mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-19 17:31:42 +00:00
Auto-Update: 2025-03-31T18:00:20.010490+00:00
This commit is contained in:
parent
a71308525c
commit
baa5b858bc
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-46967",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-01-26T23:15:14.717",
|
||||
"lastModified": "2024-11-21T07:31:21.360",
|
||||
"lastModified": "2025-03-31T17:15:37.973",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "NVD-CWE-Other"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-522"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-47951",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-01-26T22:15:25.823",
|
||||
"lastModified": "2024-11-21T07:32:37.573",
|
||||
"lastModified": "2025-03-31T17:15:39.117",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 5.7,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-22"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-22"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-13804",
|
||||
"sourceIdentifier": "security-alert@hpe.com",
|
||||
"published": "2025-03-30T22:15:14.510",
|
||||
"lastModified": "2025-03-30T22:15:14.510",
|
||||
"lastModified": "2025-03-31T16:15:19.670",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [
|
||||
{
|
||||
@ -16,13 +16,56 @@
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Vulnerability in Hewlett Packard Enterprise HPE Insight Cluster Management Utility (CMU).This issue affects HPE Insight Cluster Management Utility (CMU): 8.2."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Vulnerabilidad en Hewlett Packard Enterprise HPE Insight Cluster Management Utility (CMU). Este problema afecta a HPE Insight Cluster Management Utility (CMU): 8.2."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-287"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://red.0xbad53c.com/vulnerability-research/rce-in-hpe-insight-cluster-management-utility-cve-2024-13804",
|
||||
"source": "security-alert@hpe.com"
|
||||
},
|
||||
{
|
||||
"url": "https://red.0xbad53c.com/vulnerability-research/rce-in-hpe-insight-cluster-management-utility-cve-2024-13804",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2024-27286",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-03-20T20:15:08.407",
|
||||
"lastModified": "2024-11-21T09:04:15.060",
|
||||
"lastModified": "2025-03-31T17:15:39.877",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Zulip is an open-source team collaboration. When a user moves a Zulip message, they have the option to move all messages in the topic, move only subsequent messages as well, or move just a single message. If the user chose to just move one message, and was moving it from a public stream to a private stream, Zulip would successfully move the message, -- but active users who did not have access to the private stream, but whose client had already received the message, would continue to see the message in the public stream until they reloaded their client. Additionally, Zulip did not remove view permissions on the message from recently-active users, allowing the message to show up in the \"All messages\" view or in search results, but not in \"Inbox\" or \"Recent conversations\" views. While the bug has been present since moving messages between streams was first introduced in version 3.0, this option became much more common starting in Zulip 8.0, when the default option in the picker for moving the very last message in a conversation was changed. This issue is fixed in Zulip Server 8.3. No known workarounds are available."
|
||||
"value": "Zulip is an open-source team collaboration tool. When a user moves a Zulip message, they have the option to move all messages in the topic, move only subsequent messages as well, or move just a single message. If the user chose to just move one message, and was moving it from a public stream to a private stream, Zulip would successfully move the message, -- but active users who did not have access to the private stream, but whose client had already received the message, would continue to see the message in the public stream until they reloaded their client. Additionally, Zulip did not remove view permissions on the message from recently-active users, allowing the message to show up in the \"All messages\" view or in search results, but not in \"Inbox\" or \"Recent conversations\" views. While the bug has been present since moving messages between streams was first introduced in version 3.0, this option became much more common starting in Zulip 8.0, when the default option in the picker for moving the very last message in a conversation was changed. This issue is fixed in Zulip Server 8.3. No known workarounds are available."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-28556",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-15T19:15:09.870",
|
||||
"lastModified": "2024-11-21T09:06:29.997",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-03-31T16:28:08.810",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,22 +51,55 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "https://github.com/xuanluansec/vul/blob/main/vul/1/README.md",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
"nodes": [
|
||||
{
|
||||
"url": "https://github.com/xuanluansec/vul/issues/1",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"url": "https://github.com/xuanluansec/vul/blob/main/vul/1/README.md",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/xuanluansec/vul/issues/1",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:mayurik:php_task_management_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6ADEFAE0-BA75-4FCB-A8BE-796A163278DC"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/xuanluansec/vul/blob/main/vul/1/README.md",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/xuanluansec/vul/issues/1",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/xuanluansec/vul/blob/main/vul/1/README.md",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/xuanluansec/vul/issues/1",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-28557",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-15T19:15:09.913",
|
||||
"lastModified": "2024-11-21T09:06:30.740",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-03-31T16:28:59.380",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,22 +51,55 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "https://github.com/xuanluansec/vul/blob/main/vul/2/README-SQL-2.md",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
"nodes": [
|
||||
{
|
||||
"url": "https://github.com/xuanluansec/vul/issues/2",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"url": "https://github.com/xuanluansec/vul/blob/main/vul/2/README-SQL-2.md",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/xuanluansec/vul/issues/2",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:mayurik:php_task_management_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6ADEFAE0-BA75-4FCB-A8BE-796A163278DC"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/xuanluansec/vul/blob/main/vul/2/README-SQL-2.md",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/xuanluansec/vul/issues/2",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/xuanluansec/vul/blob/main/vul/2/README-SQL-2.md",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/xuanluansec/vul/issues/2",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-3853",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2024-04-16T16:15:08.400",
|
||||
"lastModified": "2024-11-21T09:30:32.893",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-03-31T16:32:46.433",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -39,22 +39,64 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
"weaknesses": [
|
||||
{
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1884427",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-18/",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1884427",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-18/",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"lang": "en",
|
||||
"value": "CWE-416"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "125.0",
|
||||
"matchCriteriaId": "7334A1C6-C6BF-4C70-ADF1-736BCE0EA227"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1884427",
|
||||
"source": "security@mozilla.org",
|
||||
"tags": [
|
||||
"Issue Tracking"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-18/",
|
||||
"source": "security@mozilla.org",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1884427",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Issue Tracking"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-18/",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-3855",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2024-04-16T16:15:08.487",
|
||||
"lastModified": "2024-11-21T09:30:33.310",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-03-31T17:05:19.390",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,22 +51,52 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1885828",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
"nodes": [
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-18/",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1885828",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-18/",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "125.0",
|
||||
"matchCriteriaId": "7334A1C6-C6BF-4C70-ADF1-736BCE0EA227"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1885828",
|
||||
"source": "security@mozilla.org",
|
||||
"tags": [
|
||||
"Issue Tracking"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-18/",
|
||||
"source": "security@mozilla.org",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1885828",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Issue Tracking"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-18/",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-3856",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2024-04-16T16:15:08.527",
|
||||
"lastModified": "2024-11-21T09:30:33.523",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-03-31T17:01:41.797",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,22 +51,52 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1885829",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
"nodes": [
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-18/",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1885829",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-18/",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "125.0",
|
||||
"matchCriteriaId": "7334A1C6-C6BF-4C70-ADF1-736BCE0EA227"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1885829",
|
||||
"source": "security@mozilla.org",
|
||||
"tags": [
|
||||
"Issue Tracking"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-18/",
|
||||
"source": "security@mozilla.org",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1885829",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Issue Tracking"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-18/",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-3858",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2024-04-16T16:15:08.613",
|
||||
"lastModified": "2024-11-21T09:30:33.923",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-03-31T16:47:40.163",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,22 +51,52 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1888892",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
"nodes": [
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-18/",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1888892",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-18/",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "125.0",
|
||||
"matchCriteriaId": "7334A1C6-C6BF-4C70-ADF1-736BCE0EA227"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1888892",
|
||||
"source": "security@mozilla.org",
|
||||
"tags": [
|
||||
"Issue Tracking"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-18/",
|
||||
"source": "security@mozilla.org",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1888892",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Issue Tracking"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-18/",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-3860",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2024-04-16T16:15:08.713",
|
||||
"lastModified": "2024-11-21T09:30:34.363",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-03-31T16:46:41.977",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,22 +51,52 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1881417",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
"nodes": [
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-18/",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1881417",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-18/",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "125.0",
|
||||
"matchCriteriaId": "7334A1C6-C6BF-4C70-ADF1-736BCE0EA227"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1881417",
|
||||
"source": "security@mozilla.org",
|
||||
"tags": [
|
||||
"Issue Tracking"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-18/",
|
||||
"source": "security@mozilla.org",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1881417",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Issue Tracking"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-18/",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-3862",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2024-04-16T16:15:08.823",
|
||||
"lastModified": "2024-11-21T09:30:34.770",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-03-31T16:45:53.620",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,22 +51,52 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1884457",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
"nodes": [
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-18/",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1884457",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-18/",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "125.0",
|
||||
"matchCriteriaId": "7334A1C6-C6BF-4C70-ADF1-736BCE0EA227"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1884457",
|
||||
"source": "security@mozilla.org",
|
||||
"tags": [
|
||||
"Issue Tracking"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-18/",
|
||||
"source": "security@mozilla.org",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1884457",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Issue Tracking"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-18/",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-44676",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-09-10T16:15:20.260",
|
||||
"lastModified": "2024-09-25T19:20:25.073",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2025-03-31T16:15:21.393",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -113,6 +113,10 @@
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/l1uyi/cve-list/blob/main/cve-list/eladmin-CVE-2024-44676_CVE-2024-44677.md",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-44677",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-09-10T16:15:20.373",
|
||||
"lastModified": "2024-09-25T19:19:24.007",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2025-03-31T16:15:22.023",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -114,6 +114,10 @@
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/l1uyi/cve-list/blob/main/cve-list/eladmin-CVE-2024-44676_CVE-2024-44677.md",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-46236",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-21T19:15:03.207",
|
||||
"lastModified": "2024-10-23T15:13:25.583",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-03-31T17:49:13.670",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,10 +51,32 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "https://github.com/anoncoder01/PHP_CodeAstro_Stored_XSS/blob/master/vulnerabilities/XSS_1.md",
|
||||
"source": "cve@mitre.org"
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:codeastro:membership_management_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3A341555-1CAF-480B-978A-9AE299540FA3"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/anoncoder01/PHP_CodeAstro_Stored_XSS/blob/master/vulnerabilities/XSS_1.md",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory",
|
||||
"Mitigation"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-46238",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-21T19:15:03.363",
|
||||
"lastModified": "2024-10-23T15:13:25.583",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-03-31T17:52:15.150",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,10 +51,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "https://github.com/anoncoder01/PHP_Gurukul_Hospital_Management_System_XSS/blob/master/vulnerabilities/XSS2.md",
|
||||
"source": "cve@mitre.org"
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:phpgurukul:hospital_management_system:4.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DA36E354-4DBF-4BE4-9BC4-CB00C6771BAF"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/anoncoder01/PHP_Gurukul_Hospital_Management_System_XSS/blob/master/vulnerabilities/XSS2.md",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-46239",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-21T19:15:03.413",
|
||||
"lastModified": "2024-10-23T15:13:25.583",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-03-31T17:52:58.943",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,10 +51,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "https://github.com/anoncoder01/PHP_Gurukul_Hospital_Management_System_XSS/blob/master/vulnerabilities/XSS3.md",
|
||||
"source": "cve@mitre.org"
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:phpgurukul:hospital_management_system:4.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DA36E354-4DBF-4BE4-9BC4-CB00C6771BAF"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/anoncoder01/PHP_Gurukul_Hospital_Management_System_XSS/blob/master/vulnerabilities/XSS3.md",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-48278",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-15T13:15:11.000",
|
||||
"lastModified": "2024-10-16T16:38:43.170",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-03-31T17:27:44.297",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,10 +51,32 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "https://github.com/m14r41/Writeups/blob/main/CVE/phpGurukul/User%20Registration%20%26%20Login%20and%20User%20Management%20System%20With%20admin%20panel/CSRF%20-%20Profile.md",
|
||||
"source": "cve@mitre.org"
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:phpgurukul:user_registration_\\&_login_and_user_management_system:3.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "48B4855A-8E96-4F34-8235-27971366F46E"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/m14r41/Writeups/blob/main/CVE/phpGurukul/User%20Registration%20%26%20Login%20and%20User%20Management%20System%20With%20admin%20panel/CSRF%20-%20Profile.md",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory",
|
||||
"Mitigation"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-48279",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-15T13:15:11.083",
|
||||
"lastModified": "2024-10-16T16:38:43.170",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-03-31T17:19:22.290",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,10 +51,32 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "https://github.com/m14r41/Writeups/blob/main/CVE/phpGurukul/User%20Registration%20%26%20Login%20and%20User%20Management%20System%20With%20admin%20panel/HTML%20Injection%20-%20Search.md",
|
||||
"source": "cve@mitre.org"
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:phpgurukul:user_registration_\\&_login_and_user_management_system:3.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "48B4855A-8E96-4F34-8235-27971366F46E"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/m14r41/Writeups/blob/main/CVE/phpGurukul/User%20Registration%20%26%20Login%20and%20User%20Management%20System%20With%20admin%20panel/HTML%20Injection%20-%20Search.md",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory",
|
||||
"Mitigation"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-48280",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-15T13:15:11.160",
|
||||
"lastModified": "2024-10-16T16:38:43.170",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-03-31T17:18:48.330",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,10 +51,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "https://github.com/m14r41/Writeups/blob/main/CVE/phpGurukul/User%20Registration%20%26%20Login%20and%20User%20Management%20System%20With%20admin%20panel/SQL%20Injection%20-%20Bw%20Date%20Report%20%28%20fromdate%29.md",
|
||||
"source": "cve@mitre.org"
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:phpgurukul:user_registration_\\&_login_and_user_management_system:3.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "48B4855A-8E96-4F34-8235-27971366F46E"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/m14r41/Writeups/blob/main/CVE/phpGurukul/User%20Registration%20%26%20Login%20and%20User%20Management%20System%20With%20admin%20panel/SQL%20Injection%20-%20Bw%20Date%20Report%20%28%20fromdate%29.md",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-48282",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-15T13:15:11.227",
|
||||
"lastModified": "2024-10-16T16:38:43.170",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-03-31T17:12:33.610",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,10 +51,32 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "https://github.com/m14r41/Writeups/blob/main/CVE/phpGurukul/User%20Registration%20%26%20Login%20and%20User%20Management%20System%20With%20admin%20panel/SQL%20Injection%20-%20Forget%20Password.md",
|
||||
"source": "cve@mitre.org"
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:phpgurukul:user_registration_\\&_login_and_user_management_system:3.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "48B4855A-8E96-4F34-8235-27971366F46E"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/m14r41/Writeups/blob/main/CVE/phpGurukul/User%20Registration%20%26%20Login%20and%20User%20Management%20System%20With%20admin%20panel/SQL%20Injection%20-%20Forget%20Password.md",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory",
|
||||
"Mitigation"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-48709",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-21T19:15:03.817",
|
||||
"lastModified": "2024-10-23T15:13:25.583",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-03-31T17:58:22.347",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,10 +51,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "https://github.com/anoncoder01/PHP_CodeAstro_Stored_XSS/blob/master/vulnerabilities/XSS_2.md",
|
||||
"source": "cve@mitre.org"
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:codeastro:membership_management_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3A341555-1CAF-480B-978A-9AE299540FA3"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/anoncoder01/PHP_CodeAstro_Stored_XSS/blob/master/vulnerabilities/XSS_2.md",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-48744",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-16T15:15:16.850",
|
||||
"lastModified": "2024-10-16T18:35:07.013",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-03-31T17:47:09.433",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,10 +51,32 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "https://github.com/vkcyberexpert/CVE-Writeup/blob/main/PHPGurukul/Teachers%20Record/Reflected%20XSS.pdf",
|
||||
"source": "cve@mitre.org"
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:phpgurukul:teachers_record_management_system:2.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EC106BFF-D502-4745-8C71-C12451FCFC98"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/vkcyberexpert/CVE-Writeup/blob/main/PHPGurukul/Teachers%20Record/Reflected%20XSS.pdf",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory",
|
||||
"Mitigation"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-9403",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2024-10-01T16:15:11.233",
|
||||
"lastModified": "2025-03-19T18:15:24.137",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-03-31T17:45:09.633",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,18 +51,51 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1917807",
|
||||
"source": "security@mozilla.org"
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "131.0",
|
||||
"matchCriteriaId": "DA47FFCA-3451-462C-8FFB-47143C65E65A"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-46/",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-50/",
|
||||
"source": "security@mozilla.org"
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "131.0",
|
||||
"matchCriteriaId": "760A2AF5-BE39-4BBF-94E8-61F404432B02"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1917807",
|
||||
"source": "security@mozilla.org",
|
||||
"tags": [
|
||||
"Issue Tracking"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-46/",
|
||||
"source": "security@mozilla.org",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-50/",
|
||||
"source": "security@mozilla.org",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-9936",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2024-10-14T14:15:12.553",
|
||||
"lastModified": "2024-11-06T17:35:42.870",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-03-31T17:42:12.170",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,14 +51,38 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1920381",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
"nodes": [
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-53/",
|
||||
"source": "security@mozilla.org"
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "131.0.3",
|
||||
"matchCriteriaId": "1574FBF1-9EEA-4FB2-B4FD-D9B095A465EF"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1920381",
|
||||
"source": "security@mozilla.org",
|
||||
"tags": [
|
||||
"Issue Tracking"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2024-53/",
|
||||
"source": "security@mozilla.org",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-1398",
|
||||
"sourceIdentifier": "responsibledisclosure@mattermost.com",
|
||||
"published": "2025-03-17T15:15:43.243",
|
||||
"lastModified": "2025-03-17T15:15:43.243",
|
||||
"lastModified": "2025-03-31T16:15:22.463",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -16,50 +16,6 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "responsibledisclosure@mattermost.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 10.0,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "HIGH",
|
||||
"vulnIntegrityImpact": "HIGH",
|
||||
"vulnAvailabilityImpact": "HIGH",
|
||||
"subConfidentialityImpact": "HIGH",
|
||||
"subIntegrityImpact": "HIGH",
|
||||
"subAvailabilityImpact": "HIGH",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "responsibledisclosure@mattermost.com",
|
||||
|
66
CVE-2025/CVE-2025-14xx/CVE-2025-1449.json
Normal file
66
CVE-2025/CVE-2025-14xx/CVE-2025-1449.json
Normal file
@ -0,0 +1,66 @@
|
||||
{
|
||||
"id": "CVE-2025-1449",
|
||||
"sourceIdentifier": "PSIRT@rockwellautomation.com",
|
||||
"published": "2025-03-31T16:15:22.770",
|
||||
"lastModified": "2025-03-31T16:15:22.770",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability exists in the Rockwell Automation Verve Asset Manager due to insufficient variable sanitizing. A portion of the administrative web interface for Verve's Legacy Agentless Device Inventory (ADI) capability (deprecated since the 1.36 release) allows users to change a variable with inadequate sanitizing. If exploited, it could allow a threat actor with administrative access to run arbitrary commands in the context of the container running the service."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "PSIRT@rockwellautomation.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "PRESENT",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "HIGH",
|
||||
"vulnIntegrityImpact": "HIGH",
|
||||
"vulnAvailabilityImpact": "HIGH",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1723.html",
|
||||
"source": "PSIRT@rockwellautomation.com"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2025/CVE-2025-22xx/CVE-2025-2292.json
Normal file
60
CVE-2025/CVE-2025-22xx/CVE-2025-2292.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2025-2292",
|
||||
"sourceIdentifier": "disclosure@vulncheck.com",
|
||||
"published": "2025-03-31T17:15:40.740",
|
||||
"lastModified": "2025-03-31T17:15:40.740",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Xorcom CompletePBX is vulnerable to an authenticated path traversal, allowing for arbitrary file reads via the Backup and Restore functionality.This issue affects CompletePBX: through 5.2.35."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "disclosure@vulncheck.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 4.9,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "disclosure@vulncheck.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-22"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://vulncheck.com/advisories/completepbx-file-disclosure",
|
||||
"source": "disclosure@vulncheck.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.xorcom.com/new-completepbx-release-5-2-36-1/",
|
||||
"source": "disclosure@vulncheck.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2025/CVE-2025-270xx/CVE-2025-27095.json
Normal file
56
CVE-2025/CVE-2025-270xx/CVE-2025-27095.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-27095",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-03-31T16:15:23.493",
|
||||
"lastModified": "2025-03-31T16:15:23.493",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "JumpServer is an open source bastion host and an operation and maintenance security audit system. Prior to 4.8.0 and 3.10.18, an attacker with a low-privileged account can access the Kubernetes session feature and manipulate the kubeconfig file to redirect API requests to an external server controlled by the attacker. This allows the attacker to intercept and capture the Kubernetes cluster token. This can potentially allow unauthorized access to the cluster and compromise its security. This vulnerability is fixed in 4.8.0 and 3.10.18."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-266"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/jumpserver/jumpserver/security/advisories/GHSA-5q9w-f4wh-f535",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
78
CVE-2025/CVE-2025-271xx/CVE-2025-27149.json
Normal file
78
CVE-2025/CVE-2025-271xx/CVE-2025-27149.json
Normal file
@ -0,0 +1,78 @@
|
||||
{
|
||||
"id": "CVE-2025-27149",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-03-31T16:15:23.743",
|
||||
"lastModified": "2025-03-31T16:15:23.743",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Zulip server provides an open-source team chat that helps teams stay productive and focused. Prior to 10.0, the data export to organization administrators feature in Zulip leaks private data. The collection of user-agent types identifying specific integrations or HTTP libraries (E.g., ZulipGitlabWebhook, okhttp, or PycURL) that have been used to access any organization on the server was incorrectly included in all three export types, regardless of if they were used to access the exported organization or not. The \"public data\" and \"with consent\" exports metadata including the titles of some topics in private channels which the administrator otherwise did not have access to, and none of the users consented to exporting and metadata for which users were in a group DM together. This vulnerability is fixed in 10.0."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:A/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 4.6,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "ACTIVE",
|
||||
"vulnConfidentialityImpact": "LOW",
|
||||
"vulnIntegrityImpact": "NONE",
|
||||
"vulnAvailabilityImpact": "NONE",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-497"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/zulip/zulip/security/advisories/GHSA-358p-x39m-99mm",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2025/CVE-2025-27xx/CVE-2025-2794.json
Normal file
56
CVE-2025/CVE-2025-27xx/CVE-2025-2794.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-2794",
|
||||
"sourceIdentifier": "disclosure@vulncheck.com",
|
||||
"published": "2025-03-31T17:15:41.333",
|
||||
"lastModified": "2025-03-31T17:15:41.333",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An unsafe reflection vulnerability in Kentico Xperience allows an unauthenticated attacker to kill the current process, leading to a Denial-of-Service condition.\n\n\n\n\nThis issue affects Xperience: through 13.0.180."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "disclosure@vulncheck.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "disclosure@vulncheck.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-470"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://devnet.kentico.com/download/hotfixes",
|
||||
"source": "disclosure@vulncheck.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,20 +2,63 @@
|
||||
"id": "CVE-2025-28096",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-03-28T22:15:18.700",
|
||||
"lastModified": "2025-03-28T22:15:18.700",
|
||||
"lastModified": "2025-03-31T17:15:40.403",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "OneNav 1.1.0 is vulnerable to Server-Side Request Forgery (SSRF) in custom headers."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "OneNav 1.1.0 es vulnerable a Server-Side Request Forgery (SSRF) en encabezados personalizados."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-918"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.yuque.com/morysummer/vx41bz/oqi6pyv26gci6465",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.yuque.com/morysummer/vx41bz/oqi6pyv26gci6465",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
68
CVE-2025/CVE-2025-297xx/CVE-2025-29766.json
Normal file
68
CVE-2025/CVE-2025-297xx/CVE-2025-29766.json
Normal file
@ -0,0 +1,68 @@
|
||||
{
|
||||
"id": "CVE-2025-29766",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-03-31T16:15:23.897",
|
||||
"lastModified": "2025-03-31T16:15:23.897",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Tuleap is an Open Source Suite to improve management of software developments and collaboration. Tuleap has missing CSRF protections on artifact submission & edition from the tracker view. An attacker could use this vulnerability to trick victims into submitting or editing artifacts or follow-up comments. The vulnerability is fixed in Tuleap Community Edition 16.5.99.1741784483 and Tuleap Enterprise Edition 16.5-3 and 16.4-8."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L",
|
||||
"baseScore": 4.6,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 2.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Enalean/tuleap/commit/81f45330fdcc1329cc71eddf4d04b80c340b3b93",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-6p9q-p2q4-3rqx",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit&h=81f45330fdcc1329cc71eddf4d04b80c340b3b93",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://tuleap.net/plugins/tracker/?aid=42208",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
82
CVE-2025/CVE-2025-297xx/CVE-2025-29772.json
Normal file
82
CVE-2025/CVE-2025-297xx/CVE-2025-29772.json
Normal file
@ -0,0 +1,82 @@
|
||||
{
|
||||
"id": "CVE-2025-29772",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-03-31T16:15:24.063",
|
||||
"lastModified": "2025-03-31T16:15:24.063",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "OpenEMR is a free and open source electronic health records and medical practice management application. The POST parameter hidden_subcategory is output to the page without being properly processed. This leads to a reflected cross-site scripting (XSS) vul;nerability in CAMOS new.php. This vulnerability is fixed in 7.0.3."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:A/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 7.2,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "ACTIVE",
|
||||
"vulnConfidentialityImpact": "HIGH",
|
||||
"vulnIntegrityImpact": "HIGH",
|
||||
"vulnAvailabilityImpact": "NONE",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/openemr/openemr/commit/17c5c424695de50db94f2c01fb9abfc441d09a1a",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/openemr/openemr/security/advisories/GHSA-89gp-g4c9-hv8h",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
68
CVE-2025/CVE-2025-299xx/CVE-2025-29929.json
Normal file
68
CVE-2025/CVE-2025-299xx/CVE-2025-29929.json
Normal file
@ -0,0 +1,68 @@
|
||||
{
|
||||
"id": "CVE-2025-29929",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-03-31T16:15:24.237",
|
||||
"lastModified": "2025-03-31T16:15:24.237",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Tuleap is an Open Source Suite to improve management of software developments and collaboration. Tuleap is missing CSRF protection on tracker hierarchy administration. An attacker could use this vulnerability to trick victims into submitting or editing artifacts or follow-up comments. This vulnerability is fixed in Tuleap Community Edition 16.5.99.1742306712 and Tuleap Enterprise Edition 16.5-5 and 16.4-8."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L",
|
||||
"baseScore": 4.6,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 2.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Enalean/tuleap/commit/dce61747f3a169da1f6b585ad5e6e0847fa3c950",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-hqqr-p5f6-26vv",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit&h=dce61747f3a169da1f6b585ad5e6e0847fa3c950",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://tuleap.net/plugins/tracker/?aid=42231",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2025-2963",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-03-30T22:15:15.597",
|
||||
"lastModified": "2025-03-30T22:15:15.597",
|
||||
"lastModified": "2025-03-31T16:15:24.443",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability, which was classified as problematic, has been found in ConcreteCMS up to 9.3.9. This issue affects the function addEditQuestion of the component Legacy Form Block Handler. The manipulation of the argument Question leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se ha detectado una vulnerabilidad clasificada como problem\u00e1tica en ConcreteCMS hasta la versi\u00f3n 9.3.9. Este problema afecta a la funci\u00f3n addEditQuestion del componente Legacy Form Block Handler. La manipulaci\u00f3n del argumento Question provoca cross site scripting. El ataque puede iniciarse remotamente. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Se contact\u00f3 al proveedor con antelaci\u00f3n para informarle sobre esta divulgaci\u00f3n, pero no respondi\u00f3."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -59,7 +63,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
|
||||
@ -107,7 +111,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -136,6 +140,10 @@
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.522413",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/yaowenxiao721/Poc/blob/main/Concretecms/Concretecms-poc1.md",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2025/CVE-2025-300xx/CVE-2025-30004.json
Normal file
60
CVE-2025/CVE-2025-300xx/CVE-2025-30004.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2025-30004",
|
||||
"sourceIdentifier": "disclosure@vulncheck.com",
|
||||
"published": "2025-03-31T17:15:41.737",
|
||||
"lastModified": "2025-03-31T17:15:41.737",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Xorcom CompletePBX is vulnerable to command injection in the administrator Task Scheduler functionality, allowing for attackers to execute arbitrary commands as the root user.\n\n\n\n\nThis issue affects CompletePBX: all versions up to and prior to 5.2.35"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "disclosure@vulncheck.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
|
||||
"baseScore": 9.1,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 6.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "disclosure@vulncheck.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-78"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://vulncheck.com/advisories/completepbx-authenticated-command-injection",
|
||||
"source": "disclosure@vulncheck.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.xorcom.com/new-completepbx-release-5-2-36-1/",
|
||||
"source": "disclosure@vulncheck.com"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2025/CVE-2025-300xx/CVE-2025-30005.json
Normal file
60
CVE-2025/CVE-2025-300xx/CVE-2025-30005.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2025-30005",
|
||||
"sourceIdentifier": "disclosure@vulncheck.com",
|
||||
"published": "2025-03-31T17:15:41.880",
|
||||
"lastModified": "2025-03-31T17:15:41.880",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Xorcom CompletePBX is vulnerable to a path traversal via the Diagnostics reporting module, which will allow reading of arbitrary files and additionally delete any retrieved file in place of the expected report.\n\n\n\n\nThis issue affects CompletePBX: all versions up to and prior to 5.2.35"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "disclosure@vulncheck.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:L",
|
||||
"baseScore": 6.7,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 5.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "disclosure@vulncheck.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-22"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://vulncheck.com/advisories/completepbx-path-traversal-file-deletion",
|
||||
"source": "disclosure@vulncheck.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.xorcom.com/new-completepbx-release-5-2-36-1/",
|
||||
"source": "disclosure@vulncheck.com"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2025/CVE-2025-300xx/CVE-2025-30006.json
Normal file
60
CVE-2025/CVE-2025-300xx/CVE-2025-30006.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2025-30006",
|
||||
"sourceIdentifier": "disclosure@vulncheck.com",
|
||||
"published": "2025-03-31T17:15:42.020",
|
||||
"lastModified": "2025-03-31T17:15:42.020",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Xorcom CompletePBX is vulnerable to a reflected cross-site scripting (XSS) in the administrative control panel.\n\n\n\n\nThis issue affects CompletePBX: all versions up to and prior to 5.2.35"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "disclosure@vulncheck.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "disclosure@vulncheck.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://vulncheck.com/advisories/completepbx-reflected-xss",
|
||||
"source": "disclosure@vulncheck.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.xorcom.com/new-completepbx-release-5-2-36-1/",
|
||||
"source": "disclosure@vulncheck.com"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2025/CVE-2025-301xx/CVE-2025-30149.json
Normal file
60
CVE-2025/CVE-2025-301xx/CVE-2025-30149.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2025-30149",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-03-31T16:15:25.040",
|
||||
"lastModified": "2025-03-31T16:15:25.040",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "OpenEMR is a free and open source electronic health records and medical practice management application. OpenEMR allows reflected cross-site scripting (XSS) in the AJAX Script interface\\super\\layout_listitems_ajax.php via the target parameter. This vulnerability is fixed in 7.0.3."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N",
|
||||
"baseScore": 6.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/openemr/openemr/commit/6cb70595f65decfbdd03e70b49acc414e03744b8",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/openemr/openemr/security/advisories/GHSA-fwfv-8583-6rr7",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
68
CVE-2025/CVE-2025-301xx/CVE-2025-30155.json
Normal file
68
CVE-2025/CVE-2025-301xx/CVE-2025-30155.json
Normal file
@ -0,0 +1,68 @@
|
||||
{
|
||||
"id": "CVE-2025-30155",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-03-31T16:15:25.187",
|
||||
"lastModified": "2025-03-31T16:15:25.187",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Tuleap is an Open Source Suite to improve management of software developments and collaboration. Tuleap does not enforce read permissions on parent trackers in the REST API. This vulnerability is fixed in Tuleap Community Edition 16.5.99.1742392651 and Tuleap Enterprise Edition 16.5-5 and 16.4-8."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-863"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Enalean/tuleap/commit/0921df3a1c1aa20fc359b373f001a77c43b1b726",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-6hr4-h6px-7ppg",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit&h=0921df3a1c1aa20fc359b373f001a77c43b1b726",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://tuleap.net/plugins/tracker/?aid=42237",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
86
CVE-2025/CVE-2025-301xx/CVE-2025-30161.json
Normal file
86
CVE-2025/CVE-2025-301xx/CVE-2025-30161.json
Normal file
@ -0,0 +1,86 @@
|
||||
{
|
||||
"id": "CVE-2025-30161",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-03-31T16:15:25.333",
|
||||
"lastModified": "2025-03-31T16:15:25.333",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "OpenEMR is a free and open source electronic health records and medical practice management application. A stored XSS vulnerability in the Bronchitis form component of OpenEMR allows anyone who is able to edit a bronchitis form to steal credentials from administrators. This vulnerability is fixed in 7.0.3."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:A/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 8.4,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "ACTIVE",
|
||||
"vulnConfidentialityImpact": "HIGH",
|
||||
"vulnIntegrityImpact": "HIGH",
|
||||
"vulnAvailabilityImpact": "NONE",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-80"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/openemr/openemr/blob/17ca5539bafcdc25a9042ebc14480552e07867e4/interface/forms/bronchitis/view.php#L102-L103",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/openemr/openemr/blob/17ca5539bafcdc25a9042ebc14480552e07867e4/interface/forms/bronchitis/view.php#L303-L304",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/openemr/openemr/security/advisories/GHSA-59rv-645x-rg6p",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
72
CVE-2025/CVE-2025-302xx/CVE-2025-30203.json
Normal file
72
CVE-2025/CVE-2025-302xx/CVE-2025-30203.json
Normal file
@ -0,0 +1,72 @@
|
||||
{
|
||||
"id": "CVE-2025-30203",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-03-31T16:15:25.473",
|
||||
"lastModified": "2025-03-31T16:15:25.473",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Tuleap is an Open Source Suite to improve management of software developments and collaboration. Tuleap allows cross-site scripting (XSS) via the content of RSS feeds in the RSS widgets. A project administrator or someone with control over an used RSS feed could use this vulnerability to force victims to execute uncontrolled code. This vulnerability is fixed in Tuleap Community Edition 16.5.99.1742562878 and Tuleap Enterprise Edition 16.5-5 and 16.4-8."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:N/I:L/A:L",
|
||||
"baseScore": 4.8,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 1.7,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-84"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Enalean/tuleap/commit/54cce3f5e883d16055cb0239e023f48cdf5eb25f",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-39gx-34fc-rx6r",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit&h=54cce3f5e883d16055cb0239e023f48cdf5eb25f",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://tuleap.net/plugins/tracker/?aid=42243",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
68
CVE-2025/CVE-2025-302xx/CVE-2025-30209.json
Normal file
68
CVE-2025/CVE-2025-302xx/CVE-2025-30209.json
Normal file
@ -0,0 +1,68 @@
|
||||
{
|
||||
"id": "CVE-2025-30209",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-03-31T16:15:25.620",
|
||||
"lastModified": "2025-03-31T16:15:25.620",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Tuleap is an Open Source Suite to improve management of software developments and collaboration. An attacker can access release notes content or information via the FRS REST endpoints it should not have access to. This vulnerability is fixed in Tuleap Community Edition 16.5.99.1742812323 and Tuleap Enterprise Edition 16.5-6 and 16.4-10."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-863"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Enalean/tuleap/commit/34af2d5d10b0349967129f53427f495815e5bbcc",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-hcp5-pmpm-mgwh",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit&h=34af2d5d10b0349967129f53427f495815e5bbcc",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://tuleap.net/plugins/tracker/?aid=42251",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2025/CVE-2025-302xx/CVE-2025-30223.json
Normal file
60
CVE-2025/CVE-2025-302xx/CVE-2025-30223.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2025-30223",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-03-31T17:15:42.147",
|
||||
"lastModified": "2025-03-31T17:15:42.147",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Beego is an open-source web framework for the Go programming language. Prior to 2.3.6, a Cross-Site Scripting (XSS) vulnerability exists in Beego's RenderForm() function due to improper HTML escaping of user-controlled data. This vulnerability allows attackers to inject malicious JavaScript code that executes in victims' browsers, potentially leading to session hijacking, credential theft, or account takeover. The vulnerability affects any application using Beego's RenderForm() function with user-provided data. Since it is a high-level function generating an entire form markup, many developers would assume it automatically escapes attributes (the way most frameworks do). This vulnerability is fixed in 2.3.6."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N",
|
||||
"baseScore": 9.3,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.8
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/beego/beego/commit/939bb18c66406466715ddadd25dd9ffa6f169e25",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/beego/beego/security/advisories/GHSA-2j42-h78h-q4fg",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
64
CVE-2025/CVE-2025-303xx/CVE-2025-30368.json
Normal file
64
CVE-2025/CVE-2025-303xx/CVE-2025-30368.json
Normal file
@ -0,0 +1,64 @@
|
||||
{
|
||||
"id": "CVE-2025-30368",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-03-31T17:15:42.320",
|
||||
"lastModified": "2025-03-31T17:15:42.320",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Zulip is an open-source team collaboration tool. The API for deleting an organization export is supposed to be restricted to organization administrators, but its handler failed to check that the field belongs to the same organization as the user. Therefore, an administrator of any organization was incorrectly allowed to delete an export of a different organization. This is fixed in Zulip Server 10.1."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N",
|
||||
"baseScore": 2.7,
|
||||
"baseSeverity": "LOW",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-566"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/zulip/zulip/commit/07dcee36b2a34d63429d7a706f880628cf3433df",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/zulip/zulip/security/advisories/GHSA-rmhr-5ffq-qcrc",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://zulip.readthedocs.io/en/latest/overview/changelog.html#zulip-server-10-1",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2025/CVE-2025-303xx/CVE-2025-30369.json
Normal file
56
CVE-2025/CVE-2025-303xx/CVE-2025-30369.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-30369",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-03-31T17:15:42.497",
|
||||
"lastModified": "2025-03-31T17:15:42.497",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Zulip is an open-source team collaboration tool. The API for deleting an organization custom profile field is supposed to be restricted to organization administrators, but its handler failed to check that the field belongs to the same organization as the user. Therefore, an administrator of any organization was incorrectly allowed to delete custom profile fields belonging to a different organization. This is fixed in Zulip Server 10.1."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N",
|
||||
"baseScore": 2.7,
|
||||
"baseSeverity": "LOW",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-566"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/zulip/zulip/security/advisories/GHSA-fcgx-q63f-7gw4",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
141
CVE-2025/CVE-2025-30xx/CVE-2025-3001.json
Normal file
141
CVE-2025/CVE-2025-30xx/CVE-2025-3001.json
Normal file
@ -0,0 +1,141 @@
|
||||
{
|
||||
"id": "CVE-2025-3001",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-03-31T16:15:27.277",
|
||||
"lastModified": "2025-03-31T16:15:27.277",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability classified as critical was found in PyTorch 2.6.0. This vulnerability affects the function torch.lstm_cell. The manipulation leads to memory corruption. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 4.8,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "LOW",
|
||||
"vulnIntegrityImpact": "LOW",
|
||||
"vulnAvailabilityImpact": "LOW",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:L/AC:L/Au:S/C:P/I:P/A:P",
|
||||
"baseScore": 4.3,
|
||||
"accessVector": "LOCAL",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL"
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-119"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/pytorch/pytorch/issues/149626",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/pytorch/pytorch/issues/149626#issue-2935860995",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.302050",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.302050",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.524212",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
141
CVE-2025/CVE-2025-30xx/CVE-2025-3002.json
Normal file
141
CVE-2025/CVE-2025-30xx/CVE-2025-3002.json
Normal file
@ -0,0 +1,141 @@
|
||||
{
|
||||
"id": "CVE-2025-3002",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-03-31T16:15:27.440",
|
||||
"lastModified": "2025-03-31T16:15:27.440",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability, which was classified as critical, has been found in Digital China DCME-520 up to 20250320. This issue affects some unknown processing of the file /usr/local/WWW/function/audit/newstatistics/mon_merge_stat_hist.php. The manipulation of the argument type_name leads to os command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 6.9,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "LOW",
|
||||
"vulnIntegrityImpact": "LOW",
|
||||
"vulnAvailabilityImpact": "LOW",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||||
"baseScore": 7.3,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||||
"baseScore": 7.5,
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "NONE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL"
|
||||
},
|
||||
"baseSeverity": "HIGH",
|
||||
"exploitabilityScore": 10.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-77"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-78"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Fizz-L/CVE1/blob/main/DCME-520%20Remote%20command%20execution.md",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.302051",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.302051",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.524225",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
141
CVE-2025/CVE-2025-30xx/CVE-2025-3003.json
Normal file
141
CVE-2025/CVE-2025-30xx/CVE-2025-3003.json
Normal file
@ -0,0 +1,141 @@
|
||||
{
|
||||
"id": "CVE-2025-3003",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-03-31T17:15:43.557",
|
||||
"lastModified": "2025-03-31T17:15:43.557",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability, which was classified as critical, was found in ESAFENET CDG 3. Affected is an unknown function of the file /CDGServer3/UserAjax. The manipulation of the argument Username leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "LOW",
|
||||
"vulnIntegrityImpact": "LOW",
|
||||
"vulnAvailabilityImpact": "LOW",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
||||
"baseScore": 6.5,
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL"
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-74"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/zian10001/cve/blob/main/sql.md",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.302052",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.302052",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.524230",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
145
CVE-2025/CVE-2025-30xx/CVE-2025-3004.json
Normal file
145
CVE-2025/CVE-2025-30xx/CVE-2025-3004.json
Normal file
@ -0,0 +1,145 @@
|
||||
{
|
||||
"id": "CVE-2025-3004",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-03-31T17:15:43.757",
|
||||
"lastModified": "2025-03-31T17:15:43.757",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability has been found in Sayski ForestBlog up to 20250321 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /search. The manipulation of the argument keywords leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 5.1,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "PASSIVE",
|
||||
"vulnConfidentialityImpact": "NONE",
|
||||
"vulnIntegrityImpact": "LOW",
|
||||
"vulnAvailabilityImpact": "NONE",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
|
||||
"baseScore": 3.5,
|
||||
"baseSeverity": "LOW",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
|
||||
"baseScore": 4.0,
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 2.9,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-94"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/saysky/ForestBlog/issues/104",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/saysky/ForestBlog/issues/104#issue-2937118096",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.302053",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.302053",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.524484",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
108
CVE-2025/CVE-2025-30xx/CVE-2025-3047.json
Normal file
108
CVE-2025/CVE-2025-30xx/CVE-2025-3047.json
Normal file
@ -0,0 +1,108 @@
|
||||
{
|
||||
"id": "CVE-2025-3047",
|
||||
"sourceIdentifier": "ff89ba41-3aa1-4d27-914a-91399e9639e5",
|
||||
"published": "2025-03-31T16:15:27.683",
|
||||
"lastModified": "2025-03-31T17:15:43.953",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "When running the AWS Serverless Application Model Command Line Interface (SAM CLI) build process with Docker and symlinks are included in the build files, the container environment allows a user to access privileged files on the host by leveraging the elevated permissions granted to the tool. A user could leverage the elevated permissions to access restricted files via symlinks and copy them to a more permissive location on the container. \n\nUsers should upgrade to v1.133.0 or newer and ensure any forked or derivative code is patched to incorporate the new fixes."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "ff89ba41-3aa1-4d27-914a-91399e9639e5",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 6.9,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "ACTIVE",
|
||||
"vulnConfidentialityImpact": "HIGH",
|
||||
"vulnIntegrityImpact": "NONE",
|
||||
"vulnAvailabilityImpact": "NONE",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "ff89ba41-3aa1-4d27-914a-91399e9639e5",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "ff89ba41-3aa1-4d27-914a-91399e9639e5",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-22"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-497"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://aws.amazon.com/security/security-bulletins/AWS-2025-008/",
|
||||
"source": "ff89ba41-3aa1-4d27-914a-91399e9639e5"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/aws/aws-sam-cli/security/advisories/GHSA-px37-jpqx-97q9",
|
||||
"source": "ff89ba41-3aa1-4d27-914a-91399e9639e5"
|
||||
}
|
||||
]
|
||||
}
|
108
CVE-2025/CVE-2025-30xx/CVE-2025-3048.json
Normal file
108
CVE-2025/CVE-2025-30xx/CVE-2025-3048.json
Normal file
@ -0,0 +1,108 @@
|
||||
{
|
||||
"id": "CVE-2025-3048",
|
||||
"sourceIdentifier": "ff89ba41-3aa1-4d27-914a-91399e9639e5",
|
||||
"published": "2025-03-31T16:15:27.857",
|
||||
"lastModified": "2025-03-31T17:15:44.067",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "After completing a build with AWS Serverless Application Model Command Line Interface (SAM CLI) which include symlinks, the content of those symlinks are copied to the cache of the local workspace as regular files or directories. As a result, a user who does not have access to those symlinks outside of the Docker container would now have access via the local workspace.\n\nUsers should upgrade to version 1.134.0 and ensure any forked or derivative code is patched to incorporate the new fixes. After upgrading, users must re-build their applications using the sam build --use-container to update the symlinks."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "ff89ba41-3aa1-4d27-914a-91399e9639e5",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 6.9,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "ACTIVE",
|
||||
"vulnConfidentialityImpact": "HIGH",
|
||||
"vulnIntegrityImpact": "NONE",
|
||||
"vulnAvailabilityImpact": "NONE",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "ff89ba41-3aa1-4d27-914a-91399e9639e5",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "ff89ba41-3aa1-4d27-914a-91399e9639e5",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-22"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-497"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://aws.amazon.com/security/security-bulletins/AWS-2025-008/",
|
||||
"source": "ff89ba41-3aa1-4d27-914a-91399e9639e5"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/aws/aws-sam-cli/security/advisories/GHSA-pp64-wj43-xqcr",
|
||||
"source": "ff89ba41-3aa1-4d27-914a-91399e9639e5"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2025/CVE-2025-311xx/CVE-2025-31116.json
Normal file
60
CVE-2025/CVE-2025-311xx/CVE-2025-31116.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2025-31116",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-03-31T17:15:42.663",
|
||||
"lastModified": "2025-03-31T17:15:42.663",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Mobile Security Framework (MobSF) is a pen-testing, malware analysis and security assessment framework capable of performing static and dynamic analysis. The mitigation for CVE-2024-29190 in valid_host() uses socket.gethostbyname(), which is vulnerable to SSRF abuse using DNS rebinding technique. This vulnerability is fixed in 4.3.2."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:N/A:L",
|
||||
"baseScore": 4.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 1.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-918"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/MobSF/Mobile-Security-Framework-MobSF/commit/4b8bab5a9858c69fe13be4631b82d82186e0d3bd",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/MobSF/Mobile-Security-Framework-MobSF/security/advisories/GHSA-fcfq-m8p6-gw56",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
82
CVE-2025/CVE-2025-311xx/CVE-2025-31117.json
Normal file
82
CVE-2025/CVE-2025-311xx/CVE-2025-31117.json
Normal file
@ -0,0 +1,82 @@
|
||||
{
|
||||
"id": "CVE-2025-31117",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-03-31T17:15:42.833",
|
||||
"lastModified": "2025-03-31T17:15:42.833",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "OpenEMR is a free and open source electronic health records and medical practice management application. An Out-of-Band Server-Side Request Forgery (OOB SSRF) vulnerability was identified in OpenEMR, allowing an attacker to force the server to make unauthorized requests to external or internal resources. this attack does not return a direct response but can be exploited through DNS or HTTP interactions to exfiltrate sensitive information. This vulnerability is fixed in 7.0.3.1."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 6.9,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "LOW",
|
||||
"vulnIntegrityImpact": "NONE",
|
||||
"vulnAvailabilityImpact": "NONE",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-918"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/openemr/openemr/commit/aa6f50efb2971285633fa77ea7a50949408cab12",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/openemr/openemr/security/advisories/GHSA-2pvv-ph3x-2f9h",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
86
CVE-2025/CVE-2025-311xx/CVE-2025-31122.json
Normal file
86
CVE-2025/CVE-2025-311xx/CVE-2025-31122.json
Normal file
@ -0,0 +1,86 @@
|
||||
{
|
||||
"id": "CVE-2025-31122",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-03-31T17:15:42.997",
|
||||
"lastModified": "2025-03-31T17:15:42.997",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "scratch-coding-hut.github.io is the website for Coding Hut. In 1.0-beta3 and earlier, the login link can be used to login to any account by changing the username in the username field."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 9.0,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"attackRequirements": "PRESENT",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "PASSIVE",
|
||||
"vulnConfidentialityImpact": "HIGH",
|
||||
"vulnIntegrityImpact": "HIGH",
|
||||
"vulnAvailabilityImpact": "HIGH",
|
||||
"subConfidentialityImpact": "HIGH",
|
||||
"subIntegrityImpact": "HIGH",
|
||||
"subAvailabilityImpact": "HIGH",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-287"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-290"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Scratch-Coding-Hut/Scratch-Coding-Hut.github.io/issues/56",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/Scratch-Coding-Hut/Scratch-Coding-Hut/security/advisories/GHSA-mmg3-567w-v9j2",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
64
CVE-2025/CVE-2025-311xx/CVE-2025-31125.json
Normal file
64
CVE-2025/CVE-2025-311xx/CVE-2025-31125.json
Normal file
@ -0,0 +1,64 @@
|
||||
{
|
||||
"id": "CVE-2025-31125",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-03-31T17:15:43.163",
|
||||
"lastModified": "2025-03-31T17:15:43.163",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Vite is a frontend tooling framework for javascript. Vite exposes content of non-allowed files using ?inline&import or ?raw?import. Only apps explicitly exposing the Vite dev server to the network (using --host or server.host config option) are affected. This vulnerability is fixed in 6.2.4, 6.1.3, 6.0.13, 5.4.16, and 4.5.11."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.6,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-200"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-284"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/vitejs/vite/commit/59673137c45ac2bcfad1170d954347c1a17ab949",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/vitejs/vite/security/advisories/GHSA-4r4m-qw57-chr8",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
94
README.md
94
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2025-03-31T16:00:20.084323+00:00
|
||||
2025-03-31T18:00:20.010490+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2025-03-31T15:15:52.177000+00:00
|
||||
2025-03-31T17:58:22.347000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,53 +33,69 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
287491
|
||||
287520
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `13`
|
||||
Recently added CVEs: `29`
|
||||
|
||||
- [CVE-2023-0881](CVE-2023/CVE-2023-08xx/CVE-2023-0881.json) (`2025-03-31T14:15:18.090`)
|
||||
- [CVE-2023-33302](CVE-2023/CVE-2023-333xx/CVE-2023-33302.json) (`2025-03-31T15:15:41.680`)
|
||||
- [CVE-2024-12021](CVE-2024/CVE-2024-120xx/CVE-2024-12021.json) (`2025-03-31T14:15:18.303`)
|
||||
- [CVE-2025-22937](CVE-2025/CVE-2025-229xx/CVE-2025-22937.json) (`2025-03-31T15:15:43.417`)
|
||||
- [CVE-2025-22938](CVE-2025/CVE-2025-229xx/CVE-2025-22938.json) (`2025-03-31T15:15:43.530`)
|
||||
- [CVE-2025-22939](CVE-2025/CVE-2025-229xx/CVE-2025-22939.json) (`2025-03-31T15:15:43.650`)
|
||||
- [CVE-2025-22940](CVE-2025/CVE-2025-229xx/CVE-2025-22940.json) (`2025-03-31T15:15:43.763`)
|
||||
- [CVE-2025-22941](CVE-2025/CVE-2025-229xx/CVE-2025-22941.json) (`2025-03-31T15:15:43.873`)
|
||||
- [CVE-2025-2997](CVE-2025/CVE-2025-29xx/CVE-2025-2997.json) (`2025-03-31T14:15:20.137`)
|
||||
- [CVE-2025-2998](CVE-2025/CVE-2025-29xx/CVE-2025-2998.json) (`2025-03-31T14:15:20.370`)
|
||||
- [CVE-2025-2999](CVE-2025/CVE-2025-29xx/CVE-2025-2999.json) (`2025-03-31T15:15:44.657`)
|
||||
- [CVE-2025-3000](CVE-2025/CVE-2025-30xx/CVE-2025-3000.json) (`2025-03-31T15:15:46.297`)
|
||||
- [CVE-2025-30095](CVE-2025/CVE-2025-300xx/CVE-2025-30095.json) (`2025-03-31T15:15:44.843`)
|
||||
- [CVE-2025-2794](CVE-2025/CVE-2025-27xx/CVE-2025-2794.json) (`2025-03-31T17:15:41.333`)
|
||||
- [CVE-2025-29766](CVE-2025/CVE-2025-297xx/CVE-2025-29766.json) (`2025-03-31T16:15:23.897`)
|
||||
- [CVE-2025-29772](CVE-2025/CVE-2025-297xx/CVE-2025-29772.json) (`2025-03-31T16:15:24.063`)
|
||||
- [CVE-2025-29929](CVE-2025/CVE-2025-299xx/CVE-2025-29929.json) (`2025-03-31T16:15:24.237`)
|
||||
- [CVE-2025-30004](CVE-2025/CVE-2025-300xx/CVE-2025-30004.json) (`2025-03-31T17:15:41.737`)
|
||||
- [CVE-2025-30005](CVE-2025/CVE-2025-300xx/CVE-2025-30005.json) (`2025-03-31T17:15:41.880`)
|
||||
- [CVE-2025-30006](CVE-2025/CVE-2025-300xx/CVE-2025-30006.json) (`2025-03-31T17:15:42.020`)
|
||||
- [CVE-2025-3001](CVE-2025/CVE-2025-30xx/CVE-2025-3001.json) (`2025-03-31T16:15:27.277`)
|
||||
- [CVE-2025-3002](CVE-2025/CVE-2025-30xx/CVE-2025-3002.json) (`2025-03-31T16:15:27.440`)
|
||||
- [CVE-2025-3003](CVE-2025/CVE-2025-30xx/CVE-2025-3003.json) (`2025-03-31T17:15:43.557`)
|
||||
- [CVE-2025-3004](CVE-2025/CVE-2025-30xx/CVE-2025-3004.json) (`2025-03-31T17:15:43.757`)
|
||||
- [CVE-2025-30149](CVE-2025/CVE-2025-301xx/CVE-2025-30149.json) (`2025-03-31T16:15:25.040`)
|
||||
- [CVE-2025-30155](CVE-2025/CVE-2025-301xx/CVE-2025-30155.json) (`2025-03-31T16:15:25.187`)
|
||||
- [CVE-2025-30161](CVE-2025/CVE-2025-301xx/CVE-2025-30161.json) (`2025-03-31T16:15:25.333`)
|
||||
- [CVE-2025-30203](CVE-2025/CVE-2025-302xx/CVE-2025-30203.json) (`2025-03-31T16:15:25.473`)
|
||||
- [CVE-2025-30209](CVE-2025/CVE-2025-302xx/CVE-2025-30209.json) (`2025-03-31T16:15:25.620`)
|
||||
- [CVE-2025-30223](CVE-2025/CVE-2025-302xx/CVE-2025-30223.json) (`2025-03-31T17:15:42.147`)
|
||||
- [CVE-2025-30368](CVE-2025/CVE-2025-303xx/CVE-2025-30368.json) (`2025-03-31T17:15:42.320`)
|
||||
- [CVE-2025-30369](CVE-2025/CVE-2025-303xx/CVE-2025-30369.json) (`2025-03-31T17:15:42.497`)
|
||||
- [CVE-2025-3047](CVE-2025/CVE-2025-30xx/CVE-2025-3047.json) (`2025-03-31T16:15:27.683`)
|
||||
- [CVE-2025-3048](CVE-2025/CVE-2025-30xx/CVE-2025-3048.json) (`2025-03-31T16:15:27.857`)
|
||||
- [CVE-2025-31116](CVE-2025/CVE-2025-311xx/CVE-2025-31116.json) (`2025-03-31T17:15:42.663`)
|
||||
- [CVE-2025-31117](CVE-2025/CVE-2025-311xx/CVE-2025-31117.json) (`2025-03-31T17:15:42.833`)
|
||||
- [CVE-2025-31122](CVE-2025/CVE-2025-311xx/CVE-2025-31122.json) (`2025-03-31T17:15:42.997`)
|
||||
- [CVE-2025-31125](CVE-2025/CVE-2025-311xx/CVE-2025-31125.json) (`2025-03-31T17:15:43.163`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `21`
|
||||
Recently modified CVEs: `28`
|
||||
|
||||
- [CVE-2016-2183](CVE-2016/CVE-2016-21xx/CVE-2016-2183.json) (`2025-03-31T15:15:36.993`)
|
||||
- [CVE-2022-37061](CVE-2022/CVE-2022-370xx/CVE-2022-37061.json) (`2025-03-31T14:15:15.197`)
|
||||
- [CVE-2022-3924](CVE-2022/CVE-2022-39xx/CVE-2022-3924.json) (`2025-03-31T14:15:16.573`)
|
||||
- [CVE-2023-0394](CVE-2023/CVE-2023-03xx/CVE-2023-0394.json) (`2025-03-31T15:15:38.913`)
|
||||
- [CVE-2023-0417](CVE-2023/CVE-2023-04xx/CVE-2023-0417.json) (`2025-03-31T15:15:39.153`)
|
||||
- [CVE-2023-22884](CVE-2023/CVE-2023-228xx/CVE-2023-22884.json) (`2025-03-31T15:15:39.513`)
|
||||
- [CVE-2024-11974](CVE-2024/CVE-2024-119xx/CVE-2024-11974.json) (`2025-03-31T14:00:33.780`)
|
||||
- [CVE-2024-20417](CVE-2024/CVE-2024-204xx/CVE-2024-20417.json) (`2025-03-31T14:51:28.773`)
|
||||
- [CVE-2024-20466](CVE-2024/CVE-2024-204xx/CVE-2024-20466.json) (`2025-03-31T14:18:26.427`)
|
||||
- [CVE-2024-40477](CVE-2024/CVE-2024-404xx/CVE-2024-40477.json) (`2025-03-31T15:15:52.177`)
|
||||
- [CVE-2024-43286](CVE-2024/CVE-2024-432xx/CVE-2024-43286.json) (`2025-03-31T15:03:49.690`)
|
||||
- [CVE-2024-43292](CVE-2024/CVE-2024-432xx/CVE-2024-43292.json) (`2025-03-31T15:01:39.163`)
|
||||
- [CVE-2024-57151](CVE-2024/CVE-2024-571xx/CVE-2024-57151.json) (`2025-03-31T15:15:42.897`)
|
||||
- [CVE-2025-0613](CVE-2025/CVE-2025-06xx/CVE-2025-0613.json) (`2025-03-31T15:15:43.133`)
|
||||
- [CVE-2025-0927](CVE-2025/CVE-2025-09xx/CVE-2025-0927.json) (`2025-03-31T15:15:43.270`)
|
||||
- [CVE-2025-1217](CVE-2025/CVE-2025-12xx/CVE-2025-1217.json) (`2025-03-31T14:15:18.850`)
|
||||
- [CVE-2025-24362](CVE-2025/CVE-2025-243xx/CVE-2025-24362.json) (`2025-03-31T14:15:18.993`)
|
||||
- [CVE-2025-2927](CVE-2025/CVE-2025-29xx/CVE-2025-2927.json) (`2025-03-31T15:15:44.097`)
|
||||
- [CVE-2025-2959](CVE-2025/CVE-2025-29xx/CVE-2025-2959.json) (`2025-03-31T15:15:44.230`)
|
||||
- [CVE-2025-2960](CVE-2025/CVE-2025-29xx/CVE-2025-2960.json) (`2025-03-31T15:15:44.353`)
|
||||
- [CVE-2025-2995](CVE-2025/CVE-2025-29xx/CVE-2025-2995.json) (`2025-03-31T15:15:44.477`)
|
||||
- [CVE-2024-27286](CVE-2024/CVE-2024-272xx/CVE-2024-27286.json) (`2025-03-31T17:15:39.877`)
|
||||
- [CVE-2024-28556](CVE-2024/CVE-2024-285xx/CVE-2024-28556.json) (`2025-03-31T16:28:08.810`)
|
||||
- [CVE-2024-28557](CVE-2024/CVE-2024-285xx/CVE-2024-28557.json) (`2025-03-31T16:28:59.380`)
|
||||
- [CVE-2024-3853](CVE-2024/CVE-2024-38xx/CVE-2024-3853.json) (`2025-03-31T16:32:46.433`)
|
||||
- [CVE-2024-3855](CVE-2024/CVE-2024-38xx/CVE-2024-3855.json) (`2025-03-31T17:05:19.390`)
|
||||
- [CVE-2024-3856](CVE-2024/CVE-2024-38xx/CVE-2024-3856.json) (`2025-03-31T17:01:41.797`)
|
||||
- [CVE-2024-3858](CVE-2024/CVE-2024-38xx/CVE-2024-3858.json) (`2025-03-31T16:47:40.163`)
|
||||
- [CVE-2024-3860](CVE-2024/CVE-2024-38xx/CVE-2024-3860.json) (`2025-03-31T16:46:41.977`)
|
||||
- [CVE-2024-3862](CVE-2024/CVE-2024-38xx/CVE-2024-3862.json) (`2025-03-31T16:45:53.620`)
|
||||
- [CVE-2024-44676](CVE-2024/CVE-2024-446xx/CVE-2024-44676.json) (`2025-03-31T16:15:21.393`)
|
||||
- [CVE-2024-44677](CVE-2024/CVE-2024-446xx/CVE-2024-44677.json) (`2025-03-31T16:15:22.023`)
|
||||
- [CVE-2024-46236](CVE-2024/CVE-2024-462xx/CVE-2024-46236.json) (`2025-03-31T17:49:13.670`)
|
||||
- [CVE-2024-46238](CVE-2024/CVE-2024-462xx/CVE-2024-46238.json) (`2025-03-31T17:52:15.150`)
|
||||
- [CVE-2024-46239](CVE-2024/CVE-2024-462xx/CVE-2024-46239.json) (`2025-03-31T17:52:58.943`)
|
||||
- [CVE-2024-48278](CVE-2024/CVE-2024-482xx/CVE-2024-48278.json) (`2025-03-31T17:27:44.297`)
|
||||
- [CVE-2024-48279](CVE-2024/CVE-2024-482xx/CVE-2024-48279.json) (`2025-03-31T17:19:22.290`)
|
||||
- [CVE-2024-48280](CVE-2024/CVE-2024-482xx/CVE-2024-48280.json) (`2025-03-31T17:18:48.330`)
|
||||
- [CVE-2024-48282](CVE-2024/CVE-2024-482xx/CVE-2024-48282.json) (`2025-03-31T17:12:33.610`)
|
||||
- [CVE-2024-48709](CVE-2024/CVE-2024-487xx/CVE-2024-48709.json) (`2025-03-31T17:58:22.347`)
|
||||
- [CVE-2024-48744](CVE-2024/CVE-2024-487xx/CVE-2024-48744.json) (`2025-03-31T17:47:09.433`)
|
||||
- [CVE-2024-9403](CVE-2024/CVE-2024-94xx/CVE-2024-9403.json) (`2025-03-31T17:45:09.633`)
|
||||
- [CVE-2024-9936](CVE-2024/CVE-2024-99xx/CVE-2024-9936.json) (`2025-03-31T17:42:12.170`)
|
||||
- [CVE-2025-1398](CVE-2025/CVE-2025-13xx/CVE-2025-1398.json) (`2025-03-31T16:15:22.463`)
|
||||
- [CVE-2025-28096](CVE-2025/CVE-2025-280xx/CVE-2025-28096.json) (`2025-03-31T17:15:40.403`)
|
||||
- [CVE-2025-2963](CVE-2025/CVE-2025-29xx/CVE-2025-2963.json) (`2025-03-31T16:15:24.443`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
153
_state.csv
153
_state.csv
@ -85562,7 +85562,7 @@ CVE-2016-2179,0,0,9f60e3d4acc8222b602f450530ac166eadef4047f60a0c476ff9803dc6219b
|
||||
CVE-2016-2180,0,0,fa81fd6136a9a82d89a856be8f0f57653963db9974979acb2858e97e4630bf81,2024-11-21T02:47:58.547000
|
||||
CVE-2016-2181,0,0,fbb52cab3b703d8b47534383d318363da4b805e6c179bf39656ff9546d73de4b,2024-11-21T02:47:58.720000
|
||||
CVE-2016-2182,0,0,62afa0381ffd513576caac396814d0811104ec3b85d8c23a9d1b8c7817638af3,2024-11-21T02:47:58.897000
|
||||
CVE-2016-2183,0,1,af22c58ec8d3b77e934bf48fd8355af221903338ecaaff76d10885a8b76da58b,2025-03-31T15:15:36.993000
|
||||
CVE-2016-2183,0,0,af22c58ec8d3b77e934bf48fd8355af221903338ecaaff76d10885a8b76da58b,2025-03-31T15:15:36.993000
|
||||
CVE-2016-2184,0,0,0e7b4277c466f6b309d0e0a4fdcf9c738b8c7e2a898c5ae7333fb892afb80eb2,2024-11-21T02:47:59.530000
|
||||
CVE-2016-2185,0,0,086d8f8b9325fa871bb7bfd90fd95e2bf43114989decf5d2d38917de24724da5,2024-11-21T02:47:59.670000
|
||||
CVE-2016-2186,0,0,c3ad1af878365442c3742ab97859252d46d8926a5b5e7cab8dc43f2310ccd3ec,2024-11-21T02:47:59.820000
|
||||
@ -204408,7 +204408,7 @@ CVE-2022-37057,0,0,dd28037e644edafa9fd9e43757050b1d91726f01db98eaf62a98a6312337c
|
||||
CVE-2022-37059,0,0,2eefb354470e4941edf10d216ad1f91f19208928aef8952c5bb7ab53efbd8d1c,2024-11-21T07:14:22.337000
|
||||
CVE-2022-3706,0,0,e12338ac6ae091430a77dc88b3adb48260db8ec44fe506086ed6dcd27e6a25c4,2024-11-21T07:20:04.717000
|
||||
CVE-2022-37060,0,0,43a883b8c68a5c0b6116ba4a6c7058f0ec351ee738110f987aebb18f21bc268b,2024-11-21T07:14:22.480000
|
||||
CVE-2022-37061,0,1,5687fb2b1e74985531cbecfa25addf42fa394b8e7f3552eda62d6a685147e575,2025-03-31T14:15:15.197000
|
||||
CVE-2022-37061,0,0,5687fb2b1e74985531cbecfa25addf42fa394b8e7f3552eda62d6a685147e575,2025-03-31T14:15:15.197000
|
||||
CVE-2022-37062,0,0,96eedd6bd29fd90e04130772ee074ee8f75c0713ea1f23c044fe68fc4cb09ca0,2024-11-21T07:14:22.800000
|
||||
CVE-2022-37063,0,0,88975c33afad573c4464d99788c36e77aabd7d993dae8e57ec2925b7a35844c6,2024-11-21T07:14:22.953000
|
||||
CVE-2022-37066,0,0,3603301812180d84146d124736f3266dbc1d2e646ff007840b9e5e7958d40f8a,2024-11-21T07:14:23.107000
|
||||
@ -206014,7 +206014,7 @@ CVE-2022-39236,0,0,4aba6cf1b1da8e04b4e0e955f519b8f8bb70a4a48dccbd50c85f3e0c5848c
|
||||
CVE-2022-39237,0,0,6e7c6974afdcc12edc956beb059554b330323e80aea336213cbe424ad28feac0,2024-11-21T07:17:50.937000
|
||||
CVE-2022-39238,0,0,a7e308f4bd8f72dc9cb22d1c1b03e175eba0742ac295f87835c9e0fdbdee7c79,2024-11-21T07:17:51.070000
|
||||
CVE-2022-39239,0,0,6ac0387d5b23962770db58751c26de07a375938fabdc82e5139738ec15b38bf1,2024-11-21T07:17:51.197000
|
||||
CVE-2022-3924,0,1,83ed3bc022ce678d9d91200eac718b3ad831bf4a9bf7ec02ab2394970dee8ec9,2025-03-31T14:15:16.573000
|
||||
CVE-2022-3924,0,0,83ed3bc022ce678d9d91200eac718b3ad831bf4a9bf7ec02ab2394970dee8ec9,2025-03-31T14:15:16.573000
|
||||
CVE-2022-39240,0,0,574fb0c69dcfd27164730e96d0acc7d8035092d765d078a8f27e954509d92cc9,2024-11-21T07:17:51.320000
|
||||
CVE-2022-39241,0,0,2806610c35cbf7d966508b3734dd2f815fdb99b0730bc86d8a734af49a77bb82,2024-11-21T07:17:51.443000
|
||||
CVE-2022-39242,0,0,c2854b91b592e74ae97dd2b0a4f92ce655df87f1d07fb5a2137aa47a2e4c2e51,2024-11-21T07:17:51.587000
|
||||
@ -211711,7 +211711,7 @@ CVE-2022-46959,0,0,4992a7296b32dd1da9d066071bb1ce89f041328ca14b39d4397648c95b53b
|
||||
CVE-2022-4696,0,0,d18a6555347b2450931b7a4499108c5f3c4aef62c5e374495c248bc437d3d913,2024-11-21T07:35:45.190000
|
||||
CVE-2022-46965,0,0,4e2cf60cfa574761bac515bacf7768a3ec05fd5353442e98aba963404ab9629a,2025-03-27T14:15:20.163000
|
||||
CVE-2022-46966,0,0,070bf64185beec1d346f1eb3fcc535a9f501d6d7759507c69e62ea1dfb763c47,2024-11-21T07:31:21.080000
|
||||
CVE-2022-46967,0,0,7b5e0d7e72e3dba5d588a35fb64ffdf40088372a48d9222c2905273c82086be6,2024-11-21T07:31:21.360000
|
||||
CVE-2022-46967,0,1,db1d49834dbac2db39989305d0b84f902500e6c1221bfdbbf947b0273d687e0c,2025-03-31T17:15:37.973000
|
||||
CVE-2022-46968,0,0,0208b36a8bfd03989c26bf3b2cceaca71901f6441bc3e8e9efb8b016ba393792,2025-03-28T16:15:22.580000
|
||||
CVE-2022-4697,0,0,ad89b868601a9ba1e1629711513619cb8b72f79f4c09c78c936137424c983ef0,2024-11-21T07:35:45.327000
|
||||
CVE-2022-46973,0,0,02f31245f89b4e77731b222a3c297a409df5dca3c97428837fcdf4b5f1b09476,2025-03-07T17:15:15.877000
|
||||
@ -212311,7 +212311,7 @@ CVE-2022-47946,0,0,512ed265f5f8e2053f93c8b548e53ea74178f3bdd6c19af0a1fcbc931faca
|
||||
CVE-2022-47949,0,0,490a763e6d17ab1fc8c624b1038948c1372fdf786573e9cb1855d758b34eda63,2024-11-21T07:32:37.143000
|
||||
CVE-2022-4795,0,0,ed27ef11464e6f253a296b2a64c7406c8080be0dbb66b0e082bcd0dd311616ed,2025-03-10T18:15:24.950000
|
||||
CVE-2022-47950,0,0,003354ded967d7f0656182efcdefcb02844991e48622def15771f5148d7f730b,2024-11-21T07:32:37.363000
|
||||
CVE-2022-47951,0,0,481e357c755abcd47148b16b7b723bb646738cb20fb8e6121dbb931406f4c0c1,2024-11-21T07:32:37.573000
|
||||
CVE-2022-47951,0,1,e2d996ac11f4531610b951008a6011dd374a562e27e6c5266b3be479b0d71509,2025-03-31T17:15:39.117000
|
||||
CVE-2022-47952,0,0,2f28f68ee06c7145a4aa6bad466be343ed19ade0a3002280dd2cc93acd595e0e,2024-11-21T07:32:37.827000
|
||||
CVE-2022-4796,0,0,56d14c71fffb78b2873b1d8a825236ed65f48496e5c8739756b40cba27fa5ead,2024-11-21T07:35:57.490000
|
||||
CVE-2022-47965,0,0,e13f03af61110d5d88bf9b0758fc287c18c6e313089390eab76658b679a74adb,2024-11-21T07:32:38.080000
|
||||
@ -214396,7 +214396,7 @@ CVE-2023-0388,0,0,5f1a60fe199f4d73e08beaa633f10d20147801316a80c66ee5f23ab208abc5
|
||||
CVE-2023-0389,0,0,d3a6859917d00580d863b1cc40656754ef4aae3a0ed0d7ace8ca00904f8449e6,2024-11-21T07:37:05.903000
|
||||
CVE-2023-0391,0,0,4ff4461dc52966f2e7c25d0686259ce837e898d51f19b1fde13e9099f009e156,2025-02-26T17:15:14.073000
|
||||
CVE-2023-0392,0,0,8a7a998dac312487f8c5dc9b83d0872c5c624db0d1b91b751bbaa7822fdc6d5c,2024-11-21T07:37:06.157000
|
||||
CVE-2023-0394,0,1,ea3ff168d36340211d073cabbd8917b58238be41d97ededb768922e0a1802f52,2025-03-31T15:15:38.913000
|
||||
CVE-2023-0394,0,0,ea3ff168d36340211d073cabbd8917b58238be41d97ededb768922e0a1802f52,2025-03-31T15:15:38.913000
|
||||
CVE-2023-0395,0,0,e433e7fd12f29bb1b0de0990175e4e13bce1ca11a518d400756db9b100437213,2025-02-19T15:15:12.247000
|
||||
CVE-2023-0396,0,0,1be377631e714aa8ef92ed0548b0b781bbd48621034c742f01ad91bc2f7fcec5,2024-11-21T07:37:06.553000
|
||||
CVE-2023-0397,0,0,197e26da31aa22aa78ea48679e09ec7e4621676cd3604c156afc4fc6e8a9016b,2024-11-21T07:37:06.663000
|
||||
@ -214416,7 +214416,7 @@ CVE-2023-0413,0,0,26d467c51e417ae368cf547afa407efff55b2aaeba44c26010c18eef31a9d4
|
||||
CVE-2023-0414,0,0,d3f536779f98376578774ff261c29d036db38aa7a85f2f25342099cead78dae7,2024-11-21T07:37:08.253000
|
||||
CVE-2023-0415,0,0,04324db8bc4161d859e18a28327ff7b444d470205045798e2f6bd7626c2d4d3e,2024-11-21T07:37:08.367000
|
||||
CVE-2023-0416,0,0,16b28f1c11746fbb38d098a4799a60c92ca5c19b461f8aca08efbd073347b7d4,2024-11-21T07:37:08.487000
|
||||
CVE-2023-0417,0,1,2e83221fa6a69d4372edcc9fa1e4fef6765ff94f59d0558ed8a93a38f9198662,2025-03-31T15:15:39.153000
|
||||
CVE-2023-0417,0,0,2e83221fa6a69d4372edcc9fa1e4fef6765ff94f59d0558ed8a93a38f9198662,2025-03-31T15:15:39.153000
|
||||
CVE-2023-0418,0,0,819a457a433306a0dd9add7af25abdeb3cf905f1304a3e9cd8ae7d29f7ea96ee,2025-02-04T17:15:10.027000
|
||||
CVE-2023-0419,0,0,1d20b4d83c6845daf58fd97e5bf5c6ae6e271c7a3593be4ee8a28efd474e2de6,2025-03-12T16:15:18.603000
|
||||
CVE-2023-0420,0,0,efbd484e47e5cf3e8618a62fa355c2b766712cb02a4c72c87e01ddf140e460f6,2025-02-04T19:15:27.130000
|
||||
@ -214861,7 +214861,7 @@ CVE-2023-0877,0,0,f7c5614fc818a77141babc941498bef6d62ec80b7a35eecd6cb52b4a6ea6a2
|
||||
CVE-2023-0878,0,0,73513b4cb79465a825fc6fe4097e2d92697ed53944759ed1b3ed8e720981e051,2024-11-21T07:38:01.403000
|
||||
CVE-2023-0879,0,0,c9bd45ba28893eb756363d2bd10f5dc9c0dcccb0bccc348a8a17ac34201ad6b6,2024-11-21T07:38:01.520000
|
||||
CVE-2023-0880,0,0,b70505a20c36b1724631108c617ecb0187165091566214579e6d68e63f2f6fc0,2024-11-21T07:38:01.653000
|
||||
CVE-2023-0881,1,1,3dd07f4b34df20f9dcd0dd3478ff6b0947c77ebed67ef6ff3f1038369088312d,2025-03-31T14:15:18.090000
|
||||
CVE-2023-0881,0,0,3dd07f4b34df20f9dcd0dd3478ff6b0947c77ebed67ef6ff3f1038369088312d,2025-03-31T14:15:18.090000
|
||||
CVE-2023-0882,0,0,be783d81d43022a661616ff88862949c4c4621b4987ce67aee41b6bcccab6ef9,2024-11-21T07:38:01.773000
|
||||
CVE-2023-0883,0,0,4376ce51f945727b1c84e92d613ae08b49509fa376d3fe611123367a4e8bb807,2024-11-21T07:38:01.897000
|
||||
CVE-2023-0884,0,0,8a838a456506801d1bf6b5da5bfb07117c80ec5e44975a1c6bf776f379c23430,2023-11-07T04:01:46.887000
|
||||
@ -218504,7 +218504,7 @@ CVE-2023-22880,0,0,786edf794c2e59197afe94b76fe0115c4b7b61c56448ea1fb2ca281a69eb2
|
||||
CVE-2023-22881,0,0,ffa870a10c79aa638c67c74c88b8d93c93d9739d13d9c285241c0c02d782ce81,2024-11-21T07:45:34.320000
|
||||
CVE-2023-22882,0,0,8645fc0f24fadda1592adfbecb6c291c838b5a79a6485e937a29727f3fbe11d0,2024-11-21T07:45:34.450000
|
||||
CVE-2023-22883,0,0,3991b123acabaa08b801a5f442e4c18a95e5c6cba29db545ac870dbc5a615393,2024-11-21T07:45:34.580000
|
||||
CVE-2023-22884,0,1,337678ba5c632b17ba1879e64056dd8f3282e63eaf198dc23f1ab9f6b6cde708,2025-03-31T15:15:39.513000
|
||||
CVE-2023-22884,0,0,337678ba5c632b17ba1879e64056dd8f3282e63eaf198dc23f1ab9f6b6cde708,2025-03-31T15:15:39.513000
|
||||
CVE-2023-22885,0,0,2f0912bee282864da45fe9a8cfc9d03fb4e1df60f2665b9327dad841ca415696,2023-11-07T04:07:29.027000
|
||||
CVE-2023-22886,0,0,deca26cbd59ff4ad06ee92feefc7369951dfff2be007df24addbfc14d2089e99,2024-11-21T07:45:34.853000
|
||||
CVE-2023-22887,0,0,9500df946dba5534f211144e9851e9d48e0ee8ec0c089e042d11b59806b35ea6,2024-11-21T07:45:35.050000
|
||||
@ -226898,7 +226898,7 @@ CVE-2023-33299,0,0,27187b22bcf5b692e8c22c11eab27d8b578f609f08467595ce9608c2ca052
|
||||
CVE-2023-3330,0,0,79701b2c45499bdd043c812cb833ad5abf5c67d1a07608a303232abd8861bd69,2024-11-21T08:17:01.777000
|
||||
CVE-2023-33300,0,0,e8e3405c5b6361a1b0ae303b471db9510f640f26dfa1345b18633e0ee1169b04,2025-03-14T16:15:27.203000
|
||||
CVE-2023-33301,0,0,07e39c7bf3a5bc42efb1d0e586c8f3f0fcc618e7ae8db0cea8c4f55191f28f4b,2024-11-21T08:05:22.220000
|
||||
CVE-2023-33302,1,1,144e057c920b87de4a0f0575b5f632dadf1824ac645dab0577f68dbebce3147d,2025-03-31T15:15:41.680000
|
||||
CVE-2023-33302,0,0,144e057c920b87de4a0f0575b5f632dadf1824ac645dab0577f68dbebce3147d,2025-03-31T15:15:41.680000
|
||||
CVE-2023-33303,0,0,5ed83ae2fd8f092fd97b465a3e790ef17cec97f8c1f34227abaa3684eb09991c,2024-11-21T08:05:22.373000
|
||||
CVE-2023-33304,0,0,e286c62da84928042225cc8f2918434951acd6f76bb76b4459304cd2bac3ec39,2024-11-21T08:05:22.530000
|
||||
CVE-2023-33305,0,0,dbd1d893ac16204711a7d41b6ca1081ab6d21b9c33c6dc9a0e829a5e152321f1,2024-11-21T08:05:22.690000
|
||||
@ -246436,7 +246436,7 @@ CVE-2024-11970,0,0,32dc5ec7aec937b80794045756cdb85326a90b3bfc25b4702c64990526e96
|
||||
CVE-2024-11971,0,0,05a328b969201591bf5658992e390aef14aec7c89bfc8198c4927b19717108eb,2024-12-03T20:04:46.493000
|
||||
CVE-2024-11972,0,0,424587fa039b828712cb1884c1163244d01256a0bdacac0a3ceb996cedd795f8,2024-12-31T19:15:07.720000
|
||||
CVE-2024-11973,0,0,09d34ca9011760fd34330c9c7e372ea8a465e3a408c53b2a4fa8f77978915f63,2024-12-10T10:15:06.123000
|
||||
CVE-2024-11974,0,1,f9691e92702301b17493ed5f06dc50de13d97fad3e6cc188b655234af18734fc,2025-03-31T14:00:33.780000
|
||||
CVE-2024-11974,0,0,f9691e92702301b17493ed5f06dc50de13d97fad3e6cc188b655234af18734fc,2025-03-31T14:00:33.780000
|
||||
CVE-2024-11975,0,0,84cad561d2ec5c4dedd114d83278d4ca351957794503794e490beae7d9c6d982,2024-12-21T07:15:08.657000
|
||||
CVE-2024-11977,0,0,af26de0ab40c66a5abd33edf8cb265762cba41d602bcbe3508dca43ee46ada56,2024-12-21T06:15:21.830000
|
||||
CVE-2024-11978,0,0,ee6613517c5b5a8efee7de187c6205cef62cfcd4704997164fc2a04147cb6c76,2024-11-29T03:15:14.700000
|
||||
@ -246482,7 +246482,7 @@ CVE-2024-12018,0,0,593c05ac2f3dac4339301164983c309f8de674e944577becd0f305b7e0d23
|
||||
CVE-2024-12019,0,0,0f7a1ea913b0a02f0ec47078c5937b126bc080f3be46a32e0bdc7fc16fba8ab0,2025-03-14T18:15:27.230000
|
||||
CVE-2024-1202,0,0,a098cbd545693e5d361995e28174ffa246c4ae019a07a45a38ebe2abdfe163e3,2024-11-21T08:50:01.790000
|
||||
CVE-2024-12020,0,0,c0d6c6af387492d3dc90a21c48eea05ecb81c5912d598881f193476f9547d895,2025-03-14T18:15:27.370000
|
||||
CVE-2024-12021,1,1,32242659841756d64d92e55f1e042aad986b7f9968931e8820a7a85c21c6bc1e,2025-03-31T14:15:18.303000
|
||||
CVE-2024-12021,0,0,32242659841756d64d92e55f1e042aad986b7f9968931e8820a7a85c21c6bc1e,2025-03-31T14:15:18.303000
|
||||
CVE-2024-12022,0,0,4b0c4a5413ab235f6d4162bb8baa2320652f2e63275aee3944d2530558cd3296,2025-01-17T17:15:10.533000
|
||||
CVE-2024-12024,0,0,a8f5c653a0f41818f117c378be0858d1b5c96c482668ecfb6f6099471186e39b,2025-01-10T17:56:30.330000
|
||||
CVE-2024-12025,0,0,48a6a81843ce463d9a84b144c8201ecb34a901e35178968cb10c7b2b1d7242fe,2024-12-18T04:15:07.347000
|
||||
@ -248221,7 +248221,7 @@ CVE-2024-13800,0,0,db269d664e8ffceb549584ac138b0b3d8532020dce3ad8c5501401929c306
|
||||
CVE-2024-13801,0,0,6b81a2ef4a4e09dd2b073044ee14684c69b7e1700476947d0d1140f5e689a17b,2025-03-27T16:45:46.410000
|
||||
CVE-2024-13802,0,0,774d150df9948895bc1c8319c04951551fc49cae4e2c0e8ce41994610c382f58,2025-02-25T20:57:34.193000
|
||||
CVE-2024-13803,0,0,93a9df80fad16c66cdad18cf7b08a600f14f988ff84d4f170dbb9b255e8d0a90,2025-02-26T13:15:38.027000
|
||||
CVE-2024-13804,0,0,25259920d77e123155d53c4374e413698b48a5e08bf9f3c7e1f59089683c3825,2025-03-30T22:15:14.510000
|
||||
CVE-2024-13804,0,1,ae4b1caa4c90fb7ea256e8da3da67550cecd7437642a9b7219998db1fc9827da,2025-03-31T16:15:19.670000
|
||||
CVE-2024-13805,0,0,ab23ddffd79c9236654dca87d416c22cef2f181f71a6522374ad6bbab1e39bf2,2025-03-07T10:15:16.123000
|
||||
CVE-2024-13806,0,0,2b103acb686ba11654b3e2c5ab41948ab81fbeb9ed340b778f561b48dfe3cc2f,2025-03-01T08:15:33.653000
|
||||
CVE-2024-13809,0,0,0560f3b13a50d69c775a261a59e91c9ab0b720365e711ebd048429107113c32d,2025-03-05T10:15:17.313000
|
||||
@ -249259,7 +249259,7 @@ CVE-2024-20413,0,0,c74574601545b52b08a203f184fb98aef132a438c49280c58ccaf64e34bb3
|
||||
CVE-2024-20414,0,0,3d6652417ed72d4d7a2ef686becd0993dde1cad8ff463c417f1b9a86d5cd24bf,2024-10-02T20:02:22.740000
|
||||
CVE-2024-20415,0,0,9aadfd72e111380413a24f63d6892e9f0ccca43f5c8d9ca110fb3bf7dff7bbe2,2024-11-26T16:09:02.407000
|
||||
CVE-2024-20416,0,0,b25da691aa6481833628529acbf04a5fe1c1f01fc22e0fd9040eebf9e9a6b91e,2024-11-21T08:52:35.527000
|
||||
CVE-2024-20417,0,1,ec48b7b3cbe09044cdbaf36ef36f6f841d844b528df6f9e444ade781ad97ffe9,2025-03-31T14:51:28.773000
|
||||
CVE-2024-20417,0,0,ec48b7b3cbe09044cdbaf36ef36f6f841d844b528df6f9e444ade781ad97ffe9,2025-03-31T14:51:28.773000
|
||||
CVE-2024-20418,0,0,ffa23cfeb0d8518c73a4b617f45b9de926f199e4eb74d67df3f552f46fd4035e,2024-11-06T18:17:17.287000
|
||||
CVE-2024-20419,0,0,02e69f0e77deb076ed79d84af213228ca892e559170badf299218b58c0153dd3,2024-11-21T08:52:35.887000
|
||||
CVE-2024-2042,0,0,08e54f8cbf88478a6dc057bcb8ac9f29d00de3bbfb904223d2b0e22660927020,2025-01-17T19:57:25.747000
|
||||
@ -249304,7 +249304,7 @@ CVE-2024-20462,0,0,b69be385fc9daf361f88d881fb81ed0b0d5ac6142dbc2757a7c3003a1050a
|
||||
CVE-2024-20463,0,0,18d91a9e40f653096e163edfc2163d27c40b35ca400e10ae843d20d8aa779b34,2024-10-31T13:35:02.373000
|
||||
CVE-2024-20464,0,0,e1017198da789b399ff6f8570cdb19b26260d72f6e778ea5e6a3a37aef759efc,2024-10-24T19:47:29.740000
|
||||
CVE-2024-20465,0,0,fad777c8165a4542883ebb499a2025c4068326f4cc18f2474636cc74ba489772,2024-10-24T19:46:15.007000
|
||||
CVE-2024-20466,0,1,d8aa2b775c07fffe95c4f29c94293e648256e92aeb86412d2942546d8c23c593,2025-03-31T14:18:26.427000
|
||||
CVE-2024-20466,0,0,d8aa2b775c07fffe95c4f29c94293e648256e92aeb86412d2942546d8c23c593,2025-03-31T14:18:26.427000
|
||||
CVE-2024-20467,0,0,39dff6e67e354321fae0cf1154474ed8bea688195705b5c40aa705c275debbe8,2024-10-03T20:09:50.970000
|
||||
CVE-2024-20469,0,0,4d69309f12076e84259b8aba9658e6483677191a4c412ccc029080a7058386f3,2024-09-20T16:58:14.327000
|
||||
CVE-2024-2047,0,0,c80d34864ab31bbec12c61d8d10359f297ac1aece1ce1973e1782bab49756793,2025-01-16T21:48:30.403000
|
||||
@ -254738,7 +254738,7 @@ CVE-2024-27282,0,0,b2272ae791c34757815fd46d0dfded59649eab56363a235e3d7732ed8a04f
|
||||
CVE-2024-27283,0,0,7096d1dda11cbf42b75c6182fa8aa0730c3a43a8a6ec1a8550c433219717cea2,2024-11-21T09:04:14.640000
|
||||
CVE-2024-27284,0,0,41c1fcd2dc95d9ab3ec0c9a993c37821c9854cff1fe79ad6abdc37cd109201aa,2024-11-21T09:04:14.790000
|
||||
CVE-2024-27285,0,0,e049b06346ffade5c855b2fc9e20ce888120bf028f6e803d83be691a0ddcfac4,2025-02-14T15:31:24.213000
|
||||
CVE-2024-27286,0,0,c4de97868bb6a654d0fa5acc598ac00ef5dd4f178555435086c3091bc587e544,2024-11-21T09:04:15.060000
|
||||
CVE-2024-27286,0,1,149437473edc8466cb92239791055b02b555f48363b9089f4164513071c7372d,2025-03-31T17:15:39.877000
|
||||
CVE-2024-27287,0,0,f2fd248a4feebac4ac60dc4427b4d9edf4ea725f02f3e4ce218bc12e9067c074,2024-11-21T09:04:15.180000
|
||||
CVE-2024-27288,0,0,7de6e555c26c6e349dcbc347eddea7ef685ed8a79e541515e8d36f47b067506e,2025-02-11T17:51:17.633000
|
||||
CVE-2024-27289,0,0,3bbc36694a795dafa6349dba08693f225d1b6f08885cdda49824ac6b932566f4,2024-11-21T09:04:15.443000
|
||||
@ -255642,8 +255642,8 @@ CVE-2024-2855,0,0,17c4f0b866f9e044c1667487883066ce0dd83d5a767fb86bdd072611b37d7f
|
||||
CVE-2024-28550,0,0,9e13fe2a735dd5abb194dac69bab719f93d894a52ef9ad4a178d3258438397d5,2025-03-13T19:46:30.797000
|
||||
CVE-2024-28551,0,0,eb1a0b4de391a758ad4bd0445572a6bc2698d56affb516209b1bc196b8b065ca,2025-03-13T21:09:03.990000
|
||||
CVE-2024-28553,0,0,473bfe394494f264c99c0be80f9d31826d163f667d54af41e263c7a1cbc5b44a,2024-11-21T09:06:29.187000
|
||||
CVE-2024-28556,0,0,e74f6886aff07f31631907b59454a81fb3d4a6e31939b951be04cdcaaddd3540,2024-11-21T09:06:29.997000
|
||||
CVE-2024-28557,0,0,96de1d2894e1db4134b42d78340ea411f7467b93ae3b017d51c7a18b3ea94a14,2024-11-21T09:06:30.740000
|
||||
CVE-2024-28556,0,1,f1f763e3eb0393bd650c424c744f0c457f5f107cfc8b9215424caf235f78dae9,2025-03-31T16:28:08.810000
|
||||
CVE-2024-28557,0,1,8ea10cc21bc18c77b263c21549e9c10275a8c241227785e0e7b099088421f7cc,2025-03-31T16:28:59.380000
|
||||
CVE-2024-28558,0,0,24ed2b1cfce4e96fcbcee4e64a040e4cf59f931fa5753e4720f142851ea0cbf5,2025-03-27T20:19:53.070000
|
||||
CVE-2024-28559,0,0,c52a4d432129d055b2df7a1847c5e2e7d5e5af30e6b89cf04e75ceb459f01023,2024-11-21T09:06:31.393000
|
||||
CVE-2024-2856,0,0,343ae9af072612aedcf7acc8762d75b718c23a8bab91fa487ec947fe2044f289,2024-11-21T09:10:41.460000
|
||||
@ -263431,7 +263431,7 @@ CVE-2024-38526,0,0,c87b3796553d59f30541329f7bfb421e5fc1050358668dc3718477c22bb7a
|
||||
CVE-2024-38527,0,0,b80767cdd1dc141465114b74c2f216a3b5c29e7d46c42fb40a39c7ea6c867d2d,2024-11-21T09:26:11.813000
|
||||
CVE-2024-38528,0,0,d097cbc3ca3150539f44bbab3c0f6ada852b6922bd6070662ea01e25baffb76e,2024-11-21T09:26:12.193000
|
||||
CVE-2024-38529,0,0,349bf84a9047a2d9c19536145e71af1340cbe9342cc37ef40e4e99a960d566f1,2025-03-06T14:57:13.310000
|
||||
CVE-2024-3853,0,0,04ed0bc7cd1bf967e526833d173186ef513eca887cd021cf37248dc393b70089,2024-11-21T09:30:32.893000
|
||||
CVE-2024-3853,0,1,61bfb34dbca85f7c9d65084c483994431c6209f629a9765f9c8bb99ad174fa70,2025-03-31T16:32:46.433000
|
||||
CVE-2024-38530,0,0,fc7c632d4c4f22f4d46f2d45280e56c6fe53703bb5e4293582f73ae91e9aeccf,2024-08-13T17:17:47.693000
|
||||
CVE-2024-38531,0,0,be850591f97851f65fc535bd0fcf5503cd659f92ccc35c74667913b563427caf,2024-11-21T09:26:13.403000
|
||||
CVE-2024-38532,0,0,800ced6439e0460f07326bf1a2b2b08a7fc53fad35c58da98a5e1396a85e289c,2024-11-21T09:26:13.680000
|
||||
@ -263453,7 +263453,7 @@ CVE-2024-38546,0,0,21750011ac5f4febbeb8e646ef74f85ef60340a680c31a11eb9ab04b54029
|
||||
CVE-2024-38547,0,0,2803289df6feabcf96a5834c27491d632302fcf65837288e161066bdeb5fd487,2024-11-21T09:26:18.783000
|
||||
CVE-2024-38548,0,0,353d828dceaf304c8db9ddecd6e354307ba1614dd16f35b29b5c209ca37c750d,2024-11-21T09:26:18.933000
|
||||
CVE-2024-38549,0,0,05fbb2bcde014f09ea8da774292ebbabceaf9e541bff017b65fac2ef6435ec89,2024-11-21T09:26:19.140000
|
||||
CVE-2024-3855,0,0,658b3bbcf004a0229f3aa912ad0a97f8cf3357c3ac8c7bb86e798e6ffebad44f,2024-11-21T09:30:33.310000
|
||||
CVE-2024-3855,0,1,39b1a4e7e817ad5feabd1f86930dbf6202f9080d1ae9d5c048384ffcfc06d1c9,2025-03-31T17:05:19.390000
|
||||
CVE-2024-38550,0,0,a179f6a723b87d8ad6d0dc3f570ad7cc4277bd442925580b48253da83c9b7942,2024-11-21T09:26:19.330000
|
||||
CVE-2024-38551,0,0,abfa4d0d76840e79861a05982fb11e294f6051fa90fe77987a07eb57414ce587,2024-11-21T09:26:19.540000
|
||||
CVE-2024-38552,0,0,720fe50f9f09822193355713378016678554e327fdf10962760ff63ce824cef3,2024-11-21T09:26:19.673000
|
||||
@ -263464,7 +263464,7 @@ CVE-2024-38556,0,0,7c01ae50884104ecc3e9ea6757e218322b58c083dbb9d51ac9e7658baf1ed
|
||||
CVE-2024-38557,0,0,0dfaaf21c71ac44704804f687fb153b22f5d2adac3615ba3150b80b203367d77,2024-11-21T09:26:20.410000
|
||||
CVE-2024-38558,0,0,bb5f5c588cc6220a8f52a1016f93a06d7e93f2566de01426efa76e676cd4b0af,2024-11-21T09:26:20.560000
|
||||
CVE-2024-38559,0,0,951562632157e6a8b239329dc6cd2960e3a234244a65bba4b498169c45b70e96,2024-11-21T09:26:20.703000
|
||||
CVE-2024-3856,0,0,c0bcfd2cfbfb81aa84f32182ef7a5121efa212e4bf65ea1a91538e8592468623,2024-11-21T09:30:33.523000
|
||||
CVE-2024-3856,0,1,42245dfe5f789bfcc2ce040cd47529de994e1967041a3f1986bc93cb8c0482e9,2025-03-31T17:01:41.797000
|
||||
CVE-2024-38560,0,0,c724f192b29cfe721e8dedd8d98845677a6a7d55cedcf96174a3273b2bf92a28,2025-01-14T15:40:34.897000
|
||||
CVE-2024-38561,0,0,cd1982989d7787b4ce05e71d4fdb68bc8bdd0592aebc45d1a176071edf25712c,2024-11-21T09:26:21.053000
|
||||
CVE-2024-38562,0,0,758a2f6279a3a7659d95da699d40c22ef2c6ff78b791017b9fe23d47fb0f91d1,2024-11-21T09:26:21.197000
|
||||
@ -263486,7 +263486,7 @@ CVE-2024-38576,0,0,965c4157557be1379e8a6eb23b40f2eb5c965b16f7fcfe760002c8fa9a1b9
|
||||
CVE-2024-38577,0,0,98e1e6a5f03a6d6be46082e6a47044aea1341cf0bc9ff95810b78458f021ed8d,2024-11-21T09:26:23.543000
|
||||
CVE-2024-38578,0,0,c4de2a00f812dee6763601cf78f42fb84db1a224c1cd6294d113266f73ab0d8c,2024-11-21T09:26:23.717000
|
||||
CVE-2024-38579,0,0,2c76d20e02c5c47945cc4e6b800e410b21c5c78b48ec2468df4728996088ee89,2024-11-21T09:26:23.877000
|
||||
CVE-2024-3858,0,0,b8e9d55d4f61da42ec3fe569be2753ef7e0d27d0aa758c6dae2188ed5a04e50b,2024-11-21T09:30:33.923000
|
||||
CVE-2024-3858,0,1,80ebc85624024595f9cb903f946efb9a35950c53850b698e71abf650ff48e5e1,2025-03-31T16:47:40.163000
|
||||
CVE-2024-38580,0,0,7802fae670f8e6ec1e3ad90fbb06266f965b458a10579b8e9d8355291279977d,2024-11-21T09:26:24.030000
|
||||
CVE-2024-38581,0,0,9fe47966d5ed197ada192a52c8f0470f84141eb2a556bab9ec58421150bf3ad4,2024-11-21T09:26:24.157000
|
||||
CVE-2024-38582,0,0,bcc0fb54b1e4582eede012b30d8d7018f8e08c52ecdbd2d3e23e9e32b3e4196d,2024-11-21T09:26:24.300000
|
||||
@ -263508,7 +263508,7 @@ CVE-2024-38596,0,0,33d2d90cc03188746e0e47b8902fba752cff138f36bcaeca405c0189154e7
|
||||
CVE-2024-38597,0,0,e2cd0d450b7eebd511f7ee938cf8e09b3867bd0db61f20e22fa62e825fbfaf61,2024-11-21T09:26:26.783000
|
||||
CVE-2024-38598,0,0,f044c8ac0734b2f19e6a9eb68b863900fc3d70a9dfe4a831bc71f46c152f315c,2024-11-21T09:26:26.943000
|
||||
CVE-2024-38599,0,0,61f44938c7266051ed5230b3f51b82e98b80eb832f82bf9d3644d5a3d1a5a09f,2024-11-21T09:26:27.103000
|
||||
CVE-2024-3860,0,0,09fc5027362362a1657d8f91432c00f5f91cb506d4b994ee3bbeefcf56d51f6c,2024-11-21T09:30:34.363000
|
||||
CVE-2024-3860,0,1,83ee28320db2bd248ff3696e9da315f70737e4bb113c434e75e596b58e271273,2025-03-31T16:46:41.977000
|
||||
CVE-2024-38600,0,0,388ceda1ce722d7c1f95dda7de1dd87b062581cdf5c9bc270d7fb45b591050b9,2024-11-21T09:26:27.253000
|
||||
CVE-2024-38601,0,0,33ac0247f6ec0d5b10a9a7c047e0235c5ee8f2a62c67e5cc90032a81a428d80a,2024-11-21T09:26:27.407000
|
||||
CVE-2024-38602,0,0,6074885d7e84857d272e5e137d9ef3004b7d1aeb12bd595cc6a908e5bc762940,2024-11-21T09:26:27.547000
|
||||
@ -263530,7 +263530,7 @@ CVE-2024-38616,0,0,a99abeaacb44684a1412cedf12665b62dd48e968899276b7fca5f48e33dd7
|
||||
CVE-2024-38617,0,0,3ff5348c0dcfd75ddefe579a5302707bc41f7d5665fa0c412df5320a413c5b96,2024-11-21T09:26:29.893000
|
||||
CVE-2024-38618,0,0,c622d40bbf6ba18475054fa5fc00a77da2b9da54a06836fa791daa252a8d48e5,2024-11-21T09:26:30.017000
|
||||
CVE-2024-38619,0,0,edb0e15e19b7b1605d7a6697fcbe89b4fcdf96cd46e76f10837b12f47a5949f0,2024-11-21T09:26:30.223000
|
||||
CVE-2024-3862,0,0,029094556f4476fc7c723fcc3283eb6535c74608b94afb02835a068a805643e0,2024-11-21T09:30:34.770000
|
||||
CVE-2024-3862,0,1,87b73b04ab39c39d54f54fb56f9a2ef0fa5a2e6c4e60d439b65365ac9f11a2dd,2025-03-31T16:45:53.620000
|
||||
CVE-2024-38620,0,0,9e2c84f8cdad8fe25bccc0d12b53384412f90ee207566279d28ce4079388aff0,2024-11-21T09:26:30.370000
|
||||
CVE-2024-38621,0,0,2edfcf1f82bf3dfea3755dc1e9ed3fde3ce229f91c9bd1b66b6fe77f3cc3340a,2024-11-21T09:26:30.503000
|
||||
CVE-2024-38622,0,0,b2e62f946f859fe22fd8fbcd0aeffa1a6dfcdd01e6b66628aa784df475b04635,2024-11-21T09:26:30.653000
|
||||
@ -264748,7 +264748,7 @@ CVE-2024-40473,0,0,ae60535c4c5e69056373da705c1095bbce91c7d7bd975b6e78f5f70e3b26f
|
||||
CVE-2024-40474,0,0,b52557a91ed7069ff209461de36687b8eaea13a76b845a1fb78495a7f2afea57,2024-08-15T13:40:01.357000
|
||||
CVE-2024-40475,0,0,2de6d9e5957bf296b27e685d64186ba6ef2743a100daef41487239f429bd8ad0,2024-08-15T13:40:54.810000
|
||||
CVE-2024-40476,0,0,d8a805ba26d13a21a771f54a37d1a1c7db973283c7a00edba4eed9b65f977012,2024-08-15T13:43:32.047000
|
||||
CVE-2024-40477,0,1,9f0319025dbc5ac3dc90d5d73b1b3ff31a04f4531abb0d62c131d1f12a9e16cc,2025-03-31T15:15:52.177000
|
||||
CVE-2024-40477,0,0,9f0319025dbc5ac3dc90d5d73b1b3ff31a04f4531abb0d62c131d1f12a9e16cc,2025-03-31T15:15:52.177000
|
||||
CVE-2024-40478,0,0,18f9d2601b45b0155659911e0ae2c29ee23e133c8cb47ee86400e795a0ae6ba9,2025-03-13T16:15:20.797000
|
||||
CVE-2024-40479,0,0,ed772cf67a46ac3c7e9bc9693937a7eef7702ab77b807ded4bc39bba120db634,2024-08-13T01:13:47.860000
|
||||
CVE-2024-40480,0,0,2e13e61f572f387adfee6973f14487ab73725a0b4fc14a2193599bd0e9b21708,2025-03-14T16:15:33.230000
|
||||
@ -266922,14 +266922,14 @@ CVE-2024-43282,0,0,71e5a07a66cbadfa5f053db7f0a0e228339632fa2c8eeabfbe12adc6e5bd9
|
||||
CVE-2024-43283,0,0,c2fa63f6807a51bde52a738b13a3ab7bd396d9c7d27376a4b1f74c069804fc95,2024-08-26T19:10:18.890000
|
||||
CVE-2024-43284,0,0,6750e3410b47d0a62cf30e42a256afedf95cbc8eac307ad647642eb181dc62fa,2024-08-19T12:59:59.177000
|
||||
CVE-2024-43285,0,0,fb373918e776d744404fd70c5a773fba11b22250707469d84d51c3f8bcda5aa0,2024-11-01T20:24:53.730000
|
||||
CVE-2024-43286,0,1,722847214876212162088b1d2c7186780ddf7dea67eed703f6d1f7c60b32ed30,2025-03-31T15:03:49.690000
|
||||
CVE-2024-43286,0,0,722847214876212162088b1d2c7186780ddf7dea67eed703f6d1f7c60b32ed30,2025-03-31T15:03:49.690000
|
||||
CVE-2024-43287,0,0,1403263a70a623aa46ce8cc6cf78254a39b6b8fc85c8e82aef37c3e8fef8feac,2024-09-12T21:19:51.183000
|
||||
CVE-2024-43288,0,0,f717d3427a0c0cf241c7104bcb2dec353b1f22faf073e6d8f4b7080b289b1b28,2025-02-06T15:40:32.307000
|
||||
CVE-2024-43289,0,0,c2f22f683cae31e628630c6f37cc33cd82a127c6d8117d1deb25b946147a4ae1,2025-02-06T15:50:41.907000
|
||||
CVE-2024-4329,0,0,e6b8069a5e983b91520fda2de6cc101ecd499fdfa644e7ddea3fd43d16576c4d,2024-11-21T09:42:38.283000
|
||||
CVE-2024-43290,0,0,aadbec5a5ad4a64e579a5e00cc442715fd6b805de0add0298fa795b77ecbdd94,2024-11-01T20:24:53.730000
|
||||
CVE-2024-43291,0,0,eff410b0d43deebfe049e59f21b3fa38e72c67e7c1b0a50e65c21e64cd2f06aa,2025-03-10T18:07:35.543000
|
||||
CVE-2024-43292,0,1,174dd639306c46aeb2340d6cabfc35611e10a30d9b88a4ea05c498368bc94680,2025-03-31T15:01:39.163000
|
||||
CVE-2024-43292,0,0,174dd639306c46aeb2340d6cabfc35611e10a30d9b88a4ea05c498368bc94680,2025-03-31T15:01:39.163000
|
||||
CVE-2024-43293,0,0,b1892d2fa392ffe2bd09211d2c26fcff7c9529e98d127336d6156a0f08946def,2024-11-13T01:19:49.207000
|
||||
CVE-2024-43294,0,0,dbbb329e4dfb5feb56f3872fc122b72b3275c63adcbfbf2ee4e0eaebdd0aa048,2024-08-19T12:59:59.177000
|
||||
CVE-2024-43295,0,0,8c4bb90de7763eb9eaf817167bd1f0d5de28903b3cc7c8c1fc42582ffd38431c,2024-09-12T21:20:43.847000
|
||||
@ -268031,8 +268031,8 @@ CVE-2024-4466,0,0,e3cd45fefb4caa578c3a777906a4e9abf96ac1bf88640e5b948697edef383b
|
||||
CVE-2024-44667,0,0,c45d991e3e5755dd4bd6b2799c96326bd2bc462b166e82b876732032251f93de,2024-10-29T16:35:13.953000
|
||||
CVE-2024-4467,0,0,7435e1edc5d4ab53fd884338611646eb141c365df221a6cdc5952ed1cc1b40c2,2024-11-21T09:42:52.947000
|
||||
CVE-2024-44674,0,0,8f3b6a67fdb91e214bdd072812af3c2ef73dbb26bddf629694102a0acec11013,2024-10-10T12:57:21.987000
|
||||
CVE-2024-44676,0,0,a17c08935e84907e4a6a9e4ce5aa2b21b5b99e99cb1fa8b218b330f42be5eb9c,2024-09-25T19:20:25.073000
|
||||
CVE-2024-44677,0,0,56b6e73384bbe5abe4d62ce3072031ea684599a01e518c686d3a8512fbd1de4f,2024-09-25T19:19:24.007000
|
||||
CVE-2024-44676,0,1,082b7e510342d3b0a45bf7a62d8b9d58fea2a2753569b66106c28863e3ba55b3,2025-03-31T16:15:21.393000
|
||||
CVE-2024-44677,0,1,24a9b30edcad0e8b0934ed12413b84eb3d707e3ac15d231423ec510aa6108a27,2025-03-31T16:15:22.023000
|
||||
CVE-2024-44678,0,0,7c6040aac76a55faa1753224a581817a4c40d04b0f0585acd275b3cb0ea8d66e,2024-09-26T14:35:14.687000
|
||||
CVE-2024-4468,0,0,1383fb38e9227b7082c0937002dbe6ccafb8a608544c11ad11010665c5c95871,2024-11-21T09:42:53.103000
|
||||
CVE-2024-44682,0,0,6c8edb929241222c775226e0e9a579a93723389a504b040c56912570abf6fded,2025-03-14T16:15:35.357000
|
||||
@ -269067,10 +269067,10 @@ CVE-2024-46215,0,0,fe5702e9b51c58e432fa7fecc93685ecce003d70c9e7155da8f03da1e9c41
|
||||
CVE-2024-4622,0,0,23626a2d23de89416eb6f3e5f72e3392ef600a48bdf20a3fbfd212329cf56b8e,2025-03-27T16:15:27.163000
|
||||
CVE-2024-46226,0,0,67c41f9a9dcfd9783eec2178b645fa5bbaaa23082a1b4cef66a33925f573b0a7,2025-02-26T16:15:15.947000
|
||||
CVE-2024-4623,0,0,961703e940078e4a6bf4b9531b20914846a73a30d4778efd87e6c1011cdacab8,2024-11-21T09:43:14.387000
|
||||
CVE-2024-46236,0,0,7b5402efa8af8d36f034a678c339a134167dfcac00261c63f07ca8461d45c760,2024-10-23T15:13:25.583000
|
||||
CVE-2024-46236,0,1,f55ba19196bc6de780cb86faf4101b00aadcf7f67b278bbd9c46615a8c17e9d9,2025-03-31T17:49:13.670000
|
||||
CVE-2024-46237,0,0,edf91e19e8040a7af51513872bc3be6ebdceb66177f9157d729c7b8ec5e1e843,2024-10-22T18:35:05.180000
|
||||
CVE-2024-46238,0,0,29d23fb8d92e8081613799e52d1cf111bedb1054a60c1ee2d7b7ebea94fbd847,2024-10-23T15:13:25.583000
|
||||
CVE-2024-46239,0,0,039d008e66cebe4327bee95b97b4914de6b1e6cba80f55339b9918f2122a17b6,2024-10-23T15:13:25.583000
|
||||
CVE-2024-46238,0,1,fd4831862db3e74117454bdc4a0bfbcd296d65ce950e55d96b45ec27cf047383,2025-03-31T17:52:15.150000
|
||||
CVE-2024-46239,0,1,a2e0203fe405dc3797841252c2430cf2c4e2c3b10af81b0193959b83c529ddd1,2025-03-31T17:52:58.943000
|
||||
CVE-2024-4624,0,0,18970f9a313d13160da6e0af938d898396349890d09a8f8861dd5be486e648a9,2025-01-15T18:00:53.760000
|
||||
CVE-2024-46240,0,0,1191cdf44b6509cbee2a8abac44a625a4ac7bf4a3622ea84bd1d88a32af8af69,2024-10-25T19:00:20.737000
|
||||
CVE-2024-46241,0,0,1f0674ec17f2d56b2953e5c99a2b749bf8e4230c80e89ee3aa315644015de064,2024-09-26T13:32:55.343000
|
||||
@ -270652,10 +270652,10 @@ CVE-2024-48261,0,0,c50173bdf25e4741bc510b2698ace8c3db8c27162251f6faafaff8896241e
|
||||
CVE-2024-48270,0,0,a63c67811909709c3d8f89ca8baecf0e242e981a7f69b59cba65d2c1eb73a810,2024-11-04T19:35:11.057000
|
||||
CVE-2024-48271,0,0,fed7c1963cd46509d2576fb7db0d2ae891bc278b409d15ce5ad2d21ef856185a,2024-11-01T12:57:03.417000
|
||||
CVE-2024-48272,0,0,ea2b109b640d725bf1b3ce0436ce03817a84d0ed7e43ff490cf4f988e21d69cd,2024-11-01T12:57:03.417000
|
||||
CVE-2024-48278,0,0,09533421f20ab3b43078bb2031694f70e0d2ff7db3103407f4d6878921f04e7f,2024-10-16T16:38:43.170000
|
||||
CVE-2024-48279,0,0,54520c93063330f23e292571ab65e9aca5aec3c332eb1642098ab8df9a74fcd2,2024-10-16T16:38:43.170000
|
||||
CVE-2024-48280,0,0,65590d96c1f38c342035d0ee2ef97e51ce2e3a9c4a8e2b3cbe44ddb8b02f05e6,2024-10-16T16:38:43.170000
|
||||
CVE-2024-48282,0,0,31109518ffc1656f92097195d92199bb16ac60bbe8ff0113413c186117e16282,2024-10-16T16:38:43.170000
|
||||
CVE-2024-48278,0,1,809b76f1153de7810326cf668dcd28c7e3645b99c11b47ecf4bb4d9ed523f589,2025-03-31T17:27:44.297000
|
||||
CVE-2024-48279,0,1,78d52871c8d5081ec92507e368e8935dd7472beb937433183ca09aa82a1cedc4,2025-03-31T17:19:22.290000
|
||||
CVE-2024-48280,0,1,adcf291220a50a17ee9e62ca57acfd894f81d1920dc855db25c190a8f1957fc3,2025-03-31T17:18:48.330000
|
||||
CVE-2024-48282,0,1,857895f3b579ee3c7817f1f1ae932b57ea8e93e9891d2d40c41472e0b9e3de8a,2025-03-31T17:12:33.610000
|
||||
CVE-2024-48283,0,0,95d5dd5f305c9e0d9d8320417d22f4d3266dfe567187d65f6f35a1aea7450189,2024-10-16T16:38:43.170000
|
||||
CVE-2024-48284,0,0,24131b37e3503d0f88373eeb49e74a1db93f0d1406d2b59ea2afec5f898f0a92,2024-11-19T15:45:55.450000
|
||||
CVE-2024-48286,0,0,a2ee2817026e105eca7578f1a1a8fb654da208c74bd3dbf196d7d8b7a43390e8,2024-11-21T21:15:22.483000
|
||||
@ -270812,7 +270812,7 @@ CVE-2024-48703,0,0,66b49a296cfb94ace483912b990b744b957f247ff107c8ad1fc8f2d7eabd4
|
||||
CVE-2024-48706,0,0,c943b13c3a3939cb5d8b86b065bc2ddde43d7d1c2b6d276f98ff2b2d6bbb9294,2025-03-25T17:16:11.580000
|
||||
CVE-2024-48707,0,0,8c5783a4e9b64c0d59925994774447278a2e90a82fd2cd55ee2072a8b3d5b0c7,2024-10-25T19:11:54.310000
|
||||
CVE-2024-48708,0,0,e061892415ada1b97948e5eaa0f479bd634d96d643152026ca3698c48e905eeb,2024-10-25T19:10:08.457000
|
||||
CVE-2024-48709,0,0,5d0da768b2d5c01ca2594850f64193f307a8f382ba3d9405530ea2716b255b08,2024-10-23T15:13:25.583000
|
||||
CVE-2024-48709,0,1,9861670129f6a2107a618eb06cfc596c29d3700f8f0be2b4eec888d4be04b75a,2025-03-31T17:58:22.347000
|
||||
CVE-2024-4871,0,0,2d45c780a43b80f2f99ccda512706799f484dcb75c9627622f90d8bf6ef3c1f8,2024-11-21T09:43:45.893000
|
||||
CVE-2024-48710,0,0,a0cf101dc2106da212e20e0effdb2b3f39ba74beda88e292ccf03275e99e374a,2024-10-16T17:35:03.423000
|
||||
CVE-2024-48712,0,0,63cea6c7a0869df457634cc47c132e0a60a60cb55f631c2d70d7555d2273584a,2024-10-16T17:35:04.483000
|
||||
@ -270825,7 +270825,7 @@ CVE-2024-48734,0,0,d6a6dc999653f3d8254cacb0f8fc27ede3dfac91a1cca10cbc967d7bd1ce9
|
||||
CVE-2024-48735,0,0,ef65a2e17a3a16ef982ae744bf3a9d8b7cfeb3be55769039a7bcc98d24d03387,2024-11-01T13:15:12.620000
|
||||
CVE-2024-4874,0,0,4d7dcf307fc1224b56b212aa4e807b9703b9b6b438a3dae6be96d12c7a1afa6c,2024-11-21T09:43:46.323000
|
||||
CVE-2024-48743,0,0,8a901d521bee4fb37fa6631ae86bffe209ffd6825102f3fe83b6c17d5586b264,2024-10-29T19:35:25.777000
|
||||
CVE-2024-48744,0,0,2075f33fe8737914bba0330897293beec62cfc78359643f6fd0ded65a78587d3,2024-10-16T18:35:07.013000
|
||||
CVE-2024-48744,0,1,89cea8cdf6888e4d801a50dffbace9ccb4ff9d21aa0d3f591a65a7fbdcc231af,2025-03-31T17:47:09.433000
|
||||
CVE-2024-48746,0,0,70b1bf92976f7b515824754b06ef5e640b752fe34bb7804f1674438f52e03c18,2024-11-06T18:17:17.287000
|
||||
CVE-2024-48747,0,0,f03e580691c37a981f499cf0b560468ec0253c9c99edec66cb15f26778f95804,2024-11-26T19:15:26.443000
|
||||
CVE-2024-4875,0,0,f48e0b6e0375081f13ac2ab83bf60baee7a813641861df2f5557466e3ab9399c,2025-01-28T19:20:29.297000
|
||||
@ -276625,7 +276625,7 @@ CVE-2024-5712,0,0,d9053a973766129971458824397812ec1e4acf4c6e0c33b032abc440bd305a
|
||||
CVE-2024-5713,0,0,3391d5de33d01a2f3feb723b6a12c2cc29413174b2bdbe5c4e85347aebdc9be5,2024-11-21T09:48:13.273000
|
||||
CVE-2024-5714,0,0,849fc94b6902757fdfdae1f78ce00df63ab2c5ba63744e880696de74b0f190ce,2024-11-21T09:48:13.440000
|
||||
CVE-2024-5715,0,0,8c569768d6a890bf6135b49c7618937c530109ec67dd48fa94109e61c60d211f,2024-11-21T09:48:13.567000
|
||||
CVE-2024-57151,0,1,891044d80824c71afc551c62d9ccf9985b682ab36bf040e0f3e0accc2d12ffcd,2025-03-31T15:15:42.897000
|
||||
CVE-2024-57151,0,0,891044d80824c71afc551c62d9ccf9985b682ab36bf040e0f3e0accc2d12ffcd,2025-03-31T15:15:42.897000
|
||||
CVE-2024-57159,0,0,3faa9b36a72056ed0de234550b823c928aabb660836be443f2d509165eec936c,2025-03-13T14:15:33.960000
|
||||
CVE-2024-5716,0,0,3d427df7306e5a73dc01967e843a1c8b689a272b3aba62391281a97b5c9d3d70,2024-11-22T20:15:10.100000
|
||||
CVE-2024-57160,0,0,21efe21d39d81640d4b28d9b56e9e9917bc8862bd99f1332fce5cfffc07d8da0,2025-02-24T19:38:22.867000
|
||||
@ -280504,7 +280504,7 @@ CVE-2024-9399,0,0,d8e406ee1beab284cfa9cbeb45a0d2c953df97248a1bc9b6aef82180ed3da0
|
||||
CVE-2024-9400,0,0,4e0eb218b5de55a15a4a85f62e9e541831946bea4c202524d5661f5eb345d7e0,2024-10-04T13:51:25.567000
|
||||
CVE-2024-9401,0,0,96a7de06dd58c9c71f25b07ec603b05ba47f7dd964cd736693ec4ab35f2b79cc,2024-10-04T13:51:25.567000
|
||||
CVE-2024-9402,0,0,63b01a6aa3f666e567eb1543fc626efc5699e53df1a2e8aefcfc7ec04c0a715c,2024-10-04T13:51:25.567000
|
||||
CVE-2024-9403,0,0,2789ecc39928d9f0673acd74b29bccbd75916415c64484280cd56fe59a46d92a,2025-03-19T18:15:24.137000
|
||||
CVE-2024-9403,0,1,e2b388751de7d28f5b3dcc155cbf0eee87876298ee630fc15adeaf8592b8641e,2025-03-31T17:45:09.633000
|
||||
CVE-2024-9404,0,0,42e12aecb183ff5b0d234b3c0b09beb73cd7c6fba91a9497a94d650a56c0c77d,2025-02-20T02:15:38.303000
|
||||
CVE-2024-9405,0,0,8642cd3daffd984afd6c8d211f16ccc5e756252d3a00aefbed32c81bc22b44d9,2024-10-04T13:51:25.567000
|
||||
CVE-2024-9407,0,0,c3bb216c57e02389fdc038abc31ad60ae236af3d0e61fe20fe1466db79b4cb67,2024-12-20T13:15:22.430000
|
||||
@ -280982,7 +280982,7 @@ CVE-2024-9932,0,0,4e0f603134bafc17ca660ad103069233ac725078ae8cfebb6b1827c0635e56
|
||||
CVE-2024-9933,0,0,93ce38ed1a39de0467a626c04a86861817231963b6ef9cf1cddae6d3f710997d,2024-10-28T13:58:09.230000
|
||||
CVE-2024-9934,0,0,6379e6ad8a8db5c296acd400ce1e421fc335812086dda2cd7faaf74fda3111da,2024-11-06T18:17:17.287000
|
||||
CVE-2024-9935,0,0,f06fac9a1e0f69e587b5a1a528890bb76351fc4722f6bb5b275546660c6f2970,2024-11-18T17:11:17.393000
|
||||
CVE-2024-9936,0,0,3a7d76688b7c50cd250f22b37245f0e98b9549794343dc9e35b28b9318d7f337,2024-11-06T17:35:42.870000
|
||||
CVE-2024-9936,0,1,1f6ddab8c53f4d6f468bc3c998b336f907b00c883130cc27707d2e94ed2db102,2025-03-31T17:42:12.170000
|
||||
CVE-2024-9937,0,0,0766c76afe10a009ad41ed699dbcb8d528e71a258224f4e49db1d6ce7899ad8d,2024-10-16T16:38:14.557000
|
||||
CVE-2024-9938,0,0,f49b9eb7f381d715bc7c56ebe1a2562d847f1875ed746118dd755a2d400bc9b1,2024-11-18T17:11:17.393000
|
||||
CVE-2024-9939,0,0,c47ba97255f1c4100695a38e7349ad92d97a71d9b8357497d3b60d8266490e6a,2025-03-13T16:27:18.140000
|
||||
@ -281431,7 +281431,7 @@ CVE-2025-0601,0,0,32c2522dac0fc3c40980f77ac0d53c361d341012ea228c0ef5d2b020b8f8c4
|
||||
CVE-2025-0604,0,0,11b5fa64e0c44fc853249fe566d1ae9520d7be28da05402f93563e9d23c37605,2025-03-10T19:15:39.487000
|
||||
CVE-2025-0611,0,0,d5c9360fc3080a3bf40a56d9e6161f43213715b53cd2c1f914a2626e9581bcd4,2025-02-06T22:15:40.053000
|
||||
CVE-2025-0612,0,0,7ea4d4aa25f622741c89c8921e9bef8da99d00f4284523c951843203c8182c72,2025-02-04T19:15:32.720000
|
||||
CVE-2025-0613,0,1,5a9174fc4a795058fa31e6bbf1b94038fa21daa559d80b9f6b7911767277bd35,2025-03-31T15:15:43.133000
|
||||
CVE-2025-0613,0,0,5a9174fc4a795058fa31e6bbf1b94038fa21daa559d80b9f6b7911767277bd35,2025-03-31T15:15:43.133000
|
||||
CVE-2025-0614,0,0,35aebd2508e8a73e5890659bb27b5833c263157a992866f88cfa4a06211488f5,2025-01-21T12:15:27.580000
|
||||
CVE-2025-0615,0,0,ebbe675921592ae8cbe2172db6e2765a464d273fff841eec1146e0ddf51f2dff,2025-01-21T12:15:27.737000
|
||||
CVE-2025-0617,0,0,f628b1ad73170d04122e24ddb3e888ab06e1591d9b8c499515e522c90868af4e,2025-01-29T11:15:09.330000
|
||||
@ -281644,7 +281644,7 @@ CVE-2025-0918,0,0,4227989e3d35097382e4bc473e8d6b90f5c37e9be43ac707cd1a7bd79f7110
|
||||
CVE-2025-0919,0,0,f3c40a8c3e9859b98dc4dbb233022019405b6bb3a32be39636bc5e978bd23a1b,2025-02-12T17:15:23.357000
|
||||
CVE-2025-0924,0,0,f098c8869b022dbda442e50477571fe8e89ac3ff2ff9ea7bd16e8bb1ca9eb537,2025-02-17T05:15:09.410000
|
||||
CVE-2025-0925,0,0,96e6ae1415f7de21f9d2302b09edfb8f35c8ed2d838c20a02e0bb3cb8fbcd173,2025-02-12T17:15:23.437000
|
||||
CVE-2025-0927,0,1,190f05df59e794a32a84e68e789bbaff5cd48e89d61353e916de72999417a54a,2025-03-31T15:15:43.270000
|
||||
CVE-2025-0927,0,0,190f05df59e794a32a84e68e789bbaff5cd48e89d61353e916de72999417a54a,2025-03-31T15:15:43.270000
|
||||
CVE-2025-0929,0,0,bcacb82faee52c17b22479d26474b4df04f76f99e634ac515f50cccea0dc9587,2025-01-31T14:15:34.130000
|
||||
CVE-2025-0930,0,0,e48470a5aeaab134703b9f1449e9c6f114cca0e6b49cd331dee21f5acc590fd8,2025-01-31T14:15:34.293000
|
||||
CVE-2025-0934,0,0,435f4840918befd21a2a5141d511b1a79f3fc5ba70f4b6b5d6a0bdf42935fbde,2025-02-18T18:49:12.210000
|
||||
@ -281854,7 +281854,7 @@ CVE-2025-1213,0,0,226c2da2d3a4aac647d77e7a97567bbe3f4fafbe21e513e404ff5a1441bfa5
|
||||
CVE-2025-1214,0,0,ee530a0ccb2dbec34bd0adb6326677fa3eb44dee2c85c32f60f080d2175851ef,2025-02-12T20:15:39.200000
|
||||
CVE-2025-1215,0,0,28588a9b24de663f5bef0961d5dfe96e8a71be7eda3beced3b32d3f6d90dfb60,2025-03-21T18:15:34.290000
|
||||
CVE-2025-1216,0,0,c2395b4be7af9479c54e2cb380a24f136f34a8574d4e9d63fb5aa8873ac74d92,2025-02-12T20:15:39.907000
|
||||
CVE-2025-1217,0,1,3fa38fd23ca16aed58395f482a82e11c6e20d520714c015c57ca653951a05425,2025-03-31T14:15:18.850000
|
||||
CVE-2025-1217,0,0,3fa38fd23ca16aed58395f482a82e11c6e20d520714c015c57ca653951a05425,2025-03-31T14:15:18.850000
|
||||
CVE-2025-1219,0,0,37a5916f807d771035dded0ccc23decc37fa45dd178b4cbe271834d9fe8ddb7a,2025-03-31T13:15:42.940000
|
||||
CVE-2025-1222,0,0,37e1c4bd7e5e0aef71d4eaf69d903e1860c5e20ac2c3d888fafec2d8540da40a,2025-02-20T01:15:09.707000
|
||||
CVE-2025-1223,0,0,79c0b4e1b63833c27fb384ab59edaf7afe279373880088cf1aa2309d13ed89d4,2025-02-20T01:15:09.837000
|
||||
@ -281960,7 +281960,7 @@ CVE-2025-1390,0,0,4fc86a10da8dd3f0a18ea2e30ae82e3cb10771daa7275bed87235a02cfa82a
|
||||
CVE-2025-1391,0,0,92923563d5f6ebe7489c1cf297a79c50e1a9d080a96d841d79358c408c639ed2,2025-03-10T19:15:39.860000
|
||||
CVE-2025-1392,0,0,f08bbb9b69f485fd54fc78272460b890a55805f93dc93ed202a1f5ce9ea26d62,2025-02-17T16:15:16.120000
|
||||
CVE-2025-1393,0,0,1a18b9780d45efd3906fabb9eb91bce6e4d37c3f3f1f9128e55d743057ba1663,2025-03-05T08:15:35.107000
|
||||
CVE-2025-1398,0,0,05f9ad3e89c8e6dc7aa5ff1606b3f956c5496ef62f1e5366d83020087957aab2,2025-03-17T15:15:43.243000
|
||||
CVE-2025-1398,0,1,3ad1b81812389242ce471c1a42a7ea77f4178b417e63483a89eac15fc55aa474,2025-03-31T16:15:22.463000
|
||||
CVE-2025-1401,0,0,868bc16b2c81df141b3dae7cf83ccfdb96c777d720f9c9ed5abfc3c87da59890,2025-03-14T17:15:50.433000
|
||||
CVE-2025-1402,0,0,c23c451cfa1d570fb16b3d38ae224aa085b42cdb084d4b1dbd67b0732fd42aba,2025-02-25T04:04:59.860000
|
||||
CVE-2025-1403,0,0,3ac2f8777209bcece27742649d8aad5302ca64fd9d65a9c5c98d12690c81a351,2025-02-21T18:15:20.550000
|
||||
@ -281994,6 +281994,7 @@ CVE-2025-1445,0,0,940964079412f921ad8508e621bd3205368ae971bcabd8435df66e45431670
|
||||
CVE-2025-1446,0,0,95901e0cac0119ec391ef035d23ba55e02dd62d2391e09d32f36b0377dc79fe8,2025-03-24T19:15:49.973000
|
||||
CVE-2025-1447,0,0,b52fc293ec2c8f7276787d8ec4e27a605d8feb40937673c00f5fe8646d83ab92,2025-02-19T01:15:09.407000
|
||||
CVE-2025-1448,0,0,dcd55b821241f3fcd52c60ec5d939cca30ac2e0644079f21a4efc2df8a0c8c2d,2025-02-19T02:15:08.833000
|
||||
CVE-2025-1449,1,1,5f7c4b969d2d6b495b0e57d738ab03d2c1e38ffc715b366ec08bd1f173811769,2025-03-31T16:15:22.770000
|
||||
CVE-2025-1450,0,0,f0a28cf37155f4c16fff9326b0ffe6a415c6c5c1475546052ba68718728afcec,2025-03-11T15:46:05.180000
|
||||
CVE-2025-1451,0,0,12a938aee967d5ea2c9b43d523c78df71d3aa4fc1d58b85bd5cbd9ad34dbd3d2,2025-03-27T15:40:03.640000
|
||||
CVE-2025-1452,0,0,3e2a2b961d493642668dd5d757e3135aee03e85d6914645ab6a62b9e89b5cf1e,2025-03-27T16:45:46.410000
|
||||
@ -283881,15 +283882,16 @@ CVE-2025-22916,0,0,894d45082057205ae80e6263e604aa99aac9da87f2527da37d587ece07224
|
||||
CVE-2025-22917,0,0,0d72f7ff6d66913d2820416ce95685d3bc853139131a9698fa080019dc84bb06,2025-01-29T16:15:43.907000
|
||||
CVE-2025-22918,0,0,34d0d301ce186de3a900525a1d20d1fc6818f460c83c7c8b34ef0ba83d9f1c2a,2025-03-18T19:15:48.183000
|
||||
CVE-2025-22919,0,0,329e8b26e961cfd3a5f94c152403744377d574dcba7ab4dca039db01cbe65e83,2025-02-19T22:15:23.623000
|
||||
CVE-2025-2292,1,1,86613e1437eabf6dc397f7c69f08dfc7bd883dd7c5bcbbb5438747adebc73c40,2025-03-31T17:15:40.740000
|
||||
CVE-2025-22920,0,0,90e7ff21ce793067aa456b5ccb84cf38ff13a7ab9f13a9d4f7138f20eaa66180,2025-02-19T22:15:23.810000
|
||||
CVE-2025-22921,0,0,fc4d8d5f4bc002d31a8eab55216be4cd1b637344934aafdd7df2486b9762015c,2025-02-19T15:15:17.497000
|
||||
CVE-2025-22936,0,0,d81f6f27c0c4b19886d50175e4767c83ad84386da04b2ebc81be17b6a19a6c20,2025-02-12T14:15:33.187000
|
||||
CVE-2025-22937,1,1,331ece9d12ca190aed0a35804a0dfac144905a9c47986efb067b9f9250b0ec9f,2025-03-31T15:15:43.417000
|
||||
CVE-2025-22938,1,1,74d2272759fe53cce2a59ac3befb7bf6fca97834bd50b1b2460942f04e3d900a,2025-03-31T15:15:43.530000
|
||||
CVE-2025-22939,1,1,fb632d7a2e5d5763aa1af6772acb2ed227d6daeac6afc15230932db691dfdb60,2025-03-31T15:15:43.650000
|
||||
CVE-2025-22937,0,0,331ece9d12ca190aed0a35804a0dfac144905a9c47986efb067b9f9250b0ec9f,2025-03-31T15:15:43.417000
|
||||
CVE-2025-22938,0,0,74d2272759fe53cce2a59ac3befb7bf6fca97834bd50b1b2460942f04e3d900a,2025-03-31T15:15:43.530000
|
||||
CVE-2025-22939,0,0,fb632d7a2e5d5763aa1af6772acb2ed227d6daeac6afc15230932db691dfdb60,2025-03-31T15:15:43.650000
|
||||
CVE-2025-2294,0,0,1a5e48440eae90fb3ffb2ab4246fa9a7f3a3bd6b2c08714613b5622012818910,2025-03-28T18:11:40.180000
|
||||
CVE-2025-22940,1,1,f6341671278e00feed4dbf97970aa39efa5237bee947634b9c79110be9ad77cc,2025-03-31T15:15:43.763000
|
||||
CVE-2025-22941,1,1,c8c30ed2ab9406e735ed1d4b864c0aac449b8b5a98ef3defdb35a64874a4ff52,2025-03-31T15:15:43.873000
|
||||
CVE-2025-22940,0,0,f6341671278e00feed4dbf97970aa39efa5237bee947634b9c79110be9ad77cc,2025-03-31T15:15:43.763000
|
||||
CVE-2025-22941,0,0,c8c30ed2ab9406e735ed1d4b864c0aac449b8b5a98ef3defdb35a64874a4ff52,2025-03-31T15:15:43.873000
|
||||
CVE-2025-22946,0,0,7db37666dfbf9142b1788db2e9c9ed7b839c8fa56ddb82a64c0b003e5a2cac22,2025-01-14T15:15:28.480000
|
||||
CVE-2025-22949,0,0,4497a547d6c85b77c71713f92e0bd769cd0fee1b37f22227e370aa8af86f0dec,2025-01-14T15:15:28.637000
|
||||
CVE-2025-2295,0,0,5afd41ba1c620aa8b1c09ed9d5c8905d7597b06ca6637c246ba28374bca35eb0,2025-03-14T22:15:11.600000
|
||||
@ -284853,7 +284855,7 @@ CVE-2025-24357,0,0,33b4b3c939c862c35be8fbd83a4f327fbd80fdaea485d698b2dba1d8e5ecb
|
||||
CVE-2025-24359,0,0,1ef1d48aa16d3d1524839190f2a92e68f271b7bbb06dbb86c77c3115b6a414ab,2025-01-24T17:15:16.197000
|
||||
CVE-2025-24360,0,0,9b8d13d61afdc9c82b83c3501ec96029794286adee2fcfad926404556ff5277e,2025-01-25T01:15:24.047000
|
||||
CVE-2025-24361,0,0,398144fa5fffc1da1e51f93b9cc9373c390b7e27a0bd14059d4987e6ffaf08d7,2025-01-25T01:15:24.193000
|
||||
CVE-2025-24362,0,1,774d163888847f4f8eb836d21769ed3bcb1a27d944aa2626357eff8b204f411b,2025-03-31T14:15:18.993000
|
||||
CVE-2025-24362,0,0,774d163888847f4f8eb836d21769ed3bcb1a27d944aa2626357eff8b204f411b,2025-03-31T14:15:18.993000
|
||||
CVE-2025-24363,0,0,e5280365e8798c3d50dec901fd082ab2d29cb61ba3ca73c44ff38bee5500b546,2025-01-24T19:15:13.633000
|
||||
CVE-2025-24364,0,0,a66718071611b4c5bae8243cb0fb69ff42bed53bfb4d9e391dd0ea1f1905ca71,2025-01-27T18:15:41.690000
|
||||
CVE-2025-24365,0,0,bb71464e8d0a0e412e7a77dc3188cffac46c5287ce4a03629456d8e9fa3bb7a8,2025-01-27T18:15:41.847000
|
||||
@ -286281,6 +286283,7 @@ CVE-2025-27090,0,0,d649018651979639a7b1c8acf0eda3f6b93b0e44c8b2420240cdfb846024f
|
||||
CVE-2025-27091,0,0,76930f38a3a2f053bdab75441f1f504cf886ff8b7358adb8f0d250a110f1e7f3,2025-02-27T20:28:14.007000
|
||||
CVE-2025-27092,0,0,9aed7fdfc4c9e1280fc67359d9f3b896d01b5eabc18d15f22f08d950559385bb,2025-02-27T20:28:50.730000
|
||||
CVE-2025-27094,0,0,912ebcbf7addc06d338a9df39021fc14862a3f9eff1e3429510bfe78c00688b7,2025-03-03T17:15:15.433000
|
||||
CVE-2025-27095,1,1,32c62ea5838818bf34b35b3772fac952bd03e36658f5516f3034d0edfe619197,2025-03-31T16:15:23.493000
|
||||
CVE-2025-27096,0,0,b035fc053249cd7e8871d424805bbce3d771ae3f64c764848dba544b572355f7,2025-02-28T19:28:44.283000
|
||||
CVE-2025-27097,0,0,e199953469681b5e92cc2168d6b4e4da9b471d9694c80dd2a45e6436dbabbaba,2025-02-27T20:27:24.720000
|
||||
CVE-2025-27098,0,0,873fcb90264f4e04a047cee2cfc6d823db0b6142c91033a12829dbc6dd942122,2025-02-27T20:27:05.270000
|
||||
@ -286319,6 +286322,7 @@ CVE-2025-27145,0,0,7e8b752c87a1dd34aba04c7cf87b9d5cdd943f6b8e8f712300f3772423d75
|
||||
CVE-2025-27146,0,0,c51f91ac720f699534057bee0b51fc55efae6c1d6306e8587f645f59e515f2c0,2025-03-04T20:43:22.367000
|
||||
CVE-2025-27147,0,0,cc15abe63c8009f5954cdd7886ec7fb9c369870bd55cc8f200641b24b9796a6f,2025-03-27T16:45:46.410000
|
||||
CVE-2025-27148,0,0,a02be6d0e91bf8eda3626965312087a36b8be8d291da209d00439f9926ccce17,2025-02-25T21:15:18.073000
|
||||
CVE-2025-27149,1,1,f98af65a84c21c5a44b8832f749c37770dc631ac79de9c2d0248d2cec5defeca,2025-03-31T16:15:23.743000
|
||||
CVE-2025-2715,0,0,9b86d209899e100764be1390e15dd32c759d3c6ac90bee191f2f3abd07adc820,2025-03-27T16:45:46.410000
|
||||
CVE-2025-27150,0,0,84e05225efa8e3530bf3e9b4d6d8cc0590f0913d7edd820f58c7a162101240ec,2025-03-04T17:15:18.663000
|
||||
CVE-2025-27152,0,0,0648b2f50e1454bf7df312f45bec2e233def1fe7ff128aed2d0f80c1402a5bdd,2025-03-07T20:15:38.560000
|
||||
@ -286688,6 +286692,7 @@ CVE-2025-27925,0,0,20d248e60598e5f95d1fae0ce2e564e286fc723b6dc1ad95ef277e933ed7c
|
||||
CVE-2025-27926,0,0,55eb57ada8c72239b09d3012ac06f54ef846ef608760d35a348131200e00a4d9,2025-03-10T23:15:35.670000
|
||||
CVE-2025-27932,0,0,036d05ff385938ab4080533cb14ce5447e7754455506217e340766b3e6cee90a,2025-03-28T18:11:40.180000
|
||||
CVE-2025-27933,0,0,93368137a33aa362057a4035ec036f1aedaefb3c8486745a8d93918e46a37c4e,2025-03-27T14:55:25.660000
|
||||
CVE-2025-2794,1,1,4d08dc1de71e61afdcfcf1e2356202d579c5029c4ef17f5f62f7755728438245,2025-03-31T17:15:41.333000
|
||||
CVE-2025-28010,0,0,6260ea576a8c0d7bd0a38d2f3c79cf58da9a7c5443332c696e69e06a75d63ce4,2025-03-19T15:15:54.430000
|
||||
CVE-2025-28011,0,0,fdcb5591ea26e059e8d35048712169c6e42fd9f817189e1097ee50f0c5ccdc59,2025-03-28T20:00:36.220000
|
||||
CVE-2025-28015,0,0,2ec3b03d6a2c5b451e55cb244fde2066264789b2e32a98f716bffd5d4cc31009,2025-03-28T19:49:16.520000
|
||||
@ -286700,7 +286705,7 @@ CVE-2025-28091,0,0,e9eb73da16a1e1ebd7ccc9c4de8f5a66b42f4596b5cfb86129d2dfa324680
|
||||
CVE-2025-28092,0,0,67281ba6ae9fe6b82cabba74a4b589f6e13899072cae60ba58e4096063bd9fce,2025-03-28T22:15:18.237000
|
||||
CVE-2025-28093,0,0,0f75d6032cdd86e0fdfd7eb67c7196f1d5298411cf0156c82964fa444bc3986c,2025-03-28T22:15:18.410000
|
||||
CVE-2025-28094,0,0,8a31185d2a0e3d7a37c4e644f2100c542a052d4689ed7a31f18e643797f3b9be,2025-03-28T22:15:18.563000
|
||||
CVE-2025-28096,0,0,6f88500a311dfa5d585a5efaa13f29c5806757ddc336581974aa95d19c7ff185,2025-03-28T22:15:18.700000
|
||||
CVE-2025-28096,0,1,16d024745a7aef83121952f4fe39c64486ee7ed76aa52fcde001a2a6410e237e,2025-03-31T17:15:40.403000
|
||||
CVE-2025-28097,0,0,7b978a840b839efdbb92782b35164535e64ad57d5c7c1ac6787e57af8db77906,2025-03-28T22:15:18.827000
|
||||
CVE-2025-28135,0,0,ce5da46c9ae66e075cac4fbd39873077e479e00a68bacb4de079df96e23d166b,2025-03-28T17:15:28.550000
|
||||
CVE-2025-28138,0,0,bf69fa2145b09686fa82d01cb331f5320bb8ab2432e683274df5441111a43649,2025-03-28T17:15:28.770000
|
||||
@ -286876,7 +286881,7 @@ CVE-2025-2924,0,0,1ea685690484d699e07144c8e8a027ab06da025e84b4571345d78d750187cf
|
||||
CVE-2025-2925,0,0,64b08f3ff4ecb5aed356d5952fb8d31b50b9590234f3aa096b4b2f10d9d9026e,2025-03-28T21:15:17.913000
|
||||
CVE-2025-2926,0,0,d248fce0cb7e1f7d306b831454831b89752f9bb96a41c10946e6b21184fb45af,2025-03-28T21:15:18.030000
|
||||
CVE-2025-29266,0,0,b3e83557d001e4e60b8ad6db8c48708a1ef499fec7f0672c35a838a5ce3564e0,2025-03-31T13:15:43.250000
|
||||
CVE-2025-2927,0,1,d04ab5ff77014fe28ae90a8a0d7137ebbf927e4b791d85e59de2472be025f9ec,2025-03-31T15:15:44.097000
|
||||
CVE-2025-2927,0,0,d04ab5ff77014fe28ae90a8a0d7137ebbf927e4b791d85e59de2472be025f9ec,2025-03-31T15:15:44.097000
|
||||
CVE-2025-29294,0,0,473bd475f5fb8d7702e2a93a3ba641b31019129d004d4409bf3c3b190bf15c6d,2025-03-24T17:15:20.880000
|
||||
CVE-2025-29306,0,0,bd725405e345d7f20364b3ed47d10bd9ad50c00136ceaaea9bc0f918ef121df8,2025-03-28T18:11:40.180000
|
||||
CVE-2025-29310,0,0,5968624cc4eac663d93be6b2916e12611652e7aaf63c8a9dec75d1bf422a4ce5,2025-03-27T16:45:46.410000
|
||||
@ -286930,10 +286935,10 @@ CVE-2025-2955,0,0,d83378c7e317cdb0fe079597f38bf579e1f5ed3820efe14a7ab5c84bd4c1ac
|
||||
CVE-2025-2956,0,0,90a1b4cdebc743592cd4699d9cd14343efe464b4279255164f5bcaf799c79b37,2025-03-30T18:15:15.783000
|
||||
CVE-2025-2957,0,0,2041a1bad0f3b94a621933efa1578c7527d556b201ebee469ee54a43ff2adaee,2025-03-30T19:15:14.933000
|
||||
CVE-2025-2958,0,0,3fb7ff6d9357ff22658d5d8cf8c232650334b49c9bd2618eded13fa8fb2dfe34,2025-03-30T20:15:14.490000
|
||||
CVE-2025-2959,0,1,98429bce221ab797462f5566c367fee41dca49c182ed6abb15395815f9804d4b,2025-03-31T15:15:44.230000
|
||||
CVE-2025-2960,0,1,7fc7fa71f712e70da9e825d8c7fa7f99ba25ac47f0c8941d15fbb62eb0ad7aca,2025-03-31T15:15:44.353000
|
||||
CVE-2025-2959,0,0,98429bce221ab797462f5566c367fee41dca49c182ed6abb15395815f9804d4b,2025-03-31T15:15:44.230000
|
||||
CVE-2025-2960,0,0,7fc7fa71f712e70da9e825d8c7fa7f99ba25ac47f0c8941d15fbb62eb0ad7aca,2025-03-31T15:15:44.353000
|
||||
CVE-2025-2961,0,0,40343ba1dff53e3d26f084a8364379afb407239058565a02a4f5e10c05608d06,2025-03-30T22:15:15.293000
|
||||
CVE-2025-2963,0,0,7935bf29cf82104e394f20a41a12f7131573cfa70725a19775826488848d4213,2025-03-30T22:15:15.597000
|
||||
CVE-2025-2963,0,1,231a2ea9107fcd3ff85eb098ce0b1e18aac611e88c6b2b6ab9a5a3a3ceb0ba73,2025-03-31T16:15:24.443000
|
||||
CVE-2025-29635,0,0,777467e4305cb03534788245920edd5bae11b2ba20b7be470dbace3c9dda6025,2025-03-27T16:45:46.410000
|
||||
CVE-2025-2964,0,0,f792eb8dbb924c494beec0502f23ec0d845150b3f1a6766a57443bf372d2e87b,2025-03-30T23:15:40.477000
|
||||
CVE-2025-29640,0,0,684661940e38e3fbc4f2676adca19fd07a4b95839bb039ae44b7731f40899f4a,2025-03-24T18:15:23.613000
|
||||
@ -286950,10 +286955,12 @@ CVE-2025-2973,0,0,e203e068f7a39c2e0f5bb747b8472a8aa7e23cbc4ebcdb29280b8e4f4fa2be
|
||||
CVE-2025-2974,0,0,03c9d6549803ce2a83a8b5cb8e5bf9f28782a7d478987a9b985678a72c54e7cd,2025-03-31T04:15:17.633000
|
||||
CVE-2025-2975,0,0,54e4db29e6cd8e0854e5ae29ed995f3031619b872dddf128886ac54be5b16384,2025-03-31T04:15:17.927000
|
||||
CVE-2025-2976,0,0,b7586ea3a689e9721adedc5d4021b4eeab053eda769dec92478da646b4214af8,2025-03-31T05:15:16.090000
|
||||
CVE-2025-29766,1,1,2e6df4aa15125586c25d6c484b77dafb03aa7d07d177092f50975543e4ce549e,2025-03-31T16:15:23.897000
|
||||
CVE-2025-29768,0,0,492de4cf9bc586f0c097ff358f0d6522edec16b3a3700b1c85d835d10d900b1f,2025-03-13T17:15:37.623000
|
||||
CVE-2025-2977,0,0,016b99a65b42725cfd4a2d138d7bd1a9f4b5c5a184a0d45b000c90090c56cf70,2025-03-31T05:15:16.310000
|
||||
CVE-2025-29770,0,0,64a7761b4081159cba0465c32543c25f86c7bc3fdca10868943a613198ef8db7,2025-03-19T16:15:31.977000
|
||||
CVE-2025-29771,0,0,40341ca82018118ee52a3bd3891794f5bfb5824a75c694db796b525153dba5da,2025-03-14T19:15:48.847000
|
||||
CVE-2025-29772,1,1,e25f946ddd2d726f10f485339439d4deb763006155cbf9983c4498f443a09b3b,2025-03-31T16:15:24.063000
|
||||
CVE-2025-29773,0,0,a0c99e5f4c0b4eb6eb4d5e0663a9bd84830dc80c9b3c22b7d3ef4fb28b96c270,2025-03-13T19:15:52.257000
|
||||
CVE-2025-29774,0,0,132c9dc0cf3d9b063a6d6580e246aefe506de957f88f8f001b6f77f344e9e9b3,2025-03-15T21:15:35.250000
|
||||
CVE-2025-29775,0,0,f8aff533c0e84344979e5487ebc0d33112cc14196a6b0362233e681fd1ef3332,2025-03-15T21:15:35.367000
|
||||
@ -287002,24 +287009,32 @@ CVE-2025-29925,0,0,53b6adff79028a26a70908208cd05b264ecb017e2af474d23bebc859334f4
|
||||
CVE-2025-29926,0,0,40b05deb93101dbe75086a11818b59b57b6a814b20f271aa3698b66c8a60145c,2025-03-19T18:15:25.770000
|
||||
CVE-2025-29927,0,0,49e3b1fc7c81fe1198308a06e6e60ce9a5b39547427dcb2d29573308c768b45c,2025-03-28T15:15:49.470000
|
||||
CVE-2025-29928,0,0,a8d214b86a591a9a4539038c0623d4202e473916c9bd03bcdaaf6e157b8bec53,2025-03-28T18:11:40.180000
|
||||
CVE-2025-29929,1,1,a99270ec82d8cf43fba05b773cecb87a9985240271995edd31960d49040a5fea,2025-03-31T16:15:24.237000
|
||||
CVE-2025-2993,0,0,7b4d0c8e4e7e6c936ba94c1f6816c882fe2a65ce40176b4359c1b31917ee83c0,2025-03-31T12:15:15.700000
|
||||
CVE-2025-29930,0,0,5c209ec60ca4eeb14d225cb677e5ddb09384395f274bc0cae2e3304b0a41e066,2025-03-18T19:15:51.340000
|
||||
CVE-2025-29932,0,0,4b9314c077daab23a79ad834ada6389de74731b87a8def4d7d8999f0fd1a08b1,2025-03-27T16:45:46.410000
|
||||
CVE-2025-2994,0,0,e8ba45ccd27698f2234009fae89e07a3183f1b76e72527bcb3d0a5af3c21fdba,2025-03-31T13:15:45.183000
|
||||
CVE-2025-2995,0,1,698678914ee6d7d6e5f26684172342ffe111f04a011ad49347f3d16fa392249f,2025-03-31T15:15:44.477000
|
||||
CVE-2025-2995,0,0,698678914ee6d7d6e5f26684172342ffe111f04a011ad49347f3d16fa392249f,2025-03-31T15:15:44.477000
|
||||
CVE-2025-2996,0,0,cf8510f9fd984412291ec7952491dc90016296afc269839a77136b69cda9226c,2025-03-31T13:15:45.503000
|
||||
CVE-2025-2997,1,1,898a79f3fc7a73bfcbeff59f886b3bb85a9d9a559c5c758c749272cc468e8138,2025-03-31T14:15:20.137000
|
||||
CVE-2025-2998,1,1,0a37eb96c7598c33f1d003c10f478e9f687f361405bbae7facff66d7ae34f29d,2025-03-31T14:15:20.370000
|
||||
CVE-2025-2997,0,0,898a79f3fc7a73bfcbeff59f886b3bb85a9d9a559c5c758c749272cc468e8138,2025-03-31T14:15:20.137000
|
||||
CVE-2025-2998,0,0,0a37eb96c7598c33f1d003c10f478e9f687f361405bbae7facff66d7ae34f29d,2025-03-31T14:15:20.370000
|
||||
CVE-2025-29980,0,0,02b1f4fe8cc2958b2decdcfb4a2e99acadf56a3773103d9215c6253bff189364,2025-03-20T20:15:33.233000
|
||||
CVE-2025-2999,1,1,f766853e03632d197822327d895a63c1357e5cfb93e30d6bf0c34524818c4785,2025-03-31T15:15:44.657000
|
||||
CVE-2025-2999,0,0,f766853e03632d197822327d895a63c1357e5cfb93e30d6bf0c34524818c4785,2025-03-31T15:15:44.657000
|
||||
CVE-2025-29993,0,0,5a3aa3d216416e2fe2b892d0a3793dacda985a3191a3f3e25b8b0846fab45986,2025-03-27T16:45:27.850000
|
||||
CVE-2025-29994,0,0,8b1d4c4db8a5bb026ac4bf9b653f3b25d05b3b75f8c87e310d6dd90fa8b8e6c7,2025-03-13T12:15:13.660000
|
||||
CVE-2025-29995,0,0,4e499babdfbbb2f8f3e0d85f41baf447f5b6555ca95dd3dd082c2591d71bbc2e,2025-03-13T12:15:13.830000
|
||||
CVE-2025-29996,0,0,d9ce8180be5b647a2760a5e1584c793faf6e1ad0f69620939820540427591c65,2025-03-13T12:15:13.980000
|
||||
CVE-2025-29997,0,0,23c5a96e3ca55a349666d8f7b75c279d7c1f39d20cf9fd2507bd7cdd234e7b90,2025-03-13T12:15:14.127000
|
||||
CVE-2025-29998,0,0,3f15888bdd465d14766f235864b3d61f644d43d3eb6a7cb983806db35738379a,2025-03-13T12:15:14.277000
|
||||
CVE-2025-3000,1,1,e03c42c00a4b10794fedc7f580f7b3fe9e42a347d64b766039198360b39af56a,2025-03-31T15:15:46.297000
|
||||
CVE-2025-3000,0,0,e03c42c00a4b10794fedc7f580f7b3fe9e42a347d64b766039198360b39af56a,2025-03-31T15:15:46.297000
|
||||
CVE-2025-30004,1,1,1364d107bb6c7f41c95a057bca66f2aa1afe5de34c484fea06ad70bb85a678dd,2025-03-31T17:15:41.737000
|
||||
CVE-2025-30005,1,1,16505715170d88cde58145933126fb581063c9cbd194515fa6e178a97b7eb38f,2025-03-31T17:15:41.880000
|
||||
CVE-2025-30006,1,1,94dbaa3c46ffedfc3603ead204fb6ce24795883ef875e52a66e81cb24e1573ed,2025-03-31T17:15:42.020000
|
||||
CVE-2025-3001,1,1,6783170e18f794e5e0220e82172d0170aca6943d1ee9cf4188f46e9839779a5a,2025-03-31T16:15:27.277000
|
||||
CVE-2025-3002,1,1,f230b3452f16c6ec4d374235cbef17d85d8c2076abdc7b7ac57eef2e6d4d50d5,2025-03-31T16:15:27.440000
|
||||
CVE-2025-30022,0,0,c29865dc2c1c53a7dddbda80ab65c0b183de989ceaa003da3dfe172b934c1c01,2025-03-19T19:15:50.703000
|
||||
CVE-2025-3003,1,1,fae928727d58bdd1e791ffc9c9e860a745865a854a222942833fd71e698ef09d,2025-03-31T17:15:43.557000
|
||||
CVE-2025-3004,1,1,2aae93233bca53264c07ac3236cecf2eccbd4dede9085a04e5a2a3a32e77686f,2025-03-31T17:15:43.757000
|
||||
CVE-2025-30066,0,0,7f23398934e792b1c90dbe88228c40d734b32c51332b192223c783ade90f06e4,2025-03-29T01:00:02.337000
|
||||
CVE-2025-30067,0,0,63d999ebc0b33c0cceea6e046469ec2f368e6f60354a2b2a24d59bf06e6b7bef,2025-03-27T18:17:36.267000
|
||||
CVE-2025-30073,0,0,34725e2ee66a680252fcf6be47611a992f4a93cad025a76602eb6cbba6a5215b,2025-03-27T16:45:27.850000
|
||||
@ -287030,7 +287045,7 @@ CVE-2025-30089,0,0,94fa5ca45d8355546d9ceb129470f63603acc7f5a96fbd0d387c59c0d7484
|
||||
CVE-2025-30091,0,0,39538125ede0e29a71cad30eeddad6386506108313b0620cfdbf5d936f5285c5,2025-03-27T16:45:46.410000
|
||||
CVE-2025-30092,0,0,81be76bd5e4d358e5e497793b136a481ab98791f4e442314445db080e37b822d,2025-03-24T14:15:20.007000
|
||||
CVE-2025-30093,0,0,655931c237d66508239faf3d38e961694a438293c2ddfd8c753f3093a3e9d18e,2025-03-28T18:11:40.180000
|
||||
CVE-2025-30095,1,1,b9f53d0615109fa8a40a64e91748d4558a1f7b46ead0706de16c5ce66b014a08,2025-03-31T15:15:44.843000
|
||||
CVE-2025-30095,0,0,b9f53d0615109fa8a40a64e91748d4558a1f7b46ead0706de16c5ce66b014a08,2025-03-31T15:15:44.843000
|
||||
CVE-2025-30106,0,0,d0ec2fed531a791fcdb7e275c6cc676f11c96b4c23a970884370a41e87a3b6a0,2025-03-21T17:15:40.227000
|
||||
CVE-2025-30107,0,0,7ae7d3e2db9a3bcfc7100b14968701083bbe2237ed720df55c99fa3bf4e70491,2025-03-24T22:15:14.450000
|
||||
CVE-2025-30109,0,0,c697d3ced89db3fb240ff33efe8653842b736020e748d3eead592e6135cb99ac,2025-03-21T17:15:40.447000
|
||||
@ -287057,11 +287072,14 @@ CVE-2025-30141,0,0,4828215ddc551f721f9119cc66fd0b6301157a9edecaa8b1bbaf43bada37f
|
||||
CVE-2025-30142,0,0,e6345e1b8b1602cf6baee1bb466c15695f398722ed692cc5b3b87414578f99b0,2025-03-25T16:15:27.130000
|
||||
CVE-2025-30143,0,0,c72031c589e36c3d2604bcb120ba9a6dd94ff4f6eee14259c749d5630ebbfba8,2025-03-17T16:15:28.643000
|
||||
CVE-2025-30144,0,0,15bf5f8218ba2223682697484bbc86f902d5a148eb49e6248d7c2412b7737d74,2025-03-19T16:15:33.080000
|
||||
CVE-2025-30149,1,1,23a270b5726bc930d5dce3e0bfccf910c2e1e825c5d532fc22e878a800b3d289,2025-03-31T16:15:25.040000
|
||||
CVE-2025-30152,0,0,fb7d8b36a0a9757a199a4cf8f9b4b43b19a772c330ea1d3bb0186654fc6f920c,2025-03-19T16:15:33.313000
|
||||
CVE-2025-30153,0,0,da47524558affc65b6874f9bef3637406802e7d0a047ff83de555cab022828e8,2025-03-19T16:15:33.607000
|
||||
CVE-2025-30154,0,0,f4c8f04ec10c8608001f5ee4aec87a1247d8c3c0588d5bdb69da7f038e16b9a7,2025-03-29T01:00:02.337000
|
||||
CVE-2025-30155,1,1,ce9991316faec2414fb0a11e64d60f00b90c2addae9a6a86c74d235d6c0c7f76,2025-03-31T16:15:25.187000
|
||||
CVE-2025-30157,0,0,b7d565fa042efeea73d550fb215fb58640989cdcd04813767e503c6d1f6d08fe,2025-03-21T16:15:19.767000
|
||||
CVE-2025-30160,0,0,25be472787022894833e0e3357865514f4516e8d537c62073ee43066a681f12b,2025-03-20T19:15:38.383000
|
||||
CVE-2025-30161,1,1,4ef401440b9ae76c291cb5599321f65dce6026d9a737cbde8025803161077f04,2025-03-31T16:15:25.333000
|
||||
CVE-2025-30162,0,0,8641e47d280f65cb3bb61486e9cfbaa56cd67a484749372cb3bbdafe7ce809ee,2025-03-27T16:45:46.410000
|
||||
CVE-2025-30163,0,0,655322787d885aa61d50ea5e7ecff74dc9237e2c1710cc57eaf106a5eadfb182,2025-03-27T16:45:46.410000
|
||||
CVE-2025-30164,0,0,c838231ddadd650538b91334381739f0e5f84496049f4ab61b98fedaf2408f7b,2025-03-27T16:45:27.850000
|
||||
@ -287070,9 +287088,11 @@ CVE-2025-30179,0,0,e6188b5cfe41efd4be24afd0a9be97fe3cad7c2aaaf7dc5206b7ef410f616
|
||||
CVE-2025-3019,0,0,9b9c69522dd584e9fa82131200a6442717b6558a8bb9867e6a05476c0b32a39e,2025-03-31T07:15:19.133000
|
||||
CVE-2025-30196,0,0,fe87e1ebefbcfeb53c0f502cc8d045248065acd7de3485e4d3812fc7fa420ce6,2025-03-19T19:15:50.980000
|
||||
CVE-2025-30197,0,0,2d4109cd57eb04a1dbf5d412cbfee8b568c6ea58cd4671c7483e548e96f39bba,2025-03-21T14:15:17.837000
|
||||
CVE-2025-30203,1,1,8cabe7591f64e6f571fcab353dbe7dee5071808bafd7be7e6982bafa04975742,2025-03-31T16:15:25.473000
|
||||
CVE-2025-30204,0,0,b1fa78b55f063476d0284edd7879b33da275b35192b8e844de9525f5d85299bd,2025-03-21T22:15:26.420000
|
||||
CVE-2025-30205,0,0,5a6e6a15e27f16257c15600ed612a889ee89ec4cb07cdade70362275ccba48b8,2025-03-27T16:45:46.410000
|
||||
CVE-2025-30208,0,0,8d10db1183f79516c18383e3ab326bcd260d9a2a6e5e9bbda5d21358e669589c,2025-03-27T16:45:46.410000
|
||||
CVE-2025-30209,1,1,dce2bedb938ee5306b595e66c46da75a3803d8a60b6da781bf068882d12880ec,2025-03-31T16:15:25.620000
|
||||
CVE-2025-3021,0,0,9df639cb70538207566d164b1e8487699b37fa816d6f8812bbf4c54400d90bb5,2025-03-31T11:15:39.973000
|
||||
CVE-2025-30211,0,0,d33a5774a6df695f88dbc7402e84e28608ec28f5c63a447e0230b78b38298384,2025-03-28T18:11:40.180000
|
||||
CVE-2025-30212,0,0,972410e2716e8f2e53ffd488d4d423564ff98176b3c1d36a04eac762d7cbcb18,2025-03-27T16:45:46.410000
|
||||
@ -287084,6 +287104,7 @@ CVE-2025-30219,0,0,326f919a01c3e200686e1e77066b4ecd3788d0deb365cd59968de4fd276ff
|
||||
CVE-2025-3022,0,0,0007358a235507fc3f7d7e9252858569b1bcfc2f32e0b6c2da3452911c2fc82d,2025-03-31T12:15:16.130000
|
||||
CVE-2025-30221,0,0,6ae53bdf0345b96392a165c31ba84cf22b0d6efa70d330536507ae8f41f720cb,2025-03-27T16:45:12.210000
|
||||
CVE-2025-30222,0,0,8181bb8e50b5d5403e3aeeed651e80d360ebd306c6c001c9fd5d8239df2af092,2025-03-27T16:45:46.410000
|
||||
CVE-2025-30223,1,1,19f63e72674ccaaa46b3d7f4969c89755014f770b9f199deaf03d47cf5b554e5,2025-03-31T17:15:42.147000
|
||||
CVE-2025-30225,0,0,cc37e4f779c1e97cd26219457ed556549a6b6364424a050cb8b68a80d988d93c,2025-03-27T16:45:27.850000
|
||||
CVE-2025-30232,0,0,d8f8a7b7969436fc63ce073fd14636bd35e3c03c930952f5855db44b35d714d7,2025-03-28T18:11:40.180000
|
||||
CVE-2025-30234,0,0,cf20660d6d37e637116a40ce9b3055465db9a1b9c87663c91728f3bae499e866,2025-03-19T05:15:41.353000
|
||||
@ -287115,11 +287136,15 @@ CVE-2025-30364,0,0,48a5dad003b3f979a021e1d834fd1b4226cb33b601a7f25e13b9891c5e86c
|
||||
CVE-2025-30365,0,0,65a32eba752674619036c6bd82b0cec72e48f3968ab15291555b33792fac68c4,2025-03-28T18:11:40.180000
|
||||
CVE-2025-30366,0,0,7c462c760f5d73fa7f0c5a06a01c7159836221511038d690a2c9ef464df902d4,2025-03-28T18:11:40.180000
|
||||
CVE-2025-30367,0,0,4c58ea6c207970fa821d8fe810dbd28c39dba4b8a1bd4c135404ea3485067a19,2025-03-28T18:11:40.180000
|
||||
CVE-2025-30368,1,1,22d41b1026771791f84697be885d2ab2b3155ccc1a9a6379bde61c9066f3fb45,2025-03-31T17:15:42.320000
|
||||
CVE-2025-30369,1,1,473c2b175a3e32b7abfe7eb8e048d1f7503b036d2be6eb1030fa4ec6e5c38249,2025-03-31T17:15:42.497000
|
||||
CVE-2025-30371,0,0,460a9e9c642c5d00739d5b5e11ddec1f7f2ad086735daa8cc9c39d2d2cc86b2e,2025-03-28T18:11:40.180000
|
||||
CVE-2025-30372,0,0,e366784170fd69403c95573e66e81140f6ab7eebcee57a3b740e41f187b2c54b,2025-03-28T18:11:40.180000
|
||||
CVE-2025-30407,0,0,5398c42f506ff0cf746668f38c343a54dfb5c3e8151c8cfb451ea4e82909416d,2025-03-27T16:45:27.850000
|
||||
CVE-2025-3047,1,1,e0ce3b6e746fdadd6a211e2a7875b834c4eeb4396cc6bf0028a03eb50c077df9,2025-03-31T17:15:43.953000
|
||||
CVE-2025-30472,0,0,2ebab4b860069e7704c45b0afdbc37111cef0ce9e224a566e03ddd40410e1a00,2025-03-25T16:15:27.337000
|
||||
CVE-2025-30474,0,0,1e288c28c7a9253d8007962ed83d55ed1c6a50132909d1d77f3fa1d8a9ee1e62,2025-03-23T19:15:14.973000
|
||||
CVE-2025-3048,1,1,e712d7b5b3b6a19e9c7eac9e20165e6086339f7f6fcd926d62dd5110c82018e4,2025-03-31T17:15:44.067000
|
||||
CVE-2025-30521,0,0,eee2f839741a5e176cacf865cc6d42d2df432fd3f60c0ff1d8e1355c4ac5b964,2025-03-27T16:44:44.143000
|
||||
CVE-2025-30522,0,0,ab298bed764aa241f7fdd86556fbb1b68374df7068fea4de0fc7d11feb11540d,2025-03-27T16:44:44.143000
|
||||
CVE-2025-30523,0,0,27dd8edc00c6d2ce64b6c4519874b126f4e153d04e04c3150119a6c112a3e071,2025-03-27T16:44:44.143000
|
||||
@ -287355,6 +287380,10 @@ CVE-2025-31110,0,0,9c1e095e916574b5bad3dc98545645eb35bcfc3a15748b26a91c424286375
|
||||
CVE-2025-31111,0,0,708ed17ed7ca590b80cc7bf7efff771b88139eb264b9a4c93912c661b895b119,2025-03-27T04:15:29.310000
|
||||
CVE-2025-31112,0,0,19710893cdeca6b79e6ed61173b8773b8204171d0fa597c5282b3a5c8595c248,2025-03-27T04:15:29.427000
|
||||
CVE-2025-31113,0,0,e197f9731c7d6bd9e53ba8f025a3a8ac307f507846eecfd137f3c958a7e0d19f,2025-03-27T04:15:29.493000
|
||||
CVE-2025-31116,1,1,9ae40303393ccfe6a9587f4e5f559b2c755c9cb58d8dda6fe295eaf24145ca47,2025-03-31T17:15:42.663000
|
||||
CVE-2025-31117,1,1,0fc0d50f6d8aa62b7f65f7b8eaca11ddd6b8925eb0422b8ee52db1c6e3dbbf4d,2025-03-31T17:15:42.833000
|
||||
CVE-2025-31122,1,1,b8c01e9f1f9dbc740fffeb9cedbc00b2fb56d1c193bda8eacfaf89659abfd347,2025-03-31T17:15:42.997000
|
||||
CVE-2025-31125,1,1,33cdedc45a52219d00613251be7d939653b75811506d0a09851b1ff0fc148133,2025-03-31T17:15:43.163000
|
||||
CVE-2025-31139,0,0,f77a452b5e1edddf158af71a264cde2428ac6b657f8dcbc921a40f17dadbb16d,2025-03-27T16:45:12.210000
|
||||
CVE-2025-31140,0,0,b5354da0d0be6641b36fd62d7ae5da72fa26945541a5950d6dcb5ec04d83adab,2025-03-27T16:45:12.210000
|
||||
CVE-2025-31141,0,0,406867c864568f6048dee1b7cffcd596f08f273e12b98bc9b9a899fec211a190,2025-03-27T16:45:12.210000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user