mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-06 18:52:58 +00:00
Auto-Update: 2025-03-17T07:00:22.007814+00:00
This commit is contained in:
parent
ed6505a58e
commit
bab9b3f416
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-0624",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2025-02-19T19:15:15.120",
|
||||
"lastModified": "2025-03-17T03:15:37.830",
|
||||
"lastModified": "2025-03-17T05:15:33.400",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -80,6 +80,10 @@
|
||||
"url": "https://access.redhat.com/errata/RHSA-2025:2867",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2025:2869",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2025-0624",
|
||||
"source": "secalert@redhat.com"
|
||||
|
137
CVE-2025/CVE-2025-23xx/CVE-2025-2361.json
Normal file
137
CVE-2025/CVE-2025-23xx/CVE-2025-2361.json
Normal file
@ -0,0 +1,137 @@
|
||||
{
|
||||
"id": "CVE-2025-2361",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-03-17T05:15:36.713",
|
||||
"lastModified": "2025-03-17T05:15:36.713",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in Mercurial SCM 4.5.3/71.19.145.211. It has been declared as problematic. This vulnerability affects unknown code of the component Web Interface. The manipulation of the argument cmd leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "PASSIVE",
|
||||
"vulnConfidentialityImpact": "NONE",
|
||||
"vulnIntegrityImpact": "LOW",
|
||||
"vulnAvailabilityImpact": "NONE",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
|
||||
"baseScore": 5.0,
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "NONE",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 10.0,
|
||||
"impactScore": 2.9,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-94"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.299860",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.299860",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.514024",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
145
CVE-2025/CVE-2025-23xx/CVE-2025-2362.json
Normal file
145
CVE-2025/CVE-2025-23xx/CVE-2025-2362.json
Normal file
@ -0,0 +1,145 @@
|
||||
{
|
||||
"id": "CVE-2025-2362",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-03-17T05:15:37.353",
|
||||
"lastModified": "2025-03-17T05:15:37.353",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in PHPGurukul Pre-School Enrollment System 1.0. It has been rated as critical. This issue affects some unknown processing of the file /admin/contact-us.php. The manipulation of the argument mobnum leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 6.9,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "LOW",
|
||||
"vulnIntegrityImpact": "LOW",
|
||||
"vulnAvailabilityImpact": "LOW",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||||
"baseScore": 7.3,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||||
"baseScore": 7.5,
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "NONE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL"
|
||||
},
|
||||
"baseSeverity": "HIGH",
|
||||
"exploitabilityScore": 10.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-74"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/12T40910/CVE/issues/3",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://phpgurukul.com/",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.299861",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.299861",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.514464",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
137
CVE-2025/CVE-2025-23xx/CVE-2025-2363.json
Normal file
137
CVE-2025/CVE-2025-23xx/CVE-2025-2363.json
Normal file
@ -0,0 +1,137 @@
|
||||
{
|
||||
"id": "CVE-2025-2363",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-03-17T06:15:25.387",
|
||||
"lastModified": "2025-03-17T06:15:25.387",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability classified as critical has been found in lenve VBlog up to 1.0.0. Affected is the function uploadImg of the file blogserver/src/main/java/org/sang/controller/ArticleController.java. The manipulation of the argument filename leads to path traversal. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "LOW",
|
||||
"vulnIntegrityImpact": "LOW",
|
||||
"vulnAvailabilityImpact": "LOW",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
||||
"baseScore": 6.5,
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL"
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-22"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.299862",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.299862",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.514721",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.notion.so/Arbitrary-File-Upload-Vulnerability-in-VBlog-1-0-0-1adc693918ed8067b19ed9c61381024b",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
141
CVE-2025/CVE-2025-23xx/CVE-2025-2364.json
Normal file
141
CVE-2025/CVE-2025-23xx/CVE-2025-2364.json
Normal file
@ -0,0 +1,141 @@
|
||||
{
|
||||
"id": "CVE-2025-2364",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-03-17T06:15:25.683",
|
||||
"lastModified": "2025-03-17T06:15:25.683",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability classified as problematic was found in lenve VBlog up to 1.0.0. Affected by this vulnerability is the function addNewArticle of the file blogserver/src/main/java/org/sang/service/ArticleService.java. The manipulation of the argument mdContent/htmlContent leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 5.1,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "PASSIVE",
|
||||
"vulnConfidentialityImpact": "NONE",
|
||||
"vulnIntegrityImpact": "LOW",
|
||||
"vulnAvailabilityImpact": "NONE",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
|
||||
"baseScore": 3.5,
|
||||
"baseSeverity": "LOW",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
|
||||
"baseScore": 4.0,
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 2.9,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-94"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://magnificent-dill-351.notion.site/Stored-XSS-Vulnerability-in-VBlog-1-0-0-1adc693918ed80d9bd08e03df0ed7a98",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.299863",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.299863",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.514763",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2025/CVE-2025-23xx/CVE-2025-2395.json
Normal file
60
CVE-2025/CVE-2025-23xx/CVE-2025-2395.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2025-2395",
|
||||
"sourceIdentifier": "twcert@cert.org.tw",
|
||||
"published": "2025-03-17T06:15:25.910",
|
||||
"lastModified": "2025-03-17T06:15:25.910",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The U-Office Force from e-Excellence has an Improper Authentication vulnerability, allowing unauthenticated remote attackers to use a particular API and alter cookies to log in as an administrator."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "twcert@cert.org.tw",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "twcert@cert.org.tw",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-565"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.twcert.org.tw/en/cp-139-10012-d5bbc-2.html",
|
||||
"source": "twcert@cert.org.tw"
|
||||
},
|
||||
{
|
||||
"url": "https://www.twcert.org.tw/tw/cp-132-10011-3de72-1.html",
|
||||
"source": "twcert@cert.org.tw"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2025/CVE-2025-23xx/CVE-2025-2396.json
Normal file
60
CVE-2025/CVE-2025-23xx/CVE-2025-2396.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2025-2396",
|
||||
"sourceIdentifier": "twcert@cert.org.tw",
|
||||
"published": "2025-03-17T06:15:26.113",
|
||||
"lastModified": "2025-03-17T06:15:26.113",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The U-Office Force from e-Excellence has an Arbitrary File Upload vulnerability, allowing remote attackers with regular privileges to upload and execute web shell backdoors, thereby enabling arbitrary code execution on the server."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "twcert@cert.org.tw",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "twcert@cert.org.tw",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-434"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.twcert.org.tw/en/cp-139-10014-69aa5-2.html",
|
||||
"source": "twcert@cert.org.tw"
|
||||
},
|
||||
{
|
||||
"url": "https://www.twcert.org.tw/tw/cp-132-10013-0d371-1.html",
|
||||
"source": "twcert@cert.org.tw"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-26263",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-28T16:15:40.127",
|
||||
"lastModified": "2025-03-06T22:15:35.437",
|
||||
"lastModified": "2025-03-17T06:15:24.630",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -59,6 +59,10 @@
|
||||
{
|
||||
"url": "https://www.geovision.com.tw/download/product/GV-ASManager",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.geovision.com.tw/download/product/GV-ASManager%20%28Access%20Control%29",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-26264",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-27T22:15:38.947",
|
||||
"lastModified": "2025-02-28T22:15:39.780",
|
||||
"lastModified": "2025-03-17T06:15:25.070",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -56,6 +56,10 @@
|
||||
"url": "https://github.com/DRAGOWN/CVE-2025-26264",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.geovision.com.tw/download/product/GV-ASManager%20%28Access%20Control%29",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/DRAGOWN/CVE-2025-26264",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-26594",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2025-02-25T16:15:38.227",
|
||||
"lastModified": "2025-03-17T03:15:37.980",
|
||||
"lastModified": "2025-03-17T05:15:34.173",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -122,6 +122,10 @@
|
||||
"url": "https://access.redhat.com/errata/RHSA-2025:2502",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2025:2861",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2025:2862",
|
||||
"source": "secalert@redhat.com"
|
||||
@ -130,6 +134,14 @@
|
||||
"url": "https://access.redhat.com/errata/RHSA-2025:2865",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2025:2866",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2025:2873",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2025:2874",
|
||||
"source": "secalert@redhat.com"
|
||||
@ -138,6 +150,14 @@
|
||||
"url": "https://access.redhat.com/errata/RHSA-2025:2875",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2025:2879",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2025:2880",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2025-26594",
|
||||
"source": "secalert@redhat.com",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-26595",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2025-02-25T16:15:38.390",
|
||||
"lastModified": "2025-03-17T03:15:38.107",
|
||||
"lastModified": "2025-03-17T05:15:34.563",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -122,6 +122,10 @@
|
||||
"url": "https://access.redhat.com/errata/RHSA-2025:2502",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2025:2861",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2025:2862",
|
||||
"source": "secalert@redhat.com"
|
||||
@ -130,6 +134,14 @@
|
||||
"url": "https://access.redhat.com/errata/RHSA-2025:2865",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2025:2866",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2025:2873",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2025:2874",
|
||||
"source": "secalert@redhat.com"
|
||||
@ -138,6 +150,14 @@
|
||||
"url": "https://access.redhat.com/errata/RHSA-2025:2875",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2025:2879",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2025:2880",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2025-26595",
|
||||
"source": "secalert@redhat.com",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-26596",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2025-02-25T16:15:38.603",
|
||||
"lastModified": "2025-03-17T03:15:38.237",
|
||||
"lastModified": "2025-03-17T05:15:34.773",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -132,6 +132,10 @@
|
||||
"url": "https://access.redhat.com/errata/RHSA-2025:2502",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2025:2861",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2025:2862",
|
||||
"source": "secalert@redhat.com"
|
||||
@ -140,6 +144,14 @@
|
||||
"url": "https://access.redhat.com/errata/RHSA-2025:2865",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2025:2866",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2025:2873",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2025:2874",
|
||||
"source": "secalert@redhat.com"
|
||||
@ -148,6 +160,14 @@
|
||||
"url": "https://access.redhat.com/errata/RHSA-2025:2875",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2025:2879",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2025:2880",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2025-26596",
|
||||
"source": "secalert@redhat.com",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-26597",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2025-02-25T16:15:38.797",
|
||||
"lastModified": "2025-03-17T03:15:38.367",
|
||||
"lastModified": "2025-03-17T05:15:35.010",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -132,6 +132,10 @@
|
||||
"url": "https://access.redhat.com/errata/RHSA-2025:2502",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2025:2861",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2025:2862",
|
||||
"source": "secalert@redhat.com"
|
||||
@ -140,6 +144,14 @@
|
||||
"url": "https://access.redhat.com/errata/RHSA-2025:2865",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2025:2866",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2025:2873",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2025:2874",
|
||||
"source": "secalert@redhat.com"
|
||||
@ -148,6 +160,14 @@
|
||||
"url": "https://access.redhat.com/errata/RHSA-2025:2875",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2025:2879",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2025:2880",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2025-26597",
|
||||
"source": "secalert@redhat.com",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-26598",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2025-02-25T16:15:38.977",
|
||||
"lastModified": "2025-03-17T03:15:38.497",
|
||||
"lastModified": "2025-03-17T05:15:35.573",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -122,6 +122,10 @@
|
||||
"url": "https://access.redhat.com/errata/RHSA-2025:2502",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2025:2861",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2025:2862",
|
||||
"source": "secalert@redhat.com"
|
||||
@ -130,6 +134,14 @@
|
||||
"url": "https://access.redhat.com/errata/RHSA-2025:2865",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2025:2866",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2025:2873",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2025:2874",
|
||||
"source": "secalert@redhat.com"
|
||||
@ -138,6 +150,14 @@
|
||||
"url": "https://access.redhat.com/errata/RHSA-2025:2875",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2025:2879",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2025:2880",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2025-26598",
|
||||
"source": "secalert@redhat.com",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-26599",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2025-02-25T16:15:39.163",
|
||||
"lastModified": "2025-03-17T03:15:38.623",
|
||||
"lastModified": "2025-03-17T05:15:35.863",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -122,6 +122,10 @@
|
||||
"url": "https://access.redhat.com/errata/RHSA-2025:2502",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2025:2861",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2025:2862",
|
||||
"source": "secalert@redhat.com"
|
||||
@ -130,6 +134,14 @@
|
||||
"url": "https://access.redhat.com/errata/RHSA-2025:2865",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2025:2866",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2025:2873",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2025:2874",
|
||||
"source": "secalert@redhat.com"
|
||||
@ -138,6 +150,14 @@
|
||||
"url": "https://access.redhat.com/errata/RHSA-2025:2875",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2025:2879",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2025:2880",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2025-26599",
|
||||
"source": "secalert@redhat.com",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-26600",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2025-02-25T16:15:39.350",
|
||||
"lastModified": "2025-03-17T03:15:38.750",
|
||||
"lastModified": "2025-03-17T05:15:36.260",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -122,6 +122,10 @@
|
||||
"url": "https://access.redhat.com/errata/RHSA-2025:2502",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2025:2861",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2025:2862",
|
||||
"source": "secalert@redhat.com"
|
||||
@ -130,6 +134,14 @@
|
||||
"url": "https://access.redhat.com/errata/RHSA-2025:2865",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2025:2866",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2025:2873",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2025:2874",
|
||||
"source": "secalert@redhat.com"
|
||||
@ -138,6 +150,14 @@
|
||||
"url": "https://access.redhat.com/errata/RHSA-2025:2875",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2025:2879",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2025:2880",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2025-26600",
|
||||
"source": "secalert@redhat.com",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-26601",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2025-02-25T16:15:39.537",
|
||||
"lastModified": "2025-03-17T03:15:38.873",
|
||||
"lastModified": "2025-03-17T05:15:36.510",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -122,6 +122,10 @@
|
||||
"url": "https://access.redhat.com/errata/RHSA-2025:2502",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2025:2861",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2025:2862",
|
||||
"source": "secalert@redhat.com"
|
||||
@ -130,6 +134,14 @@
|
||||
"url": "https://access.redhat.com/errata/RHSA-2025:2865",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2025:2866",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2025:2873",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2025:2874",
|
||||
"source": "secalert@redhat.com"
|
||||
@ -138,6 +150,14 @@
|
||||
"url": "https://access.redhat.com/errata/RHSA-2025:2875",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2025:2879",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2025:2880",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2025-26601",
|
||||
"source": "secalert@redhat.com",
|
||||
|
39
README.md
39
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2025-03-17T05:00:20.298229+00:00
|
||||
2025-03-17T07:00:22.007814+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2025-03-17T04:15:16.090000+00:00
|
||||
2025-03-17T06:15:26.113000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,31 +33,36 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
285369
|
||||
285375
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `3`
|
||||
Recently added CVEs: `6`
|
||||
|
||||
- [CVE-2025-2358](CVE-2025/CVE-2025-23xx/CVE-2025-2358.json) (`2025-03-17T03:15:39.000`)
|
||||
- [CVE-2025-2359](CVE-2025/CVE-2025-23xx/CVE-2025-2359.json) (`2025-03-17T04:15:11.320`)
|
||||
- [CVE-2025-2360](CVE-2025/CVE-2025-23xx/CVE-2025-2360.json) (`2025-03-17T04:15:16.090`)
|
||||
- [CVE-2025-2361](CVE-2025/CVE-2025-23xx/CVE-2025-2361.json) (`2025-03-17T05:15:36.713`)
|
||||
- [CVE-2025-2362](CVE-2025/CVE-2025-23xx/CVE-2025-2362.json) (`2025-03-17T05:15:37.353`)
|
||||
- [CVE-2025-2363](CVE-2025/CVE-2025-23xx/CVE-2025-2363.json) (`2025-03-17T06:15:25.387`)
|
||||
- [CVE-2025-2364](CVE-2025/CVE-2025-23xx/CVE-2025-2364.json) (`2025-03-17T06:15:25.683`)
|
||||
- [CVE-2025-2395](CVE-2025/CVE-2025-23xx/CVE-2025-2395.json) (`2025-03-17T06:15:25.910`)
|
||||
- [CVE-2025-2396](CVE-2025/CVE-2025-23xx/CVE-2025-2396.json) (`2025-03-17T06:15:26.113`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `9`
|
||||
Recently modified CVEs: `11`
|
||||
|
||||
- [CVE-2025-0624](CVE-2025/CVE-2025-06xx/CVE-2025-0624.json) (`2025-03-17T03:15:37.830`)
|
||||
- [CVE-2025-26594](CVE-2025/CVE-2025-265xx/CVE-2025-26594.json) (`2025-03-17T03:15:37.980`)
|
||||
- [CVE-2025-26595](CVE-2025/CVE-2025-265xx/CVE-2025-26595.json) (`2025-03-17T03:15:38.107`)
|
||||
- [CVE-2025-26596](CVE-2025/CVE-2025-265xx/CVE-2025-26596.json) (`2025-03-17T03:15:38.237`)
|
||||
- [CVE-2025-26597](CVE-2025/CVE-2025-265xx/CVE-2025-26597.json) (`2025-03-17T03:15:38.367`)
|
||||
- [CVE-2025-26598](CVE-2025/CVE-2025-265xx/CVE-2025-26598.json) (`2025-03-17T03:15:38.497`)
|
||||
- [CVE-2025-26599](CVE-2025/CVE-2025-265xx/CVE-2025-26599.json) (`2025-03-17T03:15:38.623`)
|
||||
- [CVE-2025-26600](CVE-2025/CVE-2025-266xx/CVE-2025-26600.json) (`2025-03-17T03:15:38.750`)
|
||||
- [CVE-2025-26601](CVE-2025/CVE-2025-266xx/CVE-2025-26601.json) (`2025-03-17T03:15:38.873`)
|
||||
- [CVE-2025-0624](CVE-2025/CVE-2025-06xx/CVE-2025-0624.json) (`2025-03-17T05:15:33.400`)
|
||||
- [CVE-2025-26263](CVE-2025/CVE-2025-262xx/CVE-2025-26263.json) (`2025-03-17T06:15:24.630`)
|
||||
- [CVE-2025-26264](CVE-2025/CVE-2025-262xx/CVE-2025-26264.json) (`2025-03-17T06:15:25.070`)
|
||||
- [CVE-2025-26594](CVE-2025/CVE-2025-265xx/CVE-2025-26594.json) (`2025-03-17T05:15:34.173`)
|
||||
- [CVE-2025-26595](CVE-2025/CVE-2025-265xx/CVE-2025-26595.json) (`2025-03-17T05:15:34.563`)
|
||||
- [CVE-2025-26596](CVE-2025/CVE-2025-265xx/CVE-2025-26596.json) (`2025-03-17T05:15:34.773`)
|
||||
- [CVE-2025-26597](CVE-2025/CVE-2025-265xx/CVE-2025-26597.json) (`2025-03-17T05:15:35.010`)
|
||||
- [CVE-2025-26598](CVE-2025/CVE-2025-265xx/CVE-2025-26598.json) (`2025-03-17T05:15:35.573`)
|
||||
- [CVE-2025-26599](CVE-2025/CVE-2025-265xx/CVE-2025-26599.json) (`2025-03-17T05:15:35.863`)
|
||||
- [CVE-2025-26600](CVE-2025/CVE-2025-266xx/CVE-2025-26600.json) (`2025-03-17T05:15:36.260`)
|
||||
- [CVE-2025-26601](CVE-2025/CVE-2025-266xx/CVE-2025-26601.json) (`2025-03-17T05:15:36.510`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
34
_state.csv
34
_state.csv
@ -280690,7 +280690,7 @@ CVE-2025-0617,0,0,f628b1ad73170d04122e24ddb3e888ab06e1591d9b8c499515e522c90868af
|
||||
CVE-2025-0619,0,0,d6798daeef3d7924598dddc8037e69d4ae3bc1784ffc6b426878fbbb52aa2ee9,2025-01-23T11:15:10.700000
|
||||
CVE-2025-0622,0,0,e47fbbd3a3a716f89e6a5dc5e99d39a7414dccef8758c28db6b0464c5f5b2e87,2025-02-18T20:15:23.570000
|
||||
CVE-2025-0623,0,0,341d910d0f0f4575e107592c92f38288f68e01fe716af21df488a6d82193e481,2025-01-21T17:15:16.817000
|
||||
CVE-2025-0624,0,1,d2b159e2a97449985cecb5217c38149b4a9b5d5c2a81fb6e6280016257e71bb1,2025-03-17T03:15:37.830000
|
||||
CVE-2025-0624,0,1,c8316e263a066c4e3ae3ec4743dbdf4efc90c26c3c7dc035177727f072164a15,2025-03-17T05:15:33.400000
|
||||
CVE-2025-0625,0,0,9d9d3d8170b51d99a85dfc09422efdaffda47b5baadb8c85253715ce0dc062af,2025-01-22T19:15:10.397000
|
||||
CVE-2025-0626,0,0,16ee263c85f3aad6f9b7c5ed60390a064032d53adec3f9f8437b4c73151fb8c7,2025-03-01T18:15:34.140000
|
||||
CVE-2025-0629,0,0,8f521d45357a68fe1bd984513c58f6ea34cfc4b0f61fed4ffe8ed172f2ebf0d3,2025-03-11T14:15:24.090000
|
||||
@ -283301,7 +283301,7 @@ CVE-2025-23576,0,0,6eb8fbc30dea3b57b664c21b56d95b873f41748c121b596bb9ab5fddf9e24
|
||||
CVE-2025-23577,0,0,3b4af4e716479b74840f3095c9fd247d1229a5054ee21299e6427c4aa395d98c,2025-01-16T20:15:40.877000
|
||||
CVE-2025-23578,0,0,ee4ac9c3f52bf3e6828c8c864df14edec5078c7df3f3b76d6589f390ffa3203c,2025-01-22T15:15:17.687000
|
||||
CVE-2025-23579,0,0,b09b62cae85791e8a289750cbb32e6588ce5d45d24f0b2c5e20253171571309a,2025-03-03T14:15:42.870000
|
||||
CVE-2025-2358,1,1,093353c5817c401c29d240e789d0fb52f90f13a8add51c4f6b22a9db9664ab45,2025-03-17T03:15:39
|
||||
CVE-2025-2358,0,0,093353c5817c401c29d240e789d0fb52f90f13a8add51c4f6b22a9db9664ab45,2025-03-17T03:15:39
|
||||
CVE-2025-23580,0,0,59e55d87bb1152c0b33f0e647e86e7e0bf5bdb957c7b17144cb4b97c87ffc264,2025-01-21T18:15:17.133000
|
||||
CVE-2025-23581,0,0,bc35ed047d5786198f6e128d27e7b196ca682c0b368829b214432cb7ace93e7e,2025-02-03T15:15:21.107000
|
||||
CVE-2025-23582,0,0,bcf56c1128fe5fb16f6f62e87cab58a793b9ab7e1fa5b5a80aac7c3d8e216d4e,2025-02-03T15:15:21.247000
|
||||
@ -283312,7 +283312,7 @@ CVE-2025-23586,0,0,8711e95686287772bcbcef61bbb246a90f2fb83f2658f49577fdb53d09468
|
||||
CVE-2025-23587,0,0,174284cc79c55a184b3ff45ea3fa8840d3892b939a229da20b0309c5bc59bee1,2025-03-03T14:15:43.437000
|
||||
CVE-2025-23588,0,0,1af785b53f96b533dd98e54c9538faf12bf881f9e8326bbe76cebae0df2f2322,2025-02-03T15:15:21.387000
|
||||
CVE-2025-23589,0,0,d3031a8ecc47da689c7d4aa40556ddad0607753b3fab7ef3ba59900b081a00b0,2025-01-22T15:15:17.950000
|
||||
CVE-2025-2359,1,1,de6e6796c6577a403c6e5dbbaa686fbc45d59b9deee061fb934e1187888cc686,2025-03-17T04:15:11.320000
|
||||
CVE-2025-2359,0,0,de6e6796c6577a403c6e5dbbaa686fbc45d59b9deee061fb934e1187888cc686,2025-03-17T04:15:11.320000
|
||||
CVE-2025-23590,0,0,a1b29954928b913e5e1f3b7417373cb35c52e2e53f225fb77d38e3813eec7e4d,2025-02-03T15:15:21.530000
|
||||
CVE-2025-23591,0,0,57144ee3b3111be5ef28bb855d873168905d6e4b6236127ce8be58efe53304f1,2025-02-03T15:15:21.680000
|
||||
CVE-2025-23592,0,0,72113ec191c460928b32408598ed5488110be2a104138ddeee61c6f405231b43,2025-01-22T15:15:18.097000
|
||||
@ -283323,7 +283323,7 @@ CVE-2025-23596,0,0,c0c87db7b414295d6b37258b125c64c14eac275967c68ddf6e89f0af7a37c
|
||||
CVE-2025-23597,0,0,cea463851f9e84dc4dd23a6193771cbf7bfb7af0f728bfc9f3248f50d515c2f7,2025-01-22T15:15:18.230000
|
||||
CVE-2025-23598,0,0,87481f230259bf6caff4cdd796ec6a829051223d809c1dd41ebae2488d0f51a0,2025-02-14T13:15:44.483000
|
||||
CVE-2025-23599,0,0,d05df5cc8092b2ef3ad2303b9842c8e30b1f9b745e52850641df822505ef2a9a,2025-02-03T15:15:22.127000
|
||||
CVE-2025-2360,1,1,8a773a1eb9b54e859ab8613e12226748a249ede9133a6c72d1ab7ebadf46fd71,2025-03-17T04:15:16.090000
|
||||
CVE-2025-2360,0,0,8a773a1eb9b54e859ab8613e12226748a249ede9133a6c72d1ab7ebadf46fd71,2025-03-17T04:15:16.090000
|
||||
CVE-2025-23600,0,0,1162c8130459cacae9a8e23e0859a5f5df2f4d77d9e7ef213c71c28c876f8ade,2025-03-03T14:15:43.717000
|
||||
CVE-2025-23601,0,0,46c1fdfdf28a66086beaafaaeea851de5230b874b48166effa2de17c132d6628,2025-01-22T15:15:18.363000
|
||||
CVE-2025-23602,0,0,d30be2a2699442d6075f3ffc9305b161d70bfc2cca96a60dac61452b8d1a5a89,2025-01-22T15:15:18.503000
|
||||
@ -283333,6 +283333,7 @@ CVE-2025-23605,0,0,a5c3f045d7f5392310e3b492d36e50315347b85ed5c038b043c5cd0276f08
|
||||
CVE-2025-23606,0,0,90766fc8001f9931fea414b5dda3bc6adaf3411aaa9fbcf017409abaf142b264,2025-01-22T15:15:19.073000
|
||||
CVE-2025-23607,0,0,644891006442e903fbf179ad53f57553b3ae1706983005c3775a2cd73265c3b7,2025-01-22T15:15:19.200000
|
||||
CVE-2025-23609,0,0,2d1ae51d827307d5688ebafc347a4adf6cd78f47bdcd33d55e01a23dfca2ac4a,2025-01-22T15:15:19.343000
|
||||
CVE-2025-2361,1,1,157eed4c0e2e526e62f88e6ee8aa8dbe8bad4a9ed44df7257bc3956a53dfa38d,2025-03-17T05:15:36.713000
|
||||
CVE-2025-23610,0,0,0bcb81d57261851ef09d1ff4eef60d378fd3132dcc27872e262fb4f82499c82e,2025-01-22T15:15:19.473000
|
||||
CVE-2025-23611,0,0,d85c3eaa2a359ab1dd0cf8fc2d813b125c4ab2ba5978c80ec826f8303b177a52,2025-01-22T15:15:19.610000
|
||||
CVE-2025-23613,0,0,43926c9b1e96f0a71fe86cd36b5f0babf0459d8e1d39896f0c7bd144e4f07310,2025-03-03T14:15:43.860000
|
||||
@ -283342,6 +283343,7 @@ CVE-2025-23616,0,0,78fd7be14cbd9c9ef889465da14ae42f66e53aa586fb8e21d34a660c059bd
|
||||
CVE-2025-23617,0,0,87ef3623aa25e2331adb93f67250ff54cd8c0a9d97a9df407392635eb142408e,2025-01-16T20:15:41.027000
|
||||
CVE-2025-23618,0,0,2b70f46c9d14af7d7f45645689d4bdb93fcf0d60e0c8dbeddd3d561041eb97d6,2025-01-16T20:15:41.193000
|
||||
CVE-2025-23619,0,0,a287ab8eaf1e91a0388d90721d0286c7cf5afb6907f91ab50f4fcbc818dea44f,2025-03-03T14:15:44.280000
|
||||
CVE-2025-2362,1,1,ccdb7e846ce5b4c9dc108ae7cd1c9212cf952b4014da60d7fdead0d2fa371cc0,2025-03-17T05:15:37.353000
|
||||
CVE-2025-23620,0,0,09647c5f995fa9db6ccd9597829259959bc90db907c440ccec24baf4752a0b99,2025-01-16T20:15:41.340000
|
||||
CVE-2025-23621,0,0,76c56932aa480b0fc9415f2edd066f133dc916597ec40062485884ecf9f068be,2025-01-24T11:15:10.473000
|
||||
CVE-2025-23622,0,0,b75f71cfcaa0f43b25d0e7f5273a3ee797d4eb0107e9ade598483efbf15f330b,2025-01-24T11:15:10.660000
|
||||
@ -283352,6 +283354,7 @@ CVE-2025-23626,0,0,b66c1e85016793f473df918a67129c951eb96bbd711625b94732876ca7ac6
|
||||
CVE-2025-23627,0,0,a0e2c69c295a72f80218793a17c28928376cacd73ebedddc83b23cca208996f3,2025-01-16T20:15:41.617000
|
||||
CVE-2025-23628,0,0,61ef90b5b835c8b8c4db79563b77ce2fcd12ed89eb60ee143e287e3231080409,2025-01-23T16:15:38.547000
|
||||
CVE-2025-23629,0,0,01b9b5cb6314ff066c0384dbc296f566c2de494bce7708202e96de9eafd128e5,2025-01-23T16:15:38.690000
|
||||
CVE-2025-2363,1,1,e3002c5b97b3669ca3ec6d2fb8f5412817556d543fb14b6cb1fed5cf79ecce22,2025-03-17T06:15:25.387000
|
||||
CVE-2025-23630,0,0,eeae9b548f90cb80fe09928d6af68398fad99a026c84c09866f64bbbceca5e8f,2025-01-22T15:15:19.877000
|
||||
CVE-2025-23631,0,0,486c44b1477ef022b6afd511bfe7371c7a5e1239049e868a97d94bc96c8d247a,2025-01-22T15:15:20.013000
|
||||
CVE-2025-23634,0,0,48e783563d53ec984be5a175a9f79a779ede5638e8c7f47318c460f317ddeb1f,2025-01-23T16:15:38.840000
|
||||
@ -283359,6 +283362,7 @@ CVE-2025-23635,0,0,37219eaebcaf3c95cdd30f56d8e0031cbfd6f4aaee3ea55f7fbb76a808368
|
||||
CVE-2025-23636,0,0,e471135e103e9f1102462023b0c8331f734cc9749182a76b579e62c7d60e2121,2025-01-23T16:15:38.983000
|
||||
CVE-2025-23637,0,0,b42ce519797a1817c2b62d7ca7bb179191fd50d636f74ef0ccaecacad055e0a9,2025-03-03T14:15:44.553000
|
||||
CVE-2025-23639,0,0,b5e6c8257038b7490893c42ae7e3121aaccdfc060b9557b2c3eb27b9ad45934a,2025-01-16T20:15:41.763000
|
||||
CVE-2025-2364,1,1,3cb9521f2b6f87ffefc14ce989bc33601f3efbd48b0950d8a82ad13695292d4e,2025-03-17T06:15:25.683000
|
||||
CVE-2025-23640,0,0,118e59034a736b15100f4213d9ad0026082135513d4f080af852d559dd80b4a0,2025-01-16T20:15:41.900000
|
||||
CVE-2025-23641,0,0,7d997794a239066a0b1939bc772f48c377254fbba43ec4f01793fcc89efd7a16,2025-01-16T20:15:42.037000
|
||||
CVE-2025-23642,0,0,6e64755b7ebe6355ada34a7729dd7046343f3faf18763fdbff82b45cfa37662e,2025-01-16T20:15:42.190000
|
||||
@ -283652,6 +283656,7 @@ CVE-2025-23946,0,0,9de3ccf4350f51c6d8e67eab9fdaace2b0128c36302335bbd7ddc29cf4115
|
||||
CVE-2025-23947,0,0,b918dd9018ba545f112604d29f16795478738d9868aa76eb24c352a7a4e3c4ec,2025-01-16T21:15:36.670000
|
||||
CVE-2025-23948,0,0,fa217fc33fb3c65287110150a4613d620cf18c0fe66132ab121eab1307585f10,2025-01-22T15:15:26.383000
|
||||
CVE-2025-23949,0,0,d90495090ae00e6e58d5cfea56b4f220cf8c7c1a45a835ce24e1ea30c09f925d,2025-01-22T15:15:26.527000
|
||||
CVE-2025-2395,1,1,5893b48eeb89009b6aaa25281922cff9b0e61053f509134fc47594406fb36e00,2025-03-17T06:15:25.910000
|
||||
CVE-2025-23950,0,0,4ac29c4dd1a428d4afa0ee44a692bfd3a045bfda7b0c1933c7ec004bbdec77a8,2025-01-16T21:15:36.817000
|
||||
CVE-2025-23951,0,0,2d32c1931f285be8ff0de2b01cdf7652c918f38bc79b845ac3d321ee8c1bb84b,2025-01-16T21:15:36.983000
|
||||
CVE-2025-23953,0,0,f6f03bfe88f28bb6450de0d0a10e28b0ddc76002765b30baa9464de96156821e,2025-01-22T15:15:26.670000
|
||||
@ -283660,6 +283665,7 @@ CVE-2025-23955,0,0,b35ff47ed4400b2edb51393bc234d7c4ad9797e847fec68985488245984a0
|
||||
CVE-2025-23956,0,0,15f2dcb32df35e2b8473f6870c5d0b4c83cc77afd7741dc7fb30f1d524230e01,2025-03-03T14:15:49.010000
|
||||
CVE-2025-23957,0,0,40b759ae20a341b30b3caf9db81dbe00398828638d81ba3346ad7f7cf25fc424,2025-01-16T21:15:37.420000
|
||||
CVE-2025-23959,0,0,4d3ba4ca608a53eb6870e6e5b2be4b542170ae3caec5feb8a182291e655509aa,2025-01-22T15:15:26.810000
|
||||
CVE-2025-2396,1,1,d1b7c3a54bb28d44e7c5c169828b5aa8533a1536b3bc917a925583ffb5a4a6e3,2025-03-17T06:15:26.113000
|
||||
CVE-2025-23960,0,0,fef5413834349b73f28bcc0fec0108a4368773674c1a2ae5d7728e978b8298e8,2025-01-23T16:15:40.777000
|
||||
CVE-2025-23961,0,0,36c0da688ed3e8548f86716b57ea278db435c869e71f4caf3f9de5e6869464d4,2025-01-16T21:15:37.573000
|
||||
CVE-2025-23962,0,0,38c72a66f748d246b44f5351bf9ff0f3b3815cc4926f227945695c33eaf96317,2025-01-16T21:15:37.730000
|
||||
@ -284650,8 +284656,8 @@ CVE-2025-26206,0,0,bc67999dabe96502b241246d2665faf1f09178bdb9b72e5e7dd5401b748e2
|
||||
CVE-2025-26215,0,0,398e0534dde9630858e15022c6decb119d529efa2fc59efd24b3f1a57cdf3f89,2025-03-14T17:15:51.613000
|
||||
CVE-2025-26216,0,0,fa35563faa6505245c7f05bc4878e14310c206fdd07c5771663544280eaa71b8,2025-03-14T17:15:51.730000
|
||||
CVE-2025-26260,0,0,23c98183c981924ff624691f004f57ca0a3b3fc9df97cc744f6e86e7322bfeaf,2025-03-12T16:15:23.907000
|
||||
CVE-2025-26263,0,0,fc3120fea42838e95a7a6b2851141f093ed91446459738db389d5fc39c0f2990,2025-03-06T22:15:35.437000
|
||||
CVE-2025-26264,0,0,d652b5dab25ae333f8ea0835b25b75d718ba956bf0f33ef0027b1933da0a46e3,2025-02-28T22:15:39.780000
|
||||
CVE-2025-26263,0,1,33c82bcdd68cdcef2d06780800c3ab6c6f6af78532f2208935cfab51d7c78d3f,2025-03-17T06:15:24.630000
|
||||
CVE-2025-26264,0,1,78a1bd2e43e9b3b3479a5073d67ff29ef6c7b849522e2d6fc7c934784cc466cb,2025-03-17T06:15:25.070000
|
||||
CVE-2025-26304,0,0,70c8f37d4db2054dfe1099a4a2c4b06129c826d4de254465b9316b6b41e402d7,2025-02-21T21:15:24.653000
|
||||
CVE-2025-26305,0,0,1a1d603a79ab0dad9b04f449d78f3a3bb9f5de25113a59f9bb3a8e492946e3de,2025-02-21T21:15:24.803000
|
||||
CVE-2025-26306,0,0,f6318b29dc3c8fcf62d8d059c582dc4ed277312d31ede047e5262baa26bd01da,2025-02-24T18:15:21.357000
|
||||
@ -284776,14 +284782,14 @@ CVE-2025-26586,0,0,2995618efb5bc786b623a073068ee53ca10ebf5a6af434abe477283701f8c
|
||||
CVE-2025-26587,0,0,f182d8db53652dc68c3e8d08c04a29d1ba7ae50e8acecec3dbde839e0907bec0,2025-03-03T14:15:55.780000
|
||||
CVE-2025-26588,0,0,bd02ba233979579f3c8028618005b5c036f8e9bb2db4aabcd7a57c2127440863,2025-03-03T14:15:55.920000
|
||||
CVE-2025-26589,0,0,bed434e05d708700c2c5a6b977f599fcc267a2dd10919cb423bc182a13c41191,2025-03-03T14:15:56.067000
|
||||
CVE-2025-26594,0,1,a562f316247bf364a3c5ee3a476a8a42473f65aa04b48513265ca64f4f1daa2d,2025-03-17T03:15:37.980000
|
||||
CVE-2025-26595,0,1,cb2f548b599da519a00c25209d236ce1514d5f9ddb7c0d200c4c9d6c80aa2a5e,2025-03-17T03:15:38.107000
|
||||
CVE-2025-26596,0,1,604f42f992855caf3ab045a21edec6e742617314489960402ea4b43b875d9465,2025-03-17T03:15:38.237000
|
||||
CVE-2025-26597,0,1,9bf76acaa3f4ecf3173ee3b8c9532d6a06c802c5b1444a69f1c9f40764bdfbb3,2025-03-17T03:15:38.367000
|
||||
CVE-2025-26598,0,1,8eba9f17b6921c601323f7f240e71b3d3ddefec06e2808833037260ca2d3581f,2025-03-17T03:15:38.497000
|
||||
CVE-2025-26599,0,1,47e422c15d44d5b25be74b6f38ea6d15de509db06bbe269dd7bcdc89cf74b3db,2025-03-17T03:15:38.623000
|
||||
CVE-2025-26600,0,1,2c5f7a54629cbbfc7a6ed405d78d795150b75ea84b9a726c974b1f91f30fd5df,2025-03-17T03:15:38.750000
|
||||
CVE-2025-26601,0,1,c8db1acfc7ae0c75eaa3594f61a9ba523815cdf6e0b1bbf9316ef2ee2f75a8a4,2025-03-17T03:15:38.873000
|
||||
CVE-2025-26594,0,1,b138a1df44ced5a1d018cfbe5ec92152036f7ace0823d2c73679f1c192739c1a,2025-03-17T05:15:34.173000
|
||||
CVE-2025-26595,0,1,ebfb2ddac9eabcc8c33342063230d97e91f59f614211c6c3ecd4f229d8f1d180,2025-03-17T05:15:34.563000
|
||||
CVE-2025-26596,0,1,85e4edf4228c3b6e57df67068693ef99060b766bb00d91787a0ae0dea6594085,2025-03-17T05:15:34.773000
|
||||
CVE-2025-26597,0,1,e67cf401865a75465362b9799533e8470819f400efee3476a6f4c636d7b21d7f,2025-03-17T05:15:35.010000
|
||||
CVE-2025-26598,0,1,0eacfb7dc4a4129ecb716c23916456f4144bb39a72faf73ad17118512460229f,2025-03-17T05:15:35.573000
|
||||
CVE-2025-26599,0,1,67750252395bb0d8884d098577f195f781b9f325cc801904caf59d821915f3d2,2025-03-17T05:15:35.863000
|
||||
CVE-2025-26600,0,1,df5e79272036ef3947f3db5ae9cd99052c06dd1905212be540fb72d1cfe2732f,2025-03-17T05:15:36.260000
|
||||
CVE-2025-26601,0,1,930ff9b38118f9f92cba85e7e91d31d8ae2de95a9a34069de5df204651cea3c6,2025-03-17T05:15:36.510000
|
||||
CVE-2025-26603,0,0,8ae2812ccc436075652a92b78482e86bdfeb5a0aad1aca77b0c194e6b06d7b51,2025-03-07T01:15:12.700000
|
||||
CVE-2025-26604,0,0,720d50d971a81c5950fb5a1fe6bb95e5177eb2f3df88a35c072c70e62f5cf12d,2025-02-18T20:15:33.003000
|
||||
CVE-2025-26605,0,0,fdd668972bd6651dbed3cd9f902a3b8b59140c82d14f8fce08f437a28193bf96,2025-02-18T22:15:19.387000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user