mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-19 17:31:42 +00:00
Auto-Update: 2025-02-24T21:00:43.964845+00:00
This commit is contained in:
parent
e2528929c6
commit
ae08ba54a7
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2018-25083",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-03-27T03:15:07.103",
|
||||
"lastModified": "2024-11-21T04:03:31.223",
|
||||
"lastModified": "2025-02-24T20:15:31.150",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-78"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-78"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2021-3923",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2023-03-27T21:15:09.980",
|
||||
"lastModified": "2024-11-21T06:22:47.100",
|
||||
"lastModified": "2025-02-24T20:15:31.777",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N",
|
||||
"baseScore": 2.3,
|
||||
"baseSeverity": "LOW",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-2237",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2023-03-27T22:15:11.817",
|
||||
"lastModified": "2024-11-21T07:00:35.877",
|
||||
"lastModified": "2025-02-24T20:15:31.973",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-3116",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2023-03-27T22:15:11.987",
|
||||
"lastModified": "2024-11-21T07:18:51.613",
|
||||
"lastModified": "2025-02-24T19:15:12.707",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-48348",
|
||||
"sourceIdentifier": "psirt@huawei.com",
|
||||
"published": "2023-03-27T22:15:19.703",
|
||||
"lastModified": "2024-11-21T07:33:13.483",
|
||||
"lastModified": "2025-02-24T19:15:14.043",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.2
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
|
||||
"baseScore": 9.1,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-200"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-48349",
|
||||
"sourceIdentifier": "psirt@huawei.com",
|
||||
"published": "2023-03-27T22:15:19.920",
|
||||
"lastModified": "2024-11-21T07:33:13.603",
|
||||
"lastModified": "2025-02-24T19:15:14.227",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.2
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
|
||||
"baseScore": 9.1,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-290"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-21044",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2023-03-24T20:15:14.090",
|
||||
"lastModified": "2024-11-21T07:42:03.433",
|
||||
"lastModified": "2025-02-24T20:15:32.190",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 4.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-119"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-119"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-21045",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2023-03-24T20:15:14.127",
|
||||
"lastModified": "2024-11-21T07:42:03.543",
|
||||
"lastModified": "2025-02-24T20:15:32.380",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 4.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-416"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-416"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-21048",
|
||||
"sourceIdentifier": "security@android.com",
|
||||
"published": "2023-03-24T20:15:14.230",
|
||||
"lastModified": "2024-11-21T07:42:03.887",
|
||||
"lastModified": "2025-02-24T20:15:32.620",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 4.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-125"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-125"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,20 +2,24 @@
|
||||
"id": "CVE-2024-10222",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2025-02-21T14:15:30.680",
|
||||
"lastModified": "2025-02-21T14:15:30.680",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-02-24T19:43:57.037",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The SVG Support plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 2.5.10 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file. By default, this can only be exploited by administrators, but the ability to upload SVG files can be extended to authors."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El complemento SVG Support para WordPress es vulnerable a Cross-Site Scripting almacenado a trav\u00e9s de la carga de archivos SVG en todas las versiones hasta la 2.5.10 incluida, debido a una depuraci\u00f3n de entrada insuficiente y al escape de salida. Esto permite que atacantes autenticados, con acceso de nivel de autor o superior, inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda al archivo SVG. De forma predeterminada, esto solo puede ser explotado por administradores, pero la capacidad de cargar archivos SVG se puede extender a los autores."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
|
||||
@ -32,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -47,22 +71,54 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:benbodhi:svg_support:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "2.5.11",
|
||||
"matchCriteriaId": "6B2AC543-F85D-4054-9F0B-87A2B454E8C7"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/benbodhi/svg-support/commit/eee3e13b650511c9cc9ee0746be485d031c7c072",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3244181/",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://wordpress.org/plugins/svg-support/#developers",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product",
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/5852f08d-0506-464e-afd1-c625e4034e1d?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-13775",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2025-02-01T13:15:22.847",
|
||||
"lastModified": "2025-02-01T13:15:22.847",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-02-24T19:04:52.170",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,14 +51,38 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:vanquish:woocommerce_support_ticket_system:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "17.9",
|
||||
"matchCriteriaId": "B35A75C3-0BB3-4F28-85ED-4EC10AD20DBD"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://codecanyon.net/item/woocommerce-support-ticket-system/17930050#item-description__change-log",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/72dc919a-c13d-49b4-927d-a0bb837b63dd?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-45781",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2025-02-18T20:15:19.450",
|
||||
"lastModified": "2025-02-18T20:15:19.450",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-02-24T19:15:14.423",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -19,7 +19,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "secalert@redhat.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
@ -39,6 +39,18 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "secalert@redhat.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2024-45781",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-57160",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-01-16T16:15:32.817",
|
||||
"lastModified": "2025-01-31T21:15:10.910",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2025-02-24T19:38:22.867",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -90,8 +90,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:07fly:07flycms:1.3.9:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E9E565AA-68C6-429F-BC02-0680396BD9A3"
|
||||
"criteria": "cpe:2.3:a:07fly:customer_relationship_management:1.3.9:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AFD4EA7E-A093-40CF-98BB-85A410F39D2B"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-57161",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-01-16T16:15:32.937",
|
||||
"lastModified": "2025-01-31T21:15:11.153",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2025-02-24T19:38:43.083",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -90,8 +90,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:07fly:07flycms:1.3.9:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E9E565AA-68C6-429F-BC02-0680396BD9A3"
|
||||
"criteria": "cpe:2.3:a:07fly:customer_relationship_management:1.3.9:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AFD4EA7E-A093-40CF-98BB-85A410F39D2B"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,20 +2,24 @@
|
||||
"id": "CVE-2025-1489",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2025-02-21T12:15:30.740",
|
||||
"lastModified": "2025-02-21T12:15:30.740",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-02-24T19:45:21.653",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The WP-Appbox plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's appbox shortcode in all versions up to, and including, 4.5.4 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El complemento WP-Appbox para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del c\u00f3digo corto de piecal del complemento en todas las versiones hasta la 1.2.5 incluida, debido a una depuraci\u00f3n de entrada insuficiente y al escape de salida en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
|
||||
@ -32,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -47,18 +71,46 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:tchgdns:wp-appbox:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "4.5.5",
|
||||
"matchCriteriaId": "FC6736B3-6866-4D30-B6F4-D3A027FBFE1A"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3244084/",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://wordpress.org/plugins/wp-appbox/#developers",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product",
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/6d58355d-2762-4ecc-aec2-52a1e3323017?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2025/CVE-2025-265xx/CVE-2025-26525.json
Normal file
60
CVE-2025/CVE-2025-265xx/CVE-2025-26525.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2025-26525",
|
||||
"sourceIdentifier": "patrick@puiterwijk.org",
|
||||
"published": "2025-02-24T20:15:33.103",
|
||||
"lastModified": "2025-02-24T20:15:33.103",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Insufficient sanitizing in the TeX notation filter resulted in an \narbitrary file read risk on sites where pdfTeX is available (such as \nthose with TeX Live installed)."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "patrick@puiterwijk.org",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
|
||||
"baseScore": 8.6,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 4.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "patrick@puiterwijk.org",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-552"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-84136",
|
||||
"source": "patrick@puiterwijk.org"
|
||||
},
|
||||
{
|
||||
"url": "https://moodle.org/mod/forum/discuss.php?d=466141",
|
||||
"source": "patrick@puiterwijk.org"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2025/CVE-2025-265xx/CVE-2025-26526.json
Normal file
60
CVE-2025/CVE-2025-265xx/CVE-2025-26526.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2025-26526",
|
||||
"sourceIdentifier": "patrick@puiterwijk.org",
|
||||
"published": "2025-02-24T20:15:33.263",
|
||||
"lastModified": "2025-02-24T20:15:33.263",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Separate Groups mode restrictions were not factored into permission \nchecks before allowing viewing or deletion of responses in Feedback \nactivities."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "patrick@puiterwijk.org",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 2.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "patrick@puiterwijk.org",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-863"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-79976",
|
||||
"source": "patrick@puiterwijk.org"
|
||||
},
|
||||
{
|
||||
"url": "https://moodle.org/mod/forum/discuss.php?d=466142",
|
||||
"source": "patrick@puiterwijk.org"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2025/CVE-2025-265xx/CVE-2025-26527.json
Normal file
60
CVE-2025/CVE-2025-265xx/CVE-2025-26527.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2025-26527",
|
||||
"sourceIdentifier": "patrick@puiterwijk.org",
|
||||
"published": "2025-02-24T20:15:33.403",
|
||||
"lastModified": "2025-02-24T20:15:33.403",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Tags not expected to be visible to a user could still be discovered by them via the tag search page or in the tags block."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "patrick@puiterwijk.org",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "patrick@puiterwijk.org",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-1230"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-83941",
|
||||
"source": "patrick@puiterwijk.org"
|
||||
},
|
||||
{
|
||||
"url": "https://moodle.org/mod/forum/discuss.php?d=466143",
|
||||
"source": "patrick@puiterwijk.org"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2025/CVE-2025-265xx/CVE-2025-26528.json
Normal file
60
CVE-2025/CVE-2025-265xx/CVE-2025-26528.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2025-26528",
|
||||
"sourceIdentifier": "patrick@puiterwijk.org",
|
||||
"published": "2025-02-24T20:15:33.543",
|
||||
"lastModified": "2025-02-24T20:15:33.543",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The drag-and-drop onto image (ddimageortext) question type required additional sanitizing to prevent a stored XSS risk."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "patrick@puiterwijk.org",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:L/A:N",
|
||||
"baseScore": 3.4,
|
||||
"baseSeverity": "LOW",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.6,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "patrick@puiterwijk.org",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-82896",
|
||||
"source": "patrick@puiterwijk.org"
|
||||
},
|
||||
{
|
||||
"url": "https://moodle.org/mod/forum/discuss.php?d=466144",
|
||||
"source": "patrick@puiterwijk.org"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2025/CVE-2025-265xx/CVE-2025-26529.json
Normal file
60
CVE-2025/CVE-2025-265xx/CVE-2025-26529.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2025-26529",
|
||||
"sourceIdentifier": "patrick@puiterwijk.org",
|
||||
"published": "2025-02-24T20:15:33.677",
|
||||
"lastModified": "2025-02-24T20:15:33.677",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Description information displayed in the site administration live log \nrequired additional sanitizing to prevent a stored XSS risk."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "patrick@puiterwijk.org",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H",
|
||||
"baseScore": 8.3,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.6,
|
||||
"impactScore": 6.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "patrick@puiterwijk.org",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-84145",
|
||||
"source": "patrick@puiterwijk.org"
|
||||
},
|
||||
{
|
||||
"url": "https://moodle.org/mod/forum/discuss.php?d=466145",
|
||||
"source": "patrick@puiterwijk.org"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2025/CVE-2025-265xx/CVE-2025-26530.json
Normal file
60
CVE-2025/CVE-2025-265xx/CVE-2025-26530.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2025-26530",
|
||||
"sourceIdentifier": "patrick@puiterwijk.org",
|
||||
"published": "2025-02-24T20:15:33.807",
|
||||
"lastModified": "2025-02-24T20:15:33.807",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The question bank filter required additional sanitizing to prevent a reflected XSS risk."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "patrick@puiterwijk.org",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H",
|
||||
"baseScore": 8.3,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.6,
|
||||
"impactScore": 6.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "patrick@puiterwijk.org",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-84146",
|
||||
"source": "patrick@puiterwijk.org"
|
||||
},
|
||||
{
|
||||
"url": "https://moodle.org/mod/forum/discuss.php?d=466146",
|
||||
"source": "patrick@puiterwijk.org"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2025/CVE-2025-265xx/CVE-2025-26531.json
Normal file
60
CVE-2025/CVE-2025-265xx/CVE-2025-26531.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2025-26531",
|
||||
"sourceIdentifier": "patrick@puiterwijk.org",
|
||||
"published": "2025-02-24T20:15:33.933",
|
||||
"lastModified": "2025-02-24T20:15:33.933",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Insufficient capability checks made it possible to disable badges a user does not have permission to access."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "patrick@puiterwijk.org",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||||
"baseScore": 3.1,
|
||||
"baseSeverity": "LOW",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.6,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "patrick@puiterwijk.org",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-863"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-84239",
|
||||
"source": "patrick@puiterwijk.org"
|
||||
},
|
||||
{
|
||||
"url": "https://moodle.org/mod/forum/discuss.php?d=466148",
|
||||
"source": "patrick@puiterwijk.org"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2025/CVE-2025-265xx/CVE-2025-26532.json
Normal file
60
CVE-2025/CVE-2025-265xx/CVE-2025-26532.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2025-26532",
|
||||
"sourceIdentifier": "patrick@puiterwijk.org",
|
||||
"published": "2025-02-24T20:15:34.053",
|
||||
"lastModified": "2025-02-24T20:15:34.053",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Additional checks were required to ensure trusttext is applied (when enabled) to glossary entries being restored."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "patrick@puiterwijk.org",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N",
|
||||
"baseScore": 3.1,
|
||||
"baseSeverity": "LOW",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.6,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "patrick@puiterwijk.org",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-863"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-84003",
|
||||
"source": "patrick@puiterwijk.org"
|
||||
},
|
||||
{
|
||||
"url": "https://moodle.org/mod/forum/discuss.php?d=466149",
|
||||
"source": "patrick@puiterwijk.org"
|
||||
}
|
||||
]
|
||||
}
|
82
CVE-2025/CVE-2025-271xx/CVE-2025-27112.json
Normal file
82
CVE-2025/CVE-2025-271xx/CVE-2025-27112.json
Normal file
@ -0,0 +1,82 @@
|
||||
{
|
||||
"id": "CVE-2025-27112",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-02-24T19:15:14.597",
|
||||
"lastModified": "2025-02-24T19:15:14.597",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Navidrome is an open source web-based music collection server and streamer. Starting in version 0.52.0 and prior to version 0.54.5, in certain Subsonic API endpoints, a flaw in the authentication check process allows an attacker to specify any arbitrary username that does not exist on the system, along with a salted hash of an empty password. Under these conditions, Navidrome treats the request as authenticated, granting access to various Subsonic endpoints without requiring valid credentials. An attacker can use any non-existent username to bypass the authentication system and gain access to various read-only data in Navidrome, such as user playlists. However, any attempt to modify data fails with a \"permission denied\" error due to insufficient permissions, limiting the impact to unauthorized viewing of information. Version 0.54.5 contains a patch for this issue."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 6.9,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"vulnerableSystemConfidentiality": "LOW",
|
||||
"vulnerableSystemIntegrity": "LOW",
|
||||
"vulnerableSystemAvailability": "NONE",
|
||||
"subsequentSystemConfidentiality": "NONE",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-287"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/navidrome/navidrome/commit/287079a9e409fb6b9708ca384d7daa7b5185c1a0",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/navidrome/navidrome/security/advisories/GHSA-c3p4-vm8f-386p",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
82
CVE-2025/CVE-2025-271xx/CVE-2025-27133.json
Normal file
82
CVE-2025/CVE-2025-271xx/CVE-2025-27133.json
Normal file
@ -0,0 +1,82 @@
|
||||
{
|
||||
"id": "CVE-2025-27133",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-02-24T19:15:14.763",
|
||||
"lastModified": "2025-02-24T19:15:14.763",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "WeGIA is a Web manager for charitable institutions. A SQL Injection vulnerability was discovered in the WeGIA application prior to version 3.2.15 at the `adicionar_tipo_exame.php` endpoint. This vulnerability allows an authorized attacker to execute arbitrary SQL queries, allowing access to sensitive information. Version 3.2.15 contains a patch for the issue."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 9.4,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnerableSystemConfidentiality": "HIGH",
|
||||
"vulnerableSystemIntegrity": "HIGH",
|
||||
"vulnerableSystemAvailability": "HIGH",
|
||||
"subsequentSystemConfidentiality": "HIGH",
|
||||
"subsequentSystemIntegrity": "HIGH",
|
||||
"subsequentSystemAvailability": "HIGH",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/LabRedesCefetRJ/WeGIA/commit/619ead748e18e685459c6dc3c226e621b9ff5403",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-xj79-w799-qjcp",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
80
CVE-2025/CVE-2025-273xx/CVE-2025-27364.json
Normal file
80
CVE-2025/CVE-2025-273xx/CVE-2025-27364.json
Normal file
@ -0,0 +1,80 @@
|
||||
{
|
||||
"id": "CVE-2025-27364",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-24T19:15:14.917",
|
||||
"lastModified": "2025-02-24T20:15:34.180",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In MITRE Caldera through 4.2.0 and 5.0.0 before 35bc06e, a Remote Code Execution (RCE) vulnerability was found in the dynamic agent (implant) compilation functionality of the server. This allows remote attackers to execute arbitrary code on the server that Caldera is running on via a crafted web request to the Caldera server API used for compiling and downloading of Caldera's Sandcat or Manx agent (implants). This web request can use the gcc -extldflags linker flag with sub-commands."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cve@mitre.org",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
|
||||
"baseScore": 10.0,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 6.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cve@mitre.org",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-78"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/mitre/caldera/commit/35bc06e42e19fe7efbc008999b9f993b1b7109c0",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/mitre/caldera/pull/3129",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/mitre/caldera/pull/3131/commits/61de40f92a595bed462372a5e676c2e5a32d1050",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/mitre/caldera/releases",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/mitre/caldera/security",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://medium.com/@mitrecaldera/mitre-caldera-security-advisory-remote-code-execution-cve-2025-27364-5f679e2e2a0e",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://medium.com/@mitrecaldera/mitre-caldera-security-advisory-remote-code-execution-cve-2025-27364-5f679e2e2a0e",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
66
README.md
66
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2025-02-24T19:00:56.224341+00:00
|
||||
2025-02-24T21:00:43.964845+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2025-02-24T18:22:30.857000+00:00
|
||||
2025-02-24T20:15:34.180000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,49 +33,45 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
282211
|
||||
282222
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `5`
|
||||
Recently added CVEs: `11`
|
||||
|
||||
- [CVE-2024-54820](CVE-2024/CVE-2024-548xx/CVE-2024-54820.json) (`2025-02-24T18:15:17.523`)
|
||||
- [CVE-2024-57026](CVE-2024/CVE-2024-570xx/CVE-2024-57026.json) (`2025-02-24T18:15:19.023`)
|
||||
- [CVE-2025-22495](CVE-2025/CVE-2025-224xx/CVE-2025-22495.json) (`2025-02-24T17:15:13.723`)
|
||||
- [CVE-2025-26200](CVE-2025/CVE-2025-262xx/CVE-2025-26200.json) (`2025-02-24T17:15:14.273`)
|
||||
- [CVE-2025-26201](CVE-2025/CVE-2025-262xx/CVE-2025-26201.json) (`2025-02-24T17:15:14.460`)
|
||||
- [CVE-2025-26525](CVE-2025/CVE-2025-265xx/CVE-2025-26525.json) (`2025-02-24T20:15:33.103`)
|
||||
- [CVE-2025-26526](CVE-2025/CVE-2025-265xx/CVE-2025-26526.json) (`2025-02-24T20:15:33.263`)
|
||||
- [CVE-2025-26527](CVE-2025/CVE-2025-265xx/CVE-2025-26527.json) (`2025-02-24T20:15:33.403`)
|
||||
- [CVE-2025-26528](CVE-2025/CVE-2025-265xx/CVE-2025-26528.json) (`2025-02-24T20:15:33.543`)
|
||||
- [CVE-2025-26529](CVE-2025/CVE-2025-265xx/CVE-2025-26529.json) (`2025-02-24T20:15:33.677`)
|
||||
- [CVE-2025-26530](CVE-2025/CVE-2025-265xx/CVE-2025-26530.json) (`2025-02-24T20:15:33.807`)
|
||||
- [CVE-2025-26531](CVE-2025/CVE-2025-265xx/CVE-2025-26531.json) (`2025-02-24T20:15:33.933`)
|
||||
- [CVE-2025-26532](CVE-2025/CVE-2025-265xx/CVE-2025-26532.json) (`2025-02-24T20:15:34.053`)
|
||||
- [CVE-2025-27112](CVE-2025/CVE-2025-271xx/CVE-2025-27112.json) (`2025-02-24T19:15:14.597`)
|
||||
- [CVE-2025-27133](CVE-2025/CVE-2025-271xx/CVE-2025-27133.json) (`2025-02-24T19:15:14.763`)
|
||||
- [CVE-2025-27364](CVE-2025/CVE-2025-273xx/CVE-2025-27364.json) (`2025-02-24T19:15:14.917`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `43`
|
||||
Recently modified CVEs: `15`
|
||||
|
||||
- [CVE-2024-13770](CVE-2024/CVE-2024-137xx/CVE-2024-13770.json) (`2025-02-24T17:08:04.307`)
|
||||
- [CVE-2024-13850](CVE-2024/CVE-2024-138xx/CVE-2024-13850.json) (`2025-02-24T17:36:09.667`)
|
||||
- [CVE-2024-2081](CVE-2024/CVE-2024-20xx/CVE-2024-2081.json) (`2025-02-24T18:18:52.893`)
|
||||
- [CVE-2024-2471](CVE-2024/CVE-2024-24xx/CVE-2024-2471.json) (`2025-02-24T18:18:30.513`)
|
||||
- [CVE-2024-3208](CVE-2024/CVE-2024-32xx/CVE-2024-3208.json) (`2025-02-24T17:57:40.263`)
|
||||
- [CVE-2024-46975](CVE-2024/CVE-2024-469xx/CVE-2024-46975.json) (`2025-02-24T17:15:13.257`)
|
||||
- [CVE-2024-55925](CVE-2024/CVE-2024-559xx/CVE-2024-55925.json) (`2025-02-24T18:15:17.823`)
|
||||
- [CVE-2024-55926](CVE-2024/CVE-2024-559xx/CVE-2024-55926.json) (`2025-02-24T18:15:17.997`)
|
||||
- [CVE-2024-55927](CVE-2024/CVE-2024-559xx/CVE-2024-55927.json) (`2025-02-24T18:15:18.163`)
|
||||
- [CVE-2024-55928](CVE-2024/CVE-2024-559xx/CVE-2024-55928.json) (`2025-02-24T18:15:18.337`)
|
||||
- [CVE-2024-55929](CVE-2024/CVE-2024-559xx/CVE-2024-55929.json) (`2025-02-24T18:15:18.507`)
|
||||
- [CVE-2024-55930](CVE-2024/CVE-2024-559xx/CVE-2024-55930.json) (`2025-02-24T18:15:18.663`)
|
||||
- [CVE-2024-55931](CVE-2024/CVE-2024-559xx/CVE-2024-55931.json) (`2025-02-24T18:15:18.830`)
|
||||
- [CVE-2025-0661](CVE-2025/CVE-2025-06xx/CVE-2025-0661.json) (`2025-02-24T17:10:16.007`)
|
||||
- [CVE-2025-0837](CVE-2025/CVE-2025-08xx/CVE-2025-0837.json) (`2025-02-24T17:08:29.033`)
|
||||
- [CVE-2025-1553](CVE-2025/CVE-2025-15xx/CVE-2025-1553.json) (`2025-02-24T17:15:13.540`)
|
||||
- [CVE-2025-25460](CVE-2025/CVE-2025-254xx/CVE-2025-25460.json) (`2025-02-24T17:15:13.900`)
|
||||
- [CVE-2025-25679](CVE-2025/CVE-2025-256xx/CVE-2025-25679.json) (`2025-02-24T18:15:19.213`)
|
||||
- [CVE-2025-25769](CVE-2025/CVE-2025-257xx/CVE-2025-25769.json) (`2025-02-24T18:15:19.487`)
|
||||
- [CVE-2025-25770](CVE-2025/CVE-2025-257xx/CVE-2025-25770.json) (`2025-02-24T18:15:20.280`)
|
||||
- [CVE-2025-25876](CVE-2025/CVE-2025-258xx/CVE-2025-25876.json) (`2025-02-24T17:15:14.100`)
|
||||
- [CVE-2025-26306](CVE-2025/CVE-2025-263xx/CVE-2025-26306.json) (`2025-02-24T18:15:21.357`)
|
||||
- [CVE-2025-26308](CVE-2025/CVE-2025-263xx/CVE-2025-26308.json) (`2025-02-24T18:15:21.647`)
|
||||
- [CVE-2025-26793](CVE-2025/CVE-2025-267xx/CVE-2025-26793.json) (`2025-02-24T17:15:14.580`)
|
||||
- [CVE-2025-27109](CVE-2025/CVE-2025-271xx/CVE-2025-27109.json) (`2025-02-24T17:15:14.850`)
|
||||
- [CVE-2018-25083](CVE-2018/CVE-2018-250xx/CVE-2018-25083.json) (`2025-02-24T20:15:31.150`)
|
||||
- [CVE-2021-3923](CVE-2021/CVE-2021-39xx/CVE-2021-3923.json) (`2025-02-24T20:15:31.777`)
|
||||
- [CVE-2022-2237](CVE-2022/CVE-2022-22xx/CVE-2022-2237.json) (`2025-02-24T20:15:31.973`)
|
||||
- [CVE-2022-3116](CVE-2022/CVE-2022-31xx/CVE-2022-3116.json) (`2025-02-24T19:15:12.707`)
|
||||
- [CVE-2022-48348](CVE-2022/CVE-2022-483xx/CVE-2022-48348.json) (`2025-02-24T19:15:14.043`)
|
||||
- [CVE-2022-48349](CVE-2022/CVE-2022-483xx/CVE-2022-48349.json) (`2025-02-24T19:15:14.227`)
|
||||
- [CVE-2023-21044](CVE-2023/CVE-2023-210xx/CVE-2023-21044.json) (`2025-02-24T20:15:32.190`)
|
||||
- [CVE-2023-21045](CVE-2023/CVE-2023-210xx/CVE-2023-21045.json) (`2025-02-24T20:15:32.380`)
|
||||
- [CVE-2023-21048](CVE-2023/CVE-2023-210xx/CVE-2023-21048.json) (`2025-02-24T20:15:32.620`)
|
||||
- [CVE-2024-10222](CVE-2024/CVE-2024-102xx/CVE-2024-10222.json) (`2025-02-24T19:43:57.037`)
|
||||
- [CVE-2024-13775](CVE-2024/CVE-2024-137xx/CVE-2024-13775.json) (`2025-02-24T19:04:52.170`)
|
||||
- [CVE-2024-45781](CVE-2024/CVE-2024-457xx/CVE-2024-45781.json) (`2025-02-24T19:15:14.423`)
|
||||
- [CVE-2024-57160](CVE-2024/CVE-2024-571xx/CVE-2024-57160.json) (`2025-02-24T19:38:22.867`)
|
||||
- [CVE-2024-57161](CVE-2024/CVE-2024-571xx/CVE-2024-57161.json) (`2025-02-24T19:38:43.083`)
|
||||
- [CVE-2025-1489](CVE-2025/CVE-2025-14xx/CVE-2025-1489.json) (`2025-02-24T19:45:21.653`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
137
_state.csv
137
_state.csv
@ -121411,7 +121411,7 @@ CVE-2018-25079,0,0,48685ce9847add0e1ab9b8fceec97ce7a120ddb8b1b4b09c009c856d198e6
|
||||
CVE-2018-25080,0,0,6c04fa6da42f79e635cc0cfe6f9f34c19609115b31e939d312cadffd27491508,2024-11-21T04:03:30.707000
|
||||
CVE-2018-25081,0,0,4806ebac23e887becfaf51184ce6d12d8c88b37f8b3dfc1b14c300e4e20c2294,2024-11-21T04:03:30.847000
|
||||
CVE-2018-25082,0,0,d7307469bd8b245316599e3552df8df9a48e8e1e76dbf66ac43e7bcba9fe864c,2024-11-21T04:03:31.080000
|
||||
CVE-2018-25083,0,0,9541b9956f31ddfc2686faef5fe77cdd0203ff83cdff0710c21a54861b224071,2024-11-21T04:03:31.223000
|
||||
CVE-2018-25083,0,1,74ba0756e5dafa541e4aaaaefcaefb10d8ede7ee35c986b20dfd74cd307530e8,2025-02-24T20:15:31.150000
|
||||
CVE-2018-25084,0,0,9c184f17da7aafecde9ed5052529315a36ee449d7077376af8b33a2cbd5d6c43,2024-11-21T04:03:31.363000
|
||||
CVE-2018-25085,0,0,73bfea48ffd0c9cdf4c809f671883689556215e478ba2335dea12376d92bdc92,2024-11-21T04:03:31.500000
|
||||
CVE-2018-25086,0,0,b66fd9bd4e9ee72936a4458a94a97d90fafb9ae16612a4f6f711df55e0868a80,2024-11-21T04:03:31.630000
|
||||
@ -181593,7 +181593,7 @@ CVE-2021-39226,0,0,8f5b383c5a1b4edaefcf29c875a1af7a57ef26e606fb88396216b3f688a78
|
||||
CVE-2021-39227,0,0,b565dd80d12e5fc792bf53c83afbb0df18396a7f4bd06f4abb75f6be489edf81,2024-11-21T06:18:57.397000
|
||||
CVE-2021-39228,0,0,f36eb8db813850239f055aaec343d16d3f88b3e91fadb62dd009ee0ffa13b3fe,2024-11-21T06:18:57.560000
|
||||
CVE-2021-39229,0,0,19d99295ac275c3a2907f9ccafd6f9fcd679acf6e78619f479c455440e3594c8,2024-11-21T06:18:57.723000
|
||||
CVE-2021-3923,0,0,17b1d10036794c55059f72c0706459b92801031c77093dbf04d2d5b5711c9916,2024-11-21T06:22:47.100000
|
||||
CVE-2021-3923,0,1,8f33120d39dbfb40fa5931a99dfe1de830ad6771a3e98d91fa15e273454439b2,2025-02-24T20:15:31.777000
|
||||
CVE-2021-39230,0,0,a1ff4462fdf7e73cfc9f905531f8050df43fde4ffa355fe087d4f58aa28b9f70,2024-11-21T06:18:57.887000
|
||||
CVE-2021-39231,0,0,69ac8f30e5ab6fd510e2644b69e1647296deefa37af2bf4373d60b90a662deae,2024-11-21T06:18:58.047000
|
||||
CVE-2021-39232,0,0,46dca2479f21c28a81ec3dbdc29193e04bd5bd93ca4c70f295f263619234968f,2024-11-21T06:18:58.203000
|
||||
@ -192084,7 +192084,7 @@ CVE-2022-22366,0,0,09a7cac2af7c3326b1c4db129ec697d7b77dfaf6bb69f773673a6a77e39ca
|
||||
CVE-2022-22367,0,0,f882ca26722150b960229aa69678dc678f007562e394dfb4b417a39357dc7df4,2024-11-21T06:46:42.593000
|
||||
CVE-2022-22368,0,0,4575f523f8115fcbc6bf4fcce9d55648189bfb8804149d364401ff13b317f534,2024-11-21T06:46:42.703000
|
||||
CVE-2022-22369,0,0,57d094f830c9aade14309e978b8c909e905f3069a575a6823563de9c6cc548bf,2024-11-21T06:46:42.820000
|
||||
CVE-2022-2237,0,0,4e04ad032e6be7c3890ea1d2a86e7fd6d5b490e5fe27f7f1372ceeeca877c584,2024-11-21T07:00:35.877000
|
||||
CVE-2022-2237,0,1,e4713513ef55760b84ff9456d90526423f234823f2124885ce696e1691eae550,2025-02-24T20:15:31.973000
|
||||
CVE-2022-22370,0,0,67d4116112ef932abd2bd63b802bb14e3f709993807fc0144ff90914519a656f,2024-11-21T06:46:42.937000
|
||||
CVE-2022-22371,0,0,3c0ad31752e89144bb37a83b9d144a252c96c6ec5b4551862b225a581279dc8a,2024-11-21T06:46:43.060000
|
||||
CVE-2022-22373,0,0,75763a7cca7f104d29029f2448a59f86f6607bf8aa5b41517082c08af9f29e22,2024-11-21T06:46:43.190000
|
||||
@ -199498,7 +199498,7 @@ CVE-2022-31156,0,0,2eaf51f38380072e6df6598bc8ce64fdddae7651edad8425e219157401a34
|
||||
CVE-2022-31157,0,0,f97dabe995205a4290cb284ef75e2678e935f9593f36e46051a4473bd3747780,2024-11-21T07:04:01.233000
|
||||
CVE-2022-31158,0,0,d0bb5395bc1894916b6f96263e1c2b4f3801271bb0dc425949da7198d4395245,2024-11-21T07:04:01.367000
|
||||
CVE-2022-31159,0,0,73592c7c0c7382416e092a874c18103dd659c120906594ad5be3f95252b49a45,2024-11-21T07:04:01.497000
|
||||
CVE-2022-3116,0,0,f8e6f5411efa270ded319873772923e5efce07f0e1053090a44e88dd466c6574,2024-11-21T07:18:51.613000
|
||||
CVE-2022-3116,0,1,a66a78018254a28a9aa08fd9b8f04f2685a8ae4c0cd4ad20cf04b7b4f10b3d37,2025-02-24T19:15:12.707000
|
||||
CVE-2022-31160,0,0,3f3c950e160a4c2913d6e10c3f9e06df49d400b943dc94f33bbeae200029c88e,2024-11-21T07:04:01.617000
|
||||
CVE-2022-31161,0,0,50f1400bdf87989a0c6d37c9cf60d06f1c39bde3cac5984099d4324714a40142,2024-11-21T07:04:01.790000
|
||||
CVE-2022-31162,0,0,60ece6ef2e20ad2436826f672bc8ae1cdedb95d111b3216c989d89e826d75bb6,2024-11-21T07:04:01.930000
|
||||
@ -212452,11 +212452,11 @@ CVE-2022-48344,0,0,99cfe32832587baf5d1527923c94101a148d12b13e3382d19bbf5f4f88a41
|
||||
CVE-2022-48345,0,0,c43bfd3ba9d46379c49b9847b6f17f16ace8072a4eee27968587d44b52b60457,2024-11-21T07:33:13.103000
|
||||
CVE-2022-48346,0,0,e9a6fca484067f694b4295c67382bb27add976e780c49b7a6de551ef92454947,2025-02-19T19:15:11.730000
|
||||
CVE-2022-48347,0,0,2a2a2e7682966e3b51f22fc18957ee285c28256a87b17e92c00e8dd8185e131a,2025-02-19T19:15:11.850000
|
||||
CVE-2022-48348,0,0,47f57d4bd071bd8d153b05584cd6d761a94445852248c85c1fd1957601b19157,2024-11-21T07:33:13.483000
|
||||
CVE-2022-48349,0,0,ea8149ba67a972f5c4f4e134a57dcae0690d1644c460de70cd78210afd8b2b1d,2024-11-21T07:33:13.603000
|
||||
CVE-2022-48348,0,1,1fbf30f19ecab0a282ff16469c0a7585a79384bd8136e172a029a776f0e3e667,2025-02-24T19:15:14.043000
|
||||
CVE-2022-48349,0,1,3cafff10218da465dea3f1346ade258785a42c143f3561c49ad224634cf5807d,2025-02-24T19:15:14.227000
|
||||
CVE-2022-4835,0,0,0342ae1f95dc8d2e957e0430756d0a4236a488c4c4e1a010bf206123dd786fcd,2024-11-21T07:36:02.473000
|
||||
CVE-2022-48350,0,1,c7022cfd8983ed22fa83066929e8846047af189c89fd47850d32a3e22883438e,2025-02-24T18:15:14.217000
|
||||
CVE-2022-48351,0,1,3cd0204c57902a844bf6efc014b88cedf93c969fad61f5ba77eb613c37617299,2025-02-24T18:15:16.057000
|
||||
CVE-2022-48350,0,0,c7022cfd8983ed22fa83066929e8846047af189c89fd47850d32a3e22883438e,2025-02-24T18:15:14.217000
|
||||
CVE-2022-48351,0,0,3cd0204c57902a844bf6efc014b88cedf93c969fad61f5ba77eb613c37617299,2025-02-24T18:15:16.057000
|
||||
CVE-2022-48352,0,0,d86867be797a1b5b2dd8a70bd1cbeb2c21eccf0ad77186550568b0580b01790a,2025-02-24T15:15:10.903000
|
||||
CVE-2022-48353,0,0,ba8df961b31ea4a14f5a347cf0d4ef1527afa65a712feabcae9952cd3ddda423,2025-02-24T15:15:11.180000
|
||||
CVE-2022-48354,0,0,e4e996be4865dc038b5d4156f4bf61c45f363b3efd2e5e5dbfa8445bcc4512a5,2024-11-21T07:33:14.200000
|
||||
@ -213671,7 +213671,7 @@ CVE-2023-0490,0,0,de5db187dc29d08e72001552229674aafbc72c7f1535c50224381914e9f169
|
||||
CVE-2023-0491,0,0,06e62cdbc65c7f9df8b049d1bf89eea404775b51e3a06b276978ccbab8d65943,2025-02-19T20:15:33.683000
|
||||
CVE-2023-0492,0,0,9a42b95385a6a697457a253f3876b4596a6ab1ce2819f8e960b2526ffa8d6462,2024-11-21T07:37:17.077000
|
||||
CVE-2023-0493,0,0,4112b37c84480c3e817b15aba44244f27f093695299d80f2ccbb4dc5be272ce9,2024-11-21T07:37:17.177000
|
||||
CVE-2023-0494,0,1,e2194944e342b75c9a543ada747319fe61a722384955b154deb3b42be68e29f8,2025-02-24T18:15:16.550000
|
||||
CVE-2023-0494,0,0,e2194944e342b75c9a543ada747319fe61a722384955b154deb3b42be68e29f8,2025-02-24T18:15:16.550000
|
||||
CVE-2023-0495,0,0,0a7a46df0d96b49f5e481433ce55c27724b9ca98c12f16dcefd88050bba8dfd6,2025-02-19T21:15:11.760000
|
||||
CVE-2023-0496,0,0,76dfc339b37fc8f39bdd911715fe72ab4603e4fe8a10357be39ba3c4482e300a,2025-02-14T16:15:32.377000
|
||||
CVE-2023-0497,0,0,60487cc13983df9ea1a2d5a704f12a258915d999bbd0a3c673377072ca11c4d0,2024-11-21T07:37:17.637000
|
||||
@ -213944,7 +213944,7 @@ CVE-2023-0774,0,0,049af1bb37ee5d540c89c1b828762fe47f13d23aa60a24fb68700fde6df4c4
|
||||
CVE-2023-0775,0,0,4ba8722bdb81eca730d3390b5131a1937f73b6d8eb1836ea816af214b010b6ab,2024-11-21T07:37:47.827000
|
||||
CVE-2023-0776,0,0,1062763acc90dab7b4f5e8aad81b99040d1f4ded8327a395ea6aa95205267666,2024-11-21T07:37:47.953000
|
||||
CVE-2023-0777,0,0,71a2f902342e5506fc31ce626bc78f303535354f1ecb4b1a0b1e7a3561f27a76,2024-11-21T07:37:48.087000
|
||||
CVE-2023-0778,0,1,b7bb340f0c4af58dfab5361b720b656af8a24a73bca5d4c3898c3ea2fa9f7f1e,2025-02-24T18:15:16.863000
|
||||
CVE-2023-0778,0,0,b7bb340f0c4af58dfab5361b720b656af8a24a73bca5d4c3898c3ea2fa9f7f1e,2025-02-24T18:15:16.863000
|
||||
CVE-2023-0779,0,0,e6e91017eb83f108f29fca1ea7191647b24869f0c5ce64aea1dd5a9190fe097d,2024-11-21T07:37:48.327000
|
||||
CVE-2023-0780,0,0,e8e2f0426cdd391a26483e8789d8e86bae4ddde8ba9e52dd1088ac20ab8a0154,2024-11-21T07:37:48.450000
|
||||
CVE-2023-0781,0,0,8a8496d4416dfe6d64d43bbc8f0ea270163cd648da6a03d2e8ed80772b9c0df2,2024-11-21T07:37:48.583000
|
||||
@ -214227,8 +214227,8 @@ CVE-2023-1071,0,0,b9efb5fd32552e831e9a6d68b0c512d4a8889297dc12027569d5401838a194
|
||||
CVE-2023-1072,0,0,7c1718e96865a95b5dcb1e20eec041f4d38e13520351d35ddfbe6ea8c477df56,2024-11-21T07:38:24.320000
|
||||
CVE-2023-1073,0,0,41c8f0d6826bcdd917561ed5928907cc323c6e5df9e279f68769c572085d2eaa,2024-11-21T07:38:24.440000
|
||||
CVE-2023-1074,0,0,4192ac377555c94402a9411eb8a093d9a7f3f5498532717e31b4697c44de5a3e,2024-11-21T07:38:24.567000
|
||||
CVE-2023-1075,0,1,614fa18715d68c97ded92967d9598158d47f4277445bb5a4b026914a82716d3c,2025-02-24T17:15:11.467000
|
||||
CVE-2023-1076,0,1,cbd27dd9e5eca167c53b19d3bee72f3a209fe852f4c876408a0f6dbdd42a6707,2025-02-24T17:15:12.320000
|
||||
CVE-2023-1075,0,0,614fa18715d68c97ded92967d9598158d47f4277445bb5a4b026914a82716d3c,2025-02-24T17:15:11.467000
|
||||
CVE-2023-1076,0,0,cbd27dd9e5eca167c53b19d3bee72f3a209fe852f4c876408a0f6dbdd42a6707,2025-02-24T17:15:12.320000
|
||||
CVE-2023-1077,0,0,60b3ed85066fa60ace32acf691ce80b25341948b43193759a5d179c71cb02930,2024-11-21T07:38:24.903000
|
||||
CVE-2023-1078,0,0,6f05a57264a5ec490ef94ea87b90a2bd23e954d113212ea2831471457cd13513,2024-11-21T07:38:25.047000
|
||||
CVE-2023-1079,0,0,6c65183c9016e5023aca467df3978cbe9d28eec643aa64f104193787f2642901,2025-02-19T22:15:11.597000
|
||||
@ -215915,7 +215915,7 @@ CVE-2023-21015,0,0,cecf1af576c9b801c71b79ae4e9d6df12121b3a243448437871c714827f50
|
||||
CVE-2023-21016,0,0,458548724cc71cfad5285ef3922c28e822361bef89d73e7163793c200bb4a04b,2024-11-21T07:42:00.437000
|
||||
CVE-2023-21017,0,0,76b475727b02d7f06ae44a793e4f20c233e0866f4995965de228dd2867dcdeb8,2024-11-21T07:42:00.543000
|
||||
CVE-2023-21018,0,0,896cce17934660c28fa90e7f4e5fde23337320157d5aae42031e9ce7f12778c6,2024-11-21T07:42:00.647000
|
||||
CVE-2023-21019,0,1,f47020d35392fde71ac070ea65b490b0c01efb4610768ed35c4e7350d211d42e,2025-02-24T17:15:12.527000
|
||||
CVE-2023-21019,0,0,f47020d35392fde71ac070ea65b490b0c01efb4610768ed35c4e7350d211d42e,2025-02-24T17:15:12.527000
|
||||
CVE-2023-2102,0,0,1f30776bd7546109d3fea589110ed243a709b5e1f7f74a918b4d566f83ca9c4d,2025-02-06T16:15:36.037000
|
||||
CVE-2023-21020,0,0,d98d21ca140e17a8a5cd6b7ad75c664051a69a331f05c79e40733315f1fcab2c,2025-02-24T15:15:11.720000
|
||||
CVE-2023-21021,0,0,d55dab5bb1ffd1ff4d3fe3d1856e21c43ecda1745938d739327dc3ccc73c46ac,2024-11-21T07:42:00.983000
|
||||
@ -215941,16 +215941,16 @@ CVE-2023-21040,0,0,c774c5983f36a821f7c5e24674b2f104bfce612ef836674ee849ac3705d7a
|
||||
CVE-2023-21041,0,0,6a99a6b0541876b22115214a822814538877e83cbef9875bd54521daf0d2d9cb,2024-11-21T07:42:03.070000
|
||||
CVE-2023-21042,0,0,92ab35321b2fd324542efae6d2f60a172590991a879dc4bde56d7ee1e48c0b18,2025-02-19T22:15:11.810000
|
||||
CVE-2023-21043,0,0,4cf28ca85bcbd27b9227b2573af8a0495fc89cd1fdcf1c2734276d761401f69f,2024-11-21T07:42:03.320000
|
||||
CVE-2023-21044,0,0,f01920dc762e3a152ff7b5a4ca15d0c1356720e7c0f7b82205cab239ea1eb390,2024-11-21T07:42:03.433000
|
||||
CVE-2023-21045,0,0,a152788a6f62c7091dc78aabc332acb1f5c41a0d65c30484aa75368547d3719c,2024-11-21T07:42:03.543000
|
||||
CVE-2023-21044,0,1,d546efe130a0e8b835c1a714bf68d2df24c0e09247ccbe869006e82495f3584f,2025-02-24T20:15:32.190000
|
||||
CVE-2023-21045,0,1,c7c3c273f0be1c563af52eae3c5ca603c13c6789a4270f0a2032e21fcdad0ce1,2025-02-24T20:15:32.380000
|
||||
CVE-2023-21046,0,0,157a9520e5ae8a81ac1e742275b614c5004e15922aec14a449810537f3053229,2024-11-21T07:42:03.653000
|
||||
CVE-2023-21047,0,0,a8d476de5c22475a663a6cd0b7905a4e2678b820fc08e9b5926d525d5d6554e1,2025-02-24T15:15:11.890000
|
||||
CVE-2023-21048,0,0,6eeae311c884bda35e7413de1723b0378d2d91f4bb8846497781364b6654419b,2024-11-21T07:42:03.887000
|
||||
CVE-2023-21048,0,1,609d2a83ed3221a308ae0d1de751ad1ffcc2d677804d0c4e261c7271f9a2b453,2025-02-24T20:15:32.620000
|
||||
CVE-2023-21049,0,0,bb73e93fe402a1a1fd3c7954e241829b82101223330bf83d184d14f361624b5f,2025-02-21T21:15:12.563000
|
||||
CVE-2023-2105,0,0,2848f7b619a121a5ab92af5f52396afe377fb724ffc0f538c3a9b15300394fc5,2025-02-06T16:15:36.640000
|
||||
CVE-2023-21050,0,0,c97a15ee08f147244a1178bb0faf4b2c275cbb0d598a4d3e22fffa17b5a3621d,2025-02-21T22:15:11.040000
|
||||
CVE-2023-21051,0,1,c609aaa30d557ea6fa763b443e2c4038dfe63d25a45eda662851123ac346a6af,2025-02-24T17:15:12.700000
|
||||
CVE-2023-21052,0,1,0b2340855d9b6925ed8fb119c848597a25874325b8217b27cfec3835992f18e3,2025-02-24T17:15:12.880000
|
||||
CVE-2023-21051,0,0,c609aaa30d557ea6fa763b443e2c4038dfe63d25a45eda662851123ac346a6af,2025-02-24T17:15:12.700000
|
||||
CVE-2023-21052,0,0,0b2340855d9b6925ed8fb119c848597a25874325b8217b27cfec3835992f18e3,2025-02-24T17:15:12.880000
|
||||
CVE-2023-21053,0,0,c192dfa305a3ea071a0683ac561b0f1f691c8fdfbf892643e0c978097d186029,2025-02-21T20:15:31.557000
|
||||
CVE-2023-21054,0,0,5c4569e80bedcc53693658dcd651c85d39fb77ec6e7679071e7e36be2eba0d20,2025-02-21T20:15:32.530000
|
||||
CVE-2023-21055,0,0,ca0e7fa42b81270cc4187d66e5388652e4b9ea02749b2c91f46a22f24c8e3aca,2025-02-21T20:15:32.677000
|
||||
@ -239319,7 +239319,7 @@ CVE-2023-51308,0,0,4bcbdb7b793145ac3b10d8145b7d5335bf14b807b86268829f166f3300b36
|
||||
CVE-2023-51309,0,0,eba924e04dc2770a8dd8e0f8bbcd99c1bf251381ab5a93a32f4f375a20690884,2025-02-20T18:15:22.890000
|
||||
CVE-2023-5131,0,0,ea7fb93c4dbd8bd2f769e40008c92349338343ffec9aef4cd684c52a4f03daea,2024-11-21T08:41:07.410000
|
||||
CVE-2023-51310,0,0,5ff44a8e60152b5a8222d23ace8728692bc50a1391618a6bf228fd8cf2f1cfa9,2025-02-20T18:15:23.090000
|
||||
CVE-2023-51311,0,1,d4e651f51e8aba72b98d1e38d35db64a4f1cd04060a101aac7ddce6778795b26,2025-02-24T18:15:17.150000
|
||||
CVE-2023-51311,0,0,d4e651f51e8aba72b98d1e38d35db64a4f1cd04060a101aac7ddce6778795b26,2025-02-24T18:15:17.150000
|
||||
CVE-2023-51312,0,0,c5f1cf5674b7e294a5b5a557c49039d98e1261a1424602ca885450a6ed4c5035,2025-02-20T18:15:23.293000
|
||||
CVE-2023-51313,0,0,6a2045e17d1649f3a297166f69c1bb87652b9a1ee94412aac61dddb35d0383d3,2025-02-21T18:15:15.350000
|
||||
CVE-2023-51314,0,0,ed0c0946f48ea9e4165925b66798a07395b88ccd084d7b53e90b457b808050fa,2025-02-21T18:15:15.567000
|
||||
@ -242286,7 +242286,7 @@ CVE-2023-6943,0,0,9ce8ce1fbfe1c0ee5363f171dbc5ad0666f516779b82e995b05555add6a2e7
|
||||
CVE-2023-6944,0,0,df2b7229c517209019fce35466d5ffbbde525fb676023ff8b16393577f2b89f6,2024-11-21T08:44:53.520000
|
||||
CVE-2023-6945,0,0,eee61cdc8cecbbaa6c3be1b94704de1a8c4d868a06c2b4c07233fbc728fc898a,2024-11-21T08:44:53.660000
|
||||
CVE-2023-6946,0,0,d11da4da13dc038beb075b5af1213743f8b40d251e7b7ea3b52df4c6657ce74d,2024-11-21T08:44:53.810000
|
||||
CVE-2023-6947,0,1,681ae83ea96dd1197213cace9f29ac2d9a0cee2cf919317601ee722b94cb412c,2025-02-24T18:22:30.857000
|
||||
CVE-2023-6947,0,0,681ae83ea96dd1197213cace9f29ac2d9a0cee2cf919317601ee722b94cb412c,2025-02-24T18:22:30.857000
|
||||
CVE-2023-6948,0,0,fe5733c12b0ee41b32ac32792a9499fb1c2fbb29abf274a6083757f7f49e4eea,2024-11-21T08:44:53.957000
|
||||
CVE-2023-6949,0,0,078850d39f1204331fbc98d392a0469ded8443843d8a5c473dc39bd1460bfcd6,2024-11-21T08:44:54.107000
|
||||
CVE-2023-6950,0,0,abe9e2e0d7383949fcddc1e9a1bdb75c1a66b8207ce4e95629fab56a059c4d2f,2024-11-21T08:44:54.263000
|
||||
@ -243715,7 +243715,7 @@ CVE-2024-10217,0,0,1895a265d2132d6d454e49e4937a0fc01a8d5847eea053c3e93a0984b4bc0
|
||||
CVE-2024-10218,0,0,8c98b77c90ab06758cb11fcdce58d3e978735cbcd3800c729831353228a0e6df,2024-11-22T21:15:07.950000
|
||||
CVE-2024-1022,0,0,2538d56f6669aecae5f12904278656fbaaa9fa83dd2447751caf0dde04c23b1f,2024-11-21T08:49:37.160000
|
||||
CVE-2024-10220,0,0,0717049f6d4c212a875763951e37b8f3da2918e18cb00732d9d60eff6c4a140d,2024-11-22T17:15:06.650000
|
||||
CVE-2024-10222,0,0,a6ca531f70eae3a23ac6713dcc60df403d48fa9c5b9ea19669f3314137f83531,2025-02-21T14:15:30.680000
|
||||
CVE-2024-10222,0,1,832d681b9ef817b9c70fe649db0ec26d6568e99a827bbeb02954537ee5aaf11c,2025-02-24T19:43:57.037000
|
||||
CVE-2024-10223,0,0,5f5e151c95f5ef79d0a7fc297e9a009a73a481f63f2b3ce4a2e96835fd5bc43d,2024-11-01T12:57:03.417000
|
||||
CVE-2024-10224,0,0,b4b06129afa19bd4bd2db86d543a9417ce3496d8c49771d9c2d4f2d051e46d1d,2024-12-03T14:15:19.270000
|
||||
CVE-2024-10226,0,0,90902af4bb0025c8b4afcf3dd7a0c8ab645b3d8bdbe2f31e8aac22ff12a9d686,2024-10-31T16:48:41.553000
|
||||
@ -245150,7 +245150,7 @@ CVE-2024-11777,0,0,e460b779a976f9c561c46b6e58a92b7a7419f3751a2cd77a73598001765e2
|
||||
CVE-2024-11778,0,0,ed546f5ae360e455508e4e386fdc82d78b9472397f9ba2e46d09300dfc1f6bfe,2025-02-19T08:15:13.027000
|
||||
CVE-2024-11779,0,0,66ab9533cf27509ff85b54c7dc6f857efc44402b9c1a2b7fc4f1c1fbd8a0b4e7,2024-12-05T10:31:39.980000
|
||||
CVE-2024-1178,0,0,8ab0a2a01e80408842a29a813ae0f71a9342bc7b3eeef6127c8bbe6845a6d705,2025-01-08T17:16:27.800000
|
||||
CVE-2024-11780,0,1,c757f2673a7fd0520b5d1535df6f50a1511b2d463dc2b762fafd8e9077c7c8bb,2025-02-24T17:26:33.223000
|
||||
CVE-2024-11780,0,0,c757f2673a7fd0520b5d1535df6f50a1511b2d463dc2b762fafd8e9077c7c8bb,2025-02-24T17:26:33.223000
|
||||
CVE-2024-11781,0,0,c0e6be58a4f2f20ed752d41934ec31e6ef434c9b40a727cf73a45e49f6a0c1d4,2024-12-12T06:15:21.940000
|
||||
CVE-2024-11782,0,0,32efa64b128c88aabdfed834337ad65ab786b6692f5faee3dcb9cdb0f84122ef,2025-02-10T18:10:42.510000
|
||||
CVE-2024-11783,0,0,a1a89800681b730546355720a381b5c434c9a4d5304a89bbf16fe8919a3038c8,2024-12-20T07:15:10.777000
|
||||
@ -245503,7 +245503,7 @@ CVE-2024-12166,0,0,318717b4a3842e9291a2442fedeb1198ccbbca486552d6b1e9ef8aa65b1bf
|
||||
CVE-2024-12167,0,0,648fdeb771c33890685bfca6029b01ac44a17697a1725a67472f5321f6e1f66d,2024-12-07T02:15:19.057000
|
||||
CVE-2024-1217,0,0,6b4f28a64a0963868a0b0fd68f3e80e1f35d8f2883d87d4094b446f0742cbcfb,2025-01-19T02:51:21.017000
|
||||
CVE-2024-12170,0,0,dda5e4dfb884254330b10e15454ff7f267eea062af3a3c0f061f58e061dbc21b,2025-01-07T05:15:15.713000
|
||||
CVE-2024-12171,0,1,6256993d9f0f389a5120f8a5fcb51c966cc24463f22b2943402e672b9dead5b0,2025-02-24T17:05:34.500000
|
||||
CVE-2024-12171,0,0,6256993d9f0f389a5120f8a5fcb51c966cc24463f22b2943402e672b9dead5b0,2025-02-24T17:05:34.500000
|
||||
CVE-2024-12172,0,0,71dcf4ad1517a839187dba7f34de208b20f0af666e791340d3555b8bf199e319,2024-12-12T06:15:23.587000
|
||||
CVE-2024-12173,0,0,7d944d4e8e3eae3c31019309f9ace7394848c049126e10d571e77e1246f0e144,2025-02-21T17:15:11
|
||||
CVE-2024-12174,0,0,d557284551bec104067ec802c1680b85a8fd3b4f89f1ebaca3a04bd8bacf5eb2,2024-12-09T22:15:22.237000
|
||||
@ -245838,7 +245838,7 @@ CVE-2024-12521,0,0,5ef3982f9bbd97c224cda76723fce3c98e248e5aec737e88bf0802be4e43c
|
||||
CVE-2024-12522,0,0,9a29eaa26b8e72f060e0541b1bd56e919175e1dea7b36022bab30609cf3ac5c0,2025-02-19T08:15:14.323000
|
||||
CVE-2024-12523,0,0,185a41d328f0e130d8ed17ada12f64a855433449910369cbbb025fff8ce0f4d8,2024-12-14T05:15:11.640000
|
||||
CVE-2024-12524,0,0,872d50ee592086b62712ad11fcac01017f02cae2a37a1857d75b736f2a220d93,2025-01-30T11:15:10.840000
|
||||
CVE-2024-12525,0,1,2c42baf29c519a4ae8a9d35fe807a994e1b47214d101f54cce57a3cae21be29b,2025-02-24T17:11:30.987000
|
||||
CVE-2024-12525,0,0,2c42baf29c519a4ae8a9d35fe807a994e1b47214d101f54cce57a3cae21be29b,2025-02-24T17:11:30.987000
|
||||
CVE-2024-12526,0,0,b192d6e45212a3c6d09a8a6cd2198d071bb3ba4da94a4e2bf151be7ad2c18324,2024-12-12T05:15:13.577000
|
||||
CVE-2024-12527,0,0,a734fa6fae374e1f78bf0ed5836acb2d88c39ac4a4907ac1228b4122e65ad067,2025-01-11T08:15:25.913000
|
||||
CVE-2024-12528,0,0,f4af9cf65ffcc6bdde0559258762f791c056b91239412bbfffbf03d13aedbfde,2025-01-07T04:15:08.543000
|
||||
@ -246430,7 +246430,7 @@ CVE-2024-13224,0,0,e5b7f02a42d65820fa96ecfbf1042671230975524d8d07a6555cf2ef2492a
|
||||
CVE-2024-13225,0,0,fd5bdb87f02a5554907e108887a0ec447c92e5005d465261f05bb066fe20b559,2025-02-18T19:15:13.430000
|
||||
CVE-2024-13226,0,0,0a148293be1e169e2bc3e7ec9c58bba636bd4d289f9d716d22106c8fd333fec0,2025-02-18T19:15:13.530000
|
||||
CVE-2024-13227,0,0,c34ede3feb9dba7e466b356b6917ab16c078ee64224ad65ef9ea2ba00b4f2945,2025-02-24T16:44:13.157000
|
||||
CVE-2024-13229,0,1,537699d3a79de9fbc27e9b2746c3e5b03ecf899f1fa640e3c8fa1fd5bdf5f033,2025-02-24T17:07:33.247000
|
||||
CVE-2024-13229,0,0,537699d3a79de9fbc27e9b2746c3e5b03ecf899f1fa640e3c8fa1fd5bdf5f033,2025-02-24T17:07:33.247000
|
||||
CVE-2024-1323,0,0,4b7fa94b4154618460e40e6b98637f7cb2a430b6e413bf16925f79721ae6c94f,2025-01-16T19:29:54.047000
|
||||
CVE-2024-13230,0,0,77b1ecbf192b34e98ac8a66dc9d4d1a94979c767aa5e8f2b9158ee6752bafedc,2025-01-21T11:15:09.267000
|
||||
CVE-2024-13231,0,0,6b2bf7946a3918f4f1317f58265852494615d3a82c5ba9db5c6afe2c9cc9bdb4,2025-02-19T09:15:08.930000
|
||||
@ -246547,8 +246547,8 @@ CVE-2024-1334,0,0,5cd8113de272a8c461c68981cf2d6addc6166d9cf4d9dbad0d56a2a1ca6713
|
||||
CVE-2024-13340,0,0,410a07bb948a432c6c68e7813dd264dbb94d6d7c0c36b44969bc437f75da1ae8,2025-01-31T16:02:16.553000
|
||||
CVE-2024-13341,0,0,128797d9a3fd1b4d0be904e2ffac7e537df76d379d0475c080eeeed959f797db,2025-02-21T15:41:10.603000
|
||||
CVE-2024-13343,0,0,640200c7757a0fe07b53b1ed98de77b765153c818110e07c8a501ce037c2ed28,2025-02-24T16:21:30.933000
|
||||
CVE-2024-13345,0,1,2f3032297f8332972573fb3f498fd72586e19dd8c8868b7492b543e5342b848c,2025-02-24T17:09:19.853000
|
||||
CVE-2024-13346,0,1,1f1e8b78579e17cc330b0ba450b33ebe007d77d280315cb8ae956100d22451e5,2025-02-24T17:09:53.907000
|
||||
CVE-2024-13345,0,0,2f3032297f8332972573fb3f498fd72586e19dd8c8868b7492b543e5342b848c,2025-02-24T17:09:19.853000
|
||||
CVE-2024-13346,0,0,1f1e8b78579e17cc330b0ba450b33ebe007d77d280315cb8ae956100d22451e5,2025-02-24T17:09:53.907000
|
||||
CVE-2024-13347,0,0,b0b65e85dad4db5b5f94ca2399763501cda822d2d7559302507963a880f0474b,2025-02-03T16:15:32.580000
|
||||
CVE-2024-13348,0,0,e7356b4b7de40bfcab5dcbdec8635d94ba57c9cc43546ece560a6873afe1ba28,2025-01-30T15:15:16.223000
|
||||
CVE-2024-13349,0,0,1a00cf757b3ec26bd50ea0e563207e24798d3893002c58755b8b9af1d412744e,2025-01-31T17:58:59.027000
|
||||
@ -246706,7 +246706,7 @@ CVE-2024-13521,0,0,56cff5e8dab3e4a84fd4fc6c17bcf2fe279d9bc71acdce76cf6f6b7cd5e70
|
||||
CVE-2024-13522,0,0,00c085e855bb7c9f3026d445957f1adf7577732941d53fc12a5ce3f291cdce05,2025-02-24T14:28:46.687000
|
||||
CVE-2024-13523,0,0,a22589ae6ec5992efe47bdb0fb01b8cdac2a43ff89103cd45e22c3f11d842d97,2025-02-21T15:41:26.060000
|
||||
CVE-2024-13524,0,0,d6f31820e091340f802e51a50f0c20aa637866da429d40add1f3ba31e9a88956,2025-01-20T03:15:08.033000
|
||||
CVE-2024-13525,0,1,d856e0492a07e8bc12ebbe371954626a06f4d820679af6cffeb9304d385023c3,2025-02-24T17:10:47.023000
|
||||
CVE-2024-13525,0,0,d856e0492a07e8bc12ebbe371954626a06f4d820679af6cffeb9304d385023c3,2025-02-24T17:10:47.023000
|
||||
CVE-2024-13527,0,0,9559936fb9111fdf63ba50e27f0bf0289ed1434a5f0f4378e70bf27d52c81211,2025-01-30T17:18:29.943000
|
||||
CVE-2024-13528,0,0,122b895828098f2015afce9673bbbf513eb3f4c3f5ac9acd2733bf0b49a301d8,2025-02-18T18:53:58.897000
|
||||
CVE-2024-13529,0,0,200d7b0e051dd0616db8204a0f4feb61aaed03439a2d376a4ab184bb8a3a6125,2025-02-04T10:15:08.333000
|
||||
@ -246885,8 +246885,8 @@ CVE-2024-1376,0,0,34411a3106e4c74f2617f4da0b50ff6e7d812385caea8af0b8361fb64d6e9d
|
||||
CVE-2024-13767,0,0,5e2a432b5514ebb28e43fc58238979fb079695a503a95ef3a2bddb1da15dea7c,2025-01-31T03:15:10.693000
|
||||
CVE-2024-13769,0,0,6fa2e289d8cf3e90cab0c96a01fffe9940909434acbdd1bee567bf2a5e72cf56,2025-02-24T15:54:05.167000
|
||||
CVE-2024-1377,0,0,76446229d1bded69224cd2e98212f244bd2380b3470adb0152ce2b85f9216c33,2025-01-07T18:20:57.347000
|
||||
CVE-2024-13770,0,1,eedd6cc35f686f8347a61efabc64272551833ee2e82bdd330567f722ff99ade8,2025-02-24T17:08:04.307000
|
||||
CVE-2024-13775,0,0,89d1ec6a71cec12ef8d6fda55cf89bde1f18738024bb28bd682eafe6ee6a6e20,2025-02-01T13:15:22.847000
|
||||
CVE-2024-13770,0,0,eedd6cc35f686f8347a61efabc64272551833ee2e82bdd330567f722ff99ade8,2025-02-24T17:08:04.307000
|
||||
CVE-2024-13775,0,1,4f9074e732a3ab519a109b5697b6e141a486c1977d56f68019ad553f34df5449,2025-02-24T19:04:52.170000
|
||||
CVE-2024-1378,0,0,041aa523b6aa5691bc95edbf2c3845e6125399d35aa90aa412089416e101b866,2024-11-21T08:50:26.997000
|
||||
CVE-2024-13783,0,0,4d1adc087edd34d52079e199658ef345cbd94c9c74350c99493fda1d34bf23f7,2025-02-21T12:19:42.537000
|
||||
CVE-2024-13789,0,0,7e93b6d08cc6df1b6bc2f867c0f4be1ee78646a7a043ad72e374fd176f679c40,2025-02-20T10:15:10.637000
|
||||
@ -246922,7 +246922,7 @@ CVE-2024-13846,0,0,7a6b2d68f6b35a1c0346eb229a9db02fce41ef7ca697acebf08e29ec1c131
|
||||
CVE-2024-13848,0,0,5623c6bf6e4d11fedf071f2d8a6a41f683ea08f022ec414f86d8eab78ceadbd1,2025-02-21T15:51:59.213000
|
||||
CVE-2024-13849,0,0,76427ddbd1b9c89aad3ff1ad69ba5ca19d42f02190050e5d0291188382af9c14,2025-02-20T10:15:11.330000
|
||||
CVE-2024-1385,0,0,8d44f2ddcfbec761b90cec48d83e59f97d1a3c53ec848ed4ca09c1c2ed005096,2024-11-21T08:50:27.933000
|
||||
CVE-2024-13850,0,1,21374982a6b82adc74612a8ed4ca91538e192f9010fe0e837b933250ab0049eb,2025-02-24T17:36:09.667000
|
||||
CVE-2024-13850,0,0,21374982a6b82adc74612a8ed4ca91538e192f9010fe0e837b933250ab0049eb,2025-02-24T17:36:09.667000
|
||||
CVE-2024-13852,0,0,dd2c33f18b8ccbee6b646903a658fcb7af55315e978ebdb8f9c794cc0b1e0482,2025-02-21T15:50:45.813000
|
||||
CVE-2024-13854,0,0,b293d3f2f05083e98beb719565723791c5cf1a85fbf867f7cfec3a20f9286342,2025-02-19T08:15:21.440000
|
||||
CVE-2024-13855,0,0,07563565d63aa0673a3108e0a48747889696d3c84d85640c1521db3b7a6edb9f,2025-02-20T10:15:11.530000
|
||||
@ -248159,7 +248159,7 @@ CVE-2024-20806,0,0,f84687e6ca27853ea722b74b6896660825869789a3d6900811ae37e86ae97
|
||||
CVE-2024-20807,0,0,77916569275eb8dd7e9f7d46cda3d6f7424ea6382ea63bf17b9f16c373d503f2,2024-11-21T08:53:10.990000
|
||||
CVE-2024-20808,0,0,357e606a78af1d093b1e517a3f4f56db91192b24dcbbb4daa0a7f54fb5863c47,2024-11-21T08:53:11.133000
|
||||
CVE-2024-20809,0,0,93ae2c7a12cb7905d7572e5a78fea642f215334a51b59e794d9d6a27cefc3b08,2024-11-21T08:53:11.267000
|
||||
CVE-2024-2081,0,1,de1eeeff5db231bd4d1cab878e18da2be499c7de15a53c99e0b8b72d9578f35a,2025-02-24T18:18:52.893000
|
||||
CVE-2024-2081,0,0,de1eeeff5db231bd4d1cab878e18da2be499c7de15a53c99e0b8b72d9578f35a,2025-02-24T18:18:52.893000
|
||||
CVE-2024-20810,0,0,548be65c086436b8a320f58abdc3613f0c10e36b13681e4dc45fdb75999f091d,2024-11-21T08:53:11.390000
|
||||
CVE-2024-20811,0,0,bfcdda7fb3ccf6704bf5fdf5cbfa692d5d730ca5a9b1aab757de7d0def4ce60e,2024-11-21T08:53:11.563000
|
||||
CVE-2024-20812,0,0,0c55c29e5c5975f821f304280d9826bc1bea845ee09e139bccc9bd51242c8313,2024-11-21T08:53:11.713000
|
||||
@ -251197,7 +251197,7 @@ CVE-2024-24705,0,0,44a6fafe0c6dd1b5a76c5b567fc6821bb1bc347be4d901e9eadf2df289bd1
|
||||
CVE-2024-24706,0,0,99608966374565ae18ae703dbaf8477e67d081e532b39247cf263b507d4fd7c5,2024-11-21T08:59:32.947000
|
||||
CVE-2024-24707,0,0,5dfcfcaaa6d07a5fd016f4454c159955ea08a45723f1fba322dbb6aeba927137,2024-11-21T08:59:33.090000
|
||||
CVE-2024-24708,0,0,65871d812be26c4047bc05ce51f0c2e1ab39e5576dbdebbd79ac05fb039f446a,2024-11-21T08:59:33.233000
|
||||
CVE-2024-2471,0,1,3001e122774e09551ca8b61e1734c975ba32aa314c19e1baf58ea05ccbf0137d,2025-02-24T18:18:30.513000
|
||||
CVE-2024-2471,0,0,3001e122774e09551ca8b61e1734c975ba32aa314c19e1baf58ea05ccbf0137d,2025-02-24T18:18:30.513000
|
||||
CVE-2024-24710,0,0,3e1e20a8dfa79a8b78b75c17d13801e5e4aa6e91804fe24acce34eb915d0b381,2024-11-21T08:59:33.360000
|
||||
CVE-2024-24711,0,0,22ae5814b6f1b3b16c3d1525f8fcb2be9e6f73b9bf83108e69c5d785af0e14a5,2024-11-21T08:59:33.490000
|
||||
CVE-2024-24712,0,0,efc844b6aac243f9d2a4e2fa0e4f20ffb1fa53d6800923dfed2d946c95888150,2024-11-21T08:59:33.620000
|
||||
@ -256874,7 +256874,7 @@ CVE-2024-3207,0,0,a44f07a61b866cfd9c1defb1f2cc6163677fc58ce9121127937bb40a8755f7
|
||||
CVE-2024-32077,0,0,d2d4ad809c590238d608f30c1067ee36825e3385ffb5bcc6e6ecc0cbdac25aa2,2025-02-13T18:18:02.033000
|
||||
CVE-2024-32078,0,0,82ba60cc46e9aa4228ce6f631a63a9303f5be477f0d9a2dc16c6651d36d28708,2024-11-21T09:14:25.543000
|
||||
CVE-2024-32079,0,0,1bc3c03f2b5772f3aa8b52ceeb2e0251532ab71b12d3b25db239c0f26b173c66,2024-11-21T09:14:25.670000
|
||||
CVE-2024-3208,0,1,825a61e8cc05584c2ef2bb5c9aa68d5659595de19829f1ae20c53568a7d588e9,2025-02-24T17:57:40.263000
|
||||
CVE-2024-3208,0,0,825a61e8cc05584c2ef2bb5c9aa68d5659595de19829f1ae20c53568a7d588e9,2025-02-24T17:57:40.263000
|
||||
CVE-2024-32080,0,0,d73a822059be2548c669c29d56fa05dbd56ce653eefa07178c56f749bf1c6752,2024-11-21T09:14:25.797000
|
||||
CVE-2024-32081,0,0,db02a9c977213fd7cb23f3465beae81e4acc89954358d09d1359e2064ece0c6b,2024-11-21T09:14:25.920000
|
||||
CVE-2024-32082,0,0,33bc10f980e8e4374b9c6b2cf94d3ebe7b9f6b8f6912d6b2882d77aab441d3fd,2024-11-21T09:14:26.053000
|
||||
@ -267361,7 +267361,7 @@ CVE-2024-45775,0,0,dc9934913719b7ba371689f85d372f27a1c5a62c61667ba391c7f8d330af4
|
||||
CVE-2024-45776,0,0,7a04b7c7af22da1288ed82b6f5b30f15805ed4d914e4fc273482119cb2625695,2025-02-18T20:15:19.313000
|
||||
CVE-2024-45777,0,0,bcd0bab214a719b58ddcd730a7be37124827cbe868fcd457da07097e9b2f3848,2025-02-19T18:15:23.210000
|
||||
CVE-2024-4578,0,0,bdbd727086f88b7c6dce9bba415908bda128d8ea217ac43f45c5788929d872c3,2024-11-21T09:43:08.790000
|
||||
CVE-2024-45781,0,0,a587a3b87f71b568c9e051f17c521e2c823b1cb6704713cfcb2fd1f1a495d795,2025-02-18T20:15:19.450000
|
||||
CVE-2024-45781,0,1,133ac0cb92299a7df10b4b06b4cea79c7c1972b417bc5974d3666a0db7bf0b58,2025-02-24T19:15:14.423000
|
||||
CVE-2024-45783,0,0,e4aa133b1a4c5368c5e922eb069f3b52cda2e750027d303f7902e92d25e80622,2025-02-18T20:15:19.560000
|
||||
CVE-2024-45784,0,0,3048a1cb0fccc9c661b7edc8375d75b46aaf139acaa67371a0b13f350fb0ec33,2024-11-21T09:38:05.210000
|
||||
CVE-2024-45785,0,0,fd50e853f09ab6c2230e086d2435c3cb1d80eb0fdb3f5f2bda7ceb6deffb7b10,2024-11-06T17:08:40.507000
|
||||
@ -268069,7 +268069,7 @@ CVE-2024-46971,0,0,13f5bf1ddf9e277ff0420700bae256c15735e36c1980e83ccf846d2d8d258
|
||||
CVE-2024-46972,0,0,95b9b829ac40a71aa8b72076be82f629ce22983a71f926ad95be3c5975b4b190,2025-02-18T22:15:11.490000
|
||||
CVE-2024-46973,0,0,0437a0b4f343551c70c990e4fd559a1c21cac753a3df1f8e90ebfba823ecbaf4,2024-12-28T17:15:07.420000
|
||||
CVE-2024-46974,0,0,dfb76a0433767383a52519f3e13a26b3bbbc934082dde21f8b8c392f6cc03115,2025-02-18T19:15:16.563000
|
||||
CVE-2024-46975,0,1,da641012f378447cfd1fa138a99342207bccf299f2c707ea29d06ccb7d119962,2025-02-24T17:15:13.257000
|
||||
CVE-2024-46975,0,0,da641012f378447cfd1fa138a99342207bccf299f2c707ea29d06ccb7d119962,2025-02-24T17:15:13.257000
|
||||
CVE-2024-46976,0,0,4b4725b042b8e303031ca8672630aa4c44d9489240e1be2826c29862d55b367d,2025-01-03T14:52:32.863000
|
||||
CVE-2024-46977,0,0,fa1cd1ba8936d67d5921849fcc8f3d7b6f2a4d12d9e5b79d9c6367bb65d4c705,2024-10-31T14:15:05.870000
|
||||
CVE-2024-46978,0,0,6b4b273c251da2584d7ee17daf2abe4b18d0c96b507318935ca3196d6f3415b7,2025-02-07T15:48:36.660000
|
||||
@ -273653,7 +273653,7 @@ CVE-2024-54811,0,0,c518d2be0055f2f694c9ca48885a5257eabcc0287b36c8555688778fe5e57
|
||||
CVE-2024-54818,0,0,c43119f169232e03fce78f76fd8c17d403249b4db9d275dadea7d70095cbc4c7,2025-01-08T20:15:28.303000
|
||||
CVE-2024-54819,0,0,8ec44a69779700b75dce08ce23b0b696a8e67a9684b58a33ba4824157f9f0485,2025-01-08T15:15:19.317000
|
||||
CVE-2024-5482,0,0,201df0de22cd2de6baef389275fa06366007791ec5f711f789012d102cd7d319,2024-11-21T09:47:46.010000
|
||||
CVE-2024-54820,1,1,6678e3df85de3bf744bc8983980765bb86f83e197543d0fc950af8fd675e5c3d,2025-02-24T18:15:17.523000
|
||||
CVE-2024-54820,0,0,6678e3df85de3bf744bc8983980765bb86f83e197543d0fc950af8fd675e5c3d,2025-02-24T18:15:17.523000
|
||||
CVE-2024-5483,0,0,079d428e5ef1f2457bdcfb946982be872b42b40e94b6bfbc28ab3fe49f413326,2024-11-21T09:47:46.130000
|
||||
CVE-2024-5484,0,0,b3b185b98c733a0f4717de1a808b2127ff5f3061f156212c34336d217a368118,2024-05-31T11:15:09.783000
|
||||
CVE-2024-54840,0,0,10f38e8aac69675a42acd017e36b1ddc2fb9fc13d5cad0d6cef53aed3dd38dd6,2025-02-19T23:15:10.673000
|
||||
@ -273986,13 +273986,13 @@ CVE-2024-55921,0,0,5fa81d92601e70d676a1016b709a0f2741abaf55426856cddb4a06e34b9a7
|
||||
CVE-2024-55922,0,0,ab9ba749ee333e9f82aad55cb9be15ec2bea94f8fc77977baf33bef44d3cce51,2025-01-14T20:15:30.033000
|
||||
CVE-2024-55923,0,0,219ffcee25fb405d9a02cdc68a4fa5af829e860803373b590c58a214037e5d08,2025-01-14T20:15:30.197000
|
||||
CVE-2024-55924,0,0,51b538faaafc8081c0d91ed65951b4c0e863d37d4f9e21b793ae96fe9f20d0fe,2025-01-14T20:15:30.367000
|
||||
CVE-2024-55925,0,1,d6533bd3d28b09d0fbefee7c35bce6598563f6e25dcb6801632bc68dd02cf731,2025-02-24T18:15:17.823000
|
||||
CVE-2024-55926,0,1,45637f3cff729de9f1ee0c554ec62a2e93d0ac1b3428a19941afc770d8d43590,2025-02-24T18:15:17.997000
|
||||
CVE-2024-55927,0,1,9acefaba7646c8c6ed3d4b6969da306acd6ef9d8be264534bcfa3d531563287a,2025-02-24T18:15:18.163000
|
||||
CVE-2024-55928,0,1,018babed0310658b07b5c4cc048ea862b97dde417bea4aec4ac96e78c63e7465,2025-02-24T18:15:18.337000
|
||||
CVE-2024-55929,0,1,73ab0f50a888e1a4aaabff70d3287dce031dab7e455c55fb0f3949fe9cb909b7,2025-02-24T18:15:18.507000
|
||||
CVE-2024-55930,0,1,200301077d6523a98f2cdf7b12555f283c4f9f49342ea4a79e0f4277912f7457,2025-02-24T18:15:18.663000
|
||||
CVE-2024-55931,0,1,1707a199fa8f7a35e3d361e474111ddc1bb4d01126b118e72f6c6549081fa177,2025-02-24T18:15:18.830000
|
||||
CVE-2024-55925,0,0,d6533bd3d28b09d0fbefee7c35bce6598563f6e25dcb6801632bc68dd02cf731,2025-02-24T18:15:17.823000
|
||||
CVE-2024-55926,0,0,45637f3cff729de9f1ee0c554ec62a2e93d0ac1b3428a19941afc770d8d43590,2025-02-24T18:15:17.997000
|
||||
CVE-2024-55927,0,0,9acefaba7646c8c6ed3d4b6969da306acd6ef9d8be264534bcfa3d531563287a,2025-02-24T18:15:18.163000
|
||||
CVE-2024-55928,0,0,018babed0310658b07b5c4cc048ea862b97dde417bea4aec4ac96e78c63e7465,2025-02-24T18:15:18.337000
|
||||
CVE-2024-55929,0,0,73ab0f50a888e1a4aaabff70d3287dce031dab7e455c55fb0f3949fe9cb909b7,2025-02-24T18:15:18.507000
|
||||
CVE-2024-55930,0,0,200301077d6523a98f2cdf7b12555f283c4f9f49342ea4a79e0f4277912f7457,2025-02-24T18:15:18.663000
|
||||
CVE-2024-55931,0,0,1707a199fa8f7a35e3d361e474111ddc1bb4d01126b118e72f6c6549081fa177,2025-02-24T18:15:18.830000
|
||||
CVE-2024-5594,0,0,e7555e7b165259baf6d7812e78b67ccc956e8357ef83023a2dc849ba891436dd,2025-01-06T17:15:44.383000
|
||||
CVE-2024-55945,0,0,51c4c796163d23f85b889df289eaf5efe1a92af8ca1f7066684ce494ee386866,2025-01-14T20:15:30.527000
|
||||
CVE-2024-55946,0,0,ee860e9442a82675ef2a6aea6f75151a8e2b4e394989e5ab5272bb86ce0df26e,2024-12-13T21:15:13.603000
|
||||
@ -274791,7 +274791,7 @@ CVE-2024-57022,0,0,7e42a0eaca76fdaf1f44229827afe4be716bd161a679aa735bbcf9243657f
|
||||
CVE-2024-57023,0,0,01de6489e57ac073c34548807079eb2db864fcfb3e5a1353732f75c9ed7380a6,2025-01-21T18:15:14.677000
|
||||
CVE-2024-57024,0,0,dd6768df4410fc37cc8c4e8a948bb715a9d72db959034294e4bc9c1d5752aa77,2025-01-21T17:15:14.723000
|
||||
CVE-2024-57025,0,0,ba6eba255be4ec8bea25a2cdeb615de849af222ae85f044e2a8f32f3b1f8d1b7,2025-01-21T17:15:14.910000
|
||||
CVE-2024-57026,1,1,0ce7da422e56efba812503b0c89672f64eb9f586762377d6e2bc6a8033301fbd,2025-02-24T18:15:19.023000
|
||||
CVE-2024-57026,0,0,0ce7da422e56efba812503b0c89672f64eb9f586762377d6e2bc6a8033301fbd,2025-02-24T18:15:19.023000
|
||||
CVE-2024-5703,0,0,3d28349807701c555fbb2ea67def24c228f00e38f4a4f9bb2c70209ffe7ffa47,2024-11-21T09:48:12.467000
|
||||
CVE-2024-57030,0,0,01cfe55aec58900b151b329d4f4c994ce5192423d15550098a7bc9a4f1082c3b,2025-01-17T21:15:09.823000
|
||||
CVE-2024-57031,0,0,1d859728d6d66a6bcfe5da6cfb404ff9c10a4846f51b5dd74817dad1e9184348,2025-02-18T21:15:22.993000
|
||||
@ -274846,8 +274846,8 @@ CVE-2024-5714,0,0,849fc94b6902757fdfdae1f78ce00df63ab2c5ba63744e880696de74b0f190
|
||||
CVE-2024-5715,0,0,8c569768d6a890bf6135b49c7618937c530109ec67dd48fa94109e61c60d211f,2024-11-21T09:48:13.567000
|
||||
CVE-2024-57159,0,0,911ad61bac17d2746002becb8935568acc29955e7cfb0ab09e0435bacf9ef975,2025-02-03T19:15:12.880000
|
||||
CVE-2024-5716,0,0,3d427df7306e5a73dc01967e843a1c8b689a272b3aba62391281a97b5c9d3d70,2024-11-22T20:15:10.100000
|
||||
CVE-2024-57160,0,0,d044a821e4cd7d6f282a359da69fef7f6a3fff09a99b2b7f3d3224dfc169d2b6,2025-01-31T21:15:10.910000
|
||||
CVE-2024-57161,0,0,0495a61cce9967abce04c38c66d6e333bd202089322d89ea341f73e5c8ecf8ff,2025-01-31T21:15:11.153000
|
||||
CVE-2024-57160,0,1,21efe21d39d81640d4b28d9b56e9e9917bc8862bd99f1332fce5cfffc07d8da0,2025-02-24T19:38:22.867000
|
||||
CVE-2024-57161,0,1,2a35bb3f44d198292743676a0dabcc3033caa3631e24c5b8bbfb982d9a2e1148,2025-02-24T19:38:43.083000
|
||||
CVE-2024-57162,0,0,34980dbe4a72538efbb960a6cb249b8769ab30e4af22e079fea439e34fa66900,2025-02-18T21:15:23.657000
|
||||
CVE-2024-5717,0,0,fb2d4ea07d345b00fdb2b42ddabd6660deece1c7e8bb1f887295d0c9d91575e3,2024-11-22T20:15:10.227000
|
||||
CVE-2024-57175,0,0,e96a8c9420e12c8730fd044f61e074cae6b4f8900e0333d25afa5aec6b9ff461,2025-02-03T18:15:37.437000
|
||||
@ -279287,7 +279287,7 @@ CVE-2025-0648,0,0,ec79ce6f39b47487aa16e0340c9bff69ff776daf1028d3a38c4c3ba8e39e1f
|
||||
CVE-2025-0650,0,0,a9fc324c64dd82aee521d1bffa9b7782cf03bd2f6e410628d7018de6f1170f96,2025-02-06T09:15:11.697000
|
||||
CVE-2025-0651,0,0,e2215d27193b6db6cba4dbdda5349954e60373a439e45e60be4d39bd216d0a6b,2025-01-22T18:15:20.363000
|
||||
CVE-2025-0659,0,0,a231e421d524771ecef4ddd421dffcbb4d37f1c0838cd9830fba22194e88f80c,2025-01-28T16:15:40.360000
|
||||
CVE-2025-0661,0,1,b1e3b3e01aec6a0429d6cfbed29279169cf9ca980f886cdc2d225d4899ed12e8,2025-02-24T17:10:16.007000
|
||||
CVE-2025-0661,0,0,b1e3b3e01aec6a0429d6cfbed29279169cf9ca980f886cdc2d225d4899ed12e8,2025-02-24T17:10:16.007000
|
||||
CVE-2025-0662,0,0,33daf52cdf419d482596718a6ca1d8792f8f25da15f58b8337c49907fcbd7414,2025-02-07T17:15:31.157000
|
||||
CVE-2025-0665,0,0,32d62a31dda68c00a725e820e49c088e5a4c0cbb7a3a5fc704b21339eef4d91c,2025-02-18T19:15:23.280000
|
||||
CVE-2025-0674,0,0,f9a5b719b45bd5bb8c1b4e4a7f4ed3325700578bc985184c525f090e2005e85a,2025-02-07T00:15:27.017000
|
||||
@ -279379,7 +279379,7 @@ CVE-2025-0821,0,0,c0f9c17d34dd02f439cce895873742df5bc79e8c6fc655f0e6995bd60a4635
|
||||
CVE-2025-0822,0,0,4c844a6713ce2631895193eac241699c6c3839eb1c8dbea359488af5de55887f,2025-02-24T12:36:46.670000
|
||||
CVE-2025-0825,0,0,7f81ca19fb96d77c0731181ff23092e49d4e8a157f0a8fa4a0ca13f53bda7923,2025-02-04T15:15:19.420000
|
||||
CVE-2025-0834,0,0,239a6f08c2db88ce57ab64c699932d200eff33712703b8a8f00d02b01207348f,2025-01-30T09:15:09.703000
|
||||
CVE-2025-0837,0,1,edb903a525c34e5db3f70de24ac0ad9bb2158867f6a7f92ca61239987715eef7,2025-02-24T17:08:29.033000
|
||||
CVE-2025-0837,0,0,edb903a525c34e5db3f70de24ac0ad9bb2158867f6a7f92ca61239987715eef7,2025-02-24T17:08:29.033000
|
||||
CVE-2025-0838,0,0,b3bedc01b96cdbe25c8f6922cea4e94abd529b95831b6c6b3a257c0f4033b9cb,2025-02-21T15:15:11.890000
|
||||
CVE-2025-0840,0,0,dcc73de0595740e9bb877d1b68b6e13f7a74ad4d50a26f82e22ce56d8c04db6b,2025-01-29T20:15:35.007000
|
||||
CVE-2025-0841,0,0,d34ffb164e9f6e4e065c3a7bf9858f8af34d279265f630e92f70d22138303c3f,2025-01-29T21:15:20.973000
|
||||
@ -279696,7 +279696,7 @@ CVE-2025-1470,0,0,c431c34122bd455693ae857da134c11078dd424d889a110192af0d8789781c
|
||||
CVE-2025-1471,0,0,5f2308ef243e2997d93c627b7cee213af79efe1fdd8602f268a3ff3acb063cf9,2025-02-21T10:15:11.413000
|
||||
CVE-2025-1483,0,0,ce3e2374c8ceeb73bbc31bdc8dbf6b8de9bfef289bdc35ff175139154a83c52b,2025-02-20T10:15:12.537000
|
||||
CVE-2025-1488,0,0,43cfa98a915bcf0660c9d6b45b3151f7578e9794c9b93f44777c487cb0fa081f,2025-02-24T11:15:10.193000
|
||||
CVE-2025-1489,0,0,33b499615f5a9d47836021ac5ca54335451238d68926a899e34dbf51c4c427a7,2025-02-21T12:15:30.740000
|
||||
CVE-2025-1489,0,1,3008549e3d2861f78796256b763f59eec371226dd4b84353f864c64443cf0ecb,2025-02-24T19:45:21.653000
|
||||
CVE-2025-1492,0,0,a12c05d7276816932001573681340e79b217d21be6e278e421f34f68972737e1,2025-02-20T02:15:38.553000
|
||||
CVE-2025-1509,0,0,23e6d59505826ac4948dc80673c03ff2b0aed485111f57186985eb2e5cb2ebc3,2025-02-22T04:15:09.883000
|
||||
CVE-2025-1510,0,0,9b376c589154983b1ec02250f9735f4521be8d5584c35e34e9235c478622092f,2025-02-22T04:15:10.040000
|
||||
@ -279709,7 +279709,7 @@ CVE-2025-1543,0,0,079e018e26abed20b54fa2585c54e2a36ef2ea5d437d5ac399037949b75daa
|
||||
CVE-2025-1544,0,0,6dfefee8c1beb9250313ea7950237ab90994f9ae50b689b8e2c00c600bd9529e,2025-02-21T16:15:32.953000
|
||||
CVE-2025-1546,0,0,7a27654d265dd0e0c87a112414ca356bea46a4aa4326e4b6c538ca7fa17cdb3d,2025-02-21T18:15:21.523000
|
||||
CVE-2025-1548,0,0,dc77eed63b703112b11128556adaac7473d7e2c58e805a91497e7bcaa94271fc,2025-02-21T17:15:13.897000
|
||||
CVE-2025-1553,0,1,3c10d6a755dcef4709f1d7b4a32da74f40ecec9ec11c525c5e38cbe72383a6ad,2025-02-24T17:15:13.540000
|
||||
CVE-2025-1553,0,0,3c10d6a755dcef4709f1d7b4a32da74f40ecec9ec11c525c5e38cbe72383a6ad,2025-02-24T17:15:13.540000
|
||||
CVE-2025-1555,0,0,b87953fc659c2e74abd428dd8b83c4d989fea69643d0c4eecfbab0e6ac242e9a,2025-02-24T15:15:12.810000
|
||||
CVE-2025-1556,0,0,724b13759326d4daa23c48d02c1ce795525d880ae020ac09a68b1de9594640a5,2025-02-22T13:15:12.010000
|
||||
CVE-2025-1557,0,0,49607b48e972d9fd5d215f054ea7353b084df75dff065ecc488af6c52d9e37af,2025-02-22T13:15:12.247000
|
||||
@ -280435,7 +280435,7 @@ CVE-2025-22450,0,0,08efaa8a0b7289f6e07d2143106d9ab0ee4947a312acaf42c999e908a6f4e
|
||||
CVE-2025-22467,0,0,8bd8bd517db848742ab03a7d28d508822057ab7be14ae3f2dcda13c476e2f133,2025-02-20T15:53:06.133000
|
||||
CVE-2025-22475,0,0,15e2f0e4f859c49a221c12f5e1eb7e46b6c6aca8f0ab3cc88af90136ef2fdb5f,2025-02-07T20:42:39.800000
|
||||
CVE-2025-22480,0,0,30f78fb08b81b0a4a0f02016506c54aff4f612e77005946c54cb0114603ea9f7,2025-02-18T18:39:56.053000
|
||||
CVE-2025-22495,1,1,b69414b6cefd90565ddf9757afc00445135fb48616564da9514c4b5ad30aaa8c,2025-02-24T17:15:13.723000
|
||||
CVE-2025-22495,0,0,b69414b6cefd90565ddf9757afc00445135fb48616564da9514c4b5ad30aaa8c,2025-02-24T17:15:13.723000
|
||||
CVE-2025-22498,0,0,f3f7d57a5c074cef7d66fd0b0c22de1f5c4ac45e596ff524016d32b7cab75963,2025-01-13T14:15:10.787000
|
||||
CVE-2025-22499,0,0,2c7469ba06cedcc8f30abf0610d7acbf7462216a8d6077933c22c805fba653a7,2025-01-13T14:15:10.960000
|
||||
CVE-2025-22500,0,0,c8f154061d3da5b6a8edbf6756b48a42d68c23a6466a5b364e986467d39302c7,2025-01-07T17:15:33.657000
|
||||
@ -281905,7 +281905,7 @@ CVE-2025-25357,0,0,6ee1cd3a9f7f323b5c37547d52a4c5ca928da63fb7a31ff1e85142032c6e3
|
||||
CVE-2025-25387,0,0,795aaedd4d9e8425550ebd02042ed4a33da344802c3685e22ff847ed53820845,2025-02-14T17:15:20.393000
|
||||
CVE-2025-25388,0,0,6a9ee7104467003ccd60c12bd6c2052b9cc5a20a13a182e826767b7f4080b7c7,2025-02-13T20:15:49.730000
|
||||
CVE-2025-25389,0,0,9f7198ffc91c33105d03adb0c3ce8e30d33f5591c78e15ae8d3046dd1ba01838,2025-02-14T17:15:20.663000
|
||||
CVE-2025-25460,0,1,c317be9cfc8a496a253be90cd4dd305f90921029147d15141e5d010adef6c61b,2025-02-24T17:15:13.900000
|
||||
CVE-2025-25460,0,0,c317be9cfc8a496a253be90cd4dd305f90921029147d15141e5d010adef6c61b,2025-02-24T17:15:13.900000
|
||||
CVE-2025-25467,0,0,88e8377464fdf0cf875ec11d3e8371c15a9465f85314cbabc34c80cddb507da4,2025-02-19T15:15:17.760000
|
||||
CVE-2025-25468,0,0,9209daa082de7c38fedec36f5894b79e14469faa71894740e63970dc23df9401,2025-02-19T15:15:17.930000
|
||||
CVE-2025-25469,0,0,741fdd6513e01efbd7a9bf5df4924bb989fc1989e61032b7cef4423372c52af7,2025-02-19T21:15:15.750000
|
||||
@ -281937,7 +281937,7 @@ CVE-2025-25674,0,0,6d025ae220f91c2a57ba855f1dbf317fed89516da1582298cc4667448bef5
|
||||
CVE-2025-25675,0,0,bcf48b74286fdf685bef73e0a7e4d2cb90868ad9ff8b8120157d8f7bb75cd351,2025-02-21T18:16:00.790000
|
||||
CVE-2025-25676,0,0,daf85732e597f1793e01b57a88af2ab73ae5e7b139e5e84dbb4cacf83744c130,2025-02-21T18:16:04.577000
|
||||
CVE-2025-25678,0,0,64aaf58170ee4d79f4247ea2c0b96da46219dfaa04983aca5741969381b237f2,2025-02-21T18:16:08.493000
|
||||
CVE-2025-25679,0,1,3cebd49dfacc441892528658235bae2847665b7e89bb57bdaf15bcd2a8d49f09,2025-02-24T18:15:19.213000
|
||||
CVE-2025-25679,0,0,3cebd49dfacc441892528658235bae2847665b7e89bb57bdaf15bcd2a8d49f09,2025-02-24T18:15:19.213000
|
||||
CVE-2025-25740,0,0,260642afc1d2693297702d9ce768686d3842d2725b59b6c83aca2b22bfb89d6f,2025-02-14T15:15:13.190000
|
||||
CVE-2025-25741,0,0,bd9cb96b0f827c65aa97d3cf4c8992f0fabd3fe1e6bdadae7cd80546fd1e08cc,2025-02-12T18:15:28.293000
|
||||
CVE-2025-25742,0,0,282d5be2f716e792c8811a9f5fcc30c9e90532841c3863f5b991aec212b10df2,2025-02-19T19:02:59.180000
|
||||
@ -281949,11 +281949,11 @@ CVE-2025-25765,0,0,3adfd18b0523627b6799d8f3fe18ae9718bbe1da9964013c36335171c37fd
|
||||
CVE-2025-25766,0,0,57af4b18309fbf59a64f83f90aab5cd3bfbe39741914f4dbb52a684f7edb326e,2025-02-21T18:16:12.647000
|
||||
CVE-2025-25767,0,0,65da93516558bfe81b43fcd0adbd639aa009f9a52ab8537bd361623a21370b60,2025-02-21T19:15:14.253000
|
||||
CVE-2025-25768,0,0,304c7220a311f269a43e8f32a234f6d1b13317a69f4862236989f7ec5468694b,2025-02-21T19:15:14.363000
|
||||
CVE-2025-25769,0,1,23c8747da587b2cec740d3eb785ff6bb03890bf557e1689c0c836490aea47b0b,2025-02-24T18:15:19.487000
|
||||
CVE-2025-25770,0,1,b3e515f133a4ee2a001c39c5da953da7ccc7cb2840f20050012ea90a9b8becc3,2025-02-24T18:15:20.280000
|
||||
CVE-2025-25769,0,0,23c8747da587b2cec740d3eb785ff6bb03890bf557e1689c0c836490aea47b0b,2025-02-24T18:15:19.487000
|
||||
CVE-2025-25770,0,0,b3e515f133a4ee2a001c39c5da953da7ccc7cb2840f20050012ea90a9b8becc3,2025-02-24T18:15:20.280000
|
||||
CVE-2025-25772,0,0,2f0f0f58a3ad6615016a2856b7a87760fb37871ed912f01a814631976a58d051,2025-02-21T22:15:12.813000
|
||||
CVE-2025-25875,0,0,4ae4a41a47ee817f194e373119e06368304ab5bcd19c90c39f2f631e9bca1c06,2025-02-21T18:16:12.873000
|
||||
CVE-2025-25876,0,1,d6c09f94538a5c36fd70d310b48b5e98ead81616eeefe6e6f1451c304b2ebe13,2025-02-24T17:15:14.100000
|
||||
CVE-2025-25876,0,0,d6c09f94538a5c36fd70d310b48b5e98ead81616eeefe6e6f1451c304b2ebe13,2025-02-24T17:15:14.100000
|
||||
CVE-2025-25877,0,0,f6914eb034148bb528f1091838ce10955d1010e17f96a9876034900b21fe7f33,2025-02-21T22:15:12.977000
|
||||
CVE-2025-25878,0,0,f590bd91a14f49dcf8300dd3d531cc9f479b1804dcefa71a21760252a310563b,2025-02-21T22:15:13.133000
|
||||
CVE-2025-25891,0,0,9ffea80911f1e47c70786967af69881dfb74e93322751a9813ef61512aae0c90,2025-02-19T16:15:41.447000
|
||||
@ -281991,13 +281991,13 @@ CVE-2025-26058,0,0,d6830ee74802882f622367eb3e014df2c057afc37826d4d9d4aaa490f6e8c
|
||||
CVE-2025-26156,0,0,a8694b3e45c4489013c1cde3d4ed9238920082c88bdc645d51681df5fb2b64af,2025-02-14T19:15:15.033000
|
||||
CVE-2025-26157,0,0,7804a33112b2a9ac773ed8a4ce8c66afc4de94479098b9344da6b84d1d9bf6e8,2025-02-14T20:15:37.543000
|
||||
CVE-2025-26158,0,0,74f4aa7ecf6ee690115b15bb4e8b902a9165914e813dcbc79db25584fd407063,2025-02-14T20:15:37.677000
|
||||
CVE-2025-26200,1,1,d9acb4ba138dd72827a5ae920d4119a49bf77bd1ba787405ae12ac352e8d6e5e,2025-02-24T17:15:14.273000
|
||||
CVE-2025-26201,1,1,a0e37e7a39c3a07c990a5dcec1766cef724c487a497502e59b82a95800cc7450,2025-02-24T18:15:21.047000
|
||||
CVE-2025-26200,0,0,d9acb4ba138dd72827a5ae920d4119a49bf77bd1ba787405ae12ac352e8d6e5e,2025-02-24T17:15:14.273000
|
||||
CVE-2025-26201,0,0,a0e37e7a39c3a07c990a5dcec1766cef724c487a497502e59b82a95800cc7450,2025-02-24T18:15:21.047000
|
||||
CVE-2025-26304,0,0,70c8f37d4db2054dfe1099a4a2c4b06129c826d4de254465b9316b6b41e402d7,2025-02-21T21:15:24.653000
|
||||
CVE-2025-26305,0,0,1a1d603a79ab0dad9b04f449d78f3a3bb9f5de25113a59f9bb3a8e492946e3de,2025-02-21T21:15:24.803000
|
||||
CVE-2025-26306,0,1,f6318b29dc3c8fcf62d8d059c582dc4ed277312d31ede047e5262baa26bd01da,2025-02-24T18:15:21.357000
|
||||
CVE-2025-26306,0,0,f6318b29dc3c8fcf62d8d059c582dc4ed277312d31ede047e5262baa26bd01da,2025-02-24T18:15:21.357000
|
||||
CVE-2025-26307,0,0,985beed55a8f638fd04d0a13d2505a90eaf2bf50598c60df60e93fb1afdd71ae,2025-02-21T15:15:13.223000
|
||||
CVE-2025-26308,0,1,69e4926ab121453dd269ecd5c4a1e680c76cfe3a7adc73ca0152c52aac5d451c,2025-02-24T18:15:21.647000
|
||||
CVE-2025-26308,0,0,69e4926ab121453dd269ecd5c4a1e680c76cfe3a7adc73ca0152c52aac5d451c,2025-02-24T18:15:21.647000
|
||||
CVE-2025-26309,0,0,7ae8d8b0652f85e6f8fa255fc222f026973cab38848f066168ff295eb6f4ee31,2025-02-21T18:16:13.790000
|
||||
CVE-2025-26310,0,0,55b236dbeb9a20179e9b06fa335fdfa1062067456641081301fd898e499e9d2b,2025-02-21T18:16:17.950000
|
||||
CVE-2025-26311,0,0,06d541ea93c6274eb552bc93a46b31aab60c7a52133551001cc450c9b897d373,2025-02-20T21:15:25.907000
|
||||
@ -282062,6 +282062,14 @@ CVE-2025-26520,0,0,17d02b8206df6278a5daac40c2b231fb3d4ebedc90f89b701d393457344ae
|
||||
CVE-2025-26522,0,0,81134038c496481bfa5c560aae63c4f4621e7f68899375180dc3955b52ec6e4d,2025-02-14T12:15:29.583000
|
||||
CVE-2025-26523,0,0,cd12665da062e93af2c690c3b3ac969d692dcb2b834904fb031d67807c219377,2025-02-14T12:15:29.723000
|
||||
CVE-2025-26524,0,0,bd7001926462f269d35a46f341242eea9f256eba3c891acb3af12e0119a6db89,2025-02-14T12:15:29.887000
|
||||
CVE-2025-26525,1,1,e2470c0b89fb5f4c317b46f89a75742cf40aaeb4834d01cf3fd91c3994e3b2df,2025-02-24T20:15:33.103000
|
||||
CVE-2025-26526,1,1,6425f2747c445b6d9158d4211ff4088ba074b3474102b40bdc631e2e2abbb90b,2025-02-24T20:15:33.263000
|
||||
CVE-2025-26527,1,1,bf2779fcba04200fdcb75a5a7a9f5531a86e849eab0d085762947141b3c2eaf1,2025-02-24T20:15:33.403000
|
||||
CVE-2025-26528,1,1,a365d827164795bc1ef58abd6171679d3069ce4ccde2807be350c01d0b3aa5d5,2025-02-24T20:15:33.543000
|
||||
CVE-2025-26529,1,1,a4ee1915d14b95ea82ab1944c3df3a492d57176e49f9ca84129b30a726b6a965,2025-02-24T20:15:33.677000
|
||||
CVE-2025-26530,1,1,63219eb639d784006748b7e9b7585eb4cb931b1cccb20a31dfcf93c2af986358,2025-02-24T20:15:33.807000
|
||||
CVE-2025-26531,1,1,4454ead5716d53108591ae776002c8d02ed96d405f2b930f023008b300798475,2025-02-24T20:15:33.933000
|
||||
CVE-2025-26532,1,1,598f624e5c9d1c4c60a7140797a329e77af0a449c9c4b34a91bafc0972369445,2025-02-24T20:15:34.053000
|
||||
CVE-2025-26538,0,0,1b562cf933ca4f85387b9ad113a7e0bff6d82f6dfd74192b752d3543af30d3f6,2025-02-13T14:16:19.100000
|
||||
CVE-2025-26539,0,0,276f32835753e35ddba03e434efdb4b7cdb02fdf3cdfcf4922e56feaff65d802,2025-02-13T14:16:19.383000
|
||||
CVE-2025-26543,0,0,b3dbce2448f1125de716ecbc885f7a4be61adfbd3d23eb6c2c769d8219c9a560,2025-02-18T18:15:36.597000
|
||||
@ -282134,7 +282142,7 @@ CVE-2025-26779,0,0,8a262025d77166fa868782d4b8f9b46644ef804b486a3f05cf1d89fa1cfb4
|
||||
CVE-2025-26788,0,0,6e0ad5eea5859828ac73a22164fbb38f733c72d94018b5153d62b3e4b0af0638,2025-02-15T16:15:30.090000
|
||||
CVE-2025-26789,0,0,ca7d12f2abb1c99361932e960f77e482442b11d4e054c4c52afe3c09d090d91c,2025-02-14T08:15:31.357000
|
||||
CVE-2025-26791,0,0,14f0d0b897ce6b3b47f78e719fad727635dc1654f1791907b55fa0b08f85a137,2025-02-14T16:15:37.350000
|
||||
CVE-2025-26793,0,1,f4d2d5412189dc053f3b0a2570c5ffe6a45b414de066e605db6d5d1fb564c0ef,2025-02-24T17:15:14.580000
|
||||
CVE-2025-26793,0,0,f4d2d5412189dc053f3b0a2570c5ffe6a45b414de066e605db6d5d1fb564c0ef,2025-02-24T17:15:14.580000
|
||||
CVE-2025-26794,0,0,fe65001567301b62f9f70becffce46b16ab4f6e8292d604a049482502e1fc499,2025-02-22T01:15:10.670000
|
||||
CVE-2025-26803,0,0,7a255b740667bada4fca34455e40a59365b611b064e171d9a400283919805118,2025-02-24T16:15:15.020000
|
||||
CVE-2025-26819,0,0,0ede991b4b81e17fa4f92afd2308026e6f3d0368afffc246b266200c177a850a,2025-02-15T00:15:28.510000
|
||||
@ -282157,8 +282165,10 @@ CVE-2025-27104,0,0,15aaaf6917676f5eff2f89fbd0c3a21c0c13a6b224565fcd05537a337b887
|
||||
CVE-2025-27105,0,0,2bcb6c340eab97672213237573c8f6ca4eeeb614b47978107b021b4da927b7cb,2025-02-22T16:15:32.827000
|
||||
CVE-2025-27106,0,0,2aea6dfc75b6de975e9d792b22b24672e89a28876099e5c80ae756f94e64cf9c,2025-02-22T16:15:33.003000
|
||||
CVE-2025-27108,0,0,7cd07cb1baebc7581e6189da86b0f89ab8f66cca7350d7768234c5e33b5a7c6f,2025-02-21T22:15:14.170000
|
||||
CVE-2025-27109,0,1,887a9677b59d7647aa063bf92caff49be61f0df690b2560df78fd44f58dfdb6b,2025-02-24T17:15:14.850000
|
||||
CVE-2025-27109,0,0,887a9677b59d7647aa063bf92caff49be61f0df690b2560df78fd44f58dfdb6b,2025-02-24T17:15:14.850000
|
||||
CVE-2025-27112,1,1,ee0d927c6fb13b15cf89a5e5e15c73d10b42a1b52bf52c1bf9cbd01c1bbcaebd,2025-02-24T19:15:14.597000
|
||||
CVE-2025-27113,0,0,d170fa3c72db3eb74309693f02d592d61ed72cb3e9e67a063d1482cf1b9614a1,2025-02-18T23:15:10.960000
|
||||
CVE-2025-27133,1,1,29844716abafc4dda273789005e3e16abe4d7d6eca7ec6dff9bfc7d4679fc1f2,2025-02-24T19:15:14.763000
|
||||
CVE-2025-27218,0,0,efa55c2dc9300fcbe5554c514f0fd9c100e33cfb72ff20b2eedb0bf35dee5b0b,2025-02-20T21:15:26.510000
|
||||
CVE-2025-27265,0,0,f92ef224928c265ed828ba40cf1c61290404ad79163953c8c2df56f81d7b8ab6,2025-02-24T15:15:14.310000
|
||||
CVE-2025-27266,0,0,7b4f333de7657eb474765345c5822ee79cdee853af3b515f2a266de5b5a75147,2025-02-24T15:15:14.443000
|
||||
@ -282210,3 +282220,4 @@ CVE-2025-27353,0,0,e9330e465bd2b224e768917457bf183dd9e6e3a03d6a86b1c73c647172eb9
|
||||
CVE-2025-27355,0,0,66e7c6f2a2b25e7dd96aabb373de405f0d7238e697b5f6eca301307be69d4dd5,2025-02-24T15:15:20.917000
|
||||
CVE-2025-27356,0,0,451dc4587cf2e56d947661dd5ce87ee61b0a9c7d0fddf41bb2794ffa4d5028c9,2025-02-24T15:15:21.077000
|
||||
CVE-2025-27357,0,0,a7a6432997c064e16448c81c4ebf75b9895532aa24152d8d607748003751d3d3,2025-02-24T15:15:21.233000
|
||||
CVE-2025-27364,1,1,a6f68b00caeb3fd723cefacab1c9d3bfa45e0696d3b00b1760eeb7e038956a23,2025-02-24T20:15:34.180000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user