520-4AF7-BF2E-2259A9C10A79"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7",
"versionEndExcluding": "6.7.2",
"matchCriteriaId": "7229C448-E0C9-488B-8939-36BA5254065E"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/00384f565a91c08c4bedae167f749b093d10e3fe",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Mailing List",
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/0e9ffff72a0674cd6656314dbd99cdd2123a3030",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Mailing List",
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/5b5ddf21b978ec315cab9d9e7e6ac7374791a8c7",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Mailing List",
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/00384f565a91c08c4bedae167f749b093d10e3fe",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/0e9ffff72a0674cd6656314dbd99cdd2123a3030",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/5b5ddf21b978ec315cab9d9e7e6ac7374791a8c7",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-52616",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-03-18T11:15:08.967",
"lastModified": "2024-11-21T08:40:12.420",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-10T15:41:09.180",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,59 +15,207 @@
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: crypto: lib/mpi: corrige el acceso inesperado al puntero en mpi_ec_init Cuando se inicializa la estructura mpi_ec_ctx, algunos campos no se borran, lo que provoca un bloqueo al hacer referencia al campo cuando se lanz\u00f3 la estructura. Inicialmente, este problema se ignor\u00f3 porque la memoria para mpi_ec_ctx se asigna con el indicador __GFP_ZERO. Por ejemplo, este error se activar\u00e1 al calcular el valor Za para SM2 por separado."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.10",
"versionEndExcluding": "5.10.210",
"matchCriteriaId": "2D2F0709-60B3-49A5-80BB-D9815B21843F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11",
"versionEndExcluding": "5.15.149",
"matchCriteriaId": "0D0465BB-4053-4E15-9137-6696EBAE90FD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "6.1.79",
"matchCriteriaId": "656E2F29-1779-4EFC-AA64-8F984E2885B1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.2",
"versionEndExcluding": "6.6.15",
"matchCriteriaId": "87C718CB-AE3D-4B07-B4D9-BFF64183C468"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7",
"versionEndExcluding": "6.7.3",
"matchCriteriaId": "58FD5308-148A-40D3-B36A-0CA6B434A8BF"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/0c3687822259a7628c85cd21a3445cbe3c367165",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Mailing List",
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/2bb86817b33c9d704e127f92b838035a72c315b6",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Mailing List",
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/7abdfd45a650c714d5ebab564bb1b988f14d9b49",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Mailing List",
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/7ebf812b7019fd2d4d5a7ca45ef4bf3a6f4bda0a",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Mailing List",
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/ba3c5574203034781ac4231acf117da917efcd2a",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Mailing List",
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/bb44477d4506e52785693a39f03cdc6a2c5e8598",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Mailing List",
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/0c3687822259a7628c85cd21a3445cbe3c367165",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/2bb86817b33c9d704e127f92b838035a72c315b6",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/7abdfd45a650c714d5ebab564bb1b988f14d9b49",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/7ebf812b7019fd2d4d5a7ca45ef4bf3a6f4bda0a",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/ba3c5574203034781ac4231acf117da917efcd2a",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/bb44477d4506e52785693a39f03cdc6a2c5e8598",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Patch"
]
},
{
"url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-11638",
"sourceIdentifier": "contact@wpscan.com",
"published": "2025-03-10T06:15:20.797",
"lastModified": "2025-03-10T06:15:20.797",
"vulnStatus": "Received",
"lastModified": "2025-03-10T15:15:36.803",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
@ -11,7 +11,30 @@
"value": "The Gtbabel WordPress plugin before 6.6.9 does not ensure that the URL to perform code analysis upon belongs to the blog which could allow unauthenticated attackers to retrieve a logged in user (such as admin) cookies by making them open a crafted URL as the request made to analysed the URL contains such cookies."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"references": [
{
"url": "https://wpscan.com/vulnerability/2f20336f-e12e-4b09-bcaf-45f7249f6495/",

View File

@ -0,0 +1,71 @@
{
"id": "CVE-2024-12604",
"sourceIdentifier": "iletisim@usom.gov.tr",
"published": "2025-03-10T15:15:36.947",
"lastModified": "2025-03-10T15:15:36.947",
"vulnStatus": "Awaiting Analysis",
"cveTags": [
{
"sourceIdentifier": "iletisim@usom.gov.tr",
"tags": [
"exclusively-hosted-service"
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Cleartext Storage of Sensitive Information in an Environment Variable, Weak Password Recovery Mechanism for Forgotten Password vulnerability in Tapandsign Technologies Tap&Sign App allows Password Recovery Exploitation, Functionality Misuse.This issue affects Tap&Sign App: before V.1.025."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "iletisim@usom.gov.tr",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
}
]
},
"weaknesses": [
{
"source": "iletisim@usom.gov.tr",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-526"
},
{
"lang": "en",
"value": "CWE-640"
}
]
}
],
"references": [
{
"url": "https://docs.tapandsign.com/tap-and-sign/tap-and-sign-v.1.025-surum-notlari",
"source": "iletisim@usom.gov.tr"
},
{
"url": "https://www.usom.gov.tr/bildirim/tr-25-0063",
"source": "iletisim@usom.gov.tr"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-26634",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-03-18T11:15:10.053",
"lastModified": "2024-11-21T09:02:44.020",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-10T15:41:09.180",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,39 +15,144 @@
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: net: corrige la eliminaci\u00f3n de un espacio de nombres con nombres alternativos en conflicto. Mark informa un ERROR() cuando se elimina un espacio de nombres de red. \u00a1ERROR del kernel en net/core/dev.c:11520! Las interfaces f\u00edsicas movidas fuera de init_net se \"reembolsan\" a init_net cuando ese espacio de nombres desaparece. El nombre de la interfaz principal puede sobrescribirse en el proceso si hubiera entrado en conflicto. Tambi\u00e9n debemos descartar todos los nombres alternativos en conflicto. Las correcciones recientes abordaron garantizar que los nombres alternativos se movieran con la interfaz principal, lo que provoc\u00f3 este problema."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.1.60",
"versionEndExcluding": "6.1.76",
"matchCriteriaId": "669EF392-199C-46A8-997D-C976351952E0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.6",
"versionEndExcluding": "6.6.15",
"matchCriteriaId": "EB070897-9C4B-4820-AE94-31318C9F5D76"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7",
"versionEndExcluding": "6.7.3",
"matchCriteriaId": "58FD5308-148A-40D3-B36A-0CA6B434A8BF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*",
"matchCriteriaId": "B9F4EA73-0894-400F-A490-3A397AB7A517"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/8072699aa9e67d1727692cfb3c347263bb627fb9",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Mailing List",
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/a2232f29bf52c24f827865b3c90829c44b6c695b",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Mailing List",
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/d09486a04f5da0a812c26217213b89a3b1acf836",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Mailing List",
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/e855dded4b70d1975ee7b9fed0c700391e3c8ea6",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Mailing List",
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/8072699aa9e67d1727692cfb3c347263bb627fb9",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/a2232f29bf52c24f827865b3c90829c44b6c695b",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/d09486a04f5da0a812c26217213b89a3b1acf836",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/e855dded4b70d1975ee7b9fed0c700391e3c8ea6",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-26641",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-03-18T11:15:11.193",
"lastModified": "2024-11-21T09:02:44.853",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-10T16:58:35.783",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,63 +15,514 @@
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: ip6_tunnel: aseg\u00farese de extraer el encabezado interno en __ip6_tnl_rcv(). El syzbot encontr\u00f3 que __ip6_tnl_rcv() pod\u00eda acceder a datos unificados [1]. Llame a pskb_inet_may_pull() para solucionar este problema e inicialice la variable ipv6h despu\u00e9s de esta llamada, ya que puede cambiar skb->head. [1] ERROR: KMSAN: valor uninit en __INET_ECN_decapsulate include/net/inet_ecn.h:253 [en l\u00ednea] ERROR: KMSAN: valor uninit en INET_ECN_decapsulate include/net/inet_ecn.h:275 [en l\u00ednea] ERROR: KMSAN: uninit -valor en IP6_ECN_decapsulate+0x7df/0x1e50 include/net/inet_ecn.h:321 __INET_ECN_decapsulate include/net/inet_ecn.h:253 [en l\u00ednea] INET_ECN_decapsulate include/net/inet_ecn.h:275 [en l\u00ednea] IP6_ECN_decapsulate+0x7df/0x1e50 include/ net/inet_ecn.h:321 ip6ip6_dscp_ecn_decapsulate+0x178/0x1b0 net/ipv6/ip6_tunnel.c:727 __ip6_tnl_rcv+0xd4e/0x1590 net/ipv6/ip6_tunnel.c:845 ip6_tnl_rcv+0xce/0x100 net/ipv 6/ip6_tunnel.c:888 gre_rcv +0x143f/0x1870 ip6_protocol_deliver_rcu+0xda6/0x2a60 net/ipv6/ip6_input.c:438 ip6_input_finish net/ipv6/ip6_input.c:483 [en l\u00ednea] NF_HOOK include/linux/netfilter.h:314 [en l\u00ednea] ip6_input+0x15d/0x 430 netos /ipv6/ip6_input.c:492 ip6_mc_input+0xa7e/0xc80 net/ipv6/ip6_input.c:586 dst_input include/net/dst.h:461 [en l\u00ednea] ip6_rcv_finish+0x5db/0x870 net/ipv6/ip6_input.c:79 NF_HOOK include/linux/netfilter.h:314 [en l\u00ednea] ipv6_rcv+0xda/0x390 net/ipv6/ip6_input.c:310 __netif_receive_skb_one_core net/core/dev.c:5532 [en l\u00ednea] __netif_receive_skb+0x1a6/0x5a0 net/core/dev. c:5646 netif_receive_skb_internal net/core/dev.c:5732 [en l\u00ednea] netif_receive_skb+0x58/0x660 net/core/dev.c:5791 tun_rx_batched+0x3ee/0x980 drivers/net/tun.c:1555 tun_get_user+0x53af/0x66d0 drivers /net/tun.c:2002 tun_chr_write_iter+0x3af/0x5d0 drivers/net/tun.c:2048 call_write_iter include/linux/fs.h:2084 [en l\u00ednea] new_sync_write fs/read_write.c:497 [en l\u00ednea] vfs_write+0x786/ 0x1200 fs/read_write.c:590 ksys_write+0x20f/0x4c0 fs/read_write.c:643 __do_sys_write fs/read_write.c:655 [en l\u00ednea] __se_sys_write fs/read_write.c:652 [en l\u00ednea] __x64_sys_write+0x93/0xd0 fs/read _escribir .c:652 do_syscall_x64 arch/x86/entry/common.c:52 [en l\u00ednea] do_syscall_64+0x6d/0x140 arch/x86/entry/common.c:83 Entry_SYSCALL_64_after_hwframe+0x63/0x6b Uninit se cre\u00f3 en: slab_post_alloc_hook+0x129/0xa 70 mm/slab.h:768 slab_alloc_node mm/slub.c:3478 [en l\u00ednea] kmem_cache_alloc_node+0x5e9/0xb10 mm/slub.c:3523 kmalloc_reserve+0x13d/0x4a0 net/core/skbuff.c:560 __alloc_skb+0x318/0x740 net /core/skbuff.c:651 alloc_skb include/linux/skbuff.h:1286 [en l\u00ednea] alloc_skb_with_frags+0xc8/0xbd0 net/core/skbuff.c:6334 sock_alloc_send_pskb+0xa80/0xbf0 net/core/sock.c:2787 tun_alloc_skb drivers/net/tun.c:1531 [en l\u00ednea] tun_get_user+0x1e8a/0x66d0 drivers/net/tun.c:1846 tun_chr_write_iter+0x3af/0x5d0 drivers/net/tun.c:2048 call_write_iter include/linux/fs.h:2084 [en l\u00ednea] new_sync_write fs/read_write.c:497 [en l\u00ednea] vfs_write+0x786/0x1200 fs/read_write.c:590 ksys_write+0x20f/0x4c0 fs/read_write.c:643 __do_sys_write fs/read_write.c:655 [en l\u00ednea] __se_sys_write fs/read_write.c:652 [en l\u00ednea] __x64_sys_write+0x93/0xd0 fs/read_write.c:652 do_syscall_x64 arch/x86/entry/common.c:52 [en l\u00ednea] do_syscall_64+0x6d/0x140 arch/x86/entry/common. c:83 Entry_SYSCALL_64_after_hwframe+0x63/0x6b CPU: 0 PID: 5034 Comm: syz-executor331 No contaminado 6.7.0-syzkaller-00562-g9f8413c4a66f #0 Nombre del hardware: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/ 2023"
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-908"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.7",
"versionEndExcluding": "5.10.210",
"matchCriteriaId": "EA72E37E-0124-4468-B383-C248577636B8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11",
"versionEndExcluding": "5.15.149",
"matchCriteriaId": "0D0465BB-4053-4E15-9137-6696EBAE90FD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "6.1.77",
"matchCriteriaId": "0FA28946-970D-4F4D-B759-4E77B28809B5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.2",
"versionEndExcluding": "6.6.16",
"matchCriteriaId": "A5007D6A-4B58-423A-8A3A-A1A656A263C8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7",
"versionEndExcluding": "6.7.4",
"matchCriteriaId": "848BC44C-9D25-4557-A50A-4B8BF310FA78"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*",
"matchCriteriaId": "B9F4EA73-0894-400F-A490-3A397AB7A517"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:*",
"matchCriteriaId": "056BD938-0A27-4569-B391-30578B309EE3"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*",
"matchCriteriaId": "3A756737-1CC4-42C2-A4DF-E1C893B4E2D5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E7CF3019-975D-40BB-A8A4-894E62BD3797"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:netapp:a800_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B36CECA5-4545-49C2-92EB-B739407B207F"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:netapp:a800:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5FE69B5A-CFC0-470E-9846-7D8086814986"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:netapp:c800_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B5AE3364-DB2D-4543-B1E2-175BF8BEBEE7"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:netapp:c800:*:*:*:*:*:*:*:*",
"matchCriteriaId": "11E837C7-F91E-4486-B0FD-3222E69AB17D"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:netapp:a900_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "93B9B933-7D69-4B33-8983-C1CEC000B38B"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:netapp:a900:*:*:*:*:*:*:*:*",
"matchCriteriaId": "048F04A2-5630-453A-A855-E9314B2BAB62"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:netapp:a9500_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DEAA16D1-1E27-4128-BA14-5A0C59340EAA"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:netapp:a9500:*:*:*:*:*:*:*:*",
"matchCriteriaId": "002F31D0-96E3-495F-8F86-7C9190F20248"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:netapp:c190_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "75A43965-CB2E-4C28-AFC3-1ADE7A6B845C"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:netapp:c190:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8D3202DD-7616-4C9E-AFA1-61A1311F6C42"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:netapp:a150_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "775078AE-16E0-4AF6-9022-372FC2852107"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:netapp:a150:*:*:*:*:*:*:*:*",
"matchCriteriaId": "23BA50E9-44A7-4443-AAE7-59911BB24EFE"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:netapp:a220_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4F2D2745-242C-4603-899E-70C9025BDDD2"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:netapp:a220:*:*:*:*:*:*:*:*",
"matchCriteriaId": "92AFCF5D-1291-4E75-A12B-B95BBDAC3440"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:netapp:fas2720_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B7FD1DA9-7980-4643-B378-7095892DA176"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:netapp:fas2720:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9C227886-9186-49C3-A2B1-A0C1D5E5705A"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:netapp:fas2750_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AD661062-0D5B-4671-9D92-FEF8D7395C1E"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:netapp:fas2750:*:*:*:*:*:*:*:*",
"matchCriteriaId": "50B5C295-3711-4002-9D6D-72B6A237F650"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:netapp:fas2820_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F997DB9A-AF66-4CE1-B33B-A04493ECBA19"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:netapp:fas2820:*:*:*:*:*:*:*:*",
"matchCriteriaId": "22D33DD7-EB3F-4B85-B9F8-1D744112C9E0"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/350a6640fac4b53564ec20aa3f4a0922cb0ba5e6",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Mailing List",
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/8d975c15c0cd744000ca386247432d57b21f9df0",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Mailing List",
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/a9bc32879a08f23cdb80a48c738017e39aea1080",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Mailing List",
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/af6b5c50d47ab43e5272ad61935d0ed2e264d3f0",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Mailing List",
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/c835df3bcc14858ae9b27315dd7de76370b94f3a",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Mailing List",
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/d54e4da98bbfa8c257bdca94c49652d81d18a4d8",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Mailing List",
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/350a6640fac4b53564ec20aa3f4a0922cb0ba5e6",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/8d975c15c0cd744000ca386247432d57b21f9df0",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/a9bc32879a08f23cdb80a48c738017e39aea1080",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/af6b5c50d47ab43e5272ad61935d0ed2e264d3f0",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/c835df3bcc14858ae9b27315dd7de76370b94f3a",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/d54e4da98bbfa8c257bdca94c49652d81d18a4d8",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Patch"
]
},
{
"url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List"
]
},
{
"url": "https://security.netapp.com/advisory/ntap-20241108-0008/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-28401",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-15T17:15:08.043",
"lastModified": "2024-11-21T09:06:17.097",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-03-10T15:10:00.520",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,23 +15,102 @@
"value": "TOTOLINK X2000R anterior a v1.0.0-B20231213.1013 contiene una vulnerabilidad de Cross-site scripting (XSS) Almacenado en el control de acceso ra\u00edz en la p\u00e1gina inal\u00e1mbrica."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:totolink:x2000r_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.0.0-b20231213.1013",
"matchCriteriaId": "54DF0776-BD74-4FC1-B88E-EDACAA480F3B"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:totolink:x2000r:-:*:*:*:*:*:*:*",
"matchCriteriaId": "299F34FB-4D53-4846-B6F0-4431D61B5154"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/4hsien/CVE-vulns/blob/main/TOTOLINK/X2000R/XSS_1_Root_Access_Control/XSS.md",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://www.totolink.net/home/menu/detail/menu_listtpl/products/id/242/ids/33.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Product"
]
},
{
"url": "https://github.com/4hsien/CVE-vulns/blob/main/TOTOLINK/X2000R/XSS_1_Root_Access_Control/XSS.md",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://www.totolink.net/home/menu/detail/menu_listtpl/products/id/242/ids/33.html",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-28403",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-15T16:15:08.583",
"lastModified": "2024-11-21T09:06:17.480",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-03-10T15:10:00.520",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,23 +15,102 @@
"value": "TOTOLINK X2000R V1.0.0-B20221128.1033 es vulnerable a Cross Site Scripting (XSS) a trav\u00e9s de la p\u00e1gina VPN."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:totolink:x2000r_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.0.0-b20231213.1013",
"matchCriteriaId": "54DF0776-BD74-4FC1-B88E-EDACAA480F3B"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:totolink:x2000r:-:*:*:*:*:*:*:*",
"matchCriteriaId": "299F34FB-4D53-4846-B6F0-4431D61B5154"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/4hsien/CVE-vulns/blob/main/TOTOLINK/X2000R/XSS_5_VPN/XSS.md",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://www.totolink.net/home/menu/detail/menu_listtpl/products/id/242/ids/33.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Product"
]
},
{
"url": "https://github.com/4hsien/CVE-vulns/blob/main/TOTOLINK/X2000R/XSS_5_VPN/XSS.md",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://www.totolink.net/home/menu/detail/menu_listtpl/products/id/242/ids/33.html",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-29112",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-03-19T15:15:08.050",
"lastModified": "2024-11-21T09:07:34.840",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-03-10T14:59:09.437",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.7,
"impactScore": 3.7
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
}
]
},
@ -51,14 +71,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wpmarketingrobot:woocommerce_google_feed_manager:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "2.3.0",
"matchCriteriaId": "A4B296D6-ACDE-4053-941D-36503786C8E4"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/wp-product-feed-manager/wordpress-woocommerce-google-feed-manager-plugin-2-2-0-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://patchstack.com/database/vulnerability/wp-product-feed-manager/wordpress-woocommerce-google-feed-manager-plugin-2-2-0-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-29419",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-20T15:15:07.967",
"lastModified": "2024-11-21T09:08:01.520",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-03-10T14:59:09.437",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,23 +15,102 @@
"value": "Hay una vulnerabilidad de Cross Site Scripting (XSS) en la configuraci\u00f3n inal\u00e1mbrica en la p\u00e1gina de configuraci\u00f3n f\u00e1cil de TOTOLINK X2000R anterior a v1.0.0-B20231213.1013."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:totolink:x2000r_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.0.0-b20231213.1013",
"matchCriteriaId": "54DF0776-BD74-4FC1-B88E-EDACAA480F3B"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:totolink:x2000r:-:*:*:*:*:*:*:*",
"matchCriteriaId": "299F34FB-4D53-4846-B6F0-4431D61B5154"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/4hsien/CVE-vulns/blob/main/TOTOLINK/X2000R/XSS_6_Wireless_settings/XSS.md",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://www.totolink.net/home/menu/detail/menu_listtpl/products/id/242/ids/33.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Product"
]
},
{
"url": "https://github.com/4hsien/CVE-vulns/blob/main/TOTOLINK/X2000R/XSS_6_Wireless_settings/XSS.md",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://www.totolink.net/home/menu/detail/menu_listtpl/products/id/242/ids/33.html",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-29759",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-03-27T14:15:10.993",
"lastModified": "2024-11-21T09:08:16.050",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-03-10T15:50:32.850",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 3.7
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
@ -51,14 +71,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:codepeople:calculated_fields_form:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "1.2.55",
"matchCriteriaId": "CAD776DB-4CD1-4A12-9F2D-3745A49E7BD0"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/calculated-fields-form/wordpress-calculated-fields-form-plugin-1-2-54-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://patchstack.com/database/vulnerability/calculated-fields-form/wordpress-calculated-fields-form-plugin-1-2-54-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-29921",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-03-27T08:15:39.390",
"lastModified": "2024-11-21T09:08:37.447",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-03-10T15:50:32.850",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.7,
"impactScore": 3.7
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
}
]
},
@ -51,14 +71,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:supsystic:photo_gallery:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "1.15.17",
"matchCriteriaId": "FAF37CC5-60EA-46BC-A961-E6FCD54C11F3"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/gallery-by-supsystic/wordpress-photo-gallery-by-supsystic-plugin-1-15-16-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://patchstack.com/database/vulnerability/gallery-by-supsystic/wordpress-photo-gallery-by-supsystic-plugin-1-15-16-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-29925",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-03-27T08:15:40.270",
"lastModified": "2024-11-21T09:08:37.920",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-03-10T15:50:32.850",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.3,
"impactScore": 3.7
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
@ -51,14 +71,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wpwax:post_grid\\,_slider_\\&_carousel_ultimate:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "1.6.7",
"matchCriteriaId": "BA6F290F-954F-4E4D-84CC-B8D1492B3EA1"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/post-grid-carousel-ultimate/wordpress-post-grid-slider-carousel-ultimate-plugin-1-6-6-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://patchstack.com/database/vulnerability/post-grid-carousel-ultimate/wordpress-post-grid-slider-carousel-ultimate-plugin-1-6-6-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-47109",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2025-03-10T16:15:12.703",
"lastModified": "2025-03-10T16:15:12.703",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "IBM Sterling File Gateway 6.0.0.0 through 6.1.2.6 and 6.2.0.0 through 6.2.0.3 UI could disclosure the installation path of the server which could aid in further attacks against the system."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-522"
}
]
}
],
"references": [
{
"url": "https://www.ibm.com/support/pages/node/7185259",
"source": "psirt@us.ibm.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-52905",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2025-03-10T16:15:12.887",
"lastModified": "2025-03-10T16:15:12.887",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "IBM Sterling B2B Integrator Standard Edition 6.0.0.0 through 6.1.2.6 and 6.2.0.0 through 6.2.0.3 could disclose sensitive database information to a privileged user."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N",
"baseScore": 2.7,
"baseSeverity": "LOW",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.2,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-497"
}
]
}
],
"references": [
{
"url": "https://www.ibm.com/support/pages/node/7185264",
"source": "psirt@us.ibm.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-5295",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-05-23T22:15:15.420",
"lastModified": "2024-11-21T09:47:22.707",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-10T16:26:06.647",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -16,6 +16,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
@ -49,16 +71,62 @@
"value": "CWE-78"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dlink:g416_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.09b01",
"matchCriteriaId": "9E44FE7B-CCEF-4118-9A02-810AFD0A22AE"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dlink:g416:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E6E65179-A6A8-4A3A-8422-7171AF05B0CD"
}
]
}
]
}
],
"references": [
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-446/",
"source": "zdi-disclosures@trendmicro.com"
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-446/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2025-0624",
"sourceIdentifier": "secalert@redhat.com",
"published": "2025-02-19T19:15:15.120",
"lastModified": "2025-02-19T19:15:15.120",
"lastModified": "2025-03-10T16:15:13.110",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -52,6 +52,10 @@
}
],
"references": [
{
"url": "https://access.redhat.com/errata/RHSA-2025:2521",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2025-0624",
"source": "secalert@redhat.com"

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-2112",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-03-08T22:15:36.443",
"lastModified": "2025-03-08T22:15:36.443",
"vulnStatus": "Received",
"lastModified": "2025-03-10T16:15:13.817",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
@ -59,7 +59,7 @@
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
@ -107,7 +107,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -136,6 +136,10 @@
{
"url": "https://vuldb.com/?submit.506085",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/xiaolian-11/code_demo/blob/main/yaoqishan-sql.md",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-2113",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-03-09T03:15:34.137",
"lastModified": "2025-03-09T03:15:34.137",
"vulnStatus": "Received",
"lastModified": "2025-03-10T16:15:13.950",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
@ -59,7 +59,7 @@
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
@ -107,7 +107,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -136,6 +136,10 @@
{
"url": "https://vuldb.com/?submit.506341",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.506341",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-2115",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-03-09T06:15:11.933",
"lastModified": "2025-03-09T06:15:11.933",
"vulnStatus": "Received",
"lastModified": "2025-03-10T16:15:14.147",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
@ -59,7 +59,7 @@
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
@ -107,7 +107,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -136,6 +136,10 @@
{
"url": "https://vuldb.com/?submit.506655",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/heiheixz/report/blob/main/sk_1.md",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-2120",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-03-09T11:15:35.023",
"lastModified": "2025-03-09T11:15:35.023",
"vulnStatus": "Received",
"lastModified": "2025-03-10T16:15:14.347",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
@ -59,7 +59,7 @@
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
@ -107,7 +107,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -136,6 +136,10 @@
{
"url": "https://vuldb.com/?submit.507327",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/geo-chen/Thinkware-Dashcam",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-2121",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-03-09T11:15:36.647",
"lastModified": "2025-03-09T11:15:36.647",
"vulnStatus": "Received",
"lastModified": "2025-03-10T16:15:14.483",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
@ -59,7 +59,7 @@
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
@ -107,7 +107,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -136,6 +136,10 @@
{
"url": "https://vuldb.com/?submit.507328",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/geo-chen/Thinkware-Dashcam",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-2122",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-03-09T14:15:15.430",
"lastModified": "2025-03-09T14:15:15.430",
"vulnStatus": "Received",
"lastModified": "2025-03-10T16:15:14.617",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
@ -59,7 +59,7 @@
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
@ -107,7 +107,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -128,6 +128,10 @@
{
"url": "https://vuldb.com/?id.299035",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/geo-chen/Thinkware-Dashcam",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-2123",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-03-09T15:15:36.413",
"lastModified": "2025-03-09T15:15:36.413",
"vulnStatus": "Received",
"lastModified": "2025-03-10T16:15:14.740",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
@ -59,7 +59,7 @@
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
@ -107,7 +107,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -140,6 +140,14 @@
{
"url": "https://vuldb.com/?submit.507418",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/GeSHi/geshi-1.0/issues/159",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
},
{
"url": "https://github.com/GeSHi/geshi-1.0/issues/159#issue-2880408694",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2025-25382",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-03-10T16:15:13.393",
"lastModified": "2025-03-10T16:15:13.393",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue in the Property Tax Payment Portal in Information Kerala Mission SANCHAYA v3.0.4 allows attackers to arbitrarily modify payment amounts via a crafted request."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/edwin-0990/CVE_ID/blob/main/CVE-2025-25382/README.md",
"source": "cve@mitre.org"
},
{
"url": "https://tax.lsgkerala.gov.in/epayment/QuickPaySearch.php",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2025-25614",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-03-10T15:15:37.330",
"lastModified": "2025-03-10T15:15:37.330",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Incorrect Access Control in Unifiedtransform 2.0 leads to Privilege Escalation, which allows teachers to update the personal data of fellow teachers."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/armaansidana2003/CVE-2025-25614",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/changeweb/Unifiedtransform",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2025-25620",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-03-10T15:15:37.490",
"lastModified": "2025-03-10T15:15:37.490",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Unifiedtransform 2.0 is vulnerable to Cross Site Scripting (XSS) in the Create assignment function."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/armaansidana2003/CVE-2025-25620",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/changeweb/Unifiedtransform",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2025-25940",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-03-10T16:15:13.520",
"lastModified": "2025-03-10T16:15:13.520",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "VisiCut 2.1 allows code execution via Insecure XML Deserialization in the loadPlfFile method of VisicutModel.java."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/t-oster/VisiCut",
"source": "cve@mitre.org"
},
{
"url": "https://royblume.github.io/CVE-2025-25940/",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2025-25977",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-03-10T16:15:13.633",
"lastModified": "2025-03-10T16:15:13.633",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue in canvg v.4.0.2 allows an attacker to execute arbitrary code via the Constructor of the class StyleElement."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/canvg/canvg/issues/1749",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-26910",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-03-10T15:15:37.660",
"lastModified": "2025-03-10T15:15:37.660",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in Iqonic Design WPBookit allows Stored XSS. This issue affects WPBookit: from n/a through 1.0.1."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/wpbookit/vulnerability/wordpress-wpbookit-plugin-1-0-1-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-26916",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-03-10T15:15:37.830",
"lastModified": "2025-03-10T15:15:37.830",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in EPC Massive Dynamic. This issue affects Massive Dynamic: from n/a through 8.2."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"baseScore": 9.0,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.2,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-98"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/theme/massive-dynamic/vulnerability/wordpress-massive-dynamic-theme-8-2-unauthenticated-local-file-inclusion-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-26933",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-03-10T15:15:37.997",
"lastModified": "2025-03-10T15:15:37.997",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Nitin Prakash WC Place Order Without Payment allows PHP Local File Inclusion. This issue affects WC Place Order Without Payment: from n/a through 2.6.7."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.6,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-98"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/wc-place-order-without-payment/vulnerability/wordpress-place-order-without-payment-for-woocommerce-plugin-2-6-7-local-file-inclusion-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-26936",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-03-10T15:15:38.177",
"lastModified": "2025-03-10T15:15:38.177",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Control of Generation of Code ('Code Injection') vulnerability in NotFound Fresh Framework allows Code Injection. This issue affects Fresh Framework: from n/a through 1.70.0."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
"baseScore": 10.0,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/fresh-framework/vulnerability/wordpress-fresh-framework-plugin-1-70-0-unauthenticated-remote-code-execution-rce-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2025-03-10T15:00:19.914944+00:00
2025-03-10T17:00:20.674386+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2025-03-10T14:15:26.737000+00:00
2025-03-10T16:58:35.783000+00:00
```
### Last Data Feed Release
@ -33,44 +33,56 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
284610
284622
```
### CVEs added in the last Commit
Recently added CVEs: `9`
Recently added CVEs: `12`
- [CVE-2024-57492](CVE-2024/CVE-2024-574xx/CVE-2024-57492.json) (`2025-03-10T14:15:24.387`)
- [CVE-2025-1497](CVE-2025/CVE-2025-14xx/CVE-2025-1497.json) (`2025-03-10T14:15:24.723`)
- [CVE-2025-2149](CVE-2025/CVE-2025-21xx/CVE-2025-2149.json) (`2025-03-10T13:15:36.290`)
- [CVE-2025-2151](CVE-2025/CVE-2025-21xx/CVE-2025-2151.json) (`2025-03-10T13:15:36.497`)
- [CVE-2025-2152](CVE-2025/CVE-2025-21xx/CVE-2025-2152.json) (`2025-03-10T14:15:26.543`)
- [CVE-2025-2153](CVE-2025/CVE-2025-21xx/CVE-2025-2153.json) (`2025-03-10T14:15:26.737`)
- [CVE-2025-25615](CVE-2025/CVE-2025-256xx/CVE-2025-25615.json) (`2025-03-10T14:15:24.960`)
- [CVE-2025-25616](CVE-2025/CVE-2025-256xx/CVE-2025-25616.json) (`2025-03-10T14:15:25.097`)
- [CVE-2025-26865](CVE-2025/CVE-2025-268xx/CVE-2025-26865.json) (`2025-03-10T14:15:25.220`)
- [CVE-2024-12604](CVE-2024/CVE-2024-126xx/CVE-2024-12604.json) (`2025-03-10T15:15:36.947`)
- [CVE-2024-47109](CVE-2024/CVE-2024-471xx/CVE-2024-47109.json) (`2025-03-10T16:15:12.703`)
- [CVE-2024-52905](CVE-2024/CVE-2024-529xx/CVE-2024-52905.json) (`2025-03-10T16:15:12.887`)
- [CVE-2025-25382](CVE-2025/CVE-2025-253xx/CVE-2025-25382.json) (`2025-03-10T16:15:13.393`)
- [CVE-2025-25614](CVE-2025/CVE-2025-256xx/CVE-2025-25614.json) (`2025-03-10T15:15:37.330`)
- [CVE-2025-25620](CVE-2025/CVE-2025-256xx/CVE-2025-25620.json) (`2025-03-10T15:15:37.490`)
- [CVE-2025-25940](CVE-2025/CVE-2025-259xx/CVE-2025-25940.json) (`2025-03-10T16:15:13.520`)
- [CVE-2025-25977](CVE-2025/CVE-2025-259xx/CVE-2025-25977.json) (`2025-03-10T16:15:13.633`)
- [CVE-2025-26910](CVE-2025/CVE-2025-269xx/CVE-2025-26910.json) (`2025-03-10T15:15:37.660`)
- [CVE-2025-26916](CVE-2025/CVE-2025-269xx/CVE-2025-26916.json) (`2025-03-10T15:15:37.830`)
- [CVE-2025-26933](CVE-2025/CVE-2025-269xx/CVE-2025-26933.json) (`2025-03-10T15:15:37.997`)
- [CVE-2025-26936](CVE-2025/CVE-2025-269xx/CVE-2025-26936.json) (`2025-03-10T15:15:38.177`)
### CVEs modified in the last Commit
Recently modified CVEs: `16`
Recently modified CVEs: `55`
- [CVE-2023-0487](CVE-2023/CVE-2023-04xx/CVE-2023-0487.json) (`2025-03-10T14:15:22.880`)
- [CVE-2023-25233](CVE-2023/CVE-2023-252xx/CVE-2023-25233.json) (`2025-03-10T14:15:23.970`)
- [CVE-2024-57064](CVE-2024/CVE-2024-570xx/CVE-2024-57064.json) (`2025-03-10T14:15:24.207`)
- [CVE-2025-1382](CVE-2025/CVE-2025-13xx/CVE-2025-1382.json) (`2025-03-10T14:15:24.567`)
- [CVE-2025-2130](CVE-2025/CVE-2025-21xx/CVE-2025-2130.json) (`2025-03-10T13:15:36.090`)
- [CVE-2025-2148](CVE-2025/CVE-2025-21xx/CVE-2025-2148.json) (`2025-03-10T14:15:26.130`)
- [CVE-2025-26594](CVE-2025/CVE-2025-265xx/CVE-2025-26594.json) (`2025-03-10T13:15:34.970`)
- [CVE-2025-26595](CVE-2025/CVE-2025-265xx/CVE-2025-26595.json) (`2025-03-10T13:15:35.167`)
- [CVE-2025-26596](CVE-2025/CVE-2025-265xx/CVE-2025-26596.json) (`2025-03-10T13:15:35.303`)
- [CVE-2025-26597](CVE-2025/CVE-2025-265xx/CVE-2025-26597.json) (`2025-03-10T13:15:35.443`)
- [CVE-2025-26598](CVE-2025/CVE-2025-265xx/CVE-2025-26598.json) (`2025-03-10T13:15:35.573`)
- [CVE-2025-26599](CVE-2025/CVE-2025-265xx/CVE-2025-26599.json) (`2025-03-10T13:15:35.703`)
- [CVE-2025-26600](CVE-2025/CVE-2025-266xx/CVE-2025-26600.json) (`2025-03-10T13:15:35.837`)
- [CVE-2025-26601](CVE-2025/CVE-2025-266xx/CVE-2025-26601.json) (`2025-03-10T13:15:35.960`)
- [CVE-2025-27636](CVE-2025/CVE-2025-276xx/CVE-2025-27636.json) (`2025-03-10T14:15:25.827`)
- [CVE-2025-27840](CVE-2025/CVE-2025-278xx/CVE-2025-27840.json) (`2025-03-10T14:15:25.943`)
- [CVE-2023-52214](CVE-2023/CVE-2023-522xx/CVE-2023-52214.json) (`2025-03-10T14:59:09.437`)
- [CVE-2023-52231](CVE-2023/CVE-2023-522xx/CVE-2023-52231.json) (`2025-03-10T15:50:32.850`)
- [CVE-2023-52234](CVE-2023/CVE-2023-522xx/CVE-2023-52234.json) (`2025-03-10T15:50:32.850`)
- [CVE-2023-52609](CVE-2023/CVE-2023-526xx/CVE-2023-52609.json) (`2025-03-10T15:10:00.520`)
- [CVE-2023-52611](CVE-2023/CVE-2023-526xx/CVE-2023-52611.json) (`2025-03-10T15:41:09.180`)
- [CVE-2023-52616](CVE-2023/CVE-2023-526xx/CVE-2023-52616.json) (`2025-03-10T15:41:09.180`)
- [CVE-2024-11638](CVE-2024/CVE-2024-116xx/CVE-2024-11638.json) (`2025-03-10T15:15:36.803`)
- [CVE-2024-26634](CVE-2024/CVE-2024-266xx/CVE-2024-26634.json) (`2025-03-10T15:41:09.180`)
- [CVE-2024-26641](CVE-2024/CVE-2024-266xx/CVE-2024-26641.json) (`2025-03-10T16:58:35.783`)
- [CVE-2024-28401](CVE-2024/CVE-2024-284xx/CVE-2024-28401.json) (`2025-03-10T15:10:00.520`)
- [CVE-2024-28403](CVE-2024/CVE-2024-284xx/CVE-2024-28403.json) (`2025-03-10T15:10:00.520`)
- [CVE-2024-29112](CVE-2024/CVE-2024-291xx/CVE-2024-29112.json) (`2025-03-10T14:59:09.437`)
- [CVE-2024-29419](CVE-2024/CVE-2024-294xx/CVE-2024-29419.json) (`2025-03-10T14:59:09.437`)
- [CVE-2024-29759](CVE-2024/CVE-2024-297xx/CVE-2024-29759.json) (`2025-03-10T15:50:32.850`)
- [CVE-2024-29921](CVE-2024/CVE-2024-299xx/CVE-2024-29921.json) (`2025-03-10T15:50:32.850`)
- [CVE-2024-29925](CVE-2024/CVE-2024-299xx/CVE-2024-29925.json) (`2025-03-10T15:50:32.850`)
- [CVE-2024-5295](CVE-2024/CVE-2024-52xx/CVE-2024-5295.json) (`2025-03-10T16:26:06.647`)
- [CVE-2025-0624](CVE-2025/CVE-2025-06xx/CVE-2025-0624.json) (`2025-03-10T16:15:13.110`)
- [CVE-2025-2112](CVE-2025/CVE-2025-21xx/CVE-2025-2112.json) (`2025-03-10T16:15:13.817`)
- [CVE-2025-2113](CVE-2025/CVE-2025-21xx/CVE-2025-2113.json) (`2025-03-10T16:15:13.950`)
- [CVE-2025-2115](CVE-2025/CVE-2025-21xx/CVE-2025-2115.json) (`2025-03-10T16:15:14.147`)
- [CVE-2025-2120](CVE-2025/CVE-2025-21xx/CVE-2025-2120.json) (`2025-03-10T16:15:14.347`)
- [CVE-2025-2121](CVE-2025/CVE-2025-21xx/CVE-2025-2121.json) (`2025-03-10T16:15:14.483`)
- [CVE-2025-2122](CVE-2025/CVE-2025-21xx/CVE-2025-2122.json) (`2025-03-10T16:15:14.617`)
- [CVE-2025-2123](CVE-2025/CVE-2025-21xx/CVE-2025-2123.json) (`2025-03-10T16:15:14.740`)
## Download and Usage

View File

@ -214390,7 +214390,7 @@ CVE-2023-0483,0,0,076aa122ad914c1164f82f3f9f173341f80591ee3542f2aef7ed6562b6f26e
CVE-2023-0484,0,0,8bbf0133f11289ba6dab230eb2ebc471707598c6dc2e7bd50d80f9b6868763d1,2025-02-19T20:15:33.520000
CVE-2023-0485,0,0,c94592c0a92f081c506f16872d53f1637abd06d2d748b9cc55aedabdb3c6af8d,2024-11-21T07:37:16.357000
CVE-2023-0486,0,0,79f862c17d6dd435ce4b6172df19c26a832def1ec531a28f8bb4e693b9a4b884,2025-02-13T17:15:55.600000
CVE-2023-0487,0,1,ab056dd6419a5f75db51e99abd4c40400923e2bc40533c48d9bb616ebbc9a15f,2025-03-10T14:15:22.880000
CVE-2023-0487,0,0,ab056dd6419a5f75db51e99abd4c40400923e2bc40533c48d9bb616ebbc9a15f,2025-03-10T14:15:22.880000
CVE-2023-0488,0,0,e1927f12e06abbd714f1592921e934aaf4c65af80824b7cfd1162a6fd6b257e4,2024-11-21T07:37:16.667000
CVE-2023-0489,0,0,ff94ed989ecf200ca9c9e93b2f43e5b73974735ffa1dec60779e8e34a66fa1cd,2024-11-21T07:37:16.783000
CVE-2023-0490,0,0,de5db187dc29d08e72001552229674aafbc72c7f1535c50224381914e9f169d3,2025-01-14T20:15:26.490000
@ -214481,7 +214481,7 @@ CVE-2023-0578,0,0,1b664a5f9087e1616dad80854d7095835d0ab88854a8196a7fe50c003be364
CVE-2023-0579,0,0,a9030806eb2c6a88cf9d4657f7bd32aa28a98c879cbc09d7f601d1f1c378ba9b,2024-11-21T07:37:26.030000
CVE-2023-0580,0,0,fb2903613cebd2dc46456b158d0e03dde7bc6f83ca3387673eba11cce6f53333,2024-11-21T07:37:26.137000
CVE-2023-0581,0,0,235330329aa9cb2413ff17de2e1747757523f4328b3fd3439758453dd9792730,2024-11-21T07:37:26.240000
CVE-2023-0582,0,0,b81939d48daf4b881fc0c2d4b8f6598502a6fa649da8701115d2b53a95c72fb6,2024-11-21T07:37:26.337000
CVE-2023-0582,0,1,d98ef0be504f0768a9b6e20b4bacf3f87fa947d58f24a759afe9734ed3312ef7,2025-03-10T15:50:32.850000
CVE-2023-0583,0,0,aecdf5bf075fe00bf28cdbb70dc4e17c1d3edbe8508537d39ebcdc1d79c2adc0,2024-11-21T07:37:26.457000
CVE-2023-0584,0,0,86d98ae13897aba2e27973d5ba25ca898414447a0e558495482aae224a1f3bda,2024-11-21T07:37:26.560000
CVE-2023-0585,0,0,49ac0e7f939629954485d621143f248a92ef053fa7893146e4d823a2591822c5,2024-11-21T07:37:26.653000
@ -216470,7 +216470,7 @@ CVE-2023-20853,0,0,a4a4925bb7d17dc151501c8aa321035678533d7956ae2d1bc1c5ee3469d5d
CVE-2023-20854,0,0,dacd2e665bd38bf4ba99d80576d86e64bbe079de09ee99a977ca737c5655d81d,2024-11-21T07:41:42.060000
CVE-2023-20855,0,0,f03026e1049b3344c34a6bcc1b12772374c4095cc8d63adbb19c5a88418e0228,2024-11-21T07:41:42.180000
CVE-2023-20856,0,0,5ae4aa033dbad19981a07ee21a2a125d884a36c4e68c92f5feffac991dac2d83,2024-11-21T07:41:42.283000
CVE-2023-20857,0,0,c25d90613d7fbb05e9c99852bf3d4fc04dae65733405726280e5ed45462fe07f,2024-11-21T07:41:42.380000
CVE-2023-20857,0,1,fefdaa2c60a821e74991439fecf2049da1cf72f21cbe6bd98ce3ea011f3513ae,2025-03-10T15:15:36.383000
CVE-2023-20858,0,0,427e18ddecdd57cabdcf7a2c3f0765b4fc6b3ef29cd70d30a73313181e34474c,2024-11-21T07:41:42.477000
CVE-2023-20859,0,0,a149fcc9e6b397e6867e61052fc9e57bb8ebda4b9da8d77d31122383a87a762f,2024-11-21T07:41:42.577000
CVE-2023-2086,0,0,4bd07e7f4519a004987d08259ec919f33db41e8bd2e5bac80d42e3053bac0b12,2024-11-21T07:57:54.533000
@ -220288,7 +220288,7 @@ CVE-2023-25223,0,0,e750c0702dfabc3dbe9f70410606162b90696b0cb0ec666d8afd755bff601
CVE-2023-2523,0,0,75ad7fe6a8390742f0b77c3e102425d78df453f57131497342e08e697f5d3493,2024-11-21T07:58:46.427000
CVE-2023-25230,0,0,c9e1672acab23ee6746f5a87d7cecb75e82e85c8037cde7bd29987838ac5d10e,2024-11-21T07:49:20.683000
CVE-2023-25231,0,0,88c61d385aa432e00fc3c0ad1089f0cddd7c90b8afad049aca3f8d335980af3f,2024-11-21T07:49:20.813000
CVE-2023-25233,0,1,5b3ff0021d60699fe20810b2eae7c5134ba438cf7c98451fa7b7425c26dbd3d4,2025-03-10T14:15:23.970000
CVE-2023-25233,0,0,5b3ff0021d60699fe20810b2eae7c5134ba438cf7c98451fa7b7425c26dbd3d4,2025-03-10T14:15:23.970000
CVE-2023-25234,0,0,a510bebe2375b1af45612a3ab2f3dac7b3dc7853220bc1cd50b6c5e9d04afedc,2024-11-21T07:49:21.077000
CVE-2023-25235,0,0,596c788630eb27db3d761bc92f36535d6f58c10a053690d1add9bf413ab2f052,2024-11-21T07:49:21.203000
CVE-2023-2524,0,0,a2726305bcea2f845a6096aa4d7886b789131c21fac5c5b2a82d5d0b3feb2601,2024-11-21T07:58:46.563000
@ -221836,7 +221836,7 @@ CVE-2023-27291,0,0,f15103f462a9934b3ac93d72050d98408ccebda0d448d74ff8c344a5fe434
CVE-2023-27292,0,0,97dcbe475305ce7caa822a272d7c9ae7ba2ff74ad54d20a927c7a39de32fb198,2024-11-21T07:52:35.623000
CVE-2023-27293,0,0,a6bd67d7f4699cf2b8a0eaf868b22b96444ff9300c334690ff1df27158d500f3,2024-11-21T07:52:35.733000
CVE-2023-27294,0,0,a8c2ed9f7bf316e1c8137f253452c0e613f7a6b7e34251d8285938c38d5a8709,2024-11-21T07:52:35.860000
CVE-2023-27295,0,0,404b478058137d80a51656a9ce298835ed99f8ed097a9e66008da66eb6f07a53,2024-11-21T07:52:35.963000
CVE-2023-27295,0,1,576d9de968bd51df200d9f288f1821e9b43ab98ad3fbb55bfbcd9987087b4cbc,2025-03-10T15:15:36.603000
CVE-2023-27296,0,0,7f5274562ccbbbb6af5e35f2605b8581df7cc1222d4fd056126d8ea79d3035b5,2024-11-21T07:52:36.060000
CVE-2023-27298,0,0,0fce4c894e225fbd7e4c5bb58306e8f69a7ae7ff803ff130bf62832af8167cfb,2024-11-21T07:52:36.240000
CVE-2023-2730,0,0,3311bc47a08de3cec2a39f64e644a5d5e79fe45fe6ccc5819deb28235498f05c,2024-11-21T07:59:11.053000
@ -230761,9 +230761,9 @@ CVE-2023-38530,0,0,4e4e66a2c24c9621836f71f66bc79096ab1c9791f030d61f091097512aeb6
CVE-2023-38531,0,0,f2ed48e07d4840ae6c56e55cb29ea3d8c8fb13a973f5d004638b1c054bb1d6ec,2024-11-21T08:13:46.483000
CVE-2023-38532,0,0,93e795319b21d595bc386ad4f7ab375ae9f1953850bb0258fa24bc5f3b5c1076,2024-11-21T08:13:46.620000
CVE-2023-38533,0,0,c16ba29eb2d545356ad441068c0d777daacf50687c7b9841b866bf45682b2c89,2024-11-21T08:13:46.767000
CVE-2023-38534,0,0,2b69e909a777c4e09ca35160ae25689beae3a1d13bb2a59e7b7d869cf3077c26,2024-11-21T08:13:46.917000
CVE-2023-38535,0,0,428e3c756a93aa80ca8dee74061029c646c7e0b28752bf31236047e6113e7399,2024-11-21T08:13:47.050000
CVE-2023-38536,0,0,bc42a49d2f6cd0b23955cf36f3dd93aca7cf8423253b9e2980178f2e5fc30044,2024-11-21T08:13:47.197000
CVE-2023-38534,0,1,8d28f84459bf3f165fb4079eb9d07c71ac1b6926d9580283297409c2baf14ede,2025-03-10T15:09:26.080000
CVE-2023-38535,0,1,db02b1a3c0ca63cc493b6d0de151a536cde5a20e781e04a7541df00b86ef576c,2025-03-10T15:09:26.080000
CVE-2023-38536,0,1,96e5b19b66d0a947123a455de26402a6be7d62953ec516b62788e3f9db675a3b,2025-03-10T15:09:26.080000
CVE-2023-38537,0,0,e06740b8037277dc127193a81a40981762064d56c04b903dd9547e9105b64cd2,2024-11-21T08:13:47.330000
CVE-2023-38538,0,0,8e58f8e949a1585b01725192a50b8257f2a8b0d94296dcbdb08e88289892cc4c,2024-11-21T08:13:47.463000
CVE-2023-3854,0,0,7b400fbfa45bcf9f9eb1433dc60d5d266ef5f190546d63957537ef59d6609ad1,2024-11-21T08:18:13.467000
@ -235479,7 +235479,7 @@ CVE-2023-44995,0,0,09b6031c8143bcb3dd8732530414f342c756d0f762cb4033139ead2113975
CVE-2023-44996,0,0,22eb9e1b1051547c27e8899f36155195706aa2759899c97aff28cf36873a0b8b,2024-11-21T08:26:12.090000
CVE-2023-44997,0,0,efbd2633cf4347525166f108807458b201a5cfcefdac55279eb2d650a026ef0a,2024-11-21T08:26:12.213000
CVE-2023-44998,0,0,50baa0ccce55be5da3f2afc62b780f6cf72c18ddd9a484e733a4e2b5811c8601,2024-11-21T08:26:12.340000
CVE-2023-44999,0,0,4f7501630a43c7d4750793398d2204b7429cd2f2d191a30f553f62f5c529b1a4,2024-11-21T08:26:12.467000
CVE-2023-44999,0,1,1ada106c655b6d6ef1dbb71a35ab8a2b0fd749e8bf40c0a55ff48e7ffaf0098c,2025-03-10T15:50:32.850000
CVE-2023-4500,0,0,e4e876677a323f721a42330b69404f9a5cdfbe31eb40b4ecc2dba9c49b3187ea,2024-11-21T08:35:17.893000
CVE-2023-45000,0,0,1a50b84c316432a912c8ad314433163a1b43fd68afe89719d2cb955ced2944c6,2025-03-06T15:00:11.560000
CVE-2023-45001,0,0,98537898ba3424c877ebf2faa54c0135532a4d94495084e2ad604b6c259509d9,2024-11-21T08:26:12.707000
@ -236105,7 +236105,7 @@ CVE-2023-45820,0,0,0f279d6051434e62af88a09aa9584ff189866c2fa6071bfd090ee65e61aaa
CVE-2023-45821,0,0,a5efc0cf09fbe0ffb997a5d9952a120426712f734319dcebcd5f558f82197dca,2024-11-21T08:27:25.503000
CVE-2023-45822,0,0,b8705e0d0b51b3169e64459069d4473b1901d07584912fde63fc8216205fbdd7,2024-11-21T08:27:25.650000
CVE-2023-45823,0,0,9cf2f9f9b608ff4330d5f4e9163895af0b4c72a268e8bc48c1079d139ae10904,2024-11-21T08:27:25.797000
CVE-2023-45824,0,0,286be4458a31638e5127840906a9a2155d0a987a203c80a88202eebf90f6b6ba,2024-11-21T08:27:25.933000
CVE-2023-45824,0,1,29884b9890bc82562f06e35ee63345404aae2cc9c0ecc27d0bcd2bafb744f128,2025-03-10T14:59:09.437000
CVE-2023-45825,0,0,cc4f775aec9a77cdb80822f190dfb31088087996aff99b7b525e09a3649bcb6e,2024-11-21T08:27:26.060000
CVE-2023-45826,0,0,2049fdcfacd49e62f3dee07525456735a2621cfb7b2b713331b170eaaa2c4f93,2024-11-21T08:27:26.227000
CVE-2023-45827,0,0,abaf7216d57163ffcb299f06a62cc36e0969e2f3d40b98189cc2564ddfd70e0b,2024-11-21T08:27:26.363000
@ -237923,7 +237923,7 @@ CVE-2023-48292,0,0,49b6ed3c7d82cc19d07f9b07faeae8eed968f0f9266280c60e9f10ad4e10a
CVE-2023-48293,0,0,7ec36e7fb2f0cd6575e1daab3edfac0587e55782822da6ae2d2ac5b84c8b6039,2024-11-21T08:31:25.337000
CVE-2023-48294,0,0,0823cef5ec1945423a2723001f0cbbc10811a1d7069f9e43f8bc302fbf48eb89,2024-11-21T08:31:25.490000
CVE-2023-48295,0,0,e3f7b0fabd467ba3d6d38c5a491e5d95e73fa412e4e67ec80fc391d92d9caaa6,2024-11-21T08:31:25.650000
CVE-2023-48296,0,0,0a15e48ad7844c9fa59bb7696fbcabfe945f7138cd12c884fe95e7b4cde1ee7f,2024-11-21T08:31:25.800000
CVE-2023-48296,0,1,903abecd157925dab479e1a9b8eb1615a76b874865832fde013c59cd80a022c0,2025-03-10T14:59:09.437000
CVE-2023-48297,0,0,5c29092d616aeb3553526d5d48e7236fe2eb36b7252a78c024845e2f7a8ca0b6,2024-11-21T08:31:25.937000
CVE-2023-48298,0,0,93a4e2a4bafe2888e8111342b6def94e2d2d08c80634f2badc050f7dd3bad50f,2024-11-21T08:31:26.090000
CVE-2023-48299,0,0,32b7b9547f9d8722df1b4409045acff64c8bf92421b88ca8d40dbfb2913b4da4,2024-11-21T08:31:26.243000
@ -239368,7 +239368,7 @@ CVE-2023-50164,0,0,8287e2c775d003ea8c29bab77ea8774ab6378fa22173ac3c8e2b13cc1c7db
CVE-2023-50165,0,0,f0f9c7ccf1e457e83f559bc213e758a4620263a795313eb97cd9fa622da413fe,2024-11-21T08:36:35.660000
CVE-2023-50166,0,0,0dcbea6361437caef094634aee7c12a95fcd6fe10938ebb89131abbf42b409e6,2024-11-21T08:36:35.803000
CVE-2023-50167,0,0,ccd6c241106be26cb9b4d66bcbf303ef2afb42ac4c132eb3aae0f40c4896e64d,2025-02-18T13:43:27.293000
CVE-2023-50168,0,0,839c58ebb67d0eff1d2b8b5a29b7775d811d7c03a6f89a1b449ff37e232b995c,2024-11-21T08:36:36.050000
CVE-2023-50168,0,1,a3ca312444e261a21b0fe92f05d01db88818150e1c5d5420ae68cf4f08ec1d71,2025-03-10T15:10:00.520000
CVE-2023-5017,0,0,71c6d4356e7fa788acf558b2e295dd7c9023f504871cad9a613399738594215d,2024-11-21T08:40:53.930000
CVE-2023-50170,0,0,35e958ca9e1e87a9a58954076b33cef095d0c7756fd04b778caa16ac161183d0,2024-02-14T18:15:46.610000
CVE-2023-50172,0,0,25c03c7011f73a3630332b712bf3e6e5aa0720bd78ba59ee21b22af315f1dd14,2024-11-21T08:36:36.190000
@ -239393,28 +239393,28 @@ CVE-2023-50194,0,0,648aeae0a443915f5d986b99757cc14e3d8fa6fb926bc094ed76392c5c041
CVE-2023-50195,0,0,0055bf9b102c1953a04fbdec2fda27ae9f3bbca29b798cf939095c9a948ea97c,2024-11-21T08:36:38.253000
CVE-2023-50196,0,0,76b1049dab48586a085df3c0a6ad1e28c4439753de6afae7bda2eb2c11ad1672,2024-11-21T08:36:38.370000
CVE-2023-50197,0,0,1d3b02b860128bb5029c41ac3776bf9f3c1ed8ab3f6bbf1e59772c2a98be0195,2024-11-21T08:36:38.490000
CVE-2023-50198,0,0,5e6280fedbd71287f3388ca0bc8d999e71f6cdfd0db273fffd6156697c8e46c1,2024-11-21T08:36:38.610000
CVE-2023-50199,0,0,006a4143e910cb9db8d161ec1d973fdf54541918a0d48688c6d3d7bc234e5d79,2024-11-21T08:36:38.737000
CVE-2023-50198,0,1,7a19f515359e13fa313363f52767fb3adc52a455c63be43ef5f3e66039c113c6,2025-03-10T16:26:06.647000
CVE-2023-50199,0,1,90859661f878ac18ce00ff03f9314ab6c8f2d45e6f49cd52f4d3773245fe3a5d,2025-03-10T16:26:06.647000
CVE-2023-5020,0,0,3ebfd312a63bb08213128d50313f23ce93215fe3c37de9d1421de1e39db29d89,2024-11-21T08:40:54.350000
CVE-2023-50200,0,0,8373233220283fd54d2070e77f13f8a00063236c7d24fa6cfc47a889982da830,2024-11-21T08:36:38.860000
CVE-2023-50201,0,0,62f641eb64d318c3539a5a5f68105889046d02d2c6029b689e97bd42606452d2,2024-11-21T08:36:38.980000
CVE-2023-50202,0,0,d180d7eb3b0bef572bdfe7e434f60eb5e154fa548c185e5b8e2c82dfae7e396c,2024-11-21T08:36:39.103000
CVE-2023-50203,0,0,483db6e9a2ea9eca4d196b6744908afb33c730a00fb4962cdc9038a3b6e39fd8,2024-11-21T08:36:39.233000
CVE-2023-50204,0,0,36eb51b8a8048c19d4b7df22668eae06ee9dfcb165c3110c9b344b1fbb1d3eed,2024-11-21T08:36:39.353000
CVE-2023-50205,0,0,c61e562ff4cf9a35648a8db294ea3f638d87ad887ae46ebb61a326d2a0cb1342,2024-11-21T08:36:39.487000
CVE-2023-50206,0,0,7b219eb9406518cae369ac7e7fafdbab1d76a1e7b1522a2db9815b395ec606e4,2024-11-21T08:36:39.617000
CVE-2023-50207,0,0,c86abbe8b92f98baf948cca45884269d458cbeeef484ca2ce68ddc7bf8dd9e33,2024-11-21T08:36:39.740000
CVE-2023-50208,0,0,4e6567245ec22c5e3d4553111aeb08ba5dfda080e92f87e9995d6d7cfc8cac73,2024-11-21T08:36:39.863000
CVE-2023-50209,0,0,99f2755be3b346891a689c02854b06751971cd341dd7d9937e137a9e3c735b73,2024-11-21T08:36:39.980000
CVE-2023-50200,0,1,4d8dd6a7529464c66381176afb853b6e8e8a2718a65c2c3a0a3a14420935f4b1,2025-03-10T16:26:06.647000
CVE-2023-50201,0,1,7d6906b3768b3869dfeea0a11edc3d2aea25f78fb8e5cc48408e55ed3db21026,2025-03-10T16:26:06.647000
CVE-2023-50202,0,1,f061da0feabf8922bdb40f8b3e1f668d0279f5acbbb7ffc5ace135220bde6d06,2025-03-10T16:26:06.647000
CVE-2023-50203,0,1,36a97005595c883e336e84a3e43c42a00df60f0bef2d237f253211c14af47a0e,2025-03-10T16:26:06.647000
CVE-2023-50204,0,1,3cd0869aafc3815b1d14881ecd137b723bf8d514ccc8fea519e86f9976216bd9,2025-03-10T16:26:06.647000
CVE-2023-50205,0,1,4067290f89744f83762a90342d9b5ff0ad8500229c6d518fea880f5c66f6565f,2025-03-10T16:26:06.647000
CVE-2023-50206,0,1,2c02bd008b90f9a5b96316edbdf959aca11de74d4b8783ae07d407f51be80413,2025-03-10T16:26:06.647000
CVE-2023-50207,0,1,65929ec45c07845ef32258c6a91dddaaf49d8d22a3455fc165b33c8fc5a706d6,2025-03-10T16:26:06.647000
CVE-2023-50208,0,1,1bbea70eb1891758e013fe61e6bd7a4356b57a2bd47cabdf6c1f8cfdbb01f02c,2025-03-10T16:26:06.647000
CVE-2023-50209,0,1,2e1b9b15b259929d1ab2afda166d8f86c00c39c0e2b65b98ed883dd3fcc178e8,2025-03-10T16:26:06.647000
CVE-2023-5021,0,0,d5ed528cd2d04cbb0f9c02d11ed404a1c1a5e7d82066d69d6067ce83108913da,2024-11-21T08:40:54.490000
CVE-2023-50210,0,0,c40dcf7e2a99bb8bd2c8e0c1aa2743abde9a67aeaf5acb490e4ba8fac9d964e0,2024-11-21T08:36:40.110000
CVE-2023-50211,0,0,90c1b79371746104cd5175cf3eee9753a3c4dde8dd03783e0e545f64510a4a8d,2024-11-21T08:36:40.230000
CVE-2023-50212,0,0,660967e488d5c35d19b8b90912455229dc99f5a5d283255b2bc4a4046e1f5b12,2024-11-21T08:36:40.353000
CVE-2023-50213,0,0,bf84b84ed0eaac09cbd91e956d59cd581b0a086993cb355527385be64dab1a15,2024-11-21T08:36:40.470000
CVE-2023-50214,0,0,f95c8312844dea14b73513327cce30a4d399a35267061fbd217e71bb1ea84e33,2024-11-21T08:36:40.590000
CVE-2023-50215,0,0,51b3c7166030ef77130d4afa7c25027aa45894aad31d46641276fe8e2886c231,2024-11-21T08:36:40.720000
CVE-2023-50216,0,0,4032f6a8fac9ea254fb9d0dfa2743e25deca5a561f9f04ca5cc6c97051dc6636,2024-11-21T08:36:40.840000
CVE-2023-50217,0,0,93e4fa06cfe09de19c8d114835b966e03d41c1d4c1ce08acc4cd79c4dd23f7e4,2024-11-21T08:36:40.980000
CVE-2023-50210,0,1,6d244a2c079487d7b33be255cf1fb9e8197987cf74371c2573983312a1c1aef3,2025-03-10T16:26:06.647000
CVE-2023-50211,0,1,b02adad60288c41511e94a7ba022165a57a346ffa83739d34318b5616cbfb226,2025-03-10T16:26:06.647000
CVE-2023-50212,0,1,ea3c4da5e75a60db07de8e076c9f28d2bf886269f9a2552099202272b48571d2,2025-03-10T16:26:06.647000
CVE-2023-50213,0,1,a83e1ee6369c3b10c8754dab303fc20a1967fd63ed41b288ba18cd6f9ff1e06c,2025-03-10T16:26:06.647000
CVE-2023-50214,0,1,8e18966eaf9bcfb06d8920a3c6ef8df6f85421ae39f0db617530f69f94a2001a,2025-03-10T16:26:06.647000
CVE-2023-50215,0,1,6d29327ec23ed79c03b2e0a4833cfb3c6a7165a411432917d15a8c459d4cb87c,2025-03-10T16:26:06.647000
CVE-2023-50216,0,1,6323db3fc2516221a4ae0f7abba22641c9fc5086d31d0c27f185befbb09e33d8,2025-03-10T16:26:06.647000
CVE-2023-50217,0,1,b88efa8a8f677eb0831a9db706d938a13759020777672cd8fcad59f843be6b46,2025-03-10T16:26:06.647000
CVE-2023-50218,0,0,4afe1ef0276133be7935638cbd2e85e1eb71072de1f8990a0f86eda896d50103,2024-11-21T08:36:41.120000
CVE-2023-50219,0,0,77041172f2802de8b9e4c7ab0da5d39ea410d34684f3114836da31ea96721cb7,2024-11-21T08:36:41.250000
CVE-2023-5022,0,0,77c514e21cf9d9288b8d50b5d4e761ef67e4cc58115e2c2e9a8541aee9ed20d0,2024-11-21T08:40:54.627000
@ -240793,7 +240793,7 @@ CVE-2023-52209,0,0,5cc49a8c9584ee3734b32a880f990b114eed31ffc8d335c9e91f0f26aefc7
CVE-2023-5221,0,0,ac593677b3376dde09bd34a833907807ada0e2a1e2a05727f4f5313a1311ef84,2024-11-21T08:41:19.317000
CVE-2023-52211,0,0,4fd3248f4c554c980821f389569db32dc9c558ea6ec811b2423a7ecef28bcc4f,2024-11-21T08:39:24.437000
CVE-2023-52213,0,0,3601be2f1a2926cded9245ab21da9f59f377ccf814013c5e8b2d3dc18f46cd1d,2024-11-21T08:39:24.560000
CVE-2023-52214,0,0,dc95caebbc19bbe35deb08bddf40d6503aa27c84c3bd4b4f2b0f62b7ad115c20,2024-11-21T08:39:24.690000
CVE-2023-52214,0,1,5be0569656ae6ebd8c334d7369937d6e92e6550235e7d003f573f68e74226476,2025-03-10T14:59:09.437000
CVE-2023-52215,0,0,65dd38763a56901fd2bf92818082f00e711bcdeb4b87c1f54143d565ece2e8e3,2024-11-21T08:39:24.820000
CVE-2023-52216,0,0,5b6f1089c088b9daa2fff83e5549313d7ca0def2a262e8c39c2c0c91f5d94203,2024-11-21T08:39:24.943000
CVE-2023-52217,0,0,447b3fd9aaf7581ab2dca3fde3150c58c3c612e636d6e3b2675dce7ceccb0017,2024-11-21T08:39:25.070000
@ -240812,10 +240812,10 @@ CVE-2023-52228,0,0,dbf758c4d88af4d9c17a754628ecb3f00f8342a2d36b444cb80a7668ca1b2
CVE-2023-52229,0,0,eb5ee1c9114ec221fefc0b5bdf04e6d232285e23dbc4e9fa68e1d805a6df4ef7,2024-11-21T08:39:26.680000
CVE-2023-5223,0,0,2fb00a8c39af0b009cca243d971676d52c15e47da332f24d74c2dc93b3b5f165,2024-11-21T08:41:19.617000
CVE-2023-52230,0,0,f74a4b7b498808aeca0a984a29729c461b3b795e9da7ce52049e0e1692c07a5d,2024-11-21T08:39:26.800000
CVE-2023-52231,0,0,1898ae72b4557d66d34412838f4eac948bee83dc48ddea1259f96624fd15c5fd,2024-11-21T08:39:26.930000
CVE-2023-52231,0,1,6a989c6c6fd5f334eff59c4f030f69494f93136d76eb0b6839d99d333595495f,2025-03-10T15:50:32.850000
CVE-2023-52232,0,0,25816897725e03b2601314f3c9389a2be7d7e262fad693583de240b223ce3938,2024-11-21T08:39:27.053000
CVE-2023-52233,0,0,2423e3afa7be038ccf2190464fe2d4c37e2d909a99b6b2c713bd1ae6e307c147,2024-11-21T08:39:27.173000
CVE-2023-52234,0,0,39a5bbe4db6b624413f844df3d1b1a3bf6bf3843620d3098c5576cc456c7da30,2024-11-21T08:39:27.303000
CVE-2023-52234,0,1,52810b8529a5123a1ba1ea3a3af103acb34cd679a281604f82998848fdeaf764,2025-03-10T15:50:32.850000
CVE-2023-52235,0,0,38fc0b124e8fbe66aaf7d1f1df9b950ee33f38eef712db18d6428c2cb89643d8,2025-02-27T20:15:37.787000
CVE-2023-52237,0,0,ec00cd5043a647583ae661e798908ac8aae8b8c80323fd5ded69d2879fe6e25e,2024-11-21T08:39:27.630000
CVE-2023-52238,0,0,8b91affaee9fe41fbb00a1a88e4e12c3ca7d1995b7642fbf22e7576aa0f87b25,2024-11-21T08:39:27.907000
@ -241148,15 +241148,15 @@ CVE-2023-52605,0,0,eef3cf44ce41a02a3399eb957485c8288751166988c05159972483b6e58d9
CVE-2023-52606,0,0,e71801b4f5a4981b2569467690ce52413eb8f37a0337e3baa8643032e9366860,2025-02-14T16:40:45.753000
CVE-2023-52607,0,0,4022b2f965be96edd122082d59ec69486998f3198a0825ca9c95b3fe6070d1de,2024-11-21T08:40:11.080000
CVE-2023-52608,0,0,1d16de97ff29d39dc7d22baf8d49dafff2272c15cb0f5687aeaf3537fafcbe02,2025-02-25T18:52:37.897000
CVE-2023-52609,0,0,68b6c722db826f8d3e573655c486ba16421d86e9e7c0510f6dc3171cefc3eb34,2024-11-21T08:40:11.410000
CVE-2023-52609,0,1,16d2a63db45d95bcc5c4040a7addf598310e72b425dbda6023b9f1d530ffd997,2025-03-10T15:10:00.520000
CVE-2023-5261,0,0,12a347f49e473c2171e63989f079cf4aa858b311ce4aa7919b57ad843edc6646,2024-11-21T08:41:23.970000
CVE-2023-52610,0,0,42e4932933a1b2b44e26dd827e869b81fe3fa11f7d288d5d9be953648fafefe9,2024-11-21T08:40:11.557000
CVE-2023-52611,0,0,5950f9de28ca701a6d877ef416e5b0da9f8ec02d7c89b8bab6bf8cc7164deff5,2024-11-21T08:40:11.703000
CVE-2023-52611,0,1,330152c1b221e2b7cc759a830648270d0698ae2b359283f7aa0502b6ad4fd800,2025-03-10T15:41:09.180000
CVE-2023-52612,0,0,d6d47cff640a52161b4f9351b162fb8859b2930a7044931b4890a50707eb6b85,2025-02-27T03:20:23.277000
CVE-2023-52613,0,0,96325267c27d73302c8edfb72e5ff60c5b387d18ebd2882583f0fdf9459cad86,2024-11-21T08:40:11.967000
CVE-2023-52614,0,0,52c94d505914b26a7b25e71d5a23d26488e4516b2dcce84229cb69170bc5bf85,2024-12-12T15:20:02.283000
CVE-2023-52615,0,0,d8d6425893b09196f356165ccca56dc5d14626c565c3defa9edaa655ca205929,2024-12-12T15:20:12.140000
CVE-2023-52616,0,0,1f55bb5e40a40abf9cea18a1d496803a21c38b82f69ff542219826caa6851f89,2024-11-21T08:40:12.420000
CVE-2023-52616,0,1,a9ba78ce1866347ee08e18d82dd36ef60fddc2ec75b345f6e0f635dddf7a02d9,2025-03-10T15:41:09.180000
CVE-2023-52617,0,0,43a6c3b54c97e95c95b1a3b856ce894a04e8e0998a4a6b1e4b1c3f666122ec07,2024-11-21T08:40:12.540000
CVE-2023-52618,0,0,a284d66a0a173675b029b5aee3ada2aa13bfa94d23d149bbf9319a57e50731a2,2024-11-21T08:40:12.740000
CVE-2023-52619,0,0,b2659b5699bfc1e111c9a9843d46194c0f86d0d7ec9412530eece4634db68a61,2024-11-21T08:40:12.933000
@ -245757,7 +245757,7 @@ CVE-2024-11634,0,0,14627ed8cbf95632caf8b74a22783ca02eb0bf7651aea5ed85be227c49580
CVE-2024-11635,0,0,ffacee27dce2a3419b3aa106b350e83d5585d5dcfe645774b0023dac2c389ee8,2025-01-08T08:15:24.117000
CVE-2024-11636,0,0,477a215831f10296b9ea3788441fcca038078cee1d80a9e966a40e92f5b59df4,2025-01-13T15:15:07.560000
CVE-2024-11637,0,0,5348ca65261140ae16ec15332c773ee06343664939e89530c0d5541b934692f4,2025-01-14T02:15:07.907000
CVE-2024-11638,0,0,552649984b67f5b1ef18257a0d06eb421eca6da700aa98bde360d18a4c898d04,2025-03-10T06:15:20.797000
CVE-2024-11638,0,1,b3f0fba6b9e57ad0eb73493a02c935ea4ba6428dd3e65c707db806293722fd2a,2025-03-10T15:15:36.803000
CVE-2024-11639,0,0,b0b1970767477e87b7cf619e96fa5cb2fbca7d53895c7bdaf49d93303071061e,2025-01-17T19:40:09.763000
CVE-2024-1164,0,0,d6b3223f31512976ce37113225736cbf014a2aac3d8c295ef68c5d3e3fda5f16,2025-01-16T15:08:00.773000
CVE-2024-11640,0,0,703b195ff151c253fbe91a68928542f3fce11ad9103611204a13abf98a6770f0,2025-03-08T12:15:34.510000
@ -246683,6 +246683,7 @@ CVE-2024-12600,0,0,25cdf4243a182c8f825652731ae4cdb22588842da143c4d91d8fa5b7ce663
CVE-2024-12601,0,0,f9b91f2d20d6914a3b5ca3c9af2a431f615ff9e20926a30171bf1c35967a6eba,2024-12-17T12:15:20.543000
CVE-2024-12602,0,0,6a6f401c6c4934c31c54c267328b5cfeb9b2f93f94e5b5a1cce33d5e69f2089d,2025-02-06T13:15:38.907000
CVE-2024-12603,0,0,b77b6c9527bd0798c4124cb6a67b3eb0384daf1c81bc149052bbc09ab0e74875,2024-12-13T03:15:05.187000
CVE-2024-12604,1,1,365eafd508bd0d30c9c0eae62d3ad0864e472e4672d7a16d9e686b8d021666c0,2025-03-10T15:15:36.947000
CVE-2024-12605,0,0,a0f2993b097a4c99b97e822aef9d508fcc987f27fa00acaa2c8fa4c5ee5e87b3,2025-01-09T15:15:14.150000
CVE-2024-12606,0,0,640593522db4b989e186e13bcaa1c8fc14a8675964d1b9990cbdc5261025156e,2025-01-10T04:15:19.667000
CVE-2024-12607,0,0,a778c1b19df180457278323673004b895cd04ef11611b1a21cf7e73706325fb5,2025-03-07T09:15:14.700000
@ -253542,7 +253543,7 @@ CVE-2024-26630,0,0,adde7411c6c89a1ccc138c9f1404cb16baf029b425dd47ea72b82cb8b0a9f
CVE-2024-26631,0,0,eb4c850fd5a6959a2922e5f8e3fdc1bab0839dca96694a777740412e05e949ce,2024-11-21T09:02:43.580000
CVE-2024-26632,0,0,7d5b9a41e5544a024d3fe43e030dd518d74e6fe0747c4fbe31f63afe56570152,2025-03-03T17:33:19.643000
CVE-2024-26633,0,0,53fb39ca7258086fde7e81877e5cc590f32c01622b87c853980b5069721d02f8,2024-12-20T13:15:19.710000
CVE-2024-26634,0,0,1f9eeabf8f133d86a691ddf2fa231459fd38dd0f521c36b94c4201dd9d3e3366,2024-11-21T09:02:44.020000
CVE-2024-26634,0,1,07d6fa98833a05abaecfbd7e472c45df8681df5aa0f728361828b4567b94ce61,2025-03-10T15:41:09.180000
CVE-2024-26635,0,0,a7edca2438cebac503d3d0a80a3b8ba894da4196ace5867bea23ec41425d9fe5,2024-11-21T09:02:44.140000
CVE-2024-26636,0,0,e040392dbf5dece5991bbd5b4813e4acf74491af81b2691222339ae1b7720289,2024-11-21T09:02:44.270000
CVE-2024-26637,0,0,33676b92619865021f629b461c2549985de282ac3ac30f360d4728cbdc20aa03,2024-11-21T09:02:44.403000
@ -253550,7 +253551,7 @@ CVE-2024-26638,0,0,6c83dc25b3412a9ff69e4abbfad53bbaa0a8b4f7b0192f35032c6bb4f6d46
CVE-2024-26639,0,0,77fa0c405097892d132b380250ada6d19d3c676da4410ce6e163a929de368582,2024-06-20T09:15:11.183000
CVE-2024-2664,0,0,b0442b4aa7a683f4310b6f35cff42de65a7954f7096565e1dffd40e9f9b315f7,2025-01-08T20:05:38.290000
CVE-2024-26640,0,0,54c5da3b229a93028da04fd82c4249df09909d6ac16876a131e19755de0888f3,2024-11-21T09:02:44.737000
CVE-2024-26641,0,0,5f47a642bf5ae3dc0f36324b4a1b8f7c8a7ca05295b1963f0b237d32cbae450a,2024-11-21T09:02:44.853000
CVE-2024-26641,0,1,99579385ab8663a71ddd606e1435108db4ec117d531652ca8fb25425f6073fcd,2025-03-10T16:58:35.783000
CVE-2024-26642,0,0,8cb6e40acb222e213a9c1b8fa4426c911d8cd03fc8028b52eacb65429f170b4d,2024-11-21T09:02:44.980000
CVE-2024-26643,0,0,265075385090bf0e4e7c3bf5dd42e26aa590c7fbf73f4fca758ef0cd3664df19,2024-11-21T09:02:45.103000
CVE-2024-26644,0,0,3e955ecc04cafd50770b4e01603b044ae0abf17da766c5be4deb9ef73da57365,2024-11-21T09:02:45.230000
@ -255087,9 +255088,9 @@ CVE-2024-28395,0,0,3ac36a8de3aa3d1fe4cc050c5fc46d41abb7ee090785aeaa767ac36e87a67
CVE-2024-28396,0,0,a9b920310b189713faaee0f6833442602f782d8326fdb8c04904df33448955ca,2024-11-21T09:06:16.637000
CVE-2024-28397,0,0,856f600076688d17f155d0b3de70eb9262cbb77397683a630edc0c5a3e4d66ec,2024-11-21T09:06:16.863000
CVE-2024-2840,0,0,a7ffe5d042ec7962cc81a2b23f8b42cf3a001089fe1f305bad6b8b30e2ca44e0,2024-11-21T09:10:39.107000
CVE-2024-28401,0,0,2802927e5ad9b082a6c099f44230ec67d2e7b0dc68f3c4abdb5e00577ed5f858,2024-11-21T09:06:17.097000
CVE-2024-28401,0,1,9f0dbbbe7a6ec84e7d4faab16829c35681918247fdaaf914064f4e00200084ab,2025-03-10T15:10:00.520000
CVE-2024-28402,0,0,e4c461d02368e4a31332b9277c7c7cfb13c17d92de94a00db2a5800e4b1e5806,2024-11-21T09:06:17.250000
CVE-2024-28403,0,0,860309db1aa80a38c13205a0c2daedf50384bd0d9a847292c61f38375d2f0dd5,2024-11-21T09:06:17.480000
CVE-2024-28403,0,1,81618e0ea8184e7980a777fc304e501742d1a0ee0b5eb76d1188a31fa424f013,2025-03-10T15:10:00.520000
CVE-2024-28404,0,0,d99e3ddfc43b88c6fd1b7fe400872ee4df4414379558c27f27e655b6a93ecbb2,2024-11-21T09:06:17.620000
CVE-2024-28405,0,0,37d5f19105b16a999a639ddd3ec5ffb2d785831e507091c0e23a8c30aeff75d5,2024-11-21T09:06:17.937000
CVE-2024-2841,0,0,2754de63b6cb01395935c9f4c03638ff20eb3e9e94e2e947e9011287acdc7fbc,2025-01-23T19:26:46.283000
@ -255576,7 +255577,7 @@ CVE-2024-29109,0,0,4d51f8f3341e8657e6c8c880f4f2d73bd95482441c6ac3a26d0a8cd436b3b
CVE-2024-2911,0,0,ea8e4206a3c0bfceb3e41c8a3a3622f0f3db1e83a81f091f5308d2a4dc3ff64f,2024-11-21T09:10:49.123000
CVE-2024-29110,0,0,188b12a44958677313d622a075fc663921a549ff0ec7192ae3aa84b867a019d1,2024-11-21T09:07:34.573000
CVE-2024-29111,0,0,43c01cdf3c81bdb08ab32728f1ab12bd4d113a32f12b5b11c5a8312b12fa01f2,2024-11-21T09:07:34.703000
CVE-2024-29112,0,0,22fbc807a608e11c3ab90c64425a997e5eb5ddfdf96a55d3fadff1c9efe3e429,2024-11-21T09:07:34.840000
CVE-2024-29112,0,1,7bf41a966eaae89ebefd5c8b4c7e1306d7f21a731d1056a111c69bd2a160ffe1,2025-03-10T14:59:09.437000
CVE-2024-29113,0,0,19f739df1e3ffd99c17ee5134c1916be038e1d6ab800d9edd222b9c315a4edf2,2025-02-04T20:59:42.987000
CVE-2024-29114,0,0,88300e212efe02d630837b11131224e74f01a0cd0f11f5165976518107e30b35,2024-11-21T09:07:35.123000
CVE-2024-29115,0,0,1adaa965c7fdbdcaea4d6c977d75e4c572bbddffd3cad1334aee32788318bda0,2025-02-07T17:21:05.720000
@ -255768,7 +255769,7 @@ CVE-2024-2941,0,0,791b6be749f54c80a94b45470542c13f79a740bb4377f7a50b4bf078bcbf68
CVE-2024-29413,0,0,e4856a49d0b9ba39155f8e7a02f85d7a362c6e1dae478077aa2043ac538afa2b,2024-11-21T09:08:00.883000
CVE-2024-29415,0,0,2a3b41c75a72df6c05646dae150ef4f5ab8cf2a6c172222d216a6c011a3d65c2,2025-01-17T20:15:27.950000
CVE-2024-29417,0,0,59ed7330a649e9c190a03d2824c71e319289766718abccd335aa458a7d2711a6,2024-11-21T09:08:01.307000
CVE-2024-29419,0,0,0ce606f5a5cf07356613fec2326ebde34442b78001dc20551d09af7fea8ca551,2024-11-21T09:08:01.520000
CVE-2024-29419,0,1,3d6442d0944c2f3dbf573e7842459e57abd01dc61b07d44258cf4f6e849723b5,2025-03-10T14:59:09.437000
CVE-2024-2942,0,0,26108ec70f2b46a3e343d5e817ecb446a8d832968925c86c71a2e6e00c547f59,2025-02-20T18:06:40.927000
CVE-2024-29421,0,0,beb9c3d391776927bc0509fe96d1996ccda24e4a7b2806b30c432e1112a2c867,2024-11-21T09:08:01.653000
CVE-2024-2943,0,0,beca67e7e14d7fa541ce7bb02133b5918a7ee95ca547f351aa0b1a0c61776892,2025-02-21T18:30:31.883000
@ -255896,7 +255897,7 @@ CVE-2024-29755,0,0,131508e7f31b5dd773300df31549782ce0ce017525cc3577b3551d26eabf9
CVE-2024-29756,0,0,e77feac16a93aca73ccbe8dcfafacd1ca46e891f6b1a10023dff30a1bdc4c245,2024-11-21T09:08:15.560000
CVE-2024-29757,0,0,bd7783b6715cff85d146b7f3bcffcb931e226d2a557937fa75537c3d9b443b55,2024-11-21T09:08:15.743000
CVE-2024-29758,0,0,6ea6f820d39944c9f593511e726a4e557f489b72484f2be43d28f1260dec212a,2024-11-21T09:08:15.927000
CVE-2024-29759,0,0,c2dfb00f6e1bc85acc51fca4c87b232f29bacf43ab7fb57706676573571deb58,2024-11-21T09:08:16.050000
CVE-2024-29759,0,1,ab262c2b0ceec01043067092edae533e60eb44e1368d3e01b32f3eb36aaa261f,2025-03-10T15:50:32.850000
CVE-2024-2976,0,0,be906ae6792b8669cd4d4b057f3766fd4a8c9c37d055d1b85958a80dc6b656bd,2025-01-15T18:15:32.177000
CVE-2024-29760,0,0,b6b4a1298fc92b00b03e641bbbad2c77a5d04ee4c0cc356527f4971362ab1ed2,2025-02-05T15:41:03.623000
CVE-2024-29761,0,0,768c3eca5f21654a3a2565d24ad5040669ec8be99a6791320fd6dff74c94e8c9,2024-11-21T09:08:16.287000
@ -256066,11 +256067,11 @@ CVE-2024-29918,0,0,a57618c3fb51dbee6f018076fd6e632fdeec606ca829af7180033f4e9040c
CVE-2024-29919,0,0,ac098cacaad21d239504a2c5ebecf9b813bc711e379f46354a8c421b03e7425c,2024-11-21T09:08:37.187000
CVE-2024-2992,0,0,55bbd6115b2de17ac5872344f17f9eecdf8654fc7cbe39085e40803186207c8b,2025-01-22T17:59:00.077000
CVE-2024-29920,0,0,e35d088a188e6bfa8190741a74c74b247349ba8f715ee70eaaedc435c2232bb7,2025-01-27T15:20:38.483000
CVE-2024-29921,0,0,b9c2dd4a6ac014b1d80df166ec8cf95b75954206dfe5823ed81b4aa10da07d17,2024-11-21T09:08:37.447000
CVE-2024-29921,0,1,e972cc140ebce7d247cad524d991e101a8614910bacf9680d1c950dc8c3c8178,2025-03-10T15:50:32.850000
CVE-2024-29922,0,0,72dae7d1c92fd306a11a646a4720aeaa6df484efff05a113be2d239141b3f2fa,2024-11-21T09:08:37.560000
CVE-2024-29923,0,0,a45a81b524b42be32edcb85a652cac38dc1e978ac5963a2acd47db1d0bf7d066,2025-01-31T18:23:56.537000
CVE-2024-29924,0,0,87db3b1eae3eb35152f68099374a0e872521a82a8e807d284e44cf4cc7045f92,2024-11-21T09:08:37.800000
CVE-2024-29925,0,0,741a1b83114336e7e00db1ac9c4ad6c0646d7c9b5cba9cea2fe9d5d0216d43e3,2024-11-21T09:08:37.920000
CVE-2024-29925,0,1,3699e901e2f7d0ef83c4982ad0536627ef263ff0faa1926d70f8cf0af46976f9,2025-03-10T15:50:32.850000
CVE-2024-29926,0,0,8512e864b6381f2f50156ef75c9e441435b4f2442a0f43c3157889780e88cdee,2024-11-21T09:08:38.053000
CVE-2024-29927,0,0,b05c91b5a51ff0462c21cea7bf9fa4d2ff4eb7231a790e54cdf56b9b255b7c09,2024-11-21T09:08:38.187000
CVE-2024-29928,0,0,cae0001505e95b812c21633d98b96b15f5b908a7cd513a5258817260411218f4,2024-11-21T09:08:38.310000
@ -269153,6 +269154,7 @@ CVE-2024-47103,0,0,6771e67ef5c816d19656e97b7a1b0ea749558ddc5479baa3c972619b096bd
CVE-2024-47104,0,0,9f2e725614bb591f1dee85b094aedf7e5ce884d4ec064c7905e6916502af1c82,2024-12-18T11:15:05.763000
CVE-2024-47106,0,0,5ade2f3c5d39fefc0f00abff980ec9cc063f3a12c8a4e05c1472820e919f3997,2025-01-18T16:15:37.883000
CVE-2024-47107,0,0,cbccf574787d61b4f6ca0e02b243f9353763dfcf6f42da1d1ab7d0498a1d160e,2024-12-07T15:15:04.123000
CVE-2024-47109,1,1,d621b048b89fb1b4567be75db094ed14a736130d33d5ef97b3380b15a8306aed,2025-03-10T16:15:12.703000
CVE-2024-4711,0,0,e4ef71037ebae75f1c7783581ae71eaf15c6142551362f95bff0adb8f63f9b15,2024-11-21T09:43:25.710000
CVE-2024-47113,0,0,e4a4b7ababf2602f5329349bd99728f33e6592d940c12e395d7099b940e40531,2025-01-18T16:15:38.897000
CVE-2024-47115,0,0,7a7f36fd4f42315d6d6861efa2fa7bf95141b001bf20215444f270c56375d7b4,2025-01-21T16:15:46.587000
@ -273386,6 +273388,7 @@ CVE-2024-52899,0,0,fd381e4ffbd82c5c3ae3119791a451a008b2780104bd8e38b6962694cf0bd
CVE-2024-5290,0,0,63b2ebbbc89fe3009e69f8f9e716432542a09cc7bbb7656b9181d2882b05d010,2024-09-17T13:09:13.683000
CVE-2024-52901,0,0,36d188f2446e50c3cb0f73c4dc9bb8995fd68fc57b5b23eb83b9c2e8f4d32395,2025-01-07T18:16:58.680000
CVE-2024-52902,0,0,a3380a1085a80da252bc071d60beac51ec60c4709d752c512c4410d14d967500,2025-02-19T15:15:14.660000
CVE-2024-52905,1,1,765c4d3461973ee00d14a1e8164972daef69e62a79523827ab9c3d6fb99db084,2025-03-10T16:15:12.887000
CVE-2024-52906,0,0,431d94d1b8f33effe6649fec1d40fce02705d36efd5f14a5de5395492c85ff96,2024-12-25T15:15:07.470000
CVE-2024-5291,0,0,59cced621ba81a9183b7024bcfca25ce68853e845d2185c7bff426c187f3d943,2024-11-21T09:47:22.270000
CVE-2024-52912,0,0,de0cdb8e2800d5227d67a2b677bd337b1802fb96c19fe1ed635449a3093fb257,2024-11-18T17:11:17.393000
@ -273420,7 +273423,7 @@ CVE-2024-52945,0,0,2be5483c630004e32670c1bf2df159c2fc165530e70f2dd74d5a6bc11ca63
CVE-2024-52946,0,0,4f1dfe8b6d1ba4959015bfa97e83493e2bb850117484cc15efcaa811c3e03c50,2024-11-21T18:15:13.120000
CVE-2024-52947,0,0,2aee58f94b954efaf5164df4a8e601015dc1edc796a589e4848762e3088ebedd,2024-11-18T18:35:09.517000
CVE-2024-52949,0,0,696d0f2d9f6f32b8f638cc01e3ed01b74797e84c628afddbb0ec84c427c07fde,2025-01-29T09:15:07.317000
CVE-2024-5295,0,0,2396dadecb35968608e7faeb909b9c67144b6a2007cc474b7ce69341811bcf77,2024-11-21T09:47:22.707000
CVE-2024-5295,0,1,cb8a26708b9a9483332c374cb3e6212b16da1fe7bc9688d6cac0cf935ed4c53d,2025-03-10T16:26:06.647000
CVE-2024-52951,0,0,88467df47cc32548afc6312c57f27d2a7d0655e1c934e59eb5eeea7c6be506ce,2024-11-27T21:15:07.997000
CVE-2024-52958,0,0,98e92315476166e2b33ba1e5334b4d282532d45d1556c1889e5c3ca4b973b75e,2024-11-27T06:15:18.590000
CVE-2024-52959,0,0,ab868f6da3782d67cb53183f2f781a21b6375778bdbc1b7f5893121d76931881,2024-11-27T06:15:19.083000
@ -275909,7 +275912,7 @@ CVE-2024-57055,0,0,10985f4d1644c583934097b7ec50c1a0dc3d6cc9f218e4bbfca50a2ea6ce6
CVE-2024-57056,0,0,5fa1c6daac1c565c60219576528f65f5f288f5ab9fda6e5efedccb351b0ddf0d,2025-02-18T22:15:14.653000
CVE-2024-5706,0,0,f09a3fc0306ab86b2dee756b4e00346daa3fb01dc12c33d9d6fa100062bc19ae,2025-02-19T23:15:10.960000
CVE-2024-57063,0,0,fa7a06800dd5ee4856efd324c0da0c074e3f1d402ee027ea56f36ed882b9a139,2025-02-06T16:15:39.023000
CVE-2024-57064,0,1,953de44e0e36081baa7edf9e5aca7e1f0d5a9c1bb014163def16194452722871,2025-03-10T14:15:24.207000
CVE-2024-57064,0,0,953de44e0e36081baa7edf9e5aca7e1f0d5a9c1bb014163def16194452722871,2025-03-10T14:15:24.207000
CVE-2024-57065,0,0,c1726d0070358bb3ea68f84c317d5e2bb80148f08f590add9a090f23b534aa2f,2025-02-06T16:15:39.603000
CVE-2024-57066,0,0,9f715954ea971b4d1d25c40c38035cabc1d38fcea115ceb055b4b2227dcd1941,2025-02-06T16:15:39.803000
CVE-2024-57067,0,0,cd7e64784c62ad9238926b63024a621c822b21b9ab52f7c517976f23a99e2eca,2025-02-06T16:15:39.980000
@ -276058,7 +276061,7 @@ CVE-2024-57483,0,0,d80de86b8577cf6f4a0d95e5f2ea9968ae2b8769217aa4f6a37a72d077531
CVE-2024-57487,0,0,7babb41ac17147ce892708b7e46321375976a25b6830def13d44a67b1829677d,2025-01-13T20:15:29.090000
CVE-2024-57488,0,0,cab6b66e7059e8f245e671e69563c712386f2de2b58d5eb8328ea47276f13531,2025-01-13T20:15:29.240000
CVE-2024-5749,0,0,36203d1040051e343d9d050a3c2e3f863a807627eb7d14e1470ca394531f4751,2024-10-16T16:38:43.170000
CVE-2024-57492,1,1,10e896439ca628346bec3a93067f4ded767c2995464cfeec7f486da187bd03f3,2025-03-10T14:15:24.387000
CVE-2024-57492,0,0,10e896439ca628346bec3a93067f4ded767c2995464cfeec7f486da187bd03f3,2025-03-10T14:15:24.387000
CVE-2024-57498,0,0,3826c405fd29f665f0ad91bf9f453f7e5685abcd0e2ddebcfe40540a3c6b47f2,2025-02-04T20:15:49.423000
CVE-2024-5750,0,0,476ad6c00a3180d456740d0beb63c2959ea56c746a3fc254c90c1eef52867b01,2024-06-18T14:15:11.383000
CVE-2024-57509,0,0,c607c9da29bfb31a3cf0e4d4a7622a993cd72daf6b5f7b6cf0694edfad6158b9,2025-01-31T21:15:11.630000
@ -280524,7 +280527,7 @@ CVE-2025-0617,0,0,f628b1ad73170d04122e24ddb3e888ab06e1591d9b8c499515e522c90868af
CVE-2025-0619,0,0,d6798daeef3d7924598dddc8037e69d4ae3bc1784ffc6b426878fbbb52aa2ee9,2025-01-23T11:15:10.700000
CVE-2025-0622,0,0,e47fbbd3a3a716f89e6a5dc5e99d39a7414dccef8758c28db6b0464c5f5b2e87,2025-02-18T20:15:23.570000
CVE-2025-0623,0,0,341d910d0f0f4575e107592c92f38288f68e01fe716af21df488a6d82193e481,2025-01-21T17:15:16.817000
CVE-2025-0624,0,0,40e303d9d1190ea3151af079fa636fe8ad6f27eeabbce833afeffc52d49290f2,2025-02-19T19:15:15.120000
CVE-2025-0624,0,1,3681056eba6f8e69f21f0f32e34b0e25f0040c1cfb5977910e8e31a65b5cc762,2025-03-10T16:15:13.110000
CVE-2025-0625,0,0,9d9d3d8170b51d99a85dfc09422efdaffda47b5baadb8c85253715ce0dc062af,2025-01-22T19:15:10.397000
CVE-2025-0626,0,0,16ee263c85f3aad6f9b7c5ed60390a064032d53adec3f9f8437b4c73151fb8c7,2025-03-01T18:15:34.140000
CVE-2025-0630,0,0,bb04cf8ef857d76c3a37bf8a5fa23865f63bacce52c7cbeba321e37955a961c9,2025-02-04T20:15:49.940000
@ -280986,7 +280989,7 @@ CVE-2025-1378,0,0,d0208345267ae9796dcf80d03ba8ecbf2300d71dbaf402ff968e0ce73cff89
CVE-2025-1379,0,0,c44b0567f6d42e02494f415a80eeeac6ce86521e3a7c055a79a4396e3ddebab8,2025-02-18T20:15:24.460000
CVE-2025-1380,0,0,7ec337c9b7d3226eb945ee86e72b56068996db39674e4d48869c07d60e2a44ac,2025-02-18T20:15:24.560000
CVE-2025-1381,0,0,a7ba87fad7a72f1bffe925c9548fe9143d4d449a7f8ce12fa978a99f26accdf5,2025-02-18T20:15:24.667000
CVE-2025-1382,0,1,6828cf58229feefc6e7f3d6dc190afb77cac9728dfe9830d56239f20313f5b79,2025-03-10T14:15:24.567000
CVE-2025-1382,0,0,6828cf58229feefc6e7f3d6dc190afb77cac9728dfe9830d56239f20313f5b79,2025-03-10T14:15:24.567000
CVE-2025-1383,0,0,3d6bb558842041d82d621f422104cb5c9be368f9bc9ceccf69a42cab81d3fdb5,2025-03-06T12:15:35.937000
CVE-2025-1387,0,0,b80cfff8816a5a4c7344419c24985cf6849d91e56da599c269854d931b93688f,2025-02-17T04:15:08.807000
CVE-2025-1388,0,0,8e601c55f63d7c4a99175dca26ea6e765f5666baba3a63fcb66bd4e1e37a8c84,2025-02-17T04:15:08.960000
@ -281028,7 +281031,7 @@ CVE-2025-1488,0,0,36fbf18b75b2cce073f977d40194bcef308218e50fd3898ed63fe17e537331
CVE-2025-1489,0,0,3008549e3d2861f78796256b763f59eec371226dd4b84353f864c64443cf0ecb,2025-02-24T19:45:21.653000
CVE-2025-1491,0,0,2c68d92a6f55bf529fa37ef19f65078661a466e3bd99edb0dd7d2a7b0419f292,2025-03-01T13:15:10.750000
CVE-2025-1492,0,0,b9223b4db500ae771be5ddc029bc738cd0c9e1261ad47ff66314ecd9bf92d1b3,2025-02-20T02:15:38.553000
CVE-2025-1497,1,1,90854fa7e3b09cd5d856abdba5f87800c800071ff960a82a0b6f4abdb709fdd1,2025-03-10T14:15:24.723000
CVE-2025-1497,0,0,90854fa7e3b09cd5d856abdba5f87800c800071ff960a82a0b6f4abdb709fdd1,2025-03-10T14:15:24.723000
CVE-2025-1502,0,0,87e6960c6bf75cc8b1380ef7c7e3303ad768ae7a5699ebb71505f60154582a17,2025-03-01T07:15:11.183000
CVE-2025-1504,0,0,0caf0fe296ba3de7804662f98b8d86d33ae80da3d9d2ad938f31b1ae97694007,2025-03-08T03:15:37.393000
CVE-2025-1505,0,0,1355264158a2ba11ce2fd21a6bc45f6ba2c7a41beba2055617c8a72a80e67517,2025-03-06T20:21:36.547000
@ -281508,7 +281511,7 @@ CVE-2025-21106,0,0,f21695bcd3dc50ebb62318d228568a1613cd20d1a89ae6dcd1f4af03df1c2
CVE-2025-21107,0,0,0827735892f4001f988a0739aad719c8ee1fb9144fe1da312da1da34f24b5ce6,2025-02-07T20:01:14.760000
CVE-2025-21111,0,0,36449c466fabe660f3fc2f10d8992e6a7d9c5e3d2cf72d3dce2cc840c6da552b,2025-01-24T19:11:42.417000
CVE-2025-21117,0,0,3c59ddab13aed7617d82cbb9fbab3c190cbfe8b424cc570d2e879fe06ca6cee2,2025-02-05T14:15:27.417000
CVE-2025-2112,0,0,85227d11e81908281475abb4c87b58749be99c2e996f8b7b4c8c362d9654e82a,2025-03-08T22:15:36.443000
CVE-2025-2112,0,1,5f77149442171744809539a428d973ad03b97deb512aa66cd024b8d02805c91c,2025-03-10T16:15:13.817000
CVE-2025-21121,0,0,1697e078ff9a5405d9a543461696c63d50506a646e18e458652be622eb5556f4,2025-03-03T14:54:17.487000
CVE-2025-21122,0,0,969e44e0224fb47d95b87aed16b2a93d9ca09db3ac6fe7fd40cad9e935dc7db9,2025-02-11T14:47:41.453000
CVE-2025-21123,0,0,0be58033a62e1c138323b992604392193cd26a8c4f221072c6847ce8703ed4eb,2025-03-03T14:54:17.487000
@ -281518,7 +281521,7 @@ CVE-2025-21126,0,0,10ba9f2eeb85ed246290b21f0c7e73660020f9c493ce656be1411dab877e2
CVE-2025-21127,0,0,6ca3d8cc02cdac3fbe512e4c8a13fe7008821b139ef240ca0adb0f0fb4680f8f,2025-02-11T14:55:09.333000
CVE-2025-21128,0,0,40945503866b9130c6c67e813bc72623208ffdfcd3f68f3f78dadfd34ec95930,2025-01-17T20:37:35.437000
CVE-2025-21129,0,0,e461eb72d0798775b4431b992e70379c16a549ecff183ae810c30304f7444aa5,2025-01-17T20:37:33.603000
CVE-2025-2113,0,0,198321c4bb2a71e92e596335b1432beb230188aac734caad5bf90de063af4008,2025-03-09T03:15:34.137000
CVE-2025-2113,0,1,55e1dec71d2842289ae725e7d4fc3d818c9d71c23afdeb77399d187fae7ae311,2025-03-10T16:15:13.950000
CVE-2025-21130,0,0,0a403dcee067b476ce6e2b56e8043f657d644fdd57d4c6dc048a515a53142fc0,2025-01-17T20:37:32.137000
CVE-2025-21131,0,0,bd9947447c6eaa1cc16f247aee5cb76a0ae540007c1234492add7170f98e9ee8,2025-01-17T20:37:30.750000
CVE-2025-21132,0,0,638462d9be187051a18a689c12e2e1ce1ddef5c76aec080f6deef373f9d944d3,2025-01-17T20:37:29.347000
@ -281530,7 +281533,7 @@ CVE-2025-21137,0,0,45139b02243d4b1da14a9edb94333c11b50a8560016fecd32028ca2a6372f
CVE-2025-21138,0,0,9175fd36c28710bcae9acb351f078e58c4e36962afaf9695ab07299ddfe97cfb,2025-01-21T17:49:57.513000
CVE-2025-21139,0,0,2997f9c80c926e4a0ccbf0529ea4d9ee2a8d2178744e4927ee6a077f342903ba,2025-01-21T17:50:10.023000
CVE-2025-2114,0,0,742b040392533f1a6cfa6d341fe3374fa2ff12cac643030e695f2a5f5d08022a,2025-03-09T05:15:30.270000
CVE-2025-2115,0,0,3021382c6741742138519b90c1ecc2ab1d1b6fcce8a4cc71b5453ea52ab138e8,2025-03-09T06:15:11.933000
CVE-2025-2115,0,1,fd18299636ce5f2bc38c51cf068829a7894b4fdfa24622983bc2f76959b52834,2025-03-10T16:15:14.147000
CVE-2025-21155,0,0,3b730fcf3884ebe69fa3cb10c79d458749d35e3fdc22e4031b3aa2f27e975e38,2025-03-03T16:52:20.953000
CVE-2025-21156,0,0,27b960f0b5b6864477f57a25e5df52b68937946efa0b6d1473b660f8b7066f80,2025-02-19T22:54:41.513000
CVE-2025-21157,0,0,dc11ff4b6b9e18e8b723fd7cd41934447880c05424133b5ef5cb6054de515224,2025-03-03T14:54:17.487000
@ -281564,14 +281567,14 @@ CVE-2025-21190,0,0,8b2db67cb947998b5b47f9d8f9638f01b53bd9f51551def40a37a7298cc49
CVE-2025-21193,0,0,f3dd779a9a437e46fb9f30ebcb1d8f684dbb5bb54fbad7b1b2971d455cbeaf6b,2025-01-27T18:42:17.480000
CVE-2025-21194,0,0,4cbf78ebc8712bf991c571b0aba8e62887ba280acbf4ff53a1e72f262be2e98d,2025-02-11T18:15:30.820000
CVE-2025-21198,0,0,409f66843b554eefbda1b14eaef7f0d6b61447a101bf7413282917ca002ecb4d,2025-02-28T16:02:50.353000
CVE-2025-2120,0,0,b533d65276850c88a6f68043d3c7cc2b8e635bf5331a78cad5aab688dffba10f,2025-03-09T11:15:35.023000
CVE-2025-2120,0,1,10248c9048201befa4f8181190c48cf1217aeca23433be817032d43a13b2d918,2025-03-10T16:15:14.347000
CVE-2025-21200,0,0,ac452cf5d8fd7ee078abc4bf9e8393b61bfd7da4b4c1364b02d5f65241a430a0,2025-02-28T16:02:50.353000
CVE-2025-21201,0,0,33cb4b63d3221b6237489bbb3ee9e268d6b471a2dc92fe795430f2b500e3c69e,2025-02-28T16:02:50.353000
CVE-2025-21202,0,0,ec4260bee4bd33c21d930aa9c88a20abd99a3045b6128e76b4237cf160037447,2025-01-27T18:41:27.647000
CVE-2025-21206,0,0,30db180b922f51f20ac3dc612188bb7e771e65f4b8b0475b70dd344d2e79140d,2025-02-28T16:02:50.353000
CVE-2025-21207,0,0,101f5aedceeec8e95c7aa4d154c4fe35b53d1787f61e5e9c69598a5be6aa3415,2025-01-27T18:41:10.137000
CVE-2025-21208,0,0,d6750a7a531b1a606c0d78d60d369b1fb895e79f9d7f1a5bd19ef4a9dbb91db7,2025-02-28T16:02:50.353000
CVE-2025-2121,0,0,5f6e6cafc8b053796282a2422f8f4ad4175988241f629294d1d4fcda459a8172,2025-03-09T11:15:36.647000
CVE-2025-2121,0,1,814899ae1d2eb84af8f25b992b134a50db8489b80b4a7974f517d4d245bd2b9f,2025-03-10T16:15:14.483000
CVE-2025-21210,0,0,c84a831bc35a18a87ded790fe8b815dc0d44394e8c6c6597dc3d56e3ec20caba,2025-01-27T18:41:01.470000
CVE-2025-21211,0,0,50fa81ea05a4c3005f4b83063356d13451968ba8d4fc749bb0a7fe76cb440e94,2025-01-27T18:40:51.233000
CVE-2025-21212,0,0,c3cf3d27935b08b1f99386820b4127d20504a527c2595f60d30d4416e217289b,2025-02-28T16:02:50.353000
@ -281582,7 +281585,7 @@ CVE-2025-21216,0,0,45d1d7bd112ffc38f5b77d54190bb31c57f5b75d109c891f1f43e2ff5b3e1
CVE-2025-21217,0,0,2a656e5f5fc07b78fa6836e5f8dacc4b8751a0a02e8cf075d2e4f1e57fc95b19,2025-01-27T18:45:20.030000
CVE-2025-21218,0,0,d47e4e79318ebd737fa658b56f12e5fb3e30018465210b7af2b0de06c0f4fa6e,2025-01-27T18:46:14.487000
CVE-2025-21219,0,0,424604839da721e4da825bd88d64a2416b0606f77e8b9a1190e69289c7bcf87d,2025-01-27T18:45:30.370000
CVE-2025-2122,0,0,693427cf7568fa096eba73cae872c6c4016e2931d02b54a434b5570972dee040,2025-03-09T14:15:15.430000
CVE-2025-2122,0,1,290547752a470d8da206a92c3e8e3368775c5b89590f8d1ea4998fa5f87483ca,2025-03-10T16:15:14.617000
CVE-2025-21220,0,0,82564910421308f385255df4786cde1003db7381c932ced5ca5e270285456183,2025-01-27T18:45:48.310000
CVE-2025-21223,0,0,60b46abe07e24569b5150fc60453c8604d1695be1750a046f165ca749c1035bc,2025-01-27T18:45:59.727000
CVE-2025-21224,0,0,e06076d4b37df15b101a61c764231d733771a75106b77973898a9e88711a2e24,2025-01-27T18:46:27.673000
@ -281591,7 +281594,7 @@ CVE-2025-21226,0,0,2f5f6ccc39acdfb2b7cec30e176e0e2f1dc141d4d0fd55d9540bbaff25e2e
CVE-2025-21227,0,0,e74cc881cc3f14638775245e0247523b50d3fe8f76ca0a79bf3911d59cf7d8a7,2025-01-27T18:47:16.717000
CVE-2025-21228,0,0,e66ffb1cd2f0c8e69939717342c89b3e470530ed77fe35b7d613be20fb5699e7,2025-01-27T18:47:27.603000
CVE-2025-21229,0,0,5b9d343c3675c785c1883befc5d74a71c8b6d41d9e72125678b91a16a5f7065e,2025-01-27T18:47:37.697000
CVE-2025-2123,0,0,4acb0fd53b16a2ca153ab60669e2444368e4297661d2e9c1e10749c06973c268,2025-03-09T15:15:36.413000
CVE-2025-2123,0,1,c1cf101a0a7411e29877dcdb4dc40119fa11040be147bbffa0b70d523e6b6fb2,2025-03-10T16:15:14.740000
CVE-2025-21230,0,0,bf3028f0f96a246b5ecbe951552b973bc02e0b51e420392170a1dd03d48b14e3,2025-01-27T18:47:46.557000
CVE-2025-21231,0,0,d044bbfe2f119bd723d5344cae8147732c3ad7961b5471c3a188b0d47573734f,2025-01-27T18:47:57.930000
CVE-2025-21232,0,0,23d68831fa0a23eddcf0b6ecfa974d8fa3f8ae535f8e37868367b2a8f7dabf73,2025-01-24T21:51:59.700000
@ -281665,7 +281668,7 @@ CVE-2025-21296,0,0,e6a1c9957561caf3c08496803c0d30c1ebf34930666c8fe32257ce9086419
CVE-2025-21297,0,0,3ab7b3c14f4caef771a6720deb6e250b1f436927d02f1b51343e4279e8f230d4,2025-01-24T21:48:42.703000
CVE-2025-21298,0,0,8777cfa0600445139c487075d5ab0c735aed30e39ea02043ecdccc9440939232,2025-01-24T21:48:49.880000
CVE-2025-21299,0,0,f36898ed7a072fb1bf3a66d319990cf8422e046997a77b84517942b1fed08dc7,2025-01-24T21:48:59.153000
CVE-2025-2130,0,1,0bccc294ae4c7277db16e5f25761dfe7003a8b93b93bc32794e22ed216503a7a,2025-03-10T13:15:36.090000
CVE-2025-2130,0,0,0bccc294ae4c7277db16e5f25761dfe7003a8b93b93bc32794e22ed216503a7a,2025-03-10T13:15:36.090000
CVE-2025-21300,0,0,37096ee2a4f954708906e2afd28314e98d8e4ab0c7ac8239b74c189373571d90,2025-01-24T21:49:29.857000
CVE-2025-21301,0,0,8953ad23567d52390e15e46d491856022afaf971fd601bd1a6ce8eed1c3fb533,2025-01-24T21:49:37.347000
CVE-2025-21302,0,0,884c6727a46036a58204ac04a3b80c31d9ebeb9d1b7ece8a19fc57a9180b92a6,2025-01-24T21:49:44.423000
@ -281786,9 +281789,9 @@ CVE-2025-21419,0,0,acdb4d37a32faa1cb0f65f0fbb7358475e2deb811438263e59eb8f6bcbeca
CVE-2025-21420,0,0,32a7e46f27d290c0e9a5b92e079c0424752a30e3cfa9e5d424062d7af6a66d41,2025-02-14T17:36:09.683000
CVE-2025-21424,0,0,8c4f3ff08fcd2bbfe99cfa90d5ebadccaf543f677e49ea14cef06557001215f9,2025-03-03T11:15:15.810000
CVE-2025-2147,0,0,ddb9ff2fab6cd02e2e5f72966eefcef9573206f3b8726de0ad1c2dc97e3bf31b,2025-03-10T11:15:38.157000
CVE-2025-2148,0,1,044dbab7d85177210c4ce21fe6d78c39f65cba21b3badcb532281dd68c41cd84,2025-03-10T14:15:26.130000
CVE-2025-2148,0,0,044dbab7d85177210c4ce21fe6d78c39f65cba21b3badcb532281dd68c41cd84,2025-03-10T14:15:26.130000
CVE-2025-21489,0,0,5d30c3b0acc3ddba1057df1a4f29e61d74be0ae611271efb1a2a3c05a60a8cda,2025-01-23T20:15:31.630000
CVE-2025-2149,1,1,b4a773eaaab877c4f2b815b6535ed9f8605593addcfe0315bf3b854bf7fc9635,2025-03-10T14:15:26.267000
CVE-2025-2149,0,0,b4a773eaaab877c4f2b815b6535ed9f8605593addcfe0315bf3b854bf7fc9635,2025-03-10T14:15:26.267000
CVE-2025-21490,0,0,7a3c0e9682e0e86e8a6979b8cc982eeb2dbfde70e212f3862711014520efbfca,2025-03-01T13:15:12.020000
CVE-2025-21491,0,0,6076cb457888ed12bac407cf717ae74e21970b3745c710f624ec3aea8e6322c5,2025-01-23T20:15:32.030000
CVE-2025-21492,0,0,175b05e4b6021ea2e9dabd82cb14ca0549d088227dfc44490c43cf779c0afb04,2025-01-24T20:15:34.390000
@ -281809,7 +281812,7 @@ CVE-2025-21506,0,0,b15a082cfb9b642182fa216ca2dc935119f2b7ff1700f5c5b40e9db4cd530
CVE-2025-21507,0,0,3c4d97b7a000801ae327a1e1ce8c0533b2db78864da71a309a9bca7bbf1def04,2025-01-23T17:15:24.297000
CVE-2025-21508,0,0,77d16baf9f8d14a680d396801ee4bbaa43bfb9b28cfbcf88a906be04f5238cd1,2025-01-22T19:15:10.767000
CVE-2025-21509,0,0,21a812b786cc6eba1f43d96ae439efec57e46377f98df4f2aa400b62d6b5770d,2025-01-23T16:15:36.777000
CVE-2025-2151,1,1,2642347f7015da9366ea3f56ab8d3eb281d14b395fa9bff7b08358d25b2cd514,2025-03-10T14:15:26.407000
CVE-2025-2151,0,0,2642347f7015da9366ea3f56ab8d3eb281d14b395fa9bff7b08358d25b2cd514,2025-03-10T14:15:26.407000
CVE-2025-21510,0,0,a9d4ed31cacc6780a953598023a9516bc432ebf53a4d880ebf8bed4d05eb13a9,2025-01-23T16:15:36.937000
CVE-2025-21511,0,0,a53b91609f0dde5b99ec85ee5e2f3015ee303e4f60a7051aed47d398a1b562cd,2025-01-23T22:15:15.583000
CVE-2025-21512,0,0,4eee0786dd6533099e7bc79f41166620e0d69b15829df1bc0a8a9db2b8b193d5,2025-01-23T22:15:15.720000
@ -281820,7 +281823,7 @@ CVE-2025-21516,0,0,1bff2e6fc2e4a75f5082374868c71f556093e04406da8a3f368eb942875b3
CVE-2025-21517,0,0,e6ce3ce90dfd2ca78ff83027905b529bbb9ea13ec96e6c8775fabfa89270d8d2,2025-01-22T19:15:10.990000
CVE-2025-21518,0,0,c9eaf260be716880ca796fe981cd87022ab8a92ceab0d36a88ce6c5ee05c86d3,2025-01-22T19:15:11.100000
CVE-2025-21519,0,0,953346c50dbdf4cef12c3fa84206e07ea88eb4d2d7232205446bca84001fdd28,2025-01-22T19:15:11.213000
CVE-2025-2152,1,1,096dd2ad4182fbc5ef9396ff42d68273ad11da7e0da3dbaaf09fc83b9a6516fb,2025-03-10T14:15:26.543000
CVE-2025-2152,0,0,096dd2ad4182fbc5ef9396ff42d68273ad11da7e0da3dbaaf09fc83b9a6516fb,2025-03-10T14:15:26.543000
CVE-2025-21520,0,0,a8393da1f727381379437de45c567aa2d807597d28fb46c2d614246a56f4d998,2025-01-22T19:15:11.340000
CVE-2025-21521,0,0,82cfbde2abe5d368e7cb3292856c6e197483ce94c21f4c3bf7942fb0fa7e28fa,2025-01-22T19:15:11.457000
CVE-2025-21522,0,0,cb66a3c1d1dfcbcb008084ba6cf867c8acb6791563e88e0edf7750492de7f060,2025-01-22T19:15:11.577000
@ -281831,7 +281834,7 @@ CVE-2025-21526,0,0,fdac7cf5aa22219ce3d30e2931ce86c3afca18afa9001cd9d592ceb99fd98
CVE-2025-21527,0,0,fe6e17ba8c4f9cbb7443f4ecebffc8123cb250add87fccb4e7a78b1549e18f3c,2025-02-04T16:15:41.537000
CVE-2025-21528,0,0,e4a89dd052a14e910c273cde2b54814a4717a3a651bc8b5657a5be581524c187,2025-02-04T16:15:41.670000
CVE-2025-21529,0,0,4c7a012163f04cc8de95049169013b919bfdfb658a06c133c7cff3a918912f76,2025-02-18T21:15:25.577000
CVE-2025-2153,1,1,32dc3c49aa710a9f787bb344b252aa19f9b37bdd01841ef27bce990fb70fb5c5,2025-03-10T14:15:26.737000
CVE-2025-2153,0,0,32dc3c49aa710a9f787bb344b252aa19f9b37bdd01841ef27bce990fb70fb5c5,2025-03-10T14:15:26.737000
CVE-2025-21530,0,0,aba8a6aa74e189f13322985a854d7fce1ce0609f6c2ff755aa082cda64c94c2c,2025-02-18T21:15:25.703000
CVE-2025-21531,0,0,a10f6ce71dcae33c91ea0d30cb2042611ddc0c276623a2f99632cda89a3d9a70,2025-01-22T19:15:11.807000
CVE-2025-21532,0,0,24d283ebf9e83eedc77bd765fab01c9d1c1c0ad92a193cdae6d8f4a7be52dad1,2025-02-18T21:15:25.820000
@ -283947,6 +283950,7 @@ CVE-2025-25361,0,0,dd0fd4c24b78008e91609d0ad78fcd088a6f876ce651fa9ebadb9ad2df525
CVE-2025-25362,0,0,9cdfc22f6fba81a660a23fb14358e78116e49805e8504ef86ce8786368248ff5,2025-03-06T15:15:17.277000
CVE-2025-25379,0,0,10c6b59b7ced1a65c44b725df73613b964204bd8bcc126008f75da9f2d8ec909,2025-03-04T16:15:39.433000
CVE-2025-25381,0,0,1a2bb06e970af8252b42b35cce67724a6bfba5c092f06ed50d25977950572c1a,2025-03-07T20:15:37.850000
CVE-2025-25382,1,1,f4d7357828629f0991d4a631820157d6dc805fb951d13516fbb79d6f3367f88e,2025-03-10T16:15:13.393000
CVE-2025-25387,0,0,8227bd6f57bafc5fc7f8bddfd6ec6a78dcca117ca404c22469842eba5d4e306c,2025-02-14T17:15:20.393000
CVE-2025-25388,0,0,e086cda7e4e5c05ccba48ad30906fb7e59dedc66fc1b83e5645bd434397a431f,2025-02-13T20:15:49.730000
CVE-2025-25389,0,0,c4fa8037812de3d612838c95ec3fcc9b936e3b28bc2aa3e854f709efa62e78c8,2025-02-14T17:15:20.663000
@ -283998,9 +284002,11 @@ CVE-2025-25604,0,0,7a8cc3234dfcf2fd463e6a54d1695816511ffd986519d0bafcb53e4f83d30
CVE-2025-25605,0,0,c0858a3094cad59e4cf6248dc23b2aa0633fe28bfdda9aca36970755a7dbfbce,2025-02-21T21:15:24.317000
CVE-2025-25609,0,0,266dd94a110ece3c3e14be6241a6b4dfd9dca67d8afeac437f4e4e876c6d5556,2025-03-05T16:15:39.460000
CVE-2025-25610,0,0,fe8057df3f08f41d60fe1ebc6a06e1b6051f3d9bb1f1a3b3ed10e5a9eef74dbc,2025-03-05T16:15:39.623000
CVE-2025-25615,1,1,986bdae7b0adb7aed092d2b5d085e2ba1027ce1007b67de14c453c095ac6733a,2025-03-10T14:15:24.960000
CVE-2025-25616,1,1,ea666550f20d27aba2fe037670d1f7afca9196f806e53b0b714782b8fa677d6a,2025-03-10T14:15:25.097000
CVE-2025-25614,1,1,c675990c7d380dd61a91c4658854dbebaa65b350bca03a6e567ad85dbe4d1974,2025-03-10T15:15:37.330000
CVE-2025-25615,0,0,986bdae7b0adb7aed092d2b5d085e2ba1027ce1007b67de14c453c095ac6733a,2025-03-10T14:15:24.960000
CVE-2025-25616,0,0,ea666550f20d27aba2fe037670d1f7afca9196f806e53b0b714782b8fa677d6a,2025-03-10T14:15:25.097000
CVE-2025-25617,0,0,aadd1592880ad6d511d461bb2e93fc58cd011b7a0023bcbd3ae23df0a4c6c5a8,2025-03-07T18:15:47.840000
CVE-2025-25620,1,1,c97dc91c74c9312565adbd3deb243defc9e4012573757fad1b98f7080f6f489f,2025-03-10T15:15:37.490000
CVE-2025-25632,0,0,fc07c1c8054a4d9104d3986b5c4aae35472ab79903ea3550918ece4e63e78a9f,2025-03-06T15:15:17.770000
CVE-2025-25634,0,0,c65724cf9c9f8a6f5918311d4cf2659bb1ddbd0a8ea6bef01873f68d34182505,2025-03-06T22:15:35.290000
CVE-2025-25635,0,0,0db247b70226e51b14344c6fcb3514df042659a07d0da107baaaba8517f711fd,2025-03-05T16:15:39.793000
@ -284076,6 +284082,7 @@ CVE-2025-25900,0,0,0a49592be1d696f5f901fb9602bc587e2d7d2fe0e68d036d6f9f545c33b03
CVE-2025-25901,0,0,dbbaa66456410cc814c13398a9419347a95d4c008549889e82c9e08064439afb,2025-02-20T15:15:14.380000
CVE-2025-25916,0,0,91ba974117f22dab8d3678a8beecd3ea90efc52e588600708e1af441e5e35add,2025-02-28T16:15:39.867000
CVE-2025-25939,0,0,7dbd849d533c834d2205e6078f0487c45587eccd9cff67e78aa1acfe6cb8ca0d,2025-03-06T12:21:35.360000
CVE-2025-25940,1,1,f334f2d66750e54c404e803d4cea64ae4d9a0e34417258e5cbd6420f47db59a8,2025-03-10T16:15:13.520000
CVE-2025-25942,0,0,abb06ac2462106029cbb8bb08119f5129d89323ab66d1de7f80d7b48f0130201,2025-02-20T15:15:14.587000
CVE-2025-25943,0,0,ddbf4f2120cdf8c0c6ec76a602b8a3405d44d5883b4cc9347335166be4d0cf63,2025-02-20T15:15:14.743000
CVE-2025-25944,0,0,ddbe030374d7cbb79a7eeac3a7fcb4800d8524e9c1e33154d3a9a0836431ffdc,2025-02-20T15:15:14.900000
@ -284094,6 +284101,7 @@ CVE-2025-25960,0,0,f81f6a42cc37f50d144da0c1d5b21881b06cbfd074736b0e8bb6bc8c20ba8
CVE-2025-25967,0,0,81784ba9feac0723a167c707a9320ff214d739b74a7e612ad514cf55aca18698,2025-03-06T12:21:35.360000
CVE-2025-25968,0,0,aa03a40375072b5ed2e0cc97eadb8b6a24b2d3fca5df43f3cc84fd5f8cf62db9,2025-02-20T20:15:46.993000
CVE-2025-25973,0,0,65ef8616835d158faacedce49a052fb547828e3d5a16eaa3b291d668b6b798cd,2025-02-20T20:15:47.153000
CVE-2025-25977,1,1,bb550a41eadbb916b3aa5352e596b02014414ea85adec399ddf53ebef816beca,2025-03-10T16:15:13.633000
CVE-2025-25988,0,0,2e4eb2e7125515f27fdfebdfe00a0ef8ddea99213605fc21d44aa06160606890,2025-02-14T19:15:14.497000
CVE-2025-25990,0,0,8b2b3adef615c73806983235252325f570b2dccda1b7c0643592bd465b468928,2025-02-18T15:15:18.790000
CVE-2025-25991,0,0,5e1156693b620548738bd3f03c659034c8fa7558a7d1a0f45f9ae1ea86e44f07,2025-02-14T20:15:37.210000
@ -284238,14 +284246,14 @@ CVE-2025-26586,0,0,2995618efb5bc786b623a073068ee53ca10ebf5a6af434abe477283701f8c
CVE-2025-26587,0,0,f182d8db53652dc68c3e8d08c04a29d1ba7ae50e8acecec3dbde839e0907bec0,2025-03-03T14:15:55.780000
CVE-2025-26588,0,0,bd02ba233979579f3c8028618005b5c036f8e9bb2db4aabcd7a57c2127440863,2025-03-03T14:15:55.920000
CVE-2025-26589,0,0,bed434e05d708700c2c5a6b977f599fcc267a2dd10919cb423bc182a13c41191,2025-03-03T14:15:56.067000
CVE-2025-26594,0,1,d618d3159198035f4c79737d60d96ff48c2aad9af54b6050c7c5f3cc12f98161,2025-03-10T13:15:34.970000
CVE-2025-26595,0,1,ccae3fc673379b44596456fc8c1caec7a59cf981261dc5d5f3f2f9164c498554,2025-03-10T13:15:35.167000
CVE-2025-26596,0,1,6d98e44d6894315f0df1b0aa38222986b9b35a0c5b1ec7644cb496630702d67f,2025-03-10T13:15:35.303000
CVE-2025-26597,0,1,f9cce4bde71a81f02f3cbf7413bb0adef7d573beb8c4c613092191c7b061fe03,2025-03-10T13:15:35.443000
CVE-2025-26598,0,1,4a99aa27f0c718493fdbebb795dd472db1c66382fd5545cf203cec47a6c2fddf,2025-03-10T13:15:35.573000
CVE-2025-26599,0,1,18f82eb3fa1037384d1df74e0e45289d05da1e59a91d83828a83c371acac2edc,2025-03-10T13:15:35.703000
CVE-2025-26600,0,1,4caa95a8d7401ee9a10363b3b7215080e841ee2250232967f67255c6a349af74,2025-03-10T13:15:35.837000
CVE-2025-26601,0,1,4de27db3202c380c106512d04a2639bb6587a2689b12d91eb7fb082ec09eeb7d,2025-03-10T13:15:35.960000
CVE-2025-26594,0,0,d618d3159198035f4c79737d60d96ff48c2aad9af54b6050c7c5f3cc12f98161,2025-03-10T13:15:34.970000
CVE-2025-26595,0,0,ccae3fc673379b44596456fc8c1caec7a59cf981261dc5d5f3f2f9164c498554,2025-03-10T13:15:35.167000
CVE-2025-26596,0,0,6d98e44d6894315f0df1b0aa38222986b9b35a0c5b1ec7644cb496630702d67f,2025-03-10T13:15:35.303000
CVE-2025-26597,0,0,f9cce4bde71a81f02f3cbf7413bb0adef7d573beb8c4c613092191c7b061fe03,2025-03-10T13:15:35.443000
CVE-2025-26598,0,0,4a99aa27f0c718493fdbebb795dd472db1c66382fd5545cf203cec47a6c2fddf,2025-03-10T13:15:35.573000
CVE-2025-26599,0,0,18f82eb3fa1037384d1df74e0e45289d05da1e59a91d83828a83c371acac2edc,2025-03-10T13:15:35.703000
CVE-2025-26600,0,0,4caa95a8d7401ee9a10363b3b7215080e841ee2250232967f67255c6a349af74,2025-03-10T13:15:35.837000
CVE-2025-26601,0,0,4de27db3202c380c106512d04a2639bb6587a2689b12d91eb7fb082ec09eeb7d,2025-03-10T13:15:35.960000
CVE-2025-26603,0,0,8ae2812ccc436075652a92b78482e86bdfeb5a0aad1aca77b0c194e6b06d7b51,2025-03-07T01:15:12.700000
CVE-2025-26604,0,0,720d50d971a81c5950fb5a1fe6bb95e5177eb2f3df88a35c072c70e62f5cf12d,2025-02-18T20:15:33.003000
CVE-2025-26605,0,0,fdd668972bd6651dbed3cd9f902a3b8b59140c82d14f8fce08f437a28193bf96,2025-02-18T22:15:19.387000
@ -284308,7 +284316,7 @@ CVE-2025-26803,0,0,407dfdf36bb29c1169c55a1bdf56c2857dbd1f6059de4d7853e727c76548a
CVE-2025-26819,0,0,265b05b0b6b085ef27d0e218dd5a0f79b1864b8a6c0004a23e6fa9575a3cdbeb,2025-02-15T00:15:28.510000
CVE-2025-26849,0,0,b01e97de5d13c5e322817bb01db0ae13a4e34f402b7f75a8f8b8da54efb28ebd,2025-03-05T04:15:12.367000
CVE-2025-26856,0,0,7824298cfc11aa81d23219a23487dd842dd5c11d44f90723ef1786188c90cd64,2025-02-20T06:15:21.673000
CVE-2025-26865,1,1,0e99f178191a1d25650bf48cec6b7aaf006874831e9998c13673326106b5c9d6,2025-03-10T14:15:25.220000
CVE-2025-26865,0,0,0e99f178191a1d25650bf48cec6b7aaf006874831e9998c13673326106b5c9d6,2025-03-10T14:15:25.220000
CVE-2025-26868,0,0,cba4f0d0c27029718e2b50a126041299a77ea3636d837c9614e50e9855b0878b,2025-02-25T15:15:23.903000
CVE-2025-26871,0,0,ab850536250644e42a3ba5d883350c3eff02f87d1e660abd32733c03a6449348,2025-02-25T15:15:24.040000
CVE-2025-26876,0,0,951eb7449b154de578d3128a59b04224fb75a7c7aa4bcfeca0a4c24d809c64ec,2025-02-25T15:15:24.180000
@ -284329,11 +284337,13 @@ CVE-2025-26900,0,0,059a3c3ee3ee2a5a8549e4b2d083087d5d389f3b34374b636a32cc0884702
CVE-2025-26904,0,0,cab9a4c8649e54f1340a29bbdf14f52168b5cc51065c592884d99916bd742bf3,2025-02-25T15:15:25.990000
CVE-2025-26905,0,0,3fd420b5cf6d35f2394ffb7c8b96279ea5b6a88032aa4ac13abb160d4bcc3b89,2025-02-25T15:15:26.127000
CVE-2025-26907,0,0,12cbcc5c8b9c8102e25a8b6b26b7cf51a11f16a102e0d9c393e6b591cd6460db,2025-02-25T15:15:26.263000
CVE-2025-26910,1,1,4dd8ff18e0ceed65e66990b8d198f071259fe37bcbce427ec021ca038a8b4226,2025-03-10T15:15:37.660000
CVE-2025-26911,0,0,69bc9028618de684f0fd93e47f869e941f72b06df9e8d8d5b5d7c83ef9d05729,2025-02-25T15:15:26.393000
CVE-2025-26912,0,0,e79b24db34788e23307e263a850245edf07e94d4a7f854cf9650116a3ca5b4f5,2025-02-25T15:15:26.530000
CVE-2025-26913,0,0,6404f4027080b1b189a02d4823943b3cde1c26a6a1695b9a80537c5a912ca3cc,2025-02-25T15:15:26.663000
CVE-2025-26914,0,0,e8e50bb802b33c4b312da6233f8df7199b76a4f553414230d6e4d4e0415c258c,2025-03-03T14:15:56.500000
CVE-2025-26915,0,0,e63561d7adcf992fc96846addce01208e0fc68636cda02f3f3ede272653e6e46,2025-02-25T15:15:26.793000
CVE-2025-26916,1,1,c4eb40a7c438db2a0841bf5dfe4e66f1b955790d3c50ca241216d4ff7c7a6139,2025-03-10T15:15:37.830000
CVE-2025-26917,0,0,c1097030fbcc9b94d267c252ddacbb859283ed99e922157cf435c49676b50741,2025-03-03T14:15:56.640000
CVE-2025-26918,0,0,23788357a0b6dd77631565c9d4f3eb930266dadf051f40a3a97eb14cd9ad37b2,2025-03-03T14:15:56.787000
CVE-2025-26925,0,0,d5e509c3100c8df66ee25704b916843165e5ea195a85927b6d7f6a9a10386673,2025-02-26T14:15:11.743000
@ -284341,7 +284351,9 @@ CVE-2025-26926,0,0,46670274056f543a2d8d831b8a506aef43cfadd1396d409b955b63f1e76e6
CVE-2025-26928,0,0,861f1ddc85c79a1a8d63021b4a752a7980136fff79059fb765bfdd66a75382c5,2025-02-25T15:15:27.067000
CVE-2025-26931,0,0,7680a16e5e4bc5cb7d571ec7522e8eb1da81a45543fb23fce8deb347b9f39cce,2025-02-25T15:15:27.200000
CVE-2025-26932,0,0,30e11ffe0fff9feb38697cc84d4135950611987600314e1279c1b8624ccdcf60,2025-02-25T15:15:27.337000
CVE-2025-26933,1,1,923c4c91aeec786aadd94fb7553873b1b9d45a3b48f857802839df0fbfee89b3,2025-03-10T15:15:37.997000
CVE-2025-26935,0,0,9a8d29558b30c8784ffd5f723fd7b9a597b88af12b658cf1d4aa9a2c8103a0f0,2025-02-25T15:15:27.470000
CVE-2025-26936,1,1,9d27fbfa1037e1a88a13f73270560d903b33ee9cc86389e8ebcad3245eccb6f5,2025-03-10T15:15:38.177000
CVE-2025-26937,0,0,fed4f7fb03e7e7397a66feffa07ed44235873cf8d6e3b0b63bd6710ca35b749c,2025-02-25T15:15:27.607000
CVE-2025-26938,0,0,ccee8025a5da0f5335768772061878090bde7e99bf569f115b93a00b9aeb222e,2025-02-25T15:15:27.747000
CVE-2025-26939,0,0,58ae7bfaf9694ba77b15898e6615a5486bcece1885e349ca30dab005e95021c4,2025-02-25T15:15:27.883000
@ -284549,7 +284561,7 @@ CVE-2025-27622,0,0,aab424c81f70efb6c2294313600d100f64e720f683885d3b6918b7e0d0c95
CVE-2025-27623,0,0,a7729605ea601dac947d3c9e9dda3f4cf0fc759f67e3d847999a08d4d426400f,2025-03-06T17:15:23.647000
CVE-2025-27624,0,0,386e769fd54c9c9e387001be90fa20a8140740d08fb61eb8c2dc8cbb750364f8,2025-03-06T17:15:23.797000
CVE-2025-27625,0,0,85889be78be476b146c5fda687cdd2b7a01a613eea674a60ada7a9651223e2d5,2025-03-06T17:15:23.960000
CVE-2025-27636,0,1,849e19f2691277a859aa7da4d64efd370cf0e46649cf02a26e8308d80bdb9f11,2025-03-10T14:15:25.827000
CVE-2025-27636,0,0,849e19f2691277a859aa7da4d64efd370cf0e46649cf02a26e8308d80bdb9f11,2025-03-10T14:15:25.827000
CVE-2025-27637,0,0,9c062615c8ec6a3ced4ee678ddb923b6d263f273f4e63f5f7bf9a46985accf21,2025-03-05T16:15:40.713000
CVE-2025-27638,0,0,799c839b25e9819e4ec80c30ab7682e659f557f1c902bc7211099cb508098b42,2025-03-05T17:15:16.853000
CVE-2025-27639,0,0,a0477d98f560583497b6432bc3e9038f2aa7b8df2110514ba2e616c075cb3f66,2025-03-05T17:15:17.027000
@ -284608,4 +284620,4 @@ CVE-2025-27824,0,0,bbbadd94bca912d17091ba5687790372eed06151266f5eb5403da18d55309
CVE-2025-27825,0,0,99e9b9d3befd54cbb55880416607fbc7e5d90c9fee9cdc2881cb2480979fee41,2025-03-07T22:15:38.380000
CVE-2025-27826,0,0,83fe28f5c1c38336a328c924367a016f575cf3bedee9c6070949943b515ded3d,2025-03-07T22:15:38.527000
CVE-2025-27839,0,0,212b3d30d2c1f53f372c7e143c6e03922deeb9da14f018db14d5749815db8000,2025-03-08T00:15:38.340000
CVE-2025-27840,0,1,31b43659fdf50a1c837def79b3ff8549c2485895c251972e0cf021cb5a031b4d,2025-03-10T14:15:25.943000
CVE-2025-27840,0,0,31b43659fdf50a1c837def79b3ff8549c2485895c251972e0cf021cb5a031b4d,2025-03-10T14:15:25.943000

Can't render this file because it is too large.