mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-07 19:16:29 +00:00
Auto-Update: 2025-03-22T19:00:19.973214+00:00
This commit is contained in:
parent
104af01555
commit
d04831384e
152
CVE-2025/CVE-2025-26xx/CVE-2025-2621.json
Normal file
152
CVE-2025/CVE-2025-26xx/CVE-2025-2621.json
Normal file
@ -0,0 +1,152 @@
|
||||
{
|
||||
"id": "CVE-2025-2621",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-03-22T17:15:34.790",
|
||||
"lastModified": "2025-03-22T17:15:34.790",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [
|
||||
{
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"unsupported-when-assigned"
|
||||
]
|
||||
}
|
||||
],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in D-Link DAP-1620 1.03 and classified as critical. This issue affects the function check_dws_cookie of the file /storage. The manipulation of the argument uid leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 9.3,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "HIGH",
|
||||
"vulnIntegrityImpact": "HIGH",
|
||||
"vulnAvailabilityImpact": "HIGH",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||||
"baseScore": 10.0,
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "NONE",
|
||||
"confidentialityImpact": "COMPLETE",
|
||||
"integrityImpact": "COMPLETE",
|
||||
"availabilityImpact": "COMPLETE"
|
||||
},
|
||||
"baseSeverity": "HIGH",
|
||||
"exploitabilityScore": 10.0,
|
||||
"impactScore": 10.0,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-119"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-121"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.300623",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.300623",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.518980",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://witty-maiasaura-083.notion.site/D-link-DAP-1620-check_dws_uid-Vulnerability-1b4b2f2a63618025b049f6e62a1835c0",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.dlink.com/",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
145
CVE-2025/CVE-2025-26xx/CVE-2025-2622.json
Normal file
145
CVE-2025/CVE-2025-26xx/CVE-2025-2622.json
Normal file
@ -0,0 +1,145 @@
|
||||
{
|
||||
"id": "CVE-2025-2622",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-03-22T17:15:35.213",
|
||||
"lastModified": "2025-03-22T17:15:35.213",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in aizuda snail-job 1.4.0. It has been classified as critical. Affected is the function getRuntime of the file /snail-job/workflow/check-node-expression of the component Workflow-Task Management Module. The manipulation of the argument nodeExpression leads to deserialization. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "LOW",
|
||||
"vulnIntegrityImpact": "LOW",
|
||||
"vulnAvailabilityImpact": "LOW",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
||||
"baseScore": 6.5,
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL"
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-20"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-502"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gitee.com/aizuda/snail-job/issues/IBSQ24",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://gitee.com/aizuda/snail-job/issues/IBSQ24#note_38500450_link",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.300624",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.300624",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.518999",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
141
CVE-2025/CVE-2025-26xx/CVE-2025-2623.json
Normal file
141
CVE-2025/CVE-2025-26xx/CVE-2025-2623.json
Normal file
@ -0,0 +1,141 @@
|
||||
{
|
||||
"id": "CVE-2025-2623",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-03-22T18:15:12.497",
|
||||
"lastModified": "2025-03-22T18:15:12.497",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in westboy CicadasCMS 1.0. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /system/cms/content/save. The manipulation of the argument title/content/laiyuan leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 5.1,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "PASSIVE",
|
||||
"vulnConfidentialityImpact": "NONE",
|
||||
"vulnIntegrityImpact": "LOW",
|
||||
"vulnAvailabilityImpact": "NONE",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
|
||||
"baseScore": 3.5,
|
||||
"baseSeverity": "LOW",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
|
||||
"baseScore": 4.0,
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 2.9,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-94"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/IceFoxH/VULN/issues/10",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.300625",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.300625",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.519294",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
25
README.md
25
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2025-03-22T17:00:19.933923+00:00
|
||||
2025-03-22T19:00:19.973214+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2025-03-22T15:15:38.860000+00:00
|
||||
2025-03-22T18:15:12.497000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,31 +33,22 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
286219
|
||||
286222
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `1`
|
||||
Recently added CVEs: `3`
|
||||
|
||||
- [CVE-2025-2620](CVE-2025/CVE-2025-26xx/CVE-2025-2620.json) (`2025-03-22T15:15:38.860`)
|
||||
- [CVE-2025-2621](CVE-2025/CVE-2025-26xx/CVE-2025-2621.json) (`2025-03-22T17:15:34.790`)
|
||||
- [CVE-2025-2622](CVE-2025/CVE-2025-26xx/CVE-2025-2622.json) (`2025-03-22T17:15:35.213`)
|
||||
- [CVE-2025-2623](CVE-2025/CVE-2025-26xx/CVE-2025-2623.json) (`2025-03-22T18:15:12.497`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `11`
|
||||
Recently modified CVEs: `0`
|
||||
|
||||
- [CVE-2023-20570](CVE-2023/CVE-2023-205xx/CVE-2023-20570.json) (`2025-03-22T15:15:35.730`)
|
||||
- [CVE-2024-13120](CVE-2024/CVE-2024-131xx/CVE-2024-13120.json) (`2025-03-22T15:15:36.820`)
|
||||
- [CVE-2024-21175](CVE-2024/CVE-2024-211xx/CVE-2024-21175.json) (`2025-03-22T15:15:36.973`)
|
||||
- [CVE-2024-30159](CVE-2024/CVE-2024-301xx/CVE-2024-30159.json) (`2025-03-22T15:15:37.173`)
|
||||
- [CVE-2024-30160](CVE-2024/CVE-2024-301xx/CVE-2024-30160.json) (`2025-03-22T15:15:37.373`)
|
||||
- [CVE-2024-45317](CVE-2024/CVE-2024-453xx/CVE-2024-45317.json) (`2025-03-22T15:15:37.560`)
|
||||
- [CVE-2024-57601](CVE-2024/CVE-2024-576xx/CVE-2024-57601.json) (`2025-03-22T15:15:37.747`)
|
||||
- [CVE-2024-57656](CVE-2024/CVE-2024-576xx/CVE-2024-57656.json) (`2025-03-22T15:15:37.953`)
|
||||
- [CVE-2024-57719](CVE-2024/CVE-2024-577xx/CVE-2024-57719.json) (`2025-03-22T15:15:38.243`)
|
||||
- [CVE-2025-24158](CVE-2025/CVE-2025-241xx/CVE-2025-24158.json) (`2025-03-22T15:15:38.440`)
|
||||
- [CVE-2025-26408](CVE-2025/CVE-2025-264xx/CVE-2025-26408.json) (`2025-03-22T15:15:38.687`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
27
_state.csv
27
_state.csv
@ -216257,7 +216257,7 @@ CVE-2023-20567,0,0,c964118cb11f73e6b60a22120cf87763e94154beef53a5219420f8ba021f3
|
||||
CVE-2023-20568,0,0,da565fc4dc5d60c80e362326f1bbc3cea5fe2bb5e947fdb4d44207deef9071ab,2025-02-13T17:16:01.573000
|
||||
CVE-2023-20569,0,0,9c57246b0f9b85ed1bb205cd78f96d07cdbdc134f8f4888158d7bbd00a5a4606,2024-11-21T07:41:08.533000
|
||||
CVE-2023-2057,0,0,d221bbe2743161f6d902280c378eea66efefb069a3c831c6d7b6071745e039eb,2024-11-21T07:57:51.210000
|
||||
CVE-2023-20570,0,1,3f04701ed795d51d2dcb75de0253d91e51782d37c95cda88aadf51b95684d2a0,2025-03-22T15:15:35.730000
|
||||
CVE-2023-20570,0,0,3f04701ed795d51d2dcb75de0253d91e51782d37c95cda88aadf51b95684d2a0,2025-03-22T15:15:35.730000
|
||||
CVE-2023-20571,0,0,124885a17b0594fd83dce4569d7fca5fe444643e548995c0e909a74c3e042d42,2024-11-21T07:41:09
|
||||
CVE-2023-20573,0,0,c1228e58cf6c75c55f40924878fd7ef9a08a1744efdfa2fdc877544f49aedfe3,2024-11-21T07:41:09.177000
|
||||
CVE-2023-20575,0,0,d454030d808802a4dcec640f81d272aa7c4135f2a2dc62f9cf54b366e4182643,2024-11-27T16:15:08.010000
|
||||
@ -247399,7 +247399,7 @@ CVE-2024-13116,0,0,98f3ad6698735710def1c6baf530db546e54e66a9af268d4888f3cbf2c43d
|
||||
CVE-2024-13117,0,0,48c4c1a0deaa83ed5f11e564cf33aba28b1ea8edfb18de9dc2dbe1b856b27247,2025-02-03T15:15:16.440000
|
||||
CVE-2024-13119,0,0,73826a06c11021e3ab53b915522c9178a0e342dd2d9e6f744a28454c1427d96c,2025-02-13T15:15:17.360000
|
||||
CVE-2024-1312,0,0,d16b3ecc82cd74d4071dc20055eab0a36b43013bc6757c1d62cda1a87b890d59,2024-11-21T08:50:18.020000
|
||||
CVE-2024-13120,0,1,bf28b53c2d93a12739a8ec95b1d7d2d5cd7dd1e5003751f3f3cff0db287ff89c,2025-03-22T15:15:36.820000
|
||||
CVE-2024-13120,0,0,bf28b53c2d93a12739a8ec95b1d7d2d5cd7dd1e5003751f3f3cff0db287ff89c,2025-03-22T15:15:36.820000
|
||||
CVE-2024-13121,0,0,eea054139dc60b1a73e646e7a0792d046eb2c33404d8501622a8bb165162f3ee,2025-02-19T22:15:22.250000
|
||||
CVE-2024-13125,0,0,bcf9d3da81b0bd561483ac7c7c16f4aea5f6f77159bd25d7d228b3f63d6a7f5c,2025-02-19T22:15:22.390000
|
||||
CVE-2024-13126,0,0,2954b0c6d56f081558db1c9d9552b1f2529defcf3528faffaea30c48e2a49418,2025-03-17T19:15:21.573000
|
||||
@ -249777,7 +249777,7 @@ CVE-2024-21171,0,0,61b7882ff74299d4c34aa7d4392c360ac819414c7049ab797c7be620c6b6b
|
||||
CVE-2024-21172,0,0,ff5d0eda037e06e7f32897640b26e512b78468cde367840023f94016b9cff32b,2024-10-21T12:59:49.070000
|
||||
CVE-2024-21173,0,0,1dbc648a84b918e35f1a74d8e8514c5c1c2f9340b2449aca3fe5a999409fe38c,2024-11-21T08:53:55.570000
|
||||
CVE-2024-21174,0,0,3aedc4aa4a685a673eda6d373d2980d41a58f103654e9e3fbf1a83af6fe80b33,2024-12-03T20:15:14.673000
|
||||
CVE-2024-21175,0,1,e03e7e0c59c793429b473a360114525d48cf5ca7657dc7f86416ef777a4c8504,2025-03-22T15:15:36.973000
|
||||
CVE-2024-21175,0,0,e03e7e0c59c793429b473a360114525d48cf5ca7657dc7f86416ef777a4c8504,2025-03-22T15:15:36.973000
|
||||
CVE-2024-21176,0,0,e67fa4210999e42aabb0f353f1923af498dc2157a69a86cdbcbbc16b079f6b49,2024-11-21T08:53:55.950000
|
||||
CVE-2024-21177,0,0,a7beebd8af66762ba6554b1372efec08a7ba14cfa8d8ffd3d0b507303d295027,2025-03-13T14:15:20.593000
|
||||
CVE-2024-21178,0,0,51bccbc8da1f038b0557737fb971680681a02da13b58dff07ed454014200ef9d,2025-03-14T17:15:42.167000
|
||||
@ -256641,9 +256641,9 @@ CVE-2024-30154,0,0,44393c7dbeff68b7c1c8cbce1ba7b354794da02b96328afc30511aec1959a
|
||||
CVE-2024-30156,0,0,92fda2ccd849293e60b2e463cac31a4dc54847a22ed3e9030d260cf180d129ee,2024-11-21T20:15:40.067000
|
||||
CVE-2024-30157,0,0,559260e13715a400d85dadb0bfe165c83aef8f0ab0ce2b4b15f456f448eff1c9,2024-11-21T09:11:19.547000
|
||||
CVE-2024-30158,0,0,95d9ce829a91f171649545534b80b43680e23fd13b3b02f53cdc5be44785afcc,2024-10-25T16:30:09.927000
|
||||
CVE-2024-30159,0,1,c35306423129c754aa1e4801387fe2a9b297967b0a913fec69e55815c59cfd0a,2025-03-22T15:15:37.173000
|
||||
CVE-2024-30159,0,0,c35306423129c754aa1e4801387fe2a9b297967b0a913fec69e55815c59cfd0a,2025-03-22T15:15:37.173000
|
||||
CVE-2024-3016,0,0,58c170e1683a5dd60198d6e8d31a0de337246947c53fec4a9f8a4f07423100fa,2024-11-21T09:28:41.250000
|
||||
CVE-2024-30160,0,1,52fd0ec4c608ba112e9a81cff3ff9d4bcc0b1aaea51e1ea3541d490d3309738d,2025-03-22T15:15:37.373000
|
||||
CVE-2024-30160,0,0,52fd0ec4c608ba112e9a81cff3ff9d4bcc0b1aaea51e1ea3541d490d3309738d,2025-03-22T15:15:37.373000
|
||||
CVE-2024-30161,0,0,bd9c6bbca173a3185882384150ea17a790a06755ac3f6e1d556a0c7f18eaf6e3,2025-03-14T02:15:13.777000
|
||||
CVE-2024-30162,0,0,1d89027fadd32d888ac91deacfb634da9306e22312414c5b33187ff9291e61a1,2024-11-21T09:11:20.300000
|
||||
CVE-2024-30163,0,0,2887459b66695d41f1e6d12551511852bcbdefc140339f61da6a07ca21c85b99,2025-03-19T17:15:39.967000
|
||||
@ -268339,7 +268339,7 @@ CVE-2024-45313,0,0,ffabf2497368b182081cd5c0b8f0370a40d21c279eab9f868fa173421d78b
|
||||
CVE-2024-45314,0,0,be94bf286290b49fc3c416c891ae3e1fb104053d3488507f8ca293d1cda88bb2,2024-09-12T16:39:53.690000
|
||||
CVE-2024-45315,0,0,312ff66923d8744d67c49b6e02fabcb8e9835b06304ea335e59014578bec528e,2024-11-01T16:35:26.853000
|
||||
CVE-2024-45316,0,0,ae32561cbb3e12520a1339144b5c2604a6ff780dc006584815b600f90f07a8a5,2024-10-15T12:58:51.050000
|
||||
CVE-2024-45317,0,1,631bc8ae61bb510eb08af8dc14b3a3e6bbed6e1feab59b5a31a9d74992157448,2025-03-22T15:15:37.560000
|
||||
CVE-2024-45317,0,0,631bc8ae61bb510eb08af8dc14b3a3e6bbed6e1feab59b5a31a9d74992157448,2025-03-22T15:15:37.560000
|
||||
CVE-2024-45318,0,0,75989837b2772ed0bee9b8d611c5c445760df07141b272a0d99d94a5a5004185,2024-12-05T17:15:11.880000
|
||||
CVE-2024-45319,0,0,f54a68d148467026440ad15f341a6bfb542cacddb35ec8506cc4659fa4aa336e,2024-12-05T17:15:12.040000
|
||||
CVE-2024-4532,0,0,014dcf5f2708015805e201ab211b9cd9fe192f81599e256bd8dd0d34d23e73ac,2024-11-21T09:43:02.993000
|
||||
@ -276579,7 +276579,7 @@ CVE-2024-57595,0,0,5ac192d4452b1b04f540486f14602420111ddc5ce9ebf1466c634ddcfa94e
|
||||
CVE-2024-57598,0,0,f942cb84c2609b2961d7b373816f9239192ede7b991ad3bd5a46392c1f31f307,2025-02-06T16:15:41
|
||||
CVE-2024-57599,0,0,08a6b92156dbb47043a13e2f6a8f470b6ff2d84a2cc52c57a2605bc11a655e8e,2025-02-06T21:15:21.760000
|
||||
CVE-2024-5760,0,0,fdcabe1f95ff5e6dbce832204c1f64827ff6fe6277e57163fb295e96d7b29093,2024-09-13T16:28:43.077000
|
||||
CVE-2024-57601,0,1,d978ee2acd4111ee755bc6d199e0b7a5b30d82c722a815c1a28b244c807873ce,2025-03-22T15:15:37.747000
|
||||
CVE-2024-57601,0,0,d978ee2acd4111ee755bc6d199e0b7a5b30d82c722a815c1a28b244c807873ce,2025-03-22T15:15:37.747000
|
||||
CVE-2024-57602,0,0,226d91ed331e63f738fd3b8b845736eb5a7fc570a3a123d5ea996b5176962aac,2025-03-18T16:15:25.597000
|
||||
CVE-2024-57603,0,0,8818c006a29d6f4bd13b4237aca8900d379684c37788b65eab93543c45a04038,2025-02-13T19:15:13.890000
|
||||
CVE-2024-57604,0,0,9dc897647370ae27cc2a2fe45d9c565c9d827fa05aa881ae8c05dff72d178677,2025-03-20T15:15:43.980000
|
||||
@ -276635,7 +276635,7 @@ CVE-2024-57652,0,0,d73e7be12017c8f1cd68a94beba6a947fa401580f763e064115069718c3a2
|
||||
CVE-2024-57653,0,0,42fd65211c7003dec5322ac0547672e4d3c8aab01cf5d3ed6c45ebb091bb68ec,2025-02-18T22:15:15.247000
|
||||
CVE-2024-57654,0,0,7f766ad02bc18df38721852911dbcc4b021e73b25a35d8fd990c3fd3aec04d8e,2025-01-14T17:15:20.233000
|
||||
CVE-2024-57655,0,0,1be0c1177e28b1a1bb7b680ab7109b0c840777062bda07d33388651769ea2a54,2025-03-18T19:15:47.213000
|
||||
CVE-2024-57656,0,1,7b7715aae3ceb9667d61aefc67555704c00401b1a12be6d6fc65e5dc49bd312b,2025-03-22T15:15:37.953000
|
||||
CVE-2024-57656,0,0,7b7715aae3ceb9667d61aefc67555704c00401b1a12be6d6fc65e5dc49bd312b,2025-03-22T15:15:37.953000
|
||||
CVE-2024-57657,0,0,b09c438a14c3db4fe411704529d496d2bb6233f86346a91943c98c21994b6176,2025-03-19T15:15:53.050000
|
||||
CVE-2024-57658,0,0,e12e2e5c80101e7e7b06d323b6720ff3675db1a8a27ec11343898fca21b6fc03,2025-02-18T22:15:15.713000
|
||||
CVE-2024-57659,0,0,f32b1ab826823776ca0c8a17c8694a17edb2ecd676fd6e2f2814340b2ca52fc0,2025-01-15T15:15:13.450000
|
||||
@ -276672,7 +276672,7 @@ CVE-2024-57704,0,0,a9645cdb100870e11a8ca5752cec5d028eb030155daed4240595658dfba99
|
||||
CVE-2024-57707,0,0,256285bb0e4c937fcd8fcd84fe295c9ba07342d1410e4f5a401c2306ce0e91b0,2025-02-10T17:15:18.353000
|
||||
CVE-2024-5771,0,0,e471b000ba82873f846a0f0e75b0efdd4d37cb6fabf417a41ddc70ef105f4163,2024-11-21T09:48:18.863000
|
||||
CVE-2024-57716,0,0,79da6b902a2967abf048782629438cae155ee0d179ea2083ddc6c325108a1865,2025-02-21T16:15:32.453000
|
||||
CVE-2024-57719,0,1,91bc71e31e65cd5c466ef5757ec164b2cf640a216e5ea291e7cc4f766d77f2c8,2025-03-22T15:15:38.243000
|
||||
CVE-2024-57719,0,0,91bc71e31e65cd5c466ef5757ec164b2cf640a216e5ea291e7cc4f766d77f2c8,2025-03-22T15:15:38.243000
|
||||
CVE-2024-5772,0,0,a62834c0864387c3b698a85018242263bd7f240d52606a720f52cc14c8c47fba,2025-01-29T17:46:54.753000
|
||||
CVE-2024-57720,0,0,c6ea7c04d1f31cae7cfb088d00930ccdd0afdbf506292dce573bf98c3a05537d,2025-03-14T16:15:37.977000
|
||||
CVE-2024-57721,0,0,c83b53b1f3da4e985aa3e8c6db4fa9cfaecd34c84a7a02eed4e5ae091c579b1b,2025-03-18T20:15:24.810000
|
||||
@ -284398,7 +284398,7 @@ CVE-2025-24152,0,0,94cf03b83e0d0bbf2e2519ab1fb41ecec660385e6e18386a8bccf1cff0fd2
|
||||
CVE-2025-24153,0,0,a962e00376d57b532ea670dc465405ba54e446d5423d2019e225758957981f83,2025-02-04T21:15:28.390000
|
||||
CVE-2025-24154,0,0,2133416aad04106ad04753c0c4ad3643abc6a261600e1250147cb0b1c5f17046,2025-03-18T20:15:25.680000
|
||||
CVE-2025-24156,0,0,8fa4c1a03f09991e5c2bed2e07959c1558a8892a2864cd53dcb29d166373a914,2025-01-30T16:43:39.593000
|
||||
CVE-2025-24158,0,1,35070c801a9b11c70eaf663a73a983a0e2a6932451a99df2d1775809dfa38432,2025-03-22T15:15:38.440000
|
||||
CVE-2025-24158,0,0,35070c801a9b11c70eaf663a73a983a0e2a6932451a99df2d1775809dfa38432,2025-03-22T15:15:38.440000
|
||||
CVE-2025-24159,0,0,5049ee423dfbceaaa990b18ae981888a723164635f4aec7b443286d0a98a6096,2025-03-19T14:15:38.853000
|
||||
CVE-2025-24160,0,0,ae6edae2205c08dd8b969920bf8cb3dc84d26eaf5297b5739349f27fb704a2f3,2025-01-28T16:15:44.003000
|
||||
CVE-2025-24161,0,0,6d02f0f01530cc9b917612d04abebc1e6d67d88a440e864a6d1a14a27e3f4034,2025-02-04T22:15:43.057000
|
||||
@ -285348,15 +285348,18 @@ CVE-2025-2617,0,0,17ecf2a4afb7fa68080612946426fe6502dcbc52588757f2cad26c1a96015f
|
||||
CVE-2025-2618,0,0,a0be16c007291a7654dfbd4f2c2eb5cd5612dbfd0d66d1c468dbb0c63d5d84a8,2025-03-22T14:15:16.650000
|
||||
CVE-2025-26182,0,0,50bc93eea6be4a4f051a5cba8257a428d894f0c81b2a5095709deaa26b1aeef7,2025-03-05T19:15:39.023000
|
||||
CVE-2025-2619,0,0,27e06b14b4922e101e410b948b2adbb5b081f3be43d641aabf6c3fa5baa51dc1,2025-03-22T14:15:16.867000
|
||||
CVE-2025-2620,1,1,2935d7219c87bcc2281f31bd551ed42a24dda18283b5cbd9b721ae21867a9a81,2025-03-22T15:15:38.860000
|
||||
CVE-2025-2620,0,0,2935d7219c87bcc2281f31bd551ed42a24dda18283b5cbd9b721ae21867a9a81,2025-03-22T15:15:38.860000
|
||||
CVE-2025-26200,0,0,07971a3db98f9cfae341b32901f42b0af32b82b7b85e8efc840488c86eda257e,2025-02-24T17:15:14.273000
|
||||
CVE-2025-26201,0,0,19cc0d8c975fa49352fb9ad1f8db6737d71edae986faba1d37ba48d4a441cec4,2025-02-24T18:15:21.047000
|
||||
CVE-2025-26202,0,0,f8b0cbe65a751dd37df4c2f886b778f4059fbbdee95a620e7d770c31cb87373d,2025-03-14T20:15:14.167000
|
||||
CVE-2025-26204,0,0,a8f05c49578ea0cbde7e961f0f9aa7f0415694b1127756defe681b9982099ed9,2025-03-09T22:15:12.120000
|
||||
CVE-2025-26205,0,0,63ed32d242f54d965851d14b37db546b9e668c5b81ac02938c74583c42eba152,2025-03-09T22:15:12.200000
|
||||
CVE-2025-26206,0,0,bc67999dabe96502b241246d2665faf1f09178bdb9b72e5e7dd5401b748e2b93,2025-03-04T17:15:18.487000
|
||||
CVE-2025-2621,1,1,e645a11d37d3513e549f7f118f5a37919bfad735fafa27ee0bff1e6cbba542b4,2025-03-22T17:15:34.790000
|
||||
CVE-2025-26215,0,0,398e0534dde9630858e15022c6decb119d529efa2fc59efd24b3f1a57cdf3f89,2025-03-14T17:15:51.613000
|
||||
CVE-2025-26216,0,0,fa35563faa6505245c7f05bc4878e14310c206fdd07c5771663544280eaa71b8,2025-03-14T17:15:51.730000
|
||||
CVE-2025-2622,1,1,91ac5bc22af896f8580271a5c082c15d7c55661c47f4bf5397d39b48166a2d58,2025-03-22T17:15:35.213000
|
||||
CVE-2025-2623,1,1,ea0c57bd044f13afbd3c8183e71a50223508ddf4470ee6c0234a42a5935cf3ba,2025-03-22T18:15:12.497000
|
||||
CVE-2025-26260,0,0,d87498df9911f6ec3fcf716c1acf728dc302a17a13c2bad4d77a68a80619f6a0,2025-03-19T19:15:46.987000
|
||||
CVE-2025-26263,0,0,87852969ca209a829a551b3d11cffebf3ca020061fd4d362c34f3d6a1719258e,2025-03-19T14:15:39.293000
|
||||
CVE-2025-26264,0,0,7eeeb1b8e87d7e06484f4d071bc6d32b977cfa79c395c4fbca1cefbdfdd35c84,2025-03-19T14:15:39.440000
|
||||
@ -285417,7 +285420,7 @@ CVE-2025-26376,0,0,90eeec3b23b739a411f2298590832d14f091d24699dbf3da6862c5e4407f2
|
||||
CVE-2025-26377,0,0,96f969cb5307f2cbebc16af725f96ac45b51be8c065b61bf3eeda7b6d861fdb8,2025-02-12T14:15:38.933000
|
||||
CVE-2025-26378,0,0,ee2f1897a6683ea6c4c3e60750a42143f8a85d34ee7d0a636569caad0aaac614,2025-03-03T22:06:52.163000
|
||||
CVE-2025-26393,0,0,0a56d68e056311c602cd521d02aa8a0c8475ada7ba02d263a955244f81b3c4c4,2025-03-17T20:15:14.140000
|
||||
CVE-2025-26408,0,1,cc3ff44719bfe263908c93711d844cb0c43379729d03c83e2a4a7413b5395225,2025-03-22T15:15:38.687000
|
||||
CVE-2025-26408,0,0,cc3ff44719bfe263908c93711d844cb0c43379729d03c83e2a4a7413b5395225,2025-03-22T15:15:38.687000
|
||||
CVE-2025-26409,0,0,cdf29866235215f5068aacbcbdb6f999e9c9f7adf8baf249758a0e54e8048ba1,2025-03-17T17:15:39.723000
|
||||
CVE-2025-26410,0,0,e0a8c1ecc38adad5db47008cfe5d8287500ec3cbba2c1f9a4a60a8e1051c525e,2025-03-18T19:15:50.450000
|
||||
CVE-2025-26411,0,0,3c8f066d5451ad6ef36a27d64d17719d6f654697fa56337f49dfc83e42e73333,2025-03-14T18:15:31.947000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user