Auto-Update: 2025-03-31T22:00:19.882734+00:00

This commit is contained in:
cad-safe-bot 2025-03-31 22:04:02 +00:00
parent 741e3d9fd2
commit d1342cd785
37 changed files with 1856 additions and 143 deletions

View File

@ -2,8 +2,8 @@
"id": "CVE-2018-0824", "id": "CVE-2018-0824",
"sourceIdentifier": "secure@microsoft.com", "sourceIdentifier": "secure@microsoft.com",
"published": "2018-05-09T19:29:00.370", "published": "2018-05-09T19:29:00.370",
"lastModified": "2024-11-21T03:39:01.810", "lastModified": "2025-03-31T21:03:30.687",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {

View File

@ -2,8 +2,8 @@
"id": "CVE-2019-1069", "id": "CVE-2019-1069",
"sourceIdentifier": "secure@microsoft.com", "sourceIdentifier": "secure@microsoft.com",
"published": "2019-06-12T14:29:04.337", "published": "2019-06-12T14:29:04.337",
"lastModified": "2024-11-21T04:35:57.170", "lastModified": "2025-03-31T21:03:16.547",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {

View File

@ -1,14 +1,14 @@
{ {
"id": "CVE-2024-24452", "id": "CVE-2024-24452",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "security-alert@hpe.com",
"published": "2024-11-15T20:15:19.117", "published": "2024-11-15T20:15:19.117",
"lastModified": "2024-11-18T17:11:56.587", "lastModified": "2025-03-31T21:15:43.370",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "An invalid memory access when handling the ProtocolIE_ID field of E-RAB Release Indication messages in Athonet vEPC MME v11.4.0 allows attackers to cause a Denial of Service (DoS) to the cellular network by repeatedly initiating connections and sending a crafted payload." "value": "An invalid memory access when handling the ProtocolIE_ID field of\u00a0E-RAB Release Indication messages in Athonet vEPC MME v11.4.0\u00a0allows attackers to cause a Denial of Service (DoS) to the cellular\u00a0network by repeatedly initiating connections and sending a crafted\u00a0payload."
}, },
{ {
"lang": "es", "lang": "es",
@ -17,6 +17,26 @@
], ],
"metrics": { "metrics": {
"cvssMetricV31": [ "cvssMetricV31": [
{
"source": "security-alert@hpe.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.2,
"impactScore": 3.6
},
{ {
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary", "type": "Secondary",
@ -52,6 +72,10 @@
} }
], ],
"references": [ "references": [
{
"url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04780en_us&docLocale=en_US",
"source": "security-alert@hpe.com"
},
{ {
"url": "http://athonet.com", "url": "http://athonet.com",
"source": "cve@mitre.org" "source": "cve@mitre.org"

View File

@ -1,14 +1,14 @@
{ {
"id": "CVE-2024-24453", "id": "CVE-2024-24453",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "security-alert@hpe.com",
"published": "2024-11-15T20:15:19.203", "published": "2024-11-15T20:15:19.203",
"lastModified": "2024-11-18T17:11:56.587", "lastModified": "2025-03-31T21:15:43.683",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "An invalid memory access when handling the ProtocolIE_ID field of E-RAB NotToBeModifiedBearerModInd information element in Athonet vEPC MME v11.4.0 allows attackers to cause a Denial of Service (DoS) to the cellular network by repeatedly initiating connections and sending a crafted payload." "value": "An invalid memory access when handling the ProtocolIE_ID field of\u00a0E-RAB NotToBeModifiedBearerModInd information element in\u00a0Athonet vEPC MME v11.4.0 allows attackers to cause a Denial of\u00a0Service (DoS) to the cellular network by repeatedly initiating\u00a0connections and sending a crafted payload."
}, },
{ {
"lang": "es", "lang": "es",
@ -17,6 +17,26 @@
], ],
"metrics": { "metrics": {
"cvssMetricV31": [ "cvssMetricV31": [
{
"source": "security-alert@hpe.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.2,
"impactScore": 3.6
},
{ {
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary", "type": "Secondary",
@ -52,6 +72,10 @@
} }
], ],
"references": [ "references": [
{
"url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04780en_us&docLocale=en_US",
"source": "security-alert@hpe.com"
},
{ {
"url": "http://athonet.com", "url": "http://athonet.com",
"source": "cve@mitre.org" "source": "cve@mitre.org"

View File

@ -1,14 +1,14 @@
{ {
"id": "CVE-2024-24454", "id": "CVE-2024-24454",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "security-alert@hpe.com",
"published": "2024-11-15T20:15:19.300", "published": "2024-11-15T20:15:19.300",
"lastModified": "2024-11-18T17:11:56.587", "lastModified": "2025-03-31T21:15:43.950",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "An invalid memory access when handling the ProtocolIE_ID field of E-RAB Modify Request messages in Athonet vEPC MME v11.4.0 allows attackers to cause a Denial of Service (DoS) to the cellular network by repeatedly initiating connections and sending a crafted payload." "value": "An invalid memory access when handling the ProtocolIE_ID field of\u00a0E-RAB Modify Request messages in Athonet vEPC MME v11.4.0\u00a0allows attackers to cause a Denial of Service (DoS) to the cellular\u00a0network by repeatedly initiating connections and sending a crafted\u00a0payload."
}, },
{ {
"lang": "es", "lang": "es",
@ -17,6 +17,26 @@
], ],
"metrics": { "metrics": {
"cvssMetricV31": [ "cvssMetricV31": [
{
"source": "security-alert@hpe.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.2,
"impactScore": 3.6
},
{ {
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary", "type": "Secondary",
@ -52,6 +72,10 @@
} }
], ],
"references": [ "references": [
{
"url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04780en_us&docLocale=en_US",
"source": "security-alert@hpe.com"
},
{ {
"url": "http://athonet.com", "url": "http://athonet.com",
"source": "cve@mitre.org" "source": "cve@mitre.org"

View File

@ -1,14 +1,14 @@
{ {
"id": "CVE-2024-24455", "id": "CVE-2024-24455",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "security-alert@hpe.com",
"published": "2024-11-15T20:15:19.403", "published": "2024-11-15T20:15:19.403",
"lastModified": "2024-11-18T17:11:56.587", "lastModified": "2025-03-31T21:15:44.193",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "An invalid memory access when handling a UE Context Release message containing an invalid UE identifier in Athonet vEPC MME v11.4.0 allows attackers to cause a Denial of Service (DoS) to the cellular network by repeatedly initiating connections and sending a crafted payload." "value": "An invalid memory access when handling a UE Context Release message\u00a0containing an invalid UE identifier in Athonet vEPC MME v11.4.0 allows\u00a0attackers to cause a Denial of Service (DoS) to the cellular network\u00a0by repeatedly initiating connections and sending a crafted payload."
}, },
{ {
"lang": "es", "lang": "es",
@ -17,6 +17,26 @@
], ],
"metrics": { "metrics": {
"cvssMetricV31": [ "cvssMetricV31": [
{
"source": "security-alert@hpe.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.2,
"impactScore": 3.6
},
{ {
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary", "type": "Secondary",
@ -52,6 +72,10 @@
} }
], ],
"references": [ "references": [
{
"url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04780en_us&docLocale=en_US",
"source": "security-alert@hpe.com"
},
{ {
"url": "http://athonet.com", "url": "http://athonet.com",
"source": "cve@mitre.org" "source": "cve@mitre.org"

View File

@ -0,0 +1,44 @@
{
"id": "CVE-2024-24456",
"sourceIdentifier": "security-alert@hpe.com",
"published": "2025-03-31T21:15:44.513",
"lastModified": "2025-03-31T21:15:44.513",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An E-RAB Release Command packet containing a malformed NAS PDU\u00a0will cause the Athonet MME to immediately crash, potentially due to a\u00a0buffer overflow."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-alert@hpe.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.2,
"impactScore": 3.6
}
]
},
"references": [
{
"url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04780en_us&docLocale=en_US",
"source": "security-alert@hpe.com"
}
]
}

View File

@ -1,14 +1,14 @@
{ {
"id": "CVE-2024-24457", "id": "CVE-2024-24457",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "security-alert@hpe.com",
"published": "2024-11-15T20:15:19.510", "published": "2024-11-15T20:15:19.510",
"lastModified": "2024-11-18T17:11:56.587", "lastModified": "2025-03-31T21:15:44.697",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "An invalid memory access when handling the ProtocolIE_ID field of E-RAB Setup List Context SURes messages in Athonet vEPC MME v11.4.0 allows attackers to cause a Denial of Service (DoS) to the cellular network by repeatedly initiating connections and sending a crafted payload." "value": "An invalid memory access when handling the ProtocolIE_ID field of E-RAB\u00a0Setup List Context SURes messages in Athonet vEPC MME v11.4.0 allows\u00a0attackers to cause a Denial of Service (DoS) to the cellular network by\u00a0repeatedly initiating connections and sending a crafted payload."
}, },
{ {
"lang": "es", "lang": "es",
@ -17,6 +17,26 @@
], ],
"metrics": { "metrics": {
"cvssMetricV31": [ "cvssMetricV31": [
{
"source": "security-alert@hpe.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.2,
"impactScore": 3.6
},
{ {
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary", "type": "Secondary",
@ -52,6 +72,10 @@
} }
], ],
"references": [ "references": [
{
"url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04780en_us&docLocale=en_US",
"source": "security-alert@hpe.com"
},
{ {
"url": "http://athonet.com", "url": "http://athonet.com",
"source": "cve@mitre.org" "source": "cve@mitre.org"

View File

@ -1,14 +1,14 @@
{ {
"id": "CVE-2024-24458", "id": "CVE-2024-24458",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "security-alert@hpe.com",
"published": "2024-11-15T20:15:19.610", "published": "2024-11-15T20:15:19.610",
"lastModified": "2024-11-18T17:11:56.587", "lastModified": "2025-03-31T21:15:44.957",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "An invalid memory access when handling the ENB Configuration Transfer messages containing invalid PLMN Identities in Athonet vEPC MME v11.4.0 allows attackers to cause a Denial of Service (DoS) to the cellular network by repeatedly initiating connections and sending a crafted payload." "value": "An invalid memory access when handling the ENB Configuration Transfer\u00a0messages containing invalid PLMN Identities in Athonet vEPC MME\u00a0v11.4.0 allows attackers to cause a Denial of Service (DoS) to the cellular\u00a0network by repeatedly initiating connections and sending a crafted\u00a0payload."
}, },
{ {
"lang": "es", "lang": "es",
@ -17,6 +17,26 @@
], ],
"metrics": { "metrics": {
"cvssMetricV31": [ "cvssMetricV31": [
{
"source": "security-alert@hpe.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.2,
"impactScore": 3.6
},
{ {
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary", "type": "Secondary",
@ -52,6 +72,10 @@
} }
], ],
"references": [ "references": [
{
"url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04780en_us&docLocale=en_US",
"source": "security-alert@hpe.com"
},
{ {
"url": "http://athonet.com", "url": "http://athonet.com",
"source": "cve@mitre.org" "source": "cve@mitre.org"

View File

@ -1,14 +1,14 @@
{ {
"id": "CVE-2024-24459", "id": "CVE-2024-24459",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "security-alert@hpe.com",
"published": "2024-11-15T20:15:19.703", "published": "2024-11-15T20:15:19.703",
"lastModified": "2024-11-18T17:11:56.587", "lastModified": "2025-03-31T21:15:46.887",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "An invalid memory access when handling the ProtocolIE_ID field of S1Setup Request messages in Athonet vEPC MME v11.4.0 allows attackers to cause a Denial of Service (DoS) to the cellular network by repeatedly initiating connections and sending a crafted payload." "value": "An invalid memory access when handling the ProtocolIE_ID field of\u00a0S1Setup Request messages in Athonet vEPC MME v11.4.0 allows\u00a0attackers to cause a Denial of Service (DoS) to the cellular network by\u00a0repeatedly initiating connections and sending a crafted payload."
}, },
{ {
"lang": "es", "lang": "es",
@ -17,6 +17,26 @@
], ],
"metrics": { "metrics": {
"cvssMetricV31": [ "cvssMetricV31": [
{
"source": "security-alert@hpe.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.2,
"impactScore": 3.6
},
{ {
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary", "type": "Secondary",
@ -52,6 +72,10 @@
} }
], ],
"references": [ "references": [
{
"url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04780en_us&docLocale=en_US",
"source": "security-alert@hpe.com"
},
{ {
"url": "http://athonet.com", "url": "http://athonet.com",
"source": "cve@mitre.org" "source": "cve@mitre.org"

View File

@ -0,0 +1,28 @@
{
"id": "CVE-2024-54802",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-03-31T21:15:47.203",
"lastModified": "2025-03-31T21:15:47.203",
"vulnStatus": "Received",
"cveTags": [
{
"sourceIdentifier": "cve@mitre.org",
"tags": [
"unsupported-when-assigned"
]
}
],
"descriptions": [
{
"lang": "en",
"value": "In Netgear WNR854T 1.5.2 (North America), the UPNP service (/usr/sbin/upnp) is vulnerable to stack-based buffer overflow in the M-SEARCH Host header."
}
],
"metrics": {},
"references": [
{
"url": "https://faultpoint.com/post/2025-03-25-8-cves-on-the-wnr854t-junkyard/#802",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,28 @@
{
"id": "CVE-2024-54803",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-03-31T21:15:47.377",
"lastModified": "2025-03-31T21:15:47.377",
"vulnStatus": "Received",
"cveTags": [
{
"sourceIdentifier": "cve@mitre.org",
"tags": [
"unsupported-when-assigned"
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Netgear WNR854T 1.5.2 (North America) is vulnerable to Command Injection. An attacker can send a specially crafted request to post.cgi, updating the nvram parameter pppoe_peer_mac and forcing a reboot. This will result in command injection."
}
],
"metrics": {},
"references": [
{
"url": "https://faultpoint.com/post/2025-03-25-8-cves-on-the-wnr854t-junkyard/#803",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,28 @@
{
"id": "CVE-2024-54804",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-03-31T21:15:47.560",
"lastModified": "2025-03-31T21:15:47.560",
"vulnStatus": "Received",
"cveTags": [
{
"sourceIdentifier": "cve@mitre.org",
"tags": [
"unsupported-when-assigned"
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Netgear WNR854T 1.5.2 (North America) is vulnerable to Command Injection. An attacker can send a specially crafted request to post.cgi, updating the nvram parameter wan_hostname and forcing a reboot. This will result in command injection."
}
],
"metrics": {},
"references": [
{
"url": "https://faultpoint.com/post/2025-03-25-8-cves-on-the-wnr854t-junkyard/#804",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,28 @@
{
"id": "CVE-2024-54805",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-03-31T21:15:47.737",
"lastModified": "2025-03-31T21:15:47.737",
"vulnStatus": "Received",
"cveTags": [
{
"sourceIdentifier": "cve@mitre.org",
"tags": [
"unsupported-when-assigned"
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Netgear WNR854T 1.5.2 (North America) is vulnerable to Command Injection. An attacker can send a specially crafted request to post.cgi, updating the nvram parameter get_email. After which, they can visit the send_log.cgi endpoint which uses the parameter in a system call to achieve command execution."
}
],
"metrics": {},
"references": [
{
"url": "https://faultpoint.com/post/2025-03-25-8-cves-on-the-wnr854t-junkyard/#805",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,28 @@
{
"id": "CVE-2024-54806",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-03-31T21:15:47.923",
"lastModified": "2025-03-31T21:15:47.923",
"vulnStatus": "Received",
"cveTags": [
{
"sourceIdentifier": "cve@mitre.org",
"tags": [
"unsupported-when-assigned"
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Netgear WNR854T 1.5.2 (North America) is vulnerable to Arbitrary command execution in cmd.cgi which allows for the execution of system commands via the web interface."
}
],
"metrics": {},
"references": [
{
"url": "https://faultpoint.com/post/2025-03-25-8-cves-on-the-wnr854t-junkyard/#806",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,28 @@
{
"id": "CVE-2024-54807",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-03-31T21:15:48.090",
"lastModified": "2025-03-31T21:15:48.090",
"vulnStatus": "Received",
"cveTags": [
{
"sourceIdentifier": "cve@mitre.org",
"tags": [
"unsupported-when-assigned"
]
}
],
"descriptions": [
{
"lang": "en",
"value": "In Netgear WNR854T 1.5.2 (North America), the UPNP service is vulnerable to command injection in the function addmap_exec which parses the NewInternalClient parameter of the AddPortMapping SOAPAction into a system call without sanitation. An attacker can send a specially crafted SOAPAction request for AddPortMapping via the router's WANIPConn1 service to achieve arbitrary command execution."
}
],
"metrics": {},
"references": [
{
"url": "https://faultpoint.com/post/2025-03-25-8-cves-on-the-wnr854t-junkyard/#807",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,28 @@
{
"id": "CVE-2024-54808",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-03-31T21:15:48.310",
"lastModified": "2025-03-31T21:15:48.310",
"vulnStatus": "Received",
"cveTags": [
{
"sourceIdentifier": "cve@mitre.org",
"tags": [
"unsupported-when-assigned"
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Netgear WNR854T 1.5.2 (North America) contains a stack-based buffer overflow vulnerability in the SetDefaultConnectionService function due to an unconstrained use of sscanf. The vulnerability allows for control of the program counter and can be utilized to achieve arbitrary code execution."
}
],
"metrics": {},
"references": [
{
"url": "https://faultpoint.com/post/2025-03-25-8-cves-on-the-wnr854t-junkyard/#808",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,28 @@
{
"id": "CVE-2024-54809",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-03-31T21:15:48.527",
"lastModified": "2025-03-31T21:15:48.527",
"vulnStatus": "Received",
"cveTags": [
{
"sourceIdentifier": "cve@mitre.org",
"tags": [
"unsupported-when-assigned"
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Netgear Inc WNR854T 1.5.2 (North America) contains a stack-based buffer overflow vulnerability in the parse_st_header function due to use of a request header parameter in a strncpy where size is determined based on the input specified. By sending a specially crafted packet, an attacker can take control of the program counter and hijack control flow of the program to execute arbitrary system commands."
}
],
"metrics": {},
"references": [
{
"url": "https://faultpoint.com/post/2025-03-25-8-cves-on-the-wnr854t-junkyard/#809",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2025-21893",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-03-31T20:15:14.613",
"lastModified": "2025-03-31T21:15:49.307",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nkeys: Fix UAF in key_put()\n\nOnce a key's reference count has been reduced to 0, the garbage collector\nthread may destroy it at any time and so key_put() is not allowed to touch\nthe key after that point. The most key_put() is normally allowed to do is\nto touch key_gc_work as that's a static global variable.\n\nHowever, in an effort to speed up the reclamation of quota, this is now\ndone in key_put() once the key's usage is reduced to 0 - but now the code\nis looking at the key after the deadline, which is forbidden.\n\nFix this by using a flag to indicate that a key can be gc'd now rather than\nlooking at the key's refcount in the garbage collector."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/6afe2ea2daec156bd94ad2c5a6f4f4c48240dcd3",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/75845c6c1a64483e9985302793dbf0dfa5f71e32",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/f6a3cf833188e897c97028cd7b926e3f2cb1a8c0",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-27167", "id": "CVE-2025-27167",
"sourceIdentifier": "psirt@adobe.com", "sourceIdentifier": "psirt@adobe.com",
"published": "2025-03-11T18:15:34.730", "published": "2025-03-11T18:15:34.730",
"lastModified": "2025-03-11T18:15:34.730", "lastModified": "2025-03-31T20:06:44.963",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -51,10 +51,56 @@
] ]
} }
], ],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:illustrator:*:*:*:*:*:*:*:*",
"versionStartIncluding": "28.0",
"versionEndExcluding": "28.7.5",
"matchCriteriaId": "F721B1E0-416E-446E-B55F-01A15D77D6BA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:illustrator:*:*:*:*:*:*:*:*",
"versionStartIncluding": "29.0",
"versionEndExcluding": "29.3",
"matchCriteriaId": "2B4680F1-0165-4F2D-9795-63C18C7AFE38"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://helpx.adobe.com/security/products/illustrator/apsb25-17.html", "url": "https://helpx.adobe.com/security/products/illustrator/apsb25-17.html",
"source": "psirt@adobe.com" "source": "psirt@adobe.com",
"tags": [
"Vendor Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-27168", "id": "CVE-2025-27168",
"sourceIdentifier": "psirt@adobe.com", "sourceIdentifier": "psirt@adobe.com",
"published": "2025-03-11T18:15:34.893", "published": "2025-03-11T18:15:34.893",
"lastModified": "2025-03-11T18:15:34.893", "lastModified": "2025-03-31T20:06:08.030",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -49,12 +49,68 @@
"value": "CWE-121" "value": "CWE-121"
} }
] ]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:illustrator:*:*:*:*:*:*:*:*",
"versionStartIncluding": "28.0",
"versionEndExcluding": "28.7.5",
"matchCriteriaId": "F721B1E0-416E-446E-B55F-01A15D77D6BA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:illustrator:*:*:*:*:*:*:*:*",
"versionStartIncluding": "29.0",
"versionEndExcluding": "29.3",
"matchCriteriaId": "2B4680F1-0165-4F2D-9795-63C18C7AFE38"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
}
]
}
]
} }
], ],
"references": [ "references": [
{ {
"url": "https://helpx.adobe.com/security/products/illustrator/apsb25-17.html", "url": "https://helpx.adobe.com/security/products/illustrator/apsb25-17.html",
"source": "psirt@adobe.com" "source": "psirt@adobe.com",
"tags": [
"Vendor Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-27170", "id": "CVE-2025-27170",
"sourceIdentifier": "psirt@adobe.com", "sourceIdentifier": "psirt@adobe.com",
"published": "2025-03-11T18:15:35.227", "published": "2025-03-11T18:15:35.227",
"lastModified": "2025-03-11T18:15:35.227", "lastModified": "2025-03-31T20:02:08.903",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -51,10 +51,56 @@
] ]
} }
], ],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:illustrator:*:*:*:*:*:*:*:*",
"versionStartIncluding": "28.0",
"versionEndExcluding": "28.7.5",
"matchCriteriaId": "F721B1E0-416E-446E-B55F-01A15D77D6BA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:illustrator:*:*:*:*:*:*:*:*",
"versionStartIncluding": "29.0",
"versionEndExcluding": "29.3",
"matchCriteriaId": "2B4680F1-0165-4F2D-9795-63C18C7AFE38"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://helpx.adobe.com/security/products/illustrator/apsb25-17.html", "url": "https://helpx.adobe.com/security/products/illustrator/apsb25-17.html",
"source": "psirt@adobe.com" "source": "psirt@adobe.com",
"tags": [
"Vendor Advisory"
]
} }
] ]
} }

View File

@ -2,20 +2,63 @@
"id": "CVE-2025-28087", "id": "CVE-2025-28087",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2025-03-28T22:15:17.717", "published": "2025-03-28T22:15:17.717",
"lastModified": "2025-03-28T22:15:17.717", "lastModified": "2025-03-31T21:15:52.970",
"vulnStatus": "Received", "vulnStatus": "Received",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "Sourcecodester Online Exam System 1.0 is vulnerable to SQL Injection via dash.php." "value": "Sourcecodester Online Exam System 1.0 is vulnerable to SQL Injection via dash.php."
},
{
"lang": "es",
"value": "Sourcecodester Online Exam System 1.0 es vulnerable a la inyecci\u00f3n SQL a trav\u00e9s de dash.php."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
} }
], ],
"metrics": {},
"references": [ "references": [
{ {
"url": "https://www.yuque.com/morysummer/vx41bz/vxhdpdeavzvtvdqq", "url": "https://www.yuque.com/morysummer/vx41bz/vxhdpdeavzvtvdqq",
"source": "cve@mitre.org" "source": "cve@mitre.org"
},
{
"url": "https://www.yuque.com/morysummer/vx41bz/vxhdpdeavzvtvdqq",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
} }
] ]
} }

View File

@ -2,16 +2,55 @@
"id": "CVE-2025-28089", "id": "CVE-2025-28089",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2025-03-28T22:15:17.847", "published": "2025-03-28T22:15:17.847",
"lastModified": "2025-03-28T22:15:17.847", "lastModified": "2025-03-31T21:15:53.133",
"vulnStatus": "Received", "vulnStatus": "Received",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "maccms10 v2025.1000.4047 is vulnerable to Server-Side Request Forgery (SSRF) via the Scheduled Task function." "value": "maccms10 v2025.1000.4047 is vulnerable to Server-Side Request Forgery (SSRF) via the Scheduled Task function."
},
{
"lang": "es",
"value": "maccms10 v2025.1000.4047 es vulnerable a Server-Side Request Forgery (SSRF) a trav\u00e9s de la funci\u00f3n de tarea programada."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-918"
}
]
} }
], ],
"metrics": {},
"references": [ "references": [
{ {
"url": "https://github.com/magicblack/maccms10/releases/tag/v2025.1000.4047", "url": "https://github.com/magicblack/maccms10/releases/tag/v2025.1000.4047",
@ -20,6 +59,10 @@
{ {
"url": "https://www.yuque.com/morysummer/vx41bz/wzer7qxh0vwrf6zq", "url": "https://www.yuque.com/morysummer/vx41bz/wzer7qxh0vwrf6zq",
"source": "cve@mitre.org" "source": "cve@mitre.org"
},
{
"url": "https://www.yuque.com/morysummer/vx41bz/wzer7qxh0vwrf6zq",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
} }
] ]
} }

View File

@ -2,20 +2,63 @@
"id": "CVE-2025-28090", "id": "CVE-2025-28090",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2025-03-28T22:15:17.980", "published": "2025-03-28T22:15:17.980",
"lastModified": "2025-03-28T22:15:17.980", "lastModified": "2025-03-31T20:15:14.967",
"vulnStatus": "Received", "vulnStatus": "Received",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "maccms10 v2025.1000.4047 is vulnerable to Server-Side Request Forgery (SSRF) in the Collection Custom Interface feature." "value": "maccms10 v2025.1000.4047 is vulnerable to Server-Side Request Forgery (SSRF) in the Collection Custom Interface feature."
},
{
"lang": "es",
"value": "maccms10 v2025.1000.4047 es vulnerable a Server-Side Request Forgery (SSRF) en la funci\u00f3n de interfaz personalizada de colecci\u00f3n."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-918"
}
]
} }
], ],
"metrics": {},
"references": [ "references": [
{ {
"url": "https://www.yuque.com/morysummer/vx41bz/xo5w1euakvtgenex", "url": "https://www.yuque.com/morysummer/vx41bz/xo5w1euakvtgenex",
"source": "cve@mitre.org" "source": "cve@mitre.org"
},
{
"url": "https://www.yuque.com/morysummer/vx41bz/xo5w1euakvtgenex",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
} }
] ]
} }

View File

@ -2,20 +2,63 @@
"id": "CVE-2025-28091", "id": "CVE-2025-28091",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2025-03-28T22:15:18.107", "published": "2025-03-28T22:15:18.107",
"lastModified": "2025-03-28T22:15:18.107", "lastModified": "2025-03-31T21:15:53.287",
"vulnStatus": "Received", "vulnStatus": "Received",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "maccms10 v2025.1000.4047 has a Server-Side Request Forgery (SSRF) vulnerability via Add Article." "value": "maccms10 v2025.1000.4047 has a Server-Side Request Forgery (SSRF) vulnerability via Add Article."
},
{
"lang": "es",
"value": "maccms10 v2025.1000.4047 tiene una vulnerabilidad de Server-Side Request Forgery (SSRF) a trav\u00e9s de agregar art\u00edculo."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-918"
}
]
} }
], ],
"metrics": {},
"references": [ "references": [
{ {
"url": "https://www.yuque.com/morysummer/vx41bz/ax55rxv4u3our1ic", "url": "https://www.yuque.com/morysummer/vx41bz/ax55rxv4u3our1ic",
"source": "cve@mitre.org" "source": "cve@mitre.org"
},
{
"url": "https://www.yuque.com/morysummer/vx41bz/xo5w1euakvtgenex",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
} }
] ]
} }

View File

@ -2,20 +2,63 @@
"id": "CVE-2025-28092", "id": "CVE-2025-28092",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2025-03-28T22:15:18.237", "published": "2025-03-28T22:15:18.237",
"lastModified": "2025-03-28T22:15:18.237", "lastModified": "2025-03-31T20:15:15.203",
"vulnStatus": "Received", "vulnStatus": "Received",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "ShopXO v6.4.0 is vulnerable to Server-Side Request Forgery (SSRF) via image upload function." "value": "ShopXO v6.4.0 is vulnerable to Server-Side Request Forgery (SSRF) via image upload function."
},
{
"lang": "es",
"value": "ShopXO v6.4.0 es vulnerable a Server-Side Request Forgery (SSRF) a trav\u00e9s de la funci\u00f3n de carga de im\u00e1genes."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-918"
}
]
} }
], ],
"metrics": {},
"references": [ "references": [
{ {
"url": "https://www.yuque.com/morysummer/vx41bz/stggvmlxs9ewqlvu", "url": "https://www.yuque.com/morysummer/vx41bz/stggvmlxs9ewqlvu",
"source": "cve@mitre.org" "source": "cve@mitre.org"
},
{
"url": "https://www.yuque.com/morysummer/vx41bz/stggvmlxs9ewqlvu",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
} }
] ]
} }

View File

@ -2,20 +2,63 @@
"id": "CVE-2025-28093", "id": "CVE-2025-28093",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2025-03-28T22:15:18.410", "published": "2025-03-28T22:15:18.410",
"lastModified": "2025-03-28T22:15:18.410", "lastModified": "2025-03-31T20:15:15.363",
"vulnStatus": "Received", "vulnStatus": "Received",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "ShopXO v6.4.0 is vulnerable to Server-Side Request Forgery (SSRF) in Email Settings." "value": "ShopXO v6.4.0 is vulnerable to Server-Side Request Forgery (SSRF) in Email Settings."
},
{
"lang": "es",
"value": "ShopXO v6.4.0 es vulnerable a Server-Side Request Forgery (SSRF) en la configuraci\u00f3n de correo electr\u00f3nico."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-918"
}
]
} }
], ],
"metrics": {},
"references": [ "references": [
{ {
"url": "https://www.yuque.com/morysummer/vx41bz/he2hb8ic8an8h07f", "url": "https://www.yuque.com/morysummer/vx41bz/he2hb8ic8an8h07f",
"source": "cve@mitre.org" "source": "cve@mitre.org"
},
{
"url": "https://www.yuque.com/morysummer/vx41bz/he2hb8ic8an8h07f",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
} }
] ]
} }

View File

@ -2,13 +2,13 @@
"id": "CVE-2025-30095", "id": "CVE-2025-30095",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2025-03-31T15:15:44.843", "published": "2025-03-31T15:15:44.843",
"lastModified": "2025-03-31T15:15:44.843", "lastModified": "2025-03-31T21:15:53.653",
"vulnStatus": "Received", "vulnStatus": "Received",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "VyOS 1.3 through 1.5 or any Debian-based system using dropbear in combination with live-build has the same Dropbear private host keys across different installations. Thus, an attacker can conduct active man-in-the-middle attacks against SSH connections if Dropbear is enabled as the SSH daemon. I n VyOS, this is not the default configuration for the system SSH daemon, but is for the console service. To mitigate this, one can run \"rm -f /etc/dropbear/*key*\" and/or \"rm -f /etc/dropbear-initramfs/*key*\" and then dropbearkey -t rsa -s 4096 -f /etc/dropbear_rsa_host_key and reload the service or reboot the system before using Dropbear as the SSH daemon (this clears out all keys mistakenly built into the release image) or update to the latest version of VyOS 1.4 or 1.5. Note that this vulnerability is not unique to VyOS and may appear in any Debian-based Linux distribution that uses Dropbear in combination with live-build, which has a safeguard against this behavior in OpenSSH but no equivalent one for Dropbear." "value": "VyOS 1.3 through 1.5 (fixed in 1.4.2) or any Debian-based system using dropbear in combination with live-build has the same Dropbear private host keys across different installations. Thus, an attacker can conduct active man-in-the-middle attacks against SSH connections if Dropbear is enabled as the SSH daemon. I n VyOS, this is not the default configuration for the system SSH daemon, but is for the console service. To mitigate this, one can run \"rm -f /etc/dropbear/*key*\" and/or \"rm -f /etc/dropbear-initramfs/*key*\" and then dropbearkey -t rsa -s 4096 -f /etc/dropbear_rsa_host_key and reload the service or reboot the system before using Dropbear as the SSH daemon (this clears out all keys mistakenly built into the release image) or update to the latest version of VyOS 1.4 or 1.5. Note that this vulnerability is not unique to VyOS and may appear in any Debian-based Linux distribution that uses Dropbear in combination with live-build, which has a safeguard against this behavior in OpenSSH but no equivalent one for Dropbear."
} }
], ],
"metrics": {}, "metrics": {},

View File

@ -0,0 +1,141 @@
{
"id": "CVE-2025-3009",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-03-31T20:15:15.850",
"lastModified": "2025-03-31T20:15:15.850",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as critical was found in Jinher Network OA C6. Affected by this vulnerability is an unknown functionality of the file /C6/JHSoft.Web.NetDisk/NetDiskProperty.aspx. The manipulation of the argument ID leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnAvailabilityImpact": "LOW",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"baseScore": 6.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-74"
},
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://github.com/Myoung-SA/cve/issues/1",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.302059",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.302059",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.524554",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,145 @@
{
"id": "CVE-2025-3010",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-03-31T20:15:16.023",
"lastModified": "2025-03-31T20:15:16.023",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as problematic, has been found in Khronos Group glslang 15.1.0. Affected by this issue is the function glslang::TIntermediate::isConversionAllowed of the file glslang/MachineIndependent/Intermediate.cpp. The manipulation leads to null pointer dereference. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "NONE",
"vulnIntegrityImpact": "NONE",
"vulnAvailabilityImpact": "LOW",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"baseScore": 3.3,
"baseSeverity": "LOW",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 1.8,
"impactScore": 1.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:L/AC:L/Au:S/C:N/I:N/A:P",
"baseScore": 1.7,
"accessVector": "LOCAL",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "LOW",
"exploitabilityScore": 3.1,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-404"
},
{
"lang": "en",
"value": "CWE-476"
}
]
}
],
"references": [
{
"url": "https://github.com/KhronosGroup/glslang/issues/3903",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/KhronosGroup/glslang/issues/3903#issue-2927492534",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.302060",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.302060",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.524561",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,153 @@
{
"id": "CVE-2025-3015",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-03-31T21:15:53.757",
"lastModified": "2025-03-31T21:15:53.757",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as critical has been found in Open Asset Import Library Assimp 5.4.3. This affects the function Assimp::ASEImporter::BuildUniqueRepresentation of the file code/AssetLib/ASE/ASELoader.cpp of the component ASE File Handler. The manipulation of the argument mIndices leads to out-of-bounds read. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 6.0 is able to address this issue. The patch is named 7c705fde418d68cca4e8eff56be01b2617b0d6fe. It is recommended to apply a patch to fix this issue."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "PASSIVE",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnAvailabilityImpact": "LOW",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"baseScore": 7.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-119"
},
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"references": [
{
"url": "https://github.com/assimp/assimp/commit/7c705fde418d68cca4e8eff56be01b2617b0d6fe",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/assimp/assimp/issues/6021",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/assimp/assimp/issues/6021#issue-2877378829",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/assimp/assimp/pull/6045",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.302067",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.302067",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.524589",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,149 @@
{
"id": "CVE-2025-3016",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-03-31T21:15:53.940",
"lastModified": "2025-03-31T21:15:53.940",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as problematic was found in Open Asset Import Library Assimp 5.4.3. This vulnerability affects the function Assimp::MDLImporter::ParseTextureColorData of the file code/AssetLib/MDL/MDLMaterialLoader.cpp of the component MDL File Handler. The manipulation of the argument mWidth/mHeight leads to resource consumption. The attack can be initiated remotely. Upgrading to version 6.0 is able to address this issue. The name of the patch is 5d2a7482312db2e866439a8c05a07ce1e718bed1. It is recommended to apply a patch to fix this issue."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "PASSIVE",
"vulnConfidentialityImpact": "NONE",
"vulnIntegrityImpact": "NONE",
"vulnAvailabilityImpact": "LOW",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"baseScore": 5.0,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-400"
},
{
"lang": "en",
"value": "CWE-404"
}
]
}
],
"references": [
{
"url": "https://github.com/assimp/assimp/commit/5d2a7482312db2e866439a8c05a07ce1e718bed1",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/assimp/assimp/issues/6022",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/assimp/assimp/pull/6046",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.302068",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.302068",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.524593",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,96 @@
{
"id": "CVE-2025-31123",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-03-31T20:15:15.547",
"lastModified": "2025-03-31T20:15:15.547",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Zitadel is open-source identity infrastructure software. A vulnerability existed where expired keys can be used to retrieve tokens. Specifically, ZITADEL fails to properly check the expiration date of the JWT key when used for Authorization Grants. This allows an attacker with an expired key to obtain valid access tokens. This vulnerability does not affect the use of JWT Profile for OAuth 2.0 Client Authentication on the Token and Introspection endpoints, which correctly reject expired keys. This vulnerability is fixed in 2.71.6, 2.70.8, 2.69.9, 2.68.9, 2.67.13, 2.66.16, 2.65.7, 2.64.6, and 2.63.9."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N",
"baseScore": 8.7,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 5.8
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-324"
}
]
}
],
"references": [
{
"url": "https://github.com/zitadel/zitadel/commit/315503beabd679f2e6aec0c004f0f9d2f5b53ed3",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/zitadel/zitadel/releases/tag/v2.63.9",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/zitadel/zitadel/releases/tag/v2.64.6",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/zitadel/zitadel/releases/tag/v2.65.7",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/zitadel/zitadel/releases/tag/v2.66.16",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/zitadel/zitadel/releases/tag/v2.67.13",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/zitadel/zitadel/releases/tag/v2.68.9",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/zitadel/zitadel/releases/tag/v2.69.9",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/zitadel/zitadel/releases/tag/v2.70.8",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/zitadel/zitadel/releases/tag/v2.71.6",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/zitadel/zitadel/security/advisories/GHSA-h3q7-347g-qwhf",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,104 @@
{
"id": "CVE-2025-31124",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-03-31T20:15:15.707",
"lastModified": "2025-03-31T20:15:15.707",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Zitadel is open-source identity infrastructure software. ZITADEL administrators can enable a setting called \"Ignoring unknown usernames\" which helps mitigate attacks that try to guess/enumerate usernames. If enabled, ZITADEL will show the password prompt even if the user doesn't exist and report \"Username or Password invalid\". While the setting was correctly respected during the login flow, the user's username was normalized leading to a disclosure of the user's existence. This vulnerability is fixed in 2.71.6, 2.70.8, 2.69.9, 2.68.9, 2.67.13, 2.66.16, 2.65.7, 2.64.6, and 2.63.9."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-200"
},
{
"lang": "en",
"value": "CWE-203"
},
{
"lang": "en",
"value": "CWE-204"
}
]
}
],
"references": [
{
"url": "https://github.com/zitadel/zitadel/commit/14de8ecac2afafee4975ed7ac26f3ca4a2b0f82c",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/zitadel/zitadel/releases/tag/v2.63.9",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/zitadel/zitadel/releases/tag/v2.64.6",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/zitadel/zitadel/releases/tag/v2.65.7",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/zitadel/zitadel/releases/tag/v2.66.16",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/zitadel/zitadel/releases/tag/v2.67.13",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/zitadel/zitadel/releases/tag/v2.68.9",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/zitadel/zitadel/releases/tag/v2.69.9",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/zitadel/zitadel/releases/tag/v2.70.8",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/zitadel/zitadel/releases/tag/v2.71.6",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/zitadel/zitadel/security/advisories/GHSA-67m4-8g4w-633q",
"source": "security-advisories@github.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update ### Last Repository Update
```plain ```plain
2025-03-31T20:00:19.638931+00:00 2025-03-31T22:00:19.882734+00:00
``` ```
### Most recent CVE Modification Timestamp synchronized with NVD ### Most recent CVE Modification Timestamp synchronized with NVD
```plain ```plain
2025-03-31T19:58:57.527000+00:00 2025-03-31T21:15:53.940000+00:00
``` ```
### Last Data Feed Release ### Last Data Feed Release
@ -33,51 +33,54 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs ### Total Number of included CVEs
```plain ```plain
287527 287543
``` ```
### CVEs added in the last Commit ### CVEs added in the last Commit
Recently added CVEs: `7` Recently added CVEs: `16`
- [CVE-2025-29908](CVE-2025/CVE-2025-299xx/CVE-2025-29908.json) (`2025-03-31T19:15:40.367`) - [CVE-2024-24456](CVE-2024/CVE-2024-244xx/CVE-2024-24456.json) (`2025-03-31T21:15:44.513`)
- [CVE-2025-3005](CVE-2025/CVE-2025-30xx/CVE-2025-3005.json) (`2025-03-31T18:15:34.180`) - [CVE-2024-54802](CVE-2024/CVE-2024-548xx/CVE-2024-54802.json) (`2025-03-31T21:15:47.203`)
- [CVE-2025-3006](CVE-2025/CVE-2025-30xx/CVE-2025-3006.json) (`2025-03-31T18:15:34.413`) - [CVE-2024-54803](CVE-2024/CVE-2024-548xx/CVE-2024-54803.json) (`2025-03-31T21:15:47.377`)
- [CVE-2025-3007](CVE-2025/CVE-2025-30xx/CVE-2025-3007.json) (`2025-03-31T19:15:43.860`) - [CVE-2024-54804](CVE-2024/CVE-2024-548xx/CVE-2024-54804.json) (`2025-03-31T21:15:47.560`)
- [CVE-2025-3008](CVE-2025/CVE-2025-30xx/CVE-2025-3008.json) (`2025-03-31T19:15:44.060`) - [CVE-2024-54805](CVE-2024/CVE-2024-548xx/CVE-2024-54805.json) (`2025-03-31T21:15:47.737`)
- [CVE-2025-31128](CVE-2025/CVE-2025-311xx/CVE-2025-31128.json) (`2025-03-31T19:15:42.883`) - [CVE-2024-54806](CVE-2024/CVE-2024-548xx/CVE-2024-54806.json) (`2025-03-31T21:15:47.923`)
- [CVE-2025-31129](CVE-2025/CVE-2025-311xx/CVE-2025-31129.json) (`2025-03-31T19:15:43.023`) - [CVE-2024-54807](CVE-2024/CVE-2024-548xx/CVE-2024-54807.json) (`2025-03-31T21:15:48.090`)
- [CVE-2024-54808](CVE-2024/CVE-2024-548xx/CVE-2024-54808.json) (`2025-03-31T21:15:48.310`)
- [CVE-2024-54809](CVE-2024/CVE-2024-548xx/CVE-2024-54809.json) (`2025-03-31T21:15:48.527`)
- [CVE-2025-21893](CVE-2025/CVE-2025-218xx/CVE-2025-21893.json) (`2025-03-31T20:15:14.613`)
- [CVE-2025-3009](CVE-2025/CVE-2025-30xx/CVE-2025-3009.json) (`2025-03-31T20:15:15.850`)
- [CVE-2025-3010](CVE-2025/CVE-2025-30xx/CVE-2025-3010.json) (`2025-03-31T20:15:16.023`)
- [CVE-2025-3015](CVE-2025/CVE-2025-30xx/CVE-2025-3015.json) (`2025-03-31T21:15:53.757`)
- [CVE-2025-3016](CVE-2025/CVE-2025-30xx/CVE-2025-3016.json) (`2025-03-31T21:15:53.940`)
- [CVE-2025-31123](CVE-2025/CVE-2025-311xx/CVE-2025-31123.json) (`2025-03-31T20:15:15.547`)
- [CVE-2025-31124](CVE-2025/CVE-2025-311xx/CVE-2025-31124.json) (`2025-03-31T20:15:15.707`)
### CVEs modified in the last Commit ### CVEs modified in the last Commit
Recently modified CVEs: `32` Recently modified CVEs: `19`
- [CVE-2024-42636](CVE-2024/CVE-2024-426xx/CVE-2024-42636.json) (`2025-03-31T18:49:02.283`) - [CVE-2018-0824](CVE-2018/CVE-2018-08xx/CVE-2018-0824.json) (`2025-03-31T21:03:30.687`)
- [CVE-2024-45528](CVE-2024/CVE-2024-455xx/CVE-2024-45528.json) (`2025-03-31T18:53:04.780`) - [CVE-2019-1069](CVE-2019/CVE-2019-10xx/CVE-2019-1069.json) (`2025-03-31T21:03:16.547`)
- [CVE-2024-46241](CVE-2024/CVE-2024-462xx/CVE-2024-46241.json) (`2025-03-31T19:20:33.810`) - [CVE-2024-24452](CVE-2024/CVE-2024-244xx/CVE-2024-24452.json) (`2025-03-31T21:15:43.370`)
- [CVE-2024-46373](CVE-2024/CVE-2024-463xx/CVE-2024-46373.json) (`2025-03-31T18:53:55.610`) - [CVE-2024-24453](CVE-2024/CVE-2024-244xx/CVE-2024-24453.json) (`2025-03-31T21:15:43.683`)
- [CVE-2024-46470](CVE-2024/CVE-2024-464xx/CVE-2024-46470.json) (`2025-03-31T19:19:17.120`) - [CVE-2024-24454](CVE-2024/CVE-2024-244xx/CVE-2024-24454.json) (`2025-03-31T21:15:43.950`)
- [CVE-2024-46471](CVE-2024/CVE-2024-464xx/CVE-2024-46471.json) (`2025-03-31T19:07:09.867`) - [CVE-2024-24455](CVE-2024/CVE-2024-244xx/CVE-2024-24455.json) (`2025-03-31T21:15:44.193`)
- [CVE-2024-46472](CVE-2024/CVE-2024-464xx/CVE-2024-46472.json) (`2025-03-31T19:02:48.263`) - [CVE-2024-24457](CVE-2024/CVE-2024-244xx/CVE-2024-24457.json) (`2025-03-31T21:15:44.697`)
- [CVE-2024-48807](CVE-2024/CVE-2024-488xx/CVE-2024-48807.json) (`2025-03-31T19:24:10.313`) - [CVE-2024-24458](CVE-2024/CVE-2024-244xx/CVE-2024-24458.json) (`2025-03-31T21:15:44.957`)
- [CVE-2024-49682](CVE-2024/CVE-2024-496xx/CVE-2024-49682.json) (`2025-03-31T18:13:05.940`) - [CVE-2024-24459](CVE-2024/CVE-2024-244xx/CVE-2024-24459.json) (`2025-03-31T21:15:46.887`)
- [CVE-2024-51063](CVE-2024/CVE-2024-510xx/CVE-2024-51063.json) (`2025-03-31T19:26:46.460`) - [CVE-2025-27167](CVE-2025/CVE-2025-271xx/CVE-2025-27167.json) (`2025-03-31T20:06:44.963`)
- [CVE-2024-51064](CVE-2024/CVE-2024-510xx/CVE-2024-51064.json) (`2025-03-31T19:29:12.110`) - [CVE-2025-27168](CVE-2025/CVE-2025-271xx/CVE-2025-27168.json) (`2025-03-31T20:06:08.030`)
- [CVE-2024-51065](CVE-2024/CVE-2024-510xx/CVE-2024-51065.json) (`2025-03-31T19:29:35.613`) - [CVE-2025-27170](CVE-2025/CVE-2025-271xx/CVE-2025-27170.json) (`2025-03-31T20:02:08.903`)
- [CVE-2024-51209](CVE-2024/CVE-2024-512xx/CVE-2024-51209.json) (`2025-03-31T19:32:18.943`) - [CVE-2025-28087](CVE-2025/CVE-2025-280xx/CVE-2025-28087.json) (`2025-03-31T21:15:52.970`)
- [CVE-2024-51938](CVE-2024/CVE-2024-519xx/CVE-2024-51938.json) (`2025-03-31T19:36:04.583`) - [CVE-2025-28089](CVE-2025/CVE-2025-280xx/CVE-2025-28089.json) (`2025-03-31T21:15:53.133`)
- [CVE-2024-6628](CVE-2024/CVE-2024-66xx/CVE-2024-6628.json) (`2025-03-31T19:58:57.527`) - [CVE-2025-28090](CVE-2025/CVE-2025-280xx/CVE-2025-28090.json) (`2025-03-31T20:15:14.967`)
- [CVE-2024-7054](CVE-2024/CVE-2024-70xx/CVE-2024-7054.json) (`2025-03-31T18:27:47.530`) - [CVE-2025-28091](CVE-2025/CVE-2025-280xx/CVE-2025-28091.json) (`2025-03-31T21:15:53.287`)
- [CVE-2024-9037](CVE-2024/CVE-2024-90xx/CVE-2024-9037.json) (`2025-03-31T18:55:16.680`) - [CVE-2025-28092](CVE-2025/CVE-2025-280xx/CVE-2025-28092.json) (`2025-03-31T20:15:15.203`)
- [CVE-2025-25579](CVE-2025/CVE-2025-255xx/CVE-2025-25579.json) (`2025-03-31T18:15:32.783`) - [CVE-2025-28093](CVE-2025/CVE-2025-280xx/CVE-2025-28093.json) (`2025-03-31T20:15:15.363`)
- [CVE-2025-28094](CVE-2025/CVE-2025-280xx/CVE-2025-28094.json) (`2025-03-31T18:15:33.010`) - [CVE-2025-30095](CVE-2025/CVE-2025-300xx/CVE-2025-30095.json) (`2025-03-31T21:15:53.653`)
- [CVE-2025-3002](CVE-2025/CVE-2025-30xx/CVE-2025-3002.json) (`2025-03-31T19:15:43.390`)
- [CVE-2025-3004](CVE-2025/CVE-2025-30xx/CVE-2025-3004.json) (`2025-03-31T19:15:43.613`)
- [CVE-2025-30149](CVE-2025/CVE-2025-301xx/CVE-2025-30149.json) (`2025-03-31T18:15:33.847`)
- [CVE-2025-31116](CVE-2025/CVE-2025-311xx/CVE-2025-31116.json) (`2025-03-31T19:15:42.300`)
- [CVE-2025-31117](CVE-2025/CVE-2025-311xx/CVE-2025-31117.json) (`2025-03-31T18:15:33.957`)
- [CVE-2025-31125](CVE-2025/CVE-2025-311xx/CVE-2025-31125.json) (`2025-03-31T18:15:34.070`)
## Download and Usage ## Download and Usage

View File

@ -110564,7 +110564,7 @@ CVE-2018-0820,0,0,0d28d246602159bbae69441a9f356fa161f12b9bb30a06db8e6a396e670389
CVE-2018-0821,0,0,9da5b8c5855d35a3774ba7acfe9c4f267a603c2005d06527ca1c0d305854f26a,2024-11-21T03:39:01.413000 CVE-2018-0821,0,0,9da5b8c5855d35a3774ba7acfe9c4f267a603c2005d06527ca1c0d305854f26a,2024-11-21T03:39:01.413000
CVE-2018-0822,0,0,4e8a53739e7f732491bfacba0f989f78cfb2074ef938f03f34c70cb053934f10,2024-11-21T03:39:01.550000 CVE-2018-0822,0,0,4e8a53739e7f732491bfacba0f989f78cfb2074ef938f03f34c70cb053934f10,2024-11-21T03:39:01.550000
CVE-2018-0823,0,0,a62e9539342440d4b1b221afd7aa1d8f538ad152a377cf869212dad4bfb180fa,2024-11-21T03:39:01.687000 CVE-2018-0823,0,0,a62e9539342440d4b1b221afd7aa1d8f538ad152a377cf869212dad4bfb180fa,2024-11-21T03:39:01.687000
CVE-2018-0824,0,0,444ddbb02a2bcdc5d188f482af5887385603ab531d6d3ae85b92d3adb551df38,2024-11-21T03:39:01.810000 CVE-2018-0824,0,1,67599506a21e58acf1fe4acef5c1f1ab3bbcb1dccf722c19bbfc9c2417e71e10,2025-03-31T21:03:30.687000
CVE-2018-0825,0,0,c9f1e3ccb9565229fd469bfc786df855c57c05d27edf7b79f090d0916fb2210e,2024-11-21T03:39:02.050000 CVE-2018-0825,0,0,c9f1e3ccb9565229fd469bfc786df855c57c05d27edf7b79f090d0916fb2210e,2024-11-21T03:39:02.050000
CVE-2018-0826,0,0,4a5dc634985608590a17dc664fbda049ad4f93710ba694368ed2a4eb57af83ad,2024-11-21T03:39:02.170000 CVE-2018-0826,0,0,4a5dc634985608590a17dc664fbda049ad4f93710ba694368ed2a4eb57af83ad,2024-11-21T03:39:02.170000
CVE-2018-0827,0,0,7534672b064dd544978b70aa3d672015d7ec12be6b3072ef2b883ca3a03c11f5,2024-11-21T03:39:02.293000 CVE-2018-0827,0,0,7534672b064dd544978b70aa3d672015d7ec12be6b3072ef2b883ca3a03c11f5,2024-11-21T03:39:02.293000
@ -129105,7 +129105,7 @@ CVE-2019-10686,0,0,8891fb7d0b26811d37e7099d3dcc0099d0e61349158441258419819237670
CVE-2019-10687,0,0,b3a83fd6b88d2188e97fea98f0303467be6b1d1183032c66dc18bda02996a01a,2024-11-21T04:19:45.183000 CVE-2019-10687,0,0,b3a83fd6b88d2188e97fea98f0303467be6b1d1183032c66dc18bda02996a01a,2024-11-21T04:19:45.183000
CVE-2019-10688,0,0,49777a8daa483f4f0587226832268b3a1578614d91b416b0cc352c84b13576a5,2024-11-21T04:19:45.347000 CVE-2019-10688,0,0,49777a8daa483f4f0587226832268b3a1578614d91b416b0cc352c84b13576a5,2024-11-21T04:19:45.347000
CVE-2019-10689,0,0,1498546decf9b31d102807ecf39e650c4630594e9ed54d965a53c4a5e405f2e7,2024-11-21T04:19:45.497000 CVE-2019-10689,0,0,1498546decf9b31d102807ecf39e650c4630594e9ed54d965a53c4a5e405f2e7,2024-11-21T04:19:45.497000
CVE-2019-1069,0,0,9ee89fbc77543b58add425149c59550fcadffbc523c351e17ea578a56da55599,2024-11-21T04:35:57.170000 CVE-2019-1069,0,1,adaeeb6547dcebc4b3928f59368a19e9d0e32be95afc963248929c1f577a5e71,2025-03-31T21:03:16.547000
CVE-2019-10691,0,0,3f7279d8ee8a3dd85cb122aafda3e40085f4a346c59e7433b9f7f62478239c9b,2024-11-21T04:19:45.653000 CVE-2019-10691,0,0,3f7279d8ee8a3dd85cb122aafda3e40085f4a346c59e7433b9f7f62478239c9b,2024-11-21T04:19:45.653000
CVE-2019-10692,0,0,155d0d82eae9a535c3f6c9585be8eecd2e8c658a757a20098a44283328d01d5b,2024-11-21T04:19:45.820000 CVE-2019-10692,0,0,155d0d82eae9a535c3f6c9585be8eecd2e8c658a757a20098a44283328d01d5b,2024-11-21T04:19:45.820000
CVE-2019-10694,0,0,7c79e338cae117eccf25d5c1d8d05413cccc71f35e923c4c7f43c44deb203409,2024-11-21T04:19:45.973000 CVE-2019-10694,0,0,7c79e338cae117eccf25d5c1d8d05413cccc71f35e923c4c7f43c44deb203409,2024-11-21T04:19:45.973000
@ -209825,8 +209825,8 @@ CVE-2022-4426,0,0,a3ca9724a11ccc28519507e8204ca711b4d9ece2f4bb42e6e31dc72ebccf3d
CVE-2022-44260,0,0,1c4c1cc0940e46fec25a6723e5be439eb2f38d024fd9df23b3785ecf3176cf49,2024-11-21T07:27:48.263000 CVE-2022-44260,0,0,1c4c1cc0940e46fec25a6723e5be439eb2f38d024fd9df23b3785ecf3176cf49,2024-11-21T07:27:48.263000
CVE-2022-44261,0,0,139de1fca3833524bd36dddfe32a4a9f9bbdc1d973a74d769923015d514359e4,2025-03-24T18:15:15.220000 CVE-2022-44261,0,0,139de1fca3833524bd36dddfe32a4a9f9bbdc1d973a74d769923015d514359e4,2025-03-24T18:15:15.220000
CVE-2022-44262,0,0,df27ede15d999ecbf37f3b9915aa80f3e7bc90d6c7a750dfcb57bab9d6626612,2024-11-21T07:27:48.563000 CVE-2022-44262,0,0,df27ede15d999ecbf37f3b9915aa80f3e7bc90d6c7a750dfcb57bab9d6626612,2024-11-21T07:27:48.563000
CVE-2022-44263,0,1,db470b797c55b2f6778b267d53686402da2348f8111a6ee7a6828f348777d328,2025-03-31T18:15:31.403000 CVE-2022-44263,0,0,db470b797c55b2f6778b267d53686402da2348f8111a6ee7a6828f348777d328,2025-03-31T18:15:31.403000
CVE-2022-44264,0,1,779dfdbf78c6db3f6a7e766f6d480440efaae96a6243d69ef9dde97872dd6408,2025-03-31T18:15:32.120000 CVE-2022-44264,0,0,779dfdbf78c6db3f6a7e766f6d480440efaae96a6243d69ef9dde97872dd6408,2025-03-31T18:15:32.120000
CVE-2022-44267,0,0,6a22eca4fc53a59b875002724e8ca628ee1225845b255410b7dc64d1dec8a6a7,2025-03-26T15:15:40.483000 CVE-2022-44267,0,0,6a22eca4fc53a59b875002724e8ca628ee1225845b255410b7dc64d1dec8a6a7,2025-03-26T15:15:40.483000
CVE-2022-44268,0,0,86770817170268b0a887cfc272f7da52b49cec04a13993803745dc916220b476,2025-03-26T15:15:40.750000 CVE-2022-44268,0,0,86770817170268b0a887cfc272f7da52b49cec04a13993803745dc916220b476,2025-03-26T15:15:40.750000
CVE-2022-4427,0,0,82b0a1c58b5dd3ffe303de84aa02a3ea240cbfc72b927c3086bf0c900a159f18,2025-02-13T17:15:50.667000 CVE-2022-4427,0,0,82b0a1c58b5dd3ffe303de84aa02a3ea240cbfc72b927c3086bf0c900a159f18,2025-02-13T17:15:50.667000
@ -209845,7 +209845,7 @@ CVE-2022-44291,0,0,9d44a52c0685eb10cd09eb5b4a4bf46a64acf311680ee93d8ff00dae5d22c
CVE-2022-44294,0,0,fbcc7bad653c47067cd2250119a45f329a299e47e13ee007fce37d3922b0301d,2024-11-21T07:27:50.893000 CVE-2022-44294,0,0,fbcc7bad653c47067cd2250119a45f329a299e47e13ee007fce37d3922b0301d,2024-11-21T07:27:50.893000
CVE-2022-44295,0,0,dd91142188732e917945f2d36e80ce804150e337345a896a8870b3253337b9ca,2024-11-21T07:27:51.037000 CVE-2022-44295,0,0,dd91142188732e917945f2d36e80ce804150e337345a896a8870b3253337b9ca,2024-11-21T07:27:51.037000
CVE-2022-44296,0,0,7649a4fa26d775b1f335af01076e6fd037e2e30d459c85beba18d63ea728e5a1,2024-11-21T07:27:51.180000 CVE-2022-44296,0,0,7649a4fa26d775b1f335af01076e6fd037e2e30d459c85beba18d63ea728e5a1,2024-11-21T07:27:51.180000
CVE-2022-44297,0,1,714bd75efbc7ed32a384c2a9a61ddee8e01257597043f794fe8a7326c79b21f2,2025-03-31T18:15:32.340000 CVE-2022-44297,0,0,714bd75efbc7ed32a384c2a9a61ddee8e01257597043f794fe8a7326c79b21f2,2025-03-31T18:15:32.340000
CVE-2022-44298,0,0,69edc3dce983df3c9b5e495ef31c54ebf4e519fcc6525f1ed747f9af4e6eaf26,2025-03-28T15:15:42.390000 CVE-2022-44298,0,0,69edc3dce983df3c9b5e495ef31c54ebf4e519fcc6525f1ed747f9af4e6eaf26,2025-03-28T15:15:42.390000
CVE-2022-44299,0,0,5adbf77681e09b8399532a96a6a9d4ae34eead786fe1c0029300fa2d65f72929,2025-03-19T15:15:41.873000 CVE-2022-44299,0,0,5adbf77681e09b8399532a96a6a9d4ae34eead786fe1c0029300fa2d65f72929,2025-03-19T15:15:41.873000
CVE-2022-44303,0,0,d9191fcb3c264206571cc2273401cd659061e66b5b01af1a0d6f1bcc3f8d893f,2024-11-21T07:27:51.750000 CVE-2022-44303,0,0,d9191fcb3c264206571cc2273401cd659061e66b5b01af1a0d6f1bcc3f8d893f,2024-11-21T07:27:51.750000
@ -210816,7 +210816,7 @@ CVE-2022-45766,0,0,72c36f29c35874580c535822342cd020836969f971dd723babdaa8c49bbc8
CVE-2022-45768,0,0,5a7e71b10745f7171b546446b7eb1beeca8e54d2bd161b17d6d1ae2a2af3a55f,2025-03-25T15:15:16.277000 CVE-2022-45768,0,0,5a7e71b10745f7171b546446b7eb1beeca8e54d2bd161b17d6d1ae2a2af3a55f,2025-03-25T15:15:16.277000
CVE-2022-45769,0,0,1e8f47f2d9403072669e2f933abb158f13fef15333df9238a51a36c60ca747fe,2024-11-21T07:29:41.063000 CVE-2022-45769,0,0,1e8f47f2d9403072669e2f933abb158f13fef15333df9238a51a36c60ca747fe,2024-11-21T07:29:41.063000
CVE-2022-4577,0,0,0ee64bdcd89d460efc049aed42aba77caafdf317c23948db93ad4449cf4198e2,2025-03-26T14:15:25.800000 CVE-2022-4577,0,0,0ee64bdcd89d460efc049aed42aba77caafdf317c23948db93ad4449cf4198e2,2025-03-26T14:15:25.800000
CVE-2022-45770,0,1,8c5a7a8c2aa10a10529c3afa32edfc0cf29620d9a30ac85ce666d9550489805b,2025-03-31T19:15:39.220000 CVE-2022-45770,0,0,8c5a7a8c2aa10a10529c3afa32edfc0cf29620d9a30ac85ce666d9550489805b,2025-03-31T19:15:39.220000
CVE-2022-45771,0,0,187d8b7379b23beda0c4ec7f844878da04db33c0b9e71fb3308e9216031fa00e,2024-11-21T07:29:41.360000 CVE-2022-45771,0,0,187d8b7379b23beda0c4ec7f844878da04db33c0b9e71fb3308e9216031fa00e,2024-11-21T07:29:41.360000
CVE-2022-45778,0,0,ba2c0e56310856b947c1011dc3c1bb60c6e63585e41ef402feb38046d5722fc0,2024-11-21T07:29:41.500000 CVE-2022-45778,0,0,ba2c0e56310856b947c1011dc3c1bb60c6e63585e41ef402feb38046d5722fc0,2024-11-21T07:29:41.500000
CVE-2022-4578,0,0,d7acb6c771f7a789d19f6484a24a188e3f6503cc9345077d8e8dad2ae76e5701,2024-11-21T07:35:31.883000 CVE-2022-4578,0,0,d7acb6c771f7a789d19f6484a24a188e3f6503cc9345077d8e8dad2ae76e5701,2024-11-21T07:35:31.883000
@ -244960,7 +244960,7 @@ CVE-2024-1051,0,0,47e83543cdb00e91b0b2e6dfcb71fb878c597c188c0668b9ed609335433c9d
CVE-2024-10510,0,0,1a1b225dc371f891ed5076d52ce3977c9397cc1b9a9aecca92726347c481951f,2024-11-29T16:15:08.733000 CVE-2024-10510,0,0,1a1b225dc371f891ed5076d52ce3977c9397cc1b9a9aecca92726347c481951f,2024-11-29T16:15:08.733000
CVE-2024-10511,0,0,5e411f234441d712e134066c0fb752802b5b0a3f0734c4d32360f037e4b5a3aa,2024-12-11T09:15:05.293000 CVE-2024-10511,0,0,5e411f234441d712e134066c0fb752802b5b0a3f0734c4d32360f037e4b5a3aa,2024-12-11T09:15:05.293000
CVE-2024-10513,0,0,101dcfdb0daebc1898491c44833014dafb9860a3d1daf4cd8931e7be27303eeb,2025-03-20T10:15:17.140000 CVE-2024-10513,0,0,101dcfdb0daebc1898491c44833014dafb9860a3d1daf4cd8931e7be27303eeb,2025-03-20T10:15:17.140000
CVE-2024-10515,0,1,70e4b8a115d447d9e5de069185152143410d2b26272dd3213172f4c642a76ca3,2025-03-31T19:33:29.490000 CVE-2024-10515,0,0,70e4b8a115d447d9e5de069185152143410d2b26272dd3213172f4c642a76ca3,2025-03-31T19:33:29.490000
CVE-2024-10516,0,0,2ebd9272720b07a5cf79c9a9ceb37a855be1402b37d213d1f22547ec3a1c9ddf,2024-12-06T14:15:19.667000 CVE-2024-10516,0,0,2ebd9272720b07a5cf79c9a9ceb37a855be1402b37d213d1f22547ec3a1c9ddf,2024-12-06T14:15:19.667000
CVE-2024-10517,0,0,ec874f706d612987436415b14947527e0ec4826e3f1f3a52572b8d2041a7e176,2024-12-12T16:15:10.483000 CVE-2024-10517,0,0,ec874f706d612987436415b14947527e0ec4826e3f1f3a52572b8d2041a7e176,2024-12-12T16:15:10.483000
CVE-2024-10518,0,0,9b672e9ec0f2ce289c42bf794385cc1499fe101df107e5b1e23b7eac5052f943,2024-12-12T16:15:10.890000 CVE-2024-10518,0,0,9b672e9ec0f2ce289c42bf794385cc1499fe101df107e5b1e23b7eac5052f943,2024-12-12T16:15:10.890000
@ -249325,7 +249325,7 @@ CVE-2024-20482,0,0,91c065c5ae8268289342d832aa225585cff358d487a277492c0f30ad7fadd
CVE-2024-20483,0,0,dd75006a4b8378f9a9fb04ae844db2b682dee979eaed8461ca1ae896a3344cd6,2024-10-03T01:44:17.827000 CVE-2024-20483,0,0,dd75006a4b8378f9a9fb04ae844db2b682dee979eaed8461ca1ae896a3344cd6,2024-10-03T01:44:17.827000
CVE-2024-20484,0,0,6b6707e10852e13633700ba01618bcd1e8ced80c7c9f83e2b3f114bf128939f6,2024-11-06T18:17:17.287000 CVE-2024-20484,0,0,6b6707e10852e13633700ba01618bcd1e8ced80c7c9f83e2b3f114bf128939f6,2024-11-06T18:17:17.287000
CVE-2024-20485,0,0,4bad42c478a01f00d273ab8662a0d6beb1a29cef37718efc29530f0725b7110b,2024-11-01T19:50:11.107000 CVE-2024-20485,0,0,4bad42c478a01f00d273ab8662a0d6beb1a29cef37718efc29530f0725b7110b,2024-11-01T19:50:11.107000
CVE-2024-20486,0,1,125fccffe06e3967c8f3666e5a0a779870a3e9c6cd485fa1df233aa67fbb99ea,2025-03-31T18:20:38.103000 CVE-2024-20486,0,0,125fccffe06e3967c8f3666e5a0a779870a3e9c6cd485fa1df233aa67fbb99ea,2025-03-31T18:20:38.103000
CVE-2024-20487,0,0,90a43a4226fc2a3a08656cd3b727e32adf773edd1ff69cf850e5d113d82153c1,2024-11-06T18:17:17.287000 CVE-2024-20487,0,0,90a43a4226fc2a3a08656cd3b727e32adf773edd1ff69cf850e5d113d82153c1,2024-11-06T18:17:17.287000
CVE-2024-20488,0,0,3eba64ac5c64e3a05ab3229d3a319f5d11c1176e28d49e535d0362c8cf9be279,2024-09-06T17:18:11.813000 CVE-2024-20488,0,0,3eba64ac5c64e3a05ab3229d3a319f5d11c1176e28d49e535d0362c8cf9be279,2024-09-06T17:18:11.813000
CVE-2024-20489,0,0,c515a7131b885c709ec34ee863eb206793a1025f593d2aba1eec899a42a269a8,2024-10-03T01:40:11.637000 CVE-2024-20489,0,0,c515a7131b885c709ec34ee863eb206793a1025f593d2aba1eec899a42a269a8,2024-10-03T01:40:11.637000
@ -252467,13 +252467,14 @@ CVE-2024-24449,0,0,cb429ffc1f73fa46512b04b6b6b7262785b1e5e3d056a09b6c1ac751016dc
CVE-2024-2445,0,0,caebbca57e6dc905fece28cfd8e27fbd318000c7101a9c9ad5d052cb37da5e31,2024-12-13T17:15:49.207000 CVE-2024-2445,0,0,caebbca57e6dc905fece28cfd8e27fbd318000c7101a9c9ad5d052cb37da5e31,2024-12-13T17:15:49.207000
CVE-2024-24450,0,0,bfdf5a51b70b0375ac650a265388caa7ba6f2b773803891c0563ccf75c951b15,2024-11-18T17:11:56.587000 CVE-2024-24450,0,0,bfdf5a51b70b0375ac650a265388caa7ba6f2b773803891c0563ccf75c951b15,2024-11-18T17:11:56.587000
CVE-2024-24451,0,0,2047230038706a6ea449594aac339b5a79a1ce23f8545e56ac9ddd4465baf12d,2025-01-24T20:15:32.263000 CVE-2024-24451,0,0,2047230038706a6ea449594aac339b5a79a1ce23f8545e56ac9ddd4465baf12d,2025-01-24T20:15:32.263000
CVE-2024-24452,0,0,9b35057c4f8238c71060c4a3362de0c41210e1bb46a2fdae5c8c842b460d1809,2024-11-18T17:11:56.587000 CVE-2024-24452,0,1,9aa3205d78f1b8367d050ac692b4d7b2d2a817bbe6be31e8eee694911f917dd0,2025-03-31T21:15:43.370000
CVE-2024-24453,0,0,7dbe40dab6b44347c4e5eb5b29ed5a220fbd48ca061b2817d1f080948c6c4725,2024-11-18T17:11:56.587000 CVE-2024-24453,0,1,07ce55fb9f095045ad95fb21b47b54148065f631b3fd0d8f468d663dd94cfda8,2025-03-31T21:15:43.683000
CVE-2024-24454,0,0,16fe1707e5b6500467b31b614258ea3c9d6830f97969cc4c9d7fb698042d7182,2024-11-18T17:11:56.587000 CVE-2024-24454,0,1,5c2bd54ad8fc2f1543c60195e4dbb3af2c70d2e8d29fea1e0c443c2f494a0a4f,2025-03-31T21:15:43.950000
CVE-2024-24455,0,0,bf34919ca18efc343fa332f515b04d4eef692b470371474f2b29a7fce41546b7,2024-11-18T17:11:56.587000 CVE-2024-24455,0,1,502d4dd8b46c6151371bd5e943048eb0545d554441e272079a097510fb13b6e1,2025-03-31T21:15:44.193000
CVE-2024-24457,0,0,b7bbb2b5a810c1fadde3472c6ef27ef7a83a2fcac2d1955d127019f7529ac816,2024-11-18T17:11:56.587000 CVE-2024-24456,1,1,23859e18334d311069bd2883cb0529381eb7240f1b5b7afa923ed46511ae2078,2025-03-31T21:15:44.513000
CVE-2024-24458,0,0,ea6d0c7194c84aafdf27031e8442770fc2b8ba09fa460fb6ddecbbd88a347c2f,2024-11-18T17:11:56.587000 CVE-2024-24457,0,1,d2e8d373f9d57bd477032938d24f522c47b66f04dea00a8e69a47432d7e011ba,2025-03-31T21:15:44.697000
CVE-2024-24459,0,0,3dfc7e14cb29b50f38f109078f5cb39635a43ed4b26fc1dfc7678b12ee1f40a1,2024-11-18T17:11:56.587000 CVE-2024-24458,0,1,a5484b0fe42741bb8d668d79927c6e7c3ee357596180e82a5cf95201bf23335c,2025-03-31T21:15:44.957000
CVE-2024-24459,0,1,71db539dc29bad108be9fb9402dcdbfd179a3be0ce3ce40b183975a79316afe6,2025-03-31T21:15:46.887000
CVE-2024-2446,0,0,43217bdd586fe0adfbce35dce1a075395c2a23d609c9f19c21f34e2c598fb7e4,2024-12-13T16:39:51.233000 CVE-2024-2446,0,0,43217bdd586fe0adfbce35dce1a075395c2a23d609c9f19c21f34e2c598fb7e4,2024-12-13T16:39:51.233000
CVE-2024-24468,0,0,ef2f46bc00e60b0046ac3fa8a85a5d2843a4126050811a264748033c1f6c0bfa,2024-11-21T08:59:18.197000 CVE-2024-24468,0,0,ef2f46bc00e60b0046ac3fa8a85a5d2843a4126050811a264748033c1f6c0bfa,2024-11-21T08:59:18.197000
CVE-2024-24469,0,0,f5bdfa2b37924c81cf855da4fc554fb14c8183e30574a75cfd35962e7d0ac2c1,2024-11-21T08:59:18.353000 CVE-2024-24469,0,0,f5bdfa2b37924c81cf855da4fc554fb14c8183e30574a75cfd35962e7d0ac2c1,2024-11-21T08:59:18.353000
@ -264342,7 +264343,7 @@ CVE-2024-39655,0,0,995dc9c1c7c96fb0fc03e66270fab2cb1ffcf8a4397ddb365981e39389c67
CVE-2024-39656,0,0,c84c39d5a0694c7d1c872fcafc2d435755839df103c210d90013e7441c34bda1,2024-08-02T12:59:43.990000 CVE-2024-39656,0,0,c84c39d5a0694c7d1c872fcafc2d435755839df103c210d90013e7441c34bda1,2024-08-02T12:59:43.990000
CVE-2024-39657,0,0,2bf07190211ec64f7bfc9e8a96ee124b8611e75c850679013b89e79b547f6896,2024-09-18T16:25:32.703000 CVE-2024-39657,0,0,2bf07190211ec64f7bfc9e8a96ee124b8611e75c850679013b89e79b547f6896,2024-09-18T16:25:32.703000
CVE-2024-39658,0,0,766eb85a1304afebac868b111e71876df3cfe7453afe0f78210d30bdcb174f44,2024-09-13T21:04:24.760000 CVE-2024-39658,0,0,766eb85a1304afebac868b111e71876df3cfe7453afe0f78210d30bdcb174f44,2024-09-13T21:04:24.760000
CVE-2024-39659,0,1,eb277be69da7ae63c72d03b1700b1623310358a8537a25ae64fc0cec58e225c5,2025-03-31T18:22:48.390000 CVE-2024-39659,0,0,eb277be69da7ae63c72d03b1700b1623310358a8537a25ae64fc0cec58e225c5,2025-03-31T18:22:48.390000
CVE-2024-3966,0,0,063645d8989e4cabc49b793f8b061eb0fa5ef40aff4317a82395a925db517939,2024-11-21T09:30:47.557000 CVE-2024-3966,0,0,063645d8989e4cabc49b793f8b061eb0fa5ef40aff4317a82395a925db517939,2024-11-21T09:30:47.557000
CVE-2024-39660,0,0,f3ac8304b1d224b0071a3a78df5d2888502abdabd1c64183297a33de85b58c9a,2024-08-02T12:59:43.990000 CVE-2024-39660,0,0,f3ac8304b1d224b0071a3a78df5d2888502abdabd1c64183297a33de85b58c9a,2024-08-02T12:59:43.990000
CVE-2024-39661,0,0,2412d25c8e1b3b5f410f5c79baa180c712b7da235f8a4069d0bcbeb29ba3f2d1,2024-08-02T12:59:43.990000 CVE-2024-39661,0,0,2412d25c8e1b3b5f410f5c79baa180c712b7da235f8a4069d0bcbeb29ba3f2d1,2024-08-02T12:59:43.990000
@ -266503,7 +266504,7 @@ CVE-2024-42631,0,0,ed9e80e71e882419c98f1936732fdd035ca311ef33bc2ac9cb2a1a67c40af
CVE-2024-42632,0,0,29fbd74151313f5b4a9b1372c595b1fee99cc3a87d35047777c8872345464e5c,2024-08-13T15:35:23.410000 CVE-2024-42632,0,0,29fbd74151313f5b4a9b1372c595b1fee99cc3a87d35047777c8872345464e5c,2024-08-13T15:35:23.410000
CVE-2024-42633,0,0,3cf92e5e6df7470ec76959fa70236d85e9e9942650bdcd767e84cd8dbdc27aee,2024-08-20T16:18:24.300000 CVE-2024-42633,0,0,3cf92e5e6df7470ec76959fa70236d85e9e9942650bdcd767e84cd8dbdc27aee,2024-08-20T16:18:24.300000
CVE-2024-42634,0,0,e316dd50ac7dd29fbd6d3ac410c9dd2e383d0fa3a5124d95a220d9396a05eb2a,2024-08-19T13:00:23.117000 CVE-2024-42634,0,0,e316dd50ac7dd29fbd6d3ac410c9dd2e383d0fa3a5124d95a220d9396a05eb2a,2024-08-19T13:00:23.117000
CVE-2024-42636,0,1,444e64fac4a624fc737f489868061b86775d9e59f0cfa512926ca33905ecdabe,2025-03-31T18:49:02.283000 CVE-2024-42636,0,0,444e64fac4a624fc737f489868061b86775d9e59f0cfa512926ca33905ecdabe,2025-03-31T18:49:02.283000
CVE-2024-42637,0,0,7ab579a16c75673edf60ac8a3c57e5d93e8a15ee1bb0faf828bd0c37998bf12d,2024-08-19T13:00:23.117000 CVE-2024-42637,0,0,7ab579a16c75673edf60ac8a3c57e5d93e8a15ee1bb0faf828bd0c37998bf12d,2024-08-19T13:00:23.117000
CVE-2024-42638,0,0,2c1b857f0b965ac40814489cb21be9b393c58462d1ddf36b59e226e27acdcc88,2025-03-17T15:15:41.303000 CVE-2024-42638,0,0,2c1b857f0b965ac40814489cb21be9b393c58462d1ddf36b59e226e27acdcc88,2025-03-17T15:15:41.303000
CVE-2024-42639,0,0,7ae4bb182bb632802f21a7f071d6ecf69b498e4a7b1d31bfaeb90705ae0f6221,2025-03-20T14:15:20.170000 CVE-2024-42639,0,0,7ae4bb182bb632802f21a7f071d6ecf69b498e4a7b1d31bfaeb90705ae0f6221,2025-03-20T14:15:20.170000
@ -268698,7 +268699,7 @@ CVE-2024-45522,0,0,09ceef78cc5f057be786bb183a479b765b1739f0b7ce2fbf1b1d3c524b7ab
CVE-2024-45523,0,0,78921820db852b485259b411f9a0300a9a0274594719508f8ffa7f118abb2798,2024-09-20T14:35:11.523000 CVE-2024-45523,0,0,78921820db852b485259b411f9a0300a9a0274594719508f8ffa7f118abb2798,2024-09-20T14:35:11.523000
CVE-2024-45526,0,0,5a2809434001f8fa7518dd39e1d76ce252063ceb0c771a1023d6ee67c4c4a925,2024-10-23T19:35:10.713000 CVE-2024-45526,0,0,5a2809434001f8fa7518dd39e1d76ce252063ceb0c771a1023d6ee67c4c4a925,2024-10-23T19:35:10.713000
CVE-2024-45527,0,0,5b520308e8c1543ba589bbb7fb99705b7715af5ae5704181f6c1c8d8f972f51c,2024-09-03T15:35:13.673000 CVE-2024-45527,0,0,5b520308e8c1543ba589bbb7fb99705b7715af5ae5704181f6c1c8d8f972f51c,2024-09-03T15:35:13.673000
CVE-2024-45528,0,1,2b62a46ad6721df273bf579b352dfc41d4b63f87803bbdffe8980da05bd0cffe,2025-03-31T18:53:04.780000 CVE-2024-45528,0,0,2b62a46ad6721df273bf579b352dfc41d4b63f87803bbdffe8980da05bd0cffe,2025-03-31T18:53:04.780000
CVE-2024-4553,0,0,fb93ea8b9b15d40065d6ae14704246d0707e85e61c82926c0504e92275e39cb7,2025-01-24T14:42:56.390000 CVE-2024-4553,0,0,fb93ea8b9b15d40065d6ae14704246d0707e85e61c82926c0504e92275e39cb7,2025-01-24T14:42:56.390000
CVE-2024-45537,0,0,e4991fccb3abdc03f0d41abc273d14fb886e4c1626430be204dd2dbbe1a63e8d,2025-03-14T15:15:42.430000 CVE-2024-45537,0,0,e4991fccb3abdc03f0d41abc273d14fb886e4c1626430be204dd2dbbe1a63e8d,2025-03-14T15:15:42.430000
CVE-2024-4554,0,0,29103eb4d0b8fc6eb1c1a81b44a6bbfd0c979fea9590f8c8dd85408f98483465,2024-09-19T18:15:10.433000 CVE-2024-4554,0,0,29103eb4d0b8fc6eb1c1a81b44a6bbfd0c979fea9590f8c8dd85408f98483465,2024-09-19T18:15:10.433000
@ -269073,7 +269074,7 @@ CVE-2024-46238,0,0,fd4831862db3e74117454bdc4a0bfbcd296d65ce950e55d96b45ec27cf047
CVE-2024-46239,0,0,a2e0203fe405dc3797841252c2430cf2c4e2c3b10af81b0193959b83c529ddd1,2025-03-31T17:52:58.943000 CVE-2024-46239,0,0,a2e0203fe405dc3797841252c2430cf2c4e2c3b10af81b0193959b83c529ddd1,2025-03-31T17:52:58.943000
CVE-2024-4624,0,0,18970f9a313d13160da6e0af938d898396349890d09a8f8861dd5be486e648a9,2025-01-15T18:00:53.760000 CVE-2024-4624,0,0,18970f9a313d13160da6e0af938d898396349890d09a8f8861dd5be486e648a9,2025-01-15T18:00:53.760000
CVE-2024-46240,0,0,1191cdf44b6509cbee2a8abac44a625a4ac7bf4a3622ea84bd1d88a32af8af69,2024-10-25T19:00:20.737000 CVE-2024-46240,0,0,1191cdf44b6509cbee2a8abac44a625a4ac7bf4a3622ea84bd1d88a32af8af69,2024-10-25T19:00:20.737000
CVE-2024-46241,0,1,65a068281839d70d77856026e22ffe1b7df2d3ec55dc4b9009edbb9990408570,2025-03-31T19:20:33.810000 CVE-2024-46241,0,0,65a068281839d70d77856026e22ffe1b7df2d3ec55dc4b9009edbb9990408570,2025-03-31T19:20:33.810000
CVE-2024-46242,0,0,278c5d74ca553d7a6ee7eea1c9d6c6283b4a956d21df9f54eec439967fafe153,2025-01-07T21:15:11.783000 CVE-2024-46242,0,0,278c5d74ca553d7a6ee7eea1c9d6c6283b4a956d21df9f54eec439967fafe153,2025-01-07T21:15:11.783000
CVE-2024-4625,0,0,aad46a28d2c2f49a77b5936172e43c0dde451e0472cbbc7daa3b8775fd5ff0b1,2025-02-11T02:15:35.090000 CVE-2024-4625,0,0,aad46a28d2c2f49a77b5936172e43c0dde451e0472cbbc7daa3b8775fd5ff0b1,2025-02-11T02:15:35.090000
CVE-2024-46256,0,0,e8ff1292d6b21c7ae8cc6b0452346dfd4818ec086d9a14227767a4b9e342f7b1,2024-10-24T17:15:16.690000 CVE-2024-46256,0,0,e8ff1292d6b21c7ae8cc6b0452346dfd4818ec086d9a14227767a4b9e342f7b1,2024-10-24T17:15:16.690000
@ -269121,7 +269122,7 @@ CVE-2024-46366,0,0,d617ffae88cb828c6e7151f2341d1f71470550fda14e8fcb6482b905bda24
CVE-2024-46367,0,0,989a85d08e8653df07e4eae1f4f794bd57485ed7719e4f75ea7a012b27c892b7,2024-09-30T12:45:57.823000 CVE-2024-46367,0,0,989a85d08e8653df07e4eae1f4f794bd57485ed7719e4f75ea7a012b27c892b7,2024-09-30T12:45:57.823000
CVE-2024-4637,0,0,93f87c1fc2bbd96796cfb083c4131106f07be323f4ade6a9313776a7f9a8739b,2025-01-27T18:22:19.963000 CVE-2024-4637,0,0,93f87c1fc2bbd96796cfb083c4131106f07be323f4ade6a9313776a7f9a8739b,2025-01-27T18:22:19.963000
CVE-2024-46372,0,0,64e69d8d7d4508ebfd1e3370be60554c61b02f56bb1b126b7d6932b73c4bd8b4,2025-03-25T17:16:10.433000 CVE-2024-46372,0,0,64e69d8d7d4508ebfd1e3370be60554c61b02f56bb1b126b7d6932b73c4bd8b4,2025-03-25T17:16:10.433000
CVE-2024-46373,0,1,a07e5ed04eabb8b296855fe8ef81409c9a84dee991735b3ba28d11997413b1db,2025-03-31T18:53:55.610000 CVE-2024-46373,0,0,a07e5ed04eabb8b296855fe8ef81409c9a84dee991735b3ba28d11997413b1db,2025-03-31T18:53:55.610000
CVE-2024-46374,0,0,49c9abdfd23a3c7b397e5069ae4701ce6b671bb400b51adb0be2528c878db0de,2024-09-20T12:30:17.483000 CVE-2024-46374,0,0,49c9abdfd23a3c7b397e5069ae4701ce6b671bb400b51adb0be2528c878db0de,2024-09-20T12:30:17.483000
CVE-2024-46375,0,0,251c5c224cd39f4fe15f3a9045f8fa195e4dd35b1c8aeb90a1494c5706870ceb,2024-09-20T12:30:17.483000 CVE-2024-46375,0,0,251c5c224cd39f4fe15f3a9045f8fa195e4dd35b1c8aeb90a1494c5706870ceb,2024-09-20T12:30:17.483000
CVE-2024-46376,0,0,44f3c1706e60f5bd7bbcaa0829495448a78c5a8ae7d0d5596087882889678073,2024-09-20T12:30:17.483000 CVE-2024-46376,0,0,44f3c1706e60f5bd7bbcaa0829495448a78c5a8ae7d0d5596087882889678073,2024-09-20T12:30:17.483000
@ -269167,9 +269168,9 @@ CVE-2024-46466,0,0,05f240dba70d063ab9d7ed20681eedb762fbba20cc02e0363e22d4808d27c
CVE-2024-46467,0,0,73f0f26e819634cb625c5f23b0aee6baa6651d870b71db2a09d09f42a1c60f90,2024-11-25T20:15:09.170000 CVE-2024-46467,0,0,73f0f26e819634cb625c5f23b0aee6baa6651d870b71db2a09d09f42a1c60f90,2024-11-25T20:15:09.170000
CVE-2024-46468,0,0,bfaaa209cfbab67a97fdbb03a6d72f15cdef7f2e107fbbe0bd40bea4fa9e260b,2024-10-15T18:35:14.680000 CVE-2024-46468,0,0,bfaaa209cfbab67a97fdbb03a6d72f15cdef7f2e107fbbe0bd40bea4fa9e260b,2024-10-15T18:35:14.680000
CVE-2024-4647,0,0,ecc1578f1607d877ec09ef9a154e3163dc45f1d50cf87949c0a4d645b7b7eaf9,2025-02-19T18:04:19.093000 CVE-2024-4647,0,0,ecc1578f1607d877ec09ef9a154e3163dc45f1d50cf87949c0a4d645b7b7eaf9,2025-02-19T18:04:19.093000
CVE-2024-46470,0,1,ccd900df91568f37aaaf8beaddb896f7b1bf9ff01c6bf3d8989063329ed3c1e7,2025-03-31T19:19:17.120000 CVE-2024-46470,0,0,ccd900df91568f37aaaf8beaddb896f7b1bf9ff01c6bf3d8989063329ed3c1e7,2025-03-31T19:19:17.120000
CVE-2024-46471,0,1,95b680df6f7ac557262e9483a5a0b48e0997cd8bfadfc2bd86c9ad1edd8cade7,2025-03-31T19:07:09.867000 CVE-2024-46471,0,0,95b680df6f7ac557262e9483a5a0b48e0997cd8bfadfc2bd86c9ad1edd8cade7,2025-03-31T19:07:09.867000
CVE-2024-46472,0,1,98034addb2dd3db31543176eec90b3d6be943e239cb4afda9c52b024f5b4c496,2025-03-31T19:02:48.263000 CVE-2024-46472,0,0,98034addb2dd3db31543176eec90b3d6be943e239cb4afda9c52b024f5b4c496,2025-03-31T19:02:48.263000
CVE-2024-46475,0,0,8de337bf21f8e76ccf4e6b762e2c811bd622fb2d069c67372f969f963e9a513d,2024-10-04T13:51:25.567000 CVE-2024-46475,0,0,8de337bf21f8e76ccf4e6b762e2c811bd622fb2d069c67372f969f963e9a513d,2024-10-04T13:51:25.567000
CVE-2024-46478,0,0,f70f3b5c1ce34e91e4141e4b2cfc565865d5d214d85b67dd8586cdb93782907f,2024-10-25T20:35:09.710000 CVE-2024-46478,0,0,f70f3b5c1ce34e91e4141e4b2cfc565865d5d214d85b67dd8586cdb93782907f,2024-10-25T20:35:09.710000
CVE-2024-46479,0,0,d3dcd1fb5238b07184a4925343df44d4e6e159f370a4f241b86afa356047b5d1,2025-01-13T18:15:18.003000 CVE-2024-46479,0,0,d3dcd1fb5238b07184a4925343df44d4e6e159f370a4f241b86afa356047b5d1,2025-01-13T18:15:18.003000
@ -270865,7 +270866,7 @@ CVE-2024-48798,0,0,75f45576dc36face7290312bd25d8139caf8bd952fb64803e744a3ae6e924
CVE-2024-48799,0,0,1b7764cd349b8845e947ef033fa31339932e6c95b96b723a19e36094142fff50,2025-03-24T17:15:18.960000 CVE-2024-48799,0,0,1b7764cd349b8845e947ef033fa31339932e6c95b96b723a19e36094142fff50,2025-03-24T17:15:18.960000
CVE-2024-4880,0,0,0cc985577bb7f14539feddc231097b9e719890ea446692f0e1ab269d57e2a39c,2025-02-11T02:15:35.143000 CVE-2024-4880,0,0,0cc985577bb7f14539feddc231097b9e719890ea446692f0e1ab269d57e2a39c,2025-02-11T02:15:35.143000
CVE-2024-48806,0,0,c426ca49ad75210c4d73c5b573e2dd3e119056b8e0f3da40ade3d13a5fdaf0d5,2025-01-16T19:15:28.320000 CVE-2024-48806,0,0,c426ca49ad75210c4d73c5b573e2dd3e119056b8e0f3da40ade3d13a5fdaf0d5,2025-01-16T19:15:28.320000
CVE-2024-48807,0,1,8a88a75c275ba7d848707c49505be930f471d4f3e024973e5d06d59680ee7a1a,2025-03-31T19:24:10.313000 CVE-2024-48807,0,0,8a88a75c275ba7d848707c49505be930f471d4f3e024973e5d06d59680ee7a1a,2025-03-31T19:24:10.313000
CVE-2024-48809,0,0,89c64378ba71cdec8bda78ac432f0505d060e9c4a712bdefd0c0360dbcd52353,2024-11-06T19:33:54.977000 CVE-2024-48809,0,0,89c64378ba71cdec8bda78ac432f0505d060e9c4a712bdefd0c0360dbcd52353,2024-11-06T19:33:54.977000
CVE-2024-4881,0,0,1c031fd2c38a767f783cce3b716ba92a0bccdca18b325ac245c51367e8857d89,2024-11-21T09:43:46.897000 CVE-2024-4881,0,0,1c031fd2c38a767f783cce3b716ba92a0bccdca18b325ac245c51367e8857d89,2024-11-21T09:43:46.897000
CVE-2024-48813,0,0,531834e27f6a6bc0c9381cd9781162753c49dc1f29a9e6d0b2f2fb460ee278b0,2024-10-15T12:58:51.050000 CVE-2024-48813,0,0,531834e27f6a6bc0c9381cd9781162753c49dc1f29a9e6d0b2f2fb460ee278b0,2024-10-15T12:58:51.050000
@ -271564,7 +271565,7 @@ CVE-2024-49679,0,0,69366457d136ea54a3b6926990a6003dde86feed848c00d8b78be39be0d98
CVE-2024-4968,0,0,84fb7654272f609db67556b1bbee00c1c6101a0c21765453fbdfc009a9be8a0a,2025-02-10T13:42:36.187000 CVE-2024-4968,0,0,84fb7654272f609db67556b1bbee00c1c6101a0c21765453fbdfc009a9be8a0a,2025-02-10T13:42:36.187000
CVE-2024-49680,0,0,0744c3301274ac63d10bef9c834e7e6120c33d012ef4df460932bd9e268c305e,2024-11-19T21:57:32.967000 CVE-2024-49680,0,0,0744c3301274ac63d10bef9c834e7e6120c33d012ef4df460932bd9e268c305e,2024-11-19T21:57:32.967000
CVE-2024-49681,0,0,8c5bef0a7111e608e574a08de0a110bd80fd63fe70a3435156e2c27580ccfca2,2024-10-25T12:56:07.750000 CVE-2024-49681,0,0,8c5bef0a7111e608e574a08de0a110bd80fd63fe70a3435156e2c27580ccfca2,2024-10-25T12:56:07.750000
CVE-2024-49682,0,1,078bc643574c07133c2a6c67de5ef98e1df80f7b816ed0205f76ede1996f5e82,2025-03-31T18:13:05.940000 CVE-2024-49682,0,0,078bc643574c07133c2a6c67de5ef98e1df80f7b816ed0205f76ede1996f5e82,2025-03-31T18:13:05.940000
CVE-2024-49683,0,0,7be9ea3f510dbaa7fe885cdcb7745560fbc269f7e9bd22850dce90772b3593dd,2024-10-25T12:56:07.750000 CVE-2024-49683,0,0,7be9ea3f510dbaa7fe885cdcb7745560fbc269f7e9bd22850dce90772b3593dd,2024-10-25T12:56:07.750000
CVE-2024-49684,0,0,36531d7cf4c7a4e38f6860bda9ec7c0d48195d2fcc27ad0578736763df8ccca2,2024-10-25T12:56:36.827000 CVE-2024-49684,0,0,36531d7cf4c7a4e38f6860bda9ec7c0d48195d2fcc27ad0578736763df8ccca2,2024-10-25T12:56:36.827000
CVE-2024-49685,0,0,f305b32b568edf91e7bf9c3e098c8b0e617926446f188349b4087b101823778f,2025-02-05T14:51:00.297000 CVE-2024-49685,0,0,f305b32b568edf91e7bf9c3e098c8b0e617926446f188349b4087b101823778f,2025-02-05T14:51:00.297000
@ -272703,9 +272704,9 @@ CVE-2024-51055,0,0,8c557950a9a065601e8c6c8dceb6fdc953c2a7292e6455f04da0193339cab
CVE-2024-51058,0,0,66da7488618e7bfd544082f0a7ca5f5b213beafff66d93fe5b2dca66727647f7,2024-11-26T20:15:33.253000 CVE-2024-51058,0,0,66da7488618e7bfd544082f0a7ca5f5b213beafff66d93fe5b2dca66727647f7,2024-11-26T20:15:33.253000
CVE-2024-5106,0,0,b32baeddd5d7517902783f8698c8ddf8d7704de9303360c6ce08bd697c855461,2025-03-05T16:18:39.727000 CVE-2024-5106,0,0,b32baeddd5d7517902783f8698c8ddf8d7704de9303360c6ce08bd697c855461,2025-03-05T16:18:39.727000
CVE-2024-51060,0,0,de7bf14fdaea8b78c02e0c6fade9921621bf0bad2bf2c2ffc485512c883062ec,2024-11-01T17:35:08.443000 CVE-2024-51060,0,0,de7bf14fdaea8b78c02e0c6fade9921621bf0bad2bf2c2ffc485512c883062ec,2024-11-01T17:35:08.443000
CVE-2024-51063,0,1,baaa401f76f83c10a16a16ac2300c7ff206c0294cf7e048885c9427fd5cc3d20,2025-03-31T19:26:46.460000 CVE-2024-51063,0,0,baaa401f76f83c10a16a16ac2300c7ff206c0294cf7e048885c9427fd5cc3d20,2025-03-31T19:26:46.460000
CVE-2024-51064,0,1,8c98c114e76bc1bd024a1bc62e5d3e352526cdd76914057f4ebcb0ef5f381d29,2025-03-31T19:29:12.110000 CVE-2024-51064,0,0,8c98c114e76bc1bd024a1bc62e5d3e352526cdd76914057f4ebcb0ef5f381d29,2025-03-31T19:29:12.110000
CVE-2024-51065,0,1,3b3e6650157f1931a47712b62fd9a2e7477a5d52ec6634effed03cb5c0e92c45,2025-03-31T19:29:35.613000 CVE-2024-51065,0,0,3b3e6650157f1931a47712b62fd9a2e7477a5d52ec6634effed03cb5c0e92c45,2025-03-31T19:29:35.613000
CVE-2024-51066,0,0,be8d42488560dde278907528220628acd7b9c959e1434a1bf1dbead4fac8fcb1,2024-11-01T21:35:05.747000 CVE-2024-51066,0,0,be8d42488560dde278907528220628acd7b9c959e1434a1bf1dbead4fac8fcb1,2024-11-01T21:35:05.747000
CVE-2024-5107,0,0,2f055a04ccbd78b9c8df18cf46dc307764a3b6508de2a8d7063f4779b98b5648,2025-02-21T21:18:28.707000 CVE-2024-5107,0,0,2f055a04ccbd78b9c8df18cf46dc307764a3b6508de2a8d7063f4779b98b5648,2025-02-21T21:18:28.707000
CVE-2024-51072,0,0,e3822fe995b8ac5db401be8bd0f5c664092585f4b74280cebfb9be6c17c2b406,2025-01-10T15:15:15.173000 CVE-2024-51072,0,0,e3822fe995b8ac5db401be8bd0f5c664092585f4b74280cebfb9be6c17c2b406,2025-01-10T15:15:15.173000
@ -272764,7 +272765,7 @@ CVE-2024-5119,0,0,91893ccf3d5267b72a6b8ed10d2ba4560a7ea2a4bdb6a9260fec1e0619fdc1
CVE-2024-51190,0,0,42252f42d57e549237c1e65576645654fa8f454c06ed81783464129f893b6230,2024-11-12T13:55:21.227000 CVE-2024-51190,0,0,42252f42d57e549237c1e65576645654fa8f454c06ed81783464129f893b6230,2024-11-12T13:55:21.227000
CVE-2024-5120,0,0,aa0bc8f3e284072bee9ea1e53af4826838bcd5e6353dff9b260a6c50ff30ddbc,2025-02-10T14:33:42.463000 CVE-2024-5120,0,0,aa0bc8f3e284072bee9ea1e53af4826838bcd5e6353dff9b260a6c50ff30ddbc,2025-02-10T14:33:42.463000
CVE-2024-51208,0,0,a59d692cb343382c726f4c6a51e70064bfbd58c7b1c1ae68bcfdeee9f98e2032,2025-03-13T17:15:33.210000 CVE-2024-51208,0,0,a59d692cb343382c726f4c6a51e70064bfbd58c7b1c1ae68bcfdeee9f98e2032,2025-03-13T17:15:33.210000
CVE-2024-51209,0,1,2acbc3e3e25af92d55848830d8628123b058e9a1fdf83b5e7f3e04674f33868a,2025-03-31T19:32:18.943000 CVE-2024-51209,0,0,2acbc3e3e25af92d55848830d8628123b058e9a1fdf83b5e7f3e04674f33868a,2025-03-31T19:32:18.943000
CVE-2024-5121,0,0,f13a957054662226d9f30e7797cd699fbbc4fb099f0a6c1363eaca0808d26e93,2025-02-10T14:33:01.420000 CVE-2024-5121,0,0,f13a957054662226d9f30e7797cd699fbbc4fb099f0a6c1363eaca0808d26e93,2025-02-10T14:33:01.420000
CVE-2024-51210,0,0,1dfb5793bbd38593e70df49e07cd7ee951e3036bdad9fedc179912099b41ccff,2024-12-05T18:15:22.090000 CVE-2024-51210,0,0,1dfb5793bbd38593e70df49e07cd7ee951e3036bdad9fedc179912099b41ccff,2024-12-05T18:15:22.090000
CVE-2024-51211,0,0,5bbcb137b1680696c02324cbd64119e5698f5bb8e272467c42227679b2a82406,2024-11-21T17:15:22.410000 CVE-2024-51211,0,0,5bbcb137b1680696c02324cbd64119e5698f5bb8e272467c42227679b2a82406,2024-11-21T17:15:22.410000
@ -273358,7 +273359,7 @@ CVE-2024-51934,0,0,efe96cb8fc68640b083cbe9be334ef1c2ebccacaa81f9de9e0dd9bb0982e2
CVE-2024-51935,0,0,fb50d58711b2904c9889235a06a099f964a5dc2d960855b72c8c5020e8cc7467,2024-11-19T21:56:45.533000 CVE-2024-51935,0,0,fb50d58711b2904c9889235a06a099f964a5dc2d960855b72c8c5020e8cc7467,2024-11-19T21:56:45.533000
CVE-2024-51936,0,0,01ed82394fa093ff4d3b03b9d8dca58deb9d6f0168256baf25f9ae6ed15ae66d,2024-11-19T21:56:45.533000 CVE-2024-51936,0,0,01ed82394fa093ff4d3b03b9d8dca58deb9d6f0168256baf25f9ae6ed15ae66d,2024-11-19T21:56:45.533000
CVE-2024-51937,0,0,40f9bcab077c80d2c70e8068655769a90e334e94a3b2252e9eefae5aa1c7cf3f,2024-11-19T21:56:45.533000 CVE-2024-51937,0,0,40f9bcab077c80d2c70e8068655769a90e334e94a3b2252e9eefae5aa1c7cf3f,2024-11-19T21:56:45.533000
CVE-2024-51938,0,1,7f531483548183d746950131a91938a8eaa342b0a7690b882b3a3f83d4d6a283,2025-03-31T19:36:04.583000 CVE-2024-51938,0,0,7f531483548183d746950131a91938a8eaa342b0a7690b882b3a3f83d4d6a283,2025-03-31T19:36:04.583000
CVE-2024-51939,0,0,20d7c044823f2dbd5a93ccbf1e62122469f38a0e0e61d27f0eead27fdd2e22c5,2024-11-19T21:57:32.967000 CVE-2024-51939,0,0,20d7c044823f2dbd5a93ccbf1e62122469f38a0e0e61d27f0eead27fdd2e22c5,2024-11-19T21:57:32.967000
CVE-2024-5194,0,0,8d46b9bc1f0e922d7415f01b9e20c3241c30409b16aacd585324be8545f4e31e,2024-11-21T09:47:09.967000 CVE-2024-5194,0,0,8d46b9bc1f0e922d7415f01b9e20c3241c30409b16aacd585324be8545f4e31e,2024-11-21T09:47:09.967000
CVE-2024-51940,0,0,eea7140ef8e6920e3e5dd47ba7cd4d003e663b87564e69e84f825f175f7f9241,2024-11-19T21:57:32.967000 CVE-2024-51940,0,0,eea7140ef8e6920e3e5dd47ba7cd4d003e663b87564e69e84f825f175f7f9241,2024-11-19T21:57:32.967000
@ -275357,6 +275358,14 @@ CVE-2024-54792,0,0,98468856aeeedfaaa62e1fc26bc1fac81265f3b59cbbffb650074881345ba
CVE-2024-54794,0,0,c49ffe9b769b5cd233f7d6bd6f86fb56ddf647e4b0a80553364112532cd337f3,2025-01-21T19:15:11.243000 CVE-2024-54794,0,0,c49ffe9b769b5cd233f7d6bd6f86fb56ddf647e4b0a80553364112532cd337f3,2025-01-21T19:15:11.243000
CVE-2024-54795,0,0,189377580c088768ee02d63dd643544c9e329d819648f0ba84334338aef4e9e3,2025-01-21T19:15:11.407000 CVE-2024-54795,0,0,189377580c088768ee02d63dd643544c9e329d819648f0ba84334338aef4e9e3,2025-01-21T19:15:11.407000
CVE-2024-5480,0,0,dcddee05a122e48deec7dd054d03a98cfc3767234733af70ab63ade31364815f,2024-10-02T16:15:10.913000 CVE-2024-5480,0,0,dcddee05a122e48deec7dd054d03a98cfc3767234733af70ab63ade31364815f,2024-10-02T16:15:10.913000
CVE-2024-54802,1,1,3a4102a7c0b6c4258870e143dca9a56c73080cc779032a88035f11e358fc1ca8,2025-03-31T21:15:47.203000
CVE-2024-54803,1,1,192193603a5ebe46711b4e83a4bcb956f7781970a1dc4a31466e95cc44190532,2025-03-31T21:15:47.377000
CVE-2024-54804,1,1,af2de00afb414e1889120d5577cb01186c8c976bf5a04b1c87e0ebfdd9d92249,2025-03-31T21:15:47.560000
CVE-2024-54805,1,1,5408c1dbb379ed12ed0d05a63b489762204909515ac58e7c7c0fff6f2fe52925,2025-03-31T21:15:47.737000
CVE-2024-54806,1,1,702336dd48eeff3593dd350dbacfa5f362a1a00a9dc2c7f5eaafefb7ffc2c01e,2025-03-31T21:15:47.923000
CVE-2024-54807,1,1,1bc8e591f4370077ab227b516ceb005453d45fc6ec62e61feffece8184ca988e,2025-03-31T21:15:48.090000
CVE-2024-54808,1,1,508e5d76c1f49651c6875f8083cbf64a337b83d81086dd089faff099fb56b7d3,2025-03-31T21:15:48.310000
CVE-2024-54809,1,1,d63d8ba3b33563d57fd43edfe1b118d91737ff7f45d096d6bfd7931bcefdd13d,2025-03-31T21:15:48.527000
CVE-2024-5481,0,0,6aaa03c1e132f74e5c4e90ead29bd24eb7065ad2c73e1f2805fbc82099451674,2024-11-21T09:47:45.877000 CVE-2024-5481,0,0,6aaa03c1e132f74e5c4e90ead29bd24eb7065ad2c73e1f2805fbc82099451674,2024-11-21T09:47:45.877000
CVE-2024-54810,0,0,98b1b32485df996df7d9929d6a4a4f3f6576d87de7e3a8405b0f88648f287e10,2024-12-13T18:15:21.707000 CVE-2024-54810,0,0,98b1b32485df996df7d9929d6a4a4f3f6576d87de7e3a8405b0f88648f287e10,2024-12-13T18:15:21.707000
CVE-2024-54811,0,0,c518d2be0055f2f694c9ca48885a5257eabcc0287b36c8555688778fe5e578d7,2024-12-13T18:15:21.940000 CVE-2024-54811,0,0,c518d2be0055f2f694c9ca48885a5257eabcc0287b36c8555688778fe5e578d7,2024-12-13T18:15:21.940000
@ -277962,7 +277971,7 @@ CVE-2024-6624,0,0,552d36257e8bfaa4330013290315eab120066dcc2d886a9d94d7a9269b76a4
CVE-2024-6625,0,0,1b1c39349f634a560833a8b14095d12391f881dda66986404d732704553d9c8a,2024-11-21T09:50:01.480000 CVE-2024-6625,0,0,1b1c39349f634a560833a8b14095d12391f881dda66986404d732704553d9c8a,2024-11-21T09:50:01.480000
CVE-2024-6626,0,0,249866bf2ce6f0742e7ebbb55a39f819e02fa1bb5ce90e67c70e877b0a80889f,2024-11-08T21:18:44.400000 CVE-2024-6626,0,0,249866bf2ce6f0742e7ebbb55a39f819e02fa1bb5ce90e67c70e877b0a80889f,2024-11-08T21:18:44.400000
CVE-2024-6627,0,0,46c1b50f2f4fc4f4915a5d60c7232a25ef2d8e7212d2215183cdea5ab45a44d0,2025-02-06T17:40:50.280000 CVE-2024-6627,0,0,46c1b50f2f4fc4f4915a5d60c7232a25ef2d8e7212d2215183cdea5ab45a44d0,2025-02-06T17:40:50.280000
CVE-2024-6628,0,1,8d496fa7bba218fa6816b17098bcf8cd1de8a287cedeed63670cc804578db4fe,2025-03-31T19:58:57.527000 CVE-2024-6628,0,0,8d496fa7bba218fa6816b17098bcf8cd1de8a287cedeed63670cc804578db4fe,2025-03-31T19:58:57.527000
CVE-2024-6629,0,0,a527624ccafa4d4e16277a177029cdaa056a5fd7eb7a8772535daaafb91b33a4,2024-11-21T09:50:01.973000 CVE-2024-6629,0,0,a527624ccafa4d4e16277a177029cdaa056a5fd7eb7a8772535daaafb91b33a4,2024-11-21T09:50:01.973000
CVE-2024-6630,0,0,7742b604143993a9d769b9ab9c3e5aab85337a51e6772bb186961af80d29fee2,2024-07-10T18:15:05.407000 CVE-2024-6630,0,0,7742b604143993a9d769b9ab9c3e5aab85337a51e6772bb186961af80d29fee2,2024-07-10T18:15:05.407000
CVE-2024-6631,0,0,6814ab0364b6ced1872d70e3966a7eb63a524daa89dd6b575b0ac22e27afca55,2024-09-12T20:39:22.493000 CVE-2024-6631,0,0,6814ab0364b6ced1872d70e3966a7eb63a524daa89dd6b575b0ac22e27afca55,2024-09-12T20:39:22.493000
@ -278353,7 +278362,7 @@ CVE-2024-7050,0,0,06f451073f052c5171cdc858230f8ac0bfc1cd03261b82c9e4025ffcee809a
CVE-2024-7051,0,0,d0158d1d3b2cdd12dcaf8ff0c61b0f7cdef559e08a0a05011bfe1940648c764c,2024-08-30T16:15:10.960000 CVE-2024-7051,0,0,d0158d1d3b2cdd12dcaf8ff0c61b0f7cdef559e08a0a05011bfe1940648c764c,2024-08-30T16:15:10.960000
CVE-2024-7052,0,0,b869d4be8a9ef05b526f5074ec778788ff68c0dc06586eacf01aecd8a404162d,2025-02-14T17:15:18.480000 CVE-2024-7052,0,0,b869d4be8a9ef05b526f5074ec778788ff68c0dc06586eacf01aecd8a404162d,2025-02-14T17:15:18.480000
CVE-2024-7053,0,0,7720c82c430e328b75c680ca5e5d109c9bc5d455075089b23f69681b09912d0e,2025-03-20T14:15:21.553000 CVE-2024-7053,0,0,7720c82c430e328b75c680ca5e5d109c9bc5d455075089b23f69681b09912d0e,2025-03-20T14:15:21.553000
CVE-2024-7054,0,1,7df23b9647e9776ce9f3d05a4e54f924a44fe3a231ecd255041316cf38333e70,2025-03-31T18:27:47.530000 CVE-2024-7054,0,0,7df23b9647e9776ce9f3d05a4e54f924a44fe3a231ecd255041316cf38333e70,2025-03-31T18:27:47.530000
CVE-2024-7055,0,0,9935f1de2cee66b07954ad120fe6ce5f54f36d3188fd3d2bc5c8e7d48d543152,2024-08-06T16:30:24.547000 CVE-2024-7055,0,0,9935f1de2cee66b07954ad120fe6ce5f54f36d3188fd3d2bc5c8e7d48d543152,2024-08-06T16:30:24.547000
CVE-2024-7056,0,0,ec08ae131187a52a9d1409d290e6919fd556ee74677249d587bb18cc1ea21e30,2024-11-25T14:15:07.457000 CVE-2024-7056,0,0,ec08ae131187a52a9d1409d290e6919fd556ee74677249d587bb18cc1ea21e30,2024-11-25T14:15:07.457000
CVE-2024-7057,0,0,3c6ad5d4517bec5901108debd01a08995bd05bb08470aa05a322d034ebbe1d3e,2024-11-21T09:50:48.570000 CVE-2024-7057,0,0,3c6ad5d4517bec5901108debd01a08995bd05bb08470aa05a322d034ebbe1d3e,2024-11-21T09:50:48.570000
@ -280174,7 +280183,7 @@ CVE-2024-9033,0,0,c9ce8f3f22810e314a9b6a7070f369471d9e5df9eced517c322686d35f96ab
CVE-2024-9034,0,0,90bd5bffc39325b9c6cc2c7df19844bf0675ae9032a75556de19fb8cc5e5a6ba,2024-09-26T13:32:55.343000 CVE-2024-9034,0,0,90bd5bffc39325b9c6cc2c7df19844bf0675ae9032a75556de19fb8cc5e5a6ba,2024-09-26T13:32:55.343000
CVE-2024-9035,0,0,c836add5f9ea0f6ba01095ded6458386ae8fd2f11d68cb367cc7ade58ddaa024,2024-09-26T13:32:55.343000 CVE-2024-9035,0,0,c836add5f9ea0f6ba01095ded6458386ae8fd2f11d68cb367cc7ade58ddaa024,2024-09-26T13:32:55.343000
CVE-2024-9036,0,0,3bbbfc98a85d5f78d43560ecd3c231db4288c62659683b5c35ebd015a776ac19,2024-09-26T13:32:55.343000 CVE-2024-9036,0,0,3bbbfc98a85d5f78d43560ecd3c231db4288c62659683b5c35ebd015a776ac19,2024-09-26T13:32:55.343000
CVE-2024-9037,0,1,61d7d575e9833b1f71caeb12a0ed3faa0ea60057248b15da1a13008ecf46898b,2025-03-31T18:55:16.680000 CVE-2024-9037,0,0,61d7d575e9833b1f71caeb12a0ed3faa0ea60057248b15da1a13008ecf46898b,2025-03-31T18:55:16.680000
CVE-2024-9038,0,0,902b50c6d930b124e106a40fd3471c27a76d7b215b07dd7cda1cc7b7441c1dbd,2024-09-27T16:11:37.710000 CVE-2024-9038,0,0,902b50c6d930b124e106a40fd3471c27a76d7b215b07dd7cda1cc7b7441c1dbd,2024-09-27T16:11:37.710000
CVE-2024-9039,0,0,c2deaade23da482813d66248554a49a9e73a2b63627babab6e443384d154782e,2024-09-27T15:58:22.493000 CVE-2024-9039,0,0,c2deaade23da482813d66248554a49a9e73a2b63627babab6e443384d154782e,2024-09-27T15:58:22.493000
CVE-2024-9040,0,0,be63bc9a723d2aaddace773ab8ae6f6ce5897ce1c02995f8071d9bda756dd77c,2024-09-27T15:53:28.333000 CVE-2024-9040,0,0,be63bc9a723d2aaddace773ab8ae6f6ce5897ce1c02995f8071d9bda756dd77c,2024-09-27T15:53:28.333000
@ -283312,6 +283321,7 @@ CVE-2025-2189,0,0,21362a35b576822cdfa735714de3fa8c2b76316e693eaa457f9b76275fa21b
CVE-2025-21890,0,0,3e452c883c787bf57ab5be0b0e5aa90feed93eaffae235cb89507607056595a5,2025-03-27T16:45:12.210000 CVE-2025-21890,0,0,3e452c883c787bf57ab5be0b0e5aa90feed93eaffae235cb89507607056595a5,2025-03-27T16:45:12.210000
CVE-2025-21891,0,0,a253456cafaa3a78ec959ae9d1e060c416fbd075d583d9a377a6f3a26384270e,2025-03-27T16:45:12.210000 CVE-2025-21891,0,0,a253456cafaa3a78ec959ae9d1e060c416fbd075d583d9a377a6f3a26384270e,2025-03-27T16:45:12.210000
CVE-2025-21892,0,0,8c98329172bed9a8b6c22457d316cbe2e25dcbfb066893d9b84a9f2d473cdf83,2025-03-27T16:45:12.210000 CVE-2025-21892,0,0,8c98329172bed9a8b6c22457d316cbe2e25dcbfb066893d9b84a9f2d473cdf83,2025-03-27T16:45:12.210000
CVE-2025-21893,1,1,4a7f56dfa32cca5916bdfdd25b8f2f0cf25de87af7a79afe4879360d1a287b49,2025-03-31T21:15:49.307000
CVE-2025-2190,0,0,2ad046c01e8fde47102d510f1e691e56d4505e286b09d0c88b5a5f7442f2c96e,2025-03-11T14:15:27.163000 CVE-2025-2190,0,0,2ad046c01e8fde47102d510f1e691e56d4505e286b09d0c88b5a5f7442f2c96e,2025-03-11T14:15:27.163000
CVE-2025-2191,0,0,435c67fbe91d200be556fa2bda480273212858b72f473ce6d41f73706042d56e,2025-03-11T12:15:12.277000 CVE-2025-2191,0,0,435c67fbe91d200be556fa2bda480273212858b72f473ce6d41f73706042d56e,2025-03-11T12:15:12.277000
CVE-2025-2192,0,0,154f3902bcd5e64a72bf0ae06aa3f84eb0e5031d75ead63c96aedd6785aca290,2025-03-11T14:15:27.443000 CVE-2025-2192,0,0,154f3902bcd5e64a72bf0ae06aa3f84eb0e5031d75ead63c96aedd6785aca290,2025-03-11T14:15:27.443000
@ -285613,7 +285623,7 @@ CVE-2025-25567,0,0,0e3c48ab6a4496288811058f80eb7d29339ca7638242416df9fb706fe2ad4
CVE-2025-25568,0,0,dcddcadc1916e01c6212aad8a0f1d787a9f9a493dfbdbc2db4d93a5e91a64889,2025-03-19T19:15:44.790000 CVE-2025-25568,0,0,dcddcadc1916e01c6212aad8a0f1d787a9f9a493dfbdbc2db4d93a5e91a64889,2025-03-19T19:15:44.790000
CVE-2025-2557,0,0,a42b70c78dcd89b9d3e57fec472337c34078e8807b7744b63a4210d869265076,2025-03-20T19:15:38.220000 CVE-2025-2557,0,0,a42b70c78dcd89b9d3e57fec472337c34078e8807b7744b63a4210d869265076,2025-03-20T19:15:38.220000
CVE-2025-25570,0,0,a1a60fff83d4e58f97f6cb73bc995dd008cce7cbdda97b57369c1d11bafc9be9,2025-02-28T22:15:39.630000 CVE-2025-25570,0,0,a1a60fff83d4e58f97f6cb73bc995dd008cce7cbdda97b57369c1d11bafc9be9,2025-02-28T22:15:39.630000
CVE-2025-25579,0,1,5d939121eb276c7ecee1a29df62e11fe223cac6be7be94a5d22d93cbcd0562dd,2025-03-31T18:15:32.783000 CVE-2025-25579,0,0,5d939121eb276c7ecee1a29df62e11fe223cac6be7be94a5d22d93cbcd0562dd,2025-03-31T18:15:32.783000
CVE-2025-25580,0,0,981db6fd6e3e758c95a7a3f18e0cb48f5883f5e68031cb88007741a3d3ada90e,2025-03-19T19:15:44.917000 CVE-2025-25580,0,0,981db6fd6e3e758c95a7a3f18e0cb48f5883f5e68031cb88007741a3d3ada90e,2025-03-19T19:15:44.917000
CVE-2025-25582,0,0,71a429a4688f0b98eba65a76fc9404b2639d529bc96a639c12359f9c6efb4809,2025-03-19T19:15:45.050000 CVE-2025-25582,0,0,71a429a4688f0b98eba65a76fc9404b2639d529bc96a639c12359f9c6efb4809,2025-03-19T19:15:45.050000
CVE-2025-25585,0,0,aa4f3350849e7a6d1d328ba035f3acd3940e4357ca726a2c6819200e720715c1,2025-03-19T19:15:45.203000 CVE-2025-25585,0,0,aa4f3350849e7a6d1d328ba035f3acd3940e4357ca726a2c6819200e720715c1,2025-03-19T19:15:45.203000
@ -286339,11 +286349,11 @@ CVE-2025-27162,0,0,c8a873ec2f347494d3d41f4d6681990bc645e58bd3c39e33b011e49921441
CVE-2025-27163,0,0,be9f753c41485f106d11ef9915fc4e361a052626e525b314de4c44cc95c404c0,2025-03-12T14:15:16.447000 CVE-2025-27163,0,0,be9f753c41485f106d11ef9915fc4e361a052626e525b314de4c44cc95c404c0,2025-03-12T14:15:16.447000
CVE-2025-27164,0,0,03f0ef0c440ec2fdb9d4dc234d5039887fd3a0dc69a422dcc0d797b26efec6e3,2025-03-12T14:15:16.557000 CVE-2025-27164,0,0,03f0ef0c440ec2fdb9d4dc234d5039887fd3a0dc69a422dcc0d797b26efec6e3,2025-03-12T14:15:16.557000
CVE-2025-27166,0,0,b79788c4fdccc241a4bf7f90619735b442ab253b044d6be62992503f1b3e47a6,2025-03-11T18:15:34.580000 CVE-2025-27166,0,0,b79788c4fdccc241a4bf7f90619735b442ab253b044d6be62992503f1b3e47a6,2025-03-11T18:15:34.580000
CVE-2025-27167,0,0,482f29e987878fe25988a572ce45a267c50ddf32167f67d5c354d3bbaff05d77,2025-03-11T18:15:34.730000 CVE-2025-27167,0,1,9fc03919f99441cc6e5924699f0b5c87cd969352015206acd2e76f4d0a20cd30,2025-03-31T20:06:44.963000
CVE-2025-27168,0,0,807af9ba36e5529c822db751bf81df9cf34521f5f9d52647f44b26e4df0d5dd0,2025-03-11T18:15:34.893000 CVE-2025-27168,0,1,c854660c04ae74863042de804529bb7219f13c8265d2faffac9e2184be17e3fe,2025-03-31T20:06:08.030000
CVE-2025-27169,0,0,d5608e0c74c50f0a7a42281f3fdcdcaa1a3d612052706dc929ba06e7701adb33,2025-03-11T18:15:35.077000 CVE-2025-27169,0,0,d5608e0c74c50f0a7a42281f3fdcdcaa1a3d612052706dc929ba06e7701adb33,2025-03-11T18:15:35.077000
CVE-2025-2717,0,0,a2a688c228e7eb03eb19b61a2532f80168264fd17e51134150518690e88bab28,2025-03-27T16:45:46.410000 CVE-2025-2717,0,0,a2a688c228e7eb03eb19b61a2532f80168264fd17e51134150518690e88bab28,2025-03-27T16:45:46.410000
CVE-2025-27170,0,0,b96e4ffaebc56916f484b466d583f7d3b36625d540473ebe18865b2b793f41b3,2025-03-11T18:15:35.227000 CVE-2025-27170,0,1,4798b678d1edbc7dfece125d548cec25bb6248e6edea565df19aaaea350e970e,2025-03-31T20:02:08.903000
CVE-2025-27171,0,0,11bfabbfe795ecd5b004555bf156a1f2031ec4849cea31dc93fa58c4a625d087,2025-03-11T18:15:35.377000 CVE-2025-27171,0,0,11bfabbfe795ecd5b004555bf156a1f2031ec4849cea31dc93fa58c4a625d087,2025-03-11T18:15:35.377000
CVE-2025-27172,0,0,1fbf8b09dd6176ac8d843dcc615a1bf482be9a0380a5c5839de3ae8abc924dc0,2025-03-11T17:16:44.420000 CVE-2025-27172,0,0,1fbf8b09dd6176ac8d843dcc615a1bf482be9a0380a5c5839de3ae8abc924dc0,2025-03-11T17:16:44.420000
CVE-2025-27173,0,0,d2957505941740af6a42c6319581f72d9d2dd8e1c5b9f1c7029eb0863a6e0c67,2025-03-11T21:15:42.307000 CVE-2025-27173,0,0,d2957505941740af6a42c6319581f72d9d2dd8e1c5b9f1c7029eb0863a6e0c67,2025-03-11T21:15:42.307000
@ -286698,13 +286708,13 @@ CVE-2025-28011,0,0,fdcb5591ea26e059e8d35048712169c6e42fd9f817189e1097ee50f0c5ccd
CVE-2025-28015,0,0,2ec3b03d6a2c5b451e55cb244fde2066264789b2e32a98f716bffd5d4cc31009,2025-03-28T19:49:16.520000 CVE-2025-28015,0,0,2ec3b03d6a2c5b451e55cb244fde2066264789b2e32a98f716bffd5d4cc31009,2025-03-28T19:49:16.520000
CVE-2025-2803,0,0,aea0c457978a84bf5185af25a34152b6f525228f24aa7933021e5368f307da22,2025-03-29T07:15:18.770000 CVE-2025-2803,0,0,aea0c457978a84bf5185af25a34152b6f525228f24aa7933021e5368f307da22,2025-03-29T07:15:18.770000
CVE-2025-2804,0,0,920f730e5efd8732e0e5abb52416672a1a115bcae2eab5cbf394b4b15549c65b,2025-03-28T18:11:40.180000 CVE-2025-2804,0,0,920f730e5efd8732e0e5abb52416672a1a115bcae2eab5cbf394b4b15549c65b,2025-03-28T18:11:40.180000
CVE-2025-28087,0,0,a083116acf70a088348013bdd27f52f04c87f16d9dd7398d42c6f7120e98d2af,2025-03-28T22:15:17.717000 CVE-2025-28087,0,1,99ff68793ff561c53991516e6858da6f9fb2ba20569700be50a56f72c6c94e8c,2025-03-31T21:15:52.970000
CVE-2025-28089,0,0,55f44d2427798bd3e256ca55bca62ba0a32c851325aedfb0df89721b1e121c5f,2025-03-28T22:15:17.847000 CVE-2025-28089,0,1,18f3d3abab164a0919170c1bf1ca2024f9a0c6def48cc9e42a79859b62355583,2025-03-31T21:15:53.133000
CVE-2025-28090,0,0,6f9f220ae0185a93de530a112ef6866e689dfdcdd268a4483e27c677f80b8df8,2025-03-28T22:15:17.980000 CVE-2025-28090,0,1,460ab53b1e36837aca74081864b1733eb6fef90892f911c9f9bf809cb11369a5,2025-03-31T20:15:14.967000
CVE-2025-28091,0,0,e9eb73da16a1e1ebd7ccc9c4de8f5a66b42f4596b5cfb86129d2dfa324680177,2025-03-28T22:15:18.107000 CVE-2025-28091,0,1,733d641f537c0daa2763e825a3541d600d1b34d5d840a65ee2cce378da0172de,2025-03-31T21:15:53.287000
CVE-2025-28092,0,0,67281ba6ae9fe6b82cabba74a4b589f6e13899072cae60ba58e4096063bd9fce,2025-03-28T22:15:18.237000 CVE-2025-28092,0,1,ce2fc65993a7770d015575705c8546f2b5d9b1a3206d36ccd201861e6650a0b0,2025-03-31T20:15:15.203000
CVE-2025-28093,0,0,0f75d6032cdd86e0fdfd7eb67c7196f1d5298411cf0156c82964fa444bc3986c,2025-03-28T22:15:18.410000 CVE-2025-28093,0,1,0db5efaab21895470fe1bf42a856b01d320239c4d837e7ccab2e9e129e18f465,2025-03-31T20:15:15.363000
CVE-2025-28094,0,1,ca6bedfa8e464efc37dc706e258708723d2ac1c1298ac529e150b4cdda83f083,2025-03-31T18:15:33.010000 CVE-2025-28094,0,0,ca6bedfa8e464efc37dc706e258708723d2ac1c1298ac529e150b4cdda83f083,2025-03-31T18:15:33.010000
CVE-2025-28096,0,0,16d024745a7aef83121952f4fe39c64486ee7ed76aa52fcde001a2a6410e237e,2025-03-31T17:15:40.403000 CVE-2025-28096,0,0,16d024745a7aef83121952f4fe39c64486ee7ed76aa52fcde001a2a6410e237e,2025-03-31T17:15:40.403000
CVE-2025-28097,0,0,7b978a840b839efdbb92782b35164535e64ad57d5c7c1ac6787e57af8db77906,2025-03-28T22:15:18.827000 CVE-2025-28097,0,0,7b978a840b839efdbb92782b35164535e64ad57d5c7c1ac6787e57af8db77906,2025-03-28T22:15:18.827000
CVE-2025-28135,0,0,ce5da46c9ae66e075cac4fbd39873077e479e00a68bacb4de079df96e23d166b,2025-03-28T17:15:28.550000 CVE-2025-28135,0,0,ce5da46c9ae66e075cac4fbd39873077e479e00a68bacb4de079df96e23d166b,2025-03-28T17:15:28.550000
@ -286994,7 +287004,7 @@ CVE-2025-2990,0,0,9e58b2fa7f0db839eeed13ac974d5dc271117bb2e9ce130153ef40d31c37cc
CVE-2025-29903,0,0,10c68e7ddaac62cfaf56fa2d0c36952343de94dcaf74d7de9700d239804e47d3,2025-03-12T13:15:37.823000 CVE-2025-29903,0,0,10c68e7ddaac62cfaf56fa2d0c36952343de94dcaf74d7de9700d239804e47d3,2025-03-12T13:15:37.823000
CVE-2025-29904,0,0,8151be9d68bba0e8c527ecea5490dd29fd8894724b2933080703a0ecee03e639,2025-03-12T13:15:38.050000 CVE-2025-29904,0,0,8151be9d68bba0e8c527ecea5490dd29fd8894724b2933080703a0ecee03e639,2025-03-12T13:15:38.050000
CVE-2025-29907,0,0,630761e684cdf47ad290db608dea22d61cb6820178858ded042fbee7359f058b,2025-03-18T19:15:51.197000 CVE-2025-29907,0,0,630761e684cdf47ad290db608dea22d61cb6820178858ded042fbee7359f058b,2025-03-18T19:15:51.197000
CVE-2025-29908,1,1,0d1c357cefb5d4d044e0ce372f570977795acdddd7899e18a82b0735522a38bd,2025-03-31T19:15:40.367000 CVE-2025-29908,0,0,0d1c357cefb5d4d044e0ce372f570977795acdddd7899e18a82b0735522a38bd,2025-03-31T19:15:40.367000
CVE-2025-29909,0,0,63c6e761924bf096ec7d819f389c28c4b1d7a8c4b34a3508047a025be39f7788,2025-03-18T14:15:43.803000 CVE-2025-29909,0,0,63c6e761924bf096ec7d819f389c28c4b1d7a8c4b34a3508047a025be39f7788,2025-03-18T14:15:43.803000
CVE-2025-2991,0,0,cf6d69e7615143d5a585d26b547b3530c6beb880a98c9a55d6170ec976c1b8f2,2025-03-31T11:15:39.160000 CVE-2025-2991,0,0,cf6d69e7615143d5a585d26b547b3530c6beb880a98c9a55d6170ec976c1b8f2,2025-03-31T11:15:39.160000
CVE-2025-29910,0,0,17418d93c360088fb66ebccca58b51ead2474e70341b6b176cd0d5acb2eed2d6,2025-03-18T14:15:43.913000 CVE-2025-29910,0,0,17418d93c360088fb66ebccca58b51ead2474e70341b6b176cd0d5acb2eed2d6,2025-03-18T14:15:43.913000
@ -287032,25 +287042,27 @@ CVE-2025-30004,0,0,1364d107bb6c7f41c95a057bca66f2aa1afe5de34c484fea06ad70bb85a67
CVE-2025-30005,0,0,16505715170d88cde58145933126fb581063c9cbd194515fa6e178a97b7eb38f,2025-03-31T17:15:41.880000 CVE-2025-30005,0,0,16505715170d88cde58145933126fb581063c9cbd194515fa6e178a97b7eb38f,2025-03-31T17:15:41.880000
CVE-2025-30006,0,0,94dbaa3c46ffedfc3603ead204fb6ce24795883ef875e52a66e81cb24e1573ed,2025-03-31T17:15:42.020000 CVE-2025-30006,0,0,94dbaa3c46ffedfc3603ead204fb6ce24795883ef875e52a66e81cb24e1573ed,2025-03-31T17:15:42.020000
CVE-2025-3001,0,0,6783170e18f794e5e0220e82172d0170aca6943d1ee9cf4188f46e9839779a5a,2025-03-31T16:15:27.277000 CVE-2025-3001,0,0,6783170e18f794e5e0220e82172d0170aca6943d1ee9cf4188f46e9839779a5a,2025-03-31T16:15:27.277000
CVE-2025-3002,0,1,31254f82336e62811d3675fbc17d806beda70782dc6467cfa7c14849ff699d05,2025-03-31T19:15:43.390000 CVE-2025-3002,0,0,31254f82336e62811d3675fbc17d806beda70782dc6467cfa7c14849ff699d05,2025-03-31T19:15:43.390000
CVE-2025-30022,0,0,c29865dc2c1c53a7dddbda80ab65c0b183de989ceaa003da3dfe172b934c1c01,2025-03-19T19:15:50.703000 CVE-2025-30022,0,0,c29865dc2c1c53a7dddbda80ab65c0b183de989ceaa003da3dfe172b934c1c01,2025-03-19T19:15:50.703000
CVE-2025-3003,0,0,fae928727d58bdd1e791ffc9c9e860a745865a854a222942833fd71e698ef09d,2025-03-31T17:15:43.557000 CVE-2025-3003,0,0,fae928727d58bdd1e791ffc9c9e860a745865a854a222942833fd71e698ef09d,2025-03-31T17:15:43.557000
CVE-2025-3004,0,1,1b1a33d3221a15bb48ac0f67bb6e59953f99b6c918e266711e7564b830656b2f,2025-03-31T19:15:43.613000 CVE-2025-3004,0,0,1b1a33d3221a15bb48ac0f67bb6e59953f99b6c918e266711e7564b830656b2f,2025-03-31T19:15:43.613000
CVE-2025-3005,1,1,e8d18a39da8bec5bfe9835be84291d8cf2a7d3c6835d8a510fc7c4892e6b278a,2025-03-31T18:15:34.180000 CVE-2025-3005,0,0,e8d18a39da8bec5bfe9835be84291d8cf2a7d3c6835d8a510fc7c4892e6b278a,2025-03-31T18:15:34.180000
CVE-2025-3006,1,1,2d33ee538d0bbe357b92b9a59900f1f8aa3ec564493ed3f392da23820ed4350b,2025-03-31T18:15:34.413000 CVE-2025-3006,0,0,2d33ee538d0bbe357b92b9a59900f1f8aa3ec564493ed3f392da23820ed4350b,2025-03-31T18:15:34.413000
CVE-2025-30066,0,0,7f23398934e792b1c90dbe88228c40d734b32c51332b192223c783ade90f06e4,2025-03-29T01:00:02.337000 CVE-2025-30066,0,0,7f23398934e792b1c90dbe88228c40d734b32c51332b192223c783ade90f06e4,2025-03-29T01:00:02.337000
CVE-2025-30067,0,0,63d999ebc0b33c0cceea6e046469ec2f368e6f60354a2b2a24d59bf06e6b7bef,2025-03-27T18:17:36.267000 CVE-2025-30067,0,0,63d999ebc0b33c0cceea6e046469ec2f368e6f60354a2b2a24d59bf06e6b7bef,2025-03-27T18:17:36.267000
CVE-2025-3007,1,1,600ae9144fe6b576066fa764c55adc3b9ad15d8bf179e66f0114aa1fe8496eb3,2025-03-31T19:15:43.860000 CVE-2025-3007,0,0,600ae9144fe6b576066fa764c55adc3b9ad15d8bf179e66f0114aa1fe8496eb3,2025-03-31T19:15:43.860000
CVE-2025-30073,0,0,34725e2ee66a680252fcf6be47611a992f4a93cad025a76602eb6cbba6a5215b,2025-03-27T16:45:27.850000 CVE-2025-30073,0,0,34725e2ee66a680252fcf6be47611a992f4a93cad025a76602eb6cbba6a5215b,2025-03-27T16:45:27.850000
CVE-2025-30074,0,0,c994f8833240724dd3b207dc3daf9a3403659cb85de62da850d9ebebe8cf0f27,2025-03-16T03:15:39.117000 CVE-2025-30074,0,0,c994f8833240724dd3b207dc3daf9a3403659cb85de62da850d9ebebe8cf0f27,2025-03-16T03:15:39.117000
CVE-2025-30076,0,0,ae70a6cce406a05e108d38c82fa058b5f2fc46a32f1bafe789b6ecdef84b3c03,2025-03-17T16:15:28.220000 CVE-2025-30076,0,0,ae70a6cce406a05e108d38c82fa058b5f2fc46a32f1bafe789b6ecdef84b3c03,2025-03-17T16:15:28.220000
CVE-2025-30077,0,0,3552a491790a6839d39471705d681d0b56a0da48a2daaa633f419312864c12e5,2025-03-17T16:15:28.360000 CVE-2025-30077,0,0,3552a491790a6839d39471705d681d0b56a0da48a2daaa633f419312864c12e5,2025-03-17T16:15:28.360000
CVE-2025-3008,1,1,a039dd199d432daa0649a2bf01f67d9e9353b33e21ee900eb9843641001ac6ea,2025-03-31T19:15:44.060000 CVE-2025-3008,0,0,a039dd199d432daa0649a2bf01f67d9e9353b33e21ee900eb9843641001ac6ea,2025-03-31T19:15:44.060000
CVE-2025-30089,0,0,94fa5ca45d8355546d9ceb129470f63603acc7f5a96fbd0d387c59c0d7484c0e,2025-03-17T16:15:28.507000 CVE-2025-30089,0,0,94fa5ca45d8355546d9ceb129470f63603acc7f5a96fbd0d387c59c0d7484c0e,2025-03-17T16:15:28.507000
CVE-2025-3009,1,1,4f85d1e7e08b0ed48fca7ac201b457402e7371fffd1a072fc4da4be6d359b5b1,2025-03-31T20:15:15.850000
CVE-2025-30091,0,0,39538125ede0e29a71cad30eeddad6386506108313b0620cfdbf5d936f5285c5,2025-03-27T16:45:46.410000 CVE-2025-30091,0,0,39538125ede0e29a71cad30eeddad6386506108313b0620cfdbf5d936f5285c5,2025-03-27T16:45:46.410000
CVE-2025-30092,0,0,81be76bd5e4d358e5e497793b136a481ab98791f4e442314445db080e37b822d,2025-03-24T14:15:20.007000 CVE-2025-30092,0,0,81be76bd5e4d358e5e497793b136a481ab98791f4e442314445db080e37b822d,2025-03-24T14:15:20.007000
CVE-2025-30093,0,0,655931c237d66508239faf3d38e961694a438293c2ddfd8c753f3093a3e9d18e,2025-03-28T18:11:40.180000 CVE-2025-30093,0,0,655931c237d66508239faf3d38e961694a438293c2ddfd8c753f3093a3e9d18e,2025-03-28T18:11:40.180000
CVE-2025-30095,0,0,b9f53d0615109fa8a40a64e91748d4558a1f7b46ead0706de16c5ce66b014a08,2025-03-31T15:15:44.843000 CVE-2025-30095,0,1,961f91ea6e39b3b6dbb8556a6976c468608b0031b978e5f73b127b8f2e65064d,2025-03-31T21:15:53.653000
CVE-2025-3010,1,1,f723b3e2db26da254387f80fa5fe1ab59324981dd2dd4ccd0c3a29fdf242986b,2025-03-31T20:15:16.023000
CVE-2025-30106,0,0,d0ec2fed531a791fcdb7e275c6cc676f11c96b4c23a970884370a41e87a3b6a0,2025-03-21T17:15:40.227000 CVE-2025-30106,0,0,d0ec2fed531a791fcdb7e275c6cc676f11c96b4c23a970884370a41e87a3b6a0,2025-03-21T17:15:40.227000
CVE-2025-30107,0,0,7ae7d3e2db9a3bcfc7100b14968701083bbe2237ed720df55c99fa3bf4e70491,2025-03-24T22:15:14.450000 CVE-2025-30107,0,0,7ae7d3e2db9a3bcfc7100b14968701083bbe2237ed720df55c99fa3bf4e70491,2025-03-24T22:15:14.450000
CVE-2025-30109,0,0,c697d3ced89db3fb240ff33efe8653842b736020e748d3eead592e6135cb99ac,2025-03-21T17:15:40.447000 CVE-2025-30109,0,0,c697d3ced89db3fb240ff33efe8653842b736020e748d3eead592e6135cb99ac,2025-03-21T17:15:40.447000
@ -287077,12 +287089,14 @@ CVE-2025-30141,0,0,4828215ddc551f721f9119cc66fd0b6301157a9edecaa8b1bbaf43bada37f
CVE-2025-30142,0,0,e6345e1b8b1602cf6baee1bb466c15695f398722ed692cc5b3b87414578f99b0,2025-03-25T16:15:27.130000 CVE-2025-30142,0,0,e6345e1b8b1602cf6baee1bb466c15695f398722ed692cc5b3b87414578f99b0,2025-03-25T16:15:27.130000
CVE-2025-30143,0,0,c72031c589e36c3d2604bcb120ba9a6dd94ff4f6eee14259c749d5630ebbfba8,2025-03-17T16:15:28.643000 CVE-2025-30143,0,0,c72031c589e36c3d2604bcb120ba9a6dd94ff4f6eee14259c749d5630ebbfba8,2025-03-17T16:15:28.643000
CVE-2025-30144,0,0,15bf5f8218ba2223682697484bbc86f902d5a148eb49e6248d7c2412b7737d74,2025-03-19T16:15:33.080000 CVE-2025-30144,0,0,15bf5f8218ba2223682697484bbc86f902d5a148eb49e6248d7c2412b7737d74,2025-03-19T16:15:33.080000
CVE-2025-30149,0,1,c2ba50a8e7fcbfc5cf76c24f8b9200b3aa74b80685d3e0787e18421f001cdd0c,2025-03-31T18:15:33.847000 CVE-2025-30149,0,0,c2ba50a8e7fcbfc5cf76c24f8b9200b3aa74b80685d3e0787e18421f001cdd0c,2025-03-31T18:15:33.847000
CVE-2025-3015,1,1,1ec4abe6ca9685caa91be7781559ad04bca71965f78a710b93168620aa3e9844,2025-03-31T21:15:53.757000
CVE-2025-30152,0,0,fb7d8b36a0a9757a199a4cf8f9b4b43b19a772c330ea1d3bb0186654fc6f920c,2025-03-19T16:15:33.313000 CVE-2025-30152,0,0,fb7d8b36a0a9757a199a4cf8f9b4b43b19a772c330ea1d3bb0186654fc6f920c,2025-03-19T16:15:33.313000
CVE-2025-30153,0,0,da47524558affc65b6874f9bef3637406802e7d0a047ff83de555cab022828e8,2025-03-19T16:15:33.607000 CVE-2025-30153,0,0,da47524558affc65b6874f9bef3637406802e7d0a047ff83de555cab022828e8,2025-03-19T16:15:33.607000
CVE-2025-30154,0,0,f4c8f04ec10c8608001f5ee4aec87a1247d8c3c0588d5bdb69da7f038e16b9a7,2025-03-29T01:00:02.337000 CVE-2025-30154,0,0,f4c8f04ec10c8608001f5ee4aec87a1247d8c3c0588d5bdb69da7f038e16b9a7,2025-03-29T01:00:02.337000
CVE-2025-30155,0,0,ce9991316faec2414fb0a11e64d60f00b90c2addae9a6a86c74d235d6c0c7f76,2025-03-31T16:15:25.187000 CVE-2025-30155,0,0,ce9991316faec2414fb0a11e64d60f00b90c2addae9a6a86c74d235d6c0c7f76,2025-03-31T16:15:25.187000
CVE-2025-30157,0,0,b7d565fa042efeea73d550fb215fb58640989cdcd04813767e503c6d1f6d08fe,2025-03-21T16:15:19.767000 CVE-2025-30157,0,0,b7d565fa042efeea73d550fb215fb58640989cdcd04813767e503c6d1f6d08fe,2025-03-21T16:15:19.767000
CVE-2025-3016,1,1,d17e6f6e24307c3e04fedc601a315663d76d400d1c2a3cdfc9509d651d2a7c64,2025-03-31T21:15:53.940000
CVE-2025-30160,0,0,25be472787022894833e0e3357865514f4516e8d537c62073ee43066a681f12b,2025-03-20T19:15:38.383000 CVE-2025-30160,0,0,25be472787022894833e0e3357865514f4516e8d537c62073ee43066a681f12b,2025-03-20T19:15:38.383000
CVE-2025-30161,0,0,4ef401440b9ae76c291cb5599321f65dce6026d9a737cbde8025803161077f04,2025-03-31T16:15:25.333000 CVE-2025-30161,0,0,4ef401440b9ae76c291cb5599321f65dce6026d9a737cbde8025803161077f04,2025-03-31T16:15:25.333000
CVE-2025-30162,0,0,8641e47d280f65cb3bb61486e9cfbaa56cd67a484749372cb3bbdafe7ce809ee,2025-03-27T16:45:46.410000 CVE-2025-30162,0,0,8641e47d280f65cb3bb61486e9cfbaa56cd67a484749372cb3bbdafe7ce809ee,2025-03-27T16:45:46.410000
@ -287385,12 +287399,14 @@ CVE-2025-31110,0,0,9c1e095e916574b5bad3dc98545645eb35bcfc3a15748b26a91c424286375
CVE-2025-31111,0,0,708ed17ed7ca590b80cc7bf7efff771b88139eb264b9a4c93912c661b895b119,2025-03-27T04:15:29.310000 CVE-2025-31111,0,0,708ed17ed7ca590b80cc7bf7efff771b88139eb264b9a4c93912c661b895b119,2025-03-27T04:15:29.310000
CVE-2025-31112,0,0,19710893cdeca6b79e6ed61173b8773b8204171d0fa597c5282b3a5c8595c248,2025-03-27T04:15:29.427000 CVE-2025-31112,0,0,19710893cdeca6b79e6ed61173b8773b8204171d0fa597c5282b3a5c8595c248,2025-03-27T04:15:29.427000
CVE-2025-31113,0,0,e197f9731c7d6bd9e53ba8f025a3a8ac307f507846eecfd137f3c958a7e0d19f,2025-03-27T04:15:29.493000 CVE-2025-31113,0,0,e197f9731c7d6bd9e53ba8f025a3a8ac307f507846eecfd137f3c958a7e0d19f,2025-03-27T04:15:29.493000
CVE-2025-31116,0,1,4dc37202ba5cfc688675486793efbc376cb6720b795658ab674573a1a487e976,2025-03-31T19:15:42.300000 CVE-2025-31116,0,0,4dc37202ba5cfc688675486793efbc376cb6720b795658ab674573a1a487e976,2025-03-31T19:15:42.300000
CVE-2025-31117,0,1,a341ea634906413f5449e7fc5b04d4e7dd1445d72f8402c95d9d9551d604471a,2025-03-31T18:15:33.957000 CVE-2025-31117,0,0,a341ea634906413f5449e7fc5b04d4e7dd1445d72f8402c95d9d9551d604471a,2025-03-31T18:15:33.957000
CVE-2025-31122,0,0,b8c01e9f1f9dbc740fffeb9cedbc00b2fb56d1c193bda8eacfaf89659abfd347,2025-03-31T17:15:42.997000 CVE-2025-31122,0,0,b8c01e9f1f9dbc740fffeb9cedbc00b2fb56d1c193bda8eacfaf89659abfd347,2025-03-31T17:15:42.997000
CVE-2025-31125,0,1,4f24719a409f1c71fb4356091c2ef8c13936da376c5b3c37899a2aa8d1e00a54,2025-03-31T18:15:34.070000 CVE-2025-31123,1,1,a6d1d8d5bdd67a19a035f82d179dbb1c83a1582e59d5b7125fb816b7c2eaa9af,2025-03-31T20:15:15.547000
CVE-2025-31128,1,1,40d1078ce7b3be9014af04296fe4f0f6918a4957b1af7ce145e0df724a2fbf7e,2025-03-31T19:15:42.883000 CVE-2025-31124,1,1,d866a6df4a48afbef1d9d2b6ed84930ed340ef6c5aaf014355825f2f9a296b29,2025-03-31T20:15:15.707000
CVE-2025-31129,1,1,afc3d6039e1ba3f50fedc504a1975daea8f0d0c314f23d884355292a999ea830,2025-03-31T19:15:43.023000 CVE-2025-31125,0,0,4f24719a409f1c71fb4356091c2ef8c13936da376c5b3c37899a2aa8d1e00a54,2025-03-31T18:15:34.070000
CVE-2025-31128,0,0,40d1078ce7b3be9014af04296fe4f0f6918a4957b1af7ce145e0df724a2fbf7e,2025-03-31T19:15:42.883000
CVE-2025-31129,0,0,afc3d6039e1ba3f50fedc504a1975daea8f0d0c314f23d884355292a999ea830,2025-03-31T19:15:43.023000
CVE-2025-31139,0,0,f77a452b5e1edddf158af71a264cde2428ac6b657f8dcbc921a40f17dadbb16d,2025-03-27T16:45:12.210000 CVE-2025-31139,0,0,f77a452b5e1edddf158af71a264cde2428ac6b657f8dcbc921a40f17dadbb16d,2025-03-27T16:45:12.210000
CVE-2025-31140,0,0,b5354da0d0be6641b36fd62d7ae5da72fa26945541a5950d6dcb5ec04d83adab,2025-03-27T16:45:12.210000 CVE-2025-31140,0,0,b5354da0d0be6641b36fd62d7ae5da72fa26945541a5950d6dcb5ec04d83adab,2025-03-27T16:45:12.210000
CVE-2025-31141,0,0,406867c864568f6048dee1b7cffcd596f08f273e12b98bc9b9a899fec211a190,2025-03-27T16:45:12.210000 CVE-2025-31141,0,0,406867c864568f6048dee1b7cffcd596f08f273e12b98bc9b9a899fec211a190,2025-03-27T16:45:12.210000

Can't render this file because it is too large.