mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-19 17:31:42 +00:00
Auto-Update: 2025-03-22T15:00:20.196709+00:00
This commit is contained in:
parent
64f76a235b
commit
b20edaf720
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2024-10466",
|
"id": "CVE-2024-10466",
|
||||||
"sourceIdentifier": "security@mozilla.org",
|
"sourceIdentifier": "security@mozilla.org",
|
||||||
"published": "2024-10-29T13:15:04.273",
|
"published": "2024-10-29T13:15:04.273",
|
||||||
"lastModified": "2025-01-09T18:15:27.253",
|
"lastModified": "2025-03-22T14:15:13.777",
|
||||||
"vulnStatus": "Modified",
|
"vulnStatus": "Modified",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -36,6 +36,26 @@
|
|||||||
},
|
},
|
||||||
"exploitabilityScore": 3.9,
|
"exploitabilityScore": 3.9,
|
||||||
"impactScore": 3.6
|
"impactScore": 3.6
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||||
|
"baseScore": 7.5,
|
||||||
|
"baseSeverity": "HIGH",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 3.6
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
@ -49,6 +69,16 @@
|
|||||||
"value": "NVD-CWE-noinfo"
|
"value": "NVD-CWE-noinfo"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-400"
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"configurations": [
|
"configurations": [
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-2886",
|
"id": "CVE-2024-2886",
|
||||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||||
"published": "2024-03-26T21:15:53.260",
|
"published": "2024-03-26T21:15:53.260",
|
||||||
"lastModified": "2024-12-19T16:09:30.553",
|
"lastModified": "2025-03-22T14:15:14.203",
|
||||||
"vulnStatus": "Analyzed",
|
"vulnStatus": "Modified",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -69,6 +69,16 @@
|
|||||||
"value": "CWE-416"
|
"value": "CWE-416"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-416"
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"configurations": [
|
"configurations": [
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2024-39925",
|
"id": "CVE-2024-39925",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-09-13T18:15:03.927",
|
"published": "2024-09-13T18:15:03.927",
|
||||||
"lastModified": "2025-01-09T18:15:28.117",
|
"lastModified": "2025-03-22T14:15:14.477",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -15,7 +15,42 @@
|
|||||||
"value": "Se descubri\u00f3 un problema en Vaultwarden (anteriormente Bitwarden_RS) 1.30.3. Carece de un proceso de desvinculaci\u00f3n para los miembros que abandonan una organizaci\u00f3n. Como resultado, la clave de organizaci\u00f3n compartida no se rota cuando un miembro se va. En consecuencia, el miembro que se va, cuyo acceso debe revocarse, conserva una copia de la clave de la organizaci\u00f3n. Adem\u00e1s, la aplicaci\u00f3n no protege adecuadamente algunos datos cifrados almacenados en el servidor. En consecuencia, un usuario autenticado podr\u00eda obtener acceso no autorizado a los datos cifrados de cualquier organizaci\u00f3n, incluso si el usuario no es miembro de la organizaci\u00f3n en cuesti\u00f3n. Sin embargo, el usuario necesitar\u00eda saber el ID de organizaci\u00f3n correspondiente. Por lo tanto, si un usuario (cuyo acceso a una organizaci\u00f3n ha sido revocado) ya posee la clave de la organizaci\u00f3n, ese usuario podr\u00eda usar la clave para descifrar los datos filtrados."
|
"value": "Se descubri\u00f3 un problema en Vaultwarden (anteriormente Bitwarden_RS) 1.30.3. Carece de un proceso de desvinculaci\u00f3n para los miembros que abandonan una organizaci\u00f3n. Como resultado, la clave de organizaci\u00f3n compartida no se rota cuando un miembro se va. En consecuencia, el miembro que se va, cuyo acceso debe revocarse, conserva una copia de la clave de la organizaci\u00f3n. Adem\u00e1s, la aplicaci\u00f3n no protege adecuadamente algunos datos cifrados almacenados en el servidor. En consecuencia, un usuario autenticado podr\u00eda obtener acceso no autorizado a los datos cifrados de cualquier organizaci\u00f3n, incluso si el usuario no es miembro de la organizaci\u00f3n en cuesti\u00f3n. Sin embargo, el usuario necesitar\u00eda saber el ID de organizaci\u00f3n correspondiente. Por lo tanto, si un usuario (cuyo acceso a una organizaci\u00f3n ha sido revocado) ya posee la clave de la organizaci\u00f3n, ese usuario podr\u00eda usar la clave para descifrar los datos filtrados."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||||
|
"baseScore": 6.5,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "NONE"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 3.6
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-200"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/dani-garcia/vaultwarden/releases",
|
"url": "https://github.com/dani-garcia/vaultwarden/releases",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-40850",
|
"id": "CVE-2024-40850",
|
||||||
"sourceIdentifier": "product-security@apple.com",
|
"sourceIdentifier": "product-security@apple.com",
|
||||||
"published": "2024-09-17T00:15:49.383",
|
"published": "2024-09-17T00:15:49.383",
|
||||||
"lastModified": "2024-09-24T15:41:22.803",
|
"lastModified": "2025-03-22T14:15:14.713",
|
||||||
"vulnStatus": "Analyzed",
|
"vulnStatus": "Modified",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -36,6 +36,26 @@
|
|||||||
},
|
},
|
||||||
"exploitabilityScore": 1.8,
|
"exploitabilityScore": 1.8,
|
||||||
"impactScore": 3.6
|
"impactScore": 3.6
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||||
|
"baseScore": 5.5,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "NONE"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.8,
|
||||||
|
"impactScore": 3.6
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
@ -49,6 +69,16 @@
|
|||||||
"value": "NVD-CWE-noinfo"
|
"value": "NVD-CWE-noinfo"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-200"
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"configurations": [
|
"configurations": [
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-44136",
|
"id": "CVE-2024-44136",
|
||||||
"sourceIdentifier": "product-security@apple.com",
|
"sourceIdentifier": "product-security@apple.com",
|
||||||
"published": "2025-01-15T20:15:27.923",
|
"published": "2025-01-15T20:15:27.923",
|
||||||
"lastModified": "2025-03-04T15:30:49.700",
|
"lastModified": "2025-03-22T14:15:14.963",
|
||||||
"vulnStatus": "Analyzed",
|
"vulnStatus": "Modified",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -36,19 +36,49 @@
|
|||||||
},
|
},
|
||||||
"exploitabilityScore": 0.9,
|
"exploitabilityScore": 0.9,
|
||||||
"impactScore": 3.6
|
"impactScore": 3.6
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
|
||||||
|
"baseScore": 9.1,
|
||||||
|
"baseSeverity": "CRITICAL",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 5.2
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
"weaknesses": [
|
"weaknesses": [
|
||||||
{
|
{
|
||||||
"source": "nvd@nist.gov",
|
"source": "nvd@nist.gov",
|
||||||
"type": "Secondary",
|
"type": "Primary",
|
||||||
"description": [
|
"description": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "NVD-CWE-noinfo"
|
"value": "NVD-CWE-noinfo"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-863"
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"configurations": [
|
"configurations": [
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2024-51123",
|
"id": "CVE-2024-51123",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2025-02-12T22:15:39.717",
|
"published": "2025-02-12T22:15:39.717",
|
||||||
"lastModified": "2025-02-18T18:15:26.130",
|
"lastModified": "2025-03-22T14:15:15.170",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -15,7 +15,42 @@
|
|||||||
"value": "Un problema en Zertificon Z1 SecureMail Z1 SecureMail Gateway 4.44.2-7240-debian12 permite que un atacante remoto obtenga informaci\u00f3n confidencial a trav\u00e9s del componente /compose-pdf.xhtml?convid=[id]."
|
"value": "Un problema en Zertificon Z1 SecureMail Z1 SecureMail Gateway 4.44.2-7240-debian12 permite que un atacante remoto obtenga informaci\u00f3n confidencial a trav\u00e9s del componente /compose-pdf.xhtml?convid=[id]."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||||
|
"baseScore": 7.5,
|
||||||
|
"baseSeverity": "HIGH",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "NONE"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 3.6
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-200"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/MVRC-ITSEC/CVEs/blob/main/CVE-2024-51123",
|
"url": "https://github.com/MVRC-ITSEC/CVEs/blob/main/CVE-2024-51123",
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2024-51440",
|
"id": "CVE-2024-51440",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2025-02-12T22:15:39.990",
|
"published": "2025-02-12T22:15:39.990",
|
||||||
"lastModified": "2025-02-18T18:15:26.283",
|
"lastModified": "2025-03-22T14:15:15.390",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -15,7 +15,42 @@
|
|||||||
"value": "Un problema en Nothing Tech Nothing OS v.2.6 permite que un atacante local escale privilegios a trav\u00e9s del componente NtBpfService."
|
"value": "Un problema en Nothing Tech Nothing OS v.2.6 permite que un atacante local escale privilegios a trav\u00e9s del componente NtBpfService."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"baseScore": 7.8,
|
||||||
|
"baseSeverity": "HIGH",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.8,
|
||||||
|
"impactScore": 5.9
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-276"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://sharedobject.blog/posts/nothing-bpf/",
|
"url": "https://sharedobject.blog/posts/nothing-bpf/",
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2024-56898",
|
"id": "CVE-2024-56898",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2025-02-03T21:15:14.047",
|
"published": "2025-02-03T21:15:14.047",
|
||||||
"lastModified": "2025-03-04T22:15:38.990",
|
"lastModified": "2025-03-22T14:15:15.590",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -15,7 +15,42 @@
|
|||||||
"value": "El control de acceso incorrecto en Geovision GV-ASWeb versi\u00f3n 6.1.0.0 o anterior permite que atacantes no autorizados con privilegios de bajo nivel administren y creen nuevas cuentas de usuario mediante el suministro de una solicitud HTTP manipulada."
|
"value": "El control de acceso incorrecto en Geovision GV-ASWeb versi\u00f3n 6.1.0.0 o anterior permite que atacantes no autorizados con privilegios de bajo nivel administren y creen nuevas cuentas de usuario mediante el suministro de una solicitud HTTP manipulada."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"baseScore": 8.8,
|
||||||
|
"baseSeverity": "HIGH",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 5.9
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-284"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/DRAGOWN/CVE-2024-56898",
|
"url": "https://github.com/DRAGOWN/CVE-2024-56898",
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2024-56921",
|
"id": "CVE-2024-56921",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2025-02-03T20:15:33.610",
|
"published": "2025-02-03T20:15:33.610",
|
||||||
"lastModified": "2025-02-18T19:15:20.223",
|
"lastModified": "2025-03-22T14:15:15.787",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -15,7 +15,42 @@
|
|||||||
"value": "Se descubri\u00f3 un problema en Open5gs v2.7.2. InitialUEMessage, la solicitud de registro enviada a una hora espec\u00edfica puede hacer que AMF se bloquee debido a una gesti\u00f3n incorrecta de errores de la funci\u00f3n gmm_state_exception() al recibir la respuesta Nausf_UEAuthentication_Authenticate."
|
"value": "Se descubri\u00f3 un problema en Open5gs v2.7.2. InitialUEMessage, la solicitud de registro enviada a una hora espec\u00edfica puede hacer que AMF se bloquee debido a una gesti\u00f3n incorrecta de errores de la funci\u00f3n gmm_state_exception() al recibir la respuesta Nausf_UEAuthentication_Authenticate."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||||
|
"baseScore": 7.5,
|
||||||
|
"baseSeverity": "HIGH",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 3.6
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-400"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/open5gs/open5gs/commit/f780f9af45c27b6f49987d96ba71dedb3dd85840",
|
"url": "https://github.com/open5gs/open5gs/commit/f780f9af45c27b6f49987d96ba71dedb3dd85840",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-57582",
|
"id": "CVE-2024-57582",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2025-01-16T21:15:17.627",
|
"published": "2025-01-16T21:15:17.627",
|
||||||
"lastModified": "2025-03-06T12:45:04.363",
|
"lastModified": "2025-03-22T14:15:15.960",
|
||||||
"vulnStatus": "Analyzed",
|
"vulnStatus": "Modified",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -36,6 +36,26 @@
|
|||||||
},
|
},
|
||||||
"exploitabilityScore": 3.9,
|
"exploitabilityScore": 3.9,
|
||||||
"impactScore": 5.9
|
"impactScore": 5.9
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"baseScore": 9.8,
|
||||||
|
"baseSeverity": "CRITICAL",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 5.9
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
@ -49,6 +69,16 @@
|
|||||||
"value": "CWE-787"
|
"value": "CWE-787"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-787"
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"configurations": [
|
"configurations": [
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2024-57606",
|
"id": "CVE-2024-57606",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2025-02-07T22:15:13.707",
|
"published": "2025-02-07T22:15:13.707",
|
||||||
"lastModified": "2025-02-18T19:15:22.280",
|
"lastModified": "2025-03-22T14:15:16.170",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -15,7 +15,42 @@
|
|||||||
"value": "Vulnerabilidad de inyecci\u00f3n SQL en Beijing Guoju Information Technology Co., Ltd JeecgBoot v.3.7.2 permite a un atacante remoto obtener informaci\u00f3n confidencial a trav\u00e9s del componente getTotalData."
|
"value": "Vulnerabilidad de inyecci\u00f3n SQL en Beijing Guoju Information Technology Co., Ltd JeecgBoot v.3.7.2 permite a un atacante remoto obtener informaci\u00f3n confidencial a trav\u00e9s del componente getTotalData."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||||
|
"baseScore": 7.5,
|
||||||
|
"baseSeverity": "HIGH",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "NONE"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 3.6
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-89"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/jeecgboot/JeecgBoot/issues/7665",
|
"url": "https://github.com/jeecgboot/JeecgBoot/issues/7665",
|
||||||
|
64
CVE-2025/CVE-2025-21xx/CVE-2025-2186.json
Normal file
64
CVE-2025/CVE-2025-21xx/CVE-2025-2186.json
Normal file
@ -0,0 +1,64 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2025-2186",
|
||||||
|
"sourceIdentifier": "security@wordfence.com",
|
||||||
|
"published": "2025-03-22T13:15:35.683",
|
||||||
|
"lastModified": "2025-03-22T13:15:35.683",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "The Recover WooCommerce Cart Abandonment, Newsletter, Email Marketing, Marketing Automation By FunnelKit plugin for WordPress is vulnerable to SQL Injection via the \u2018automationId\u2019 parameter in all versions up to, and including, 3.5.1 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "security@wordfence.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||||
|
"baseScore": 7.5,
|
||||||
|
"baseSeverity": "HIGH",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "NONE"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 3.6
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "security@wordfence.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-89"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://plugins.trac.wordpress.org/browser/wp-marketing-automations/trunk/includes/api/wc/class-bwfan-api-get-automation-dynamic-coupon.php#L50",
|
||||||
|
"source": "security@wordfence.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://plugins.trac.wordpress.org/changeset/3257474/",
|
||||||
|
"source": "security@wordfence.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/88f8fa25-e3d5-4dfd-aae5-68b5880ffd53?source=cve",
|
||||||
|
"source": "security@wordfence.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2025-23086",
|
"id": "CVE-2025-23086",
|
||||||
"sourceIdentifier": "support@hackerone.com",
|
"sourceIdentifier": "support@hackerone.com",
|
||||||
"published": "2025-01-21T05:15:07.960",
|
"published": "2025-01-21T05:15:07.960",
|
||||||
"lastModified": "2025-02-18T21:15:28.100",
|
"lastModified": "2025-03-22T14:15:16.360",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -15,7 +15,42 @@
|
|||||||
"value": "En la mayor\u00eda de las plataformas de escritorio, las versiones 1.70.x-1.73.x de Brave Browser inclu\u00edan una funci\u00f3n para mostrar el origen de un sitio en el cuadro de di\u00e1logo de selecci\u00f3n de archivos proporcionado por el sistema operativo cuando un sitio solicita al usuario que cargue o descargue un archivo. Sin embargo, en algunos casos, el origen no se dedujo correctamente. Cuando se combina con una vulnerabilidad de redireccionamiento abierto en un sitio confiable, esto podr\u00eda permitir que un sitio malicioso inicie una descarga cuyo origen en el cuadro de di\u00e1logo de selecci\u00f3n de archivos aparece como el sitio confiable que inici\u00f3 la redirecci\u00f3n."
|
"value": "En la mayor\u00eda de las plataformas de escritorio, las versiones 1.70.x-1.73.x de Brave Browser inclu\u00edan una funci\u00f3n para mostrar el origen de un sitio en el cuadro de di\u00e1logo de selecci\u00f3n de archivos proporcionado por el sistema operativo cuando un sitio solicita al usuario que cargue o descargue un archivo. Sin embargo, en algunos casos, el origen no se dedujo correctamente. Cuando se combina con una vulnerabilidad de redireccionamiento abierto en un sitio confiable, esto podr\u00eda permitir que un sitio malicioso inicie una descarga cuyo origen en el cuadro de di\u00e1logo de selecci\u00f3n de archivos aparece como el sitio confiable que inici\u00f3 la redirecci\u00f3n."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||||
|
"baseScore": 6.1,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 2.7
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-601"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://hackerone.com/reports/2888770",
|
"url": "https://hackerone.com/reports/2888770",
|
||||||
|
44
CVE-2025/CVE-2025-267xx/CVE-2025-26796.json
Normal file
44
CVE-2025/CVE-2025-267xx/CVE-2025-26796.json
Normal file
@ -0,0 +1,44 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2025-26796",
|
||||||
|
"sourceIdentifier": "security@apache.org",
|
||||||
|
"published": "2025-03-22T13:15:35.513",
|
||||||
|
"lastModified": "2025-03-22T14:15:16.537",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [
|
||||||
|
{
|
||||||
|
"sourceIdentifier": "security@apache.org",
|
||||||
|
"tags": [
|
||||||
|
"unsupported-when-assigned"
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "** UNSUPPORTED WHEN ASSIGNED ** Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Apache Oozie.\n\nThis issue affects Apache Oozie: all versions.\n\nAs this project is retired, we do not plan to release a version that fixes this issue. Users are recommended to find an alternative or restrict access to the instance to trusted users.\n\nNOTE: This vulnerability only affects products that are no longer supported by the maintainer."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "security@apache.org",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-79"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://lists.apache.org/thread/fzrmsslnrpl0vpp0jr73fosmfjv4omdq",
|
||||||
|
"source": "security@apache.org"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "http://www.openwall.com/lists/oss-security/2025/03/21/1",
|
||||||
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
137
CVE-2025/CVE-2025-26xx/CVE-2025-2617.json
Normal file
137
CVE-2025/CVE-2025-26xx/CVE-2025-2617.json
Normal file
@ -0,0 +1,137 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2025-2617",
|
||||||
|
"sourceIdentifier": "cna@vuldb.com",
|
||||||
|
"published": "2025-03-22T13:15:35.837",
|
||||||
|
"lastModified": "2025-03-22T13:15:35.837",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "A vulnerability classified as problematic was found in yangyouwang \u6768\u6709\u65fa crud \u7b80\u7ea6\u540e\u53f0\u7ba1\u7406\u7cfb\u7edf 1.0.0. Affected by this vulnerability is an unknown functionality of the component Department Page. The manipulation leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV40": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "4.0",
|
||||||
|
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||||
|
"baseScore": 4.8,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"attackRequirements": "NONE",
|
||||||
|
"privilegesRequired": "HIGH",
|
||||||
|
"userInteraction": "PASSIVE",
|
||||||
|
"vulnConfidentialityImpact": "NONE",
|
||||||
|
"vulnIntegrityImpact": "LOW",
|
||||||
|
"vulnAvailabilityImpact": "NONE",
|
||||||
|
"subConfidentialityImpact": "NONE",
|
||||||
|
"subIntegrityImpact": "NONE",
|
||||||
|
"subAvailabilityImpact": "NONE",
|
||||||
|
"exploitMaturity": "NOT_DEFINED",
|
||||||
|
"confidentialityRequirement": "NOT_DEFINED",
|
||||||
|
"integrityRequirement": "NOT_DEFINED",
|
||||||
|
"availabilityRequirement": "NOT_DEFINED",
|
||||||
|
"modifiedAttackVector": "NOT_DEFINED",
|
||||||
|
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||||
|
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||||
|
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||||
|
"modifiedUserInteraction": "NOT_DEFINED",
|
||||||
|
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||||
|
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||||
|
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||||
|
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||||
|
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||||
|
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||||
|
"Safety": "NOT_DEFINED",
|
||||||
|
"Automatable": "NOT_DEFINED",
|
||||||
|
"Recovery": "NOT_DEFINED",
|
||||||
|
"valueDensity": "NOT_DEFINED",
|
||||||
|
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||||
|
"providerUrgency": "NOT_DEFINED"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N",
|
||||||
|
"baseScore": 2.4,
|
||||||
|
"baseSeverity": "LOW",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "HIGH",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 0.9,
|
||||||
|
"impactScore": 1.4
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"cvssMetricV2": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "2.0",
|
||||||
|
"vectorString": "AV:N/AC:L/Au:M/C:N/I:P/A:N",
|
||||||
|
"baseScore": 3.3,
|
||||||
|
"accessVector": "NETWORK",
|
||||||
|
"accessComplexity": "LOW",
|
||||||
|
"authentication": "MULTIPLE",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "PARTIAL",
|
||||||
|
"availabilityImpact": "NONE"
|
||||||
|
},
|
||||||
|
"baseSeverity": "LOW",
|
||||||
|
"exploitabilityScore": 6.4,
|
||||||
|
"impactScore": 2.9,
|
||||||
|
"acInsufInfo": false,
|
||||||
|
"obtainAllPrivilege": false,
|
||||||
|
"obtainUserPrivilege": false,
|
||||||
|
"obtainOtherPrivilege": false,
|
||||||
|
"userInteractionRequired": false
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-79"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-94"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://gitee.com/yangyouwang/crud/issues/IBSPOX",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?ctiid.300619",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?id.300619",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
152
CVE-2025/CVE-2025-26xx/CVE-2025-2618.json
Normal file
152
CVE-2025/CVE-2025-26xx/CVE-2025-2618.json
Normal file
@ -0,0 +1,152 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2025-2618",
|
||||||
|
"sourceIdentifier": "cna@vuldb.com",
|
||||||
|
"published": "2025-03-22T14:15:16.650",
|
||||||
|
"lastModified": "2025-03-22T14:15:16.650",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [
|
||||||
|
{
|
||||||
|
"sourceIdentifier": "cna@vuldb.com",
|
||||||
|
"tags": [
|
||||||
|
"unsupported-when-assigned"
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "A vulnerability, which was classified as critical, has been found in D-Link DAP-1620 1.03. Affected by this issue is the function set_ws_action of the file /dws/api/ of the component Path Handler. The manipulation leads to heap-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV40": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "4.0",
|
||||||
|
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||||
|
"baseScore": 9.3,
|
||||||
|
"baseSeverity": "CRITICAL",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"attackRequirements": "NONE",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"vulnConfidentialityImpact": "HIGH",
|
||||||
|
"vulnIntegrityImpact": "HIGH",
|
||||||
|
"vulnAvailabilityImpact": "HIGH",
|
||||||
|
"subConfidentialityImpact": "NONE",
|
||||||
|
"subIntegrityImpact": "NONE",
|
||||||
|
"subAvailabilityImpact": "NONE",
|
||||||
|
"exploitMaturity": "NOT_DEFINED",
|
||||||
|
"confidentialityRequirement": "NOT_DEFINED",
|
||||||
|
"integrityRequirement": "NOT_DEFINED",
|
||||||
|
"availabilityRequirement": "NOT_DEFINED",
|
||||||
|
"modifiedAttackVector": "NOT_DEFINED",
|
||||||
|
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||||
|
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||||
|
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||||
|
"modifiedUserInteraction": "NOT_DEFINED",
|
||||||
|
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||||
|
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||||
|
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||||
|
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||||
|
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||||
|
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||||
|
"Safety": "NOT_DEFINED",
|
||||||
|
"Automatable": "NOT_DEFINED",
|
||||||
|
"Recovery": "NOT_DEFINED",
|
||||||
|
"valueDensity": "NOT_DEFINED",
|
||||||
|
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||||
|
"providerUrgency": "NOT_DEFINED"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"baseScore": 9.8,
|
||||||
|
"baseSeverity": "CRITICAL",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 5.9
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"cvssMetricV2": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "2.0",
|
||||||
|
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||||||
|
"baseScore": 10.0,
|
||||||
|
"accessVector": "NETWORK",
|
||||||
|
"accessComplexity": "LOW",
|
||||||
|
"authentication": "NONE",
|
||||||
|
"confidentialityImpact": "COMPLETE",
|
||||||
|
"integrityImpact": "COMPLETE",
|
||||||
|
"availabilityImpact": "COMPLETE"
|
||||||
|
},
|
||||||
|
"baseSeverity": "HIGH",
|
||||||
|
"exploitabilityScore": 10.0,
|
||||||
|
"impactScore": 10.0,
|
||||||
|
"acInsufInfo": false,
|
||||||
|
"obtainAllPrivilege": false,
|
||||||
|
"obtainUserPrivilege": false,
|
||||||
|
"obtainOtherPrivilege": false,
|
||||||
|
"userInteractionRequired": false
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-119"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-122"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?ctiid.300620",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?id.300620",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?submit.518963",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://witty-maiasaura-083.notion.site/D-link-DAP-1620-set_ws_action-Vulnerability-1afb2f2a6361804e86dcde1e78ea2a8e",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://www.dlink.com/",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
152
CVE-2025/CVE-2025-26xx/CVE-2025-2619.json
Normal file
152
CVE-2025/CVE-2025-26xx/CVE-2025-2619.json
Normal file
@ -0,0 +1,152 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2025-2619",
|
||||||
|
"sourceIdentifier": "cna@vuldb.com",
|
||||||
|
"published": "2025-03-22T14:15:16.867",
|
||||||
|
"lastModified": "2025-03-22T14:15:16.867",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [
|
||||||
|
{
|
||||||
|
"sourceIdentifier": "cna@vuldb.com",
|
||||||
|
"tags": [
|
||||||
|
"unsupported-when-assigned"
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "A vulnerability, which was classified as critical, was found in D-Link DAP-1620 1.03. This affects the function check_dws_cookie of the file /storage of the component Cookie Handler. The manipulation leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV40": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "4.0",
|
||||||
|
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||||
|
"baseScore": 9.3,
|
||||||
|
"baseSeverity": "CRITICAL",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"attackRequirements": "NONE",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"vulnConfidentialityImpact": "HIGH",
|
||||||
|
"vulnIntegrityImpact": "HIGH",
|
||||||
|
"vulnAvailabilityImpact": "HIGH",
|
||||||
|
"subConfidentialityImpact": "NONE",
|
||||||
|
"subIntegrityImpact": "NONE",
|
||||||
|
"subAvailabilityImpact": "NONE",
|
||||||
|
"exploitMaturity": "NOT_DEFINED",
|
||||||
|
"confidentialityRequirement": "NOT_DEFINED",
|
||||||
|
"integrityRequirement": "NOT_DEFINED",
|
||||||
|
"availabilityRequirement": "NOT_DEFINED",
|
||||||
|
"modifiedAttackVector": "NOT_DEFINED",
|
||||||
|
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||||
|
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||||
|
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||||
|
"modifiedUserInteraction": "NOT_DEFINED",
|
||||||
|
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||||
|
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||||
|
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||||
|
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||||
|
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||||
|
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||||
|
"Safety": "NOT_DEFINED",
|
||||||
|
"Automatable": "NOT_DEFINED",
|
||||||
|
"Recovery": "NOT_DEFINED",
|
||||||
|
"valueDensity": "NOT_DEFINED",
|
||||||
|
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||||
|
"providerUrgency": "NOT_DEFINED"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"baseScore": 9.8,
|
||||||
|
"baseSeverity": "CRITICAL",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 5.9
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"cvssMetricV2": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "2.0",
|
||||||
|
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||||||
|
"baseScore": 10.0,
|
||||||
|
"accessVector": "NETWORK",
|
||||||
|
"accessComplexity": "LOW",
|
||||||
|
"authentication": "NONE",
|
||||||
|
"confidentialityImpact": "COMPLETE",
|
||||||
|
"integrityImpact": "COMPLETE",
|
||||||
|
"availabilityImpact": "COMPLETE"
|
||||||
|
},
|
||||||
|
"baseSeverity": "HIGH",
|
||||||
|
"exploitabilityScore": 10.0,
|
||||||
|
"impactScore": 10.0,
|
||||||
|
"acInsufInfo": false,
|
||||||
|
"obtainAllPrivilege": false,
|
||||||
|
"obtainUserPrivilege": false,
|
||||||
|
"obtainOtherPrivilege": false,
|
||||||
|
"userInteractionRequired": false
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-119"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-121"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?ctiid.300621",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?id.300621",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?submit.518968",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://witty-maiasaura-083.notion.site/D-link-DAP-1620-check_dws_cookie-Vulnerability-1b4b2f2a6361805ca74fdf4949385ade",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://www.dlink.com/",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
33
README.md
33
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
|||||||
### Last Repository Update
|
### Last Repository Update
|
||||||
|
|
||||||
```plain
|
```plain
|
||||||
2025-03-22T13:00:19.342970+00:00
|
2025-03-22T15:00:20.196709+00:00
|
||||||
```
|
```
|
||||||
|
|
||||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||||
|
|
||||||
```plain
|
```plain
|
||||||
2025-03-22T12:15:27.013000+00:00
|
2025-03-22T14:15:16.867000+00:00
|
||||||
```
|
```
|
||||||
|
|
||||||
### Last Data Feed Release
|
### Last Data Feed Release
|
||||||
@ -33,25 +33,36 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
|||||||
### Total Number of included CVEs
|
### Total Number of included CVEs
|
||||||
|
|
||||||
```plain
|
```plain
|
||||||
286213
|
286218
|
||||||
```
|
```
|
||||||
|
|
||||||
### CVEs added in the last Commit
|
### CVEs added in the last Commit
|
||||||
|
|
||||||
Recently added CVEs: `6`
|
Recently added CVEs: `5`
|
||||||
|
|
||||||
- [CVE-2025-1970](CVE-2025/CVE-2025-19xx/CVE-2025-1970.json) (`2025-03-22T12:15:25.797`)
|
- [CVE-2025-2186](CVE-2025/CVE-2025-21xx/CVE-2025-2186.json) (`2025-03-22T13:15:35.683`)
|
||||||
- [CVE-2025-1971](CVE-2025/CVE-2025-19xx/CVE-2025-1971.json) (`2025-03-22T12:15:26.250`)
|
- [CVE-2025-2617](CVE-2025/CVE-2025-26xx/CVE-2025-2617.json) (`2025-03-22T13:15:35.837`)
|
||||||
- [CVE-2025-1972](CVE-2025/CVE-2025-19xx/CVE-2025-1972.json) (`2025-03-22T12:15:26.453`)
|
- [CVE-2025-2618](CVE-2025/CVE-2025-26xx/CVE-2025-2618.json) (`2025-03-22T14:15:16.650`)
|
||||||
- [CVE-2025-1973](CVE-2025/CVE-2025-19xx/CVE-2025-1973.json) (`2025-03-22T12:15:26.653`)
|
- [CVE-2025-2619](CVE-2025/CVE-2025-26xx/CVE-2025-2619.json) (`2025-03-22T14:15:16.867`)
|
||||||
- [CVE-2025-2331](CVE-2025/CVE-2025-23xx/CVE-2025-2331.json) (`2025-03-22T12:15:26.833`)
|
- [CVE-2025-26796](CVE-2025/CVE-2025-267xx/CVE-2025-26796.json) (`2025-03-22T13:15:35.513`)
|
||||||
- [CVE-2025-2577](CVE-2025/CVE-2025-25xx/CVE-2025-2577.json) (`2025-03-22T12:15:27.013`)
|
|
||||||
|
|
||||||
|
|
||||||
### CVEs modified in the last Commit
|
### CVEs modified in the last Commit
|
||||||
|
|
||||||
Recently modified CVEs: `0`
|
Recently modified CVEs: `12`
|
||||||
|
|
||||||
|
- [CVE-2024-10466](CVE-2024/CVE-2024-104xx/CVE-2024-10466.json) (`2025-03-22T14:15:13.777`)
|
||||||
|
- [CVE-2024-2886](CVE-2024/CVE-2024-28xx/CVE-2024-2886.json) (`2025-03-22T14:15:14.203`)
|
||||||
|
- [CVE-2024-39925](CVE-2024/CVE-2024-399xx/CVE-2024-39925.json) (`2025-03-22T14:15:14.477`)
|
||||||
|
- [CVE-2024-40850](CVE-2024/CVE-2024-408xx/CVE-2024-40850.json) (`2025-03-22T14:15:14.713`)
|
||||||
|
- [CVE-2024-44136](CVE-2024/CVE-2024-441xx/CVE-2024-44136.json) (`2025-03-22T14:15:14.963`)
|
||||||
|
- [CVE-2024-51123](CVE-2024/CVE-2024-511xx/CVE-2024-51123.json) (`2025-03-22T14:15:15.170`)
|
||||||
|
- [CVE-2024-51440](CVE-2024/CVE-2024-514xx/CVE-2024-51440.json) (`2025-03-22T14:15:15.390`)
|
||||||
|
- [CVE-2024-56898](CVE-2024/CVE-2024-568xx/CVE-2024-56898.json) (`2025-03-22T14:15:15.590`)
|
||||||
|
- [CVE-2024-56921](CVE-2024/CVE-2024-569xx/CVE-2024-56921.json) (`2025-03-22T14:15:15.787`)
|
||||||
|
- [CVE-2024-57582](CVE-2024/CVE-2024-575xx/CVE-2024-57582.json) (`2025-03-22T14:15:15.960`)
|
||||||
|
- [CVE-2024-57606](CVE-2024/CVE-2024-576xx/CVE-2024-57606.json) (`2025-03-22T14:15:16.170`)
|
||||||
|
- [CVE-2025-23086](CVE-2025/CVE-2025-230xx/CVE-2025-23086.json) (`2025-03-22T14:15:16.360`)
|
||||||
|
|
||||||
|
|
||||||
## Download and Usage
|
## Download and Usage
|
||||||
|
41
_state.csv
41
_state.csv
@ -244790,7 +244790,7 @@ CVE-2024-10462,0,0,2786d011829da8771867443f24aa66a7980a2c1c4ede689df85c917119c6e
|
|||||||
CVE-2024-10463,0,0,3ddfd266b41fd173cebb851d2bc34cbf2c785db4b330494b6a3f4845aa6052a5,2024-11-04T13:31:20.073000
|
CVE-2024-10463,0,0,3ddfd266b41fd173cebb851d2bc34cbf2c785db4b330494b6a3f4845aa6052a5,2024-11-04T13:31:20.073000
|
||||||
CVE-2024-10464,0,0,fa0fca4ba089b4bc982df15af00e5fe7b90b3385712043456e98d4b150175b15,2024-11-04T13:30:23.513000
|
CVE-2024-10464,0,0,fa0fca4ba089b4bc982df15af00e5fe7b90b3385712043456e98d4b150175b15,2024-11-04T13:30:23.513000
|
||||||
CVE-2024-10465,0,0,8955d1f0157719f4fbefe7fae8269c4898adc0f8f926a16acb2d50f72eb39e2b,2024-11-04T13:30:10.847000
|
CVE-2024-10465,0,0,8955d1f0157719f4fbefe7fae8269c4898adc0f8f926a16acb2d50f72eb39e2b,2024-11-04T13:30:10.847000
|
||||||
CVE-2024-10466,0,0,56606dd3a844c97b0e77369c2884b635a3f644e0864760575415bc55442ba9d5,2025-01-09T18:15:27.253000
|
CVE-2024-10466,0,1,d37780994ce15448788df211d1c90c720a82eab889668623785a34933f069579,2025-03-22T14:15:13.777000
|
||||||
CVE-2024-10467,0,0,e1f34dd6104cfd3e09c5a71b6aa3ee970947971a56a24313d0f901ec95ffb9ce,2024-11-04T13:26:32.343000
|
CVE-2024-10467,0,0,e1f34dd6104cfd3e09c5a71b6aa3ee970947971a56a24313d0f901ec95ffb9ce,2024-11-04T13:26:32.343000
|
||||||
CVE-2024-10468,0,0,2e0775a6f7da096b11ed271b6d824dfb524d1f0c9aba0d0194c0beb3e139a796,2024-11-04T13:29:23.937000
|
CVE-2024-10468,0,0,2e0775a6f7da096b11ed271b6d824dfb524d1f0c9aba0d0194c0beb3e139a796,2024-11-04T13:29:23.937000
|
||||||
CVE-2024-10469,0,0,5ff565379c9cc646c3a0577a3fc586a540310f1f97f93d9364541d739cdc52c2,2025-03-17T17:15:20.267000
|
CVE-2024-10469,0,0,5ff565379c9cc646c3a0577a3fc586a540310f1f97f93d9364541d739cdc52c2,2025-03-17T17:15:20.267000
|
||||||
@ -255666,7 +255666,7 @@ CVE-2024-28853,0,0,4174d9fe94e784f7c3c99aec47d682c70c2da871c53d6c4ae537c46c4c434
|
|||||||
CVE-2024-28854,0,0,fc72a1af9a4423f23eb1c2bfab5673b3cdf91d9369b066233da617e99e87a321,2024-11-21T09:07:03.207000
|
CVE-2024-28854,0,0,fc72a1af9a4423f23eb1c2bfab5673b3cdf91d9369b066233da617e99e87a321,2024-11-21T09:07:03.207000
|
||||||
CVE-2024-28855,0,0,acb3d3e157cc68dbbea7f5c0e503c2de3d780f240741901169138f093e88a38c,2025-01-08T18:14:28.137000
|
CVE-2024-28855,0,0,acb3d3e157cc68dbbea7f5c0e503c2de3d780f240741901169138f093e88a38c,2025-01-08T18:14:28.137000
|
||||||
CVE-2024-28859,0,0,6f026de9f6ccdab17442bfff936b54d3f18997dbcded841f5c04513f5212d2c9,2024-11-21T09:07:03.500000
|
CVE-2024-28859,0,0,6f026de9f6ccdab17442bfff936b54d3f18997dbcded841f5c04513f5212d2c9,2024-11-21T09:07:03.500000
|
||||||
CVE-2024-2886,0,0,394d8e95a7c910d17686664af11972d5aee835e493ecc95268e0fb8dd1bffa87,2024-12-19T16:09:30.553000
|
CVE-2024-2886,0,1,e685f1bc0205345c0f4a920ffe567af3277e0db261d94786025a410df3a46984,2025-03-22T14:15:14.203000
|
||||||
CVE-2024-28860,0,0,615b0e6dc4018679696c4d7b10ac840d76cd4c01792710452a17c3362532000e,2024-11-21T09:07:03.630000
|
CVE-2024-28860,0,0,615b0e6dc4018679696c4d7b10ac840d76cd4c01792710452a17c3362532000e,2024-11-21T09:07:03.630000
|
||||||
CVE-2024-28861,0,0,91b8766631083f156e1aa3c97aef0422736858e553cc07c5e68f331bab68b22d,2024-11-21T09:07:03.770000
|
CVE-2024-28861,0,0,91b8766631083f156e1aa3c97aef0422736858e553cc07c5e68f331bab68b22d,2024-11-21T09:07:03.770000
|
||||||
CVE-2024-28862,0,0,89d0e093402bd6601cb90bf8ad7d51712587ca0c9a18ec4ae831f726f4d4bd6f,2024-11-21T09:07:03.893000
|
CVE-2024-28862,0,0,89d0e093402bd6601cb90bf8ad7d51712587ca0c9a18ec4ae831f726f4d4bd6f,2024-11-21T09:07:03.893000
|
||||||
@ -264422,7 +264422,7 @@ CVE-2024-39920,0,0,2d0ffc6668fc09328c8963241ae091338acc28267b723bf4cce9dfe8a3e96
|
|||||||
CVE-2024-39921,0,0,36bf5d750808c8cee840a08fb05bf4c020bb5eda7905a41156147b0de38b82b1,2025-03-13T14:15:29.073000
|
CVE-2024-39921,0,0,36bf5d750808c8cee840a08fb05bf4c020bb5eda7905a41156147b0de38b82b1,2025-03-13T14:15:29.073000
|
||||||
CVE-2024-39922,0,0,fe52b48aabfd6b21ca5931e383040552b3df966bff80bf5d23fd885e311735af,2024-08-13T12:58:25.437000
|
CVE-2024-39922,0,0,fe52b48aabfd6b21ca5931e383040552b3df966bff80bf5d23fd885e311735af,2024-08-13T12:58:25.437000
|
||||||
CVE-2024-39924,0,0,775d84fe24787256203d85215326581603dd25a3938d9f3efe7e3d3d7a679dd8,2025-03-18T20:15:22.283000
|
CVE-2024-39924,0,0,775d84fe24787256203d85215326581603dd25a3938d9f3efe7e3d3d7a679dd8,2025-03-18T20:15:22.283000
|
||||||
CVE-2024-39925,0,0,9746dcc58fb8cecc9e1d89cf824e88cac8bc60fdcab25d7646a74784aca525c7,2025-01-09T18:15:28.117000
|
CVE-2024-39925,0,1,2dce2b5635f20716f4573e8a9514565ced1083510693ffee5ac173e59be9bed4,2025-03-22T14:15:14.477000
|
||||||
CVE-2024-39926,0,0,62755f8b10d8d8cd0280358f682aebb8f7ee34ebaeb719fb16dd73cfad42b335,2025-03-18T19:15:43.093000
|
CVE-2024-39926,0,0,62755f8b10d8d8cd0280358f682aebb8f7ee34ebaeb719fb16dd73cfad42b335,2025-03-18T19:15:43.093000
|
||||||
CVE-2024-39927,0,0,d102506d349c6cd661c84f9625100fb5afa84e23351ca69840c038d426e26cb0,2024-11-21T09:28:35.253000
|
CVE-2024-39927,0,0,d102506d349c6cd661c84f9625100fb5afa84e23351ca69840c038d426e26cb0,2024-11-21T09:28:35.253000
|
||||||
CVE-2024-39928,0,0,36746816d5a179f8dacaec6e67ea9b447cd0145aa354104fbfbe630b6bc05ce0,2024-11-21T09:28:35.457000
|
CVE-2024-39928,0,0,36746816d5a179f8dacaec6e67ea9b447cd0145aa354104fbfbe630b6bc05ce0,2024-11-21T09:28:35.457000
|
||||||
@ -264880,7 +264880,7 @@ CVE-2024-40846,0,0,9b851b4ce2280168886b830fe034334f0fa1485f27e31834954a719ee17a0
|
|||||||
CVE-2024-40847,0,0,ee5396e6f19805c5499c62b220104fc60114c82964b16e0b3e6ff332e23edee0,2024-09-24T15:56:35.753000
|
CVE-2024-40847,0,0,ee5396e6f19805c5499c62b220104fc60114c82964b16e0b3e6ff332e23edee0,2024-09-24T15:56:35.753000
|
||||||
CVE-2024-40848,0,0,86d3355851a7ddfb425292a80fa877eed599c8da4dfe9e7c1117852b3f5a865a,2024-09-24T15:57:03.893000
|
CVE-2024-40848,0,0,86d3355851a7ddfb425292a80fa877eed599c8da4dfe9e7c1117852b3f5a865a,2024-09-24T15:57:03.893000
|
||||||
CVE-2024-4085,0,0,787927bdbc60dd0adde121aa412a76d92ada213a43fd5512122c43f33043e993,2024-11-21T09:42:09.953000
|
CVE-2024-4085,0,0,787927bdbc60dd0adde121aa412a76d92ada213a43fd5512122c43f33043e993,2024-11-21T09:42:09.953000
|
||||||
CVE-2024-40850,0,0,e801dfe1b5836330a5238e832cf4a665932ae66da89298e09c70965412d21020,2024-09-24T15:41:22.803000
|
CVE-2024-40850,0,1,5fd4e1ce89b67cdde96ea8f6e4b8c9b60c6c754c7baeb31ce3f1ef13a57a0421,2025-03-22T14:15:14.713000
|
||||||
CVE-2024-40851,0,0,b958c164114af6b23a2bf7ef2bd1c6335c3be241ec455192784b6b386c9ef358,2024-10-30T15:35:14.883000
|
CVE-2024-40851,0,0,b958c164114af6b23a2bf7ef2bd1c6335c3be241ec455192784b6b386c9ef358,2024-10-30T15:35:14.883000
|
||||||
CVE-2024-40852,0,0,2b759a1210705870844044ed842e04e851ef9bf743602e800520414310179172,2025-03-19T18:15:21.487000
|
CVE-2024-40852,0,0,2b759a1210705870844044ed842e04e851ef9bf743602e800520414310179172,2025-03-19T18:15:21.487000
|
||||||
CVE-2024-40853,0,0,dfc9fa03d8fda58ef712d436e720ae0f21a7fffb74fe4326b57538d3690d7a89,2024-10-30T17:08:42.157000
|
CVE-2024-40853,0,0,dfc9fa03d8fda58ef712d436e720ae0f21a7fffb74fe4326b57538d3690d7a89,2024-10-30T17:08:42.157000
|
||||||
@ -267591,7 +267591,7 @@ CVE-2024-44132,0,0,8afd03fa4900bdc815951be587052cdc1902d648f6c0f1c1ad745b8e3479d
|
|||||||
CVE-2024-44133,0,0,9196ca541ad45474d5d5e36a2a1369fb1dbddc304bb390dd887770a28cf137d9,2024-09-24T18:24:44.733000
|
CVE-2024-44133,0,0,9196ca541ad45474d5d5e36a2a1369fb1dbddc304bb390dd887770a28cf137d9,2024-09-24T18:24:44.733000
|
||||||
CVE-2024-44134,0,0,1612170244774fb2cb867230c7f5140525c8398caef327a950c8a1f1680c0c76,2025-03-13T21:15:41.717000
|
CVE-2024-44134,0,0,1612170244774fb2cb867230c7f5140525c8398caef327a950c8a1f1680c0c76,2025-03-13T21:15:41.717000
|
||||||
CVE-2024-44135,0,0,1f924f524e9404eadff6cf55bcdf5ce85faa4ce5abb51a5bd0b4ada1a8260302,2025-03-19T19:15:41.400000
|
CVE-2024-44135,0,0,1f924f524e9404eadff6cf55bcdf5ce85faa4ce5abb51a5bd0b4ada1a8260302,2025-03-19T19:15:41.400000
|
||||||
CVE-2024-44136,0,0,47f88abd6453d6797640eb3202b455efa88abb286d5ec26cab193900882bd1e7,2025-03-04T15:30:49.700000
|
CVE-2024-44136,0,1,3f10ba2fc6f9d89689dbedfa47ad2452465bd91d215ce415d8601c8530edd5bd,2025-03-22T14:15:14.963000
|
||||||
CVE-2024-44137,0,0,d4f6436a74ca2949527dd50649d59762594e5936bfba7a01a6e8b64ce29142e0,2024-10-30T19:35:16.590000
|
CVE-2024-44137,0,0,d4f6436a74ca2949527dd50649d59762594e5936bfba7a01a6e8b64ce29142e0,2024-10-30T19:35:16.590000
|
||||||
CVE-2024-44139,0,0,be06b795fe6d7868956b3a70d447846cad4f23d9f9a466844492bf3101bd5609,2025-03-20T14:15:20.510000
|
CVE-2024-44139,0,0,be06b795fe6d7868956b3a70d447846cad4f23d9f9a466844492bf3101bd5609,2025-03-20T14:15:20.510000
|
||||||
CVE-2024-44141,0,0,cf418c986171e3bc9f6e94361ae23fe33ff672a5506240ca7f0249f80c1cacd9,2024-12-11T18:29:33.870000
|
CVE-2024-44141,0,0,cf418c986171e3bc9f6e94361ae23fe33ff672a5506240ca7f0249f80c1cacd9,2024-12-11T18:29:33.870000
|
||||||
@ -272531,7 +272531,7 @@ CVE-2024-51115,0,0,97924e30f339bc462ccaad1ee3c55c378e15485436cb0bc88676f0cde0303
|
|||||||
CVE-2024-51116,0,0,163c0d7988ca5329a27514b03075ee6d2fff2ef84e9d3dc466528f493b745f84,2024-11-06T18:17:17.287000
|
CVE-2024-51116,0,0,163c0d7988ca5329a27514b03075ee6d2fff2ef84e9d3dc466528f493b745f84,2024-11-06T18:17:17.287000
|
||||||
CVE-2024-5112,0,0,f6f8682deff2408f9f0c77bfeb2725995cf9c58df252da300d15c186fb6583c9,2025-02-21T20:06:52.563000
|
CVE-2024-5112,0,0,f6f8682deff2408f9f0c77bfeb2725995cf9c58df252da300d15c186fb6583c9,2025-02-21T20:06:52.563000
|
||||||
CVE-2024-51122,0,0,032eda6ef4356c413d34ec64379012302427108464591348425bff48a082f9f1,2025-03-18T21:15:30.977000
|
CVE-2024-51122,0,0,032eda6ef4356c413d34ec64379012302427108464591348425bff48a082f9f1,2025-03-18T21:15:30.977000
|
||||||
CVE-2024-51123,0,0,2bb1738bbb248351932a54a02f9b972fc09822f7e39c985e25fce10334bbbef8,2025-02-18T18:15:26.130000
|
CVE-2024-51123,0,1,7fb96633793369a89316aaa3fa097d3ce7001fefdc75c1abf4ea7cb6c1954e59,2025-03-22T14:15:15.170000
|
||||||
CVE-2024-51127,0,0,5c5f040ac9c1963b030c4696070e1ab6a5b9c29a6f9ce0ae7436199ee45f28e8,2024-11-21T09:45:17.017000
|
CVE-2024-51127,0,0,5c5f040ac9c1963b030c4696070e1ab6a5b9c29a6f9ce0ae7436199ee45f28e8,2024-11-21T09:45:17.017000
|
||||||
CVE-2024-5113,0,0,52336cb4930088acb460f77d5eb059ecb3d07bd3d2ff421073cdc789c54ac6fd,2025-02-21T20:01:00.100000
|
CVE-2024-5113,0,0,52336cb4930088acb460f77d5eb059ecb3d07bd3d2ff421073cdc789c54ac6fd,2025-02-21T20:01:00.100000
|
||||||
CVE-2024-51132,0,0,f5dcb22b7125a1b94089072dd6f184dd6f0e35c20d2f6ced62d92bb6eded7439,2024-11-06T20:35:34.173000
|
CVE-2024-51132,0,0,f5dcb22b7125a1b94089072dd6f184dd6f0e35c20d2f6ced62d92bb6eded7439,2024-11-06T20:35:34.173000
|
||||||
@ -272662,7 +272662,7 @@ CVE-2024-51431,0,0,828fd39fe0bf7bfec25d83e9c0a08cb7b9c4b5cc6704676ba7781e14660e7
|
|||||||
CVE-2024-51432,0,0,90d6088b4b691a13d46bf67decae9a8dc78d3184ac661e87666bdc2bf7a4111b,2024-11-04T22:35:10.037000
|
CVE-2024-51432,0,0,90d6088b4b691a13d46bf67decae9a8dc78d3184ac661e87666bdc2bf7a4111b,2024-11-04T22:35:10.037000
|
||||||
CVE-2024-51434,0,0,fd0f2e493c6557b3a7b75698795afa3b125b8838b7989d6283ab0195617010c3,2024-11-08T19:01:03.880000
|
CVE-2024-51434,0,0,fd0f2e493c6557b3a7b75698795afa3b125b8838b7989d6283ab0195617010c3,2024-11-08T19:01:03.880000
|
||||||
CVE-2024-5144,0,0,6bbfaf13c1764c4fefc00893d80de8b864d8af9b05653210d129c904ab48e8ed,2024-05-31T18:15:13.217000
|
CVE-2024-5144,0,0,6bbfaf13c1764c4fefc00893d80de8b864d8af9b05653210d129c904ab48e8ed,2024-05-31T18:15:13.217000
|
||||||
CVE-2024-51440,0,0,203986c75a80a34d889d62b668b90a6f364317185f011a078d8cdc459d4daeba,2025-02-18T18:15:26.283000
|
CVE-2024-51440,0,1,06e59d576ccec69ba7fffa18e55bdd3df09904f0f19824a66a13b2c049fe2fa3,2025-03-22T14:15:15.390000
|
||||||
CVE-2024-51442,0,0,663939a871d0d38a9b2a62d30b7d5c04a240d1619da5f372debf5ffd926c43c7,2025-01-08T20:15:28.137000
|
CVE-2024-51442,0,0,663939a871d0d38a9b2a62d30b7d5c04a240d1619da5f372debf5ffd926c43c7,2025-01-08T20:15:28.137000
|
||||||
CVE-2024-51448,0,0,c4c37037bf93a1f94e04f7270f02afe30201acf9ed636bd7a8ba3baefef67f6e,2025-01-18T15:15:08.183000
|
CVE-2024-51448,0,0,c4c37037bf93a1f94e04f7270f02afe30201acf9ed636bd7a8ba3baefef67f6e,2025-01-18T15:15:08.183000
|
||||||
CVE-2024-5145,0,0,46ac64e27ebb5b10cf08e3fb4f67dd66a2e01ddc2757a70804d55019b5d37c34,2025-02-10T13:57:18.723000
|
CVE-2024-5145,0,0,46ac64e27ebb5b10cf08e3fb4f67dd66a2e01ddc2757a70804d55019b5d37c34,2025-02-10T13:57:18.723000
|
||||||
@ -276282,7 +276282,7 @@ CVE-2024-56883,0,0,f99cbbbe44810ecf20ee9a822aaeeb39d677436c7acf1f70c821dc9769f4f
|
|||||||
CVE-2024-56889,0,0,5327859a7c5496e1e94f8bb9c02a37e2b8342a40649f534ed6f47845e36ee4d6,2025-03-18T15:15:58.090000
|
CVE-2024-56889,0,0,5327859a7c5496e1e94f8bb9c02a37e2b8342a40649f534ed6f47845e36ee4d6,2025-03-18T15:15:58.090000
|
||||||
CVE-2024-5689,0,0,7954cfa7cab5c9d284e75ff2916a8e3e6c71cab8207a342db66b72c3a9729209,2024-11-21T09:48:10.193000
|
CVE-2024-5689,0,0,7954cfa7cab5c9d284e75ff2916a8e3e6c71cab8207a342db66b72c3a9729209,2024-11-21T09:48:10.193000
|
||||||
CVE-2024-56897,0,0,c86a728646b989ba2c34050e6cf558894a483f9e45fac8ad92b270dc1bfac754,2025-03-03T20:15:43.540000
|
CVE-2024-56897,0,0,c86a728646b989ba2c34050e6cf558894a483f9e45fac8ad92b270dc1bfac754,2025-03-03T20:15:43.540000
|
||||||
CVE-2024-56898,0,0,6acb612a6a6d6abd3f207db73f49bdae4c033cc146d6a92b4e551f8b5a4c516d,2025-03-04T22:15:38.990000
|
CVE-2024-56898,0,1,8124ee23f832958edf569107c7b288b2df457e1cf5fa891be5bacb4a1456c4c4,2025-03-22T14:15:15.590000
|
||||||
CVE-2024-5690,0,0,d4d62df1fcd0a6ab34cd7e4b18e0510e69dc46e6ad88d84635741631f871b265,2024-11-21T09:48:10.377000
|
CVE-2024-5690,0,0,d4d62df1fcd0a6ab34cd7e4b18e0510e69dc46e6ad88d84635741631f871b265,2024-11-21T09:48:10.377000
|
||||||
CVE-2024-56901,0,0,64eb0224a857e749243b1bd7bc2761e2c8263ae6819e4c9704a3b8650c9b496e,2025-03-04T22:15:39.143000
|
CVE-2024-56901,0,0,64eb0224a857e749243b1bd7bc2761e2c8263ae6819e4c9704a3b8650c9b496e,2025-03-04T22:15:39.143000
|
||||||
CVE-2024-56902,0,0,3ef5942ce98190c5aa70f63a17781c2e2ea98e203a6427a08886aad5d3b44a9f,2025-03-04T22:15:39.340000
|
CVE-2024-56902,0,0,3ef5942ce98190c5aa70f63a17781c2e2ea98e203a6427a08886aad5d3b44a9f,2025-03-04T22:15:39.340000
|
||||||
@ -276291,7 +276291,7 @@ CVE-2024-56908,0,0,bbe0040508ad69151e90ab47c62a14618486e1b0815c01e094680be9e1e71
|
|||||||
CVE-2024-5691,0,0,9505e4d65453e2558c96eeea1a67c071cea95e3c90b63f8d9e952db5959b044b,2025-03-19T21:15:37.710000
|
CVE-2024-5691,0,0,9505e4d65453e2558c96eeea1a67c071cea95e3c90b63f8d9e952db5959b044b,2025-03-19T21:15:37.710000
|
||||||
CVE-2024-56914,0,0,76cdd8d94ae11c2780ca41310bed1eae7879520cc428bb077f1f775e8c7b9036,2025-01-23T17:15:16.230000
|
CVE-2024-56914,0,0,76cdd8d94ae11c2780ca41310bed1eae7879520cc428bb077f1f775e8c7b9036,2025-01-23T17:15:16.230000
|
||||||
CVE-2024-5692,0,0,4b8f65097356fd8a548c2da4761bef878e098b44587a5b9b21bc347f46db95a8,2024-11-21T09:48:10.633000
|
CVE-2024-5692,0,0,4b8f65097356fd8a548c2da4761bef878e098b44587a5b9b21bc347f46db95a8,2024-11-21T09:48:10.633000
|
||||||
CVE-2024-56921,0,0,ba82c86335d04bad9edbac3e379f7d35c5fbb760088d7e84284ac0abfbc51bcb,2025-02-18T19:15:20.223000
|
CVE-2024-56921,0,1,fb030f17d9ca025a22ece745e7ce38e34d1baa5c5f879c2284e94607c9076c35,2025-03-22T14:15:15.787000
|
||||||
CVE-2024-56923,0,0,e2647403e0cf85e5fccf746b53a51e00d5aac61312608ca59ffcd83f3ff65dd9,2025-01-28T23:15:08.067000
|
CVE-2024-56923,0,0,e2647403e0cf85e5fccf746b53a51e00d5aac61312608ca59ffcd83f3ff65dd9,2025-01-28T23:15:08.067000
|
||||||
CVE-2024-56924,0,0,255fb5d959e1f1b6d9220b28e96e646f40e846b04df600718295ece436269b5a,2025-01-23T17:15:16.710000
|
CVE-2024-56924,0,0,255fb5d959e1f1b6d9220b28e96e646f40e846b04df600718295ece436269b5a,2025-01-23T17:15:16.710000
|
||||||
CVE-2024-5693,0,0,21ec44ee8ed5f9de3ae93fab02d376513f10f0c9f8c82a8733146d6a99b0ff3a,2024-11-21T09:48:10.807000
|
CVE-2024-5693,0,0,21ec44ee8ed5f9de3ae93fab02d376513f10f0c9f8c82a8733146d6a99b0ff3a,2024-11-21T09:48:10.807000
|
||||||
@ -276570,7 +276570,7 @@ CVE-2024-57579,0,0,9ef3b077a13ee9d7526f1e765503d92542de13cba7b0fad4972ba1a9202a5
|
|||||||
CVE-2024-5758,0,0,c078716fbf80b259c8ceac06415d3d039d4ef773f8ae701649c6b0b1483ee99e,2024-06-13T21:15:57.543000
|
CVE-2024-5758,0,0,c078716fbf80b259c8ceac06415d3d039d4ef773f8ae701649c6b0b1483ee99e,2024-06-13T21:15:57.543000
|
||||||
CVE-2024-57580,0,0,ecfed55cf5b358c127e395a3e898c26702966c4825a41b3d33a695e34d0cb776,2025-03-18T19:15:46.850000
|
CVE-2024-57580,0,0,ecfed55cf5b358c127e395a3e898c26702966c4825a41b3d33a695e34d0cb776,2025-03-18T19:15:46.850000
|
||||||
CVE-2024-57581,0,0,4a3545198765c6460c9df2bbd8da1004daef02a4f94355754c92d51aeea05e63,2025-03-18T19:15:47.037000
|
CVE-2024-57581,0,0,4a3545198765c6460c9df2bbd8da1004daef02a4f94355754c92d51aeea05e63,2025-03-18T19:15:47.037000
|
||||||
CVE-2024-57582,0,0,7f0bdbfb20bee47b5db3337db07c31ce48f2668f9c89a58867304315f780738b,2025-03-06T12:45:04.363000
|
CVE-2024-57582,0,1,269fcfd2c5396a242690f6c1fdf50c42960a075cd46c2130a0df0e7c00b215ce,2025-03-22T14:15:15.960000
|
||||||
CVE-2024-57583,0,0,ccfb387ff3c30d35babb34dfb2c64006998b94ce941ed7ea8395016f8be83325,2025-02-04T15:15:18.557000
|
CVE-2024-57583,0,0,ccfb387ff3c30d35babb34dfb2c64006998b94ce941ed7ea8395016f8be83325,2025-02-04T15:15:18.557000
|
||||||
CVE-2024-57587,0,0,69e0c38068f525a5b86457cd182be111c6d82d7686ae8a5f6131539166579a3b,2025-02-07T17:15:30.453000
|
CVE-2024-57587,0,0,69e0c38068f525a5b86457cd182be111c6d82d7686ae8a5f6131539166579a3b,2025-02-07T17:15:30.453000
|
||||||
CVE-2024-5759,0,0,7a62530c172037696b680530af67b7622649644977afb4734ee0d6d8975bff51,2024-11-21T09:48:17.467000
|
CVE-2024-5759,0,0,7a62530c172037696b680530af67b7622649644977afb4734ee0d6d8975bff51,2024-11-21T09:48:17.467000
|
||||||
@ -276584,7 +276584,7 @@ CVE-2024-57602,0,0,226d91ed331e63f738fd3b8b845736eb5a7fc570a3a123d5ea996b5176962
|
|||||||
CVE-2024-57603,0,0,8818c006a29d6f4bd13b4237aca8900d379684c37788b65eab93543c45a04038,2025-02-13T19:15:13.890000
|
CVE-2024-57603,0,0,8818c006a29d6f4bd13b4237aca8900d379684c37788b65eab93543c45a04038,2025-02-13T19:15:13.890000
|
||||||
CVE-2024-57604,0,0,9dc897647370ae27cc2a2fe45d9c565c9d827fa05aa881ae8c05dff72d178677,2025-03-20T15:15:43.980000
|
CVE-2024-57604,0,0,9dc897647370ae27cc2a2fe45d9c565c9d827fa05aa881ae8c05dff72d178677,2025-03-20T15:15:43.980000
|
||||||
CVE-2024-57605,0,0,c41e31bc0c6b4266a22e57b7929d37215234774341d010b325202d9b2f8dc9f2,2025-03-19T15:15:52.740000
|
CVE-2024-57605,0,0,c41e31bc0c6b4266a22e57b7929d37215234774341d010b325202d9b2f8dc9f2,2025-03-19T15:15:52.740000
|
||||||
CVE-2024-57606,0,0,282e31e88d82eac2f58eed0179e45942a66af52f2bd7847e92a7866919540d55,2025-02-18T19:15:22.280000
|
CVE-2024-57606,0,1,88fff29b8b35a01ed272a18dce87c845eb952014b7761d37d399b66c213e66c6,2025-03-22T14:15:16.170000
|
||||||
CVE-2024-57608,0,0,f13d7092b69ab1bb8b9d9e29e8d71dd51ba622da797972897165fa9f6e4af609,2025-02-25T21:15:17.440000
|
CVE-2024-57608,0,0,f13d7092b69ab1bb8b9d9e29e8d71dd51ba622da797972897165fa9f6e4af609,2025-02-25T21:15:17.440000
|
||||||
CVE-2024-57609,0,0,7e89dbfffc522c22f84645f0c7d618897ea46d1866f82abe6573f3d9437ce18a,2025-02-10T22:15:36.660000
|
CVE-2024-57609,0,0,7e89dbfffc522c22f84645f0c7d618897ea46d1866f82abe6573f3d9437ce18a,2025-02-10T22:15:36.660000
|
||||||
CVE-2024-5761,0,0,1fdad964c86313b412878f67fac5999c9a1ea015b844614bc58b000414661a53,2024-06-07T19:15:24.467000
|
CVE-2024-5761,0,0,1fdad964c86313b412878f67fac5999c9a1ea015b844614bc58b000414661a53,2024-06-07T19:15:24.467000
|
||||||
@ -282069,10 +282069,10 @@ CVE-2025-1965,0,0,94142314decf969cb625fbe5f5173ddc5911c761141f6a49332469100f4ccc
|
|||||||
CVE-2025-1966,0,0,484790f384757cd860d44d775ad23e95b8fca8bf89b5fa355da6cc99fa836820,2025-03-05T15:15:17.260000
|
CVE-2025-1966,0,0,484790f384757cd860d44d775ad23e95b8fca8bf89b5fa355da6cc99fa836820,2025-03-05T15:15:17.260000
|
||||||
CVE-2025-1967,0,0,f0d59c4ed441992299da9f393860b37f43033720577e761dda371f9ecd7295bf,2025-03-05T15:15:17.410000
|
CVE-2025-1967,0,0,f0d59c4ed441992299da9f393860b37f43033720577e761dda371f9ecd7295bf,2025-03-05T15:15:17.410000
|
||||||
CVE-2025-1969,0,0,00a186c236826ccc3fef0cf6a93be58578d3139f3a01ea0f0842aa271ed48f15,2025-03-04T19:15:38.290000
|
CVE-2025-1969,0,0,00a186c236826ccc3fef0cf6a93be58578d3139f3a01ea0f0842aa271ed48f15,2025-03-04T19:15:38.290000
|
||||||
CVE-2025-1970,1,1,c01adcaf18acac016f78895b73f7486093810b323ebc7285186e86ab961aee74,2025-03-22T12:15:25.797000
|
CVE-2025-1970,0,0,c01adcaf18acac016f78895b73f7486093810b323ebc7285186e86ab961aee74,2025-03-22T12:15:25.797000
|
||||||
CVE-2025-1971,1,1,4a2b8144dd19911475cb202ad5b0fc41816e2274b0457fd660842d87000a8960,2025-03-22T12:15:26.250000
|
CVE-2025-1971,0,0,4a2b8144dd19911475cb202ad5b0fc41816e2274b0457fd660842d87000a8960,2025-03-22T12:15:26.250000
|
||||||
CVE-2025-1972,1,1,39a04d69341a0c32b56fe67c505fb16be349bb9aa3087534657e562d73ae342c,2025-03-22T12:15:26.453000
|
CVE-2025-1972,0,0,39a04d69341a0c32b56fe67c505fb16be349bb9aa3087534657e562d73ae342c,2025-03-22T12:15:26.453000
|
||||||
CVE-2025-1973,1,1,b6ae81035c81acceab2bd5b9863d4f788493d3267f60db7276c8c1b3344b6337,2025-03-22T12:15:26.653000
|
CVE-2025-1973,0,0,b6ae81035c81acceab2bd5b9863d4f788493d3267f60db7276c8c1b3344b6337,2025-03-22T12:15:26.653000
|
||||||
CVE-2025-1979,0,0,5cf047efa61126850f2bff74f6db8ba74d6d633b7373b143cc2f515f22996b33,2025-03-06T16:15:54.187000
|
CVE-2025-1979,0,0,5cf047efa61126850f2bff74f6db8ba74d6d633b7373b143cc2f515f22996b33,2025-03-06T16:15:54.187000
|
||||||
CVE-2025-1984,0,0,9c3841609345cdbc038774b45498dc390a4f9eba4042b93fef2b069dfe449491,2025-03-14T18:15:31.507000
|
CVE-2025-1984,0,0,9c3841609345cdbc038774b45498dc390a4f9eba4042b93fef2b069dfe449491,2025-03-14T18:15:31.507000
|
||||||
CVE-2025-2000,0,0,3966b3252f7ea9903e46e4407551ffba5512eba0a2fd5f6e51fd225e0b840ed0,2025-03-14T13:15:40.907000
|
CVE-2025-2000,0,0,3966b3252f7ea9903e46e4407551ffba5512eba0a2fd5f6e51fd225e0b840ed0,2025-03-14T13:15:40.907000
|
||||||
@ -282972,6 +282972,7 @@ CVE-2025-21856,0,0,b09c68ce23969b8e4c4ebe578130af0c7fcaa476814ad748e7bff8a78b6b4
|
|||||||
CVE-2025-21857,0,0,3e4b4b05242172562d45bfa80d4257741cfbd88b174535be049ad449c2660fc1,2025-03-13T21:15:46.950000
|
CVE-2025-21857,0,0,3e4b4b05242172562d45bfa80d4257741cfbd88b174535be049ad449c2660fc1,2025-03-13T21:15:46.950000
|
||||||
CVE-2025-21858,0,0,66d9ca804eb089b50343b13981639c14692bfbf712b8926853e87f75b6577d63,2025-03-13T21:15:38.600000
|
CVE-2025-21858,0,0,66d9ca804eb089b50343b13981639c14692bfbf712b8926853e87f75b6577d63,2025-03-13T21:15:38.600000
|
||||||
CVE-2025-21859,0,0,5a61501b66729f01bab9df64cbc72760c95b1c81ad9a7b8699565186c12dc20c,2025-03-13T21:15:30.040000
|
CVE-2025-21859,0,0,5a61501b66729f01bab9df64cbc72760c95b1c81ad9a7b8699565186c12dc20c,2025-03-13T21:15:30.040000
|
||||||
|
CVE-2025-2186,1,1,afe893c7c50e4e6991ba24a24f04513ebe86e2979c302e20a272eed16c097c1a,2025-03-22T13:15:35.683000
|
||||||
CVE-2025-21860,0,0,7476c13026bd288cabe804eff8c676854d340bd1f590ce0f8ad19ee85a60a573,2025-03-13T21:14:08.347000
|
CVE-2025-21860,0,0,7476c13026bd288cabe804eff8c676854d340bd1f590ce0f8ad19ee85a60a573,2025-03-13T21:14:08.347000
|
||||||
CVE-2025-21861,0,0,512ea035cfd08d344857d6a2838b2f5da0a011cdea325d0d3a43a8bdbd21a518,2025-03-13T21:14:01.013000
|
CVE-2025-21861,0,0,512ea035cfd08d344857d6a2838b2f5da0a011cdea325d0d3a43a8bdbd21a518,2025-03-13T21:14:01.013000
|
||||||
CVE-2025-21862,0,0,903ae3891f0b02eb2409a29ac67b669381656af60d8ebe4a4187837a3dfc54de,2025-03-13T21:13:53.200000
|
CVE-2025-21862,0,0,903ae3891f0b02eb2409a29ac67b669381656af60d8ebe4a4187837a3dfc54de,2025-03-13T21:13:53.200000
|
||||||
@ -283584,7 +283585,7 @@ CVE-2025-23082,0,0,04a4f0f7ff5458b7d3b3235d7001e50f9111979d3e99a4d703024d8cba8b9
|
|||||||
CVE-2025-23083,0,0,8794d1163f9c90d3558297e77a843291a9ed4394f361008c98d5897814fbbb44,2025-02-28T13:15:28.213000
|
CVE-2025-23083,0,0,8794d1163f9c90d3558297e77a843291a9ed4394f361008c98d5897814fbbb44,2025-02-28T13:15:28.213000
|
||||||
CVE-2025-23084,0,0,66590369971d77e93d3e89e756431c61a64701ffca1861b58e6771ed8d358e6e,2025-01-28T16:15:40.827000
|
CVE-2025-23084,0,0,66590369971d77e93d3e89e756431c61a64701ffca1861b58e6771ed8d358e6e,2025-01-28T16:15:40.827000
|
||||||
CVE-2025-23085,0,0,889840804db6ae2520e814bb23e4a445ed73b7383c73820abba13ffae74db43d,2025-02-25T13:15:11.103000
|
CVE-2025-23085,0,0,889840804db6ae2520e814bb23e4a445ed73b7383c73820abba13ffae74db43d,2025-02-25T13:15:11.103000
|
||||||
CVE-2025-23086,0,0,4888f5c9ad449f11aff3bd2005f3629d6cccf17b7858fa974396434a1fb1f4d8,2025-02-18T21:15:28.100000
|
CVE-2025-23086,0,1,46dcdec6710242421727659f0f9de0b53db2ce8f2873db285d1b397dda7f2559,2025-03-22T14:15:16.360000
|
||||||
CVE-2025-23087,0,0,bfbdb144af271fa0463b1cfacae0c03f133d0c7157b9b6f33c666f41bdde0ea8,2025-03-01T03:15:23.067000
|
CVE-2025-23087,0,0,bfbdb144af271fa0463b1cfacae0c03f133d0c7157b9b6f33c666f41bdde0ea8,2025-03-01T03:15:23.067000
|
||||||
CVE-2025-23088,0,0,369a084c0dac91f467d46a297093ab8c7b697484ff2e61fc017ffe639e3c12ed,2025-03-01T03:15:23.157000
|
CVE-2025-23088,0,0,369a084c0dac91f467d46a297093ab8c7b697484ff2e61fc017ffe639e3c12ed,2025-03-01T03:15:23.157000
|
||||||
CVE-2025-23089,0,0,8538abc6f83acab58bdcb6440f1e22c462d137c99186166b0dcb3a7a245230db,2025-03-01T03:15:23.210000
|
CVE-2025-23089,0,0,8538abc6f83acab58bdcb6440f1e22c462d137c99186166b0dcb3a7a245230db,2025-03-01T03:15:23.210000
|
||||||
@ -283663,7 +283664,7 @@ CVE-2025-23240,0,0,544a1feaf6fe3c4f1a8295794a4960f2a0fc447d643c5c30d52cfb77d4db3
|
|||||||
CVE-2025-23242,0,0,9b20bedcf14352ca9df0a5ecc34f6004c4e1503c511865ff1afa1d3c82eca056,2025-03-11T20:15:16.280000
|
CVE-2025-23242,0,0,9b20bedcf14352ca9df0a5ecc34f6004c4e1503c511865ff1afa1d3c82eca056,2025-03-11T20:15:16.280000
|
||||||
CVE-2025-23243,0,0,d341dee54207e76092fa73545c292abf7fbfda4eb6567d84dd5238ba2f02d191,2025-03-11T20:15:16.463000
|
CVE-2025-23243,0,0,d341dee54207e76092fa73545c292abf7fbfda4eb6567d84dd5238ba2f02d191,2025-03-11T20:15:16.463000
|
||||||
CVE-2025-2325,0,0,3c6b219229dc76a33d78d2ccb8fd1f767d78355c555f30961ca2b7b219af14fc,2025-03-15T07:15:35.107000
|
CVE-2025-2325,0,0,3c6b219229dc76a33d78d2ccb8fd1f767d78355c555f30961ca2b7b219af14fc,2025-03-15T07:15:35.107000
|
||||||
CVE-2025-2331,1,1,b072726b3afe477229f13ce6fa12da5840fde8f6531f821787ad2abd1eb769a5,2025-03-22T12:15:26.833000
|
CVE-2025-2331,0,0,b072726b3afe477229f13ce6fa12da5840fde8f6531f821787ad2abd1eb769a5,2025-03-22T12:15:26.833000
|
||||||
CVE-2025-2333,0,0,600470717f73ae989a4e33407be9c331e6223c6ec027e4a7c73886df7950cb72,2025-03-15T12:15:12.610000
|
CVE-2025-2333,0,0,600470717f73ae989a4e33407be9c331e6223c6ec027e4a7c73886df7950cb72,2025-03-15T12:15:12.610000
|
||||||
CVE-2025-2334,0,0,af1cfc1613b38618f43c910beb17815194cac4ddb461c16fb47f2aba7d734581,2025-03-17T16:15:27.017000
|
CVE-2025-2334,0,0,af1cfc1613b38618f43c910beb17815194cac4ddb461c16fb47f2aba7d734581,2025-03-17T16:15:27.017000
|
||||||
CVE-2025-2335,0,0,706aa2907d4bd291d4dd781e9005e6e8f3456955d568c8d3d9b369e28c0e73aa,2025-03-16T03:15:37.907000
|
CVE-2025-2335,0,0,706aa2907d4bd291d4dd781e9005e6e8f3456955d568c8d3d9b369e28c0e73aa,2025-03-16T03:15:37.907000
|
||||||
@ -285225,7 +285226,7 @@ CVE-2025-25766,0,0,f39b595117fd6ac0197008d13a65ac6ad37b800d031e5372f4209ffae8413
|
|||||||
CVE-2025-25767,0,0,dfbd9b86591c00c02b0b6c93af6c4513b8035921c944dca23036a1a8ab9e4095,2025-03-03T20:15:46.770000
|
CVE-2025-25767,0,0,dfbd9b86591c00c02b0b6c93af6c4513b8035921c944dca23036a1a8ab9e4095,2025-03-03T20:15:46.770000
|
||||||
CVE-2025-25768,0,0,c0ea06537ea4dff0558f2426b2095c6f0d5d7ca5691b12d94a7b7cd0158fea90,2025-03-03T20:15:46.940000
|
CVE-2025-25768,0,0,c0ea06537ea4dff0558f2426b2095c6f0d5d7ca5691b12d94a7b7cd0158fea90,2025-03-03T20:15:46.940000
|
||||||
CVE-2025-25769,0,0,c04f243adfab6d0c228896823c1de48d6c8d1554d46e87c10f438472ea98cdce,2025-02-24T18:15:19.487000
|
CVE-2025-25769,0,0,c04f243adfab6d0c228896823c1de48d6c8d1554d46e87c10f438472ea98cdce,2025-02-24T18:15:19.487000
|
||||||
CVE-2025-2577,1,1,929de73a39a3543c29173f273a3d41f338242898e72fad38fbcc81d8274db1d5,2025-03-22T12:15:27.013000
|
CVE-2025-2577,0,0,929de73a39a3543c29173f273a3d41f338242898e72fad38fbcc81d8274db1d5,2025-03-22T12:15:27.013000
|
||||||
CVE-2025-25770,0,0,083dca9bf78425b081932176ffd5590f62d2e6b52d7243e21c6da305bd5b4229,2025-02-24T18:15:20.280000
|
CVE-2025-25770,0,0,083dca9bf78425b081932176ffd5590f62d2e6b52d7243e21c6da305bd5b4229,2025-02-24T18:15:20.280000
|
||||||
CVE-2025-25772,0,0,049a4d8ccd7e92d8a6c37014ca81c63552e30fbd0e2bdc0e271ff3963136769b,2025-02-21T22:15:12.813000
|
CVE-2025-25772,0,0,049a4d8ccd7e92d8a6c37014ca81c63552e30fbd0e2bdc0e271ff3963136769b,2025-02-21T22:15:12.813000
|
||||||
CVE-2025-25774,0,0,69d43747c15f87af0da05215cab928648fd3e1ba63812309aa7f5e031fa6f50d,2025-03-12T19:15:39.777000
|
CVE-2025-25774,0,0,69d43747c15f87af0da05215cab928648fd3e1ba63812309aa7f5e031fa6f50d,2025-03-12T19:15:39.777000
|
||||||
@ -285343,7 +285344,10 @@ CVE-2025-26158,0,0,b94398759aa4427b7dc090483f4f088a5c44388e38d183da6dc19ae9b872c
|
|||||||
CVE-2025-2616,0,0,1df0cf877e710fe9be61f38515f018771e2a185b2390858bae14abf7c5bbe46a,2025-03-22T10:15:16.533000
|
CVE-2025-2616,0,0,1df0cf877e710fe9be61f38515f018771e2a185b2390858bae14abf7c5bbe46a,2025-03-22T10:15:16.533000
|
||||||
CVE-2025-26163,0,0,1a8da14fd3182531e44fdb492b7c9a837211526283840a4e5bb4333cbf418032,2025-03-19T19:15:46.853000
|
CVE-2025-26163,0,0,1a8da14fd3182531e44fdb492b7c9a837211526283840a4e5bb4333cbf418032,2025-03-19T19:15:46.853000
|
||||||
CVE-2025-26167,0,0,b243267aa31b3c4d3db94db42f2915c63c26a12d7e4452c1efdd061381d17d44,2025-03-07T20:15:38.347000
|
CVE-2025-26167,0,0,b243267aa31b3c4d3db94db42f2915c63c26a12d7e4452c1efdd061381d17d44,2025-03-07T20:15:38.347000
|
||||||
|
CVE-2025-2617,1,1,17ecf2a4afb7fa68080612946426fe6502dcbc52588757f2cad26c1a96015f20,2025-03-22T13:15:35.837000
|
||||||
|
CVE-2025-2618,1,1,a0be16c007291a7654dfbd4f2c2eb5cd5612dbfd0d66d1c468dbb0c63d5d84a8,2025-03-22T14:15:16.650000
|
||||||
CVE-2025-26182,0,0,50bc93eea6be4a4f051a5cba8257a428d894f0c81b2a5095709deaa26b1aeef7,2025-03-05T19:15:39.023000
|
CVE-2025-26182,0,0,50bc93eea6be4a4f051a5cba8257a428d894f0c81b2a5095709deaa26b1aeef7,2025-03-05T19:15:39.023000
|
||||||
|
CVE-2025-2619,1,1,27e06b14b4922e101e410b948b2adbb5b081f3be43d641aabf6c3fa5baa51dc1,2025-03-22T14:15:16.867000
|
||||||
CVE-2025-26200,0,0,07971a3db98f9cfae341b32901f42b0af32b82b7b85e8efc840488c86eda257e,2025-02-24T17:15:14.273000
|
CVE-2025-26200,0,0,07971a3db98f9cfae341b32901f42b0af32b82b7b85e8efc840488c86eda257e,2025-02-24T17:15:14.273000
|
||||||
CVE-2025-26201,0,0,19cc0d8c975fa49352fb9ad1f8db6737d71edae986faba1d37ba48d4a441cec4,2025-02-24T18:15:21.047000
|
CVE-2025-26201,0,0,19cc0d8c975fa49352fb9ad1f8db6737d71edae986faba1d37ba48d4a441cec4,2025-02-24T18:15:21.047000
|
||||||
CVE-2025-26202,0,0,f8b0cbe65a751dd37df4c2f886b778f4059fbbdee95a620e7d770c31cb87373d,2025-03-14T20:15:14.167000
|
CVE-2025-26202,0,0,f8b0cbe65a751dd37df4c2f886b778f4059fbbdee95a620e7d770c31cb87373d,2025-03-14T20:15:14.167000
|
||||||
@ -285574,6 +285578,7 @@ CVE-2025-26789,0,0,ebea494059b94de49b6b520d5766b69e65af5f122cf9ef029bba111909dc2
|
|||||||
CVE-2025-26791,0,0,a7d63ea0959b4846f11cfb3951f45279f457c98157e5d52d56097a5da007bce1,2025-02-14T16:15:37.350000
|
CVE-2025-26791,0,0,a7d63ea0959b4846f11cfb3951f45279f457c98157e5d52d56097a5da007bce1,2025-02-14T16:15:37.350000
|
||||||
CVE-2025-26793,0,0,d30b44911459092c9e08ffe42552727cfd072bd06f4aa8564ac964446a27eec1,2025-02-24T17:15:14.580000
|
CVE-2025-26793,0,0,d30b44911459092c9e08ffe42552727cfd072bd06f4aa8564ac964446a27eec1,2025-02-24T17:15:14.580000
|
||||||
CVE-2025-26794,0,0,fe65001567301b62f9f70becffce46b16ab4f6e8292d604a049482502e1fc499,2025-02-22T01:15:10.670000
|
CVE-2025-26794,0,0,fe65001567301b62f9f70becffce46b16ab4f6e8292d604a049482502e1fc499,2025-02-22T01:15:10.670000
|
||||||
|
CVE-2025-26796,1,1,9dbf889de866ca41ab74b84afcf0d854880b44cea138661c6f19e43b7bc96f29,2025-03-22T14:15:16.537000
|
||||||
CVE-2025-26803,0,0,8c486e737c398ad4bd709101648ff92403877558e051d24af9f92cf436430efd,2025-02-28T17:21:55.827000
|
CVE-2025-26803,0,0,8c486e737c398ad4bd709101648ff92403877558e051d24af9f92cf436430efd,2025-02-28T17:21:55.827000
|
||||||
CVE-2025-26816,0,0,2ec5a5349b9517d8ba53395229a7b8942acd452c9df91a0b3e2328a764fb96c9,2025-03-20T21:15:23.273000
|
CVE-2025-26816,0,0,2ec5a5349b9517d8ba53395229a7b8942acd452c9df91a0b3e2328a764fb96c9,2025-03-20T21:15:23.273000
|
||||||
CVE-2025-26819,0,0,265b05b0b6b085ef27d0e218dd5a0f79b1864b8a6c0004a23e6fa9575a3cdbeb,2025-02-15T00:15:28.510000
|
CVE-2025-26819,0,0,265b05b0b6b085ef27d0e218dd5a0f79b1864b8a6c0004a23e6fa9575a3cdbeb,2025-02-15T00:15:28.510000
|
||||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user