mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-19 17:31:42 +00:00
Auto-Update: 2025-03-31T22:00:19.882734+00:00
This commit is contained in:
parent
741e3d9fd2
commit
d1342cd785
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2018-0824",
|
"id": "CVE-2018-0824",
|
||||||
"sourceIdentifier": "secure@microsoft.com",
|
"sourceIdentifier": "secure@microsoft.com",
|
||||||
"published": "2018-05-09T19:29:00.370",
|
"published": "2018-05-09T19:29:00.370",
|
||||||
"lastModified": "2024-11-21T03:39:01.810",
|
"lastModified": "2025-03-31T21:03:30.687",
|
||||||
"vulnStatus": "Undergoing Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2019-1069",
|
"id": "CVE-2019-1069",
|
||||||
"sourceIdentifier": "secure@microsoft.com",
|
"sourceIdentifier": "secure@microsoft.com",
|
||||||
"published": "2019-06-12T14:29:04.337",
|
"published": "2019-06-12T14:29:04.337",
|
||||||
"lastModified": "2024-11-21T04:35:57.170",
|
"lastModified": "2025-03-31T21:03:16.547",
|
||||||
"vulnStatus": "Undergoing Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
|
@ -1,14 +1,14 @@
|
|||||||
{
|
{
|
||||||
"id": "CVE-2024-24452",
|
"id": "CVE-2024-24452",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "security-alert@hpe.com",
|
||||||
"published": "2024-11-15T20:15:19.117",
|
"published": "2024-11-15T20:15:19.117",
|
||||||
"lastModified": "2024-11-18T17:11:56.587",
|
"lastModified": "2025-03-31T21:15:43.370",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "An invalid memory access when handling the ProtocolIE_ID field of E-RAB Release Indication messages in Athonet vEPC MME v11.4.0 allows attackers to cause a Denial of Service (DoS) to the cellular network by repeatedly initiating connections and sending a crafted payload."
|
"value": "An invalid memory access when handling the ProtocolIE_ID field of\u00a0E-RAB Release Indication messages in Athonet vEPC MME v11.4.0\u00a0allows attackers to cause a Denial of Service (DoS) to the cellular\u00a0network by repeatedly initiating connections and sending a crafted\u00a0payload."
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"lang": "es",
|
"lang": "es",
|
||||||
@ -17,6 +17,26 @@
|
|||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
"cvssMetricV31": [
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "security-alert@hpe.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||||
|
"baseScore": 5.9,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "HIGH",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.2,
|
||||||
|
"impactScore": 3.6
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
@ -52,6 +72,10 @@
|
|||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04780en_us&docLocale=en_US",
|
||||||
|
"source": "security-alert@hpe.com"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"url": "http://athonet.com",
|
"url": "http://athonet.com",
|
||||||
"source": "cve@mitre.org"
|
"source": "cve@mitre.org"
|
||||||
|
@ -1,14 +1,14 @@
|
|||||||
{
|
{
|
||||||
"id": "CVE-2024-24453",
|
"id": "CVE-2024-24453",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "security-alert@hpe.com",
|
||||||
"published": "2024-11-15T20:15:19.203",
|
"published": "2024-11-15T20:15:19.203",
|
||||||
"lastModified": "2024-11-18T17:11:56.587",
|
"lastModified": "2025-03-31T21:15:43.683",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "An invalid memory access when handling the ProtocolIE_ID field of E-RAB NotToBeModifiedBearerModInd information element in Athonet vEPC MME v11.4.0 allows attackers to cause a Denial of Service (DoS) to the cellular network by repeatedly initiating connections and sending a crafted payload."
|
"value": "An invalid memory access when handling the ProtocolIE_ID field of\u00a0E-RAB NotToBeModifiedBearerModInd information element in\u00a0Athonet vEPC MME v11.4.0 allows attackers to cause a Denial of\u00a0Service (DoS) to the cellular network by repeatedly initiating\u00a0connections and sending a crafted payload."
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"lang": "es",
|
"lang": "es",
|
||||||
@ -17,6 +17,26 @@
|
|||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
"cvssMetricV31": [
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "security-alert@hpe.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||||
|
"baseScore": 5.9,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "HIGH",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.2,
|
||||||
|
"impactScore": 3.6
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
@ -52,6 +72,10 @@
|
|||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04780en_us&docLocale=en_US",
|
||||||
|
"source": "security-alert@hpe.com"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"url": "http://athonet.com",
|
"url": "http://athonet.com",
|
||||||
"source": "cve@mitre.org"
|
"source": "cve@mitre.org"
|
||||||
|
@ -1,14 +1,14 @@
|
|||||||
{
|
{
|
||||||
"id": "CVE-2024-24454",
|
"id": "CVE-2024-24454",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "security-alert@hpe.com",
|
||||||
"published": "2024-11-15T20:15:19.300",
|
"published": "2024-11-15T20:15:19.300",
|
||||||
"lastModified": "2024-11-18T17:11:56.587",
|
"lastModified": "2025-03-31T21:15:43.950",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "An invalid memory access when handling the ProtocolIE_ID field of E-RAB Modify Request messages in Athonet vEPC MME v11.4.0 allows attackers to cause a Denial of Service (DoS) to the cellular network by repeatedly initiating connections and sending a crafted payload."
|
"value": "An invalid memory access when handling the ProtocolIE_ID field of\u00a0E-RAB Modify Request messages in Athonet vEPC MME v11.4.0\u00a0allows attackers to cause a Denial of Service (DoS) to the cellular\u00a0network by repeatedly initiating connections and sending a crafted\u00a0payload."
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"lang": "es",
|
"lang": "es",
|
||||||
@ -17,6 +17,26 @@
|
|||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
"cvssMetricV31": [
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "security-alert@hpe.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||||
|
"baseScore": 5.9,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "HIGH",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.2,
|
||||||
|
"impactScore": 3.6
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
@ -52,6 +72,10 @@
|
|||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04780en_us&docLocale=en_US",
|
||||||
|
"source": "security-alert@hpe.com"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"url": "http://athonet.com",
|
"url": "http://athonet.com",
|
||||||
"source": "cve@mitre.org"
|
"source": "cve@mitre.org"
|
||||||
|
@ -1,14 +1,14 @@
|
|||||||
{
|
{
|
||||||
"id": "CVE-2024-24455",
|
"id": "CVE-2024-24455",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "security-alert@hpe.com",
|
||||||
"published": "2024-11-15T20:15:19.403",
|
"published": "2024-11-15T20:15:19.403",
|
||||||
"lastModified": "2024-11-18T17:11:56.587",
|
"lastModified": "2025-03-31T21:15:44.193",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "An invalid memory access when handling a UE Context Release message containing an invalid UE identifier in Athonet vEPC MME v11.4.0 allows attackers to cause a Denial of Service (DoS) to the cellular network by repeatedly initiating connections and sending a crafted payload."
|
"value": "An invalid memory access when handling a UE Context Release message\u00a0containing an invalid UE identifier in Athonet vEPC MME v11.4.0 allows\u00a0attackers to cause a Denial of Service (DoS) to the cellular network\u00a0by repeatedly initiating connections and sending a crafted payload."
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"lang": "es",
|
"lang": "es",
|
||||||
@ -17,6 +17,26 @@
|
|||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
"cvssMetricV31": [
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "security-alert@hpe.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||||
|
"baseScore": 5.9,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "HIGH",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.2,
|
||||||
|
"impactScore": 3.6
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
@ -52,6 +72,10 @@
|
|||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04780en_us&docLocale=en_US",
|
||||||
|
"source": "security-alert@hpe.com"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"url": "http://athonet.com",
|
"url": "http://athonet.com",
|
||||||
"source": "cve@mitre.org"
|
"source": "cve@mitre.org"
|
||||||
|
44
CVE-2024/CVE-2024-244xx/CVE-2024-24456.json
Normal file
44
CVE-2024/CVE-2024-244xx/CVE-2024-24456.json
Normal file
@ -0,0 +1,44 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-24456",
|
||||||
|
"sourceIdentifier": "security-alert@hpe.com",
|
||||||
|
"published": "2025-03-31T21:15:44.513",
|
||||||
|
"lastModified": "2025-03-31T21:15:44.513",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "An E-RAB Release Command packet containing a malformed NAS PDU\u00a0will cause the Athonet MME to immediately crash, potentially due to a\u00a0buffer overflow."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "security-alert@hpe.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||||
|
"baseScore": 5.9,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "HIGH",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.2,
|
||||||
|
"impactScore": 3.6
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04780en_us&docLocale=en_US",
|
||||||
|
"source": "security-alert@hpe.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
@ -1,14 +1,14 @@
|
|||||||
{
|
{
|
||||||
"id": "CVE-2024-24457",
|
"id": "CVE-2024-24457",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "security-alert@hpe.com",
|
||||||
"published": "2024-11-15T20:15:19.510",
|
"published": "2024-11-15T20:15:19.510",
|
||||||
"lastModified": "2024-11-18T17:11:56.587",
|
"lastModified": "2025-03-31T21:15:44.697",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "An invalid memory access when handling the ProtocolIE_ID field of E-RAB Setup List Context SURes messages in Athonet vEPC MME v11.4.0 allows attackers to cause a Denial of Service (DoS) to the cellular network by repeatedly initiating connections and sending a crafted payload."
|
"value": "An invalid memory access when handling the ProtocolIE_ID field of E-RAB\u00a0Setup List Context SURes messages in Athonet vEPC MME v11.4.0 allows\u00a0attackers to cause a Denial of Service (DoS) to the cellular network by\u00a0repeatedly initiating connections and sending a crafted payload."
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"lang": "es",
|
"lang": "es",
|
||||||
@ -17,6 +17,26 @@
|
|||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
"cvssMetricV31": [
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "security-alert@hpe.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||||
|
"baseScore": 5.9,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "HIGH",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.2,
|
||||||
|
"impactScore": 3.6
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
@ -52,6 +72,10 @@
|
|||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04780en_us&docLocale=en_US",
|
||||||
|
"source": "security-alert@hpe.com"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"url": "http://athonet.com",
|
"url": "http://athonet.com",
|
||||||
"source": "cve@mitre.org"
|
"source": "cve@mitre.org"
|
||||||
|
@ -1,14 +1,14 @@
|
|||||||
{
|
{
|
||||||
"id": "CVE-2024-24458",
|
"id": "CVE-2024-24458",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "security-alert@hpe.com",
|
||||||
"published": "2024-11-15T20:15:19.610",
|
"published": "2024-11-15T20:15:19.610",
|
||||||
"lastModified": "2024-11-18T17:11:56.587",
|
"lastModified": "2025-03-31T21:15:44.957",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "An invalid memory access when handling the ENB Configuration Transfer messages containing invalid PLMN Identities in Athonet vEPC MME v11.4.0 allows attackers to cause a Denial of Service (DoS) to the cellular network by repeatedly initiating connections and sending a crafted payload."
|
"value": "An invalid memory access when handling the ENB Configuration Transfer\u00a0messages containing invalid PLMN Identities in Athonet vEPC MME\u00a0v11.4.0 allows attackers to cause a Denial of Service (DoS) to the cellular\u00a0network by repeatedly initiating connections and sending a crafted\u00a0payload."
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"lang": "es",
|
"lang": "es",
|
||||||
@ -17,6 +17,26 @@
|
|||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
"cvssMetricV31": [
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "security-alert@hpe.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||||
|
"baseScore": 5.9,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "HIGH",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.2,
|
||||||
|
"impactScore": 3.6
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
@ -52,6 +72,10 @@
|
|||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04780en_us&docLocale=en_US",
|
||||||
|
"source": "security-alert@hpe.com"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"url": "http://athonet.com",
|
"url": "http://athonet.com",
|
||||||
"source": "cve@mitre.org"
|
"source": "cve@mitre.org"
|
||||||
|
@ -1,14 +1,14 @@
|
|||||||
{
|
{
|
||||||
"id": "CVE-2024-24459",
|
"id": "CVE-2024-24459",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "security-alert@hpe.com",
|
||||||
"published": "2024-11-15T20:15:19.703",
|
"published": "2024-11-15T20:15:19.703",
|
||||||
"lastModified": "2024-11-18T17:11:56.587",
|
"lastModified": "2025-03-31T21:15:46.887",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "An invalid memory access when handling the ProtocolIE_ID field of S1Setup Request messages in Athonet vEPC MME v11.4.0 allows attackers to cause a Denial of Service (DoS) to the cellular network by repeatedly initiating connections and sending a crafted payload."
|
"value": "An invalid memory access when handling the ProtocolIE_ID field of\u00a0S1Setup Request messages in Athonet vEPC MME v11.4.0 allows\u00a0attackers to cause a Denial of Service (DoS) to the cellular network by\u00a0repeatedly initiating connections and sending a crafted payload."
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"lang": "es",
|
"lang": "es",
|
||||||
@ -17,6 +17,26 @@
|
|||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
"cvssMetricV31": [
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "security-alert@hpe.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||||
|
"baseScore": 5.9,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "HIGH",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.2,
|
||||||
|
"impactScore": 3.6
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
@ -52,6 +72,10 @@
|
|||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04780en_us&docLocale=en_US",
|
||||||
|
"source": "security-alert@hpe.com"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"url": "http://athonet.com",
|
"url": "http://athonet.com",
|
||||||
"source": "cve@mitre.org"
|
"source": "cve@mitre.org"
|
||||||
|
28
CVE-2024/CVE-2024-548xx/CVE-2024-54802.json
Normal file
28
CVE-2024/CVE-2024-548xx/CVE-2024-54802.json
Normal file
@ -0,0 +1,28 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-54802",
|
||||||
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
|
"published": "2025-03-31T21:15:47.203",
|
||||||
|
"lastModified": "2025-03-31T21:15:47.203",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [
|
||||||
|
{
|
||||||
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
|
"tags": [
|
||||||
|
"unsupported-when-assigned"
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "In Netgear WNR854T 1.5.2 (North America), the UPNP service (/usr/sbin/upnp) is vulnerable to stack-based buffer overflow in the M-SEARCH Host header."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://faultpoint.com/post/2025-03-25-8-cves-on-the-wnr854t-junkyard/#802",
|
||||||
|
"source": "cve@mitre.org"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
28
CVE-2024/CVE-2024-548xx/CVE-2024-54803.json
Normal file
28
CVE-2024/CVE-2024-548xx/CVE-2024-54803.json
Normal file
@ -0,0 +1,28 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-54803",
|
||||||
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
|
"published": "2025-03-31T21:15:47.377",
|
||||||
|
"lastModified": "2025-03-31T21:15:47.377",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [
|
||||||
|
{
|
||||||
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
|
"tags": [
|
||||||
|
"unsupported-when-assigned"
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Netgear WNR854T 1.5.2 (North America) is vulnerable to Command Injection. An attacker can send a specially crafted request to post.cgi, updating the nvram parameter pppoe_peer_mac and forcing a reboot. This will result in command injection."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://faultpoint.com/post/2025-03-25-8-cves-on-the-wnr854t-junkyard/#803",
|
||||||
|
"source": "cve@mitre.org"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
28
CVE-2024/CVE-2024-548xx/CVE-2024-54804.json
Normal file
28
CVE-2024/CVE-2024-548xx/CVE-2024-54804.json
Normal file
@ -0,0 +1,28 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-54804",
|
||||||
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
|
"published": "2025-03-31T21:15:47.560",
|
||||||
|
"lastModified": "2025-03-31T21:15:47.560",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [
|
||||||
|
{
|
||||||
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
|
"tags": [
|
||||||
|
"unsupported-when-assigned"
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Netgear WNR854T 1.5.2 (North America) is vulnerable to Command Injection. An attacker can send a specially crafted request to post.cgi, updating the nvram parameter wan_hostname and forcing a reboot. This will result in command injection."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://faultpoint.com/post/2025-03-25-8-cves-on-the-wnr854t-junkyard/#804",
|
||||||
|
"source": "cve@mitre.org"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
28
CVE-2024/CVE-2024-548xx/CVE-2024-54805.json
Normal file
28
CVE-2024/CVE-2024-548xx/CVE-2024-54805.json
Normal file
@ -0,0 +1,28 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-54805",
|
||||||
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
|
"published": "2025-03-31T21:15:47.737",
|
||||||
|
"lastModified": "2025-03-31T21:15:47.737",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [
|
||||||
|
{
|
||||||
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
|
"tags": [
|
||||||
|
"unsupported-when-assigned"
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Netgear WNR854T 1.5.2 (North America) is vulnerable to Command Injection. An attacker can send a specially crafted request to post.cgi, updating the nvram parameter get_email. After which, they can visit the send_log.cgi endpoint which uses the parameter in a system call to achieve command execution."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://faultpoint.com/post/2025-03-25-8-cves-on-the-wnr854t-junkyard/#805",
|
||||||
|
"source": "cve@mitre.org"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
28
CVE-2024/CVE-2024-548xx/CVE-2024-54806.json
Normal file
28
CVE-2024/CVE-2024-548xx/CVE-2024-54806.json
Normal file
@ -0,0 +1,28 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-54806",
|
||||||
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
|
"published": "2025-03-31T21:15:47.923",
|
||||||
|
"lastModified": "2025-03-31T21:15:47.923",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [
|
||||||
|
{
|
||||||
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
|
"tags": [
|
||||||
|
"unsupported-when-assigned"
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Netgear WNR854T 1.5.2 (North America) is vulnerable to Arbitrary command execution in cmd.cgi which allows for the execution of system commands via the web interface."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://faultpoint.com/post/2025-03-25-8-cves-on-the-wnr854t-junkyard/#806",
|
||||||
|
"source": "cve@mitre.org"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
28
CVE-2024/CVE-2024-548xx/CVE-2024-54807.json
Normal file
28
CVE-2024/CVE-2024-548xx/CVE-2024-54807.json
Normal file
@ -0,0 +1,28 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-54807",
|
||||||
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
|
"published": "2025-03-31T21:15:48.090",
|
||||||
|
"lastModified": "2025-03-31T21:15:48.090",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [
|
||||||
|
{
|
||||||
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
|
"tags": [
|
||||||
|
"unsupported-when-assigned"
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "In Netgear WNR854T 1.5.2 (North America), the UPNP service is vulnerable to command injection in the function addmap_exec which parses the NewInternalClient parameter of the AddPortMapping SOAPAction into a system call without sanitation. An attacker can send a specially crafted SOAPAction request for AddPortMapping via the router's WANIPConn1 service to achieve arbitrary command execution."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://faultpoint.com/post/2025-03-25-8-cves-on-the-wnr854t-junkyard/#807",
|
||||||
|
"source": "cve@mitre.org"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
28
CVE-2024/CVE-2024-548xx/CVE-2024-54808.json
Normal file
28
CVE-2024/CVE-2024-548xx/CVE-2024-54808.json
Normal file
@ -0,0 +1,28 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-54808",
|
||||||
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
|
"published": "2025-03-31T21:15:48.310",
|
||||||
|
"lastModified": "2025-03-31T21:15:48.310",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [
|
||||||
|
{
|
||||||
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
|
"tags": [
|
||||||
|
"unsupported-when-assigned"
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Netgear WNR854T 1.5.2 (North America) contains a stack-based buffer overflow vulnerability in the SetDefaultConnectionService function due to an unconstrained use of sscanf. The vulnerability allows for control of the program counter and can be utilized to achieve arbitrary code execution."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://faultpoint.com/post/2025-03-25-8-cves-on-the-wnr854t-junkyard/#808",
|
||||||
|
"source": "cve@mitre.org"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
28
CVE-2024/CVE-2024-548xx/CVE-2024-54809.json
Normal file
28
CVE-2024/CVE-2024-548xx/CVE-2024-54809.json
Normal file
@ -0,0 +1,28 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-54809",
|
||||||
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
|
"published": "2025-03-31T21:15:48.527",
|
||||||
|
"lastModified": "2025-03-31T21:15:48.527",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [
|
||||||
|
{
|
||||||
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
|
"tags": [
|
||||||
|
"unsupported-when-assigned"
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Netgear Inc WNR854T 1.5.2 (North America) contains a stack-based buffer overflow vulnerability in the parse_st_header function due to use of a request header parameter in a strncpy where size is determined based on the input specified. By sending a specially crafted packet, an attacker can take control of the program counter and hijack control flow of the program to execute arbitrary system commands."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://faultpoint.com/post/2025-03-25-8-cves-on-the-wnr854t-junkyard/#809",
|
||||||
|
"source": "cve@mitre.org"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
64
CVE-2025/CVE-2025-218xx/CVE-2025-21893.json
Normal file
64
CVE-2025/CVE-2025-218xx/CVE-2025-21893.json
Normal file
@ -0,0 +1,64 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2025-21893",
|
||||||
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"published": "2025-03-31T20:15:14.613",
|
||||||
|
"lastModified": "2025-03-31T21:15:49.307",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nkeys: Fix UAF in key_put()\n\nOnce a key's reference count has been reduced to 0, the garbage collector\nthread may destroy it at any time and so key_put() is not allowed to touch\nthe key after that point. The most key_put() is normally allowed to do is\nto touch key_gc_work as that's a static global variable.\n\nHowever, in an effort to speed up the reclamation of quota, this is now\ndone in key_put() once the key's usage is reduced to 0 - but now the code\nis looking at the key after the deadline, which is forbidden.\n\nFix this by using a flag to indicate that a key can be gc'd now rather than\nlooking at the key's refcount in the garbage collector."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"baseScore": 7.8,
|
||||||
|
"baseSeverity": "HIGH",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.8,
|
||||||
|
"impactScore": 5.9
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-416"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/6afe2ea2daec156bd94ad2c5a6f4f4c48240dcd3",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/75845c6c1a64483e9985302793dbf0dfa5f71e32",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/f6a3cf833188e897c97028cd7b926e3f2cb1a8c0",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2025-27167",
|
"id": "CVE-2025-27167",
|
||||||
"sourceIdentifier": "psirt@adobe.com",
|
"sourceIdentifier": "psirt@adobe.com",
|
||||||
"published": "2025-03-11T18:15:34.730",
|
"published": "2025-03-11T18:15:34.730",
|
||||||
"lastModified": "2025-03-11T18:15:34.730",
|
"lastModified": "2025-03-31T20:06:44.963",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -51,10 +51,56 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"configurations": [
|
||||||
{
|
{
|
||||||
"url": "https://helpx.adobe.com/security/products/illustrator/apsb25-17.html",
|
"operator": "AND",
|
||||||
"source": "psirt@adobe.com"
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:adobe:illustrator:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "28.0",
|
||||||
|
"versionEndExcluding": "28.7.5",
|
||||||
|
"matchCriteriaId": "F721B1E0-416E-446E-B55F-01A15D77D6BA"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:adobe:illustrator:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "29.0",
|
||||||
|
"versionEndExcluding": "29.3",
|
||||||
|
"matchCriteriaId": "2B4680F1-0165-4F2D-9795-63C18C7AFE38"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": false,
|
||||||
|
"criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": false,
|
||||||
|
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://helpx.adobe.com/security/products/illustrator/apsb25-17.html",
|
||||||
|
"source": "psirt@adobe.com",
|
||||||
|
"tags": [
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2025-27168",
|
"id": "CVE-2025-27168",
|
||||||
"sourceIdentifier": "psirt@adobe.com",
|
"sourceIdentifier": "psirt@adobe.com",
|
||||||
"published": "2025-03-11T18:15:34.893",
|
"published": "2025-03-11T18:15:34.893",
|
||||||
"lastModified": "2025-03-11T18:15:34.893",
|
"lastModified": "2025-03-31T20:06:08.030",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -49,12 +49,68 @@
|
|||||||
"value": "CWE-121"
|
"value": "CWE-121"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-787"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"operator": "AND",
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:adobe:illustrator:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "28.0",
|
||||||
|
"versionEndExcluding": "28.7.5",
|
||||||
|
"matchCriteriaId": "F721B1E0-416E-446E-B55F-01A15D77D6BA"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:adobe:illustrator:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "29.0",
|
||||||
|
"versionEndExcluding": "29.3",
|
||||||
|
"matchCriteriaId": "2B4680F1-0165-4F2D-9795-63C18C7AFE38"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": false,
|
||||||
|
"criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": false,
|
||||||
|
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://helpx.adobe.com/security/products/illustrator/apsb25-17.html",
|
"url": "https://helpx.adobe.com/security/products/illustrator/apsb25-17.html",
|
||||||
"source": "psirt@adobe.com"
|
"source": "psirt@adobe.com",
|
||||||
|
"tags": [
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2025-27170",
|
"id": "CVE-2025-27170",
|
||||||
"sourceIdentifier": "psirt@adobe.com",
|
"sourceIdentifier": "psirt@adobe.com",
|
||||||
"published": "2025-03-11T18:15:35.227",
|
"published": "2025-03-11T18:15:35.227",
|
||||||
"lastModified": "2025-03-11T18:15:35.227",
|
"lastModified": "2025-03-31T20:02:08.903",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -51,10 +51,56 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"configurations": [
|
||||||
{
|
{
|
||||||
"url": "https://helpx.adobe.com/security/products/illustrator/apsb25-17.html",
|
"operator": "AND",
|
||||||
"source": "psirt@adobe.com"
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:adobe:illustrator:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "28.0",
|
||||||
|
"versionEndExcluding": "28.7.5",
|
||||||
|
"matchCriteriaId": "F721B1E0-416E-446E-B55F-01A15D77D6BA"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:adobe:illustrator:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "29.0",
|
||||||
|
"versionEndExcluding": "29.3",
|
||||||
|
"matchCriteriaId": "2B4680F1-0165-4F2D-9795-63C18C7AFE38"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": false,
|
||||||
|
"criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": false,
|
||||||
|
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://helpx.adobe.com/security/products/illustrator/apsb25-17.html",
|
||||||
|
"source": "psirt@adobe.com",
|
||||||
|
"tags": [
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,20 +2,63 @@
|
|||||||
"id": "CVE-2025-28087",
|
"id": "CVE-2025-28087",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2025-03-28T22:15:17.717",
|
"published": "2025-03-28T22:15:17.717",
|
||||||
"lastModified": "2025-03-28T22:15:17.717",
|
"lastModified": "2025-03-31T21:15:52.970",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Received",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "Sourcecodester Online Exam System 1.0 is vulnerable to SQL Injection via dash.php."
|
"value": "Sourcecodester Online Exam System 1.0 is vulnerable to SQL Injection via dash.php."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "Sourcecodester Online Exam System 1.0 es vulnerable a la inyecci\u00f3n SQL a trav\u00e9s de dash.php."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"baseScore": 9.8,
|
||||||
|
"baseSeverity": "CRITICAL",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 5.9
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-89"
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://www.yuque.com/morysummer/vx41bz/vxhdpdeavzvtvdqq",
|
"url": "https://www.yuque.com/morysummer/vx41bz/vxhdpdeavzvtvdqq",
|
||||||
"source": "cve@mitre.org"
|
"source": "cve@mitre.org"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://www.yuque.com/morysummer/vx41bz/vxhdpdeavzvtvdqq",
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,16 +2,55 @@
|
|||||||
"id": "CVE-2025-28089",
|
"id": "CVE-2025-28089",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2025-03-28T22:15:17.847",
|
"published": "2025-03-28T22:15:17.847",
|
||||||
"lastModified": "2025-03-28T22:15:17.847",
|
"lastModified": "2025-03-31T21:15:53.133",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Received",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "maccms10 v2025.1000.4047 is vulnerable to Server-Side Request Forgery (SSRF) via the Scheduled Task function."
|
"value": "maccms10 v2025.1000.4047 is vulnerable to Server-Side Request Forgery (SSRF) via the Scheduled Task function."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "maccms10 v2025.1000.4047 es vulnerable a Server-Side Request Forgery (SSRF) a trav\u00e9s de la funci\u00f3n de tarea programada."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
|
||||||
|
"baseScore": 9.1,
|
||||||
|
"baseSeverity": "CRITICAL",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "NONE"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 5.2
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-918"
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/magicblack/maccms10/releases/tag/v2025.1000.4047",
|
"url": "https://github.com/magicblack/maccms10/releases/tag/v2025.1000.4047",
|
||||||
@ -20,6 +59,10 @@
|
|||||||
{
|
{
|
||||||
"url": "https://www.yuque.com/morysummer/vx41bz/wzer7qxh0vwrf6zq",
|
"url": "https://www.yuque.com/morysummer/vx41bz/wzer7qxh0vwrf6zq",
|
||||||
"source": "cve@mitre.org"
|
"source": "cve@mitre.org"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://www.yuque.com/morysummer/vx41bz/wzer7qxh0vwrf6zq",
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,20 +2,63 @@
|
|||||||
"id": "CVE-2025-28090",
|
"id": "CVE-2025-28090",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2025-03-28T22:15:17.980",
|
"published": "2025-03-28T22:15:17.980",
|
||||||
"lastModified": "2025-03-28T22:15:17.980",
|
"lastModified": "2025-03-31T20:15:14.967",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Received",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "maccms10 v2025.1000.4047 is vulnerable to Server-Side Request Forgery (SSRF) in the Collection Custom Interface feature."
|
"value": "maccms10 v2025.1000.4047 is vulnerable to Server-Side Request Forgery (SSRF) in the Collection Custom Interface feature."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "maccms10 v2025.1000.4047 es vulnerable a Server-Side Request Forgery (SSRF) en la funci\u00f3n de interfaz personalizada de colecci\u00f3n."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
|
||||||
|
"baseScore": 9.1,
|
||||||
|
"baseSeverity": "CRITICAL",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "NONE"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 5.2
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-918"
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://www.yuque.com/morysummer/vx41bz/xo5w1euakvtgenex",
|
"url": "https://www.yuque.com/morysummer/vx41bz/xo5w1euakvtgenex",
|
||||||
"source": "cve@mitre.org"
|
"source": "cve@mitre.org"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://www.yuque.com/morysummer/vx41bz/xo5w1euakvtgenex",
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,20 +2,63 @@
|
|||||||
"id": "CVE-2025-28091",
|
"id": "CVE-2025-28091",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2025-03-28T22:15:18.107",
|
"published": "2025-03-28T22:15:18.107",
|
||||||
"lastModified": "2025-03-28T22:15:18.107",
|
"lastModified": "2025-03-31T21:15:53.287",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Received",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "maccms10 v2025.1000.4047 has a Server-Side Request Forgery (SSRF) vulnerability via Add Article."
|
"value": "maccms10 v2025.1000.4047 has a Server-Side Request Forgery (SSRF) vulnerability via Add Article."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "maccms10 v2025.1000.4047 tiene una vulnerabilidad de Server-Side Request Forgery (SSRF) a trav\u00e9s de agregar art\u00edculo."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
|
||||||
|
"baseScore": 9.1,
|
||||||
|
"baseSeverity": "CRITICAL",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "NONE"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 5.2
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-918"
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://www.yuque.com/morysummer/vx41bz/ax55rxv4u3our1ic",
|
"url": "https://www.yuque.com/morysummer/vx41bz/ax55rxv4u3our1ic",
|
||||||
"source": "cve@mitre.org"
|
"source": "cve@mitre.org"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://www.yuque.com/morysummer/vx41bz/xo5w1euakvtgenex",
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,20 +2,63 @@
|
|||||||
"id": "CVE-2025-28092",
|
"id": "CVE-2025-28092",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2025-03-28T22:15:18.237",
|
"published": "2025-03-28T22:15:18.237",
|
||||||
"lastModified": "2025-03-28T22:15:18.237",
|
"lastModified": "2025-03-31T20:15:15.203",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Received",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "ShopXO v6.4.0 is vulnerable to Server-Side Request Forgery (SSRF) via image upload function."
|
"value": "ShopXO v6.4.0 is vulnerable to Server-Side Request Forgery (SSRF) via image upload function."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "ShopXO v6.4.0 es vulnerable a Server-Side Request Forgery (SSRF) a trav\u00e9s de la funci\u00f3n de carga de im\u00e1genes."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||||
|
"baseScore": 6.3,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "LOW"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 3.4
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-918"
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://www.yuque.com/morysummer/vx41bz/stggvmlxs9ewqlvu",
|
"url": "https://www.yuque.com/morysummer/vx41bz/stggvmlxs9ewqlvu",
|
||||||
"source": "cve@mitre.org"
|
"source": "cve@mitre.org"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://www.yuque.com/morysummer/vx41bz/stggvmlxs9ewqlvu",
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,20 +2,63 @@
|
|||||||
"id": "CVE-2025-28093",
|
"id": "CVE-2025-28093",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2025-03-28T22:15:18.410",
|
"published": "2025-03-28T22:15:18.410",
|
||||||
"lastModified": "2025-03-28T22:15:18.410",
|
"lastModified": "2025-03-31T20:15:15.363",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Received",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "ShopXO v6.4.0 is vulnerable to Server-Side Request Forgery (SSRF) in Email Settings."
|
"value": "ShopXO v6.4.0 is vulnerable to Server-Side Request Forgery (SSRF) in Email Settings."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "ShopXO v6.4.0 es vulnerable a Server-Side Request Forgery (SSRF) en la configuraci\u00f3n de correo electr\u00f3nico."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||||
|
"baseScore": 6.3,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "LOW"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 3.4
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-918"
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://www.yuque.com/morysummer/vx41bz/he2hb8ic8an8h07f",
|
"url": "https://www.yuque.com/morysummer/vx41bz/he2hb8ic8an8h07f",
|
||||||
"source": "cve@mitre.org"
|
"source": "cve@mitre.org"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://www.yuque.com/morysummer/vx41bz/he2hb8ic8an8h07f",
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,13 +2,13 @@
|
|||||||
"id": "CVE-2025-30095",
|
"id": "CVE-2025-30095",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2025-03-31T15:15:44.843",
|
"published": "2025-03-31T15:15:44.843",
|
||||||
"lastModified": "2025-03-31T15:15:44.843",
|
"lastModified": "2025-03-31T21:15:53.653",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Received",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "VyOS 1.3 through 1.5 or any Debian-based system using dropbear in combination with live-build has the same Dropbear private host keys across different installations. Thus, an attacker can conduct active man-in-the-middle attacks against SSH connections if Dropbear is enabled as the SSH daemon. I n VyOS, this is not the default configuration for the system SSH daemon, but is for the console service. To mitigate this, one can run \"rm -f /etc/dropbear/*key*\" and/or \"rm -f /etc/dropbear-initramfs/*key*\" and then dropbearkey -t rsa -s 4096 -f /etc/dropbear_rsa_host_key and reload the service or reboot the system before using Dropbear as the SSH daemon (this clears out all keys mistakenly built into the release image) or update to the latest version of VyOS 1.4 or 1.5. Note that this vulnerability is not unique to VyOS and may appear in any Debian-based Linux distribution that uses Dropbear in combination with live-build, which has a safeguard against this behavior in OpenSSH but no equivalent one for Dropbear."
|
"value": "VyOS 1.3 through 1.5 (fixed in 1.4.2) or any Debian-based system using dropbear in combination with live-build has the same Dropbear private host keys across different installations. Thus, an attacker can conduct active man-in-the-middle attacks against SSH connections if Dropbear is enabled as the SSH daemon. I n VyOS, this is not the default configuration for the system SSH daemon, but is for the console service. To mitigate this, one can run \"rm -f /etc/dropbear/*key*\" and/or \"rm -f /etc/dropbear-initramfs/*key*\" and then dropbearkey -t rsa -s 4096 -f /etc/dropbear_rsa_host_key and reload the service or reboot the system before using Dropbear as the SSH daemon (this clears out all keys mistakenly built into the release image) or update to the latest version of VyOS 1.4 or 1.5. Note that this vulnerability is not unique to VyOS and may appear in any Debian-based Linux distribution that uses Dropbear in combination with live-build, which has a safeguard against this behavior in OpenSSH but no equivalent one for Dropbear."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {},
|
||||||
|
141
CVE-2025/CVE-2025-30xx/CVE-2025-3009.json
Normal file
141
CVE-2025/CVE-2025-30xx/CVE-2025-3009.json
Normal file
@ -0,0 +1,141 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2025-3009",
|
||||||
|
"sourceIdentifier": "cna@vuldb.com",
|
||||||
|
"published": "2025-03-31T20:15:15.850",
|
||||||
|
"lastModified": "2025-03-31T20:15:15.850",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "A vulnerability classified as critical was found in Jinher Network OA C6. Affected by this vulnerability is an unknown functionality of the file /C6/JHSoft.Web.NetDisk/NetDiskProperty.aspx. The manipulation of the argument ID leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV40": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "4.0",
|
||||||
|
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||||
|
"baseScore": 5.3,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"attackRequirements": "NONE",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"vulnConfidentialityImpact": "LOW",
|
||||||
|
"vulnIntegrityImpact": "LOW",
|
||||||
|
"vulnAvailabilityImpact": "LOW",
|
||||||
|
"subConfidentialityImpact": "NONE",
|
||||||
|
"subIntegrityImpact": "NONE",
|
||||||
|
"subAvailabilityImpact": "NONE",
|
||||||
|
"exploitMaturity": "NOT_DEFINED",
|
||||||
|
"confidentialityRequirement": "NOT_DEFINED",
|
||||||
|
"integrityRequirement": "NOT_DEFINED",
|
||||||
|
"availabilityRequirement": "NOT_DEFINED",
|
||||||
|
"modifiedAttackVector": "NOT_DEFINED",
|
||||||
|
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||||
|
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||||
|
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||||
|
"modifiedUserInteraction": "NOT_DEFINED",
|
||||||
|
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||||
|
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||||
|
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||||
|
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||||
|
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||||
|
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||||
|
"Safety": "NOT_DEFINED",
|
||||||
|
"Automatable": "NOT_DEFINED",
|
||||||
|
"Recovery": "NOT_DEFINED",
|
||||||
|
"valueDensity": "NOT_DEFINED",
|
||||||
|
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||||
|
"providerUrgency": "NOT_DEFINED"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||||
|
"baseScore": 6.3,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "LOW"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 3.4
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"cvssMetricV2": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "2.0",
|
||||||
|
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
||||||
|
"baseScore": 6.5,
|
||||||
|
"accessVector": "NETWORK",
|
||||||
|
"accessComplexity": "LOW",
|
||||||
|
"authentication": "SINGLE",
|
||||||
|
"confidentialityImpact": "PARTIAL",
|
||||||
|
"integrityImpact": "PARTIAL",
|
||||||
|
"availabilityImpact": "PARTIAL"
|
||||||
|
},
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"exploitabilityScore": 8.0,
|
||||||
|
"impactScore": 6.4,
|
||||||
|
"acInsufInfo": false,
|
||||||
|
"obtainAllPrivilege": false,
|
||||||
|
"obtainUserPrivilege": false,
|
||||||
|
"obtainOtherPrivilege": false,
|
||||||
|
"userInteractionRequired": false
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-74"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-89"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/Myoung-SA/cve/issues/1",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?ctiid.302059",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?id.302059",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?submit.524554",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
145
CVE-2025/CVE-2025-30xx/CVE-2025-3010.json
Normal file
145
CVE-2025/CVE-2025-30xx/CVE-2025-3010.json
Normal file
@ -0,0 +1,145 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2025-3010",
|
||||||
|
"sourceIdentifier": "cna@vuldb.com",
|
||||||
|
"published": "2025-03-31T20:15:16.023",
|
||||||
|
"lastModified": "2025-03-31T20:15:16.023",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "A vulnerability, which was classified as problematic, has been found in Khronos Group glslang 15.1.0. Affected by this issue is the function glslang::TIntermediate::isConversionAllowed of the file glslang/MachineIndependent/Intermediate.cpp. The manipulation leads to null pointer dereference. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV40": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "4.0",
|
||||||
|
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||||
|
"baseScore": 4.8,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"attackRequirements": "NONE",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"vulnConfidentialityImpact": "NONE",
|
||||||
|
"vulnIntegrityImpact": "NONE",
|
||||||
|
"vulnAvailabilityImpact": "LOW",
|
||||||
|
"subConfidentialityImpact": "NONE",
|
||||||
|
"subIntegrityImpact": "NONE",
|
||||||
|
"subAvailabilityImpact": "NONE",
|
||||||
|
"exploitMaturity": "NOT_DEFINED",
|
||||||
|
"confidentialityRequirement": "NOT_DEFINED",
|
||||||
|
"integrityRequirement": "NOT_DEFINED",
|
||||||
|
"availabilityRequirement": "NOT_DEFINED",
|
||||||
|
"modifiedAttackVector": "NOT_DEFINED",
|
||||||
|
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||||
|
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||||
|
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||||
|
"modifiedUserInteraction": "NOT_DEFINED",
|
||||||
|
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||||
|
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||||
|
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||||
|
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||||
|
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||||
|
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||||
|
"Safety": "NOT_DEFINED",
|
||||||
|
"Automatable": "NOT_DEFINED",
|
||||||
|
"Recovery": "NOT_DEFINED",
|
||||||
|
"valueDensity": "NOT_DEFINED",
|
||||||
|
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||||
|
"providerUrgency": "NOT_DEFINED"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
|
||||||
|
"baseScore": 3.3,
|
||||||
|
"baseSeverity": "LOW",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "LOW"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.8,
|
||||||
|
"impactScore": 1.4
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"cvssMetricV2": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "2.0",
|
||||||
|
"vectorString": "AV:L/AC:L/Au:S/C:N/I:N/A:P",
|
||||||
|
"baseScore": 1.7,
|
||||||
|
"accessVector": "LOCAL",
|
||||||
|
"accessComplexity": "LOW",
|
||||||
|
"authentication": "SINGLE",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "PARTIAL"
|
||||||
|
},
|
||||||
|
"baseSeverity": "LOW",
|
||||||
|
"exploitabilityScore": 3.1,
|
||||||
|
"impactScore": 2.9,
|
||||||
|
"acInsufInfo": false,
|
||||||
|
"obtainAllPrivilege": false,
|
||||||
|
"obtainUserPrivilege": false,
|
||||||
|
"obtainOtherPrivilege": false,
|
||||||
|
"userInteractionRequired": false
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-404"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-476"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/KhronosGroup/glslang/issues/3903",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/KhronosGroup/glslang/issues/3903#issue-2927492534",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?ctiid.302060",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?id.302060",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?submit.524561",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
153
CVE-2025/CVE-2025-30xx/CVE-2025-3015.json
Normal file
153
CVE-2025/CVE-2025-30xx/CVE-2025-3015.json
Normal file
@ -0,0 +1,153 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2025-3015",
|
||||||
|
"sourceIdentifier": "cna@vuldb.com",
|
||||||
|
"published": "2025-03-31T21:15:53.757",
|
||||||
|
"lastModified": "2025-03-31T21:15:53.757",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "A vulnerability classified as critical has been found in Open Asset Import Library Assimp 5.4.3. This affects the function Assimp::ASEImporter::BuildUniqueRepresentation of the file code/AssetLib/ASE/ASELoader.cpp of the component ASE File Handler. The manipulation of the argument mIndices leads to out-of-bounds read. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 6.0 is able to address this issue. The patch is named 7c705fde418d68cca4e8eff56be01b2617b0d6fe. It is recommended to apply a patch to fix this issue."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV40": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "4.0",
|
||||||
|
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||||
|
"baseScore": 5.3,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"attackRequirements": "NONE",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "PASSIVE",
|
||||||
|
"vulnConfidentialityImpact": "LOW",
|
||||||
|
"vulnIntegrityImpact": "LOW",
|
||||||
|
"vulnAvailabilityImpact": "LOW",
|
||||||
|
"subConfidentialityImpact": "NONE",
|
||||||
|
"subIntegrityImpact": "NONE",
|
||||||
|
"subAvailabilityImpact": "NONE",
|
||||||
|
"exploitMaturity": "NOT_DEFINED",
|
||||||
|
"confidentialityRequirement": "NOT_DEFINED",
|
||||||
|
"integrityRequirement": "NOT_DEFINED",
|
||||||
|
"availabilityRequirement": "NOT_DEFINED",
|
||||||
|
"modifiedAttackVector": "NOT_DEFINED",
|
||||||
|
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||||
|
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||||
|
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||||
|
"modifiedUserInteraction": "NOT_DEFINED",
|
||||||
|
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||||
|
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||||
|
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||||
|
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||||
|
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||||
|
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||||
|
"Safety": "NOT_DEFINED",
|
||||||
|
"Automatable": "NOT_DEFINED",
|
||||||
|
"Recovery": "NOT_DEFINED",
|
||||||
|
"valueDensity": "NOT_DEFINED",
|
||||||
|
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||||
|
"providerUrgency": "NOT_DEFINED"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
|
||||||
|
"baseScore": 6.3,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "LOW"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 3.4
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"cvssMetricV2": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "2.0",
|
||||||
|
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||||||
|
"baseScore": 7.5,
|
||||||
|
"accessVector": "NETWORK",
|
||||||
|
"accessComplexity": "LOW",
|
||||||
|
"authentication": "NONE",
|
||||||
|
"confidentialityImpact": "PARTIAL",
|
||||||
|
"integrityImpact": "PARTIAL",
|
||||||
|
"availabilityImpact": "PARTIAL"
|
||||||
|
},
|
||||||
|
"baseSeverity": "HIGH",
|
||||||
|
"exploitabilityScore": 10.0,
|
||||||
|
"impactScore": 6.4,
|
||||||
|
"acInsufInfo": false,
|
||||||
|
"obtainAllPrivilege": false,
|
||||||
|
"obtainUserPrivilege": false,
|
||||||
|
"obtainOtherPrivilege": false,
|
||||||
|
"userInteractionRequired": false
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-119"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-125"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/assimp/assimp/commit/7c705fde418d68cca4e8eff56be01b2617b0d6fe",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/assimp/assimp/issues/6021",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/assimp/assimp/issues/6021#issue-2877378829",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/assimp/assimp/pull/6045",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?ctiid.302067",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?id.302067",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?submit.524589",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
149
CVE-2025/CVE-2025-30xx/CVE-2025-3016.json
Normal file
149
CVE-2025/CVE-2025-30xx/CVE-2025-3016.json
Normal file
@ -0,0 +1,149 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2025-3016",
|
||||||
|
"sourceIdentifier": "cna@vuldb.com",
|
||||||
|
"published": "2025-03-31T21:15:53.940",
|
||||||
|
"lastModified": "2025-03-31T21:15:53.940",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "A vulnerability classified as problematic was found in Open Asset Import Library Assimp 5.4.3. This vulnerability affects the function Assimp::MDLImporter::ParseTextureColorData of the file code/AssetLib/MDL/MDLMaterialLoader.cpp of the component MDL File Handler. The manipulation of the argument mWidth/mHeight leads to resource consumption. The attack can be initiated remotely. Upgrading to version 6.0 is able to address this issue. The name of the patch is 5d2a7482312db2e866439a8c05a07ce1e718bed1. It is recommended to apply a patch to fix this issue."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV40": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "4.0",
|
||||||
|
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||||
|
"baseScore": 5.3,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"attackRequirements": "NONE",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "PASSIVE",
|
||||||
|
"vulnConfidentialityImpact": "NONE",
|
||||||
|
"vulnIntegrityImpact": "NONE",
|
||||||
|
"vulnAvailabilityImpact": "LOW",
|
||||||
|
"subConfidentialityImpact": "NONE",
|
||||||
|
"subIntegrityImpact": "NONE",
|
||||||
|
"subAvailabilityImpact": "NONE",
|
||||||
|
"exploitMaturity": "NOT_DEFINED",
|
||||||
|
"confidentialityRequirement": "NOT_DEFINED",
|
||||||
|
"integrityRequirement": "NOT_DEFINED",
|
||||||
|
"availabilityRequirement": "NOT_DEFINED",
|
||||||
|
"modifiedAttackVector": "NOT_DEFINED",
|
||||||
|
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||||
|
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||||
|
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||||
|
"modifiedUserInteraction": "NOT_DEFINED",
|
||||||
|
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||||
|
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||||
|
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||||
|
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||||
|
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||||
|
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||||
|
"Safety": "NOT_DEFINED",
|
||||||
|
"Automatable": "NOT_DEFINED",
|
||||||
|
"Recovery": "NOT_DEFINED",
|
||||||
|
"valueDensity": "NOT_DEFINED",
|
||||||
|
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||||
|
"providerUrgency": "NOT_DEFINED"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
|
||||||
|
"baseScore": 4.3,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "LOW"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 1.4
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"cvssMetricV2": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "2.0",
|
||||||
|
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
|
||||||
|
"baseScore": 5.0,
|
||||||
|
"accessVector": "NETWORK",
|
||||||
|
"accessComplexity": "LOW",
|
||||||
|
"authentication": "NONE",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "PARTIAL"
|
||||||
|
},
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"exploitabilityScore": 10.0,
|
||||||
|
"impactScore": 2.9,
|
||||||
|
"acInsufInfo": false,
|
||||||
|
"obtainAllPrivilege": false,
|
||||||
|
"obtainUserPrivilege": false,
|
||||||
|
"obtainOtherPrivilege": false,
|
||||||
|
"userInteractionRequired": false
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-400"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-404"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/assimp/assimp/commit/5d2a7482312db2e866439a8c05a07ce1e718bed1",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/assimp/assimp/issues/6022",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/assimp/assimp/pull/6046",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?ctiid.302068",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?id.302068",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?submit.524593",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
96
CVE-2025/CVE-2025-311xx/CVE-2025-31123.json
Normal file
96
CVE-2025/CVE-2025-311xx/CVE-2025-31123.json
Normal file
@ -0,0 +1,96 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2025-31123",
|
||||||
|
"sourceIdentifier": "security-advisories@github.com",
|
||||||
|
"published": "2025-03-31T20:15:15.547",
|
||||||
|
"lastModified": "2025-03-31T20:15:15.547",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Zitadel is open-source identity infrastructure software. A vulnerability existed where expired keys can be used to retrieve tokens. Specifically, ZITADEL fails to properly check the expiration date of the JWT key when used for Authorization Grants. This allows an attacker with an expired key to obtain valid access tokens. This vulnerability does not affect the use of JWT Profile for OAuth 2.0 Client Authentication on the Token and Introspection endpoints, which correctly reject expired keys. This vulnerability is fixed in 2.71.6, 2.70.8, 2.69.9, 2.68.9, 2.67.13, 2.66.16, 2.65.7, 2.64.6, and 2.63.9."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "security-advisories@github.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N",
|
||||||
|
"baseScore": 8.7,
|
||||||
|
"baseSeverity": "HIGH",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "HIGH",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "NONE"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.3,
|
||||||
|
"impactScore": 5.8
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "security-advisories@github.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-324"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/zitadel/zitadel/commit/315503beabd679f2e6aec0c004f0f9d2f5b53ed3",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/zitadel/zitadel/releases/tag/v2.63.9",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/zitadel/zitadel/releases/tag/v2.64.6",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/zitadel/zitadel/releases/tag/v2.65.7",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/zitadel/zitadel/releases/tag/v2.66.16",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/zitadel/zitadel/releases/tag/v2.67.13",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/zitadel/zitadel/releases/tag/v2.68.9",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/zitadel/zitadel/releases/tag/v2.69.9",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/zitadel/zitadel/releases/tag/v2.70.8",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/zitadel/zitadel/releases/tag/v2.71.6",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/zitadel/zitadel/security/advisories/GHSA-h3q7-347g-qwhf",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
104
CVE-2025/CVE-2025-311xx/CVE-2025-31124.json
Normal file
104
CVE-2025/CVE-2025-311xx/CVE-2025-31124.json
Normal file
@ -0,0 +1,104 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2025-31124",
|
||||||
|
"sourceIdentifier": "security-advisories@github.com",
|
||||||
|
"published": "2025-03-31T20:15:15.707",
|
||||||
|
"lastModified": "2025-03-31T20:15:15.707",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Zitadel is open-source identity infrastructure software. ZITADEL administrators can enable a setting called \"Ignoring unknown usernames\" which helps mitigate attacks that try to guess/enumerate usernames. If enabled, ZITADEL will show the password prompt even if the user doesn't exist and report \"Username or Password invalid\". While the setting was correctly respected during the login flow, the user's username was normalized leading to a disclosure of the user's existence. This vulnerability is fixed in 2.71.6, 2.70.8, 2.69.9, 2.68.9, 2.67.13, 2.66.16, 2.65.7, 2.64.6, and 2.63.9."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "security-advisories@github.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||||||
|
"baseScore": 5.3,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "NONE"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 1.4
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "security-advisories@github.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-200"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-203"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-204"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/zitadel/zitadel/commit/14de8ecac2afafee4975ed7ac26f3ca4a2b0f82c",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/zitadel/zitadel/releases/tag/v2.63.9",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/zitadel/zitadel/releases/tag/v2.64.6",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/zitadel/zitadel/releases/tag/v2.65.7",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/zitadel/zitadel/releases/tag/v2.66.16",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/zitadel/zitadel/releases/tag/v2.67.13",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/zitadel/zitadel/releases/tag/v2.68.9",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/zitadel/zitadel/releases/tag/v2.69.9",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/zitadel/zitadel/releases/tag/v2.70.8",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/zitadel/zitadel/releases/tag/v2.71.6",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/zitadel/zitadel/security/advisories/GHSA-67m4-8g4w-633q",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
77
README.md
77
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
|||||||
### Last Repository Update
|
### Last Repository Update
|
||||||
|
|
||||||
```plain
|
```plain
|
||||||
2025-03-31T20:00:19.638931+00:00
|
2025-03-31T22:00:19.882734+00:00
|
||||||
```
|
```
|
||||||
|
|
||||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||||
|
|
||||||
```plain
|
```plain
|
||||||
2025-03-31T19:58:57.527000+00:00
|
2025-03-31T21:15:53.940000+00:00
|
||||||
```
|
```
|
||||||
|
|
||||||
### Last Data Feed Release
|
### Last Data Feed Release
|
||||||
@ -33,51 +33,54 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
|||||||
### Total Number of included CVEs
|
### Total Number of included CVEs
|
||||||
|
|
||||||
```plain
|
```plain
|
||||||
287527
|
287543
|
||||||
```
|
```
|
||||||
|
|
||||||
### CVEs added in the last Commit
|
### CVEs added in the last Commit
|
||||||
|
|
||||||
Recently added CVEs: `7`
|
Recently added CVEs: `16`
|
||||||
|
|
||||||
- [CVE-2025-29908](CVE-2025/CVE-2025-299xx/CVE-2025-29908.json) (`2025-03-31T19:15:40.367`)
|
- [CVE-2024-24456](CVE-2024/CVE-2024-244xx/CVE-2024-24456.json) (`2025-03-31T21:15:44.513`)
|
||||||
- [CVE-2025-3005](CVE-2025/CVE-2025-30xx/CVE-2025-3005.json) (`2025-03-31T18:15:34.180`)
|
- [CVE-2024-54802](CVE-2024/CVE-2024-548xx/CVE-2024-54802.json) (`2025-03-31T21:15:47.203`)
|
||||||
- [CVE-2025-3006](CVE-2025/CVE-2025-30xx/CVE-2025-3006.json) (`2025-03-31T18:15:34.413`)
|
- [CVE-2024-54803](CVE-2024/CVE-2024-548xx/CVE-2024-54803.json) (`2025-03-31T21:15:47.377`)
|
||||||
- [CVE-2025-3007](CVE-2025/CVE-2025-30xx/CVE-2025-3007.json) (`2025-03-31T19:15:43.860`)
|
- [CVE-2024-54804](CVE-2024/CVE-2024-548xx/CVE-2024-54804.json) (`2025-03-31T21:15:47.560`)
|
||||||
- [CVE-2025-3008](CVE-2025/CVE-2025-30xx/CVE-2025-3008.json) (`2025-03-31T19:15:44.060`)
|
- [CVE-2024-54805](CVE-2024/CVE-2024-548xx/CVE-2024-54805.json) (`2025-03-31T21:15:47.737`)
|
||||||
- [CVE-2025-31128](CVE-2025/CVE-2025-311xx/CVE-2025-31128.json) (`2025-03-31T19:15:42.883`)
|
- [CVE-2024-54806](CVE-2024/CVE-2024-548xx/CVE-2024-54806.json) (`2025-03-31T21:15:47.923`)
|
||||||
- [CVE-2025-31129](CVE-2025/CVE-2025-311xx/CVE-2025-31129.json) (`2025-03-31T19:15:43.023`)
|
- [CVE-2024-54807](CVE-2024/CVE-2024-548xx/CVE-2024-54807.json) (`2025-03-31T21:15:48.090`)
|
||||||
|
- [CVE-2024-54808](CVE-2024/CVE-2024-548xx/CVE-2024-54808.json) (`2025-03-31T21:15:48.310`)
|
||||||
|
- [CVE-2024-54809](CVE-2024/CVE-2024-548xx/CVE-2024-54809.json) (`2025-03-31T21:15:48.527`)
|
||||||
|
- [CVE-2025-21893](CVE-2025/CVE-2025-218xx/CVE-2025-21893.json) (`2025-03-31T20:15:14.613`)
|
||||||
|
- [CVE-2025-3009](CVE-2025/CVE-2025-30xx/CVE-2025-3009.json) (`2025-03-31T20:15:15.850`)
|
||||||
|
- [CVE-2025-3010](CVE-2025/CVE-2025-30xx/CVE-2025-3010.json) (`2025-03-31T20:15:16.023`)
|
||||||
|
- [CVE-2025-3015](CVE-2025/CVE-2025-30xx/CVE-2025-3015.json) (`2025-03-31T21:15:53.757`)
|
||||||
|
- [CVE-2025-3016](CVE-2025/CVE-2025-30xx/CVE-2025-3016.json) (`2025-03-31T21:15:53.940`)
|
||||||
|
- [CVE-2025-31123](CVE-2025/CVE-2025-311xx/CVE-2025-31123.json) (`2025-03-31T20:15:15.547`)
|
||||||
|
- [CVE-2025-31124](CVE-2025/CVE-2025-311xx/CVE-2025-31124.json) (`2025-03-31T20:15:15.707`)
|
||||||
|
|
||||||
|
|
||||||
### CVEs modified in the last Commit
|
### CVEs modified in the last Commit
|
||||||
|
|
||||||
Recently modified CVEs: `32`
|
Recently modified CVEs: `19`
|
||||||
|
|
||||||
- [CVE-2024-42636](CVE-2024/CVE-2024-426xx/CVE-2024-42636.json) (`2025-03-31T18:49:02.283`)
|
- [CVE-2018-0824](CVE-2018/CVE-2018-08xx/CVE-2018-0824.json) (`2025-03-31T21:03:30.687`)
|
||||||
- [CVE-2024-45528](CVE-2024/CVE-2024-455xx/CVE-2024-45528.json) (`2025-03-31T18:53:04.780`)
|
- [CVE-2019-1069](CVE-2019/CVE-2019-10xx/CVE-2019-1069.json) (`2025-03-31T21:03:16.547`)
|
||||||
- [CVE-2024-46241](CVE-2024/CVE-2024-462xx/CVE-2024-46241.json) (`2025-03-31T19:20:33.810`)
|
- [CVE-2024-24452](CVE-2024/CVE-2024-244xx/CVE-2024-24452.json) (`2025-03-31T21:15:43.370`)
|
||||||
- [CVE-2024-46373](CVE-2024/CVE-2024-463xx/CVE-2024-46373.json) (`2025-03-31T18:53:55.610`)
|
- [CVE-2024-24453](CVE-2024/CVE-2024-244xx/CVE-2024-24453.json) (`2025-03-31T21:15:43.683`)
|
||||||
- [CVE-2024-46470](CVE-2024/CVE-2024-464xx/CVE-2024-46470.json) (`2025-03-31T19:19:17.120`)
|
- [CVE-2024-24454](CVE-2024/CVE-2024-244xx/CVE-2024-24454.json) (`2025-03-31T21:15:43.950`)
|
||||||
- [CVE-2024-46471](CVE-2024/CVE-2024-464xx/CVE-2024-46471.json) (`2025-03-31T19:07:09.867`)
|
- [CVE-2024-24455](CVE-2024/CVE-2024-244xx/CVE-2024-24455.json) (`2025-03-31T21:15:44.193`)
|
||||||
- [CVE-2024-46472](CVE-2024/CVE-2024-464xx/CVE-2024-46472.json) (`2025-03-31T19:02:48.263`)
|
- [CVE-2024-24457](CVE-2024/CVE-2024-244xx/CVE-2024-24457.json) (`2025-03-31T21:15:44.697`)
|
||||||
- [CVE-2024-48807](CVE-2024/CVE-2024-488xx/CVE-2024-48807.json) (`2025-03-31T19:24:10.313`)
|
- [CVE-2024-24458](CVE-2024/CVE-2024-244xx/CVE-2024-24458.json) (`2025-03-31T21:15:44.957`)
|
||||||
- [CVE-2024-49682](CVE-2024/CVE-2024-496xx/CVE-2024-49682.json) (`2025-03-31T18:13:05.940`)
|
- [CVE-2024-24459](CVE-2024/CVE-2024-244xx/CVE-2024-24459.json) (`2025-03-31T21:15:46.887`)
|
||||||
- [CVE-2024-51063](CVE-2024/CVE-2024-510xx/CVE-2024-51063.json) (`2025-03-31T19:26:46.460`)
|
- [CVE-2025-27167](CVE-2025/CVE-2025-271xx/CVE-2025-27167.json) (`2025-03-31T20:06:44.963`)
|
||||||
- [CVE-2024-51064](CVE-2024/CVE-2024-510xx/CVE-2024-51064.json) (`2025-03-31T19:29:12.110`)
|
- [CVE-2025-27168](CVE-2025/CVE-2025-271xx/CVE-2025-27168.json) (`2025-03-31T20:06:08.030`)
|
||||||
- [CVE-2024-51065](CVE-2024/CVE-2024-510xx/CVE-2024-51065.json) (`2025-03-31T19:29:35.613`)
|
- [CVE-2025-27170](CVE-2025/CVE-2025-271xx/CVE-2025-27170.json) (`2025-03-31T20:02:08.903`)
|
||||||
- [CVE-2024-51209](CVE-2024/CVE-2024-512xx/CVE-2024-51209.json) (`2025-03-31T19:32:18.943`)
|
- [CVE-2025-28087](CVE-2025/CVE-2025-280xx/CVE-2025-28087.json) (`2025-03-31T21:15:52.970`)
|
||||||
- [CVE-2024-51938](CVE-2024/CVE-2024-519xx/CVE-2024-51938.json) (`2025-03-31T19:36:04.583`)
|
- [CVE-2025-28089](CVE-2025/CVE-2025-280xx/CVE-2025-28089.json) (`2025-03-31T21:15:53.133`)
|
||||||
- [CVE-2024-6628](CVE-2024/CVE-2024-66xx/CVE-2024-6628.json) (`2025-03-31T19:58:57.527`)
|
- [CVE-2025-28090](CVE-2025/CVE-2025-280xx/CVE-2025-28090.json) (`2025-03-31T20:15:14.967`)
|
||||||
- [CVE-2024-7054](CVE-2024/CVE-2024-70xx/CVE-2024-7054.json) (`2025-03-31T18:27:47.530`)
|
- [CVE-2025-28091](CVE-2025/CVE-2025-280xx/CVE-2025-28091.json) (`2025-03-31T21:15:53.287`)
|
||||||
- [CVE-2024-9037](CVE-2024/CVE-2024-90xx/CVE-2024-9037.json) (`2025-03-31T18:55:16.680`)
|
- [CVE-2025-28092](CVE-2025/CVE-2025-280xx/CVE-2025-28092.json) (`2025-03-31T20:15:15.203`)
|
||||||
- [CVE-2025-25579](CVE-2025/CVE-2025-255xx/CVE-2025-25579.json) (`2025-03-31T18:15:32.783`)
|
- [CVE-2025-28093](CVE-2025/CVE-2025-280xx/CVE-2025-28093.json) (`2025-03-31T20:15:15.363`)
|
||||||
- [CVE-2025-28094](CVE-2025/CVE-2025-280xx/CVE-2025-28094.json) (`2025-03-31T18:15:33.010`)
|
- [CVE-2025-30095](CVE-2025/CVE-2025-300xx/CVE-2025-30095.json) (`2025-03-31T21:15:53.653`)
|
||||||
- [CVE-2025-3002](CVE-2025/CVE-2025-30xx/CVE-2025-3002.json) (`2025-03-31T19:15:43.390`)
|
|
||||||
- [CVE-2025-3004](CVE-2025/CVE-2025-30xx/CVE-2025-3004.json) (`2025-03-31T19:15:43.613`)
|
|
||||||
- [CVE-2025-30149](CVE-2025/CVE-2025-301xx/CVE-2025-30149.json) (`2025-03-31T18:15:33.847`)
|
|
||||||
- [CVE-2025-31116](CVE-2025/CVE-2025-311xx/CVE-2025-31116.json) (`2025-03-31T19:15:42.300`)
|
|
||||||
- [CVE-2025-31117](CVE-2025/CVE-2025-311xx/CVE-2025-31117.json) (`2025-03-31T18:15:33.957`)
|
|
||||||
- [CVE-2025-31125](CVE-2025/CVE-2025-311xx/CVE-2025-31125.json) (`2025-03-31T18:15:34.070`)
|
|
||||||
|
|
||||||
|
|
||||||
## Download and Usage
|
## Download and Usage
|
||||||
|
132
_state.csv
132
_state.csv
@ -110564,7 +110564,7 @@ CVE-2018-0820,0,0,0d28d246602159bbae69441a9f356fa161f12b9bb30a06db8e6a396e670389
|
|||||||
CVE-2018-0821,0,0,9da5b8c5855d35a3774ba7acfe9c4f267a603c2005d06527ca1c0d305854f26a,2024-11-21T03:39:01.413000
|
CVE-2018-0821,0,0,9da5b8c5855d35a3774ba7acfe9c4f267a603c2005d06527ca1c0d305854f26a,2024-11-21T03:39:01.413000
|
||||||
CVE-2018-0822,0,0,4e8a53739e7f732491bfacba0f989f78cfb2074ef938f03f34c70cb053934f10,2024-11-21T03:39:01.550000
|
CVE-2018-0822,0,0,4e8a53739e7f732491bfacba0f989f78cfb2074ef938f03f34c70cb053934f10,2024-11-21T03:39:01.550000
|
||||||
CVE-2018-0823,0,0,a62e9539342440d4b1b221afd7aa1d8f538ad152a377cf869212dad4bfb180fa,2024-11-21T03:39:01.687000
|
CVE-2018-0823,0,0,a62e9539342440d4b1b221afd7aa1d8f538ad152a377cf869212dad4bfb180fa,2024-11-21T03:39:01.687000
|
||||||
CVE-2018-0824,0,0,444ddbb02a2bcdc5d188f482af5887385603ab531d6d3ae85b92d3adb551df38,2024-11-21T03:39:01.810000
|
CVE-2018-0824,0,1,67599506a21e58acf1fe4acef5c1f1ab3bbcb1dccf722c19bbfc9c2417e71e10,2025-03-31T21:03:30.687000
|
||||||
CVE-2018-0825,0,0,c9f1e3ccb9565229fd469bfc786df855c57c05d27edf7b79f090d0916fb2210e,2024-11-21T03:39:02.050000
|
CVE-2018-0825,0,0,c9f1e3ccb9565229fd469bfc786df855c57c05d27edf7b79f090d0916fb2210e,2024-11-21T03:39:02.050000
|
||||||
CVE-2018-0826,0,0,4a5dc634985608590a17dc664fbda049ad4f93710ba694368ed2a4eb57af83ad,2024-11-21T03:39:02.170000
|
CVE-2018-0826,0,0,4a5dc634985608590a17dc664fbda049ad4f93710ba694368ed2a4eb57af83ad,2024-11-21T03:39:02.170000
|
||||||
CVE-2018-0827,0,0,7534672b064dd544978b70aa3d672015d7ec12be6b3072ef2b883ca3a03c11f5,2024-11-21T03:39:02.293000
|
CVE-2018-0827,0,0,7534672b064dd544978b70aa3d672015d7ec12be6b3072ef2b883ca3a03c11f5,2024-11-21T03:39:02.293000
|
||||||
@ -129105,7 +129105,7 @@ CVE-2019-10686,0,0,8891fb7d0b26811d37e7099d3dcc0099d0e61349158441258419819237670
|
|||||||
CVE-2019-10687,0,0,b3a83fd6b88d2188e97fea98f0303467be6b1d1183032c66dc18bda02996a01a,2024-11-21T04:19:45.183000
|
CVE-2019-10687,0,0,b3a83fd6b88d2188e97fea98f0303467be6b1d1183032c66dc18bda02996a01a,2024-11-21T04:19:45.183000
|
||||||
CVE-2019-10688,0,0,49777a8daa483f4f0587226832268b3a1578614d91b416b0cc352c84b13576a5,2024-11-21T04:19:45.347000
|
CVE-2019-10688,0,0,49777a8daa483f4f0587226832268b3a1578614d91b416b0cc352c84b13576a5,2024-11-21T04:19:45.347000
|
||||||
CVE-2019-10689,0,0,1498546decf9b31d102807ecf39e650c4630594e9ed54d965a53c4a5e405f2e7,2024-11-21T04:19:45.497000
|
CVE-2019-10689,0,0,1498546decf9b31d102807ecf39e650c4630594e9ed54d965a53c4a5e405f2e7,2024-11-21T04:19:45.497000
|
||||||
CVE-2019-1069,0,0,9ee89fbc77543b58add425149c59550fcadffbc523c351e17ea578a56da55599,2024-11-21T04:35:57.170000
|
CVE-2019-1069,0,1,adaeeb6547dcebc4b3928f59368a19e9d0e32be95afc963248929c1f577a5e71,2025-03-31T21:03:16.547000
|
||||||
CVE-2019-10691,0,0,3f7279d8ee8a3dd85cb122aafda3e40085f4a346c59e7433b9f7f62478239c9b,2024-11-21T04:19:45.653000
|
CVE-2019-10691,0,0,3f7279d8ee8a3dd85cb122aafda3e40085f4a346c59e7433b9f7f62478239c9b,2024-11-21T04:19:45.653000
|
||||||
CVE-2019-10692,0,0,155d0d82eae9a535c3f6c9585be8eecd2e8c658a757a20098a44283328d01d5b,2024-11-21T04:19:45.820000
|
CVE-2019-10692,0,0,155d0d82eae9a535c3f6c9585be8eecd2e8c658a757a20098a44283328d01d5b,2024-11-21T04:19:45.820000
|
||||||
CVE-2019-10694,0,0,7c79e338cae117eccf25d5c1d8d05413cccc71f35e923c4c7f43c44deb203409,2024-11-21T04:19:45.973000
|
CVE-2019-10694,0,0,7c79e338cae117eccf25d5c1d8d05413cccc71f35e923c4c7f43c44deb203409,2024-11-21T04:19:45.973000
|
||||||
@ -209825,8 +209825,8 @@ CVE-2022-4426,0,0,a3ca9724a11ccc28519507e8204ca711b4d9ece2f4bb42e6e31dc72ebccf3d
|
|||||||
CVE-2022-44260,0,0,1c4c1cc0940e46fec25a6723e5be439eb2f38d024fd9df23b3785ecf3176cf49,2024-11-21T07:27:48.263000
|
CVE-2022-44260,0,0,1c4c1cc0940e46fec25a6723e5be439eb2f38d024fd9df23b3785ecf3176cf49,2024-11-21T07:27:48.263000
|
||||||
CVE-2022-44261,0,0,139de1fca3833524bd36dddfe32a4a9f9bbdc1d973a74d769923015d514359e4,2025-03-24T18:15:15.220000
|
CVE-2022-44261,0,0,139de1fca3833524bd36dddfe32a4a9f9bbdc1d973a74d769923015d514359e4,2025-03-24T18:15:15.220000
|
||||||
CVE-2022-44262,0,0,df27ede15d999ecbf37f3b9915aa80f3e7bc90d6c7a750dfcb57bab9d6626612,2024-11-21T07:27:48.563000
|
CVE-2022-44262,0,0,df27ede15d999ecbf37f3b9915aa80f3e7bc90d6c7a750dfcb57bab9d6626612,2024-11-21T07:27:48.563000
|
||||||
CVE-2022-44263,0,1,db470b797c55b2f6778b267d53686402da2348f8111a6ee7a6828f348777d328,2025-03-31T18:15:31.403000
|
CVE-2022-44263,0,0,db470b797c55b2f6778b267d53686402da2348f8111a6ee7a6828f348777d328,2025-03-31T18:15:31.403000
|
||||||
CVE-2022-44264,0,1,779dfdbf78c6db3f6a7e766f6d480440efaae96a6243d69ef9dde97872dd6408,2025-03-31T18:15:32.120000
|
CVE-2022-44264,0,0,779dfdbf78c6db3f6a7e766f6d480440efaae96a6243d69ef9dde97872dd6408,2025-03-31T18:15:32.120000
|
||||||
CVE-2022-44267,0,0,6a22eca4fc53a59b875002724e8ca628ee1225845b255410b7dc64d1dec8a6a7,2025-03-26T15:15:40.483000
|
CVE-2022-44267,0,0,6a22eca4fc53a59b875002724e8ca628ee1225845b255410b7dc64d1dec8a6a7,2025-03-26T15:15:40.483000
|
||||||
CVE-2022-44268,0,0,86770817170268b0a887cfc272f7da52b49cec04a13993803745dc916220b476,2025-03-26T15:15:40.750000
|
CVE-2022-44268,0,0,86770817170268b0a887cfc272f7da52b49cec04a13993803745dc916220b476,2025-03-26T15:15:40.750000
|
||||||
CVE-2022-4427,0,0,82b0a1c58b5dd3ffe303de84aa02a3ea240cbfc72b927c3086bf0c900a159f18,2025-02-13T17:15:50.667000
|
CVE-2022-4427,0,0,82b0a1c58b5dd3ffe303de84aa02a3ea240cbfc72b927c3086bf0c900a159f18,2025-02-13T17:15:50.667000
|
||||||
@ -209845,7 +209845,7 @@ CVE-2022-44291,0,0,9d44a52c0685eb10cd09eb5b4a4bf46a64acf311680ee93d8ff00dae5d22c
|
|||||||
CVE-2022-44294,0,0,fbcc7bad653c47067cd2250119a45f329a299e47e13ee007fce37d3922b0301d,2024-11-21T07:27:50.893000
|
CVE-2022-44294,0,0,fbcc7bad653c47067cd2250119a45f329a299e47e13ee007fce37d3922b0301d,2024-11-21T07:27:50.893000
|
||||||
CVE-2022-44295,0,0,dd91142188732e917945f2d36e80ce804150e337345a896a8870b3253337b9ca,2024-11-21T07:27:51.037000
|
CVE-2022-44295,0,0,dd91142188732e917945f2d36e80ce804150e337345a896a8870b3253337b9ca,2024-11-21T07:27:51.037000
|
||||||
CVE-2022-44296,0,0,7649a4fa26d775b1f335af01076e6fd037e2e30d459c85beba18d63ea728e5a1,2024-11-21T07:27:51.180000
|
CVE-2022-44296,0,0,7649a4fa26d775b1f335af01076e6fd037e2e30d459c85beba18d63ea728e5a1,2024-11-21T07:27:51.180000
|
||||||
CVE-2022-44297,0,1,714bd75efbc7ed32a384c2a9a61ddee8e01257597043f794fe8a7326c79b21f2,2025-03-31T18:15:32.340000
|
CVE-2022-44297,0,0,714bd75efbc7ed32a384c2a9a61ddee8e01257597043f794fe8a7326c79b21f2,2025-03-31T18:15:32.340000
|
||||||
CVE-2022-44298,0,0,69edc3dce983df3c9b5e495ef31c54ebf4e519fcc6525f1ed747f9af4e6eaf26,2025-03-28T15:15:42.390000
|
CVE-2022-44298,0,0,69edc3dce983df3c9b5e495ef31c54ebf4e519fcc6525f1ed747f9af4e6eaf26,2025-03-28T15:15:42.390000
|
||||||
CVE-2022-44299,0,0,5adbf77681e09b8399532a96a6a9d4ae34eead786fe1c0029300fa2d65f72929,2025-03-19T15:15:41.873000
|
CVE-2022-44299,0,0,5adbf77681e09b8399532a96a6a9d4ae34eead786fe1c0029300fa2d65f72929,2025-03-19T15:15:41.873000
|
||||||
CVE-2022-44303,0,0,d9191fcb3c264206571cc2273401cd659061e66b5b01af1a0d6f1bcc3f8d893f,2024-11-21T07:27:51.750000
|
CVE-2022-44303,0,0,d9191fcb3c264206571cc2273401cd659061e66b5b01af1a0d6f1bcc3f8d893f,2024-11-21T07:27:51.750000
|
||||||
@ -210816,7 +210816,7 @@ CVE-2022-45766,0,0,72c36f29c35874580c535822342cd020836969f971dd723babdaa8c49bbc8
|
|||||||
CVE-2022-45768,0,0,5a7e71b10745f7171b546446b7eb1beeca8e54d2bd161b17d6d1ae2a2af3a55f,2025-03-25T15:15:16.277000
|
CVE-2022-45768,0,0,5a7e71b10745f7171b546446b7eb1beeca8e54d2bd161b17d6d1ae2a2af3a55f,2025-03-25T15:15:16.277000
|
||||||
CVE-2022-45769,0,0,1e8f47f2d9403072669e2f933abb158f13fef15333df9238a51a36c60ca747fe,2024-11-21T07:29:41.063000
|
CVE-2022-45769,0,0,1e8f47f2d9403072669e2f933abb158f13fef15333df9238a51a36c60ca747fe,2024-11-21T07:29:41.063000
|
||||||
CVE-2022-4577,0,0,0ee64bdcd89d460efc049aed42aba77caafdf317c23948db93ad4449cf4198e2,2025-03-26T14:15:25.800000
|
CVE-2022-4577,0,0,0ee64bdcd89d460efc049aed42aba77caafdf317c23948db93ad4449cf4198e2,2025-03-26T14:15:25.800000
|
||||||
CVE-2022-45770,0,1,8c5a7a8c2aa10a10529c3afa32edfc0cf29620d9a30ac85ce666d9550489805b,2025-03-31T19:15:39.220000
|
CVE-2022-45770,0,0,8c5a7a8c2aa10a10529c3afa32edfc0cf29620d9a30ac85ce666d9550489805b,2025-03-31T19:15:39.220000
|
||||||
CVE-2022-45771,0,0,187d8b7379b23beda0c4ec7f844878da04db33c0b9e71fb3308e9216031fa00e,2024-11-21T07:29:41.360000
|
CVE-2022-45771,0,0,187d8b7379b23beda0c4ec7f844878da04db33c0b9e71fb3308e9216031fa00e,2024-11-21T07:29:41.360000
|
||||||
CVE-2022-45778,0,0,ba2c0e56310856b947c1011dc3c1bb60c6e63585e41ef402feb38046d5722fc0,2024-11-21T07:29:41.500000
|
CVE-2022-45778,0,0,ba2c0e56310856b947c1011dc3c1bb60c6e63585e41ef402feb38046d5722fc0,2024-11-21T07:29:41.500000
|
||||||
CVE-2022-4578,0,0,d7acb6c771f7a789d19f6484a24a188e3f6503cc9345077d8e8dad2ae76e5701,2024-11-21T07:35:31.883000
|
CVE-2022-4578,0,0,d7acb6c771f7a789d19f6484a24a188e3f6503cc9345077d8e8dad2ae76e5701,2024-11-21T07:35:31.883000
|
||||||
@ -244960,7 +244960,7 @@ CVE-2024-1051,0,0,47e83543cdb00e91b0b2e6dfcb71fb878c597c188c0668b9ed609335433c9d
|
|||||||
CVE-2024-10510,0,0,1a1b225dc371f891ed5076d52ce3977c9397cc1b9a9aecca92726347c481951f,2024-11-29T16:15:08.733000
|
CVE-2024-10510,0,0,1a1b225dc371f891ed5076d52ce3977c9397cc1b9a9aecca92726347c481951f,2024-11-29T16:15:08.733000
|
||||||
CVE-2024-10511,0,0,5e411f234441d712e134066c0fb752802b5b0a3f0734c4d32360f037e4b5a3aa,2024-12-11T09:15:05.293000
|
CVE-2024-10511,0,0,5e411f234441d712e134066c0fb752802b5b0a3f0734c4d32360f037e4b5a3aa,2024-12-11T09:15:05.293000
|
||||||
CVE-2024-10513,0,0,101dcfdb0daebc1898491c44833014dafb9860a3d1daf4cd8931e7be27303eeb,2025-03-20T10:15:17.140000
|
CVE-2024-10513,0,0,101dcfdb0daebc1898491c44833014dafb9860a3d1daf4cd8931e7be27303eeb,2025-03-20T10:15:17.140000
|
||||||
CVE-2024-10515,0,1,70e4b8a115d447d9e5de069185152143410d2b26272dd3213172f4c642a76ca3,2025-03-31T19:33:29.490000
|
CVE-2024-10515,0,0,70e4b8a115d447d9e5de069185152143410d2b26272dd3213172f4c642a76ca3,2025-03-31T19:33:29.490000
|
||||||
CVE-2024-10516,0,0,2ebd9272720b07a5cf79c9a9ceb37a855be1402b37d213d1f22547ec3a1c9ddf,2024-12-06T14:15:19.667000
|
CVE-2024-10516,0,0,2ebd9272720b07a5cf79c9a9ceb37a855be1402b37d213d1f22547ec3a1c9ddf,2024-12-06T14:15:19.667000
|
||||||
CVE-2024-10517,0,0,ec874f706d612987436415b14947527e0ec4826e3f1f3a52572b8d2041a7e176,2024-12-12T16:15:10.483000
|
CVE-2024-10517,0,0,ec874f706d612987436415b14947527e0ec4826e3f1f3a52572b8d2041a7e176,2024-12-12T16:15:10.483000
|
||||||
CVE-2024-10518,0,0,9b672e9ec0f2ce289c42bf794385cc1499fe101df107e5b1e23b7eac5052f943,2024-12-12T16:15:10.890000
|
CVE-2024-10518,0,0,9b672e9ec0f2ce289c42bf794385cc1499fe101df107e5b1e23b7eac5052f943,2024-12-12T16:15:10.890000
|
||||||
@ -249325,7 +249325,7 @@ CVE-2024-20482,0,0,91c065c5ae8268289342d832aa225585cff358d487a277492c0f30ad7fadd
|
|||||||
CVE-2024-20483,0,0,dd75006a4b8378f9a9fb04ae844db2b682dee979eaed8461ca1ae896a3344cd6,2024-10-03T01:44:17.827000
|
CVE-2024-20483,0,0,dd75006a4b8378f9a9fb04ae844db2b682dee979eaed8461ca1ae896a3344cd6,2024-10-03T01:44:17.827000
|
||||||
CVE-2024-20484,0,0,6b6707e10852e13633700ba01618bcd1e8ced80c7c9f83e2b3f114bf128939f6,2024-11-06T18:17:17.287000
|
CVE-2024-20484,0,0,6b6707e10852e13633700ba01618bcd1e8ced80c7c9f83e2b3f114bf128939f6,2024-11-06T18:17:17.287000
|
||||||
CVE-2024-20485,0,0,4bad42c478a01f00d273ab8662a0d6beb1a29cef37718efc29530f0725b7110b,2024-11-01T19:50:11.107000
|
CVE-2024-20485,0,0,4bad42c478a01f00d273ab8662a0d6beb1a29cef37718efc29530f0725b7110b,2024-11-01T19:50:11.107000
|
||||||
CVE-2024-20486,0,1,125fccffe06e3967c8f3666e5a0a779870a3e9c6cd485fa1df233aa67fbb99ea,2025-03-31T18:20:38.103000
|
CVE-2024-20486,0,0,125fccffe06e3967c8f3666e5a0a779870a3e9c6cd485fa1df233aa67fbb99ea,2025-03-31T18:20:38.103000
|
||||||
CVE-2024-20487,0,0,90a43a4226fc2a3a08656cd3b727e32adf773edd1ff69cf850e5d113d82153c1,2024-11-06T18:17:17.287000
|
CVE-2024-20487,0,0,90a43a4226fc2a3a08656cd3b727e32adf773edd1ff69cf850e5d113d82153c1,2024-11-06T18:17:17.287000
|
||||||
CVE-2024-20488,0,0,3eba64ac5c64e3a05ab3229d3a319f5d11c1176e28d49e535d0362c8cf9be279,2024-09-06T17:18:11.813000
|
CVE-2024-20488,0,0,3eba64ac5c64e3a05ab3229d3a319f5d11c1176e28d49e535d0362c8cf9be279,2024-09-06T17:18:11.813000
|
||||||
CVE-2024-20489,0,0,c515a7131b885c709ec34ee863eb206793a1025f593d2aba1eec899a42a269a8,2024-10-03T01:40:11.637000
|
CVE-2024-20489,0,0,c515a7131b885c709ec34ee863eb206793a1025f593d2aba1eec899a42a269a8,2024-10-03T01:40:11.637000
|
||||||
@ -252467,13 +252467,14 @@ CVE-2024-24449,0,0,cb429ffc1f73fa46512b04b6b6b7262785b1e5e3d056a09b6c1ac751016dc
|
|||||||
CVE-2024-2445,0,0,caebbca57e6dc905fece28cfd8e27fbd318000c7101a9c9ad5d052cb37da5e31,2024-12-13T17:15:49.207000
|
CVE-2024-2445,0,0,caebbca57e6dc905fece28cfd8e27fbd318000c7101a9c9ad5d052cb37da5e31,2024-12-13T17:15:49.207000
|
||||||
CVE-2024-24450,0,0,bfdf5a51b70b0375ac650a265388caa7ba6f2b773803891c0563ccf75c951b15,2024-11-18T17:11:56.587000
|
CVE-2024-24450,0,0,bfdf5a51b70b0375ac650a265388caa7ba6f2b773803891c0563ccf75c951b15,2024-11-18T17:11:56.587000
|
||||||
CVE-2024-24451,0,0,2047230038706a6ea449594aac339b5a79a1ce23f8545e56ac9ddd4465baf12d,2025-01-24T20:15:32.263000
|
CVE-2024-24451,0,0,2047230038706a6ea449594aac339b5a79a1ce23f8545e56ac9ddd4465baf12d,2025-01-24T20:15:32.263000
|
||||||
CVE-2024-24452,0,0,9b35057c4f8238c71060c4a3362de0c41210e1bb46a2fdae5c8c842b460d1809,2024-11-18T17:11:56.587000
|
CVE-2024-24452,0,1,9aa3205d78f1b8367d050ac692b4d7b2d2a817bbe6be31e8eee694911f917dd0,2025-03-31T21:15:43.370000
|
||||||
CVE-2024-24453,0,0,7dbe40dab6b44347c4e5eb5b29ed5a220fbd48ca061b2817d1f080948c6c4725,2024-11-18T17:11:56.587000
|
CVE-2024-24453,0,1,07ce55fb9f095045ad95fb21b47b54148065f631b3fd0d8f468d663dd94cfda8,2025-03-31T21:15:43.683000
|
||||||
CVE-2024-24454,0,0,16fe1707e5b6500467b31b614258ea3c9d6830f97969cc4c9d7fb698042d7182,2024-11-18T17:11:56.587000
|
CVE-2024-24454,0,1,5c2bd54ad8fc2f1543c60195e4dbb3af2c70d2e8d29fea1e0c443c2f494a0a4f,2025-03-31T21:15:43.950000
|
||||||
CVE-2024-24455,0,0,bf34919ca18efc343fa332f515b04d4eef692b470371474f2b29a7fce41546b7,2024-11-18T17:11:56.587000
|
CVE-2024-24455,0,1,502d4dd8b46c6151371bd5e943048eb0545d554441e272079a097510fb13b6e1,2025-03-31T21:15:44.193000
|
||||||
CVE-2024-24457,0,0,b7bbb2b5a810c1fadde3472c6ef27ef7a83a2fcac2d1955d127019f7529ac816,2024-11-18T17:11:56.587000
|
CVE-2024-24456,1,1,23859e18334d311069bd2883cb0529381eb7240f1b5b7afa923ed46511ae2078,2025-03-31T21:15:44.513000
|
||||||
CVE-2024-24458,0,0,ea6d0c7194c84aafdf27031e8442770fc2b8ba09fa460fb6ddecbbd88a347c2f,2024-11-18T17:11:56.587000
|
CVE-2024-24457,0,1,d2e8d373f9d57bd477032938d24f522c47b66f04dea00a8e69a47432d7e011ba,2025-03-31T21:15:44.697000
|
||||||
CVE-2024-24459,0,0,3dfc7e14cb29b50f38f109078f5cb39635a43ed4b26fc1dfc7678b12ee1f40a1,2024-11-18T17:11:56.587000
|
CVE-2024-24458,0,1,a5484b0fe42741bb8d668d79927c6e7c3ee357596180e82a5cf95201bf23335c,2025-03-31T21:15:44.957000
|
||||||
|
CVE-2024-24459,0,1,71db539dc29bad108be9fb9402dcdbfd179a3be0ce3ce40b183975a79316afe6,2025-03-31T21:15:46.887000
|
||||||
CVE-2024-2446,0,0,43217bdd586fe0adfbce35dce1a075395c2a23d609c9f19c21f34e2c598fb7e4,2024-12-13T16:39:51.233000
|
CVE-2024-2446,0,0,43217bdd586fe0adfbce35dce1a075395c2a23d609c9f19c21f34e2c598fb7e4,2024-12-13T16:39:51.233000
|
||||||
CVE-2024-24468,0,0,ef2f46bc00e60b0046ac3fa8a85a5d2843a4126050811a264748033c1f6c0bfa,2024-11-21T08:59:18.197000
|
CVE-2024-24468,0,0,ef2f46bc00e60b0046ac3fa8a85a5d2843a4126050811a264748033c1f6c0bfa,2024-11-21T08:59:18.197000
|
||||||
CVE-2024-24469,0,0,f5bdfa2b37924c81cf855da4fc554fb14c8183e30574a75cfd35962e7d0ac2c1,2024-11-21T08:59:18.353000
|
CVE-2024-24469,0,0,f5bdfa2b37924c81cf855da4fc554fb14c8183e30574a75cfd35962e7d0ac2c1,2024-11-21T08:59:18.353000
|
||||||
@ -264342,7 +264343,7 @@ CVE-2024-39655,0,0,995dc9c1c7c96fb0fc03e66270fab2cb1ffcf8a4397ddb365981e39389c67
|
|||||||
CVE-2024-39656,0,0,c84c39d5a0694c7d1c872fcafc2d435755839df103c210d90013e7441c34bda1,2024-08-02T12:59:43.990000
|
CVE-2024-39656,0,0,c84c39d5a0694c7d1c872fcafc2d435755839df103c210d90013e7441c34bda1,2024-08-02T12:59:43.990000
|
||||||
CVE-2024-39657,0,0,2bf07190211ec64f7bfc9e8a96ee124b8611e75c850679013b89e79b547f6896,2024-09-18T16:25:32.703000
|
CVE-2024-39657,0,0,2bf07190211ec64f7bfc9e8a96ee124b8611e75c850679013b89e79b547f6896,2024-09-18T16:25:32.703000
|
||||||
CVE-2024-39658,0,0,766eb85a1304afebac868b111e71876df3cfe7453afe0f78210d30bdcb174f44,2024-09-13T21:04:24.760000
|
CVE-2024-39658,0,0,766eb85a1304afebac868b111e71876df3cfe7453afe0f78210d30bdcb174f44,2024-09-13T21:04:24.760000
|
||||||
CVE-2024-39659,0,1,eb277be69da7ae63c72d03b1700b1623310358a8537a25ae64fc0cec58e225c5,2025-03-31T18:22:48.390000
|
CVE-2024-39659,0,0,eb277be69da7ae63c72d03b1700b1623310358a8537a25ae64fc0cec58e225c5,2025-03-31T18:22:48.390000
|
||||||
CVE-2024-3966,0,0,063645d8989e4cabc49b793f8b061eb0fa5ef40aff4317a82395a925db517939,2024-11-21T09:30:47.557000
|
CVE-2024-3966,0,0,063645d8989e4cabc49b793f8b061eb0fa5ef40aff4317a82395a925db517939,2024-11-21T09:30:47.557000
|
||||||
CVE-2024-39660,0,0,f3ac8304b1d224b0071a3a78df5d2888502abdabd1c64183297a33de85b58c9a,2024-08-02T12:59:43.990000
|
CVE-2024-39660,0,0,f3ac8304b1d224b0071a3a78df5d2888502abdabd1c64183297a33de85b58c9a,2024-08-02T12:59:43.990000
|
||||||
CVE-2024-39661,0,0,2412d25c8e1b3b5f410f5c79baa180c712b7da235f8a4069d0bcbeb29ba3f2d1,2024-08-02T12:59:43.990000
|
CVE-2024-39661,0,0,2412d25c8e1b3b5f410f5c79baa180c712b7da235f8a4069d0bcbeb29ba3f2d1,2024-08-02T12:59:43.990000
|
||||||
@ -266503,7 +266504,7 @@ CVE-2024-42631,0,0,ed9e80e71e882419c98f1936732fdd035ca311ef33bc2ac9cb2a1a67c40af
|
|||||||
CVE-2024-42632,0,0,29fbd74151313f5b4a9b1372c595b1fee99cc3a87d35047777c8872345464e5c,2024-08-13T15:35:23.410000
|
CVE-2024-42632,0,0,29fbd74151313f5b4a9b1372c595b1fee99cc3a87d35047777c8872345464e5c,2024-08-13T15:35:23.410000
|
||||||
CVE-2024-42633,0,0,3cf92e5e6df7470ec76959fa70236d85e9e9942650bdcd767e84cd8dbdc27aee,2024-08-20T16:18:24.300000
|
CVE-2024-42633,0,0,3cf92e5e6df7470ec76959fa70236d85e9e9942650bdcd767e84cd8dbdc27aee,2024-08-20T16:18:24.300000
|
||||||
CVE-2024-42634,0,0,e316dd50ac7dd29fbd6d3ac410c9dd2e383d0fa3a5124d95a220d9396a05eb2a,2024-08-19T13:00:23.117000
|
CVE-2024-42634,0,0,e316dd50ac7dd29fbd6d3ac410c9dd2e383d0fa3a5124d95a220d9396a05eb2a,2024-08-19T13:00:23.117000
|
||||||
CVE-2024-42636,0,1,444e64fac4a624fc737f489868061b86775d9e59f0cfa512926ca33905ecdabe,2025-03-31T18:49:02.283000
|
CVE-2024-42636,0,0,444e64fac4a624fc737f489868061b86775d9e59f0cfa512926ca33905ecdabe,2025-03-31T18:49:02.283000
|
||||||
CVE-2024-42637,0,0,7ab579a16c75673edf60ac8a3c57e5d93e8a15ee1bb0faf828bd0c37998bf12d,2024-08-19T13:00:23.117000
|
CVE-2024-42637,0,0,7ab579a16c75673edf60ac8a3c57e5d93e8a15ee1bb0faf828bd0c37998bf12d,2024-08-19T13:00:23.117000
|
||||||
CVE-2024-42638,0,0,2c1b857f0b965ac40814489cb21be9b393c58462d1ddf36b59e226e27acdcc88,2025-03-17T15:15:41.303000
|
CVE-2024-42638,0,0,2c1b857f0b965ac40814489cb21be9b393c58462d1ddf36b59e226e27acdcc88,2025-03-17T15:15:41.303000
|
||||||
CVE-2024-42639,0,0,7ae4bb182bb632802f21a7f071d6ecf69b498e4a7b1d31bfaeb90705ae0f6221,2025-03-20T14:15:20.170000
|
CVE-2024-42639,0,0,7ae4bb182bb632802f21a7f071d6ecf69b498e4a7b1d31bfaeb90705ae0f6221,2025-03-20T14:15:20.170000
|
||||||
@ -268698,7 +268699,7 @@ CVE-2024-45522,0,0,09ceef78cc5f057be786bb183a479b765b1739f0b7ce2fbf1b1d3c524b7ab
|
|||||||
CVE-2024-45523,0,0,78921820db852b485259b411f9a0300a9a0274594719508f8ffa7f118abb2798,2024-09-20T14:35:11.523000
|
CVE-2024-45523,0,0,78921820db852b485259b411f9a0300a9a0274594719508f8ffa7f118abb2798,2024-09-20T14:35:11.523000
|
||||||
CVE-2024-45526,0,0,5a2809434001f8fa7518dd39e1d76ce252063ceb0c771a1023d6ee67c4c4a925,2024-10-23T19:35:10.713000
|
CVE-2024-45526,0,0,5a2809434001f8fa7518dd39e1d76ce252063ceb0c771a1023d6ee67c4c4a925,2024-10-23T19:35:10.713000
|
||||||
CVE-2024-45527,0,0,5b520308e8c1543ba589bbb7fb99705b7715af5ae5704181f6c1c8d8f972f51c,2024-09-03T15:35:13.673000
|
CVE-2024-45527,0,0,5b520308e8c1543ba589bbb7fb99705b7715af5ae5704181f6c1c8d8f972f51c,2024-09-03T15:35:13.673000
|
||||||
CVE-2024-45528,0,1,2b62a46ad6721df273bf579b352dfc41d4b63f87803bbdffe8980da05bd0cffe,2025-03-31T18:53:04.780000
|
CVE-2024-45528,0,0,2b62a46ad6721df273bf579b352dfc41d4b63f87803bbdffe8980da05bd0cffe,2025-03-31T18:53:04.780000
|
||||||
CVE-2024-4553,0,0,fb93ea8b9b15d40065d6ae14704246d0707e85e61c82926c0504e92275e39cb7,2025-01-24T14:42:56.390000
|
CVE-2024-4553,0,0,fb93ea8b9b15d40065d6ae14704246d0707e85e61c82926c0504e92275e39cb7,2025-01-24T14:42:56.390000
|
||||||
CVE-2024-45537,0,0,e4991fccb3abdc03f0d41abc273d14fb886e4c1626430be204dd2dbbe1a63e8d,2025-03-14T15:15:42.430000
|
CVE-2024-45537,0,0,e4991fccb3abdc03f0d41abc273d14fb886e4c1626430be204dd2dbbe1a63e8d,2025-03-14T15:15:42.430000
|
||||||
CVE-2024-4554,0,0,29103eb4d0b8fc6eb1c1a81b44a6bbfd0c979fea9590f8c8dd85408f98483465,2024-09-19T18:15:10.433000
|
CVE-2024-4554,0,0,29103eb4d0b8fc6eb1c1a81b44a6bbfd0c979fea9590f8c8dd85408f98483465,2024-09-19T18:15:10.433000
|
||||||
@ -269073,7 +269074,7 @@ CVE-2024-46238,0,0,fd4831862db3e74117454bdc4a0bfbcd296d65ce950e55d96b45ec27cf047
|
|||||||
CVE-2024-46239,0,0,a2e0203fe405dc3797841252c2430cf2c4e2c3b10af81b0193959b83c529ddd1,2025-03-31T17:52:58.943000
|
CVE-2024-46239,0,0,a2e0203fe405dc3797841252c2430cf2c4e2c3b10af81b0193959b83c529ddd1,2025-03-31T17:52:58.943000
|
||||||
CVE-2024-4624,0,0,18970f9a313d13160da6e0af938d898396349890d09a8f8861dd5be486e648a9,2025-01-15T18:00:53.760000
|
CVE-2024-4624,0,0,18970f9a313d13160da6e0af938d898396349890d09a8f8861dd5be486e648a9,2025-01-15T18:00:53.760000
|
||||||
CVE-2024-46240,0,0,1191cdf44b6509cbee2a8abac44a625a4ac7bf4a3622ea84bd1d88a32af8af69,2024-10-25T19:00:20.737000
|
CVE-2024-46240,0,0,1191cdf44b6509cbee2a8abac44a625a4ac7bf4a3622ea84bd1d88a32af8af69,2024-10-25T19:00:20.737000
|
||||||
CVE-2024-46241,0,1,65a068281839d70d77856026e22ffe1b7df2d3ec55dc4b9009edbb9990408570,2025-03-31T19:20:33.810000
|
CVE-2024-46241,0,0,65a068281839d70d77856026e22ffe1b7df2d3ec55dc4b9009edbb9990408570,2025-03-31T19:20:33.810000
|
||||||
CVE-2024-46242,0,0,278c5d74ca553d7a6ee7eea1c9d6c6283b4a956d21df9f54eec439967fafe153,2025-01-07T21:15:11.783000
|
CVE-2024-46242,0,0,278c5d74ca553d7a6ee7eea1c9d6c6283b4a956d21df9f54eec439967fafe153,2025-01-07T21:15:11.783000
|
||||||
CVE-2024-4625,0,0,aad46a28d2c2f49a77b5936172e43c0dde451e0472cbbc7daa3b8775fd5ff0b1,2025-02-11T02:15:35.090000
|
CVE-2024-4625,0,0,aad46a28d2c2f49a77b5936172e43c0dde451e0472cbbc7daa3b8775fd5ff0b1,2025-02-11T02:15:35.090000
|
||||||
CVE-2024-46256,0,0,e8ff1292d6b21c7ae8cc6b0452346dfd4818ec086d9a14227767a4b9e342f7b1,2024-10-24T17:15:16.690000
|
CVE-2024-46256,0,0,e8ff1292d6b21c7ae8cc6b0452346dfd4818ec086d9a14227767a4b9e342f7b1,2024-10-24T17:15:16.690000
|
||||||
@ -269121,7 +269122,7 @@ CVE-2024-46366,0,0,d617ffae88cb828c6e7151f2341d1f71470550fda14e8fcb6482b905bda24
|
|||||||
CVE-2024-46367,0,0,989a85d08e8653df07e4eae1f4f794bd57485ed7719e4f75ea7a012b27c892b7,2024-09-30T12:45:57.823000
|
CVE-2024-46367,0,0,989a85d08e8653df07e4eae1f4f794bd57485ed7719e4f75ea7a012b27c892b7,2024-09-30T12:45:57.823000
|
||||||
CVE-2024-4637,0,0,93f87c1fc2bbd96796cfb083c4131106f07be323f4ade6a9313776a7f9a8739b,2025-01-27T18:22:19.963000
|
CVE-2024-4637,0,0,93f87c1fc2bbd96796cfb083c4131106f07be323f4ade6a9313776a7f9a8739b,2025-01-27T18:22:19.963000
|
||||||
CVE-2024-46372,0,0,64e69d8d7d4508ebfd1e3370be60554c61b02f56bb1b126b7d6932b73c4bd8b4,2025-03-25T17:16:10.433000
|
CVE-2024-46372,0,0,64e69d8d7d4508ebfd1e3370be60554c61b02f56bb1b126b7d6932b73c4bd8b4,2025-03-25T17:16:10.433000
|
||||||
CVE-2024-46373,0,1,a07e5ed04eabb8b296855fe8ef81409c9a84dee991735b3ba28d11997413b1db,2025-03-31T18:53:55.610000
|
CVE-2024-46373,0,0,a07e5ed04eabb8b296855fe8ef81409c9a84dee991735b3ba28d11997413b1db,2025-03-31T18:53:55.610000
|
||||||
CVE-2024-46374,0,0,49c9abdfd23a3c7b397e5069ae4701ce6b671bb400b51adb0be2528c878db0de,2024-09-20T12:30:17.483000
|
CVE-2024-46374,0,0,49c9abdfd23a3c7b397e5069ae4701ce6b671bb400b51adb0be2528c878db0de,2024-09-20T12:30:17.483000
|
||||||
CVE-2024-46375,0,0,251c5c224cd39f4fe15f3a9045f8fa195e4dd35b1c8aeb90a1494c5706870ceb,2024-09-20T12:30:17.483000
|
CVE-2024-46375,0,0,251c5c224cd39f4fe15f3a9045f8fa195e4dd35b1c8aeb90a1494c5706870ceb,2024-09-20T12:30:17.483000
|
||||||
CVE-2024-46376,0,0,44f3c1706e60f5bd7bbcaa0829495448a78c5a8ae7d0d5596087882889678073,2024-09-20T12:30:17.483000
|
CVE-2024-46376,0,0,44f3c1706e60f5bd7bbcaa0829495448a78c5a8ae7d0d5596087882889678073,2024-09-20T12:30:17.483000
|
||||||
@ -269167,9 +269168,9 @@ CVE-2024-46466,0,0,05f240dba70d063ab9d7ed20681eedb762fbba20cc02e0363e22d4808d27c
|
|||||||
CVE-2024-46467,0,0,73f0f26e819634cb625c5f23b0aee6baa6651d870b71db2a09d09f42a1c60f90,2024-11-25T20:15:09.170000
|
CVE-2024-46467,0,0,73f0f26e819634cb625c5f23b0aee6baa6651d870b71db2a09d09f42a1c60f90,2024-11-25T20:15:09.170000
|
||||||
CVE-2024-46468,0,0,bfaaa209cfbab67a97fdbb03a6d72f15cdef7f2e107fbbe0bd40bea4fa9e260b,2024-10-15T18:35:14.680000
|
CVE-2024-46468,0,0,bfaaa209cfbab67a97fdbb03a6d72f15cdef7f2e107fbbe0bd40bea4fa9e260b,2024-10-15T18:35:14.680000
|
||||||
CVE-2024-4647,0,0,ecc1578f1607d877ec09ef9a154e3163dc45f1d50cf87949c0a4d645b7b7eaf9,2025-02-19T18:04:19.093000
|
CVE-2024-4647,0,0,ecc1578f1607d877ec09ef9a154e3163dc45f1d50cf87949c0a4d645b7b7eaf9,2025-02-19T18:04:19.093000
|
||||||
CVE-2024-46470,0,1,ccd900df91568f37aaaf8beaddb896f7b1bf9ff01c6bf3d8989063329ed3c1e7,2025-03-31T19:19:17.120000
|
CVE-2024-46470,0,0,ccd900df91568f37aaaf8beaddb896f7b1bf9ff01c6bf3d8989063329ed3c1e7,2025-03-31T19:19:17.120000
|
||||||
CVE-2024-46471,0,1,95b680df6f7ac557262e9483a5a0b48e0997cd8bfadfc2bd86c9ad1edd8cade7,2025-03-31T19:07:09.867000
|
CVE-2024-46471,0,0,95b680df6f7ac557262e9483a5a0b48e0997cd8bfadfc2bd86c9ad1edd8cade7,2025-03-31T19:07:09.867000
|
||||||
CVE-2024-46472,0,1,98034addb2dd3db31543176eec90b3d6be943e239cb4afda9c52b024f5b4c496,2025-03-31T19:02:48.263000
|
CVE-2024-46472,0,0,98034addb2dd3db31543176eec90b3d6be943e239cb4afda9c52b024f5b4c496,2025-03-31T19:02:48.263000
|
||||||
CVE-2024-46475,0,0,8de337bf21f8e76ccf4e6b762e2c811bd622fb2d069c67372f969f963e9a513d,2024-10-04T13:51:25.567000
|
CVE-2024-46475,0,0,8de337bf21f8e76ccf4e6b762e2c811bd622fb2d069c67372f969f963e9a513d,2024-10-04T13:51:25.567000
|
||||||
CVE-2024-46478,0,0,f70f3b5c1ce34e91e4141e4b2cfc565865d5d214d85b67dd8586cdb93782907f,2024-10-25T20:35:09.710000
|
CVE-2024-46478,0,0,f70f3b5c1ce34e91e4141e4b2cfc565865d5d214d85b67dd8586cdb93782907f,2024-10-25T20:35:09.710000
|
||||||
CVE-2024-46479,0,0,d3dcd1fb5238b07184a4925343df44d4e6e159f370a4f241b86afa356047b5d1,2025-01-13T18:15:18.003000
|
CVE-2024-46479,0,0,d3dcd1fb5238b07184a4925343df44d4e6e159f370a4f241b86afa356047b5d1,2025-01-13T18:15:18.003000
|
||||||
@ -270865,7 +270866,7 @@ CVE-2024-48798,0,0,75f45576dc36face7290312bd25d8139caf8bd952fb64803e744a3ae6e924
|
|||||||
CVE-2024-48799,0,0,1b7764cd349b8845e947ef033fa31339932e6c95b96b723a19e36094142fff50,2025-03-24T17:15:18.960000
|
CVE-2024-48799,0,0,1b7764cd349b8845e947ef033fa31339932e6c95b96b723a19e36094142fff50,2025-03-24T17:15:18.960000
|
||||||
CVE-2024-4880,0,0,0cc985577bb7f14539feddc231097b9e719890ea446692f0e1ab269d57e2a39c,2025-02-11T02:15:35.143000
|
CVE-2024-4880,0,0,0cc985577bb7f14539feddc231097b9e719890ea446692f0e1ab269d57e2a39c,2025-02-11T02:15:35.143000
|
||||||
CVE-2024-48806,0,0,c426ca49ad75210c4d73c5b573e2dd3e119056b8e0f3da40ade3d13a5fdaf0d5,2025-01-16T19:15:28.320000
|
CVE-2024-48806,0,0,c426ca49ad75210c4d73c5b573e2dd3e119056b8e0f3da40ade3d13a5fdaf0d5,2025-01-16T19:15:28.320000
|
||||||
CVE-2024-48807,0,1,8a88a75c275ba7d848707c49505be930f471d4f3e024973e5d06d59680ee7a1a,2025-03-31T19:24:10.313000
|
CVE-2024-48807,0,0,8a88a75c275ba7d848707c49505be930f471d4f3e024973e5d06d59680ee7a1a,2025-03-31T19:24:10.313000
|
||||||
CVE-2024-48809,0,0,89c64378ba71cdec8bda78ac432f0505d060e9c4a712bdefd0c0360dbcd52353,2024-11-06T19:33:54.977000
|
CVE-2024-48809,0,0,89c64378ba71cdec8bda78ac432f0505d060e9c4a712bdefd0c0360dbcd52353,2024-11-06T19:33:54.977000
|
||||||
CVE-2024-4881,0,0,1c031fd2c38a767f783cce3b716ba92a0bccdca18b325ac245c51367e8857d89,2024-11-21T09:43:46.897000
|
CVE-2024-4881,0,0,1c031fd2c38a767f783cce3b716ba92a0bccdca18b325ac245c51367e8857d89,2024-11-21T09:43:46.897000
|
||||||
CVE-2024-48813,0,0,531834e27f6a6bc0c9381cd9781162753c49dc1f29a9e6d0b2f2fb460ee278b0,2024-10-15T12:58:51.050000
|
CVE-2024-48813,0,0,531834e27f6a6bc0c9381cd9781162753c49dc1f29a9e6d0b2f2fb460ee278b0,2024-10-15T12:58:51.050000
|
||||||
@ -271564,7 +271565,7 @@ CVE-2024-49679,0,0,69366457d136ea54a3b6926990a6003dde86feed848c00d8b78be39be0d98
|
|||||||
CVE-2024-4968,0,0,84fb7654272f609db67556b1bbee00c1c6101a0c21765453fbdfc009a9be8a0a,2025-02-10T13:42:36.187000
|
CVE-2024-4968,0,0,84fb7654272f609db67556b1bbee00c1c6101a0c21765453fbdfc009a9be8a0a,2025-02-10T13:42:36.187000
|
||||||
CVE-2024-49680,0,0,0744c3301274ac63d10bef9c834e7e6120c33d012ef4df460932bd9e268c305e,2024-11-19T21:57:32.967000
|
CVE-2024-49680,0,0,0744c3301274ac63d10bef9c834e7e6120c33d012ef4df460932bd9e268c305e,2024-11-19T21:57:32.967000
|
||||||
CVE-2024-49681,0,0,8c5bef0a7111e608e574a08de0a110bd80fd63fe70a3435156e2c27580ccfca2,2024-10-25T12:56:07.750000
|
CVE-2024-49681,0,0,8c5bef0a7111e608e574a08de0a110bd80fd63fe70a3435156e2c27580ccfca2,2024-10-25T12:56:07.750000
|
||||||
CVE-2024-49682,0,1,078bc643574c07133c2a6c67de5ef98e1df80f7b816ed0205f76ede1996f5e82,2025-03-31T18:13:05.940000
|
CVE-2024-49682,0,0,078bc643574c07133c2a6c67de5ef98e1df80f7b816ed0205f76ede1996f5e82,2025-03-31T18:13:05.940000
|
||||||
CVE-2024-49683,0,0,7be9ea3f510dbaa7fe885cdcb7745560fbc269f7e9bd22850dce90772b3593dd,2024-10-25T12:56:07.750000
|
CVE-2024-49683,0,0,7be9ea3f510dbaa7fe885cdcb7745560fbc269f7e9bd22850dce90772b3593dd,2024-10-25T12:56:07.750000
|
||||||
CVE-2024-49684,0,0,36531d7cf4c7a4e38f6860bda9ec7c0d48195d2fcc27ad0578736763df8ccca2,2024-10-25T12:56:36.827000
|
CVE-2024-49684,0,0,36531d7cf4c7a4e38f6860bda9ec7c0d48195d2fcc27ad0578736763df8ccca2,2024-10-25T12:56:36.827000
|
||||||
CVE-2024-49685,0,0,f305b32b568edf91e7bf9c3e098c8b0e617926446f188349b4087b101823778f,2025-02-05T14:51:00.297000
|
CVE-2024-49685,0,0,f305b32b568edf91e7bf9c3e098c8b0e617926446f188349b4087b101823778f,2025-02-05T14:51:00.297000
|
||||||
@ -272703,9 +272704,9 @@ CVE-2024-51055,0,0,8c557950a9a065601e8c6c8dceb6fdc953c2a7292e6455f04da0193339cab
|
|||||||
CVE-2024-51058,0,0,66da7488618e7bfd544082f0a7ca5f5b213beafff66d93fe5b2dca66727647f7,2024-11-26T20:15:33.253000
|
CVE-2024-51058,0,0,66da7488618e7bfd544082f0a7ca5f5b213beafff66d93fe5b2dca66727647f7,2024-11-26T20:15:33.253000
|
||||||
CVE-2024-5106,0,0,b32baeddd5d7517902783f8698c8ddf8d7704de9303360c6ce08bd697c855461,2025-03-05T16:18:39.727000
|
CVE-2024-5106,0,0,b32baeddd5d7517902783f8698c8ddf8d7704de9303360c6ce08bd697c855461,2025-03-05T16:18:39.727000
|
||||||
CVE-2024-51060,0,0,de7bf14fdaea8b78c02e0c6fade9921621bf0bad2bf2c2ffc485512c883062ec,2024-11-01T17:35:08.443000
|
CVE-2024-51060,0,0,de7bf14fdaea8b78c02e0c6fade9921621bf0bad2bf2c2ffc485512c883062ec,2024-11-01T17:35:08.443000
|
||||||
CVE-2024-51063,0,1,baaa401f76f83c10a16a16ac2300c7ff206c0294cf7e048885c9427fd5cc3d20,2025-03-31T19:26:46.460000
|
CVE-2024-51063,0,0,baaa401f76f83c10a16a16ac2300c7ff206c0294cf7e048885c9427fd5cc3d20,2025-03-31T19:26:46.460000
|
||||||
CVE-2024-51064,0,1,8c98c114e76bc1bd024a1bc62e5d3e352526cdd76914057f4ebcb0ef5f381d29,2025-03-31T19:29:12.110000
|
CVE-2024-51064,0,0,8c98c114e76bc1bd024a1bc62e5d3e352526cdd76914057f4ebcb0ef5f381d29,2025-03-31T19:29:12.110000
|
||||||
CVE-2024-51065,0,1,3b3e6650157f1931a47712b62fd9a2e7477a5d52ec6634effed03cb5c0e92c45,2025-03-31T19:29:35.613000
|
CVE-2024-51065,0,0,3b3e6650157f1931a47712b62fd9a2e7477a5d52ec6634effed03cb5c0e92c45,2025-03-31T19:29:35.613000
|
||||||
CVE-2024-51066,0,0,be8d42488560dde278907528220628acd7b9c959e1434a1bf1dbead4fac8fcb1,2024-11-01T21:35:05.747000
|
CVE-2024-51066,0,0,be8d42488560dde278907528220628acd7b9c959e1434a1bf1dbead4fac8fcb1,2024-11-01T21:35:05.747000
|
||||||
CVE-2024-5107,0,0,2f055a04ccbd78b9c8df18cf46dc307764a3b6508de2a8d7063f4779b98b5648,2025-02-21T21:18:28.707000
|
CVE-2024-5107,0,0,2f055a04ccbd78b9c8df18cf46dc307764a3b6508de2a8d7063f4779b98b5648,2025-02-21T21:18:28.707000
|
||||||
CVE-2024-51072,0,0,e3822fe995b8ac5db401be8bd0f5c664092585f4b74280cebfb9be6c17c2b406,2025-01-10T15:15:15.173000
|
CVE-2024-51072,0,0,e3822fe995b8ac5db401be8bd0f5c664092585f4b74280cebfb9be6c17c2b406,2025-01-10T15:15:15.173000
|
||||||
@ -272764,7 +272765,7 @@ CVE-2024-5119,0,0,91893ccf3d5267b72a6b8ed10d2ba4560a7ea2a4bdb6a9260fec1e0619fdc1
|
|||||||
CVE-2024-51190,0,0,42252f42d57e549237c1e65576645654fa8f454c06ed81783464129f893b6230,2024-11-12T13:55:21.227000
|
CVE-2024-51190,0,0,42252f42d57e549237c1e65576645654fa8f454c06ed81783464129f893b6230,2024-11-12T13:55:21.227000
|
||||||
CVE-2024-5120,0,0,aa0bc8f3e284072bee9ea1e53af4826838bcd5e6353dff9b260a6c50ff30ddbc,2025-02-10T14:33:42.463000
|
CVE-2024-5120,0,0,aa0bc8f3e284072bee9ea1e53af4826838bcd5e6353dff9b260a6c50ff30ddbc,2025-02-10T14:33:42.463000
|
||||||
CVE-2024-51208,0,0,a59d692cb343382c726f4c6a51e70064bfbd58c7b1c1ae68bcfdeee9f98e2032,2025-03-13T17:15:33.210000
|
CVE-2024-51208,0,0,a59d692cb343382c726f4c6a51e70064bfbd58c7b1c1ae68bcfdeee9f98e2032,2025-03-13T17:15:33.210000
|
||||||
CVE-2024-51209,0,1,2acbc3e3e25af92d55848830d8628123b058e9a1fdf83b5e7f3e04674f33868a,2025-03-31T19:32:18.943000
|
CVE-2024-51209,0,0,2acbc3e3e25af92d55848830d8628123b058e9a1fdf83b5e7f3e04674f33868a,2025-03-31T19:32:18.943000
|
||||||
CVE-2024-5121,0,0,f13a957054662226d9f30e7797cd699fbbc4fb099f0a6c1363eaca0808d26e93,2025-02-10T14:33:01.420000
|
CVE-2024-5121,0,0,f13a957054662226d9f30e7797cd699fbbc4fb099f0a6c1363eaca0808d26e93,2025-02-10T14:33:01.420000
|
||||||
CVE-2024-51210,0,0,1dfb5793bbd38593e70df49e07cd7ee951e3036bdad9fedc179912099b41ccff,2024-12-05T18:15:22.090000
|
CVE-2024-51210,0,0,1dfb5793bbd38593e70df49e07cd7ee951e3036bdad9fedc179912099b41ccff,2024-12-05T18:15:22.090000
|
||||||
CVE-2024-51211,0,0,5bbcb137b1680696c02324cbd64119e5698f5bb8e272467c42227679b2a82406,2024-11-21T17:15:22.410000
|
CVE-2024-51211,0,0,5bbcb137b1680696c02324cbd64119e5698f5bb8e272467c42227679b2a82406,2024-11-21T17:15:22.410000
|
||||||
@ -273358,7 +273359,7 @@ CVE-2024-51934,0,0,efe96cb8fc68640b083cbe9be334ef1c2ebccacaa81f9de9e0dd9bb0982e2
|
|||||||
CVE-2024-51935,0,0,fb50d58711b2904c9889235a06a099f964a5dc2d960855b72c8c5020e8cc7467,2024-11-19T21:56:45.533000
|
CVE-2024-51935,0,0,fb50d58711b2904c9889235a06a099f964a5dc2d960855b72c8c5020e8cc7467,2024-11-19T21:56:45.533000
|
||||||
CVE-2024-51936,0,0,01ed82394fa093ff4d3b03b9d8dca58deb9d6f0168256baf25f9ae6ed15ae66d,2024-11-19T21:56:45.533000
|
CVE-2024-51936,0,0,01ed82394fa093ff4d3b03b9d8dca58deb9d6f0168256baf25f9ae6ed15ae66d,2024-11-19T21:56:45.533000
|
||||||
CVE-2024-51937,0,0,40f9bcab077c80d2c70e8068655769a90e334e94a3b2252e9eefae5aa1c7cf3f,2024-11-19T21:56:45.533000
|
CVE-2024-51937,0,0,40f9bcab077c80d2c70e8068655769a90e334e94a3b2252e9eefae5aa1c7cf3f,2024-11-19T21:56:45.533000
|
||||||
CVE-2024-51938,0,1,7f531483548183d746950131a91938a8eaa342b0a7690b882b3a3f83d4d6a283,2025-03-31T19:36:04.583000
|
CVE-2024-51938,0,0,7f531483548183d746950131a91938a8eaa342b0a7690b882b3a3f83d4d6a283,2025-03-31T19:36:04.583000
|
||||||
CVE-2024-51939,0,0,20d7c044823f2dbd5a93ccbf1e62122469f38a0e0e61d27f0eead27fdd2e22c5,2024-11-19T21:57:32.967000
|
CVE-2024-51939,0,0,20d7c044823f2dbd5a93ccbf1e62122469f38a0e0e61d27f0eead27fdd2e22c5,2024-11-19T21:57:32.967000
|
||||||
CVE-2024-5194,0,0,8d46b9bc1f0e922d7415f01b9e20c3241c30409b16aacd585324be8545f4e31e,2024-11-21T09:47:09.967000
|
CVE-2024-5194,0,0,8d46b9bc1f0e922d7415f01b9e20c3241c30409b16aacd585324be8545f4e31e,2024-11-21T09:47:09.967000
|
||||||
CVE-2024-51940,0,0,eea7140ef8e6920e3e5dd47ba7cd4d003e663b87564e69e84f825f175f7f9241,2024-11-19T21:57:32.967000
|
CVE-2024-51940,0,0,eea7140ef8e6920e3e5dd47ba7cd4d003e663b87564e69e84f825f175f7f9241,2024-11-19T21:57:32.967000
|
||||||
@ -275357,6 +275358,14 @@ CVE-2024-54792,0,0,98468856aeeedfaaa62e1fc26bc1fac81265f3b59cbbffb650074881345ba
|
|||||||
CVE-2024-54794,0,0,c49ffe9b769b5cd233f7d6bd6f86fb56ddf647e4b0a80553364112532cd337f3,2025-01-21T19:15:11.243000
|
CVE-2024-54794,0,0,c49ffe9b769b5cd233f7d6bd6f86fb56ddf647e4b0a80553364112532cd337f3,2025-01-21T19:15:11.243000
|
||||||
CVE-2024-54795,0,0,189377580c088768ee02d63dd643544c9e329d819648f0ba84334338aef4e9e3,2025-01-21T19:15:11.407000
|
CVE-2024-54795,0,0,189377580c088768ee02d63dd643544c9e329d819648f0ba84334338aef4e9e3,2025-01-21T19:15:11.407000
|
||||||
CVE-2024-5480,0,0,dcddee05a122e48deec7dd054d03a98cfc3767234733af70ab63ade31364815f,2024-10-02T16:15:10.913000
|
CVE-2024-5480,0,0,dcddee05a122e48deec7dd054d03a98cfc3767234733af70ab63ade31364815f,2024-10-02T16:15:10.913000
|
||||||
|
CVE-2024-54802,1,1,3a4102a7c0b6c4258870e143dca9a56c73080cc779032a88035f11e358fc1ca8,2025-03-31T21:15:47.203000
|
||||||
|
CVE-2024-54803,1,1,192193603a5ebe46711b4e83a4bcb956f7781970a1dc4a31466e95cc44190532,2025-03-31T21:15:47.377000
|
||||||
|
CVE-2024-54804,1,1,af2de00afb414e1889120d5577cb01186c8c976bf5a04b1c87e0ebfdd9d92249,2025-03-31T21:15:47.560000
|
||||||
|
CVE-2024-54805,1,1,5408c1dbb379ed12ed0d05a63b489762204909515ac58e7c7c0fff6f2fe52925,2025-03-31T21:15:47.737000
|
||||||
|
CVE-2024-54806,1,1,702336dd48eeff3593dd350dbacfa5f362a1a00a9dc2c7f5eaafefb7ffc2c01e,2025-03-31T21:15:47.923000
|
||||||
|
CVE-2024-54807,1,1,1bc8e591f4370077ab227b516ceb005453d45fc6ec62e61feffece8184ca988e,2025-03-31T21:15:48.090000
|
||||||
|
CVE-2024-54808,1,1,508e5d76c1f49651c6875f8083cbf64a337b83d81086dd089faff099fb56b7d3,2025-03-31T21:15:48.310000
|
||||||
|
CVE-2024-54809,1,1,d63d8ba3b33563d57fd43edfe1b118d91737ff7f45d096d6bfd7931bcefdd13d,2025-03-31T21:15:48.527000
|
||||||
CVE-2024-5481,0,0,6aaa03c1e132f74e5c4e90ead29bd24eb7065ad2c73e1f2805fbc82099451674,2024-11-21T09:47:45.877000
|
CVE-2024-5481,0,0,6aaa03c1e132f74e5c4e90ead29bd24eb7065ad2c73e1f2805fbc82099451674,2024-11-21T09:47:45.877000
|
||||||
CVE-2024-54810,0,0,98b1b32485df996df7d9929d6a4a4f3f6576d87de7e3a8405b0f88648f287e10,2024-12-13T18:15:21.707000
|
CVE-2024-54810,0,0,98b1b32485df996df7d9929d6a4a4f3f6576d87de7e3a8405b0f88648f287e10,2024-12-13T18:15:21.707000
|
||||||
CVE-2024-54811,0,0,c518d2be0055f2f694c9ca48885a5257eabcc0287b36c8555688778fe5e578d7,2024-12-13T18:15:21.940000
|
CVE-2024-54811,0,0,c518d2be0055f2f694c9ca48885a5257eabcc0287b36c8555688778fe5e578d7,2024-12-13T18:15:21.940000
|
||||||
@ -277962,7 +277971,7 @@ CVE-2024-6624,0,0,552d36257e8bfaa4330013290315eab120066dcc2d886a9d94d7a9269b76a4
|
|||||||
CVE-2024-6625,0,0,1b1c39349f634a560833a8b14095d12391f881dda66986404d732704553d9c8a,2024-11-21T09:50:01.480000
|
CVE-2024-6625,0,0,1b1c39349f634a560833a8b14095d12391f881dda66986404d732704553d9c8a,2024-11-21T09:50:01.480000
|
||||||
CVE-2024-6626,0,0,249866bf2ce6f0742e7ebbb55a39f819e02fa1bb5ce90e67c70e877b0a80889f,2024-11-08T21:18:44.400000
|
CVE-2024-6626,0,0,249866bf2ce6f0742e7ebbb55a39f819e02fa1bb5ce90e67c70e877b0a80889f,2024-11-08T21:18:44.400000
|
||||||
CVE-2024-6627,0,0,46c1b50f2f4fc4f4915a5d60c7232a25ef2d8e7212d2215183cdea5ab45a44d0,2025-02-06T17:40:50.280000
|
CVE-2024-6627,0,0,46c1b50f2f4fc4f4915a5d60c7232a25ef2d8e7212d2215183cdea5ab45a44d0,2025-02-06T17:40:50.280000
|
||||||
CVE-2024-6628,0,1,8d496fa7bba218fa6816b17098bcf8cd1de8a287cedeed63670cc804578db4fe,2025-03-31T19:58:57.527000
|
CVE-2024-6628,0,0,8d496fa7bba218fa6816b17098bcf8cd1de8a287cedeed63670cc804578db4fe,2025-03-31T19:58:57.527000
|
||||||
CVE-2024-6629,0,0,a527624ccafa4d4e16277a177029cdaa056a5fd7eb7a8772535daaafb91b33a4,2024-11-21T09:50:01.973000
|
CVE-2024-6629,0,0,a527624ccafa4d4e16277a177029cdaa056a5fd7eb7a8772535daaafb91b33a4,2024-11-21T09:50:01.973000
|
||||||
CVE-2024-6630,0,0,7742b604143993a9d769b9ab9c3e5aab85337a51e6772bb186961af80d29fee2,2024-07-10T18:15:05.407000
|
CVE-2024-6630,0,0,7742b604143993a9d769b9ab9c3e5aab85337a51e6772bb186961af80d29fee2,2024-07-10T18:15:05.407000
|
||||||
CVE-2024-6631,0,0,6814ab0364b6ced1872d70e3966a7eb63a524daa89dd6b575b0ac22e27afca55,2024-09-12T20:39:22.493000
|
CVE-2024-6631,0,0,6814ab0364b6ced1872d70e3966a7eb63a524daa89dd6b575b0ac22e27afca55,2024-09-12T20:39:22.493000
|
||||||
@ -278353,7 +278362,7 @@ CVE-2024-7050,0,0,06f451073f052c5171cdc858230f8ac0bfc1cd03261b82c9e4025ffcee809a
|
|||||||
CVE-2024-7051,0,0,d0158d1d3b2cdd12dcaf8ff0c61b0f7cdef559e08a0a05011bfe1940648c764c,2024-08-30T16:15:10.960000
|
CVE-2024-7051,0,0,d0158d1d3b2cdd12dcaf8ff0c61b0f7cdef559e08a0a05011bfe1940648c764c,2024-08-30T16:15:10.960000
|
||||||
CVE-2024-7052,0,0,b869d4be8a9ef05b526f5074ec778788ff68c0dc06586eacf01aecd8a404162d,2025-02-14T17:15:18.480000
|
CVE-2024-7052,0,0,b869d4be8a9ef05b526f5074ec778788ff68c0dc06586eacf01aecd8a404162d,2025-02-14T17:15:18.480000
|
||||||
CVE-2024-7053,0,0,7720c82c430e328b75c680ca5e5d109c9bc5d455075089b23f69681b09912d0e,2025-03-20T14:15:21.553000
|
CVE-2024-7053,0,0,7720c82c430e328b75c680ca5e5d109c9bc5d455075089b23f69681b09912d0e,2025-03-20T14:15:21.553000
|
||||||
CVE-2024-7054,0,1,7df23b9647e9776ce9f3d05a4e54f924a44fe3a231ecd255041316cf38333e70,2025-03-31T18:27:47.530000
|
CVE-2024-7054,0,0,7df23b9647e9776ce9f3d05a4e54f924a44fe3a231ecd255041316cf38333e70,2025-03-31T18:27:47.530000
|
||||||
CVE-2024-7055,0,0,9935f1de2cee66b07954ad120fe6ce5f54f36d3188fd3d2bc5c8e7d48d543152,2024-08-06T16:30:24.547000
|
CVE-2024-7055,0,0,9935f1de2cee66b07954ad120fe6ce5f54f36d3188fd3d2bc5c8e7d48d543152,2024-08-06T16:30:24.547000
|
||||||
CVE-2024-7056,0,0,ec08ae131187a52a9d1409d290e6919fd556ee74677249d587bb18cc1ea21e30,2024-11-25T14:15:07.457000
|
CVE-2024-7056,0,0,ec08ae131187a52a9d1409d290e6919fd556ee74677249d587bb18cc1ea21e30,2024-11-25T14:15:07.457000
|
||||||
CVE-2024-7057,0,0,3c6ad5d4517bec5901108debd01a08995bd05bb08470aa05a322d034ebbe1d3e,2024-11-21T09:50:48.570000
|
CVE-2024-7057,0,0,3c6ad5d4517bec5901108debd01a08995bd05bb08470aa05a322d034ebbe1d3e,2024-11-21T09:50:48.570000
|
||||||
@ -280174,7 +280183,7 @@ CVE-2024-9033,0,0,c9ce8f3f22810e314a9b6a7070f369471d9e5df9eced517c322686d35f96ab
|
|||||||
CVE-2024-9034,0,0,90bd5bffc39325b9c6cc2c7df19844bf0675ae9032a75556de19fb8cc5e5a6ba,2024-09-26T13:32:55.343000
|
CVE-2024-9034,0,0,90bd5bffc39325b9c6cc2c7df19844bf0675ae9032a75556de19fb8cc5e5a6ba,2024-09-26T13:32:55.343000
|
||||||
CVE-2024-9035,0,0,c836add5f9ea0f6ba01095ded6458386ae8fd2f11d68cb367cc7ade58ddaa024,2024-09-26T13:32:55.343000
|
CVE-2024-9035,0,0,c836add5f9ea0f6ba01095ded6458386ae8fd2f11d68cb367cc7ade58ddaa024,2024-09-26T13:32:55.343000
|
||||||
CVE-2024-9036,0,0,3bbbfc98a85d5f78d43560ecd3c231db4288c62659683b5c35ebd015a776ac19,2024-09-26T13:32:55.343000
|
CVE-2024-9036,0,0,3bbbfc98a85d5f78d43560ecd3c231db4288c62659683b5c35ebd015a776ac19,2024-09-26T13:32:55.343000
|
||||||
CVE-2024-9037,0,1,61d7d575e9833b1f71caeb12a0ed3faa0ea60057248b15da1a13008ecf46898b,2025-03-31T18:55:16.680000
|
CVE-2024-9037,0,0,61d7d575e9833b1f71caeb12a0ed3faa0ea60057248b15da1a13008ecf46898b,2025-03-31T18:55:16.680000
|
||||||
CVE-2024-9038,0,0,902b50c6d930b124e106a40fd3471c27a76d7b215b07dd7cda1cc7b7441c1dbd,2024-09-27T16:11:37.710000
|
CVE-2024-9038,0,0,902b50c6d930b124e106a40fd3471c27a76d7b215b07dd7cda1cc7b7441c1dbd,2024-09-27T16:11:37.710000
|
||||||
CVE-2024-9039,0,0,c2deaade23da482813d66248554a49a9e73a2b63627babab6e443384d154782e,2024-09-27T15:58:22.493000
|
CVE-2024-9039,0,0,c2deaade23da482813d66248554a49a9e73a2b63627babab6e443384d154782e,2024-09-27T15:58:22.493000
|
||||||
CVE-2024-9040,0,0,be63bc9a723d2aaddace773ab8ae6f6ce5897ce1c02995f8071d9bda756dd77c,2024-09-27T15:53:28.333000
|
CVE-2024-9040,0,0,be63bc9a723d2aaddace773ab8ae6f6ce5897ce1c02995f8071d9bda756dd77c,2024-09-27T15:53:28.333000
|
||||||
@ -283312,6 +283321,7 @@ CVE-2025-2189,0,0,21362a35b576822cdfa735714de3fa8c2b76316e693eaa457f9b76275fa21b
|
|||||||
CVE-2025-21890,0,0,3e452c883c787bf57ab5be0b0e5aa90feed93eaffae235cb89507607056595a5,2025-03-27T16:45:12.210000
|
CVE-2025-21890,0,0,3e452c883c787bf57ab5be0b0e5aa90feed93eaffae235cb89507607056595a5,2025-03-27T16:45:12.210000
|
||||||
CVE-2025-21891,0,0,a253456cafaa3a78ec959ae9d1e060c416fbd075d583d9a377a6f3a26384270e,2025-03-27T16:45:12.210000
|
CVE-2025-21891,0,0,a253456cafaa3a78ec959ae9d1e060c416fbd075d583d9a377a6f3a26384270e,2025-03-27T16:45:12.210000
|
||||||
CVE-2025-21892,0,0,8c98329172bed9a8b6c22457d316cbe2e25dcbfb066893d9b84a9f2d473cdf83,2025-03-27T16:45:12.210000
|
CVE-2025-21892,0,0,8c98329172bed9a8b6c22457d316cbe2e25dcbfb066893d9b84a9f2d473cdf83,2025-03-27T16:45:12.210000
|
||||||
|
CVE-2025-21893,1,1,4a7f56dfa32cca5916bdfdd25b8f2f0cf25de87af7a79afe4879360d1a287b49,2025-03-31T21:15:49.307000
|
||||||
CVE-2025-2190,0,0,2ad046c01e8fde47102d510f1e691e56d4505e286b09d0c88b5a5f7442f2c96e,2025-03-11T14:15:27.163000
|
CVE-2025-2190,0,0,2ad046c01e8fde47102d510f1e691e56d4505e286b09d0c88b5a5f7442f2c96e,2025-03-11T14:15:27.163000
|
||||||
CVE-2025-2191,0,0,435c67fbe91d200be556fa2bda480273212858b72f473ce6d41f73706042d56e,2025-03-11T12:15:12.277000
|
CVE-2025-2191,0,0,435c67fbe91d200be556fa2bda480273212858b72f473ce6d41f73706042d56e,2025-03-11T12:15:12.277000
|
||||||
CVE-2025-2192,0,0,154f3902bcd5e64a72bf0ae06aa3f84eb0e5031d75ead63c96aedd6785aca290,2025-03-11T14:15:27.443000
|
CVE-2025-2192,0,0,154f3902bcd5e64a72bf0ae06aa3f84eb0e5031d75ead63c96aedd6785aca290,2025-03-11T14:15:27.443000
|
||||||
@ -285613,7 +285623,7 @@ CVE-2025-25567,0,0,0e3c48ab6a4496288811058f80eb7d29339ca7638242416df9fb706fe2ad4
|
|||||||
CVE-2025-25568,0,0,dcddcadc1916e01c6212aad8a0f1d787a9f9a493dfbdbc2db4d93a5e91a64889,2025-03-19T19:15:44.790000
|
CVE-2025-25568,0,0,dcddcadc1916e01c6212aad8a0f1d787a9f9a493dfbdbc2db4d93a5e91a64889,2025-03-19T19:15:44.790000
|
||||||
CVE-2025-2557,0,0,a42b70c78dcd89b9d3e57fec472337c34078e8807b7744b63a4210d869265076,2025-03-20T19:15:38.220000
|
CVE-2025-2557,0,0,a42b70c78dcd89b9d3e57fec472337c34078e8807b7744b63a4210d869265076,2025-03-20T19:15:38.220000
|
||||||
CVE-2025-25570,0,0,a1a60fff83d4e58f97f6cb73bc995dd008cce7cbdda97b57369c1d11bafc9be9,2025-02-28T22:15:39.630000
|
CVE-2025-25570,0,0,a1a60fff83d4e58f97f6cb73bc995dd008cce7cbdda97b57369c1d11bafc9be9,2025-02-28T22:15:39.630000
|
||||||
CVE-2025-25579,0,1,5d939121eb276c7ecee1a29df62e11fe223cac6be7be94a5d22d93cbcd0562dd,2025-03-31T18:15:32.783000
|
CVE-2025-25579,0,0,5d939121eb276c7ecee1a29df62e11fe223cac6be7be94a5d22d93cbcd0562dd,2025-03-31T18:15:32.783000
|
||||||
CVE-2025-25580,0,0,981db6fd6e3e758c95a7a3f18e0cb48f5883f5e68031cb88007741a3d3ada90e,2025-03-19T19:15:44.917000
|
CVE-2025-25580,0,0,981db6fd6e3e758c95a7a3f18e0cb48f5883f5e68031cb88007741a3d3ada90e,2025-03-19T19:15:44.917000
|
||||||
CVE-2025-25582,0,0,71a429a4688f0b98eba65a76fc9404b2639d529bc96a639c12359f9c6efb4809,2025-03-19T19:15:45.050000
|
CVE-2025-25582,0,0,71a429a4688f0b98eba65a76fc9404b2639d529bc96a639c12359f9c6efb4809,2025-03-19T19:15:45.050000
|
||||||
CVE-2025-25585,0,0,aa4f3350849e7a6d1d328ba035f3acd3940e4357ca726a2c6819200e720715c1,2025-03-19T19:15:45.203000
|
CVE-2025-25585,0,0,aa4f3350849e7a6d1d328ba035f3acd3940e4357ca726a2c6819200e720715c1,2025-03-19T19:15:45.203000
|
||||||
@ -286339,11 +286349,11 @@ CVE-2025-27162,0,0,c8a873ec2f347494d3d41f4d6681990bc645e58bd3c39e33b011e49921441
|
|||||||
CVE-2025-27163,0,0,be9f753c41485f106d11ef9915fc4e361a052626e525b314de4c44cc95c404c0,2025-03-12T14:15:16.447000
|
CVE-2025-27163,0,0,be9f753c41485f106d11ef9915fc4e361a052626e525b314de4c44cc95c404c0,2025-03-12T14:15:16.447000
|
||||||
CVE-2025-27164,0,0,03f0ef0c440ec2fdb9d4dc234d5039887fd3a0dc69a422dcc0d797b26efec6e3,2025-03-12T14:15:16.557000
|
CVE-2025-27164,0,0,03f0ef0c440ec2fdb9d4dc234d5039887fd3a0dc69a422dcc0d797b26efec6e3,2025-03-12T14:15:16.557000
|
||||||
CVE-2025-27166,0,0,b79788c4fdccc241a4bf7f90619735b442ab253b044d6be62992503f1b3e47a6,2025-03-11T18:15:34.580000
|
CVE-2025-27166,0,0,b79788c4fdccc241a4bf7f90619735b442ab253b044d6be62992503f1b3e47a6,2025-03-11T18:15:34.580000
|
||||||
CVE-2025-27167,0,0,482f29e987878fe25988a572ce45a267c50ddf32167f67d5c354d3bbaff05d77,2025-03-11T18:15:34.730000
|
CVE-2025-27167,0,1,9fc03919f99441cc6e5924699f0b5c87cd969352015206acd2e76f4d0a20cd30,2025-03-31T20:06:44.963000
|
||||||
CVE-2025-27168,0,0,807af9ba36e5529c822db751bf81df9cf34521f5f9d52647f44b26e4df0d5dd0,2025-03-11T18:15:34.893000
|
CVE-2025-27168,0,1,c854660c04ae74863042de804529bb7219f13c8265d2faffac9e2184be17e3fe,2025-03-31T20:06:08.030000
|
||||||
CVE-2025-27169,0,0,d5608e0c74c50f0a7a42281f3fdcdcaa1a3d612052706dc929ba06e7701adb33,2025-03-11T18:15:35.077000
|
CVE-2025-27169,0,0,d5608e0c74c50f0a7a42281f3fdcdcaa1a3d612052706dc929ba06e7701adb33,2025-03-11T18:15:35.077000
|
||||||
CVE-2025-2717,0,0,a2a688c228e7eb03eb19b61a2532f80168264fd17e51134150518690e88bab28,2025-03-27T16:45:46.410000
|
CVE-2025-2717,0,0,a2a688c228e7eb03eb19b61a2532f80168264fd17e51134150518690e88bab28,2025-03-27T16:45:46.410000
|
||||||
CVE-2025-27170,0,0,b96e4ffaebc56916f484b466d583f7d3b36625d540473ebe18865b2b793f41b3,2025-03-11T18:15:35.227000
|
CVE-2025-27170,0,1,4798b678d1edbc7dfece125d548cec25bb6248e6edea565df19aaaea350e970e,2025-03-31T20:02:08.903000
|
||||||
CVE-2025-27171,0,0,11bfabbfe795ecd5b004555bf156a1f2031ec4849cea31dc93fa58c4a625d087,2025-03-11T18:15:35.377000
|
CVE-2025-27171,0,0,11bfabbfe795ecd5b004555bf156a1f2031ec4849cea31dc93fa58c4a625d087,2025-03-11T18:15:35.377000
|
||||||
CVE-2025-27172,0,0,1fbf8b09dd6176ac8d843dcc615a1bf482be9a0380a5c5839de3ae8abc924dc0,2025-03-11T17:16:44.420000
|
CVE-2025-27172,0,0,1fbf8b09dd6176ac8d843dcc615a1bf482be9a0380a5c5839de3ae8abc924dc0,2025-03-11T17:16:44.420000
|
||||||
CVE-2025-27173,0,0,d2957505941740af6a42c6319581f72d9d2dd8e1c5b9f1c7029eb0863a6e0c67,2025-03-11T21:15:42.307000
|
CVE-2025-27173,0,0,d2957505941740af6a42c6319581f72d9d2dd8e1c5b9f1c7029eb0863a6e0c67,2025-03-11T21:15:42.307000
|
||||||
@ -286698,13 +286708,13 @@ CVE-2025-28011,0,0,fdcb5591ea26e059e8d35048712169c6e42fd9f817189e1097ee50f0c5ccd
|
|||||||
CVE-2025-28015,0,0,2ec3b03d6a2c5b451e55cb244fde2066264789b2e32a98f716bffd5d4cc31009,2025-03-28T19:49:16.520000
|
CVE-2025-28015,0,0,2ec3b03d6a2c5b451e55cb244fde2066264789b2e32a98f716bffd5d4cc31009,2025-03-28T19:49:16.520000
|
||||||
CVE-2025-2803,0,0,aea0c457978a84bf5185af25a34152b6f525228f24aa7933021e5368f307da22,2025-03-29T07:15:18.770000
|
CVE-2025-2803,0,0,aea0c457978a84bf5185af25a34152b6f525228f24aa7933021e5368f307da22,2025-03-29T07:15:18.770000
|
||||||
CVE-2025-2804,0,0,920f730e5efd8732e0e5abb52416672a1a115bcae2eab5cbf394b4b15549c65b,2025-03-28T18:11:40.180000
|
CVE-2025-2804,0,0,920f730e5efd8732e0e5abb52416672a1a115bcae2eab5cbf394b4b15549c65b,2025-03-28T18:11:40.180000
|
||||||
CVE-2025-28087,0,0,a083116acf70a088348013bdd27f52f04c87f16d9dd7398d42c6f7120e98d2af,2025-03-28T22:15:17.717000
|
CVE-2025-28087,0,1,99ff68793ff561c53991516e6858da6f9fb2ba20569700be50a56f72c6c94e8c,2025-03-31T21:15:52.970000
|
||||||
CVE-2025-28089,0,0,55f44d2427798bd3e256ca55bca62ba0a32c851325aedfb0df89721b1e121c5f,2025-03-28T22:15:17.847000
|
CVE-2025-28089,0,1,18f3d3abab164a0919170c1bf1ca2024f9a0c6def48cc9e42a79859b62355583,2025-03-31T21:15:53.133000
|
||||||
CVE-2025-28090,0,0,6f9f220ae0185a93de530a112ef6866e689dfdcdd268a4483e27c677f80b8df8,2025-03-28T22:15:17.980000
|
CVE-2025-28090,0,1,460ab53b1e36837aca74081864b1733eb6fef90892f911c9f9bf809cb11369a5,2025-03-31T20:15:14.967000
|
||||||
CVE-2025-28091,0,0,e9eb73da16a1e1ebd7ccc9c4de8f5a66b42f4596b5cfb86129d2dfa324680177,2025-03-28T22:15:18.107000
|
CVE-2025-28091,0,1,733d641f537c0daa2763e825a3541d600d1b34d5d840a65ee2cce378da0172de,2025-03-31T21:15:53.287000
|
||||||
CVE-2025-28092,0,0,67281ba6ae9fe6b82cabba74a4b589f6e13899072cae60ba58e4096063bd9fce,2025-03-28T22:15:18.237000
|
CVE-2025-28092,0,1,ce2fc65993a7770d015575705c8546f2b5d9b1a3206d36ccd201861e6650a0b0,2025-03-31T20:15:15.203000
|
||||||
CVE-2025-28093,0,0,0f75d6032cdd86e0fdfd7eb67c7196f1d5298411cf0156c82964fa444bc3986c,2025-03-28T22:15:18.410000
|
CVE-2025-28093,0,1,0db5efaab21895470fe1bf42a856b01d320239c4d837e7ccab2e9e129e18f465,2025-03-31T20:15:15.363000
|
||||||
CVE-2025-28094,0,1,ca6bedfa8e464efc37dc706e258708723d2ac1c1298ac529e150b4cdda83f083,2025-03-31T18:15:33.010000
|
CVE-2025-28094,0,0,ca6bedfa8e464efc37dc706e258708723d2ac1c1298ac529e150b4cdda83f083,2025-03-31T18:15:33.010000
|
||||||
CVE-2025-28096,0,0,16d024745a7aef83121952f4fe39c64486ee7ed76aa52fcde001a2a6410e237e,2025-03-31T17:15:40.403000
|
CVE-2025-28096,0,0,16d024745a7aef83121952f4fe39c64486ee7ed76aa52fcde001a2a6410e237e,2025-03-31T17:15:40.403000
|
||||||
CVE-2025-28097,0,0,7b978a840b839efdbb92782b35164535e64ad57d5c7c1ac6787e57af8db77906,2025-03-28T22:15:18.827000
|
CVE-2025-28097,0,0,7b978a840b839efdbb92782b35164535e64ad57d5c7c1ac6787e57af8db77906,2025-03-28T22:15:18.827000
|
||||||
CVE-2025-28135,0,0,ce5da46c9ae66e075cac4fbd39873077e479e00a68bacb4de079df96e23d166b,2025-03-28T17:15:28.550000
|
CVE-2025-28135,0,0,ce5da46c9ae66e075cac4fbd39873077e479e00a68bacb4de079df96e23d166b,2025-03-28T17:15:28.550000
|
||||||
@ -286994,7 +287004,7 @@ CVE-2025-2990,0,0,9e58b2fa7f0db839eeed13ac974d5dc271117bb2e9ce130153ef40d31c37cc
|
|||||||
CVE-2025-29903,0,0,10c68e7ddaac62cfaf56fa2d0c36952343de94dcaf74d7de9700d239804e47d3,2025-03-12T13:15:37.823000
|
CVE-2025-29903,0,0,10c68e7ddaac62cfaf56fa2d0c36952343de94dcaf74d7de9700d239804e47d3,2025-03-12T13:15:37.823000
|
||||||
CVE-2025-29904,0,0,8151be9d68bba0e8c527ecea5490dd29fd8894724b2933080703a0ecee03e639,2025-03-12T13:15:38.050000
|
CVE-2025-29904,0,0,8151be9d68bba0e8c527ecea5490dd29fd8894724b2933080703a0ecee03e639,2025-03-12T13:15:38.050000
|
||||||
CVE-2025-29907,0,0,630761e684cdf47ad290db608dea22d61cb6820178858ded042fbee7359f058b,2025-03-18T19:15:51.197000
|
CVE-2025-29907,0,0,630761e684cdf47ad290db608dea22d61cb6820178858ded042fbee7359f058b,2025-03-18T19:15:51.197000
|
||||||
CVE-2025-29908,1,1,0d1c357cefb5d4d044e0ce372f570977795acdddd7899e18a82b0735522a38bd,2025-03-31T19:15:40.367000
|
CVE-2025-29908,0,0,0d1c357cefb5d4d044e0ce372f570977795acdddd7899e18a82b0735522a38bd,2025-03-31T19:15:40.367000
|
||||||
CVE-2025-29909,0,0,63c6e761924bf096ec7d819f389c28c4b1d7a8c4b34a3508047a025be39f7788,2025-03-18T14:15:43.803000
|
CVE-2025-29909,0,0,63c6e761924bf096ec7d819f389c28c4b1d7a8c4b34a3508047a025be39f7788,2025-03-18T14:15:43.803000
|
||||||
CVE-2025-2991,0,0,cf6d69e7615143d5a585d26b547b3530c6beb880a98c9a55d6170ec976c1b8f2,2025-03-31T11:15:39.160000
|
CVE-2025-2991,0,0,cf6d69e7615143d5a585d26b547b3530c6beb880a98c9a55d6170ec976c1b8f2,2025-03-31T11:15:39.160000
|
||||||
CVE-2025-29910,0,0,17418d93c360088fb66ebccca58b51ead2474e70341b6b176cd0d5acb2eed2d6,2025-03-18T14:15:43.913000
|
CVE-2025-29910,0,0,17418d93c360088fb66ebccca58b51ead2474e70341b6b176cd0d5acb2eed2d6,2025-03-18T14:15:43.913000
|
||||||
@ -287032,25 +287042,27 @@ CVE-2025-30004,0,0,1364d107bb6c7f41c95a057bca66f2aa1afe5de34c484fea06ad70bb85a67
|
|||||||
CVE-2025-30005,0,0,16505715170d88cde58145933126fb581063c9cbd194515fa6e178a97b7eb38f,2025-03-31T17:15:41.880000
|
CVE-2025-30005,0,0,16505715170d88cde58145933126fb581063c9cbd194515fa6e178a97b7eb38f,2025-03-31T17:15:41.880000
|
||||||
CVE-2025-30006,0,0,94dbaa3c46ffedfc3603ead204fb6ce24795883ef875e52a66e81cb24e1573ed,2025-03-31T17:15:42.020000
|
CVE-2025-30006,0,0,94dbaa3c46ffedfc3603ead204fb6ce24795883ef875e52a66e81cb24e1573ed,2025-03-31T17:15:42.020000
|
||||||
CVE-2025-3001,0,0,6783170e18f794e5e0220e82172d0170aca6943d1ee9cf4188f46e9839779a5a,2025-03-31T16:15:27.277000
|
CVE-2025-3001,0,0,6783170e18f794e5e0220e82172d0170aca6943d1ee9cf4188f46e9839779a5a,2025-03-31T16:15:27.277000
|
||||||
CVE-2025-3002,0,1,31254f82336e62811d3675fbc17d806beda70782dc6467cfa7c14849ff699d05,2025-03-31T19:15:43.390000
|
CVE-2025-3002,0,0,31254f82336e62811d3675fbc17d806beda70782dc6467cfa7c14849ff699d05,2025-03-31T19:15:43.390000
|
||||||
CVE-2025-30022,0,0,c29865dc2c1c53a7dddbda80ab65c0b183de989ceaa003da3dfe172b934c1c01,2025-03-19T19:15:50.703000
|
CVE-2025-30022,0,0,c29865dc2c1c53a7dddbda80ab65c0b183de989ceaa003da3dfe172b934c1c01,2025-03-19T19:15:50.703000
|
||||||
CVE-2025-3003,0,0,fae928727d58bdd1e791ffc9c9e860a745865a854a222942833fd71e698ef09d,2025-03-31T17:15:43.557000
|
CVE-2025-3003,0,0,fae928727d58bdd1e791ffc9c9e860a745865a854a222942833fd71e698ef09d,2025-03-31T17:15:43.557000
|
||||||
CVE-2025-3004,0,1,1b1a33d3221a15bb48ac0f67bb6e59953f99b6c918e266711e7564b830656b2f,2025-03-31T19:15:43.613000
|
CVE-2025-3004,0,0,1b1a33d3221a15bb48ac0f67bb6e59953f99b6c918e266711e7564b830656b2f,2025-03-31T19:15:43.613000
|
||||||
CVE-2025-3005,1,1,e8d18a39da8bec5bfe9835be84291d8cf2a7d3c6835d8a510fc7c4892e6b278a,2025-03-31T18:15:34.180000
|
CVE-2025-3005,0,0,e8d18a39da8bec5bfe9835be84291d8cf2a7d3c6835d8a510fc7c4892e6b278a,2025-03-31T18:15:34.180000
|
||||||
CVE-2025-3006,1,1,2d33ee538d0bbe357b92b9a59900f1f8aa3ec564493ed3f392da23820ed4350b,2025-03-31T18:15:34.413000
|
CVE-2025-3006,0,0,2d33ee538d0bbe357b92b9a59900f1f8aa3ec564493ed3f392da23820ed4350b,2025-03-31T18:15:34.413000
|
||||||
CVE-2025-30066,0,0,7f23398934e792b1c90dbe88228c40d734b32c51332b192223c783ade90f06e4,2025-03-29T01:00:02.337000
|
CVE-2025-30066,0,0,7f23398934e792b1c90dbe88228c40d734b32c51332b192223c783ade90f06e4,2025-03-29T01:00:02.337000
|
||||||
CVE-2025-30067,0,0,63d999ebc0b33c0cceea6e046469ec2f368e6f60354a2b2a24d59bf06e6b7bef,2025-03-27T18:17:36.267000
|
CVE-2025-30067,0,0,63d999ebc0b33c0cceea6e046469ec2f368e6f60354a2b2a24d59bf06e6b7bef,2025-03-27T18:17:36.267000
|
||||||
CVE-2025-3007,1,1,600ae9144fe6b576066fa764c55adc3b9ad15d8bf179e66f0114aa1fe8496eb3,2025-03-31T19:15:43.860000
|
CVE-2025-3007,0,0,600ae9144fe6b576066fa764c55adc3b9ad15d8bf179e66f0114aa1fe8496eb3,2025-03-31T19:15:43.860000
|
||||||
CVE-2025-30073,0,0,34725e2ee66a680252fcf6be47611a992f4a93cad025a76602eb6cbba6a5215b,2025-03-27T16:45:27.850000
|
CVE-2025-30073,0,0,34725e2ee66a680252fcf6be47611a992f4a93cad025a76602eb6cbba6a5215b,2025-03-27T16:45:27.850000
|
||||||
CVE-2025-30074,0,0,c994f8833240724dd3b207dc3daf9a3403659cb85de62da850d9ebebe8cf0f27,2025-03-16T03:15:39.117000
|
CVE-2025-30074,0,0,c994f8833240724dd3b207dc3daf9a3403659cb85de62da850d9ebebe8cf0f27,2025-03-16T03:15:39.117000
|
||||||
CVE-2025-30076,0,0,ae70a6cce406a05e108d38c82fa058b5f2fc46a32f1bafe789b6ecdef84b3c03,2025-03-17T16:15:28.220000
|
CVE-2025-30076,0,0,ae70a6cce406a05e108d38c82fa058b5f2fc46a32f1bafe789b6ecdef84b3c03,2025-03-17T16:15:28.220000
|
||||||
CVE-2025-30077,0,0,3552a491790a6839d39471705d681d0b56a0da48a2daaa633f419312864c12e5,2025-03-17T16:15:28.360000
|
CVE-2025-30077,0,0,3552a491790a6839d39471705d681d0b56a0da48a2daaa633f419312864c12e5,2025-03-17T16:15:28.360000
|
||||||
CVE-2025-3008,1,1,a039dd199d432daa0649a2bf01f67d9e9353b33e21ee900eb9843641001ac6ea,2025-03-31T19:15:44.060000
|
CVE-2025-3008,0,0,a039dd199d432daa0649a2bf01f67d9e9353b33e21ee900eb9843641001ac6ea,2025-03-31T19:15:44.060000
|
||||||
CVE-2025-30089,0,0,94fa5ca45d8355546d9ceb129470f63603acc7f5a96fbd0d387c59c0d7484c0e,2025-03-17T16:15:28.507000
|
CVE-2025-30089,0,0,94fa5ca45d8355546d9ceb129470f63603acc7f5a96fbd0d387c59c0d7484c0e,2025-03-17T16:15:28.507000
|
||||||
|
CVE-2025-3009,1,1,4f85d1e7e08b0ed48fca7ac201b457402e7371fffd1a072fc4da4be6d359b5b1,2025-03-31T20:15:15.850000
|
||||||
CVE-2025-30091,0,0,39538125ede0e29a71cad30eeddad6386506108313b0620cfdbf5d936f5285c5,2025-03-27T16:45:46.410000
|
CVE-2025-30091,0,0,39538125ede0e29a71cad30eeddad6386506108313b0620cfdbf5d936f5285c5,2025-03-27T16:45:46.410000
|
||||||
CVE-2025-30092,0,0,81be76bd5e4d358e5e497793b136a481ab98791f4e442314445db080e37b822d,2025-03-24T14:15:20.007000
|
CVE-2025-30092,0,0,81be76bd5e4d358e5e497793b136a481ab98791f4e442314445db080e37b822d,2025-03-24T14:15:20.007000
|
||||||
CVE-2025-30093,0,0,655931c237d66508239faf3d38e961694a438293c2ddfd8c753f3093a3e9d18e,2025-03-28T18:11:40.180000
|
CVE-2025-30093,0,0,655931c237d66508239faf3d38e961694a438293c2ddfd8c753f3093a3e9d18e,2025-03-28T18:11:40.180000
|
||||||
CVE-2025-30095,0,0,b9f53d0615109fa8a40a64e91748d4558a1f7b46ead0706de16c5ce66b014a08,2025-03-31T15:15:44.843000
|
CVE-2025-30095,0,1,961f91ea6e39b3b6dbb8556a6976c468608b0031b978e5f73b127b8f2e65064d,2025-03-31T21:15:53.653000
|
||||||
|
CVE-2025-3010,1,1,f723b3e2db26da254387f80fa5fe1ab59324981dd2dd4ccd0c3a29fdf242986b,2025-03-31T20:15:16.023000
|
||||||
CVE-2025-30106,0,0,d0ec2fed531a791fcdb7e275c6cc676f11c96b4c23a970884370a41e87a3b6a0,2025-03-21T17:15:40.227000
|
CVE-2025-30106,0,0,d0ec2fed531a791fcdb7e275c6cc676f11c96b4c23a970884370a41e87a3b6a0,2025-03-21T17:15:40.227000
|
||||||
CVE-2025-30107,0,0,7ae7d3e2db9a3bcfc7100b14968701083bbe2237ed720df55c99fa3bf4e70491,2025-03-24T22:15:14.450000
|
CVE-2025-30107,0,0,7ae7d3e2db9a3bcfc7100b14968701083bbe2237ed720df55c99fa3bf4e70491,2025-03-24T22:15:14.450000
|
||||||
CVE-2025-30109,0,0,c697d3ced89db3fb240ff33efe8653842b736020e748d3eead592e6135cb99ac,2025-03-21T17:15:40.447000
|
CVE-2025-30109,0,0,c697d3ced89db3fb240ff33efe8653842b736020e748d3eead592e6135cb99ac,2025-03-21T17:15:40.447000
|
||||||
@ -287077,12 +287089,14 @@ CVE-2025-30141,0,0,4828215ddc551f721f9119cc66fd0b6301157a9edecaa8b1bbaf43bada37f
|
|||||||
CVE-2025-30142,0,0,e6345e1b8b1602cf6baee1bb466c15695f398722ed692cc5b3b87414578f99b0,2025-03-25T16:15:27.130000
|
CVE-2025-30142,0,0,e6345e1b8b1602cf6baee1bb466c15695f398722ed692cc5b3b87414578f99b0,2025-03-25T16:15:27.130000
|
||||||
CVE-2025-30143,0,0,c72031c589e36c3d2604bcb120ba9a6dd94ff4f6eee14259c749d5630ebbfba8,2025-03-17T16:15:28.643000
|
CVE-2025-30143,0,0,c72031c589e36c3d2604bcb120ba9a6dd94ff4f6eee14259c749d5630ebbfba8,2025-03-17T16:15:28.643000
|
||||||
CVE-2025-30144,0,0,15bf5f8218ba2223682697484bbc86f902d5a148eb49e6248d7c2412b7737d74,2025-03-19T16:15:33.080000
|
CVE-2025-30144,0,0,15bf5f8218ba2223682697484bbc86f902d5a148eb49e6248d7c2412b7737d74,2025-03-19T16:15:33.080000
|
||||||
CVE-2025-30149,0,1,c2ba50a8e7fcbfc5cf76c24f8b9200b3aa74b80685d3e0787e18421f001cdd0c,2025-03-31T18:15:33.847000
|
CVE-2025-30149,0,0,c2ba50a8e7fcbfc5cf76c24f8b9200b3aa74b80685d3e0787e18421f001cdd0c,2025-03-31T18:15:33.847000
|
||||||
|
CVE-2025-3015,1,1,1ec4abe6ca9685caa91be7781559ad04bca71965f78a710b93168620aa3e9844,2025-03-31T21:15:53.757000
|
||||||
CVE-2025-30152,0,0,fb7d8b36a0a9757a199a4cf8f9b4b43b19a772c330ea1d3bb0186654fc6f920c,2025-03-19T16:15:33.313000
|
CVE-2025-30152,0,0,fb7d8b36a0a9757a199a4cf8f9b4b43b19a772c330ea1d3bb0186654fc6f920c,2025-03-19T16:15:33.313000
|
||||||
CVE-2025-30153,0,0,da47524558affc65b6874f9bef3637406802e7d0a047ff83de555cab022828e8,2025-03-19T16:15:33.607000
|
CVE-2025-30153,0,0,da47524558affc65b6874f9bef3637406802e7d0a047ff83de555cab022828e8,2025-03-19T16:15:33.607000
|
||||||
CVE-2025-30154,0,0,f4c8f04ec10c8608001f5ee4aec87a1247d8c3c0588d5bdb69da7f038e16b9a7,2025-03-29T01:00:02.337000
|
CVE-2025-30154,0,0,f4c8f04ec10c8608001f5ee4aec87a1247d8c3c0588d5bdb69da7f038e16b9a7,2025-03-29T01:00:02.337000
|
||||||
CVE-2025-30155,0,0,ce9991316faec2414fb0a11e64d60f00b90c2addae9a6a86c74d235d6c0c7f76,2025-03-31T16:15:25.187000
|
CVE-2025-30155,0,0,ce9991316faec2414fb0a11e64d60f00b90c2addae9a6a86c74d235d6c0c7f76,2025-03-31T16:15:25.187000
|
||||||
CVE-2025-30157,0,0,b7d565fa042efeea73d550fb215fb58640989cdcd04813767e503c6d1f6d08fe,2025-03-21T16:15:19.767000
|
CVE-2025-30157,0,0,b7d565fa042efeea73d550fb215fb58640989cdcd04813767e503c6d1f6d08fe,2025-03-21T16:15:19.767000
|
||||||
|
CVE-2025-3016,1,1,d17e6f6e24307c3e04fedc601a315663d76d400d1c2a3cdfc9509d651d2a7c64,2025-03-31T21:15:53.940000
|
||||||
CVE-2025-30160,0,0,25be472787022894833e0e3357865514f4516e8d537c62073ee43066a681f12b,2025-03-20T19:15:38.383000
|
CVE-2025-30160,0,0,25be472787022894833e0e3357865514f4516e8d537c62073ee43066a681f12b,2025-03-20T19:15:38.383000
|
||||||
CVE-2025-30161,0,0,4ef401440b9ae76c291cb5599321f65dce6026d9a737cbde8025803161077f04,2025-03-31T16:15:25.333000
|
CVE-2025-30161,0,0,4ef401440b9ae76c291cb5599321f65dce6026d9a737cbde8025803161077f04,2025-03-31T16:15:25.333000
|
||||||
CVE-2025-30162,0,0,8641e47d280f65cb3bb61486e9cfbaa56cd67a484749372cb3bbdafe7ce809ee,2025-03-27T16:45:46.410000
|
CVE-2025-30162,0,0,8641e47d280f65cb3bb61486e9cfbaa56cd67a484749372cb3bbdafe7ce809ee,2025-03-27T16:45:46.410000
|
||||||
@ -287385,12 +287399,14 @@ CVE-2025-31110,0,0,9c1e095e916574b5bad3dc98545645eb35bcfc3a15748b26a91c424286375
|
|||||||
CVE-2025-31111,0,0,708ed17ed7ca590b80cc7bf7efff771b88139eb264b9a4c93912c661b895b119,2025-03-27T04:15:29.310000
|
CVE-2025-31111,0,0,708ed17ed7ca590b80cc7bf7efff771b88139eb264b9a4c93912c661b895b119,2025-03-27T04:15:29.310000
|
||||||
CVE-2025-31112,0,0,19710893cdeca6b79e6ed61173b8773b8204171d0fa597c5282b3a5c8595c248,2025-03-27T04:15:29.427000
|
CVE-2025-31112,0,0,19710893cdeca6b79e6ed61173b8773b8204171d0fa597c5282b3a5c8595c248,2025-03-27T04:15:29.427000
|
||||||
CVE-2025-31113,0,0,e197f9731c7d6bd9e53ba8f025a3a8ac307f507846eecfd137f3c958a7e0d19f,2025-03-27T04:15:29.493000
|
CVE-2025-31113,0,0,e197f9731c7d6bd9e53ba8f025a3a8ac307f507846eecfd137f3c958a7e0d19f,2025-03-27T04:15:29.493000
|
||||||
CVE-2025-31116,0,1,4dc37202ba5cfc688675486793efbc376cb6720b795658ab674573a1a487e976,2025-03-31T19:15:42.300000
|
CVE-2025-31116,0,0,4dc37202ba5cfc688675486793efbc376cb6720b795658ab674573a1a487e976,2025-03-31T19:15:42.300000
|
||||||
CVE-2025-31117,0,1,a341ea634906413f5449e7fc5b04d4e7dd1445d72f8402c95d9d9551d604471a,2025-03-31T18:15:33.957000
|
CVE-2025-31117,0,0,a341ea634906413f5449e7fc5b04d4e7dd1445d72f8402c95d9d9551d604471a,2025-03-31T18:15:33.957000
|
||||||
CVE-2025-31122,0,0,b8c01e9f1f9dbc740fffeb9cedbc00b2fb56d1c193bda8eacfaf89659abfd347,2025-03-31T17:15:42.997000
|
CVE-2025-31122,0,0,b8c01e9f1f9dbc740fffeb9cedbc00b2fb56d1c193bda8eacfaf89659abfd347,2025-03-31T17:15:42.997000
|
||||||
CVE-2025-31125,0,1,4f24719a409f1c71fb4356091c2ef8c13936da376c5b3c37899a2aa8d1e00a54,2025-03-31T18:15:34.070000
|
CVE-2025-31123,1,1,a6d1d8d5bdd67a19a035f82d179dbb1c83a1582e59d5b7125fb816b7c2eaa9af,2025-03-31T20:15:15.547000
|
||||||
CVE-2025-31128,1,1,40d1078ce7b3be9014af04296fe4f0f6918a4957b1af7ce145e0df724a2fbf7e,2025-03-31T19:15:42.883000
|
CVE-2025-31124,1,1,d866a6df4a48afbef1d9d2b6ed84930ed340ef6c5aaf014355825f2f9a296b29,2025-03-31T20:15:15.707000
|
||||||
CVE-2025-31129,1,1,afc3d6039e1ba3f50fedc504a1975daea8f0d0c314f23d884355292a999ea830,2025-03-31T19:15:43.023000
|
CVE-2025-31125,0,0,4f24719a409f1c71fb4356091c2ef8c13936da376c5b3c37899a2aa8d1e00a54,2025-03-31T18:15:34.070000
|
||||||
|
CVE-2025-31128,0,0,40d1078ce7b3be9014af04296fe4f0f6918a4957b1af7ce145e0df724a2fbf7e,2025-03-31T19:15:42.883000
|
||||||
|
CVE-2025-31129,0,0,afc3d6039e1ba3f50fedc504a1975daea8f0d0c314f23d884355292a999ea830,2025-03-31T19:15:43.023000
|
||||||
CVE-2025-31139,0,0,f77a452b5e1edddf158af71a264cde2428ac6b657f8dcbc921a40f17dadbb16d,2025-03-27T16:45:12.210000
|
CVE-2025-31139,0,0,f77a452b5e1edddf158af71a264cde2428ac6b657f8dcbc921a40f17dadbb16d,2025-03-27T16:45:12.210000
|
||||||
CVE-2025-31140,0,0,b5354da0d0be6641b36fd62d7ae5da72fa26945541a5950d6dcb5ec04d83adab,2025-03-27T16:45:12.210000
|
CVE-2025-31140,0,0,b5354da0d0be6641b36fd62d7ae5da72fa26945541a5950d6dcb5ec04d83adab,2025-03-27T16:45:12.210000
|
||||||
CVE-2025-31141,0,0,406867c864568f6048dee1b7cffcd596f08f273e12b98bc9b9a899fec211a190,2025-03-27T16:45:12.210000
|
CVE-2025-31141,0,0,406867c864568f6048dee1b7cffcd596f08f273e12b98bc9b9a899fec211a190,2025-03-27T16:45:12.210000
|
||||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user