mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-05 10:18:41 +00:00
Auto-Update: 2025-02-25T03:01:05.571630+00:00
This commit is contained in:
parent
1269ff274a
commit
a7253572e9
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2017-3066",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2017-04-27T14:59:00.233",
|
||||
"lastModified": "2025-02-24T16:15:10.670",
|
||||
"lastModified": "2025-02-25T02:00:02.097",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -84,6 +84,10 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"cisaExploitAdd": "2025-02-24",
|
||||
"cisaActionDue": "2025-03-17",
|
||||
"cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
|
||||
"cisaVulnerabilityName": "Adobe ColdFusion Deserialization Vulnerability",
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2018-6882",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2018-03-27T16:29:00.530",
|
||||
"lastModified": "2025-02-07T17:15:11.263",
|
||||
"lastModified": "2025-02-25T02:00:02.097",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -87,7 +87,7 @@
|
||||
"cisaExploitAdd": "2022-04-19",
|
||||
"cisaActionDue": "2022-05-10",
|
||||
"cisaRequiredAction": "Apply updates per vendor instructions.",
|
||||
"cisaVulnerabilityName": "Zimbra Collaboration Suite (ZCS) Cross-Site Scripting (XSS) Vulnerability",
|
||||
"cisaVulnerabilityName": "Synacor Zimbra Collaboration Suite (ZCS) Cross-Site Scripting (XSS) Vulnerability",
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2019-9670",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2019-05-29T22:29:01.507",
|
||||
"lastModified": "2025-02-07T14:15:46.887",
|
||||
"lastModified": "2025-02-25T02:00:02.097",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -87,7 +87,7 @@
|
||||
"cisaExploitAdd": "2022-01-10",
|
||||
"cisaActionDue": "2022-07-10",
|
||||
"cisaRequiredAction": "Apply updates per vendor instructions.",
|
||||
"cisaVulnerabilityName": "Synacor Zimbra Collaboration (ZCS) Improper Restriction of XML External Entity Reference",
|
||||
"cisaVulnerabilityName": "Synacor Zimbra Collaboration Suite (ZCS) Improper Restriction of XML External Entity Reference",
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-24682",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2022-02-09T04:15:07.400",
|
||||
"lastModified": "2025-01-29T22:15:27.890",
|
||||
"lastModified": "2025-02-25T02:00:02.097",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -87,7 +87,7 @@
|
||||
"cisaExploitAdd": "2022-02-25",
|
||||
"cisaActionDue": "2022-03-11",
|
||||
"cisaRequiredAction": "Apply updates per vendor instructions.",
|
||||
"cisaVulnerabilityName": "Zimbra Webmail Cross-Site Scripting Vulnerability",
|
||||
"cisaVulnerabilityName": "Synacor Zimbra Webmail Cross-Site Scripting Vulnerability",
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-27924",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2022-04-21T00:15:08.360",
|
||||
"lastModified": "2025-01-29T17:15:18.840",
|
||||
"lastModified": "2025-02-25T02:00:02.097",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -87,7 +87,7 @@
|
||||
"cisaExploitAdd": "2022-08-04",
|
||||
"cisaActionDue": "2022-08-25",
|
||||
"cisaRequiredAction": "Apply updates per vendor instructions.",
|
||||
"cisaVulnerabilityName": "Zimbra Collaboration (ZCS) Command Injection Vulnerability",
|
||||
"cisaVulnerabilityName": "Synacor Zimbra Collaboration Suite (ZCS) Command Injection Vulnerability",
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-27925",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2022-04-21T00:15:08.407",
|
||||
"lastModified": "2025-01-29T17:15:19.050",
|
||||
"lastModified": "2025-02-25T02:00:02.097",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -87,7 +87,7 @@
|
||||
"cisaExploitAdd": "2022-08-11",
|
||||
"cisaActionDue": "2022-09-01",
|
||||
"cisaRequiredAction": "Apply updates per vendor instructions.",
|
||||
"cisaVulnerabilityName": "Zimbra Collaboration (ZCS) Arbitrary File Upload Vulnerability",
|
||||
"cisaVulnerabilityName": "Synacor Zimbra Collaboration Suite (ZCS) Arbitrary File Upload Vulnerability",
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-27926",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2022-04-21T00:15:08.450",
|
||||
"lastModified": "2025-01-29T17:15:19.240",
|
||||
"lastModified": "2025-02-25T02:00:02.097",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -87,7 +87,7 @@
|
||||
"cisaExploitAdd": "2023-04-03",
|
||||
"cisaActionDue": "2023-04-24",
|
||||
"cisaRequiredAction": "Apply updates per vendor instructions.",
|
||||
"cisaVulnerabilityName": "Zimbra Collaboration (ZCS) Cross-Site Scripting (XSS) Vulnerability",
|
||||
"cisaVulnerabilityName": "Synacor Zimbra Collaboration Suite (ZCS) Cross-Site Scripting (XSS) Vulnerability",
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-37042",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2022-08-12T15:15:16.053",
|
||||
"lastModified": "2025-01-29T17:15:21.530",
|
||||
"lastModified": "2025-02-25T02:00:02.097",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -62,7 +62,7 @@
|
||||
"cisaExploitAdd": "2022-08-11",
|
||||
"cisaActionDue": "2022-09-01",
|
||||
"cisaRequiredAction": "Apply updates per vendor instructions.",
|
||||
"cisaVulnerabilityName": "Zimbra Collaboration (ZCS) Authentication Bypass Vulnerability",
|
||||
"cisaVulnerabilityName": "Synacor Zimbra Collaboration Suite (ZCS) Authentication Bypass Vulnerability",
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-41352",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2022-09-26T02:15:10.733",
|
||||
"lastModified": "2025-02-03T15:15:14.510",
|
||||
"lastModified": "2025-02-25T02:00:02.097",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -62,7 +62,7 @@
|
||||
"cisaExploitAdd": "2022-10-20",
|
||||
"cisaActionDue": "2022-11-10",
|
||||
"cisaRequiredAction": "Apply updates per vendor instructions.",
|
||||
"cisaVulnerabilityName": "Zimbra Collaboration (ZCS) Arbitrary File Upload Vulnerability",
|
||||
"cisaVulnerabilityName": "Synacor Zimbra Collaboration Suite (ZCS) Arbitrary File Upload Vulnerability",
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-37580",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-07-31T16:15:10.327",
|
||||
"lastModified": "2025-01-27T21:55:19.183",
|
||||
"lastModified": "2025-02-25T02:00:02.097",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -38,7 +38,7 @@
|
||||
"cisaExploitAdd": "2023-07-27",
|
||||
"cisaActionDue": "2023-08-17",
|
||||
"cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
|
||||
"cisaVulnerabilityName": "Zimbra Collaboration (ZCS) Cross-Site Scripting (XSS) Vulnerability",
|
||||
"cisaVulnerabilityName": "Synacor Zimbra Collaboration Suite (ZCS) Cross-Site Scripting (XSS) Vulnerability",
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-20953",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2024-02-17T02:15:49.520",
|
||||
"lastModified": "2025-02-13T18:16:37.007",
|
||||
"lastModified": "2025-02-25T02:00:02.097",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -39,6 +39,10 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"cisaExploitAdd": "2025-02-24",
|
||||
"cisaActionDue": "2025-03-17",
|
||||
"cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
|
||||
"cisaVulnerabilityName": "Oracle Agile Product Lifecycle Management (PLM) Deserialization Vulnerability",
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-45519",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-02T22:15:02.770",
|
||||
"lastModified": "2024-12-20T16:38:02.830",
|
||||
"lastModified": "2025-02-25T02:00:02.097",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -62,7 +62,7 @@
|
||||
"cisaExploitAdd": "2024-10-03",
|
||||
"cisaActionDue": "2024-10-24",
|
||||
"cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
|
||||
"cisaVulnerabilityName": "Synacor Zimbra Collaboration Command Execution Vulnerability",
|
||||
"cisaVulnerabilityName": "Synacor Zimbra Collaboration Suite (ZCS) Command Execution Vulnerability",
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
|
137
CVE-2025/CVE-2025-16xx/CVE-2025-1642.json
Normal file
137
CVE-2025/CVE-2025-16xx/CVE-2025-1642.json
Normal file
@ -0,0 +1,137 @@
|
||||
{
|
||||
"id": "CVE-2025-1642",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-02-25T01:15:09.057",
|
||||
"lastModified": "2025-02-25T01:15:09.057",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in Benner ModernaNet up to 1.1.0. It has been declared as critical. This vulnerability affects unknown code of the file /AGE0000700/GetImageMedico?fooId=1. The manipulation of the argument fooId leads to improper control of resource identifiers. The attack can be initiated remotely. Upgrading to version 1.1.1 is able to address this issue. It is recommended to upgrade the affected component."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnerableSystemConfidentiality": "LOW",
|
||||
"vulnerableSystemIntegrity": "NONE",
|
||||
"vulnerableSystemAvailability": "NONE",
|
||||
"subsequentSystemConfidentiality": "NONE",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
|
||||
"baseScore": 4.0,
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 2.9,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-99"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/yago3008/cves",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.296692",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.296692",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.499877",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
141
CVE-2025/CVE-2025-16xx/CVE-2025-1643.json
Normal file
141
CVE-2025/CVE-2025-16xx/CVE-2025-1643.json
Normal file
@ -0,0 +1,141 @@
|
||||
{
|
||||
"id": "CVE-2025-1643",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-02-25T01:15:09.783",
|
||||
"lastModified": "2025-02-25T01:15:09.783",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in Benner ModernaNet up to 1.1.0. It has been rated as problematic. This issue affects some unknown processing of the file /DadosPessoais/SG_AlterarSenha. The manipulation leads to cross-site request forgery. The attack may be initiated remotely. Upgrading to version 1.1.1 is able to address this issue. It is recommended to upgrade the affected component."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "PASSIVE",
|
||||
"vulnerableSystemConfidentiality": "NONE",
|
||||
"vulnerableSystemIntegrity": "LOW",
|
||||
"vulnerableSystemAvailability": "NONE",
|
||||
"subsequentSystemConfidentiality": "NONE",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
|
||||
"baseScore": 5.0,
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "NONE",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 10.0,
|
||||
"impactScore": 2.9,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/yago3008/cves",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.296693",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.296693",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.500574",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
141
CVE-2025/CVE-2025-16xx/CVE-2025-1644.json
Normal file
141
CVE-2025/CVE-2025-16xx/CVE-2025-1644.json
Normal file
@ -0,0 +1,141 @@
|
||||
{
|
||||
"id": "CVE-2025-1644",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-02-25T02:15:14.863",
|
||||
"lastModified": "2025-02-25T02:15:14.863",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability classified as problematic has been found in Benner ModernaNet up to 1.2.0. Affected is an unknown function of the file /DadosPessoais/SG_Gravar. The manipulation of the argument idItAg leads to cross-site request forgery. It is possible to launch the attack remotely. Upgrading to version 1.2.1 is able to address this issue. It is recommended to upgrade the affected component."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "PASSIVE",
|
||||
"vulnerableSystemConfidentiality": "NONE",
|
||||
"vulnerableSystemIntegrity": "LOW",
|
||||
"vulnerableSystemAvailability": "NONE",
|
||||
"subsequentSystemConfidentiality": "NONE",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
|
||||
"baseScore": 5.0,
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "NONE",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 10.0,
|
||||
"impactScore": 2.9,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/yago3008/cves",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.296694",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.296694",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.500575",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
137
CVE-2025/CVE-2025-16xx/CVE-2025-1645.json
Normal file
137
CVE-2025/CVE-2025-16xx/CVE-2025-1645.json
Normal file
@ -0,0 +1,137 @@
|
||||
{
|
||||
"id": "CVE-2025-1645",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-02-25T02:15:16.123",
|
||||
"lastModified": "2025-02-25T02:15:16.123",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability classified as critical was found in Benner Connecta 1.0.5330. Affected by this vulnerability is an unknown functionality of the file /Usuarios/Usuario/EditarLogado/. The manipulation of the argument Handle leads to improper control of resource identifiers. The attack can be launched remotely. The vendor was contacted early about this disclosure but did not respond in any way."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnerableSystemConfidentiality": "LOW",
|
||||
"vulnerableSystemIntegrity": "LOW",
|
||||
"vulnerableSystemAvailability": "LOW",
|
||||
"subsequentSystemConfidentiality": "NONE",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
||||
"baseScore": 6.5,
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL"
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-99"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/yago3008/cves",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.296695",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.296695",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.501406",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
68
CVE-2025/CVE-2025-271xx/CVE-2025-27145.json
Normal file
68
CVE-2025/CVE-2025-271xx/CVE-2025-27145.json
Normal file
@ -0,0 +1,68 @@
|
||||
{
|
||||
"id": "CVE-2025-27145",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-02-25T02:15:16.300",
|
||||
"lastModified": "2025-02-25T02:15:16.300",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "copyparty, a portable file server, has a DOM-based cross-site scripting vulnerability in versions prior to 1.16.15. The vulnerability is considered low-risk. By handing someone a maliciously-named file, and then tricking them into dragging the file into copyparty's Web-UI, an attacker could execute arbitrary javascript with the same privileges as that user. For example, this could give unintended read-access to files owned by that user. The bug is triggered by the drag-drop action itself; it is not necessary to actually initiate the upload. The file must be empty (zero bytes). Note that, as a general-purpose webserver, it is intentionally possible to upload HTML-files with arbitrary javascript in `<script>` tags, which will execute when the file is opened. The difference is that this vulnerability would trigger execution of javascript during the act of uploading, and not when the uploaded file was opened. Version 1.16.15 contains a fix."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N",
|
||||
"baseScore": 3.6,
|
||||
"baseSeverity": "LOW",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.0,
|
||||
"impactScore": 2.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-83"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/9001/copyparty/commit/438ea6ccb06f39d7cbb4b6ee7ad44606e21a63dd",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/9001/copyparty/releases/tag/v1.16.15",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/9001/copyparty/security/advisories/GHSA-m2jw-cj8v-937r",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
39
README.md
39
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2025-02-25T00:55:55.651837+00:00
|
||||
2025-02-25T03:01:05.571630+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2025-02-25T00:15:09.913000+00:00
|
||||
2025-02-25T02:15:16.300000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -27,35 +27,42 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest)
|
||||
|
||||
```plain
|
||||
2025-02-24T01:00:04.366182+00:00
|
||||
2025-02-25T01:00:04.363820+00:00
|
||||
```
|
||||
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
282238
|
||||
282243
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `10`
|
||||
Recently added CVEs: `5`
|
||||
|
||||
- [CVE-2024-53542](CVE-2024/CVE-2024-535xx/CVE-2024-53542.json) (`2025-02-24T23:15:09.410`)
|
||||
- [CVE-2024-53543](CVE-2024/CVE-2024-535xx/CVE-2024-53543.json) (`2025-02-24T23:15:10.540`)
|
||||
- [CVE-2024-53544](CVE-2024/CVE-2024-535xx/CVE-2024-53544.json) (`2025-02-24T23:15:10.663`)
|
||||
- [CVE-2024-56525](CVE-2024/CVE-2024-565xx/CVE-2024-56525.json) (`2025-02-24T23:15:10.793`)
|
||||
- [CVE-2024-57685](CVE-2024/CVE-2024-576xx/CVE-2024-57685.json) (`2025-02-24T23:15:10.917`)
|
||||
- [CVE-2025-1640](CVE-2025/CVE-2025-16xx/CVE-2025-1640.json) (`2025-02-25T00:15:09.723`)
|
||||
- [CVE-2025-1641](CVE-2025/CVE-2025-16xx/CVE-2025-1641.json) (`2025-02-25T00:15:09.913`)
|
||||
- [CVE-2025-22974](CVE-2025/CVE-2025-229xx/CVE-2025-22974.json) (`2025-02-24T23:15:11.033`)
|
||||
- [CVE-2025-27143](CVE-2025/CVE-2025-271xx/CVE-2025-27143.json) (`2025-02-24T23:15:11.160`)
|
||||
- [CVE-2025-27144](CVE-2025/CVE-2025-271xx/CVE-2025-27144.json) (`2025-02-24T23:15:11.427`)
|
||||
- [CVE-2025-1642](CVE-2025/CVE-2025-16xx/CVE-2025-1642.json) (`2025-02-25T01:15:09.057`)
|
||||
- [CVE-2025-1643](CVE-2025/CVE-2025-16xx/CVE-2025-1643.json) (`2025-02-25T01:15:09.783`)
|
||||
- [CVE-2025-1644](CVE-2025/CVE-2025-16xx/CVE-2025-1644.json) (`2025-02-25T02:15:14.863`)
|
||||
- [CVE-2025-1645](CVE-2025/CVE-2025-16xx/CVE-2025-1645.json) (`2025-02-25T02:15:16.123`)
|
||||
- [CVE-2025-27145](CVE-2025/CVE-2025-271xx/CVE-2025-27145.json) (`2025-02-25T02:15:16.300`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `0`
|
||||
Recently modified CVEs: `12`
|
||||
|
||||
- [CVE-2017-3066](CVE-2017/CVE-2017-30xx/CVE-2017-3066.json) (`2025-02-25T02:00:02.097`)
|
||||
- [CVE-2018-6882](CVE-2018/CVE-2018-68xx/CVE-2018-6882.json) (`2025-02-25T02:00:02.097`)
|
||||
- [CVE-2019-9670](CVE-2019/CVE-2019-96xx/CVE-2019-9670.json) (`2025-02-25T02:00:02.097`)
|
||||
- [CVE-2022-24682](CVE-2022/CVE-2022-246xx/CVE-2022-24682.json) (`2025-02-25T02:00:02.097`)
|
||||
- [CVE-2022-27924](CVE-2022/CVE-2022-279xx/CVE-2022-27924.json) (`2025-02-25T02:00:02.097`)
|
||||
- [CVE-2022-27925](CVE-2022/CVE-2022-279xx/CVE-2022-27925.json) (`2025-02-25T02:00:02.097`)
|
||||
- [CVE-2022-27926](CVE-2022/CVE-2022-279xx/CVE-2022-27926.json) (`2025-02-25T02:00:02.097`)
|
||||
- [CVE-2022-37042](CVE-2022/CVE-2022-370xx/CVE-2022-37042.json) (`2025-02-25T02:00:02.097`)
|
||||
- [CVE-2022-41352](CVE-2022/CVE-2022-413xx/CVE-2022-41352.json) (`2025-02-25T02:00:02.097`)
|
||||
- [CVE-2023-37580](CVE-2023/CVE-2023-375xx/CVE-2023-37580.json) (`2025-02-25T02:00:02.097`)
|
||||
- [CVE-2024-20953](CVE-2024/CVE-2024-209xx/CVE-2024-20953.json) (`2025-02-25T02:00:02.097`)
|
||||
- [CVE-2024-45519](CVE-2024/CVE-2024-455xx/CVE-2024-45519.json) (`2025-02-25T02:00:02.097`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
49
_state.csv
49
_state.csv
@ -103544,7 +103544,7 @@ CVE-2017-3062,0,0,ac3b345ad95f10e735ab69ea990c6af9b3230ef38a4463030828d3964f78f4
|
||||
CVE-2017-3063,0,0,5fa9f659f2774399f1708168687d3e98afe75edad415c1aa6e5016e3e3e51fd4,2024-11-21T03:24:45.347000
|
||||
CVE-2017-3064,0,0,63f6d50ceccfed39ecbbeee37cef38bd6ffe17a20574544916dfe225da95171b,2024-11-21T03:24:45.477000
|
||||
CVE-2017-3065,0,0,0963c2ea0b754d113dd707a8e8b0d5bf5afc17d081be5b0ca1a48f32865e2497,2024-11-21T03:24:45.600000
|
||||
CVE-2017-3066,0,0,e5359aae9fa9461cf6147103113b6014ffbbe4d86adbd3f949050c9a9e303519,2025-02-24T16:15:10.670000
|
||||
CVE-2017-3066,0,1,ecd0971aa3577dff527ec63b3c07a67a50ef8dde3765f03eb507a5961812bfeb,2025-02-25T02:00:02.097000
|
||||
CVE-2017-3067,0,0,791a33003dd1e11c651c188e4f03f08ab06e2e31440f58108137e87ceef3bbd2,2024-11-21T03:24:45.847000
|
||||
CVE-2017-3068,0,0,af80d0c3c329fc69043b3685c041805dc046bbe7ad713185db1fd6aa7c72c33d,2024-11-21T03:24:45.967000
|
||||
CVE-2017-3069,0,0,d3276aefa92679d09fe4b20dbe1190ee1aaeabf36bdd233a71239fdc29223803,2024-11-21T03:24:46.100000
|
||||
@ -125035,7 +125035,7 @@ CVE-2018-6878,0,0,8957f99d3762ccb00009151816e281f869f98effe9ca63fe04ea9de9cb2b25
|
||||
CVE-2018-6879,0,0,535972e839f19a8623193f36f9bc049bf1b81d9abb2b7b756c64ad6bd010f2c3,2024-11-21T04:11:21.263000
|
||||
CVE-2018-6880,0,0,3cd50d6cbd17152daba6ccbe0e977ea9496f687c201aab9fa0ca5d3cbead7cd2,2024-11-21T04:11:21.400000
|
||||
CVE-2018-6881,0,0,fc5797f0201f5f361e734a06ee788a23d6c71171471669dc4f057cc8b1ac663d,2024-11-21T04:11:21.543000
|
||||
CVE-2018-6882,0,0,64600ee1268c0c53d3c77a99fd1f12bb835c07ba0123c3cce4487f237c260757,2025-02-07T17:15:11.263000
|
||||
CVE-2018-6882,0,1,cfa2f5f604c7806f4190aef650aa11f200f8fc2534792e71d697b09cee1f4509,2025-02-25T02:00:02.097000
|
||||
CVE-2018-6883,0,0,b930ea02e0047e1e851632c79fda9687060f683edc6bf626cf7a0b729b9ec264,2024-11-21T04:11:21.867000
|
||||
CVE-2018-6885,0,0,da2abdf626c132f9442f8a46638932ae95142647389d6e91dd79ebe5ee8289d7,2024-11-21T04:11:22.017000
|
||||
CVE-2018-6888,0,0,1a9bc092935e2b7e274904d4f2135ce42e3978c4a976bdcaf4e872c2086d4c6c,2024-11-21T04:11:22.163000
|
||||
@ -144012,7 +144012,7 @@ CVE-2019-9661,0,0,78b8e303b545d2696109632e146888cbde440ef272a2da5e87268ac9241c60
|
||||
CVE-2019-9662,0,0,fdfede734148ec4181ff4477d84cc9204c32172edd2f620c173b366457be13f4,2024-11-21T04:52:04.667000
|
||||
CVE-2019-9668,0,0,492569773c04c627846fd55e8875c5636ade06b1b4047579f3615dbf9c74e32c,2024-11-21T04:52:04.800000
|
||||
CVE-2019-9669,0,0,7d214939048fdc7f0c8c7aa9a4e9b6e8d1a5a2348e448cf2a764f5b85744ed08,2024-11-21T04:52:04.960000
|
||||
CVE-2019-9670,0,0,28e8c0744ff871083218c38fdfbf7caf3a1d305b3bceaa053afa0b0a8fc2004d,2025-02-07T14:15:46.887000
|
||||
CVE-2019-9670,0,1,440ae92596162e630b3fba2a06b477495acba52293e22bd0754d2745db20f6a8,2025-02-25T02:00:02.097000
|
||||
CVE-2019-9673,0,0,996b12ed39bd93bbd2ab5c7f1b7a883001b12a3d1b668f8c621d823df13f2aec,2024-11-21T04:52:05.250000
|
||||
CVE-2019-9674,0,0,b13947080e156bb28ba82202960d5d8df52ed1f3821246576eab72c9376525f6,2024-11-21T04:52:05.390000
|
||||
CVE-2019-9675,0,0,b11de9c0b8e85884a2989d7080eb2020b00579a2e98c6862771ecdeb933914a4,2024-11-21T04:52:05.553000
|
||||
@ -194128,7 +194128,7 @@ CVE-2022-24679,0,0,249b2c761c4c76113344b88e5ea9c4bc085bbbc002ba2eb0b3347ac9a72f7
|
||||
CVE-2022-2468,0,0,e81e142ac71cf372cca807f427f3a26185bb1718b2143ba02ee2a3ca1d345497,2024-11-21T07:01:03.110000
|
||||
CVE-2022-24680,0,0,c58e7fc7cebfed1eafe5a4fe066109bbc6bc096cb1a79e425fe2f5d46563f10a,2024-11-21T06:50:51.573000
|
||||
CVE-2022-24681,0,0,27f6bf946f98201bb07ac17e2d1a23698876807cb9c0eceec121f3219d357821,2024-11-21T06:50:51.707000
|
||||
CVE-2022-24682,0,0,616e688ef8b8abce7397d5bceca8b07c767af73d420f2cb703ebbebd5da5e560,2025-01-29T22:15:27.890000
|
||||
CVE-2022-24682,0,1,d118d2b8beec922a982417bdd4efb50974be104ebf1b2d5aaf97ecd0c1cb9d6a,2025-02-25T02:00:02.097000
|
||||
CVE-2022-24683,0,0,ef4d435ae4186887af4a2b9d28b0d623ada678af639dc6512b8913085eca46d2,2024-11-21T06:50:52.120000
|
||||
CVE-2022-24684,0,0,f2dde9f506819062f97e9b67253d8742037a0ec7f4e1005aa0f28ec5f363ea07,2024-11-21T06:50:52.277000
|
||||
CVE-2022-24685,0,0,55fb81f48a436537bc7563c3bdda05f5db1a3a3908e3bf64e484d33a2ed48237,2024-11-21T06:50:52.413000
|
||||
@ -196774,9 +196774,9 @@ CVE-2022-27918,0,0,8674e471da7f3503c274ce3ddc54a2e01853df65b42f173f28632af936f42
|
||||
CVE-2022-27919,0,0,a11bd79ed72f9771535843d55b124e78d04abf5fba1cef2d18220d545cc9ea61,2024-11-21T06:56:28.020000
|
||||
CVE-2022-2792,0,0,cd183fcd525db8a7dd9c55e88578e37c9b6b149b143f7130deab5e6d02e689c1,2024-11-21T07:01:42.227000
|
||||
CVE-2022-27920,0,0,d5055b7228c4d13c1a78a219ff52d92e2b735d50ac021e97797591f24a2890f5,2024-11-21T06:56:28.153000
|
||||
CVE-2022-27924,0,0,a695c5870a402b1303ac271b620e38133d8bfc29e7350a33e6eb1c1405f7c0b0,2025-01-29T17:15:18.840000
|
||||
CVE-2022-27925,0,0,81cb07659695eba118d675630794270e004e52a57013639f96592632bd3d60b2,2025-01-29T17:15:19.050000
|
||||
CVE-2022-27926,0,0,57a758c334ff0ab9d0d3a21a4369769ff4198a07fccaff244162179a9788ee66,2025-01-29T17:15:19.240000
|
||||
CVE-2022-27924,0,1,433dc8365016f37478f6e1ad34c6bbd758b05cdcdd2a565cd5dae742e01e2c67,2025-02-25T02:00:02.097000
|
||||
CVE-2022-27925,0,1,7c94031d7bfaa9ba8fd3fa33b60aaeec9171c102c3ab45939e0a207aa7f8987c,2025-02-25T02:00:02.097000
|
||||
CVE-2022-27926,0,1,8ef3cf665df5d50ed14141d1d4e2a52a8fe4ccd91182ba650a3fa308d0c8da7a,2025-02-25T02:00:02.097000
|
||||
CVE-2022-27927,0,0,81ced154bfd17d2353a2fca2e6c561efe9eca19085a4b7974475780416a40339,2024-11-21T06:56:28.780000
|
||||
CVE-2022-27928,0,0,6e254f7f408399d46631767f474b912e698944ca12a7d4885ed017698951686a,2024-11-21T06:56:28.933000
|
||||
CVE-2022-27929,0,0,e1d6eded4a4badcad5a48f5a752c6266fa98b2fae30a5258fe34aaca1061ca21,2024-11-21T06:56:29.067000
|
||||
@ -204303,7 +204303,7 @@ CVE-2022-37034,0,0,44c3ff79f3241d69d9b0fda167b0c9117a9f6cd87d2dcc17544ed562c9ccd
|
||||
CVE-2022-37035,0,0,79c99da62b00b653f0668cd130a7c10e6431b2f2b52b49ba02b6125615219d83,2024-11-21T07:14:19.953000
|
||||
CVE-2022-3704,0,0,15eb5a1597614a16cd1ca9c5110e86241009ac0731de2733acf20b57d757d3fa,2024-11-21T07:20:04.373000
|
||||
CVE-2022-37041,0,0,2e90c7133ca39722055e1269e726344d5792dc0071e86a20ec76fb9f734f1af3,2024-11-21T07:14:20.100000
|
||||
CVE-2022-37042,0,0,31e922a8ff226a74d65aa64d0011d3f3bc07effca3da735cec797fb90987cdea,2025-01-29T17:15:21.530000
|
||||
CVE-2022-37042,0,1,57fd645558b934c0be0d68301b7ee83153a1b469380be5b38eecfcc4efbb6eff,2025-02-25T02:00:02.097000
|
||||
CVE-2022-37043,0,0,33b2b827e0455d7c706f59b3e4e51d18162c0ce2a8b95aa3f7730560699a3b5e,2024-11-21T07:14:20.410000
|
||||
CVE-2022-37044,0,0,e40e4180804b10fdb28a78dfab9a640de3015abc513fd7bf5deb72047371e224,2024-11-21T07:14:20.570000
|
||||
CVE-2022-37047,0,0,d6ef48199b8e2af42001d7bd6e62f60f1c1b2ed8f14a2df9832eae6cd0dca9f1,2024-11-21T07:14:20.723000
|
||||
@ -207473,7 +207473,7 @@ CVE-2022-41349,0,0,f37e912a4b114c1184a1865bf9d5da62dec108ec18e1599ba0fc601bb7455
|
||||
CVE-2022-4135,0,0,b855be7c691705b47a74bee35e6ede2f679288f324d7acc09844fc7c8bd89558,2025-02-03T14:15:33.897000
|
||||
CVE-2022-41350,0,0,07c59b26e4298d985fa1356786d58d9eaea318e5fb01099dfd2f0c684cb7fb9c,2024-11-21T07:23:05.973000
|
||||
CVE-2022-41351,0,0,0e738e1029fa2ba786b692581f7ba428943e32cc9bfd63b89b6f8436bd389f76,2024-11-21T07:23:06.113000
|
||||
CVE-2022-41352,0,0,b20f5c078a7254073897def049b4cca164f114f0b001fc53928baf4e53607bd6,2025-02-03T15:15:14.510000
|
||||
CVE-2022-41352,0,1,4c883efad9dc10eb9e9d7a906cad5538534094b827135b099e1838f18870bc51,2025-02-25T02:00:02.097000
|
||||
CVE-2022-41354,0,0,142e17ba66f45fbe1ad6b144be7bb87c3d00b58c77c52149882b79884c804f44,2024-11-21T07:23:06.407000
|
||||
CVE-2022-41355,0,0,1f97e23f2a574b2a07e08a487af9f40c1f4f24cb1046f21cb416dc0eb8d8e982,2024-11-21T07:23:06.557000
|
||||
CVE-2022-41358,0,0,7c1f17dd8d88833d7b2431ef0dc842957ecdf0484b1199b8fad6997ed5be8a8d,2024-11-21T07:23:06.687000
|
||||
@ -229199,7 +229199,7 @@ CVE-2023-37577,0,0,b0fd59cabf196c2dce306a3dfd18b0e7769f587e98763971c0f69d8f47120
|
||||
CVE-2023-37578,0,0,db1d011239168d2f0753523137a605241d87dd361fa246b7536264b2cfd1972e,2024-11-21T08:11:59.510000
|
||||
CVE-2023-37579,0,0,4619aa08d1ce28c3366bb44966075d308cc27715f020dfd6296b225d60c0dab2,2024-11-21T08:11:59.647000
|
||||
CVE-2023-3758,0,0,66dfa7da71c29fdd2b245f8df2204f07ac231a0eae8609ba676c08eb8a95ccab,2025-02-06T17:15:17.657000
|
||||
CVE-2023-37580,0,0,8d275160b93ac9ce8ee9bc0d58aec68c130469746723ee6767d328399913bc21,2025-01-27T21:55:19.183000
|
||||
CVE-2023-37580,0,1,2582c514843958ddfa6af60f73b891ab37b529fcdd264d49d5b6a1bd6b7c73d8,2025-02-25T02:00:02.097000
|
||||
CVE-2023-37581,0,0,093be304138d0cca6e8decef8cb1e83d94e4f8751f573ee26489914f63ec252d,2024-11-21T08:11:59.950000
|
||||
CVE-2023-37582,0,0,f426cbb472b86178431d5ad7872499adc0db4b619079a72be475751ff7ba514c,2025-02-13T17:16:46.190000
|
||||
CVE-2023-3759,0,0,e99e81156d6b104b2e078d75cf4c33ae1aef27bc0d50c9c844090c25ea87b21c,2024-11-21T08:18:00.007000
|
||||
@ -248314,7 +248314,7 @@ CVE-2024-20949,0,0,8447586b572938721504c1687180a68e63afc2fdacf6da4b480edb44c75dd
|
||||
CVE-2024-20950,0,0,f5c99eea8d10c44cb6306cc5eef489fdee68a2f90bacd64ab99a343812559bae,2024-11-21T08:53:29.690000
|
||||
CVE-2024-20951,0,0,a912377cd9c5e3f36b663316c781a26423eb926f1a59dc0a2f3408b7c7125bd6,2024-11-29T14:07:57.480000
|
||||
CVE-2024-20952,0,0,974bc5f3b18c2e594a4d1c4bd936f6f9b31dc1a29fe2f12bc3faf51bb8eac324,2024-11-21T08:53:29.903000
|
||||
CVE-2024-20953,0,0,56a9182f081fcc08e4ad04a01bc3e309a3c17c4e34cffaf728960021ae8c97b6,2025-02-13T18:16:37.007000
|
||||
CVE-2024-20953,0,1,3de9278f181fcefe6aa20f00ec39de2a101cc9f3772eee3803a2cca4849f13d6,2025-02-25T02:00:02.097000
|
||||
CVE-2024-20954,0,0,9afc2253774090ba4eb185e93f29f04799d88be99ccffcb7987fb70e621bc5d1,2024-12-06T19:38:00.843000
|
||||
CVE-2024-20955,0,0,888e1b88ad65bdcadee36bf516889d82a35fb4b5c74e00f287b421d64597a1fe,2024-11-21T08:53:30.257000
|
||||
CVE-2024-20956,0,0,9661739112364392106915eba09ba3edb13da21796d158c1a55722d67e3804e6,2024-11-27T16:37:04.993000
|
||||
@ -267186,7 +267186,7 @@ CVE-2024-45513,0,0,25383385e2481e17b58af0b6e8f56bf94670b2d8f40ad98216966f161261e
|
||||
CVE-2024-45514,0,0,7c4b7c6d70b14b13f42d6ce3c0114c4be691ac359315234fcdf5201ecc180838,2024-11-21T18:15:08.980000
|
||||
CVE-2024-45517,0,0,9ae29652a251f6463a9327eae29d2e48904246c6a1726faacae2bdc1383f4e16,2024-11-21T18:15:09.360000
|
||||
CVE-2024-45518,0,0,097e334ff5ea6e41f366599c72134c8651cb553e492c30874b146dfc7c023e19,2024-10-30T21:23:59.893000
|
||||
CVE-2024-45519,0,0,a4e00f7b7b350923f5ea9829bd557075a8c7be45eaef48586624621fdc66f332,2024-12-20T16:38:02.830000
|
||||
CVE-2024-45519,0,1,094ccd6257d3617e5ee5eb108e56e5f8206c097c09ed366876abfc431763f55e,2025-02-25T02:00:02.097000
|
||||
CVE-2024-4552,0,0,0ac013621f010657983b95b3c9656c63a7805aea50fe3c0c1148c97b70e80ccb,2024-11-21T09:43:05.410000
|
||||
CVE-2024-45520,0,0,5466845711de025b484d71bfbeb994612050916cd5bfb23e3333148ac74978ae,2024-12-02T16:15:11.293000
|
||||
CVE-2024-45522,0,0,09ceef78cc5f057be786bb183a479b765b1739f0b7ce2fbf1b1d3c524b7ab69d,2024-09-05T14:29:32.737000
|
||||
@ -272786,9 +272786,9 @@ CVE-2024-53526,0,0,bc5f19d2f051183a95544adcafd452a82c4d307b983121af7f17d196af8eb
|
||||
CVE-2024-5353,0,0,797e03a5615e2bede928ac816012d8783c471de5bd74a0480881887afd7a657a,2024-11-21T09:47:28.863000
|
||||
CVE-2024-53537,0,0,998d51e6807baacce6b9daafc17e8fac4083f8aca4268561cf6e0645830b6350,2025-02-18T19:15:18.083000
|
||||
CVE-2024-5354,0,0,e179ff0fdd33289a32ca4c68c73a51c0aa8ddee9c94944cd1d4fd7185f36a76c,2024-11-21T09:47:28.997000
|
||||
CVE-2024-53542,1,1,979de5ac0ee8ab3d3ceb0d99ade6cf88535af9aa8960b448b7a5aec4766f3aaa,2025-02-24T23:15:09.410000
|
||||
CVE-2024-53543,1,1,2ed10669bbb7ccca57c3f53096b08fec178d3070c1b9eeaa08ab25cf15a19e31,2025-02-24T23:15:10.540000
|
||||
CVE-2024-53544,1,1,5940a53d90185103a5ea7f7b05f0da10fa7d8c5017f54752e9bf5bab40310fc0,2025-02-24T23:15:10.663000
|
||||
CVE-2024-53542,0,0,979de5ac0ee8ab3d3ceb0d99ade6cf88535af9aa8960b448b7a5aec4766f3aaa,2025-02-24T23:15:09.410000
|
||||
CVE-2024-53543,0,0,2ed10669bbb7ccca57c3f53096b08fec178d3070c1b9eeaa08ab25cf15a19e31,2025-02-24T23:15:10.540000
|
||||
CVE-2024-53544,0,0,5940a53d90185103a5ea7f7b05f0da10fa7d8c5017f54752e9bf5bab40310fc0,2025-02-24T23:15:10.663000
|
||||
CVE-2024-5355,0,0,5ae56d862872a5268a44df2d0e26a54aa307acbf5ff2835727472c989e377b6d,2024-11-21T09:47:29.130000
|
||||
CVE-2024-53552,0,0,4cbf8fbe1c1d8b81113efcd1116951d33bdd9cbf11887cfd2671d9f28438541a,2024-12-11T16:15:14.373000
|
||||
CVE-2024-53553,0,0,f76cd837b8044f3ae7bee9c286ff4b43a72406724cd6dd80c83638da1316919f,2025-02-03T21:15:13.667000
|
||||
@ -274417,7 +274417,7 @@ CVE-2024-5652,0,0,1dda3b28a95a3027cca32754d8e2a9cb8bd181dca86e7b0a455abcf575817a
|
||||
CVE-2024-56520,0,0,ff4fb3d2adb6c71c503d044fa0b3b3389f24638650ec092efa0e72e1ef66ddd5,2025-01-02T20:16:07.280000
|
||||
CVE-2024-56521,0,0,5825673c82589e84af39abc3cdc30eb7e41a3356451a7b175ec0e6d80e41cea5,2025-02-18T22:15:13.147000
|
||||
CVE-2024-56522,0,0,c0719b044dbc0fcdc0d4eaed012a8c95725e84ecda329fba60f601478e6101fc,2024-12-30T16:15:11.920000
|
||||
CVE-2024-56525,1,1,634fc4eeebe898fc445ad7e3808bd6b236092bf133af0f2522984508e8009a41,2025-02-24T23:15:10.793000
|
||||
CVE-2024-56525,0,0,634fc4eeebe898fc445ad7e3808bd6b236092bf133af0f2522984508e8009a41,2025-02-24T23:15:10.793000
|
||||
CVE-2024-56527,0,0,5e8b0b74f38f7ebb35ac054d85b65473e6189ebf6dac534e9c9a780daa1047f5,2025-02-18T22:15:13.270000
|
||||
CVE-2024-56529,0,0,b5e6c43b0e693d516ac7d8945d0f1e377badc88e38b14416efa9236d9ce55101,2025-02-18T19:15:19.587000
|
||||
CVE-2024-5653,0,0,6a43b27cee3d2293652e8e6e2ccb4fc0236822263be85c5365c247a4f0b2a7b5,2024-11-21T09:48:05.873000
|
||||
@ -275091,7 +275091,7 @@ CVE-2024-57681,0,0,46f40990744fd749d4a9af1e8df7c4b5a0bf9ba88074a44657f2ef0606699
|
||||
CVE-2024-57682,0,0,ba4697aa7ced6095caedc3387a0a1add163335f15a4c7e96b7b3a02a7a9c468f,2025-02-03T20:15:36.063000
|
||||
CVE-2024-57683,0,0,90a07d3676c8ceb8f75a6cba51bb9c84a613aace3c1524f48e2a9bfdcd2b0e79,2025-02-03T20:15:36.223000
|
||||
CVE-2024-57684,0,0,bb9784b081b8abb57890ab5a23ebb4f4e85b9b747d00a9882042baa37a4ca976,2025-01-16T20:15:33.340000
|
||||
CVE-2024-57685,1,1,712bcda34874e20357f921514e577cb14b0b3c02eb819deba96dced27414fe36,2025-02-24T23:15:10.917000
|
||||
CVE-2024-57685,0,0,712bcda34874e20357f921514e577cb14b0b3c02eb819deba96dced27414fe36,2025-02-24T23:15:10.917000
|
||||
CVE-2024-57686,0,0,b3e63d1143d51418c4b781604a7d8057cd24cd176983b575e43942d597c27148,2025-02-11T22:15:29.520000
|
||||
CVE-2024-57687,0,0,3f591284140d188a0181694e131e95eee1c6490731d9aebb4db57934394e9a88,2025-01-10T16:15:29.670000
|
||||
CVE-2024-5769,0,0,abfeb18ae91d2e4533cdbeb4bf7ad73d20beb760222f23226220c40a5c6d9f91,2025-01-09T11:15:16.127000
|
||||
@ -279759,8 +279759,12 @@ CVE-2025-1617,0,0,f8b5d497942700d9485e4f9475a52f7ce71fe3f54483032059a95f27d690d0
|
||||
CVE-2025-1618,0,0,5653f37c834d7e927ebdf4835f8b4b2db1c30742d0495922546989d808169e24,2025-02-24T05:15:10.980000
|
||||
CVE-2025-1629,0,0,60983f0ba0e5f0b685c866a67c52df667d2bfe57a6c3421095271a3cf3a2da01,2025-02-24T05:15:11.280000
|
||||
CVE-2025-1632,0,0,e4d830f0038f1d0ec1a385180555c2b78df11cbe25ede30530c1c285ee3eb6b4,2025-02-24T15:15:13.217000
|
||||
CVE-2025-1640,1,1,c9144f1d36a671c5c294220717c102bbee784a06194946bddd82d757b17db602,2025-02-25T00:15:09.723000
|
||||
CVE-2025-1641,1,1,3e60680d02c32355c7c51637987e868a5b83b44bf51944f0dde54e34ed255aca,2025-02-25T00:15:09.913000
|
||||
CVE-2025-1640,0,0,c9144f1d36a671c5c294220717c102bbee784a06194946bddd82d757b17db602,2025-02-25T00:15:09.723000
|
||||
CVE-2025-1641,0,0,3e60680d02c32355c7c51637987e868a5b83b44bf51944f0dde54e34ed255aca,2025-02-25T00:15:09.913000
|
||||
CVE-2025-1642,1,1,eb1ad85c96cb940c08a5097dfefa119ff4b08ca6e6f0f41907372556779e3a83,2025-02-25T01:15:09.057000
|
||||
CVE-2025-1643,1,1,0826f7bcb7f1228229f5784ef58304115e16bc976b45b1d92545793ce6bb0cca,2025-02-25T01:15:09.783000
|
||||
CVE-2025-1644,1,1,c089c614bad147aba27db7e276630bda628e1050898eb7eafd3da256285acd5e,2025-02-25T02:15:14.863000
|
||||
CVE-2025-1645,1,1,f84c25d5345ae177afb924fbcfe7e77498beaa89bb1760e6fea90a27526a406a,2025-02-25T02:15:16.123000
|
||||
CVE-2025-20014,0,0,9692e5cd581a413def58e50a6734c5a89401a76673de37fc6a41ad824a4429cc,2025-01-29T20:15:35.207000
|
||||
CVE-2025-20016,0,0,6fccb84eb01c2cd66b422e82777f9738bfe5004121e1b551d0ae454724543c0e,2025-01-14T10:15:07.500000
|
||||
CVE-2025-20029,0,0,9b8781ac9a16d1f4940e1c86f8d87c8f1f8e66cb5b362950b6fdcd60c25126c4,2025-02-05T18:15:29.573000
|
||||
@ -280742,7 +280746,7 @@ CVE-2025-22963,0,0,12477de813cda7364e5796cbdb911aad8e18d4387dfeeba96b71ade7cc11b
|
||||
CVE-2025-22964,0,0,6f4095b29312f46a36413a75c5449d4448cc7574209011a37c7cdb11e5f0802a,2025-02-03T19:15:14.207000
|
||||
CVE-2025-22968,0,0,d3d48189e9b72af1c9aeb72931ff25b490499842dd9dca10fe5551a85839cd34,2025-02-18T22:15:18.143000
|
||||
CVE-2025-22973,0,0,b448437ac24e0d115300ac0a18a33b0f031d26cd6428b09fcc05bcdedc10d677,2025-02-21T18:15:32.480000
|
||||
CVE-2025-22974,1,1,8fcb6efe31d178a3db96729e4a369a23148b5cef60ab1f0b278bdcdfefb295d4,2025-02-24T23:15:11.033000
|
||||
CVE-2025-22974,0,0,8fcb6efe31d178a3db96729e4a369a23148b5cef60ab1f0b278bdcdfefb295d4,2025-02-24T23:15:11.033000
|
||||
CVE-2025-22976,0,0,34e44a1193299f2815c5773a405812b482572222a2b2eca4f8d55245112e8b61,2025-02-03T19:15:14.397000
|
||||
CVE-2025-22978,0,0,c26d3b35b5f5b247c22bc9e725ddb59da99594ad5fac650f59f0b0b41ffbe946,2025-02-18T19:15:26.930000
|
||||
CVE-2025-22980,0,0,90bf7bf36cc737404c9d40dc6715966f270a478ee523b3c5a983294878d28120,2025-01-28T22:15:16.890000
|
||||
@ -282183,8 +282187,9 @@ CVE-2025-27133,0,0,29844716abafc4dda273789005e3e16abe4d7d6eca7ec6dff9bfc7d4679fc
|
||||
CVE-2025-27137,0,0,5036444bad86a0c9ebb929b7c838035a7163ade99e11b550d9873b63f4ee5567,2025-02-24T21:15:11.213000
|
||||
CVE-2025-27140,0,0,2964053422621195e160e6550b952cf184c5edc007d9580344eb7b008bf03c85,2025-02-24T22:15:22.913000
|
||||
CVE-2025-27141,0,0,19a3c923af6f6f4189d4be91702969bf59100e645a0e1d60c810d2a5f034238b,2025-02-24T22:15:23.077000
|
||||
CVE-2025-27143,1,1,f6196a31f6bc594bd6a78f99bac329907739405671eed3f73a517d781727c862,2025-02-24T23:15:11.160000
|
||||
CVE-2025-27144,1,1,1943a5ebc9fa4ebdac773d12aa5884bfb6e27a53701e1ad9e8e73a5ce013ecba,2025-02-24T23:15:11.427000
|
||||
CVE-2025-27143,0,0,f6196a31f6bc594bd6a78f99bac329907739405671eed3f73a517d781727c862,2025-02-24T23:15:11.160000
|
||||
CVE-2025-27144,0,0,1943a5ebc9fa4ebdac773d12aa5884bfb6e27a53701e1ad9e8e73a5ce013ecba,2025-02-24T23:15:11.427000
|
||||
CVE-2025-27145,1,1,a3c8fa3e8f168b41a19d503927614962135b440f4ddc1dc3f99b33ccf6cddc24,2025-02-25T02:15:16.300000
|
||||
CVE-2025-27218,0,0,efa55c2dc9300fcbe5554c514f0fd9c100e33cfb72ff20b2eedb0bf35dee5b0b,2025-02-20T21:15:26.510000
|
||||
CVE-2025-27265,0,0,f92ef224928c265ed828ba40cf1c61290404ad79163953c8c2df56f81d7b8ab6,2025-02-24T15:15:14.310000
|
||||
CVE-2025-27266,0,0,7b4f333de7657eb474765345c5822ee79cdee853af3b515f2a266de5b5a75147,2025-02-24T15:15:14.443000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user