mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-09-17 18:45:49 +00:00
Auto-Update: 2025-03-17T09:00:19.846589+00:00
This commit is contained in:
parent
bab9b3f416
commit
c63ab93dfe
16
CVE-2023/CVE-2023-523xx/CVE-2023-52315.json
Normal file
16
CVE-2023/CVE-2023-523xx/CVE-2023-52315.json
Normal file
@ -0,0 +1,16 @@
|
||||
{
|
||||
"id": "CVE-2023-52315",
|
||||
"sourceIdentifier": "paddle-security@baidu.com",
|
||||
"published": "2025-03-17T07:15:33.250",
|
||||
"lastModified": "2025-03-17T07:15:33.250",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Rejected reason: withdraw"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
60
CVE-2025/CVE-2025-17xx/CVE-2025-1724.json
Normal file
60
CVE-2025/CVE-2025-17xx/CVE-2025-1724.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2025-1724",
|
||||
"sourceIdentifier": "0fc0942c-577d-436f-ae8e-945763c79b02",
|
||||
"published": "2025-03-17T07:15:33.467",
|
||||
"lastModified": "2025-03-17T07:15:33.467",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Zohocorp's ManageEngine Analytics Plus and Zoho Analytics on-premise versions older than 6130 are vulnerable to an AD only account takeover because of a hardcoded sensitive token."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "0fc0942c-577d-436f-ae8e-945763c79b02",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
|
||||
"baseScore": 7.4,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "0fc0942c-577d-436f-ae8e-945763c79b02",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-798"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.manageengine.com/analytics-plus/CVE-2025-1724.html",
|
||||
"source": "0fc0942c-577d-436f-ae8e-945763c79b02"
|
||||
},
|
||||
{
|
||||
"url": "https://www.zoho.com/analytics/onpremise/CVE-2025-1724.html",
|
||||
"source": "0fc0942c-577d-436f-ae8e-945763c79b02"
|
||||
}
|
||||
]
|
||||
}
|
141
CVE-2025/CVE-2025-23xx/CVE-2025-2365.json
Normal file
141
CVE-2025/CVE-2025-23xx/CVE-2025-2365.json
Normal file
@ -0,0 +1,141 @@
|
||||
{
|
||||
"id": "CVE-2025-2365",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-03-17T07:15:33.847",
|
||||
"lastModified": "2025-03-17T07:15:33.847",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability, which was classified as problematic, has been found in crmeb_java up to 1.3.4. Affected by this issue is the function webHook of the file WeChatMessageController.java. The manipulation leads to xml external entity reference. The attack may be launched remotely. The exploit has been disclosed to the public and may be used."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "LOW",
|
||||
"vulnIntegrityImpact": "LOW",
|
||||
"vulnAvailabilityImpact": "LOW",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
||||
"baseScore": 6.5,
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL"
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-610"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-611"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/jmx0hxq/Vulnerability-learning/blob/main/crmeb-java-xxe1.md",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.299864",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.299864",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.513285",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
141
CVE-2025/CVE-2025-23xx/CVE-2025-2366.json
Normal file
141
CVE-2025/CVE-2025-23xx/CVE-2025-2366.json
Normal file
@ -0,0 +1,141 @@
|
||||
{
|
||||
"id": "CVE-2025-2366",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-03-17T07:15:34.067",
|
||||
"lastModified": "2025-03-17T07:15:34.067",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability, which was classified as problematic, was found in gougucms 4.08.18. This affects the function add of the file /admin/department/add of the component Add Department Page. The manipulation of the argument title leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 4.8,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "PASSIVE",
|
||||
"vulnConfidentialityImpact": "NONE",
|
||||
"vulnIntegrityImpact": "LOW",
|
||||
"vulnAvailabilityImpact": "NONE",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N",
|
||||
"baseScore": 2.4,
|
||||
"baseSeverity": "LOW",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 0.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:M/C:N/I:P/A:N",
|
||||
"baseScore": 3.3,
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "MULTIPLE",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"baseSeverity": "LOW",
|
||||
"exploitabilityScore": 6.4,
|
||||
"impactScore": 2.9,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-94"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/caigo8/CVE-md/blob/main/gougucms/gougucms_v4.08.18_XSS.md",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.299865",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.299865",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.515044",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
137
CVE-2025/CVE-2025-23xx/CVE-2025-2367.json
Normal file
137
CVE-2025/CVE-2025-23xx/CVE-2025-2367.json
Normal file
@ -0,0 +1,137 @@
|
||||
{
|
||||
"id": "CVE-2025-2367",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-03-17T08:15:11.283",
|
||||
"lastModified": "2025-03-17T08:15:11.283",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability has been found in Oiwtech OIW-2431APGN-HP 2.5.3-B20131128 and classified as critical. This vulnerability affects unknown code of the file /boafrm/formScript of the component Personal Script Submenu. The manipulation leads to os command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "LOW",
|
||||
"vulnIntegrityImpact": "LOW",
|
||||
"vulnAvailabilityImpact": "LOW",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
||||
"baseScore": 6.5,
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL"
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-77"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-78"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.299866",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.299866",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.515126",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
153
CVE-2025/CVE-2025-23xx/CVE-2025-2368.json
Normal file
153
CVE-2025/CVE-2025-23xx/CVE-2025-2368.json
Normal file
@ -0,0 +1,153 @@
|
||||
{
|
||||
"id": "CVE-2025-2368",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-03-17T08:15:11.493",
|
||||
"lastModified": "2025-03-17T08:15:11.493",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in WebAssembly wabt 1.0.36 and classified as critical. This issue affects the function wabt::interp::(anonymous namespace)::BinaryReaderInterp::OnExport of the file wabt/src/interp/binary-reader-interp.cc of the component Malformed File Handler. The manipulation leads to heap-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "PASSIVE",
|
||||
"vulnConfidentialityImpact": "LOW",
|
||||
"vulnIntegrityImpact": "LOW",
|
||||
"vulnAvailabilityImpact": "LOW",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||||
"baseScore": 7.5,
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "NONE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL"
|
||||
},
|
||||
"baseSeverity": "HIGH",
|
||||
"exploitabilityScore": 10.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-119"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-122"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/WebAssembly/wabt/issues/2537",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/WebAssembly/wabt/issues/2556",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/WebAssembly/wabt/issues/2556#issue-2899598349",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/WebAssembly/wabt/pull/2541",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.299867",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.299867",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.515327",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
31
README.md
31
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2025-03-17T07:00:22.007814+00:00
|
||||
2025-03-17T09:00:19.846589+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2025-03-17T06:15:26.113000+00:00
|
||||
2025-03-17T08:15:11.493000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,36 +33,25 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
285375
|
||||
285381
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `6`
|
||||
|
||||
- [CVE-2025-2361](CVE-2025/CVE-2025-23xx/CVE-2025-2361.json) (`2025-03-17T05:15:36.713`)
|
||||
- [CVE-2025-2362](CVE-2025/CVE-2025-23xx/CVE-2025-2362.json) (`2025-03-17T05:15:37.353`)
|
||||
- [CVE-2025-2363](CVE-2025/CVE-2025-23xx/CVE-2025-2363.json) (`2025-03-17T06:15:25.387`)
|
||||
- [CVE-2025-2364](CVE-2025/CVE-2025-23xx/CVE-2025-2364.json) (`2025-03-17T06:15:25.683`)
|
||||
- [CVE-2025-2395](CVE-2025/CVE-2025-23xx/CVE-2025-2395.json) (`2025-03-17T06:15:25.910`)
|
||||
- [CVE-2025-2396](CVE-2025/CVE-2025-23xx/CVE-2025-2396.json) (`2025-03-17T06:15:26.113`)
|
||||
- [CVE-2023-52315](CVE-2023/CVE-2023-523xx/CVE-2023-52315.json) (`2025-03-17T07:15:33.250`)
|
||||
- [CVE-2025-1724](CVE-2025/CVE-2025-17xx/CVE-2025-1724.json) (`2025-03-17T07:15:33.467`)
|
||||
- [CVE-2025-2365](CVE-2025/CVE-2025-23xx/CVE-2025-2365.json) (`2025-03-17T07:15:33.847`)
|
||||
- [CVE-2025-2366](CVE-2025/CVE-2025-23xx/CVE-2025-2366.json) (`2025-03-17T07:15:34.067`)
|
||||
- [CVE-2025-2367](CVE-2025/CVE-2025-23xx/CVE-2025-2367.json) (`2025-03-17T08:15:11.283`)
|
||||
- [CVE-2025-2368](CVE-2025/CVE-2025-23xx/CVE-2025-2368.json) (`2025-03-17T08:15:11.493`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `11`
|
||||
Recently modified CVEs: `0`
|
||||
|
||||
- [CVE-2025-0624](CVE-2025/CVE-2025-06xx/CVE-2025-0624.json) (`2025-03-17T05:15:33.400`)
|
||||
- [CVE-2025-26263](CVE-2025/CVE-2025-262xx/CVE-2025-26263.json) (`2025-03-17T06:15:24.630`)
|
||||
- [CVE-2025-26264](CVE-2025/CVE-2025-262xx/CVE-2025-26264.json) (`2025-03-17T06:15:25.070`)
|
||||
- [CVE-2025-26594](CVE-2025/CVE-2025-265xx/CVE-2025-26594.json) (`2025-03-17T05:15:34.173`)
|
||||
- [CVE-2025-26595](CVE-2025/CVE-2025-265xx/CVE-2025-26595.json) (`2025-03-17T05:15:34.563`)
|
||||
- [CVE-2025-26596](CVE-2025/CVE-2025-265xx/CVE-2025-26596.json) (`2025-03-17T05:15:34.773`)
|
||||
- [CVE-2025-26597](CVE-2025/CVE-2025-265xx/CVE-2025-26597.json) (`2025-03-17T05:15:35.010`)
|
||||
- [CVE-2025-26598](CVE-2025/CVE-2025-265xx/CVE-2025-26598.json) (`2025-03-17T05:15:35.573`)
|
||||
- [CVE-2025-26599](CVE-2025/CVE-2025-265xx/CVE-2025-26599.json) (`2025-03-17T05:15:35.863`)
|
||||
- [CVE-2025-26600](CVE-2025/CVE-2025-266xx/CVE-2025-26600.json) (`2025-03-17T05:15:36.260`)
|
||||
- [CVE-2025-26601](CVE-2025/CVE-2025-266xx/CVE-2025-26601.json) (`2025-03-17T05:15:36.510`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
40
_state.csv
40
_state.csv
@ -240878,6 +240878,7 @@ CVE-2023-52311,0,0,07b27b223edc881f838e5041ab4820aa11b67d3aa5fb21bb9ad1631b9e294
|
||||
CVE-2023-52312,0,0,be9b30bd5d9e24a7af438dfcda27134b3bf8acb826fbec3d0d7b0b2f87dad2b4,2024-11-21T08:39:33.367000
|
||||
CVE-2023-52313,0,0,55f37c159831f0ca0adfe00c975bfc39d684698f05db4d6987a1029f9b979e55,2024-11-21T08:39:33.507000
|
||||
CVE-2023-52314,0,0,dd060fa032542509548ea27e1510da7d85bdaece86e74ece4ab4024a1ebc1b14,2024-11-21T08:39:33.627000
|
||||
CVE-2023-52315,1,1,924d1c1deb9b9d0d737147c8ddfb373db2392cc6f93f2280420845f32d7c96ed,2025-03-17T07:15:33.250000
|
||||
CVE-2023-5232,0,0,49a427ae480ae124affbf449399e7da8cb8fe56219272eccdd509d95d18e123f,2024-11-21T08:41:20.480000
|
||||
CVE-2023-52322,0,0,5a514ddc56e42aa70ee9fde3f16bc6524f527a148576f5d3847f0bbcfaac59b3,2024-11-21T08:39:33.753000
|
||||
CVE-2023-52323,0,0,08475ca63860bd34bf2ef591b2be91ed9160e70b5e3785d352a5c423089d5803,2024-11-21T08:39:33.907000
|
||||
@ -280690,7 +280691,7 @@ CVE-2025-0617,0,0,f628b1ad73170d04122e24ddb3e888ab06e1591d9b8c499515e522c90868af
|
||||
CVE-2025-0619,0,0,d6798daeef3d7924598dddc8037e69d4ae3bc1784ffc6b426878fbbb52aa2ee9,2025-01-23T11:15:10.700000
|
||||
CVE-2025-0622,0,0,e47fbbd3a3a716f89e6a5dc5e99d39a7414dccef8758c28db6b0464c5f5b2e87,2025-02-18T20:15:23.570000
|
||||
CVE-2025-0623,0,0,341d910d0f0f4575e107592c92f38288f68e01fe716af21df488a6d82193e481,2025-01-21T17:15:16.817000
|
||||
CVE-2025-0624,0,1,c8316e263a066c4e3ae3ec4743dbdf4efc90c26c3c7dc035177727f072164a15,2025-03-17T05:15:33.400000
|
||||
CVE-2025-0624,0,0,c8316e263a066c4e3ae3ec4743dbdf4efc90c26c3c7dc035177727f072164a15,2025-03-17T05:15:33.400000
|
||||
CVE-2025-0625,0,0,9d9d3d8170b51d99a85dfc09422efdaffda47b5baadb8c85253715ce0dc062af,2025-01-22T19:15:10.397000
|
||||
CVE-2025-0626,0,0,16ee263c85f3aad6f9b7c5ed60390a064032d53adec3f9f8437b4c73151fb8c7,2025-03-01T18:15:34.140000
|
||||
CVE-2025-0629,0,0,8f521d45357a68fe1bd984513c58f6ea34cfc4b0f61fed4ffe8ed172f2ebf0d3,2025-03-11T14:15:24.090000
|
||||
@ -281358,6 +281359,7 @@ CVE-2025-1714,0,0,6e67e5fe1ad7d1f8ea60e413f9fa7e7e2f63bd8d4c4369040436660c144fa8
|
||||
CVE-2025-1716,0,0,7b54faf04c0c346ecfa632bdb4185fc3c19aff41bf7399ecadc1ddfb775e6d41,2025-03-03T16:15:39.520000
|
||||
CVE-2025-1717,0,0,a3187f28d4c7b205f040a730275c0f286adbd6d6550e77331f01e3625795de14,2025-03-11T16:12:42.783000
|
||||
CVE-2025-1723,0,0,da7e603c0fdbcf8b17bcff90e3ff294dcf324014070d98aed22d913dc322d276,2025-03-03T08:15:15.717000
|
||||
CVE-2025-1724,1,1,b03aaac82a93514175886c3b5f4d5d1b615475b34b48fe7e68aa79b48d0bdd1c,2025-03-17T07:15:33.467000
|
||||
CVE-2025-1726,0,0,2f1dd31a8200e6d83c282baf3f0abaf3df3bb9d56b822973c75d4b2e2b3c7f8c,2025-02-26T20:15:13.510000
|
||||
CVE-2025-1728,0,0,126b29abd5a8b7142eab21be075a4425d5b9e0d4bb1eedd2c9477807954e2152,2025-02-26T22:15:14.333000
|
||||
CVE-2025-1730,0,0,1995ccb1e144a2c7a6984fe76cde065e7b6f85edc7bf90ff89583ed751f146df,2025-03-01T07:15:11.380000
|
||||
@ -283333,7 +283335,7 @@ CVE-2025-23605,0,0,a5c3f045d7f5392310e3b492d36e50315347b85ed5c038b043c5cd0276f08
|
||||
CVE-2025-23606,0,0,90766fc8001f9931fea414b5dda3bc6adaf3411aaa9fbcf017409abaf142b264,2025-01-22T15:15:19.073000
|
||||
CVE-2025-23607,0,0,644891006442e903fbf179ad53f57553b3ae1706983005c3775a2cd73265c3b7,2025-01-22T15:15:19.200000
|
||||
CVE-2025-23609,0,0,2d1ae51d827307d5688ebafc347a4adf6cd78f47bdcd33d55e01a23dfca2ac4a,2025-01-22T15:15:19.343000
|
||||
CVE-2025-2361,1,1,157eed4c0e2e526e62f88e6ee8aa8dbe8bad4a9ed44df7257bc3956a53dfa38d,2025-03-17T05:15:36.713000
|
||||
CVE-2025-2361,0,0,157eed4c0e2e526e62f88e6ee8aa8dbe8bad4a9ed44df7257bc3956a53dfa38d,2025-03-17T05:15:36.713000
|
||||
CVE-2025-23610,0,0,0bcb81d57261851ef09d1ff4eef60d378fd3132dcc27872e262fb4f82499c82e,2025-01-22T15:15:19.473000
|
||||
CVE-2025-23611,0,0,d85c3eaa2a359ab1dd0cf8fc2d813b125c4ab2ba5978c80ec826f8303b177a52,2025-01-22T15:15:19.610000
|
||||
CVE-2025-23613,0,0,43926c9b1e96f0a71fe86cd36b5f0babf0459d8e1d39896f0c7bd144e4f07310,2025-03-03T14:15:43.860000
|
||||
@ -283343,7 +283345,7 @@ CVE-2025-23616,0,0,78fd7be14cbd9c9ef889465da14ae42f66e53aa586fb8e21d34a660c059bd
|
||||
CVE-2025-23617,0,0,87ef3623aa25e2331adb93f67250ff54cd8c0a9d97a9df407392635eb142408e,2025-01-16T20:15:41.027000
|
||||
CVE-2025-23618,0,0,2b70f46c9d14af7d7f45645689d4bdb93fcf0d60e0c8dbeddd3d561041eb97d6,2025-01-16T20:15:41.193000
|
||||
CVE-2025-23619,0,0,a287ab8eaf1e91a0388d90721d0286c7cf5afb6907f91ab50f4fcbc818dea44f,2025-03-03T14:15:44.280000
|
||||
CVE-2025-2362,1,1,ccdb7e846ce5b4c9dc108ae7cd1c9212cf952b4014da60d7fdead0d2fa371cc0,2025-03-17T05:15:37.353000
|
||||
CVE-2025-2362,0,0,ccdb7e846ce5b4c9dc108ae7cd1c9212cf952b4014da60d7fdead0d2fa371cc0,2025-03-17T05:15:37.353000
|
||||
CVE-2025-23620,0,0,09647c5f995fa9db6ccd9597829259959bc90db907c440ccec24baf4752a0b99,2025-01-16T20:15:41.340000
|
||||
CVE-2025-23621,0,0,76c56932aa480b0fc9415f2edd066f133dc916597ec40062485884ecf9f068be,2025-01-24T11:15:10.473000
|
||||
CVE-2025-23622,0,0,b75f71cfcaa0f43b25d0e7f5273a3ee797d4eb0107e9ade598483efbf15f330b,2025-01-24T11:15:10.660000
|
||||
@ -283354,7 +283356,7 @@ CVE-2025-23626,0,0,b66c1e85016793f473df918a67129c951eb96bbd711625b94732876ca7ac6
|
||||
CVE-2025-23627,0,0,a0e2c69c295a72f80218793a17c28928376cacd73ebedddc83b23cca208996f3,2025-01-16T20:15:41.617000
|
||||
CVE-2025-23628,0,0,61ef90b5b835c8b8c4db79563b77ce2fcd12ed89eb60ee143e287e3231080409,2025-01-23T16:15:38.547000
|
||||
CVE-2025-23629,0,0,01b9b5cb6314ff066c0384dbc296f566c2de494bce7708202e96de9eafd128e5,2025-01-23T16:15:38.690000
|
||||
CVE-2025-2363,1,1,e3002c5b97b3669ca3ec6d2fb8f5412817556d543fb14b6cb1fed5cf79ecce22,2025-03-17T06:15:25.387000
|
||||
CVE-2025-2363,0,0,e3002c5b97b3669ca3ec6d2fb8f5412817556d543fb14b6cb1fed5cf79ecce22,2025-03-17T06:15:25.387000
|
||||
CVE-2025-23630,0,0,eeae9b548f90cb80fe09928d6af68398fad99a026c84c09866f64bbbceca5e8f,2025-01-22T15:15:19.877000
|
||||
CVE-2025-23631,0,0,486c44b1477ef022b6afd511bfe7371c7a5e1239049e868a97d94bc96c8d247a,2025-01-22T15:15:20.013000
|
||||
CVE-2025-23634,0,0,48e783563d53ec984be5a175a9f79a779ede5638e8c7f47318c460f317ddeb1f,2025-01-23T16:15:38.840000
|
||||
@ -283362,7 +283364,7 @@ CVE-2025-23635,0,0,37219eaebcaf3c95cdd30f56d8e0031cbfd6f4aaee3ea55f7fbb76a808368
|
||||
CVE-2025-23636,0,0,e471135e103e9f1102462023b0c8331f734cc9749182a76b579e62c7d60e2121,2025-01-23T16:15:38.983000
|
||||
CVE-2025-23637,0,0,b42ce519797a1817c2b62d7ca7bb179191fd50d636f74ef0ccaecacad055e0a9,2025-03-03T14:15:44.553000
|
||||
CVE-2025-23639,0,0,b5e6c8257038b7490893c42ae7e3121aaccdfc060b9557b2c3eb27b9ad45934a,2025-01-16T20:15:41.763000
|
||||
CVE-2025-2364,1,1,3cb9521f2b6f87ffefc14ce989bc33601f3efbd48b0950d8a82ad13695292d4e,2025-03-17T06:15:25.683000
|
||||
CVE-2025-2364,0,0,3cb9521f2b6f87ffefc14ce989bc33601f3efbd48b0950d8a82ad13695292d4e,2025-03-17T06:15:25.683000
|
||||
CVE-2025-23640,0,0,118e59034a736b15100f4213d9ad0026082135513d4f080af852d559dd80b4a0,2025-01-16T20:15:41.900000
|
||||
CVE-2025-23641,0,0,7d997794a239066a0b1939bc772f48c377254fbba43ec4f01793fcc89efd7a16,2025-01-16T20:15:42.037000
|
||||
CVE-2025-23642,0,0,6e64755b7ebe6355ada34a7729dd7046343f3faf18763fdbff82b45cfa37662e,2025-01-16T20:15:42.190000
|
||||
@ -283373,6 +283375,7 @@ CVE-2025-23646,0,0,c1fe5747a61bed6c08d3aed8bf24532464520ba050129c3f02efc5faf085f
|
||||
CVE-2025-23647,0,0,f6ce3c8beea88cd6cabcfc4754ad29b739cee0bb3835652366552c700e886bdd,2025-02-14T13:15:44.790000
|
||||
CVE-2025-23648,0,0,56dfed8a340ac3b99475d65ad7fcd51d2501696ab63d0cbd8cb95a5ac613b868,2025-02-14T13:15:44.930000
|
||||
CVE-2025-23649,0,0,a43a99cf921270df6f54630a1d678841e6741ab04c2bf8f250e77ecaecfc577f,2025-01-16T20:15:42.463000
|
||||
CVE-2025-2365,1,1,4b3ea759666db2565d68228fd9c1f6e74904319d3879887201dfa9354024e1db,2025-03-17T07:15:33.847000
|
||||
CVE-2025-23650,0,0,6b533d2b5d60e5625870febe8996710b431ee07c6257862dd105ccbb5177dbd2,2025-02-14T13:15:45.063000
|
||||
CVE-2025-23651,0,0,60bc67625c38e1dc69d530120ebd488825bc87fa419b337c25b70c38987c9d98,2025-02-14T13:15:45.200000
|
||||
CVE-2025-23652,0,0,0a5f60ba3c24215abf34126d0d06408a8d10ae3c0d8fbd96d9d2167559de215b,2025-02-14T13:15:45.333000
|
||||
@ -283383,6 +283386,7 @@ CVE-2025-23656,0,0,97e221d0e76175e25d429555113f1ee1530bd9533a3d9111b2c321c58200f
|
||||
CVE-2025-23657,0,0,a323f4087da9c6f8511a15ab266e5890035e9feb4c96d9b70dcfec19e3a9764e,2025-02-14T13:15:45.760000
|
||||
CVE-2025-23658,0,0,b5ea61a3b86734edaed3c77d2a9b2daeda534753ab8f54dcf3e00ac26e4a6f7c,2025-02-14T13:15:45.900000
|
||||
CVE-2025-23659,0,0,dcc772503bf7bc48b2053f59e0fd1354f6d6525325330e2053b738a9e72bb73e,2025-01-16T20:15:42.750000
|
||||
CVE-2025-2366,1,1,08a6aff999b6d58e7a26b0051f2f2bdc8c0d3e4abb2a50fd4ee0a15afedbf7a7,2025-03-17T07:15:34.067000
|
||||
CVE-2025-23660,0,0,2cc733431a94cdb8a648f8f3373a33c06d517783298c1f87affd6dd6af956d0c,2025-01-16T20:15:42.893000
|
||||
CVE-2025-23661,0,0,1f7f57e7bde62e643387dd0bb1448a0354f6c08b04d2c093fc9523e9645f79aa,2025-01-16T20:15:43.037000
|
||||
CVE-2025-23662,0,0,551ab5d2ddda20a665b042bd77267fd330911bfdaae473af13983770c49d1a4c,2025-01-16T20:15:43.167000
|
||||
@ -283391,6 +283395,7 @@ CVE-2025-23664,0,0,5eaae3d9bb9680e71179473e67178d8041daabfe633ea61ccf7a551976bb9
|
||||
CVE-2025-23665,0,0,df3a85fb9b6ff519cb09c58b53e0bb17cb58cc0d047b57ae4c9ab7778577a02d,2025-01-16T20:15:43.460000
|
||||
CVE-2025-23668,0,0,447d6cc5f5b3f62673ad968834c74d2e9518d05227dc3654233c5c4a54f289f5,2025-03-03T14:15:44.833000
|
||||
CVE-2025-23669,0,0,d1bc630e712a78731f318fb10d255700aeb84fda668fd5568dd1716510645cc3,2025-01-27T15:15:12.423000
|
||||
CVE-2025-2367,1,1,124774411b191595f653fe0ed99b1edfd4d302b865a3b7c733296cc5506cf4f5,2025-03-17T08:15:11.283000
|
||||
CVE-2025-23670,0,0,75c342fc2ee2c426e92cef5e259a27bac2885c431e4042a31685cea50fc474b8,2025-03-03T14:15:44.970000
|
||||
CVE-2025-23671,0,0,e807509054aea4938a91cc46517fc530776db152688d3d7e9ff4404f8050a084,2025-01-31T09:15:08.210000
|
||||
CVE-2025-23672,0,0,ed0b60a87316bc71dff66c00e07e06614733370adc17528a90f1f5ea0631e03a,2025-01-22T15:15:20.287000
|
||||
@ -283401,6 +283406,7 @@ CVE-2025-23676,0,0,bbff1b0b0c72b65ab93adfe12ede28b2caf5de3f20cf8286afdd20cc34874
|
||||
CVE-2025-23677,0,0,4f1d78d3726e731bfdb135ac6135bd5100b5ae0cb26c60d465015a36da99e6d2,2025-01-16T20:15:43.900000
|
||||
CVE-2025-23678,0,0,9070a09dd2eb20f51e2be62ec561b8270cc7eb4237f6eb49d0590f00449b80ff,2025-01-22T15:15:20.703000
|
||||
CVE-2025-23679,0,0,605904da624c6d61b6f79440676d8b8f5ed42e36d8e30bd2573ed441e38c8caa,2025-01-22T15:15:20.840000
|
||||
CVE-2025-2368,1,1,e7b14870e8259514b7d7a5610f3616a1da1b4f7fd3abdd01ea9a68f7ed707c30,2025-03-17T08:15:11.493000
|
||||
CVE-2025-23681,0,0,f163c52d273d1d7a5f132a356a6eb42ef72b66e82cae27dbeef89ea694e8a3b1,2025-01-22T15:15:20.977000
|
||||
CVE-2025-23682,0,0,5a2b91d4ab77287a6b2315a23f445649f10628cbef22963db89fe1e3e45dad15,2025-01-22T15:15:21.123000
|
||||
CVE-2025-23683,0,0,11ab818cdded601704d5457da26238366cc9a2cdec8e1cfa4e95b50fb941a5bd,2025-01-22T15:15:21.260000
|
||||
@ -283656,7 +283662,7 @@ CVE-2025-23946,0,0,9de3ccf4350f51c6d8e67eab9fdaace2b0128c36302335bbd7ddc29cf4115
|
||||
CVE-2025-23947,0,0,b918dd9018ba545f112604d29f16795478738d9868aa76eb24c352a7a4e3c4ec,2025-01-16T21:15:36.670000
|
||||
CVE-2025-23948,0,0,fa217fc33fb3c65287110150a4613d620cf18c0fe66132ab121eab1307585f10,2025-01-22T15:15:26.383000
|
||||
CVE-2025-23949,0,0,d90495090ae00e6e58d5cfea56b4f220cf8c7c1a45a835ce24e1ea30c09f925d,2025-01-22T15:15:26.527000
|
||||
CVE-2025-2395,1,1,5893b48eeb89009b6aaa25281922cff9b0e61053f509134fc47594406fb36e00,2025-03-17T06:15:25.910000
|
||||
CVE-2025-2395,0,0,5893b48eeb89009b6aaa25281922cff9b0e61053f509134fc47594406fb36e00,2025-03-17T06:15:25.910000
|
||||
CVE-2025-23950,0,0,4ac29c4dd1a428d4afa0ee44a692bfd3a045bfda7b0c1933c7ec004bbdec77a8,2025-01-16T21:15:36.817000
|
||||
CVE-2025-23951,0,0,2d32c1931f285be8ff0de2b01cdf7652c918f38bc79b845ac3d321ee8c1bb84b,2025-01-16T21:15:36.983000
|
||||
CVE-2025-23953,0,0,f6f03bfe88f28bb6450de0d0a10e28b0ddc76002765b30baa9464de96156821e,2025-01-22T15:15:26.670000
|
||||
@ -283665,7 +283671,7 @@ CVE-2025-23955,0,0,b35ff47ed4400b2edb51393bc234d7c4ad9797e847fec68985488245984a0
|
||||
CVE-2025-23956,0,0,15f2dcb32df35e2b8473f6870c5d0b4c83cc77afd7741dc7fb30f1d524230e01,2025-03-03T14:15:49.010000
|
||||
CVE-2025-23957,0,0,40b759ae20a341b30b3caf9db81dbe00398828638d81ba3346ad7f7cf25fc424,2025-01-16T21:15:37.420000
|
||||
CVE-2025-23959,0,0,4d3ba4ca608a53eb6870e6e5b2be4b542170ae3caec5feb8a182291e655509aa,2025-01-22T15:15:26.810000
|
||||
CVE-2025-2396,1,1,d1b7c3a54bb28d44e7c5c169828b5aa8533a1536b3bc917a925583ffb5a4a6e3,2025-03-17T06:15:26.113000
|
||||
CVE-2025-2396,0,0,d1b7c3a54bb28d44e7c5c169828b5aa8533a1536b3bc917a925583ffb5a4a6e3,2025-03-17T06:15:26.113000
|
||||
CVE-2025-23960,0,0,fef5413834349b73f28bcc0fec0108a4368773674c1a2ae5d7728e978b8298e8,2025-01-23T16:15:40.777000
|
||||
CVE-2025-23961,0,0,36c0da688ed3e8548f86716b57ea278db435c869e71f4caf3f9de5e6869464d4,2025-01-16T21:15:37.573000
|
||||
CVE-2025-23962,0,0,38c72a66f748d246b44f5351bf9ff0f3b3815cc4926f227945695c33eaf96317,2025-01-16T21:15:37.730000
|
||||
@ -284656,8 +284662,8 @@ CVE-2025-26206,0,0,bc67999dabe96502b241246d2665faf1f09178bdb9b72e5e7dd5401b748e2
|
||||
CVE-2025-26215,0,0,398e0534dde9630858e15022c6decb119d529efa2fc59efd24b3f1a57cdf3f89,2025-03-14T17:15:51.613000
|
||||
CVE-2025-26216,0,0,fa35563faa6505245c7f05bc4878e14310c206fdd07c5771663544280eaa71b8,2025-03-14T17:15:51.730000
|
||||
CVE-2025-26260,0,0,23c98183c981924ff624691f004f57ca0a3b3fc9df97cc744f6e86e7322bfeaf,2025-03-12T16:15:23.907000
|
||||
CVE-2025-26263,0,1,33c82bcdd68cdcef2d06780800c3ab6c6f6af78532f2208935cfab51d7c78d3f,2025-03-17T06:15:24.630000
|
||||
CVE-2025-26264,0,1,78a1bd2e43e9b3b3479a5073d67ff29ef6c7b849522e2d6fc7c934784cc466cb,2025-03-17T06:15:25.070000
|
||||
CVE-2025-26263,0,0,33c82bcdd68cdcef2d06780800c3ab6c6f6af78532f2208935cfab51d7c78d3f,2025-03-17T06:15:24.630000
|
||||
CVE-2025-26264,0,0,78a1bd2e43e9b3b3479a5073d67ff29ef6c7b849522e2d6fc7c934784cc466cb,2025-03-17T06:15:25.070000
|
||||
CVE-2025-26304,0,0,70c8f37d4db2054dfe1099a4a2c4b06129c826d4de254465b9316b6b41e402d7,2025-02-21T21:15:24.653000
|
||||
CVE-2025-26305,0,0,1a1d603a79ab0dad9b04f449d78f3a3bb9f5de25113a59f9bb3a8e492946e3de,2025-02-21T21:15:24.803000
|
||||
CVE-2025-26306,0,0,f6318b29dc3c8fcf62d8d059c582dc4ed277312d31ede047e5262baa26bd01da,2025-02-24T18:15:21.357000
|
||||
@ -284782,14 +284788,14 @@ CVE-2025-26586,0,0,2995618efb5bc786b623a073068ee53ca10ebf5a6af434abe477283701f8c
|
||||
CVE-2025-26587,0,0,f182d8db53652dc68c3e8d08c04a29d1ba7ae50e8acecec3dbde839e0907bec0,2025-03-03T14:15:55.780000
|
||||
CVE-2025-26588,0,0,bd02ba233979579f3c8028618005b5c036f8e9bb2db4aabcd7a57c2127440863,2025-03-03T14:15:55.920000
|
||||
CVE-2025-26589,0,0,bed434e05d708700c2c5a6b977f599fcc267a2dd10919cb423bc182a13c41191,2025-03-03T14:15:56.067000
|
||||
CVE-2025-26594,0,1,b138a1df44ced5a1d018cfbe5ec92152036f7ace0823d2c73679f1c192739c1a,2025-03-17T05:15:34.173000
|
||||
CVE-2025-26595,0,1,ebfb2ddac9eabcc8c33342063230d97e91f59f614211c6c3ecd4f229d8f1d180,2025-03-17T05:15:34.563000
|
||||
CVE-2025-26596,0,1,85e4edf4228c3b6e57df67068693ef99060b766bb00d91787a0ae0dea6594085,2025-03-17T05:15:34.773000
|
||||
CVE-2025-26597,0,1,e67cf401865a75465362b9799533e8470819f400efee3476a6f4c636d7b21d7f,2025-03-17T05:15:35.010000
|
||||
CVE-2025-26598,0,1,0eacfb7dc4a4129ecb716c23916456f4144bb39a72faf73ad17118512460229f,2025-03-17T05:15:35.573000
|
||||
CVE-2025-26599,0,1,67750252395bb0d8884d098577f195f781b9f325cc801904caf59d821915f3d2,2025-03-17T05:15:35.863000
|
||||
CVE-2025-26600,0,1,df5e79272036ef3947f3db5ae9cd99052c06dd1905212be540fb72d1cfe2732f,2025-03-17T05:15:36.260000
|
||||
CVE-2025-26601,0,1,930ff9b38118f9f92cba85e7e91d31d8ae2de95a9a34069de5df204651cea3c6,2025-03-17T05:15:36.510000
|
||||
CVE-2025-26594,0,0,b138a1df44ced5a1d018cfbe5ec92152036f7ace0823d2c73679f1c192739c1a,2025-03-17T05:15:34.173000
|
||||
CVE-2025-26595,0,0,ebfb2ddac9eabcc8c33342063230d97e91f59f614211c6c3ecd4f229d8f1d180,2025-03-17T05:15:34.563000
|
||||
CVE-2025-26596,0,0,85e4edf4228c3b6e57df67068693ef99060b766bb00d91787a0ae0dea6594085,2025-03-17T05:15:34.773000
|
||||
CVE-2025-26597,0,0,e67cf401865a75465362b9799533e8470819f400efee3476a6f4c636d7b21d7f,2025-03-17T05:15:35.010000
|
||||
CVE-2025-26598,0,0,0eacfb7dc4a4129ecb716c23916456f4144bb39a72faf73ad17118512460229f,2025-03-17T05:15:35.573000
|
||||
CVE-2025-26599,0,0,67750252395bb0d8884d098577f195f781b9f325cc801904caf59d821915f3d2,2025-03-17T05:15:35.863000
|
||||
CVE-2025-26600,0,0,df5e79272036ef3947f3db5ae9cd99052c06dd1905212be540fb72d1cfe2732f,2025-03-17T05:15:36.260000
|
||||
CVE-2025-26601,0,0,930ff9b38118f9f92cba85e7e91d31d8ae2de95a9a34069de5df204651cea3c6,2025-03-17T05:15:36.510000
|
||||
CVE-2025-26603,0,0,8ae2812ccc436075652a92b78482e86bdfeb5a0aad1aca77b0c194e6b06d7b51,2025-03-07T01:15:12.700000
|
||||
CVE-2025-26604,0,0,720d50d971a81c5950fb5a1fe6bb95e5177eb2f3df88a35c072c70e62f5cf12d,2025-02-18T20:15:33.003000
|
||||
CVE-2025-26605,0,0,fdd668972bd6651dbed3cd9f902a3b8b59140c82d14f8fce08f437a28193bf96,2025-02-18T22:15:19.387000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user