Auto-Update: 2025-02-25T03:01:05.571630+00:00

This commit is contained in:
cad-safe-bot 2025-02-25 03:04:34 +00:00
parent 1269ff274a
commit a7253572e9
19 changed files with 704 additions and 60 deletions

View File

@ -2,7 +2,7 @@
"id": "CVE-2017-3066",
"sourceIdentifier": "psirt@adobe.com",
"published": "2017-04-27T14:59:00.233",
"lastModified": "2025-02-24T16:15:10.670",
"lastModified": "2025-02-25T02:00:02.097",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -84,6 +84,10 @@
}
]
},
"cisaExploitAdd": "2025-02-24",
"cisaActionDue": "2025-03-17",
"cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
"cisaVulnerabilityName": "Adobe ColdFusion Deserialization Vulnerability",
"weaknesses": [
{
"source": "nvd@nist.gov",

View File

@ -2,7 +2,7 @@
"id": "CVE-2018-6882",
"sourceIdentifier": "cve@mitre.org",
"published": "2018-03-27T16:29:00.530",
"lastModified": "2025-02-07T17:15:11.263",
"lastModified": "2025-02-25T02:00:02.097",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -87,7 +87,7 @@
"cisaExploitAdd": "2022-04-19",
"cisaActionDue": "2022-05-10",
"cisaRequiredAction": "Apply updates per vendor instructions.",
"cisaVulnerabilityName": "Zimbra Collaboration Suite (ZCS) Cross-Site Scripting (XSS) Vulnerability",
"cisaVulnerabilityName": "Synacor Zimbra Collaboration Suite (ZCS) Cross-Site Scripting (XSS) Vulnerability",
"weaknesses": [
{
"source": "nvd@nist.gov",

View File

@ -2,7 +2,7 @@
"id": "CVE-2019-9670",
"sourceIdentifier": "cve@mitre.org",
"published": "2019-05-29T22:29:01.507",
"lastModified": "2025-02-07T14:15:46.887",
"lastModified": "2025-02-25T02:00:02.097",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -87,7 +87,7 @@
"cisaExploitAdd": "2022-01-10",
"cisaActionDue": "2022-07-10",
"cisaRequiredAction": "Apply updates per vendor instructions.",
"cisaVulnerabilityName": "Synacor Zimbra Collaboration (ZCS) Improper Restriction of XML External Entity Reference",
"cisaVulnerabilityName": "Synacor Zimbra Collaboration Suite (ZCS) Improper Restriction of XML External Entity Reference",
"weaknesses": [
{
"source": "nvd@nist.gov",

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-24682",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-02-09T04:15:07.400",
"lastModified": "2025-01-29T22:15:27.890",
"lastModified": "2025-02-25T02:00:02.097",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -87,7 +87,7 @@
"cisaExploitAdd": "2022-02-25",
"cisaActionDue": "2022-03-11",
"cisaRequiredAction": "Apply updates per vendor instructions.",
"cisaVulnerabilityName": "Zimbra Webmail Cross-Site Scripting Vulnerability",
"cisaVulnerabilityName": "Synacor Zimbra Webmail Cross-Site Scripting Vulnerability",
"weaknesses": [
{
"source": "nvd@nist.gov",

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-27924",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-04-21T00:15:08.360",
"lastModified": "2025-01-29T17:15:18.840",
"lastModified": "2025-02-25T02:00:02.097",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -87,7 +87,7 @@
"cisaExploitAdd": "2022-08-04",
"cisaActionDue": "2022-08-25",
"cisaRequiredAction": "Apply updates per vendor instructions.",
"cisaVulnerabilityName": "Zimbra Collaboration (ZCS) Command Injection Vulnerability",
"cisaVulnerabilityName": "Synacor Zimbra Collaboration Suite (ZCS) Command Injection Vulnerability",
"weaknesses": [
{
"source": "nvd@nist.gov",

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-27925",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-04-21T00:15:08.407",
"lastModified": "2025-01-29T17:15:19.050",
"lastModified": "2025-02-25T02:00:02.097",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -87,7 +87,7 @@
"cisaExploitAdd": "2022-08-11",
"cisaActionDue": "2022-09-01",
"cisaRequiredAction": "Apply updates per vendor instructions.",
"cisaVulnerabilityName": "Zimbra Collaboration (ZCS) Arbitrary File Upload Vulnerability",
"cisaVulnerabilityName": "Synacor Zimbra Collaboration Suite (ZCS) Arbitrary File Upload Vulnerability",
"weaknesses": [
{
"source": "nvd@nist.gov",

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-27926",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-04-21T00:15:08.450",
"lastModified": "2025-01-29T17:15:19.240",
"lastModified": "2025-02-25T02:00:02.097",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -87,7 +87,7 @@
"cisaExploitAdd": "2023-04-03",
"cisaActionDue": "2023-04-24",
"cisaRequiredAction": "Apply updates per vendor instructions.",
"cisaVulnerabilityName": "Zimbra Collaboration (ZCS) Cross-Site Scripting (XSS) Vulnerability",
"cisaVulnerabilityName": "Synacor Zimbra Collaboration Suite (ZCS) Cross-Site Scripting (XSS) Vulnerability",
"weaknesses": [
{
"source": "nvd@nist.gov",

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-37042",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-08-12T15:15:16.053",
"lastModified": "2025-01-29T17:15:21.530",
"lastModified": "2025-02-25T02:00:02.097",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -62,7 +62,7 @@
"cisaExploitAdd": "2022-08-11",
"cisaActionDue": "2022-09-01",
"cisaRequiredAction": "Apply updates per vendor instructions.",
"cisaVulnerabilityName": "Zimbra Collaboration (ZCS) Authentication Bypass Vulnerability",
"cisaVulnerabilityName": "Synacor Zimbra Collaboration Suite (ZCS) Authentication Bypass Vulnerability",
"weaknesses": [
{
"source": "nvd@nist.gov",

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-41352",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-09-26T02:15:10.733",
"lastModified": "2025-02-03T15:15:14.510",
"lastModified": "2025-02-25T02:00:02.097",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -62,7 +62,7 @@
"cisaExploitAdd": "2022-10-20",
"cisaActionDue": "2022-11-10",
"cisaRequiredAction": "Apply updates per vendor instructions.",
"cisaVulnerabilityName": "Zimbra Collaboration (ZCS) Arbitrary File Upload Vulnerability",
"cisaVulnerabilityName": "Synacor Zimbra Collaboration Suite (ZCS) Arbitrary File Upload Vulnerability",
"weaknesses": [
{
"source": "nvd@nist.gov",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-37580",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-07-31T16:15:10.327",
"lastModified": "2025-01-27T21:55:19.183",
"lastModified": "2025-02-25T02:00:02.097",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@ -38,7 +38,7 @@
"cisaExploitAdd": "2023-07-27",
"cisaActionDue": "2023-08-17",
"cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
"cisaVulnerabilityName": "Zimbra Collaboration (ZCS) Cross-Site Scripting (XSS) Vulnerability",
"cisaVulnerabilityName": "Synacor Zimbra Collaboration Suite (ZCS) Cross-Site Scripting (XSS) Vulnerability",
"weaknesses": [
{
"source": "nvd@nist.gov",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-20953",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2024-02-17T02:15:49.520",
"lastModified": "2025-02-13T18:16:37.007",
"lastModified": "2025-02-25T02:00:02.097",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -39,6 +39,10 @@
}
]
},
"cisaExploitAdd": "2025-02-24",
"cisaActionDue": "2025-03-17",
"cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
"cisaVulnerabilityName": "Oracle Agile Product Lifecycle Management (PLM) Deserialization Vulnerability",
"weaknesses": [
{
"source": "nvd@nist.gov",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-45519",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-02T22:15:02.770",
"lastModified": "2024-12-20T16:38:02.830",
"lastModified": "2025-02-25T02:00:02.097",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@ -62,7 +62,7 @@
"cisaExploitAdd": "2024-10-03",
"cisaActionDue": "2024-10-24",
"cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
"cisaVulnerabilityName": "Synacor Zimbra Collaboration Command Execution Vulnerability",
"cisaVulnerabilityName": "Synacor Zimbra Collaboration Suite (ZCS) Command Execution Vulnerability",
"weaknesses": [
{
"source": "nvd@nist.gov",

View File

@ -0,0 +1,137 @@
{
"id": "CVE-2025-1642",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-02-25T01:15:09.057",
"lastModified": "2025-02-25T01:15:09.057",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in Benner ModernaNet up to 1.1.0. It has been declared as critical. This vulnerability affects unknown code of the file /AGE0000700/GetImageMedico?fooId=1. The manipulation of the argument fooId leads to improper control of resource identifiers. The attack can be initiated remotely. Upgrading to version 1.1.1 is able to address this issue. It is recommended to upgrade the affected component."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "LOW",
"vulnerableSystemIntegrity": "NONE",
"vulnerableSystemAvailability": "NONE",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
"baseScore": 4.0,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-99"
}
]
}
],
"references": [
{
"url": "https://github.com/yago3008/cves",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.296692",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.296692",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.499877",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,141 @@
{
"id": "CVE-2025-1643",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-02-25T01:15:09.783",
"lastModified": "2025-02-25T01:15:09.783",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in Benner ModernaNet up to 1.1.0. It has been rated as problematic. This issue affects some unknown processing of the file /DadosPessoais/SG_AlterarSenha. The manipulation leads to cross-site request forgery. The attack may be initiated remotely. Upgrading to version 1.1.1 is able to address this issue. It is recommended to upgrade the affected component."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "PASSIVE",
"vulnerableSystemConfidentiality": "NONE",
"vulnerableSystemIntegrity": "LOW",
"vulnerableSystemAvailability": "NONE",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"baseScore": 5.0,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
},
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://github.com/yago3008/cves",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.296693",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.296693",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.500574",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,141 @@
{
"id": "CVE-2025-1644",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-02-25T02:15:14.863",
"lastModified": "2025-02-25T02:15:14.863",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as problematic has been found in Benner ModernaNet up to 1.2.0. Affected is an unknown function of the file /DadosPessoais/SG_Gravar. The manipulation of the argument idItAg leads to cross-site request forgery. It is possible to launch the attack remotely. Upgrading to version 1.2.1 is able to address this issue. It is recommended to upgrade the affected component."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "PASSIVE",
"vulnerableSystemConfidentiality": "NONE",
"vulnerableSystemIntegrity": "LOW",
"vulnerableSystemAvailability": "NONE",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"baseScore": 5.0,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
},
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://github.com/yago3008/cves",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.296694",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.296694",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.500575",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,137 @@
{
"id": "CVE-2025-1645",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-02-25T02:15:16.123",
"lastModified": "2025-02-25T02:15:16.123",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as critical was found in Benner Connecta 1.0.5330. Affected by this vulnerability is an unknown functionality of the file /Usuarios/Usuario/EditarLogado/. The manipulation of the argument Handle leads to improper control of resource identifiers. The attack can be launched remotely. The vendor was contacted early about this disclosure but did not respond in any way."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "LOW",
"vulnerableSystemIntegrity": "LOW",
"vulnerableSystemAvailability": "LOW",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"baseScore": 6.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-99"
}
]
}
],
"references": [
{
"url": "https://github.com/yago3008/cves",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.296695",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.296695",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.501406",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,68 @@
{
"id": "CVE-2025-27145",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-02-25T02:15:16.300",
"lastModified": "2025-02-25T02:15:16.300",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "copyparty, a portable file server, has a DOM-based cross-site scripting vulnerability in versions prior to 1.16.15. The vulnerability is considered low-risk. By handing someone a maliciously-named file, and then tricking them into dragging the file into copyparty's Web-UI, an attacker could execute arbitrary javascript with the same privileges as that user. For example, this could give unintended read-access to files owned by that user. The bug is triggered by the drag-drop action itself; it is not necessary to actually initiate the upload. The file must be empty (zero bytes). Note that, as a general-purpose webserver, it is intentionally possible to upload HTML-files with arbitrary javascript in `<script>` tags, which will execute when the file is opened. The difference is that this vulnerability would trigger execution of javascript during the act of uploading, and not when the uploaded file was opened. Version 1.16.15 contains a fix."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N",
"baseScore": 3.6,
"baseSeverity": "LOW",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.0,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
},
{
"lang": "en",
"value": "CWE-83"
}
]
}
],
"references": [
{
"url": "https://github.com/9001/copyparty/commit/438ea6ccb06f39d7cbb4b6ee7ad44606e21a63dd",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/9001/copyparty/releases/tag/v1.16.15",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/9001/copyparty/security/advisories/GHSA-m2jw-cj8v-937r",
"source": "security-advisories@github.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2025-02-25T00:55:55.651837+00:00
2025-02-25T03:01:05.571630+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2025-02-25T00:15:09.913000+00:00
2025-02-25T02:15:16.300000+00:00
```
### Last Data Feed Release
@ -27,35 +27,42 @@ Repository synchronizes with the NVD every 2 hours.
Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest)
```plain
2025-02-24T01:00:04.366182+00:00
2025-02-25T01:00:04.363820+00:00
```
### Total Number of included CVEs
```plain
282238
282243
```
### CVEs added in the last Commit
Recently added CVEs: `10`
Recently added CVEs: `5`
- [CVE-2024-53542](CVE-2024/CVE-2024-535xx/CVE-2024-53542.json) (`2025-02-24T23:15:09.410`)
- [CVE-2024-53543](CVE-2024/CVE-2024-535xx/CVE-2024-53543.json) (`2025-02-24T23:15:10.540`)
- [CVE-2024-53544](CVE-2024/CVE-2024-535xx/CVE-2024-53544.json) (`2025-02-24T23:15:10.663`)
- [CVE-2024-56525](CVE-2024/CVE-2024-565xx/CVE-2024-56525.json) (`2025-02-24T23:15:10.793`)
- [CVE-2024-57685](CVE-2024/CVE-2024-576xx/CVE-2024-57685.json) (`2025-02-24T23:15:10.917`)
- [CVE-2025-1640](CVE-2025/CVE-2025-16xx/CVE-2025-1640.json) (`2025-02-25T00:15:09.723`)
- [CVE-2025-1641](CVE-2025/CVE-2025-16xx/CVE-2025-1641.json) (`2025-02-25T00:15:09.913`)
- [CVE-2025-22974](CVE-2025/CVE-2025-229xx/CVE-2025-22974.json) (`2025-02-24T23:15:11.033`)
- [CVE-2025-27143](CVE-2025/CVE-2025-271xx/CVE-2025-27143.json) (`2025-02-24T23:15:11.160`)
- [CVE-2025-27144](CVE-2025/CVE-2025-271xx/CVE-2025-27144.json) (`2025-02-24T23:15:11.427`)
- [CVE-2025-1642](CVE-2025/CVE-2025-16xx/CVE-2025-1642.json) (`2025-02-25T01:15:09.057`)
- [CVE-2025-1643](CVE-2025/CVE-2025-16xx/CVE-2025-1643.json) (`2025-02-25T01:15:09.783`)
- [CVE-2025-1644](CVE-2025/CVE-2025-16xx/CVE-2025-1644.json) (`2025-02-25T02:15:14.863`)
- [CVE-2025-1645](CVE-2025/CVE-2025-16xx/CVE-2025-1645.json) (`2025-02-25T02:15:16.123`)
- [CVE-2025-27145](CVE-2025/CVE-2025-271xx/CVE-2025-27145.json) (`2025-02-25T02:15:16.300`)
### CVEs modified in the last Commit
Recently modified CVEs: `0`
Recently modified CVEs: `12`
- [CVE-2017-3066](CVE-2017/CVE-2017-30xx/CVE-2017-3066.json) (`2025-02-25T02:00:02.097`)
- [CVE-2018-6882](CVE-2018/CVE-2018-68xx/CVE-2018-6882.json) (`2025-02-25T02:00:02.097`)
- [CVE-2019-9670](CVE-2019/CVE-2019-96xx/CVE-2019-9670.json) (`2025-02-25T02:00:02.097`)
- [CVE-2022-24682](CVE-2022/CVE-2022-246xx/CVE-2022-24682.json) (`2025-02-25T02:00:02.097`)
- [CVE-2022-27924](CVE-2022/CVE-2022-279xx/CVE-2022-27924.json) (`2025-02-25T02:00:02.097`)
- [CVE-2022-27925](CVE-2022/CVE-2022-279xx/CVE-2022-27925.json) (`2025-02-25T02:00:02.097`)
- [CVE-2022-27926](CVE-2022/CVE-2022-279xx/CVE-2022-27926.json) (`2025-02-25T02:00:02.097`)
- [CVE-2022-37042](CVE-2022/CVE-2022-370xx/CVE-2022-37042.json) (`2025-02-25T02:00:02.097`)
- [CVE-2022-41352](CVE-2022/CVE-2022-413xx/CVE-2022-41352.json) (`2025-02-25T02:00:02.097`)
- [CVE-2023-37580](CVE-2023/CVE-2023-375xx/CVE-2023-37580.json) (`2025-02-25T02:00:02.097`)
- [CVE-2024-20953](CVE-2024/CVE-2024-209xx/CVE-2024-20953.json) (`2025-02-25T02:00:02.097`)
- [CVE-2024-45519](CVE-2024/CVE-2024-455xx/CVE-2024-45519.json) (`2025-02-25T02:00:02.097`)
## Download and Usage

View File

@ -103544,7 +103544,7 @@ CVE-2017-3062,0,0,ac3b345ad95f10e735ab69ea990c6af9b3230ef38a4463030828d3964f78f4
CVE-2017-3063,0,0,5fa9f659f2774399f1708168687d3e98afe75edad415c1aa6e5016e3e3e51fd4,2024-11-21T03:24:45.347000
CVE-2017-3064,0,0,63f6d50ceccfed39ecbbeee37cef38bd6ffe17a20574544916dfe225da95171b,2024-11-21T03:24:45.477000
CVE-2017-3065,0,0,0963c2ea0b754d113dd707a8e8b0d5bf5afc17d081be5b0ca1a48f32865e2497,2024-11-21T03:24:45.600000
CVE-2017-3066,0,0,e5359aae9fa9461cf6147103113b6014ffbbe4d86adbd3f949050c9a9e303519,2025-02-24T16:15:10.670000
CVE-2017-3066,0,1,ecd0971aa3577dff527ec63b3c07a67a50ef8dde3765f03eb507a5961812bfeb,2025-02-25T02:00:02.097000
CVE-2017-3067,0,0,791a33003dd1e11c651c188e4f03f08ab06e2e31440f58108137e87ceef3bbd2,2024-11-21T03:24:45.847000
CVE-2017-3068,0,0,af80d0c3c329fc69043b3685c041805dc046bbe7ad713185db1fd6aa7c72c33d,2024-11-21T03:24:45.967000
CVE-2017-3069,0,0,d3276aefa92679d09fe4b20dbe1190ee1aaeabf36bdd233a71239fdc29223803,2024-11-21T03:24:46.100000
@ -125035,7 +125035,7 @@ CVE-2018-6878,0,0,8957f99d3762ccb00009151816e281f869f98effe9ca63fe04ea9de9cb2b25
CVE-2018-6879,0,0,535972e839f19a8623193f36f9bc049bf1b81d9abb2b7b756c64ad6bd010f2c3,2024-11-21T04:11:21.263000
CVE-2018-6880,0,0,3cd50d6cbd17152daba6ccbe0e977ea9496f687c201aab9fa0ca5d3cbead7cd2,2024-11-21T04:11:21.400000
CVE-2018-6881,0,0,fc5797f0201f5f361e734a06ee788a23d6c71171471669dc4f057cc8b1ac663d,2024-11-21T04:11:21.543000
CVE-2018-6882,0,0,64600ee1268c0c53d3c77a99fd1f12bb835c07ba0123c3cce4487f237c260757,2025-02-07T17:15:11.263000
CVE-2018-6882,0,1,cfa2f5f604c7806f4190aef650aa11f200f8fc2534792e71d697b09cee1f4509,2025-02-25T02:00:02.097000
CVE-2018-6883,0,0,b930ea02e0047e1e851632c79fda9687060f683edc6bf626cf7a0b729b9ec264,2024-11-21T04:11:21.867000
CVE-2018-6885,0,0,da2abdf626c132f9442f8a46638932ae95142647389d6e91dd79ebe5ee8289d7,2024-11-21T04:11:22.017000
CVE-2018-6888,0,0,1a9bc092935e2b7e274904d4f2135ce42e3978c4a976bdcaf4e872c2086d4c6c,2024-11-21T04:11:22.163000
@ -144012,7 +144012,7 @@ CVE-2019-9661,0,0,78b8e303b545d2696109632e146888cbde440ef272a2da5e87268ac9241c60
CVE-2019-9662,0,0,fdfede734148ec4181ff4477d84cc9204c32172edd2f620c173b366457be13f4,2024-11-21T04:52:04.667000
CVE-2019-9668,0,0,492569773c04c627846fd55e8875c5636ade06b1b4047579f3615dbf9c74e32c,2024-11-21T04:52:04.800000
CVE-2019-9669,0,0,7d214939048fdc7f0c8c7aa9a4e9b6e8d1a5a2348e448cf2a764f5b85744ed08,2024-11-21T04:52:04.960000
CVE-2019-9670,0,0,28e8c0744ff871083218c38fdfbf7caf3a1d305b3bceaa053afa0b0a8fc2004d,2025-02-07T14:15:46.887000
CVE-2019-9670,0,1,440ae92596162e630b3fba2a06b477495acba52293e22bd0754d2745db20f6a8,2025-02-25T02:00:02.097000
CVE-2019-9673,0,0,996b12ed39bd93bbd2ab5c7f1b7a883001b12a3d1b668f8c621d823df13f2aec,2024-11-21T04:52:05.250000
CVE-2019-9674,0,0,b13947080e156bb28ba82202960d5d8df52ed1f3821246576eab72c9376525f6,2024-11-21T04:52:05.390000
CVE-2019-9675,0,0,b11de9c0b8e85884a2989d7080eb2020b00579a2e98c6862771ecdeb933914a4,2024-11-21T04:52:05.553000
@ -194128,7 +194128,7 @@ CVE-2022-24679,0,0,249b2c761c4c76113344b88e5ea9c4bc085bbbc002ba2eb0b3347ac9a72f7
CVE-2022-2468,0,0,e81e142ac71cf372cca807f427f3a26185bb1718b2143ba02ee2a3ca1d345497,2024-11-21T07:01:03.110000
CVE-2022-24680,0,0,c58e7fc7cebfed1eafe5a4fe066109bbc6bc096cb1a79e425fe2f5d46563f10a,2024-11-21T06:50:51.573000
CVE-2022-24681,0,0,27f6bf946f98201bb07ac17e2d1a23698876807cb9c0eceec121f3219d357821,2024-11-21T06:50:51.707000
CVE-2022-24682,0,0,616e688ef8b8abce7397d5bceca8b07c767af73d420f2cb703ebbebd5da5e560,2025-01-29T22:15:27.890000
CVE-2022-24682,0,1,d118d2b8beec922a982417bdd4efb50974be104ebf1b2d5aaf97ecd0c1cb9d6a,2025-02-25T02:00:02.097000
CVE-2022-24683,0,0,ef4d435ae4186887af4a2b9d28b0d623ada678af639dc6512b8913085eca46d2,2024-11-21T06:50:52.120000
CVE-2022-24684,0,0,f2dde9f506819062f97e9b67253d8742037a0ec7f4e1005aa0f28ec5f363ea07,2024-11-21T06:50:52.277000
CVE-2022-24685,0,0,55fb81f48a436537bc7563c3bdda05f5db1a3a3908e3bf64e484d33a2ed48237,2024-11-21T06:50:52.413000
@ -196774,9 +196774,9 @@ CVE-2022-27918,0,0,8674e471da7f3503c274ce3ddc54a2e01853df65b42f173f28632af936f42
CVE-2022-27919,0,0,a11bd79ed72f9771535843d55b124e78d04abf5fba1cef2d18220d545cc9ea61,2024-11-21T06:56:28.020000
CVE-2022-2792,0,0,cd183fcd525db8a7dd9c55e88578e37c9b6b149b143f7130deab5e6d02e689c1,2024-11-21T07:01:42.227000
CVE-2022-27920,0,0,d5055b7228c4d13c1a78a219ff52d92e2b735d50ac021e97797591f24a2890f5,2024-11-21T06:56:28.153000
CVE-2022-27924,0,0,a695c5870a402b1303ac271b620e38133d8bfc29e7350a33e6eb1c1405f7c0b0,2025-01-29T17:15:18.840000
CVE-2022-27925,0,0,81cb07659695eba118d675630794270e004e52a57013639f96592632bd3d60b2,2025-01-29T17:15:19.050000
CVE-2022-27926,0,0,57a758c334ff0ab9d0d3a21a4369769ff4198a07fccaff244162179a9788ee66,2025-01-29T17:15:19.240000
CVE-2022-27924,0,1,433dc8365016f37478f6e1ad34c6bbd758b05cdcdd2a565cd5dae742e01e2c67,2025-02-25T02:00:02.097000
CVE-2022-27925,0,1,7c94031d7bfaa9ba8fd3fa33b60aaeec9171c102c3ab45939e0a207aa7f8987c,2025-02-25T02:00:02.097000
CVE-2022-27926,0,1,8ef3cf665df5d50ed14141d1d4e2a52a8fe4ccd91182ba650a3fa308d0c8da7a,2025-02-25T02:00:02.097000
CVE-2022-27927,0,0,81ced154bfd17d2353a2fca2e6c561efe9eca19085a4b7974475780416a40339,2024-11-21T06:56:28.780000
CVE-2022-27928,0,0,6e254f7f408399d46631767f474b912e698944ca12a7d4885ed017698951686a,2024-11-21T06:56:28.933000
CVE-2022-27929,0,0,e1d6eded4a4badcad5a48f5a752c6266fa98b2fae30a5258fe34aaca1061ca21,2024-11-21T06:56:29.067000
@ -204303,7 +204303,7 @@ CVE-2022-37034,0,0,44c3ff79f3241d69d9b0fda167b0c9117a9f6cd87d2dcc17544ed562c9ccd
CVE-2022-37035,0,0,79c99da62b00b653f0668cd130a7c10e6431b2f2b52b49ba02b6125615219d83,2024-11-21T07:14:19.953000
CVE-2022-3704,0,0,15eb5a1597614a16cd1ca9c5110e86241009ac0731de2733acf20b57d757d3fa,2024-11-21T07:20:04.373000
CVE-2022-37041,0,0,2e90c7133ca39722055e1269e726344d5792dc0071e86a20ec76fb9f734f1af3,2024-11-21T07:14:20.100000
CVE-2022-37042,0,0,31e922a8ff226a74d65aa64d0011d3f3bc07effca3da735cec797fb90987cdea,2025-01-29T17:15:21.530000
CVE-2022-37042,0,1,57fd645558b934c0be0d68301b7ee83153a1b469380be5b38eecfcc4efbb6eff,2025-02-25T02:00:02.097000
CVE-2022-37043,0,0,33b2b827e0455d7c706f59b3e4e51d18162c0ce2a8b95aa3f7730560699a3b5e,2024-11-21T07:14:20.410000
CVE-2022-37044,0,0,e40e4180804b10fdb28a78dfab9a640de3015abc513fd7bf5deb72047371e224,2024-11-21T07:14:20.570000
CVE-2022-37047,0,0,d6ef48199b8e2af42001d7bd6e62f60f1c1b2ed8f14a2df9832eae6cd0dca9f1,2024-11-21T07:14:20.723000
@ -207473,7 +207473,7 @@ CVE-2022-41349,0,0,f37e912a4b114c1184a1865bf9d5da62dec108ec18e1599ba0fc601bb7455
CVE-2022-4135,0,0,b855be7c691705b47a74bee35e6ede2f679288f324d7acc09844fc7c8bd89558,2025-02-03T14:15:33.897000
CVE-2022-41350,0,0,07c59b26e4298d985fa1356786d58d9eaea318e5fb01099dfd2f0c684cb7fb9c,2024-11-21T07:23:05.973000
CVE-2022-41351,0,0,0e738e1029fa2ba786b692581f7ba428943e32cc9bfd63b89b6f8436bd389f76,2024-11-21T07:23:06.113000
CVE-2022-41352,0,0,b20f5c078a7254073897def049b4cca164f114f0b001fc53928baf4e53607bd6,2025-02-03T15:15:14.510000
CVE-2022-41352,0,1,4c883efad9dc10eb9e9d7a906cad5538534094b827135b099e1838f18870bc51,2025-02-25T02:00:02.097000
CVE-2022-41354,0,0,142e17ba66f45fbe1ad6b144be7bb87c3d00b58c77c52149882b79884c804f44,2024-11-21T07:23:06.407000
CVE-2022-41355,0,0,1f97e23f2a574b2a07e08a487af9f40c1f4f24cb1046f21cb416dc0eb8d8e982,2024-11-21T07:23:06.557000
CVE-2022-41358,0,0,7c1f17dd8d88833d7b2431ef0dc842957ecdf0484b1199b8fad6997ed5be8a8d,2024-11-21T07:23:06.687000
@ -229199,7 +229199,7 @@ CVE-2023-37577,0,0,b0fd59cabf196c2dce306a3dfd18b0e7769f587e98763971c0f69d8f47120
CVE-2023-37578,0,0,db1d011239168d2f0753523137a605241d87dd361fa246b7536264b2cfd1972e,2024-11-21T08:11:59.510000
CVE-2023-37579,0,0,4619aa08d1ce28c3366bb44966075d308cc27715f020dfd6296b225d60c0dab2,2024-11-21T08:11:59.647000
CVE-2023-3758,0,0,66dfa7da71c29fdd2b245f8df2204f07ac231a0eae8609ba676c08eb8a95ccab,2025-02-06T17:15:17.657000
CVE-2023-37580,0,0,8d275160b93ac9ce8ee9bc0d58aec68c130469746723ee6767d328399913bc21,2025-01-27T21:55:19.183000
CVE-2023-37580,0,1,2582c514843958ddfa6af60f73b891ab37b529fcdd264d49d5b6a1bd6b7c73d8,2025-02-25T02:00:02.097000
CVE-2023-37581,0,0,093be304138d0cca6e8decef8cb1e83d94e4f8751f573ee26489914f63ec252d,2024-11-21T08:11:59.950000
CVE-2023-37582,0,0,f426cbb472b86178431d5ad7872499adc0db4b619079a72be475751ff7ba514c,2025-02-13T17:16:46.190000
CVE-2023-3759,0,0,e99e81156d6b104b2e078d75cf4c33ae1aef27bc0d50c9c844090c25ea87b21c,2024-11-21T08:18:00.007000
@ -248314,7 +248314,7 @@ CVE-2024-20949,0,0,8447586b572938721504c1687180a68e63afc2fdacf6da4b480edb44c75dd
CVE-2024-20950,0,0,f5c99eea8d10c44cb6306cc5eef489fdee68a2f90bacd64ab99a343812559bae,2024-11-21T08:53:29.690000
CVE-2024-20951,0,0,a912377cd9c5e3f36b663316c781a26423eb926f1a59dc0a2f3408b7c7125bd6,2024-11-29T14:07:57.480000
CVE-2024-20952,0,0,974bc5f3b18c2e594a4d1c4bd936f6f9b31dc1a29fe2f12bc3faf51bb8eac324,2024-11-21T08:53:29.903000
CVE-2024-20953,0,0,56a9182f081fcc08e4ad04a01bc3e309a3c17c4e34cffaf728960021ae8c97b6,2025-02-13T18:16:37.007000
CVE-2024-20953,0,1,3de9278f181fcefe6aa20f00ec39de2a101cc9f3772eee3803a2cca4849f13d6,2025-02-25T02:00:02.097000
CVE-2024-20954,0,0,9afc2253774090ba4eb185e93f29f04799d88be99ccffcb7987fb70e621bc5d1,2024-12-06T19:38:00.843000
CVE-2024-20955,0,0,888e1b88ad65bdcadee36bf516889d82a35fb4b5c74e00f287b421d64597a1fe,2024-11-21T08:53:30.257000
CVE-2024-20956,0,0,9661739112364392106915eba09ba3edb13da21796d158c1a55722d67e3804e6,2024-11-27T16:37:04.993000
@ -267186,7 +267186,7 @@ CVE-2024-45513,0,0,25383385e2481e17b58af0b6e8f56bf94670b2d8f40ad98216966f161261e
CVE-2024-45514,0,0,7c4b7c6d70b14b13f42d6ce3c0114c4be691ac359315234fcdf5201ecc180838,2024-11-21T18:15:08.980000
CVE-2024-45517,0,0,9ae29652a251f6463a9327eae29d2e48904246c6a1726faacae2bdc1383f4e16,2024-11-21T18:15:09.360000
CVE-2024-45518,0,0,097e334ff5ea6e41f366599c72134c8651cb553e492c30874b146dfc7c023e19,2024-10-30T21:23:59.893000
CVE-2024-45519,0,0,a4e00f7b7b350923f5ea9829bd557075a8c7be45eaef48586624621fdc66f332,2024-12-20T16:38:02.830000
CVE-2024-45519,0,1,094ccd6257d3617e5ee5eb108e56e5f8206c097c09ed366876abfc431763f55e,2025-02-25T02:00:02.097000
CVE-2024-4552,0,0,0ac013621f010657983b95b3c9656c63a7805aea50fe3c0c1148c97b70e80ccb,2024-11-21T09:43:05.410000
CVE-2024-45520,0,0,5466845711de025b484d71bfbeb994612050916cd5bfb23e3333148ac74978ae,2024-12-02T16:15:11.293000
CVE-2024-45522,0,0,09ceef78cc5f057be786bb183a479b765b1739f0b7ce2fbf1b1d3c524b7ab69d,2024-09-05T14:29:32.737000
@ -272786,9 +272786,9 @@ CVE-2024-53526,0,0,bc5f19d2f051183a95544adcafd452a82c4d307b983121af7f17d196af8eb
CVE-2024-5353,0,0,797e03a5615e2bede928ac816012d8783c471de5bd74a0480881887afd7a657a,2024-11-21T09:47:28.863000
CVE-2024-53537,0,0,998d51e6807baacce6b9daafc17e8fac4083f8aca4268561cf6e0645830b6350,2025-02-18T19:15:18.083000
CVE-2024-5354,0,0,e179ff0fdd33289a32ca4c68c73a51c0aa8ddee9c94944cd1d4fd7185f36a76c,2024-11-21T09:47:28.997000
CVE-2024-53542,1,1,979de5ac0ee8ab3d3ceb0d99ade6cf88535af9aa8960b448b7a5aec4766f3aaa,2025-02-24T23:15:09.410000
CVE-2024-53543,1,1,2ed10669bbb7ccca57c3f53096b08fec178d3070c1b9eeaa08ab25cf15a19e31,2025-02-24T23:15:10.540000
CVE-2024-53544,1,1,5940a53d90185103a5ea7f7b05f0da10fa7d8c5017f54752e9bf5bab40310fc0,2025-02-24T23:15:10.663000
CVE-2024-53542,0,0,979de5ac0ee8ab3d3ceb0d99ade6cf88535af9aa8960b448b7a5aec4766f3aaa,2025-02-24T23:15:09.410000
CVE-2024-53543,0,0,2ed10669bbb7ccca57c3f53096b08fec178d3070c1b9eeaa08ab25cf15a19e31,2025-02-24T23:15:10.540000
CVE-2024-53544,0,0,5940a53d90185103a5ea7f7b05f0da10fa7d8c5017f54752e9bf5bab40310fc0,2025-02-24T23:15:10.663000
CVE-2024-5355,0,0,5ae56d862872a5268a44df2d0e26a54aa307acbf5ff2835727472c989e377b6d,2024-11-21T09:47:29.130000
CVE-2024-53552,0,0,4cbf8fbe1c1d8b81113efcd1116951d33bdd9cbf11887cfd2671d9f28438541a,2024-12-11T16:15:14.373000
CVE-2024-53553,0,0,f76cd837b8044f3ae7bee9c286ff4b43a72406724cd6dd80c83638da1316919f,2025-02-03T21:15:13.667000
@ -274417,7 +274417,7 @@ CVE-2024-5652,0,0,1dda3b28a95a3027cca32754d8e2a9cb8bd181dca86e7b0a455abcf575817a
CVE-2024-56520,0,0,ff4fb3d2adb6c71c503d044fa0b3b3389f24638650ec092efa0e72e1ef66ddd5,2025-01-02T20:16:07.280000
CVE-2024-56521,0,0,5825673c82589e84af39abc3cdc30eb7e41a3356451a7b175ec0e6d80e41cea5,2025-02-18T22:15:13.147000
CVE-2024-56522,0,0,c0719b044dbc0fcdc0d4eaed012a8c95725e84ecda329fba60f601478e6101fc,2024-12-30T16:15:11.920000
CVE-2024-56525,1,1,634fc4eeebe898fc445ad7e3808bd6b236092bf133af0f2522984508e8009a41,2025-02-24T23:15:10.793000
CVE-2024-56525,0,0,634fc4eeebe898fc445ad7e3808bd6b236092bf133af0f2522984508e8009a41,2025-02-24T23:15:10.793000
CVE-2024-56527,0,0,5e8b0b74f38f7ebb35ac054d85b65473e6189ebf6dac534e9c9a780daa1047f5,2025-02-18T22:15:13.270000
CVE-2024-56529,0,0,b5e6c43b0e693d516ac7d8945d0f1e377badc88e38b14416efa9236d9ce55101,2025-02-18T19:15:19.587000
CVE-2024-5653,0,0,6a43b27cee3d2293652e8e6e2ccb4fc0236822263be85c5365c247a4f0b2a7b5,2024-11-21T09:48:05.873000
@ -275091,7 +275091,7 @@ CVE-2024-57681,0,0,46f40990744fd749d4a9af1e8df7c4b5a0bf9ba88074a44657f2ef0606699
CVE-2024-57682,0,0,ba4697aa7ced6095caedc3387a0a1add163335f15a4c7e96b7b3a02a7a9c468f,2025-02-03T20:15:36.063000
CVE-2024-57683,0,0,90a07d3676c8ceb8f75a6cba51bb9c84a613aace3c1524f48e2a9bfdcd2b0e79,2025-02-03T20:15:36.223000
CVE-2024-57684,0,0,bb9784b081b8abb57890ab5a23ebb4f4e85b9b747d00a9882042baa37a4ca976,2025-01-16T20:15:33.340000
CVE-2024-57685,1,1,712bcda34874e20357f921514e577cb14b0b3c02eb819deba96dced27414fe36,2025-02-24T23:15:10.917000
CVE-2024-57685,0,0,712bcda34874e20357f921514e577cb14b0b3c02eb819deba96dced27414fe36,2025-02-24T23:15:10.917000
CVE-2024-57686,0,0,b3e63d1143d51418c4b781604a7d8057cd24cd176983b575e43942d597c27148,2025-02-11T22:15:29.520000
CVE-2024-57687,0,0,3f591284140d188a0181694e131e95eee1c6490731d9aebb4db57934394e9a88,2025-01-10T16:15:29.670000
CVE-2024-5769,0,0,abfeb18ae91d2e4533cdbeb4bf7ad73d20beb760222f23226220c40a5c6d9f91,2025-01-09T11:15:16.127000
@ -279759,8 +279759,12 @@ CVE-2025-1617,0,0,f8b5d497942700d9485e4f9475a52f7ce71fe3f54483032059a95f27d690d0
CVE-2025-1618,0,0,5653f37c834d7e927ebdf4835f8b4b2db1c30742d0495922546989d808169e24,2025-02-24T05:15:10.980000
CVE-2025-1629,0,0,60983f0ba0e5f0b685c866a67c52df667d2bfe57a6c3421095271a3cf3a2da01,2025-02-24T05:15:11.280000
CVE-2025-1632,0,0,e4d830f0038f1d0ec1a385180555c2b78df11cbe25ede30530c1c285ee3eb6b4,2025-02-24T15:15:13.217000
CVE-2025-1640,1,1,c9144f1d36a671c5c294220717c102bbee784a06194946bddd82d757b17db602,2025-02-25T00:15:09.723000
CVE-2025-1641,1,1,3e60680d02c32355c7c51637987e868a5b83b44bf51944f0dde54e34ed255aca,2025-02-25T00:15:09.913000
CVE-2025-1640,0,0,c9144f1d36a671c5c294220717c102bbee784a06194946bddd82d757b17db602,2025-02-25T00:15:09.723000
CVE-2025-1641,0,0,3e60680d02c32355c7c51637987e868a5b83b44bf51944f0dde54e34ed255aca,2025-02-25T00:15:09.913000
CVE-2025-1642,1,1,eb1ad85c96cb940c08a5097dfefa119ff4b08ca6e6f0f41907372556779e3a83,2025-02-25T01:15:09.057000
CVE-2025-1643,1,1,0826f7bcb7f1228229f5784ef58304115e16bc976b45b1d92545793ce6bb0cca,2025-02-25T01:15:09.783000
CVE-2025-1644,1,1,c089c614bad147aba27db7e276630bda628e1050898eb7eafd3da256285acd5e,2025-02-25T02:15:14.863000
CVE-2025-1645,1,1,f84c25d5345ae177afb924fbcfe7e77498beaa89bb1760e6fea90a27526a406a,2025-02-25T02:15:16.123000
CVE-2025-20014,0,0,9692e5cd581a413def58e50a6734c5a89401a76673de37fc6a41ad824a4429cc,2025-01-29T20:15:35.207000
CVE-2025-20016,0,0,6fccb84eb01c2cd66b422e82777f9738bfe5004121e1b551d0ae454724543c0e,2025-01-14T10:15:07.500000
CVE-2025-20029,0,0,9b8781ac9a16d1f4940e1c86f8d87c8f1f8e66cb5b362950b6fdcd60c25126c4,2025-02-05T18:15:29.573000
@ -280742,7 +280746,7 @@ CVE-2025-22963,0,0,12477de813cda7364e5796cbdb911aad8e18d4387dfeeba96b71ade7cc11b
CVE-2025-22964,0,0,6f4095b29312f46a36413a75c5449d4448cc7574209011a37c7cdb11e5f0802a,2025-02-03T19:15:14.207000
CVE-2025-22968,0,0,d3d48189e9b72af1c9aeb72931ff25b490499842dd9dca10fe5551a85839cd34,2025-02-18T22:15:18.143000
CVE-2025-22973,0,0,b448437ac24e0d115300ac0a18a33b0f031d26cd6428b09fcc05bcdedc10d677,2025-02-21T18:15:32.480000
CVE-2025-22974,1,1,8fcb6efe31d178a3db96729e4a369a23148b5cef60ab1f0b278bdcdfefb295d4,2025-02-24T23:15:11.033000
CVE-2025-22974,0,0,8fcb6efe31d178a3db96729e4a369a23148b5cef60ab1f0b278bdcdfefb295d4,2025-02-24T23:15:11.033000
CVE-2025-22976,0,0,34e44a1193299f2815c5773a405812b482572222a2b2eca4f8d55245112e8b61,2025-02-03T19:15:14.397000
CVE-2025-22978,0,0,c26d3b35b5f5b247c22bc9e725ddb59da99594ad5fac650f59f0b0b41ffbe946,2025-02-18T19:15:26.930000
CVE-2025-22980,0,0,90bf7bf36cc737404c9d40dc6715966f270a478ee523b3c5a983294878d28120,2025-01-28T22:15:16.890000
@ -282183,8 +282187,9 @@ CVE-2025-27133,0,0,29844716abafc4dda273789005e3e16abe4d7d6eca7ec6dff9bfc7d4679fc
CVE-2025-27137,0,0,5036444bad86a0c9ebb929b7c838035a7163ade99e11b550d9873b63f4ee5567,2025-02-24T21:15:11.213000
CVE-2025-27140,0,0,2964053422621195e160e6550b952cf184c5edc007d9580344eb7b008bf03c85,2025-02-24T22:15:22.913000
CVE-2025-27141,0,0,19a3c923af6f6f4189d4be91702969bf59100e645a0e1d60c810d2a5f034238b,2025-02-24T22:15:23.077000
CVE-2025-27143,1,1,f6196a31f6bc594bd6a78f99bac329907739405671eed3f73a517d781727c862,2025-02-24T23:15:11.160000
CVE-2025-27144,1,1,1943a5ebc9fa4ebdac773d12aa5884bfb6e27a53701e1ad9e8e73a5ce013ecba,2025-02-24T23:15:11.427000
CVE-2025-27143,0,0,f6196a31f6bc594bd6a78f99bac329907739405671eed3f73a517d781727c862,2025-02-24T23:15:11.160000
CVE-2025-27144,0,0,1943a5ebc9fa4ebdac773d12aa5884bfb6e27a53701e1ad9e8e73a5ce013ecba,2025-02-24T23:15:11.427000
CVE-2025-27145,1,1,a3c8fa3e8f168b41a19d503927614962135b440f4ddc1dc3f99b33ccf6cddc24,2025-02-25T02:15:16.300000
CVE-2025-27218,0,0,efa55c2dc9300fcbe5554c514f0fd9c100e33cfb72ff20b2eedb0bf35dee5b0b,2025-02-20T21:15:26.510000
CVE-2025-27265,0,0,f92ef224928c265ed828ba40cf1c61290404ad79163953c8c2df56f81d7b8ab6,2025-02-24T15:15:14.310000
CVE-2025-27266,0,0,7b4f333de7657eb474765345c5822ee79cdee853af3b515f2a266de5b5a75147,2025-02-24T15:15:14.443000

Can't render this file because it is too large.