mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-19 17:31:42 +00:00
Auto-Update: 2025-03-31T22:00:19.882734+00:00
This commit is contained in:
parent
741e3d9fd2
commit
d1342cd785
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2018-0824",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2018-05-09T19:29:00.370",
|
||||
"lastModified": "2024-11-21T03:39:01.810",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-03-31T21:03:30.687",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2019-1069",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2019-06-12T14:29:04.337",
|
||||
"lastModified": "2024-11-21T04:35:57.170",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-03-31T21:03:16.547",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -1,14 +1,14 @@
|
||||
{
|
||||
"id": "CVE-2024-24452",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"sourceIdentifier": "security-alert@hpe.com",
|
||||
"published": "2024-11-15T20:15:19.117",
|
||||
"lastModified": "2024-11-18T17:11:56.587",
|
||||
"lastModified": "2025-03-31T21:15:43.370",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An invalid memory access when handling the ProtocolIE_ID field of E-RAB Release Indication messages in Athonet vEPC MME v11.4.0 allows attackers to cause a Denial of Service (DoS) to the cellular network by repeatedly initiating connections and sending a crafted payload."
|
||||
"value": "An invalid memory access when handling the ProtocolIE_ID field of\u00a0E-RAB Release Indication messages in Athonet vEPC MME v11.4.0\u00a0allows attackers to cause a Denial of Service (DoS) to the cellular\u00a0network by repeatedly initiating connections and sending a crafted\u00a0payload."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-alert@hpe.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 5.9,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -52,6 +72,10 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04780en_us&docLocale=en_US",
|
||||
"source": "security-alert@hpe.com"
|
||||
},
|
||||
{
|
||||
"url": "http://athonet.com",
|
||||
"source": "cve@mitre.org"
|
||||
|
@ -1,14 +1,14 @@
|
||||
{
|
||||
"id": "CVE-2024-24453",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"sourceIdentifier": "security-alert@hpe.com",
|
||||
"published": "2024-11-15T20:15:19.203",
|
||||
"lastModified": "2024-11-18T17:11:56.587",
|
||||
"lastModified": "2025-03-31T21:15:43.683",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An invalid memory access when handling the ProtocolIE_ID field of E-RAB NotToBeModifiedBearerModInd information element in Athonet vEPC MME v11.4.0 allows attackers to cause a Denial of Service (DoS) to the cellular network by repeatedly initiating connections and sending a crafted payload."
|
||||
"value": "An invalid memory access when handling the ProtocolIE_ID field of\u00a0E-RAB NotToBeModifiedBearerModInd information element in\u00a0Athonet vEPC MME v11.4.0 allows attackers to cause a Denial of\u00a0Service (DoS) to the cellular network by repeatedly initiating\u00a0connections and sending a crafted payload."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-alert@hpe.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 5.9,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -52,6 +72,10 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04780en_us&docLocale=en_US",
|
||||
"source": "security-alert@hpe.com"
|
||||
},
|
||||
{
|
||||
"url": "http://athonet.com",
|
||||
"source": "cve@mitre.org"
|
||||
|
@ -1,14 +1,14 @@
|
||||
{
|
||||
"id": "CVE-2024-24454",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"sourceIdentifier": "security-alert@hpe.com",
|
||||
"published": "2024-11-15T20:15:19.300",
|
||||
"lastModified": "2024-11-18T17:11:56.587",
|
||||
"lastModified": "2025-03-31T21:15:43.950",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An invalid memory access when handling the ProtocolIE_ID field of E-RAB Modify Request messages in Athonet vEPC MME v11.4.0 allows attackers to cause a Denial of Service (DoS) to the cellular network by repeatedly initiating connections and sending a crafted payload."
|
||||
"value": "An invalid memory access when handling the ProtocolIE_ID field of\u00a0E-RAB Modify Request messages in Athonet vEPC MME v11.4.0\u00a0allows attackers to cause a Denial of Service (DoS) to the cellular\u00a0network by repeatedly initiating connections and sending a crafted\u00a0payload."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-alert@hpe.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 5.9,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -52,6 +72,10 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04780en_us&docLocale=en_US",
|
||||
"source": "security-alert@hpe.com"
|
||||
},
|
||||
{
|
||||
"url": "http://athonet.com",
|
||||
"source": "cve@mitre.org"
|
||||
|
@ -1,14 +1,14 @@
|
||||
{
|
||||
"id": "CVE-2024-24455",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"sourceIdentifier": "security-alert@hpe.com",
|
||||
"published": "2024-11-15T20:15:19.403",
|
||||
"lastModified": "2024-11-18T17:11:56.587",
|
||||
"lastModified": "2025-03-31T21:15:44.193",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An invalid memory access when handling a UE Context Release message containing an invalid UE identifier in Athonet vEPC MME v11.4.0 allows attackers to cause a Denial of Service (DoS) to the cellular network by repeatedly initiating connections and sending a crafted payload."
|
||||
"value": "An invalid memory access when handling a UE Context Release message\u00a0containing an invalid UE identifier in Athonet vEPC MME v11.4.0 allows\u00a0attackers to cause a Denial of Service (DoS) to the cellular network\u00a0by repeatedly initiating connections and sending a crafted payload."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-alert@hpe.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 5.9,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -52,6 +72,10 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04780en_us&docLocale=en_US",
|
||||
"source": "security-alert@hpe.com"
|
||||
},
|
||||
{
|
||||
"url": "http://athonet.com",
|
||||
"source": "cve@mitre.org"
|
||||
|
44
CVE-2024/CVE-2024-244xx/CVE-2024-24456.json
Normal file
44
CVE-2024/CVE-2024-244xx/CVE-2024-24456.json
Normal file
@ -0,0 +1,44 @@
|
||||
{
|
||||
"id": "CVE-2024-24456",
|
||||
"sourceIdentifier": "security-alert@hpe.com",
|
||||
"published": "2025-03-31T21:15:44.513",
|
||||
"lastModified": "2025-03-31T21:15:44.513",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An E-RAB Release Command packet containing a malformed NAS PDU\u00a0will cause the Athonet MME to immediately crash, potentially due to a\u00a0buffer overflow."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-alert@hpe.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 5.9,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04780en_us&docLocale=en_US",
|
||||
"source": "security-alert@hpe.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -1,14 +1,14 @@
|
||||
{
|
||||
"id": "CVE-2024-24457",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"sourceIdentifier": "security-alert@hpe.com",
|
||||
"published": "2024-11-15T20:15:19.510",
|
||||
"lastModified": "2024-11-18T17:11:56.587",
|
||||
"lastModified": "2025-03-31T21:15:44.697",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An invalid memory access when handling the ProtocolIE_ID field of E-RAB Setup List Context SURes messages in Athonet vEPC MME v11.4.0 allows attackers to cause a Denial of Service (DoS) to the cellular network by repeatedly initiating connections and sending a crafted payload."
|
||||
"value": "An invalid memory access when handling the ProtocolIE_ID field of E-RAB\u00a0Setup List Context SURes messages in Athonet vEPC MME v11.4.0 allows\u00a0attackers to cause a Denial of Service (DoS) to the cellular network by\u00a0repeatedly initiating connections and sending a crafted payload."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-alert@hpe.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 5.9,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -52,6 +72,10 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04780en_us&docLocale=en_US",
|
||||
"source": "security-alert@hpe.com"
|
||||
},
|
||||
{
|
||||
"url": "http://athonet.com",
|
||||
"source": "cve@mitre.org"
|
||||
|
@ -1,14 +1,14 @@
|
||||
{
|
||||
"id": "CVE-2024-24458",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"sourceIdentifier": "security-alert@hpe.com",
|
||||
"published": "2024-11-15T20:15:19.610",
|
||||
"lastModified": "2024-11-18T17:11:56.587",
|
||||
"lastModified": "2025-03-31T21:15:44.957",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An invalid memory access when handling the ENB Configuration Transfer messages containing invalid PLMN Identities in Athonet vEPC MME v11.4.0 allows attackers to cause a Denial of Service (DoS) to the cellular network by repeatedly initiating connections and sending a crafted payload."
|
||||
"value": "An invalid memory access when handling the ENB Configuration Transfer\u00a0messages containing invalid PLMN Identities in Athonet vEPC MME\u00a0v11.4.0 allows attackers to cause a Denial of Service (DoS) to the cellular\u00a0network by repeatedly initiating connections and sending a crafted\u00a0payload."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-alert@hpe.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 5.9,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -52,6 +72,10 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04780en_us&docLocale=en_US",
|
||||
"source": "security-alert@hpe.com"
|
||||
},
|
||||
{
|
||||
"url": "http://athonet.com",
|
||||
"source": "cve@mitre.org"
|
||||
|
@ -1,14 +1,14 @@
|
||||
{
|
||||
"id": "CVE-2024-24459",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"sourceIdentifier": "security-alert@hpe.com",
|
||||
"published": "2024-11-15T20:15:19.703",
|
||||
"lastModified": "2024-11-18T17:11:56.587",
|
||||
"lastModified": "2025-03-31T21:15:46.887",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An invalid memory access when handling the ProtocolIE_ID field of S1Setup Request messages in Athonet vEPC MME v11.4.0 allows attackers to cause a Denial of Service (DoS) to the cellular network by repeatedly initiating connections and sending a crafted payload."
|
||||
"value": "An invalid memory access when handling the ProtocolIE_ID field of\u00a0S1Setup Request messages in Athonet vEPC MME v11.4.0 allows\u00a0attackers to cause a Denial of Service (DoS) to the cellular network by\u00a0repeatedly initiating connections and sending a crafted payload."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-alert@hpe.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 5.9,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -52,6 +72,10 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04780en_us&docLocale=en_US",
|
||||
"source": "security-alert@hpe.com"
|
||||
},
|
||||
{
|
||||
"url": "http://athonet.com",
|
||||
"source": "cve@mitre.org"
|
||||
|
28
CVE-2024/CVE-2024-548xx/CVE-2024-54802.json
Normal file
28
CVE-2024/CVE-2024-548xx/CVE-2024-54802.json
Normal file
@ -0,0 +1,28 @@
|
||||
{
|
||||
"id": "CVE-2024-54802",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-03-31T21:15:47.203",
|
||||
"lastModified": "2025-03-31T21:15:47.203",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [
|
||||
{
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"tags": [
|
||||
"unsupported-when-assigned"
|
||||
]
|
||||
}
|
||||
],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In Netgear WNR854T 1.5.2 (North America), the UPNP service (/usr/sbin/upnp) is vulnerable to stack-based buffer overflow in the M-SEARCH Host header."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://faultpoint.com/post/2025-03-25-8-cves-on-the-wnr854t-junkyard/#802",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
28
CVE-2024/CVE-2024-548xx/CVE-2024-54803.json
Normal file
28
CVE-2024/CVE-2024-548xx/CVE-2024-54803.json
Normal file
@ -0,0 +1,28 @@
|
||||
{
|
||||
"id": "CVE-2024-54803",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-03-31T21:15:47.377",
|
||||
"lastModified": "2025-03-31T21:15:47.377",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [
|
||||
{
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"tags": [
|
||||
"unsupported-when-assigned"
|
||||
]
|
||||
}
|
||||
],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Netgear WNR854T 1.5.2 (North America) is vulnerable to Command Injection. An attacker can send a specially crafted request to post.cgi, updating the nvram parameter pppoe_peer_mac and forcing a reboot. This will result in command injection."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://faultpoint.com/post/2025-03-25-8-cves-on-the-wnr854t-junkyard/#803",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
28
CVE-2024/CVE-2024-548xx/CVE-2024-54804.json
Normal file
28
CVE-2024/CVE-2024-548xx/CVE-2024-54804.json
Normal file
@ -0,0 +1,28 @@
|
||||
{
|
||||
"id": "CVE-2024-54804",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-03-31T21:15:47.560",
|
||||
"lastModified": "2025-03-31T21:15:47.560",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [
|
||||
{
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"tags": [
|
||||
"unsupported-when-assigned"
|
||||
]
|
||||
}
|
||||
],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Netgear WNR854T 1.5.2 (North America) is vulnerable to Command Injection. An attacker can send a specially crafted request to post.cgi, updating the nvram parameter wan_hostname and forcing a reboot. This will result in command injection."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://faultpoint.com/post/2025-03-25-8-cves-on-the-wnr854t-junkyard/#804",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
28
CVE-2024/CVE-2024-548xx/CVE-2024-54805.json
Normal file
28
CVE-2024/CVE-2024-548xx/CVE-2024-54805.json
Normal file
@ -0,0 +1,28 @@
|
||||
{
|
||||
"id": "CVE-2024-54805",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-03-31T21:15:47.737",
|
||||
"lastModified": "2025-03-31T21:15:47.737",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [
|
||||
{
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"tags": [
|
||||
"unsupported-when-assigned"
|
||||
]
|
||||
}
|
||||
],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Netgear WNR854T 1.5.2 (North America) is vulnerable to Command Injection. An attacker can send a specially crafted request to post.cgi, updating the nvram parameter get_email. After which, they can visit the send_log.cgi endpoint which uses the parameter in a system call to achieve command execution."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://faultpoint.com/post/2025-03-25-8-cves-on-the-wnr854t-junkyard/#805",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
28
CVE-2024/CVE-2024-548xx/CVE-2024-54806.json
Normal file
28
CVE-2024/CVE-2024-548xx/CVE-2024-54806.json
Normal file
@ -0,0 +1,28 @@
|
||||
{
|
||||
"id": "CVE-2024-54806",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-03-31T21:15:47.923",
|
||||
"lastModified": "2025-03-31T21:15:47.923",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [
|
||||
{
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"tags": [
|
||||
"unsupported-when-assigned"
|
||||
]
|
||||
}
|
||||
],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Netgear WNR854T 1.5.2 (North America) is vulnerable to Arbitrary command execution in cmd.cgi which allows for the execution of system commands via the web interface."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://faultpoint.com/post/2025-03-25-8-cves-on-the-wnr854t-junkyard/#806",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
28
CVE-2024/CVE-2024-548xx/CVE-2024-54807.json
Normal file
28
CVE-2024/CVE-2024-548xx/CVE-2024-54807.json
Normal file
@ -0,0 +1,28 @@
|
||||
{
|
||||
"id": "CVE-2024-54807",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-03-31T21:15:48.090",
|
||||
"lastModified": "2025-03-31T21:15:48.090",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [
|
||||
{
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"tags": [
|
||||
"unsupported-when-assigned"
|
||||
]
|
||||
}
|
||||
],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In Netgear WNR854T 1.5.2 (North America), the UPNP service is vulnerable to command injection in the function addmap_exec which parses the NewInternalClient parameter of the AddPortMapping SOAPAction into a system call without sanitation. An attacker can send a specially crafted SOAPAction request for AddPortMapping via the router's WANIPConn1 service to achieve arbitrary command execution."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://faultpoint.com/post/2025-03-25-8-cves-on-the-wnr854t-junkyard/#807",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
28
CVE-2024/CVE-2024-548xx/CVE-2024-54808.json
Normal file
28
CVE-2024/CVE-2024-548xx/CVE-2024-54808.json
Normal file
@ -0,0 +1,28 @@
|
||||
{
|
||||
"id": "CVE-2024-54808",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-03-31T21:15:48.310",
|
||||
"lastModified": "2025-03-31T21:15:48.310",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [
|
||||
{
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"tags": [
|
||||
"unsupported-when-assigned"
|
||||
]
|
||||
}
|
||||
],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Netgear WNR854T 1.5.2 (North America) contains a stack-based buffer overflow vulnerability in the SetDefaultConnectionService function due to an unconstrained use of sscanf. The vulnerability allows for control of the program counter and can be utilized to achieve arbitrary code execution."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://faultpoint.com/post/2025-03-25-8-cves-on-the-wnr854t-junkyard/#808",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
28
CVE-2024/CVE-2024-548xx/CVE-2024-54809.json
Normal file
28
CVE-2024/CVE-2024-548xx/CVE-2024-54809.json
Normal file
@ -0,0 +1,28 @@
|
||||
{
|
||||
"id": "CVE-2024-54809",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-03-31T21:15:48.527",
|
||||
"lastModified": "2025-03-31T21:15:48.527",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [
|
||||
{
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"tags": [
|
||||
"unsupported-when-assigned"
|
||||
]
|
||||
}
|
||||
],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Netgear Inc WNR854T 1.5.2 (North America) contains a stack-based buffer overflow vulnerability in the parse_st_header function due to use of a request header parameter in a strncpy where size is determined based on the input specified. By sending a specially crafted packet, an attacker can take control of the program counter and hijack control flow of the program to execute arbitrary system commands."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://faultpoint.com/post/2025-03-25-8-cves-on-the-wnr854t-junkyard/#809",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
64
CVE-2025/CVE-2025-218xx/CVE-2025-21893.json
Normal file
64
CVE-2025/CVE-2025-218xx/CVE-2025-21893.json
Normal file
@ -0,0 +1,64 @@
|
||||
{
|
||||
"id": "CVE-2025-21893",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2025-03-31T20:15:14.613",
|
||||
"lastModified": "2025-03-31T21:15:49.307",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nkeys: Fix UAF in key_put()\n\nOnce a key's reference count has been reduced to 0, the garbage collector\nthread may destroy it at any time and so key_put() is not allowed to touch\nthe key after that point. The most key_put() is normally allowed to do is\nto touch key_gc_work as that's a static global variable.\n\nHowever, in an effort to speed up the reclamation of quota, this is now\ndone in key_put() once the key's usage is reduced to 0 - but now the code\nis looking at the key after the deadline, which is forbidden.\n\nFix this by using a flag to indicate that a key can be gc'd now rather than\nlooking at the key's refcount in the garbage collector."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-416"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/6afe2ea2daec156bd94ad2c5a6f4f4c48240dcd3",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/75845c6c1a64483e9985302793dbf0dfa5f71e32",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/f6a3cf833188e897c97028cd7b926e3f2cb1a8c0",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-27167",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2025-03-11T18:15:34.730",
|
||||
"lastModified": "2025-03-11T18:15:34.730",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-03-31T20:06:44.963",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,10 +51,56 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:illustrator:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "28.0",
|
||||
"versionEndExcluding": "28.7.5",
|
||||
"matchCriteriaId": "F721B1E0-416E-446E-B55F-01A15D77D6BA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:illustrator:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "29.0",
|
||||
"versionEndExcluding": "29.3",
|
||||
"matchCriteriaId": "2B4680F1-0165-4F2D-9795-63C18C7AFE38"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://helpx.adobe.com/security/products/illustrator/apsb25-17.html",
|
||||
"source": "psirt@adobe.com"
|
||||
"source": "psirt@adobe.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-27168",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2025-03-11T18:15:34.893",
|
||||
"lastModified": "2025-03-11T18:15:34.893",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-03-31T20:06:08.030",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -49,12 +49,68 @@
|
||||
"value": "CWE-121"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:illustrator:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "28.0",
|
||||
"versionEndExcluding": "28.7.5",
|
||||
"matchCriteriaId": "F721B1E0-416E-446E-B55F-01A15D77D6BA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:illustrator:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "29.0",
|
||||
"versionEndExcluding": "29.3",
|
||||
"matchCriteriaId": "2B4680F1-0165-4F2D-9795-63C18C7AFE38"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://helpx.adobe.com/security/products/illustrator/apsb25-17.html",
|
||||
"source": "psirt@adobe.com"
|
||||
"source": "psirt@adobe.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-27170",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2025-03-11T18:15:35.227",
|
||||
"lastModified": "2025-03-11T18:15:35.227",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-03-31T20:02:08.903",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,10 +51,56 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:illustrator:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "28.0",
|
||||
"versionEndExcluding": "28.7.5",
|
||||
"matchCriteriaId": "F721B1E0-416E-446E-B55F-01A15D77D6BA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:illustrator:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "29.0",
|
||||
"versionEndExcluding": "29.3",
|
||||
"matchCriteriaId": "2B4680F1-0165-4F2D-9795-63C18C7AFE38"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://helpx.adobe.com/security/products/illustrator/apsb25-17.html",
|
||||
"source": "psirt@adobe.com"
|
||||
"source": "psirt@adobe.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,20 +2,63 @@
|
||||
"id": "CVE-2025-28087",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-03-28T22:15:17.717",
|
||||
"lastModified": "2025-03-28T22:15:17.717",
|
||||
"lastModified": "2025-03-31T21:15:52.970",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Sourcecodester Online Exam System 1.0 is vulnerable to SQL Injection via dash.php."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Sourcecodester Online Exam System 1.0 es vulnerable a la inyecci\u00f3n SQL a trav\u00e9s de dash.php."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.yuque.com/morysummer/vx41bz/vxhdpdeavzvtvdqq",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.yuque.com/morysummer/vx41bz/vxhdpdeavzvtvdqq",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2025-28089",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-03-28T22:15:17.847",
|
||||
"lastModified": "2025-03-28T22:15:17.847",
|
||||
"lastModified": "2025-03-31T21:15:53.133",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "maccms10 v2025.1000.4047 is vulnerable to Server-Side Request Forgery (SSRF) via the Scheduled Task function."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "maccms10 v2025.1000.4047 es vulnerable a Server-Side Request Forgery (SSRF) a trav\u00e9s de la funci\u00f3n de tarea programada."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
|
||||
"baseScore": 9.1,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-918"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/magicblack/maccms10/releases/tag/v2025.1000.4047",
|
||||
@ -20,6 +59,10 @@
|
||||
{
|
||||
"url": "https://www.yuque.com/morysummer/vx41bz/wzer7qxh0vwrf6zq",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.yuque.com/morysummer/vx41bz/wzer7qxh0vwrf6zq",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,20 +2,63 @@
|
||||
"id": "CVE-2025-28090",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-03-28T22:15:17.980",
|
||||
"lastModified": "2025-03-28T22:15:17.980",
|
||||
"lastModified": "2025-03-31T20:15:14.967",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "maccms10 v2025.1000.4047 is vulnerable to Server-Side Request Forgery (SSRF) in the Collection Custom Interface feature."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "maccms10 v2025.1000.4047 es vulnerable a Server-Side Request Forgery (SSRF) en la funci\u00f3n de interfaz personalizada de colecci\u00f3n."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
|
||||
"baseScore": 9.1,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-918"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.yuque.com/morysummer/vx41bz/xo5w1euakvtgenex",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.yuque.com/morysummer/vx41bz/xo5w1euakvtgenex",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,20 +2,63 @@
|
||||
"id": "CVE-2025-28091",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-03-28T22:15:18.107",
|
||||
"lastModified": "2025-03-28T22:15:18.107",
|
||||
"lastModified": "2025-03-31T21:15:53.287",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "maccms10 v2025.1000.4047 has a Server-Side Request Forgery (SSRF) vulnerability via Add Article."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "maccms10 v2025.1000.4047 tiene una vulnerabilidad de Server-Side Request Forgery (SSRF) a trav\u00e9s de agregar art\u00edculo."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
|
||||
"baseScore": 9.1,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-918"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.yuque.com/morysummer/vx41bz/ax55rxv4u3our1ic",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.yuque.com/morysummer/vx41bz/xo5w1euakvtgenex",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,20 +2,63 @@
|
||||
"id": "CVE-2025-28092",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-03-28T22:15:18.237",
|
||||
"lastModified": "2025-03-28T22:15:18.237",
|
||||
"lastModified": "2025-03-31T20:15:15.203",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "ShopXO v6.4.0 is vulnerable to Server-Side Request Forgery (SSRF) via image upload function."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "ShopXO v6.4.0 es vulnerable a Server-Side Request Forgery (SSRF) a trav\u00e9s de la funci\u00f3n de carga de im\u00e1genes."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-918"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.yuque.com/morysummer/vx41bz/stggvmlxs9ewqlvu",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.yuque.com/morysummer/vx41bz/stggvmlxs9ewqlvu",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,20 +2,63 @@
|
||||
"id": "CVE-2025-28093",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-03-28T22:15:18.410",
|
||||
"lastModified": "2025-03-28T22:15:18.410",
|
||||
"lastModified": "2025-03-31T20:15:15.363",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "ShopXO v6.4.0 is vulnerable to Server-Side Request Forgery (SSRF) in Email Settings."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "ShopXO v6.4.0 es vulnerable a Server-Side Request Forgery (SSRF) en la configuraci\u00f3n de correo electr\u00f3nico."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-918"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.yuque.com/morysummer/vx41bz/he2hb8ic8an8h07f",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.yuque.com/morysummer/vx41bz/he2hb8ic8an8h07f",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2025-30095",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-03-31T15:15:44.843",
|
||||
"lastModified": "2025-03-31T15:15:44.843",
|
||||
"lastModified": "2025-03-31T21:15:53.653",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "VyOS 1.3 through 1.5 or any Debian-based system using dropbear in combination with live-build has the same Dropbear private host keys across different installations. Thus, an attacker can conduct active man-in-the-middle attacks against SSH connections if Dropbear is enabled as the SSH daemon. I n VyOS, this is not the default configuration for the system SSH daemon, but is for the console service. To mitigate this, one can run \"rm -f /etc/dropbear/*key*\" and/or \"rm -f /etc/dropbear-initramfs/*key*\" and then dropbearkey -t rsa -s 4096 -f /etc/dropbear_rsa_host_key and reload the service or reboot the system before using Dropbear as the SSH daemon (this clears out all keys mistakenly built into the release image) or update to the latest version of VyOS 1.4 or 1.5. Note that this vulnerability is not unique to VyOS and may appear in any Debian-based Linux distribution that uses Dropbear in combination with live-build, which has a safeguard against this behavior in OpenSSH but no equivalent one for Dropbear."
|
||||
"value": "VyOS 1.3 through 1.5 (fixed in 1.4.2) or any Debian-based system using dropbear in combination with live-build has the same Dropbear private host keys across different installations. Thus, an attacker can conduct active man-in-the-middle attacks against SSH connections if Dropbear is enabled as the SSH daemon. I n VyOS, this is not the default configuration for the system SSH daemon, but is for the console service. To mitigate this, one can run \"rm -f /etc/dropbear/*key*\" and/or \"rm -f /etc/dropbear-initramfs/*key*\" and then dropbearkey -t rsa -s 4096 -f /etc/dropbear_rsa_host_key and reload the service or reboot the system before using Dropbear as the SSH daemon (this clears out all keys mistakenly built into the release image) or update to the latest version of VyOS 1.4 or 1.5. Note that this vulnerability is not unique to VyOS and may appear in any Debian-based Linux distribution that uses Dropbear in combination with live-build, which has a safeguard against this behavior in OpenSSH but no equivalent one for Dropbear."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
141
CVE-2025/CVE-2025-30xx/CVE-2025-3009.json
Normal file
141
CVE-2025/CVE-2025-30xx/CVE-2025-3009.json
Normal file
@ -0,0 +1,141 @@
|
||||
{
|
||||
"id": "CVE-2025-3009",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-03-31T20:15:15.850",
|
||||
"lastModified": "2025-03-31T20:15:15.850",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability classified as critical was found in Jinher Network OA C6. Affected by this vulnerability is an unknown functionality of the file /C6/JHSoft.Web.NetDisk/NetDiskProperty.aspx. The manipulation of the argument ID leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "LOW",
|
||||
"vulnIntegrityImpact": "LOW",
|
||||
"vulnAvailabilityImpact": "LOW",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
||||
"baseScore": 6.5,
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL"
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-74"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Myoung-SA/cve/issues/1",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.302059",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.302059",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.524554",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
145
CVE-2025/CVE-2025-30xx/CVE-2025-3010.json
Normal file
145
CVE-2025/CVE-2025-30xx/CVE-2025-3010.json
Normal file
@ -0,0 +1,145 @@
|
||||
{
|
||||
"id": "CVE-2025-3010",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-03-31T20:15:16.023",
|
||||
"lastModified": "2025-03-31T20:15:16.023",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability, which was classified as problematic, has been found in Khronos Group glslang 15.1.0. Affected by this issue is the function glslang::TIntermediate::isConversionAllowed of the file glslang/MachineIndependent/Intermediate.cpp. The manipulation leads to null pointer dereference. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 4.8,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "NONE",
|
||||
"vulnIntegrityImpact": "NONE",
|
||||
"vulnAvailabilityImpact": "LOW",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
|
||||
"baseScore": 3.3,
|
||||
"baseSeverity": "LOW",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:L/AC:L/Au:S/C:N/I:N/A:P",
|
||||
"baseScore": 1.7,
|
||||
"accessVector": "LOCAL",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "PARTIAL"
|
||||
},
|
||||
"baseSeverity": "LOW",
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 2.9,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-404"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-476"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/KhronosGroup/glslang/issues/3903",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/KhronosGroup/glslang/issues/3903#issue-2927492534",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.302060",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.302060",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.524561",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
153
CVE-2025/CVE-2025-30xx/CVE-2025-3015.json
Normal file
153
CVE-2025/CVE-2025-30xx/CVE-2025-3015.json
Normal file
@ -0,0 +1,153 @@
|
||||
{
|
||||
"id": "CVE-2025-3015",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-03-31T21:15:53.757",
|
||||
"lastModified": "2025-03-31T21:15:53.757",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability classified as critical has been found in Open Asset Import Library Assimp 5.4.3. This affects the function Assimp::ASEImporter::BuildUniqueRepresentation of the file code/AssetLib/ASE/ASELoader.cpp of the component ASE File Handler. The manipulation of the argument mIndices leads to out-of-bounds read. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 6.0 is able to address this issue. The patch is named 7c705fde418d68cca4e8eff56be01b2617b0d6fe. It is recommended to apply a patch to fix this issue."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "PASSIVE",
|
||||
"vulnConfidentialityImpact": "LOW",
|
||||
"vulnIntegrityImpact": "LOW",
|
||||
"vulnAvailabilityImpact": "LOW",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||||
"baseScore": 7.5,
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "NONE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL"
|
||||
},
|
||||
"baseSeverity": "HIGH",
|
||||
"exploitabilityScore": 10.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-119"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-125"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/assimp/assimp/commit/7c705fde418d68cca4e8eff56be01b2617b0d6fe",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/assimp/assimp/issues/6021",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/assimp/assimp/issues/6021#issue-2877378829",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/assimp/assimp/pull/6045",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.302067",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.302067",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.524589",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
149
CVE-2025/CVE-2025-30xx/CVE-2025-3016.json
Normal file
149
CVE-2025/CVE-2025-30xx/CVE-2025-3016.json
Normal file
@ -0,0 +1,149 @@
|
||||
{
|
||||
"id": "CVE-2025-3016",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-03-31T21:15:53.940",
|
||||
"lastModified": "2025-03-31T21:15:53.940",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability classified as problematic was found in Open Asset Import Library Assimp 5.4.3. This vulnerability affects the function Assimp::MDLImporter::ParseTextureColorData of the file code/AssetLib/MDL/MDLMaterialLoader.cpp of the component MDL File Handler. The manipulation of the argument mWidth/mHeight leads to resource consumption. The attack can be initiated remotely. Upgrading to version 6.0 is able to address this issue. The name of the patch is 5d2a7482312db2e866439a8c05a07ce1e718bed1. It is recommended to apply a patch to fix this issue."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "PASSIVE",
|
||||
"vulnConfidentialityImpact": "NONE",
|
||||
"vulnIntegrityImpact": "NONE",
|
||||
"vulnAvailabilityImpact": "LOW",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
|
||||
"baseScore": 5.0,
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "NONE",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "PARTIAL"
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 10.0,
|
||||
"impactScore": 2.9,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-400"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-404"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/assimp/assimp/commit/5d2a7482312db2e866439a8c05a07ce1e718bed1",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/assimp/assimp/issues/6022",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/assimp/assimp/pull/6046",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.302068",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.302068",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.524593",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
96
CVE-2025/CVE-2025-311xx/CVE-2025-31123.json
Normal file
96
CVE-2025/CVE-2025-311xx/CVE-2025-31123.json
Normal file
@ -0,0 +1,96 @@
|
||||
{
|
||||
"id": "CVE-2025-31123",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-03-31T20:15:15.547",
|
||||
"lastModified": "2025-03-31T20:15:15.547",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Zitadel is open-source identity infrastructure software. A vulnerability existed where expired keys can be used to retrieve tokens. Specifically, ZITADEL fails to properly check the expiration date of the JWT key when used for Authorization Grants. This allows an attacker with an expired key to obtain valid access tokens. This vulnerability does not affect the use of JWT Profile for OAuth 2.0 Client Authentication on the Token and Introspection endpoints, which correctly reject expired keys. This vulnerability is fixed in 2.71.6, 2.70.8, 2.69.9, 2.68.9, 2.67.13, 2.66.16, 2.65.7, 2.64.6, and 2.63.9."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N",
|
||||
"baseScore": 8.7,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 5.8
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-324"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/zitadel/zitadel/commit/315503beabd679f2e6aec0c004f0f9d2f5b53ed3",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/zitadel/zitadel/releases/tag/v2.63.9",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/zitadel/zitadel/releases/tag/v2.64.6",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/zitadel/zitadel/releases/tag/v2.65.7",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/zitadel/zitadel/releases/tag/v2.66.16",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/zitadel/zitadel/releases/tag/v2.67.13",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/zitadel/zitadel/releases/tag/v2.68.9",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/zitadel/zitadel/releases/tag/v2.69.9",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/zitadel/zitadel/releases/tag/v2.70.8",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/zitadel/zitadel/releases/tag/v2.71.6",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/zitadel/zitadel/security/advisories/GHSA-h3q7-347g-qwhf",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
104
CVE-2025/CVE-2025-311xx/CVE-2025-31124.json
Normal file
104
CVE-2025/CVE-2025-311xx/CVE-2025-31124.json
Normal file
@ -0,0 +1,104 @@
|
||||
{
|
||||
"id": "CVE-2025-31124",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-03-31T20:15:15.707",
|
||||
"lastModified": "2025-03-31T20:15:15.707",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Zitadel is open-source identity infrastructure software. ZITADEL administrators can enable a setting called \"Ignoring unknown usernames\" which helps mitigate attacks that try to guess/enumerate usernames. If enabled, ZITADEL will show the password prompt even if the user doesn't exist and report \"Username or Password invalid\". While the setting was correctly respected during the login flow, the user's username was normalized leading to a disclosure of the user's existence. This vulnerability is fixed in 2.71.6, 2.70.8, 2.69.9, 2.68.9, 2.67.13, 2.66.16, 2.65.7, 2.64.6, and 2.63.9."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-200"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-203"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-204"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/zitadel/zitadel/commit/14de8ecac2afafee4975ed7ac26f3ca4a2b0f82c",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/zitadel/zitadel/releases/tag/v2.63.9",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/zitadel/zitadel/releases/tag/v2.64.6",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/zitadel/zitadel/releases/tag/v2.65.7",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/zitadel/zitadel/releases/tag/v2.66.16",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/zitadel/zitadel/releases/tag/v2.67.13",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/zitadel/zitadel/releases/tag/v2.68.9",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/zitadel/zitadel/releases/tag/v2.69.9",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/zitadel/zitadel/releases/tag/v2.70.8",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/zitadel/zitadel/releases/tag/v2.71.6",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/zitadel/zitadel/security/advisories/GHSA-67m4-8g4w-633q",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
77
README.md
77
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2025-03-31T20:00:19.638931+00:00
|
||||
2025-03-31T22:00:19.882734+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2025-03-31T19:58:57.527000+00:00
|
||||
2025-03-31T21:15:53.940000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,51 +33,54 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
287527
|
||||
287543
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `7`
|
||||
Recently added CVEs: `16`
|
||||
|
||||
- [CVE-2025-29908](CVE-2025/CVE-2025-299xx/CVE-2025-29908.json) (`2025-03-31T19:15:40.367`)
|
||||
- [CVE-2025-3005](CVE-2025/CVE-2025-30xx/CVE-2025-3005.json) (`2025-03-31T18:15:34.180`)
|
||||
- [CVE-2025-3006](CVE-2025/CVE-2025-30xx/CVE-2025-3006.json) (`2025-03-31T18:15:34.413`)
|
||||
- [CVE-2025-3007](CVE-2025/CVE-2025-30xx/CVE-2025-3007.json) (`2025-03-31T19:15:43.860`)
|
||||
- [CVE-2025-3008](CVE-2025/CVE-2025-30xx/CVE-2025-3008.json) (`2025-03-31T19:15:44.060`)
|
||||
- [CVE-2025-31128](CVE-2025/CVE-2025-311xx/CVE-2025-31128.json) (`2025-03-31T19:15:42.883`)
|
||||
- [CVE-2025-31129](CVE-2025/CVE-2025-311xx/CVE-2025-31129.json) (`2025-03-31T19:15:43.023`)
|
||||
- [CVE-2024-24456](CVE-2024/CVE-2024-244xx/CVE-2024-24456.json) (`2025-03-31T21:15:44.513`)
|
||||
- [CVE-2024-54802](CVE-2024/CVE-2024-548xx/CVE-2024-54802.json) (`2025-03-31T21:15:47.203`)
|
||||
- [CVE-2024-54803](CVE-2024/CVE-2024-548xx/CVE-2024-54803.json) (`2025-03-31T21:15:47.377`)
|
||||
- [CVE-2024-54804](CVE-2024/CVE-2024-548xx/CVE-2024-54804.json) (`2025-03-31T21:15:47.560`)
|
||||
- [CVE-2024-54805](CVE-2024/CVE-2024-548xx/CVE-2024-54805.json) (`2025-03-31T21:15:47.737`)
|
||||
- [CVE-2024-54806](CVE-2024/CVE-2024-548xx/CVE-2024-54806.json) (`2025-03-31T21:15:47.923`)
|
||||
- [CVE-2024-54807](CVE-2024/CVE-2024-548xx/CVE-2024-54807.json) (`2025-03-31T21:15:48.090`)
|
||||
- [CVE-2024-54808](CVE-2024/CVE-2024-548xx/CVE-2024-54808.json) (`2025-03-31T21:15:48.310`)
|
||||
- [CVE-2024-54809](CVE-2024/CVE-2024-548xx/CVE-2024-54809.json) (`2025-03-31T21:15:48.527`)
|
||||
- [CVE-2025-21893](CVE-2025/CVE-2025-218xx/CVE-2025-21893.json) (`2025-03-31T20:15:14.613`)
|
||||
- [CVE-2025-3009](CVE-2025/CVE-2025-30xx/CVE-2025-3009.json) (`2025-03-31T20:15:15.850`)
|
||||
- [CVE-2025-3010](CVE-2025/CVE-2025-30xx/CVE-2025-3010.json) (`2025-03-31T20:15:16.023`)
|
||||
- [CVE-2025-3015](CVE-2025/CVE-2025-30xx/CVE-2025-3015.json) (`2025-03-31T21:15:53.757`)
|
||||
- [CVE-2025-3016](CVE-2025/CVE-2025-30xx/CVE-2025-3016.json) (`2025-03-31T21:15:53.940`)
|
||||
- [CVE-2025-31123](CVE-2025/CVE-2025-311xx/CVE-2025-31123.json) (`2025-03-31T20:15:15.547`)
|
||||
- [CVE-2025-31124](CVE-2025/CVE-2025-311xx/CVE-2025-31124.json) (`2025-03-31T20:15:15.707`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `32`
|
||||
Recently modified CVEs: `19`
|
||||
|
||||
- [CVE-2024-42636](CVE-2024/CVE-2024-426xx/CVE-2024-42636.json) (`2025-03-31T18:49:02.283`)
|
||||
- [CVE-2024-45528](CVE-2024/CVE-2024-455xx/CVE-2024-45528.json) (`2025-03-31T18:53:04.780`)
|
||||
- [CVE-2024-46241](CVE-2024/CVE-2024-462xx/CVE-2024-46241.json) (`2025-03-31T19:20:33.810`)
|
||||
- [CVE-2024-46373](CVE-2024/CVE-2024-463xx/CVE-2024-46373.json) (`2025-03-31T18:53:55.610`)
|
||||
- [CVE-2024-46470](CVE-2024/CVE-2024-464xx/CVE-2024-46470.json) (`2025-03-31T19:19:17.120`)
|
||||
- [CVE-2024-46471](CVE-2024/CVE-2024-464xx/CVE-2024-46471.json) (`2025-03-31T19:07:09.867`)
|
||||
- [CVE-2024-46472](CVE-2024/CVE-2024-464xx/CVE-2024-46472.json) (`2025-03-31T19:02:48.263`)
|
||||
- [CVE-2024-48807](CVE-2024/CVE-2024-488xx/CVE-2024-48807.json) (`2025-03-31T19:24:10.313`)
|
||||
- [CVE-2024-49682](CVE-2024/CVE-2024-496xx/CVE-2024-49682.json) (`2025-03-31T18:13:05.940`)
|
||||
- [CVE-2024-51063](CVE-2024/CVE-2024-510xx/CVE-2024-51063.json) (`2025-03-31T19:26:46.460`)
|
||||
- [CVE-2024-51064](CVE-2024/CVE-2024-510xx/CVE-2024-51064.json) (`2025-03-31T19:29:12.110`)
|
||||
- [CVE-2024-51065](CVE-2024/CVE-2024-510xx/CVE-2024-51065.json) (`2025-03-31T19:29:35.613`)
|
||||
- [CVE-2024-51209](CVE-2024/CVE-2024-512xx/CVE-2024-51209.json) (`2025-03-31T19:32:18.943`)
|
||||
- [CVE-2024-51938](CVE-2024/CVE-2024-519xx/CVE-2024-51938.json) (`2025-03-31T19:36:04.583`)
|
||||
- [CVE-2024-6628](CVE-2024/CVE-2024-66xx/CVE-2024-6628.json) (`2025-03-31T19:58:57.527`)
|
||||
- [CVE-2024-7054](CVE-2024/CVE-2024-70xx/CVE-2024-7054.json) (`2025-03-31T18:27:47.530`)
|
||||
- [CVE-2024-9037](CVE-2024/CVE-2024-90xx/CVE-2024-9037.json) (`2025-03-31T18:55:16.680`)
|
||||
- [CVE-2025-25579](CVE-2025/CVE-2025-255xx/CVE-2025-25579.json) (`2025-03-31T18:15:32.783`)
|
||||
- [CVE-2025-28094](CVE-2025/CVE-2025-280xx/CVE-2025-28094.json) (`2025-03-31T18:15:33.010`)
|
||||
- [CVE-2025-3002](CVE-2025/CVE-2025-30xx/CVE-2025-3002.json) (`2025-03-31T19:15:43.390`)
|
||||
- [CVE-2025-3004](CVE-2025/CVE-2025-30xx/CVE-2025-3004.json) (`2025-03-31T19:15:43.613`)
|
||||
- [CVE-2025-30149](CVE-2025/CVE-2025-301xx/CVE-2025-30149.json) (`2025-03-31T18:15:33.847`)
|
||||
- [CVE-2025-31116](CVE-2025/CVE-2025-311xx/CVE-2025-31116.json) (`2025-03-31T19:15:42.300`)
|
||||
- [CVE-2025-31117](CVE-2025/CVE-2025-311xx/CVE-2025-31117.json) (`2025-03-31T18:15:33.957`)
|
||||
- [CVE-2025-31125](CVE-2025/CVE-2025-311xx/CVE-2025-31125.json) (`2025-03-31T18:15:34.070`)
|
||||
- [CVE-2018-0824](CVE-2018/CVE-2018-08xx/CVE-2018-0824.json) (`2025-03-31T21:03:30.687`)
|
||||
- [CVE-2019-1069](CVE-2019/CVE-2019-10xx/CVE-2019-1069.json) (`2025-03-31T21:03:16.547`)
|
||||
- [CVE-2024-24452](CVE-2024/CVE-2024-244xx/CVE-2024-24452.json) (`2025-03-31T21:15:43.370`)
|
||||
- [CVE-2024-24453](CVE-2024/CVE-2024-244xx/CVE-2024-24453.json) (`2025-03-31T21:15:43.683`)
|
||||
- [CVE-2024-24454](CVE-2024/CVE-2024-244xx/CVE-2024-24454.json) (`2025-03-31T21:15:43.950`)
|
||||
- [CVE-2024-24455](CVE-2024/CVE-2024-244xx/CVE-2024-24455.json) (`2025-03-31T21:15:44.193`)
|
||||
- [CVE-2024-24457](CVE-2024/CVE-2024-244xx/CVE-2024-24457.json) (`2025-03-31T21:15:44.697`)
|
||||
- [CVE-2024-24458](CVE-2024/CVE-2024-244xx/CVE-2024-24458.json) (`2025-03-31T21:15:44.957`)
|
||||
- [CVE-2024-24459](CVE-2024/CVE-2024-244xx/CVE-2024-24459.json) (`2025-03-31T21:15:46.887`)
|
||||
- [CVE-2025-27167](CVE-2025/CVE-2025-271xx/CVE-2025-27167.json) (`2025-03-31T20:06:44.963`)
|
||||
- [CVE-2025-27168](CVE-2025/CVE-2025-271xx/CVE-2025-27168.json) (`2025-03-31T20:06:08.030`)
|
||||
- [CVE-2025-27170](CVE-2025/CVE-2025-271xx/CVE-2025-27170.json) (`2025-03-31T20:02:08.903`)
|
||||
- [CVE-2025-28087](CVE-2025/CVE-2025-280xx/CVE-2025-28087.json) (`2025-03-31T21:15:52.970`)
|
||||
- [CVE-2025-28089](CVE-2025/CVE-2025-280xx/CVE-2025-28089.json) (`2025-03-31T21:15:53.133`)
|
||||
- [CVE-2025-28090](CVE-2025/CVE-2025-280xx/CVE-2025-28090.json) (`2025-03-31T20:15:14.967`)
|
||||
- [CVE-2025-28091](CVE-2025/CVE-2025-280xx/CVE-2025-28091.json) (`2025-03-31T21:15:53.287`)
|
||||
- [CVE-2025-28092](CVE-2025/CVE-2025-280xx/CVE-2025-28092.json) (`2025-03-31T20:15:15.203`)
|
||||
- [CVE-2025-28093](CVE-2025/CVE-2025-280xx/CVE-2025-28093.json) (`2025-03-31T20:15:15.363`)
|
||||
- [CVE-2025-30095](CVE-2025/CVE-2025-300xx/CVE-2025-30095.json) (`2025-03-31T21:15:53.653`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
132
_state.csv
132
_state.csv
@ -110564,7 +110564,7 @@ CVE-2018-0820,0,0,0d28d246602159bbae69441a9f356fa161f12b9bb30a06db8e6a396e670389
|
||||
CVE-2018-0821,0,0,9da5b8c5855d35a3774ba7acfe9c4f267a603c2005d06527ca1c0d305854f26a,2024-11-21T03:39:01.413000
|
||||
CVE-2018-0822,0,0,4e8a53739e7f732491bfacba0f989f78cfb2074ef938f03f34c70cb053934f10,2024-11-21T03:39:01.550000
|
||||
CVE-2018-0823,0,0,a62e9539342440d4b1b221afd7aa1d8f538ad152a377cf869212dad4bfb180fa,2024-11-21T03:39:01.687000
|
||||
CVE-2018-0824,0,0,444ddbb02a2bcdc5d188f482af5887385603ab531d6d3ae85b92d3adb551df38,2024-11-21T03:39:01.810000
|
||||
CVE-2018-0824,0,1,67599506a21e58acf1fe4acef5c1f1ab3bbcb1dccf722c19bbfc9c2417e71e10,2025-03-31T21:03:30.687000
|
||||
CVE-2018-0825,0,0,c9f1e3ccb9565229fd469bfc786df855c57c05d27edf7b79f090d0916fb2210e,2024-11-21T03:39:02.050000
|
||||
CVE-2018-0826,0,0,4a5dc634985608590a17dc664fbda049ad4f93710ba694368ed2a4eb57af83ad,2024-11-21T03:39:02.170000
|
||||
CVE-2018-0827,0,0,7534672b064dd544978b70aa3d672015d7ec12be6b3072ef2b883ca3a03c11f5,2024-11-21T03:39:02.293000
|
||||
@ -129105,7 +129105,7 @@ CVE-2019-10686,0,0,8891fb7d0b26811d37e7099d3dcc0099d0e61349158441258419819237670
|
||||
CVE-2019-10687,0,0,b3a83fd6b88d2188e97fea98f0303467be6b1d1183032c66dc18bda02996a01a,2024-11-21T04:19:45.183000
|
||||
CVE-2019-10688,0,0,49777a8daa483f4f0587226832268b3a1578614d91b416b0cc352c84b13576a5,2024-11-21T04:19:45.347000
|
||||
CVE-2019-10689,0,0,1498546decf9b31d102807ecf39e650c4630594e9ed54d965a53c4a5e405f2e7,2024-11-21T04:19:45.497000
|
||||
CVE-2019-1069,0,0,9ee89fbc77543b58add425149c59550fcadffbc523c351e17ea578a56da55599,2024-11-21T04:35:57.170000
|
||||
CVE-2019-1069,0,1,adaeeb6547dcebc4b3928f59368a19e9d0e32be95afc963248929c1f577a5e71,2025-03-31T21:03:16.547000
|
||||
CVE-2019-10691,0,0,3f7279d8ee8a3dd85cb122aafda3e40085f4a346c59e7433b9f7f62478239c9b,2024-11-21T04:19:45.653000
|
||||
CVE-2019-10692,0,0,155d0d82eae9a535c3f6c9585be8eecd2e8c658a757a20098a44283328d01d5b,2024-11-21T04:19:45.820000
|
||||
CVE-2019-10694,0,0,7c79e338cae117eccf25d5c1d8d05413cccc71f35e923c4c7f43c44deb203409,2024-11-21T04:19:45.973000
|
||||
@ -209825,8 +209825,8 @@ CVE-2022-4426,0,0,a3ca9724a11ccc28519507e8204ca711b4d9ece2f4bb42e6e31dc72ebccf3d
|
||||
CVE-2022-44260,0,0,1c4c1cc0940e46fec25a6723e5be439eb2f38d024fd9df23b3785ecf3176cf49,2024-11-21T07:27:48.263000
|
||||
CVE-2022-44261,0,0,139de1fca3833524bd36dddfe32a4a9f9bbdc1d973a74d769923015d514359e4,2025-03-24T18:15:15.220000
|
||||
CVE-2022-44262,0,0,df27ede15d999ecbf37f3b9915aa80f3e7bc90d6c7a750dfcb57bab9d6626612,2024-11-21T07:27:48.563000
|
||||
CVE-2022-44263,0,1,db470b797c55b2f6778b267d53686402da2348f8111a6ee7a6828f348777d328,2025-03-31T18:15:31.403000
|
||||
CVE-2022-44264,0,1,779dfdbf78c6db3f6a7e766f6d480440efaae96a6243d69ef9dde97872dd6408,2025-03-31T18:15:32.120000
|
||||
CVE-2022-44263,0,0,db470b797c55b2f6778b267d53686402da2348f8111a6ee7a6828f348777d328,2025-03-31T18:15:31.403000
|
||||
CVE-2022-44264,0,0,779dfdbf78c6db3f6a7e766f6d480440efaae96a6243d69ef9dde97872dd6408,2025-03-31T18:15:32.120000
|
||||
CVE-2022-44267,0,0,6a22eca4fc53a59b875002724e8ca628ee1225845b255410b7dc64d1dec8a6a7,2025-03-26T15:15:40.483000
|
||||
CVE-2022-44268,0,0,86770817170268b0a887cfc272f7da52b49cec04a13993803745dc916220b476,2025-03-26T15:15:40.750000
|
||||
CVE-2022-4427,0,0,82b0a1c58b5dd3ffe303de84aa02a3ea240cbfc72b927c3086bf0c900a159f18,2025-02-13T17:15:50.667000
|
||||
@ -209845,7 +209845,7 @@ CVE-2022-44291,0,0,9d44a52c0685eb10cd09eb5b4a4bf46a64acf311680ee93d8ff00dae5d22c
|
||||
CVE-2022-44294,0,0,fbcc7bad653c47067cd2250119a45f329a299e47e13ee007fce37d3922b0301d,2024-11-21T07:27:50.893000
|
||||
CVE-2022-44295,0,0,dd91142188732e917945f2d36e80ce804150e337345a896a8870b3253337b9ca,2024-11-21T07:27:51.037000
|
||||
CVE-2022-44296,0,0,7649a4fa26d775b1f335af01076e6fd037e2e30d459c85beba18d63ea728e5a1,2024-11-21T07:27:51.180000
|
||||
CVE-2022-44297,0,1,714bd75efbc7ed32a384c2a9a61ddee8e01257597043f794fe8a7326c79b21f2,2025-03-31T18:15:32.340000
|
||||
CVE-2022-44297,0,0,714bd75efbc7ed32a384c2a9a61ddee8e01257597043f794fe8a7326c79b21f2,2025-03-31T18:15:32.340000
|
||||
CVE-2022-44298,0,0,69edc3dce983df3c9b5e495ef31c54ebf4e519fcc6525f1ed747f9af4e6eaf26,2025-03-28T15:15:42.390000
|
||||
CVE-2022-44299,0,0,5adbf77681e09b8399532a96a6a9d4ae34eead786fe1c0029300fa2d65f72929,2025-03-19T15:15:41.873000
|
||||
CVE-2022-44303,0,0,d9191fcb3c264206571cc2273401cd659061e66b5b01af1a0d6f1bcc3f8d893f,2024-11-21T07:27:51.750000
|
||||
@ -210816,7 +210816,7 @@ CVE-2022-45766,0,0,72c36f29c35874580c535822342cd020836969f971dd723babdaa8c49bbc8
|
||||
CVE-2022-45768,0,0,5a7e71b10745f7171b546446b7eb1beeca8e54d2bd161b17d6d1ae2a2af3a55f,2025-03-25T15:15:16.277000
|
||||
CVE-2022-45769,0,0,1e8f47f2d9403072669e2f933abb158f13fef15333df9238a51a36c60ca747fe,2024-11-21T07:29:41.063000
|
||||
CVE-2022-4577,0,0,0ee64bdcd89d460efc049aed42aba77caafdf317c23948db93ad4449cf4198e2,2025-03-26T14:15:25.800000
|
||||
CVE-2022-45770,0,1,8c5a7a8c2aa10a10529c3afa32edfc0cf29620d9a30ac85ce666d9550489805b,2025-03-31T19:15:39.220000
|
||||
CVE-2022-45770,0,0,8c5a7a8c2aa10a10529c3afa32edfc0cf29620d9a30ac85ce666d9550489805b,2025-03-31T19:15:39.220000
|
||||
CVE-2022-45771,0,0,187d8b7379b23beda0c4ec7f844878da04db33c0b9e71fb3308e9216031fa00e,2024-11-21T07:29:41.360000
|
||||
CVE-2022-45778,0,0,ba2c0e56310856b947c1011dc3c1bb60c6e63585e41ef402feb38046d5722fc0,2024-11-21T07:29:41.500000
|
||||
CVE-2022-4578,0,0,d7acb6c771f7a789d19f6484a24a188e3f6503cc9345077d8e8dad2ae76e5701,2024-11-21T07:35:31.883000
|
||||
@ -244960,7 +244960,7 @@ CVE-2024-1051,0,0,47e83543cdb00e91b0b2e6dfcb71fb878c597c188c0668b9ed609335433c9d
|
||||
CVE-2024-10510,0,0,1a1b225dc371f891ed5076d52ce3977c9397cc1b9a9aecca92726347c481951f,2024-11-29T16:15:08.733000
|
||||
CVE-2024-10511,0,0,5e411f234441d712e134066c0fb752802b5b0a3f0734c4d32360f037e4b5a3aa,2024-12-11T09:15:05.293000
|
||||
CVE-2024-10513,0,0,101dcfdb0daebc1898491c44833014dafb9860a3d1daf4cd8931e7be27303eeb,2025-03-20T10:15:17.140000
|
||||
CVE-2024-10515,0,1,70e4b8a115d447d9e5de069185152143410d2b26272dd3213172f4c642a76ca3,2025-03-31T19:33:29.490000
|
||||
CVE-2024-10515,0,0,70e4b8a115d447d9e5de069185152143410d2b26272dd3213172f4c642a76ca3,2025-03-31T19:33:29.490000
|
||||
CVE-2024-10516,0,0,2ebd9272720b07a5cf79c9a9ceb37a855be1402b37d213d1f22547ec3a1c9ddf,2024-12-06T14:15:19.667000
|
||||
CVE-2024-10517,0,0,ec874f706d612987436415b14947527e0ec4826e3f1f3a52572b8d2041a7e176,2024-12-12T16:15:10.483000
|
||||
CVE-2024-10518,0,0,9b672e9ec0f2ce289c42bf794385cc1499fe101df107e5b1e23b7eac5052f943,2024-12-12T16:15:10.890000
|
||||
@ -249325,7 +249325,7 @@ CVE-2024-20482,0,0,91c065c5ae8268289342d832aa225585cff358d487a277492c0f30ad7fadd
|
||||
CVE-2024-20483,0,0,dd75006a4b8378f9a9fb04ae844db2b682dee979eaed8461ca1ae896a3344cd6,2024-10-03T01:44:17.827000
|
||||
CVE-2024-20484,0,0,6b6707e10852e13633700ba01618bcd1e8ced80c7c9f83e2b3f114bf128939f6,2024-11-06T18:17:17.287000
|
||||
CVE-2024-20485,0,0,4bad42c478a01f00d273ab8662a0d6beb1a29cef37718efc29530f0725b7110b,2024-11-01T19:50:11.107000
|
||||
CVE-2024-20486,0,1,125fccffe06e3967c8f3666e5a0a779870a3e9c6cd485fa1df233aa67fbb99ea,2025-03-31T18:20:38.103000
|
||||
CVE-2024-20486,0,0,125fccffe06e3967c8f3666e5a0a779870a3e9c6cd485fa1df233aa67fbb99ea,2025-03-31T18:20:38.103000
|
||||
CVE-2024-20487,0,0,90a43a4226fc2a3a08656cd3b727e32adf773edd1ff69cf850e5d113d82153c1,2024-11-06T18:17:17.287000
|
||||
CVE-2024-20488,0,0,3eba64ac5c64e3a05ab3229d3a319f5d11c1176e28d49e535d0362c8cf9be279,2024-09-06T17:18:11.813000
|
||||
CVE-2024-20489,0,0,c515a7131b885c709ec34ee863eb206793a1025f593d2aba1eec899a42a269a8,2024-10-03T01:40:11.637000
|
||||
@ -252467,13 +252467,14 @@ CVE-2024-24449,0,0,cb429ffc1f73fa46512b04b6b6b7262785b1e5e3d056a09b6c1ac751016dc
|
||||
CVE-2024-2445,0,0,caebbca57e6dc905fece28cfd8e27fbd318000c7101a9c9ad5d052cb37da5e31,2024-12-13T17:15:49.207000
|
||||
CVE-2024-24450,0,0,bfdf5a51b70b0375ac650a265388caa7ba6f2b773803891c0563ccf75c951b15,2024-11-18T17:11:56.587000
|
||||
CVE-2024-24451,0,0,2047230038706a6ea449594aac339b5a79a1ce23f8545e56ac9ddd4465baf12d,2025-01-24T20:15:32.263000
|
||||
CVE-2024-24452,0,0,9b35057c4f8238c71060c4a3362de0c41210e1bb46a2fdae5c8c842b460d1809,2024-11-18T17:11:56.587000
|
||||
CVE-2024-24453,0,0,7dbe40dab6b44347c4e5eb5b29ed5a220fbd48ca061b2817d1f080948c6c4725,2024-11-18T17:11:56.587000
|
||||
CVE-2024-24454,0,0,16fe1707e5b6500467b31b614258ea3c9d6830f97969cc4c9d7fb698042d7182,2024-11-18T17:11:56.587000
|
||||
CVE-2024-24455,0,0,bf34919ca18efc343fa332f515b04d4eef692b470371474f2b29a7fce41546b7,2024-11-18T17:11:56.587000
|
||||
CVE-2024-24457,0,0,b7bbb2b5a810c1fadde3472c6ef27ef7a83a2fcac2d1955d127019f7529ac816,2024-11-18T17:11:56.587000
|
||||
CVE-2024-24458,0,0,ea6d0c7194c84aafdf27031e8442770fc2b8ba09fa460fb6ddecbbd88a347c2f,2024-11-18T17:11:56.587000
|
||||
CVE-2024-24459,0,0,3dfc7e14cb29b50f38f109078f5cb39635a43ed4b26fc1dfc7678b12ee1f40a1,2024-11-18T17:11:56.587000
|
||||
CVE-2024-24452,0,1,9aa3205d78f1b8367d050ac692b4d7b2d2a817bbe6be31e8eee694911f917dd0,2025-03-31T21:15:43.370000
|
||||
CVE-2024-24453,0,1,07ce55fb9f095045ad95fb21b47b54148065f631b3fd0d8f468d663dd94cfda8,2025-03-31T21:15:43.683000
|
||||
CVE-2024-24454,0,1,5c2bd54ad8fc2f1543c60195e4dbb3af2c70d2e8d29fea1e0c443c2f494a0a4f,2025-03-31T21:15:43.950000
|
||||
CVE-2024-24455,0,1,502d4dd8b46c6151371bd5e943048eb0545d554441e272079a097510fb13b6e1,2025-03-31T21:15:44.193000
|
||||
CVE-2024-24456,1,1,23859e18334d311069bd2883cb0529381eb7240f1b5b7afa923ed46511ae2078,2025-03-31T21:15:44.513000
|
||||
CVE-2024-24457,0,1,d2e8d373f9d57bd477032938d24f522c47b66f04dea00a8e69a47432d7e011ba,2025-03-31T21:15:44.697000
|
||||
CVE-2024-24458,0,1,a5484b0fe42741bb8d668d79927c6e7c3ee357596180e82a5cf95201bf23335c,2025-03-31T21:15:44.957000
|
||||
CVE-2024-24459,0,1,71db539dc29bad108be9fb9402dcdbfd179a3be0ce3ce40b183975a79316afe6,2025-03-31T21:15:46.887000
|
||||
CVE-2024-2446,0,0,43217bdd586fe0adfbce35dce1a075395c2a23d609c9f19c21f34e2c598fb7e4,2024-12-13T16:39:51.233000
|
||||
CVE-2024-24468,0,0,ef2f46bc00e60b0046ac3fa8a85a5d2843a4126050811a264748033c1f6c0bfa,2024-11-21T08:59:18.197000
|
||||
CVE-2024-24469,0,0,f5bdfa2b37924c81cf855da4fc554fb14c8183e30574a75cfd35962e7d0ac2c1,2024-11-21T08:59:18.353000
|
||||
@ -264342,7 +264343,7 @@ CVE-2024-39655,0,0,995dc9c1c7c96fb0fc03e66270fab2cb1ffcf8a4397ddb365981e39389c67
|
||||
CVE-2024-39656,0,0,c84c39d5a0694c7d1c872fcafc2d435755839df103c210d90013e7441c34bda1,2024-08-02T12:59:43.990000
|
||||
CVE-2024-39657,0,0,2bf07190211ec64f7bfc9e8a96ee124b8611e75c850679013b89e79b547f6896,2024-09-18T16:25:32.703000
|
||||
CVE-2024-39658,0,0,766eb85a1304afebac868b111e71876df3cfe7453afe0f78210d30bdcb174f44,2024-09-13T21:04:24.760000
|
||||
CVE-2024-39659,0,1,eb277be69da7ae63c72d03b1700b1623310358a8537a25ae64fc0cec58e225c5,2025-03-31T18:22:48.390000
|
||||
CVE-2024-39659,0,0,eb277be69da7ae63c72d03b1700b1623310358a8537a25ae64fc0cec58e225c5,2025-03-31T18:22:48.390000
|
||||
CVE-2024-3966,0,0,063645d8989e4cabc49b793f8b061eb0fa5ef40aff4317a82395a925db517939,2024-11-21T09:30:47.557000
|
||||
CVE-2024-39660,0,0,f3ac8304b1d224b0071a3a78df5d2888502abdabd1c64183297a33de85b58c9a,2024-08-02T12:59:43.990000
|
||||
CVE-2024-39661,0,0,2412d25c8e1b3b5f410f5c79baa180c712b7da235f8a4069d0bcbeb29ba3f2d1,2024-08-02T12:59:43.990000
|
||||
@ -266503,7 +266504,7 @@ CVE-2024-42631,0,0,ed9e80e71e882419c98f1936732fdd035ca311ef33bc2ac9cb2a1a67c40af
|
||||
CVE-2024-42632,0,0,29fbd74151313f5b4a9b1372c595b1fee99cc3a87d35047777c8872345464e5c,2024-08-13T15:35:23.410000
|
||||
CVE-2024-42633,0,0,3cf92e5e6df7470ec76959fa70236d85e9e9942650bdcd767e84cd8dbdc27aee,2024-08-20T16:18:24.300000
|
||||
CVE-2024-42634,0,0,e316dd50ac7dd29fbd6d3ac410c9dd2e383d0fa3a5124d95a220d9396a05eb2a,2024-08-19T13:00:23.117000
|
||||
CVE-2024-42636,0,1,444e64fac4a624fc737f489868061b86775d9e59f0cfa512926ca33905ecdabe,2025-03-31T18:49:02.283000
|
||||
CVE-2024-42636,0,0,444e64fac4a624fc737f489868061b86775d9e59f0cfa512926ca33905ecdabe,2025-03-31T18:49:02.283000
|
||||
CVE-2024-42637,0,0,7ab579a16c75673edf60ac8a3c57e5d93e8a15ee1bb0faf828bd0c37998bf12d,2024-08-19T13:00:23.117000
|
||||
CVE-2024-42638,0,0,2c1b857f0b965ac40814489cb21be9b393c58462d1ddf36b59e226e27acdcc88,2025-03-17T15:15:41.303000
|
||||
CVE-2024-42639,0,0,7ae4bb182bb632802f21a7f071d6ecf69b498e4a7b1d31bfaeb90705ae0f6221,2025-03-20T14:15:20.170000
|
||||
@ -268698,7 +268699,7 @@ CVE-2024-45522,0,0,09ceef78cc5f057be786bb183a479b765b1739f0b7ce2fbf1b1d3c524b7ab
|
||||
CVE-2024-45523,0,0,78921820db852b485259b411f9a0300a9a0274594719508f8ffa7f118abb2798,2024-09-20T14:35:11.523000
|
||||
CVE-2024-45526,0,0,5a2809434001f8fa7518dd39e1d76ce252063ceb0c771a1023d6ee67c4c4a925,2024-10-23T19:35:10.713000
|
||||
CVE-2024-45527,0,0,5b520308e8c1543ba589bbb7fb99705b7715af5ae5704181f6c1c8d8f972f51c,2024-09-03T15:35:13.673000
|
||||
CVE-2024-45528,0,1,2b62a46ad6721df273bf579b352dfc41d4b63f87803bbdffe8980da05bd0cffe,2025-03-31T18:53:04.780000
|
||||
CVE-2024-45528,0,0,2b62a46ad6721df273bf579b352dfc41d4b63f87803bbdffe8980da05bd0cffe,2025-03-31T18:53:04.780000
|
||||
CVE-2024-4553,0,0,fb93ea8b9b15d40065d6ae14704246d0707e85e61c82926c0504e92275e39cb7,2025-01-24T14:42:56.390000
|
||||
CVE-2024-45537,0,0,e4991fccb3abdc03f0d41abc273d14fb886e4c1626430be204dd2dbbe1a63e8d,2025-03-14T15:15:42.430000
|
||||
CVE-2024-4554,0,0,29103eb4d0b8fc6eb1c1a81b44a6bbfd0c979fea9590f8c8dd85408f98483465,2024-09-19T18:15:10.433000
|
||||
@ -269073,7 +269074,7 @@ CVE-2024-46238,0,0,fd4831862db3e74117454bdc4a0bfbcd296d65ce950e55d96b45ec27cf047
|
||||
CVE-2024-46239,0,0,a2e0203fe405dc3797841252c2430cf2c4e2c3b10af81b0193959b83c529ddd1,2025-03-31T17:52:58.943000
|
||||
CVE-2024-4624,0,0,18970f9a313d13160da6e0af938d898396349890d09a8f8861dd5be486e648a9,2025-01-15T18:00:53.760000
|
||||
CVE-2024-46240,0,0,1191cdf44b6509cbee2a8abac44a625a4ac7bf4a3622ea84bd1d88a32af8af69,2024-10-25T19:00:20.737000
|
||||
CVE-2024-46241,0,1,65a068281839d70d77856026e22ffe1b7df2d3ec55dc4b9009edbb9990408570,2025-03-31T19:20:33.810000
|
||||
CVE-2024-46241,0,0,65a068281839d70d77856026e22ffe1b7df2d3ec55dc4b9009edbb9990408570,2025-03-31T19:20:33.810000
|
||||
CVE-2024-46242,0,0,278c5d74ca553d7a6ee7eea1c9d6c6283b4a956d21df9f54eec439967fafe153,2025-01-07T21:15:11.783000
|
||||
CVE-2024-4625,0,0,aad46a28d2c2f49a77b5936172e43c0dde451e0472cbbc7daa3b8775fd5ff0b1,2025-02-11T02:15:35.090000
|
||||
CVE-2024-46256,0,0,e8ff1292d6b21c7ae8cc6b0452346dfd4818ec086d9a14227767a4b9e342f7b1,2024-10-24T17:15:16.690000
|
||||
@ -269121,7 +269122,7 @@ CVE-2024-46366,0,0,d617ffae88cb828c6e7151f2341d1f71470550fda14e8fcb6482b905bda24
|
||||
CVE-2024-46367,0,0,989a85d08e8653df07e4eae1f4f794bd57485ed7719e4f75ea7a012b27c892b7,2024-09-30T12:45:57.823000
|
||||
CVE-2024-4637,0,0,93f87c1fc2bbd96796cfb083c4131106f07be323f4ade6a9313776a7f9a8739b,2025-01-27T18:22:19.963000
|
||||
CVE-2024-46372,0,0,64e69d8d7d4508ebfd1e3370be60554c61b02f56bb1b126b7d6932b73c4bd8b4,2025-03-25T17:16:10.433000
|
||||
CVE-2024-46373,0,1,a07e5ed04eabb8b296855fe8ef81409c9a84dee991735b3ba28d11997413b1db,2025-03-31T18:53:55.610000
|
||||
CVE-2024-46373,0,0,a07e5ed04eabb8b296855fe8ef81409c9a84dee991735b3ba28d11997413b1db,2025-03-31T18:53:55.610000
|
||||
CVE-2024-46374,0,0,49c9abdfd23a3c7b397e5069ae4701ce6b671bb400b51adb0be2528c878db0de,2024-09-20T12:30:17.483000
|
||||
CVE-2024-46375,0,0,251c5c224cd39f4fe15f3a9045f8fa195e4dd35b1c8aeb90a1494c5706870ceb,2024-09-20T12:30:17.483000
|
||||
CVE-2024-46376,0,0,44f3c1706e60f5bd7bbcaa0829495448a78c5a8ae7d0d5596087882889678073,2024-09-20T12:30:17.483000
|
||||
@ -269167,9 +269168,9 @@ CVE-2024-46466,0,0,05f240dba70d063ab9d7ed20681eedb762fbba20cc02e0363e22d4808d27c
|
||||
CVE-2024-46467,0,0,73f0f26e819634cb625c5f23b0aee6baa6651d870b71db2a09d09f42a1c60f90,2024-11-25T20:15:09.170000
|
||||
CVE-2024-46468,0,0,bfaaa209cfbab67a97fdbb03a6d72f15cdef7f2e107fbbe0bd40bea4fa9e260b,2024-10-15T18:35:14.680000
|
||||
CVE-2024-4647,0,0,ecc1578f1607d877ec09ef9a154e3163dc45f1d50cf87949c0a4d645b7b7eaf9,2025-02-19T18:04:19.093000
|
||||
CVE-2024-46470,0,1,ccd900df91568f37aaaf8beaddb896f7b1bf9ff01c6bf3d8989063329ed3c1e7,2025-03-31T19:19:17.120000
|
||||
CVE-2024-46471,0,1,95b680df6f7ac557262e9483a5a0b48e0997cd8bfadfc2bd86c9ad1edd8cade7,2025-03-31T19:07:09.867000
|
||||
CVE-2024-46472,0,1,98034addb2dd3db31543176eec90b3d6be943e239cb4afda9c52b024f5b4c496,2025-03-31T19:02:48.263000
|
||||
CVE-2024-46470,0,0,ccd900df91568f37aaaf8beaddb896f7b1bf9ff01c6bf3d8989063329ed3c1e7,2025-03-31T19:19:17.120000
|
||||
CVE-2024-46471,0,0,95b680df6f7ac557262e9483a5a0b48e0997cd8bfadfc2bd86c9ad1edd8cade7,2025-03-31T19:07:09.867000
|
||||
CVE-2024-46472,0,0,98034addb2dd3db31543176eec90b3d6be943e239cb4afda9c52b024f5b4c496,2025-03-31T19:02:48.263000
|
||||
CVE-2024-46475,0,0,8de337bf21f8e76ccf4e6b762e2c811bd622fb2d069c67372f969f963e9a513d,2024-10-04T13:51:25.567000
|
||||
CVE-2024-46478,0,0,f70f3b5c1ce34e91e4141e4b2cfc565865d5d214d85b67dd8586cdb93782907f,2024-10-25T20:35:09.710000
|
||||
CVE-2024-46479,0,0,d3dcd1fb5238b07184a4925343df44d4e6e159f370a4f241b86afa356047b5d1,2025-01-13T18:15:18.003000
|
||||
@ -270865,7 +270866,7 @@ CVE-2024-48798,0,0,75f45576dc36face7290312bd25d8139caf8bd952fb64803e744a3ae6e924
|
||||
CVE-2024-48799,0,0,1b7764cd349b8845e947ef033fa31339932e6c95b96b723a19e36094142fff50,2025-03-24T17:15:18.960000
|
||||
CVE-2024-4880,0,0,0cc985577bb7f14539feddc231097b9e719890ea446692f0e1ab269d57e2a39c,2025-02-11T02:15:35.143000
|
||||
CVE-2024-48806,0,0,c426ca49ad75210c4d73c5b573e2dd3e119056b8e0f3da40ade3d13a5fdaf0d5,2025-01-16T19:15:28.320000
|
||||
CVE-2024-48807,0,1,8a88a75c275ba7d848707c49505be930f471d4f3e024973e5d06d59680ee7a1a,2025-03-31T19:24:10.313000
|
||||
CVE-2024-48807,0,0,8a88a75c275ba7d848707c49505be930f471d4f3e024973e5d06d59680ee7a1a,2025-03-31T19:24:10.313000
|
||||
CVE-2024-48809,0,0,89c64378ba71cdec8bda78ac432f0505d060e9c4a712bdefd0c0360dbcd52353,2024-11-06T19:33:54.977000
|
||||
CVE-2024-4881,0,0,1c031fd2c38a767f783cce3b716ba92a0bccdca18b325ac245c51367e8857d89,2024-11-21T09:43:46.897000
|
||||
CVE-2024-48813,0,0,531834e27f6a6bc0c9381cd9781162753c49dc1f29a9e6d0b2f2fb460ee278b0,2024-10-15T12:58:51.050000
|
||||
@ -271564,7 +271565,7 @@ CVE-2024-49679,0,0,69366457d136ea54a3b6926990a6003dde86feed848c00d8b78be39be0d98
|
||||
CVE-2024-4968,0,0,84fb7654272f609db67556b1bbee00c1c6101a0c21765453fbdfc009a9be8a0a,2025-02-10T13:42:36.187000
|
||||
CVE-2024-49680,0,0,0744c3301274ac63d10bef9c834e7e6120c33d012ef4df460932bd9e268c305e,2024-11-19T21:57:32.967000
|
||||
CVE-2024-49681,0,0,8c5bef0a7111e608e574a08de0a110bd80fd63fe70a3435156e2c27580ccfca2,2024-10-25T12:56:07.750000
|
||||
CVE-2024-49682,0,1,078bc643574c07133c2a6c67de5ef98e1df80f7b816ed0205f76ede1996f5e82,2025-03-31T18:13:05.940000
|
||||
CVE-2024-49682,0,0,078bc643574c07133c2a6c67de5ef98e1df80f7b816ed0205f76ede1996f5e82,2025-03-31T18:13:05.940000
|
||||
CVE-2024-49683,0,0,7be9ea3f510dbaa7fe885cdcb7745560fbc269f7e9bd22850dce90772b3593dd,2024-10-25T12:56:07.750000
|
||||
CVE-2024-49684,0,0,36531d7cf4c7a4e38f6860bda9ec7c0d48195d2fcc27ad0578736763df8ccca2,2024-10-25T12:56:36.827000
|
||||
CVE-2024-49685,0,0,f305b32b568edf91e7bf9c3e098c8b0e617926446f188349b4087b101823778f,2025-02-05T14:51:00.297000
|
||||
@ -272703,9 +272704,9 @@ CVE-2024-51055,0,0,8c557950a9a065601e8c6c8dceb6fdc953c2a7292e6455f04da0193339cab
|
||||
CVE-2024-51058,0,0,66da7488618e7bfd544082f0a7ca5f5b213beafff66d93fe5b2dca66727647f7,2024-11-26T20:15:33.253000
|
||||
CVE-2024-5106,0,0,b32baeddd5d7517902783f8698c8ddf8d7704de9303360c6ce08bd697c855461,2025-03-05T16:18:39.727000
|
||||
CVE-2024-51060,0,0,de7bf14fdaea8b78c02e0c6fade9921621bf0bad2bf2c2ffc485512c883062ec,2024-11-01T17:35:08.443000
|
||||
CVE-2024-51063,0,1,baaa401f76f83c10a16a16ac2300c7ff206c0294cf7e048885c9427fd5cc3d20,2025-03-31T19:26:46.460000
|
||||
CVE-2024-51064,0,1,8c98c114e76bc1bd024a1bc62e5d3e352526cdd76914057f4ebcb0ef5f381d29,2025-03-31T19:29:12.110000
|
||||
CVE-2024-51065,0,1,3b3e6650157f1931a47712b62fd9a2e7477a5d52ec6634effed03cb5c0e92c45,2025-03-31T19:29:35.613000
|
||||
CVE-2024-51063,0,0,baaa401f76f83c10a16a16ac2300c7ff206c0294cf7e048885c9427fd5cc3d20,2025-03-31T19:26:46.460000
|
||||
CVE-2024-51064,0,0,8c98c114e76bc1bd024a1bc62e5d3e352526cdd76914057f4ebcb0ef5f381d29,2025-03-31T19:29:12.110000
|
||||
CVE-2024-51065,0,0,3b3e6650157f1931a47712b62fd9a2e7477a5d52ec6634effed03cb5c0e92c45,2025-03-31T19:29:35.613000
|
||||
CVE-2024-51066,0,0,be8d42488560dde278907528220628acd7b9c959e1434a1bf1dbead4fac8fcb1,2024-11-01T21:35:05.747000
|
||||
CVE-2024-5107,0,0,2f055a04ccbd78b9c8df18cf46dc307764a3b6508de2a8d7063f4779b98b5648,2025-02-21T21:18:28.707000
|
||||
CVE-2024-51072,0,0,e3822fe995b8ac5db401be8bd0f5c664092585f4b74280cebfb9be6c17c2b406,2025-01-10T15:15:15.173000
|
||||
@ -272764,7 +272765,7 @@ CVE-2024-5119,0,0,91893ccf3d5267b72a6b8ed10d2ba4560a7ea2a4bdb6a9260fec1e0619fdc1
|
||||
CVE-2024-51190,0,0,42252f42d57e549237c1e65576645654fa8f454c06ed81783464129f893b6230,2024-11-12T13:55:21.227000
|
||||
CVE-2024-5120,0,0,aa0bc8f3e284072bee9ea1e53af4826838bcd5e6353dff9b260a6c50ff30ddbc,2025-02-10T14:33:42.463000
|
||||
CVE-2024-51208,0,0,a59d692cb343382c726f4c6a51e70064bfbd58c7b1c1ae68bcfdeee9f98e2032,2025-03-13T17:15:33.210000
|
||||
CVE-2024-51209,0,1,2acbc3e3e25af92d55848830d8628123b058e9a1fdf83b5e7f3e04674f33868a,2025-03-31T19:32:18.943000
|
||||
CVE-2024-51209,0,0,2acbc3e3e25af92d55848830d8628123b058e9a1fdf83b5e7f3e04674f33868a,2025-03-31T19:32:18.943000
|
||||
CVE-2024-5121,0,0,f13a957054662226d9f30e7797cd699fbbc4fb099f0a6c1363eaca0808d26e93,2025-02-10T14:33:01.420000
|
||||
CVE-2024-51210,0,0,1dfb5793bbd38593e70df49e07cd7ee951e3036bdad9fedc179912099b41ccff,2024-12-05T18:15:22.090000
|
||||
CVE-2024-51211,0,0,5bbcb137b1680696c02324cbd64119e5698f5bb8e272467c42227679b2a82406,2024-11-21T17:15:22.410000
|
||||
@ -273358,7 +273359,7 @@ CVE-2024-51934,0,0,efe96cb8fc68640b083cbe9be334ef1c2ebccacaa81f9de9e0dd9bb0982e2
|
||||
CVE-2024-51935,0,0,fb50d58711b2904c9889235a06a099f964a5dc2d960855b72c8c5020e8cc7467,2024-11-19T21:56:45.533000
|
||||
CVE-2024-51936,0,0,01ed82394fa093ff4d3b03b9d8dca58deb9d6f0168256baf25f9ae6ed15ae66d,2024-11-19T21:56:45.533000
|
||||
CVE-2024-51937,0,0,40f9bcab077c80d2c70e8068655769a90e334e94a3b2252e9eefae5aa1c7cf3f,2024-11-19T21:56:45.533000
|
||||
CVE-2024-51938,0,1,7f531483548183d746950131a91938a8eaa342b0a7690b882b3a3f83d4d6a283,2025-03-31T19:36:04.583000
|
||||
CVE-2024-51938,0,0,7f531483548183d746950131a91938a8eaa342b0a7690b882b3a3f83d4d6a283,2025-03-31T19:36:04.583000
|
||||
CVE-2024-51939,0,0,20d7c044823f2dbd5a93ccbf1e62122469f38a0e0e61d27f0eead27fdd2e22c5,2024-11-19T21:57:32.967000
|
||||
CVE-2024-5194,0,0,8d46b9bc1f0e922d7415f01b9e20c3241c30409b16aacd585324be8545f4e31e,2024-11-21T09:47:09.967000
|
||||
CVE-2024-51940,0,0,eea7140ef8e6920e3e5dd47ba7cd4d003e663b87564e69e84f825f175f7f9241,2024-11-19T21:57:32.967000
|
||||
@ -275357,6 +275358,14 @@ CVE-2024-54792,0,0,98468856aeeedfaaa62e1fc26bc1fac81265f3b59cbbffb650074881345ba
|
||||
CVE-2024-54794,0,0,c49ffe9b769b5cd233f7d6bd6f86fb56ddf647e4b0a80553364112532cd337f3,2025-01-21T19:15:11.243000
|
||||
CVE-2024-54795,0,0,189377580c088768ee02d63dd643544c9e329d819648f0ba84334338aef4e9e3,2025-01-21T19:15:11.407000
|
||||
CVE-2024-5480,0,0,dcddee05a122e48deec7dd054d03a98cfc3767234733af70ab63ade31364815f,2024-10-02T16:15:10.913000
|
||||
CVE-2024-54802,1,1,3a4102a7c0b6c4258870e143dca9a56c73080cc779032a88035f11e358fc1ca8,2025-03-31T21:15:47.203000
|
||||
CVE-2024-54803,1,1,192193603a5ebe46711b4e83a4bcb956f7781970a1dc4a31466e95cc44190532,2025-03-31T21:15:47.377000
|
||||
CVE-2024-54804,1,1,af2de00afb414e1889120d5577cb01186c8c976bf5a04b1c87e0ebfdd9d92249,2025-03-31T21:15:47.560000
|
||||
CVE-2024-54805,1,1,5408c1dbb379ed12ed0d05a63b489762204909515ac58e7c7c0fff6f2fe52925,2025-03-31T21:15:47.737000
|
||||
CVE-2024-54806,1,1,702336dd48eeff3593dd350dbacfa5f362a1a00a9dc2c7f5eaafefb7ffc2c01e,2025-03-31T21:15:47.923000
|
||||
CVE-2024-54807,1,1,1bc8e591f4370077ab227b516ceb005453d45fc6ec62e61feffece8184ca988e,2025-03-31T21:15:48.090000
|
||||
CVE-2024-54808,1,1,508e5d76c1f49651c6875f8083cbf64a337b83d81086dd089faff099fb56b7d3,2025-03-31T21:15:48.310000
|
||||
CVE-2024-54809,1,1,d63d8ba3b33563d57fd43edfe1b118d91737ff7f45d096d6bfd7931bcefdd13d,2025-03-31T21:15:48.527000
|
||||
CVE-2024-5481,0,0,6aaa03c1e132f74e5c4e90ead29bd24eb7065ad2c73e1f2805fbc82099451674,2024-11-21T09:47:45.877000
|
||||
CVE-2024-54810,0,0,98b1b32485df996df7d9929d6a4a4f3f6576d87de7e3a8405b0f88648f287e10,2024-12-13T18:15:21.707000
|
||||
CVE-2024-54811,0,0,c518d2be0055f2f694c9ca48885a5257eabcc0287b36c8555688778fe5e578d7,2024-12-13T18:15:21.940000
|
||||
@ -277962,7 +277971,7 @@ CVE-2024-6624,0,0,552d36257e8bfaa4330013290315eab120066dcc2d886a9d94d7a9269b76a4
|
||||
CVE-2024-6625,0,0,1b1c39349f634a560833a8b14095d12391f881dda66986404d732704553d9c8a,2024-11-21T09:50:01.480000
|
||||
CVE-2024-6626,0,0,249866bf2ce6f0742e7ebbb55a39f819e02fa1bb5ce90e67c70e877b0a80889f,2024-11-08T21:18:44.400000
|
||||
CVE-2024-6627,0,0,46c1b50f2f4fc4f4915a5d60c7232a25ef2d8e7212d2215183cdea5ab45a44d0,2025-02-06T17:40:50.280000
|
||||
CVE-2024-6628,0,1,8d496fa7bba218fa6816b17098bcf8cd1de8a287cedeed63670cc804578db4fe,2025-03-31T19:58:57.527000
|
||||
CVE-2024-6628,0,0,8d496fa7bba218fa6816b17098bcf8cd1de8a287cedeed63670cc804578db4fe,2025-03-31T19:58:57.527000
|
||||
CVE-2024-6629,0,0,a527624ccafa4d4e16277a177029cdaa056a5fd7eb7a8772535daaafb91b33a4,2024-11-21T09:50:01.973000
|
||||
CVE-2024-6630,0,0,7742b604143993a9d769b9ab9c3e5aab85337a51e6772bb186961af80d29fee2,2024-07-10T18:15:05.407000
|
||||
CVE-2024-6631,0,0,6814ab0364b6ced1872d70e3966a7eb63a524daa89dd6b575b0ac22e27afca55,2024-09-12T20:39:22.493000
|
||||
@ -278353,7 +278362,7 @@ CVE-2024-7050,0,0,06f451073f052c5171cdc858230f8ac0bfc1cd03261b82c9e4025ffcee809a
|
||||
CVE-2024-7051,0,0,d0158d1d3b2cdd12dcaf8ff0c61b0f7cdef559e08a0a05011bfe1940648c764c,2024-08-30T16:15:10.960000
|
||||
CVE-2024-7052,0,0,b869d4be8a9ef05b526f5074ec778788ff68c0dc06586eacf01aecd8a404162d,2025-02-14T17:15:18.480000
|
||||
CVE-2024-7053,0,0,7720c82c430e328b75c680ca5e5d109c9bc5d455075089b23f69681b09912d0e,2025-03-20T14:15:21.553000
|
||||
CVE-2024-7054,0,1,7df23b9647e9776ce9f3d05a4e54f924a44fe3a231ecd255041316cf38333e70,2025-03-31T18:27:47.530000
|
||||
CVE-2024-7054,0,0,7df23b9647e9776ce9f3d05a4e54f924a44fe3a231ecd255041316cf38333e70,2025-03-31T18:27:47.530000
|
||||
CVE-2024-7055,0,0,9935f1de2cee66b07954ad120fe6ce5f54f36d3188fd3d2bc5c8e7d48d543152,2024-08-06T16:30:24.547000
|
||||
CVE-2024-7056,0,0,ec08ae131187a52a9d1409d290e6919fd556ee74677249d587bb18cc1ea21e30,2024-11-25T14:15:07.457000
|
||||
CVE-2024-7057,0,0,3c6ad5d4517bec5901108debd01a08995bd05bb08470aa05a322d034ebbe1d3e,2024-11-21T09:50:48.570000
|
||||
@ -280174,7 +280183,7 @@ CVE-2024-9033,0,0,c9ce8f3f22810e314a9b6a7070f369471d9e5df9eced517c322686d35f96ab
|
||||
CVE-2024-9034,0,0,90bd5bffc39325b9c6cc2c7df19844bf0675ae9032a75556de19fb8cc5e5a6ba,2024-09-26T13:32:55.343000
|
||||
CVE-2024-9035,0,0,c836add5f9ea0f6ba01095ded6458386ae8fd2f11d68cb367cc7ade58ddaa024,2024-09-26T13:32:55.343000
|
||||
CVE-2024-9036,0,0,3bbbfc98a85d5f78d43560ecd3c231db4288c62659683b5c35ebd015a776ac19,2024-09-26T13:32:55.343000
|
||||
CVE-2024-9037,0,1,61d7d575e9833b1f71caeb12a0ed3faa0ea60057248b15da1a13008ecf46898b,2025-03-31T18:55:16.680000
|
||||
CVE-2024-9037,0,0,61d7d575e9833b1f71caeb12a0ed3faa0ea60057248b15da1a13008ecf46898b,2025-03-31T18:55:16.680000
|
||||
CVE-2024-9038,0,0,902b50c6d930b124e106a40fd3471c27a76d7b215b07dd7cda1cc7b7441c1dbd,2024-09-27T16:11:37.710000
|
||||
CVE-2024-9039,0,0,c2deaade23da482813d66248554a49a9e73a2b63627babab6e443384d154782e,2024-09-27T15:58:22.493000
|
||||
CVE-2024-9040,0,0,be63bc9a723d2aaddace773ab8ae6f6ce5897ce1c02995f8071d9bda756dd77c,2024-09-27T15:53:28.333000
|
||||
@ -283312,6 +283321,7 @@ CVE-2025-2189,0,0,21362a35b576822cdfa735714de3fa8c2b76316e693eaa457f9b76275fa21b
|
||||
CVE-2025-21890,0,0,3e452c883c787bf57ab5be0b0e5aa90feed93eaffae235cb89507607056595a5,2025-03-27T16:45:12.210000
|
||||
CVE-2025-21891,0,0,a253456cafaa3a78ec959ae9d1e060c416fbd075d583d9a377a6f3a26384270e,2025-03-27T16:45:12.210000
|
||||
CVE-2025-21892,0,0,8c98329172bed9a8b6c22457d316cbe2e25dcbfb066893d9b84a9f2d473cdf83,2025-03-27T16:45:12.210000
|
||||
CVE-2025-21893,1,1,4a7f56dfa32cca5916bdfdd25b8f2f0cf25de87af7a79afe4879360d1a287b49,2025-03-31T21:15:49.307000
|
||||
CVE-2025-2190,0,0,2ad046c01e8fde47102d510f1e691e56d4505e286b09d0c88b5a5f7442f2c96e,2025-03-11T14:15:27.163000
|
||||
CVE-2025-2191,0,0,435c67fbe91d200be556fa2bda480273212858b72f473ce6d41f73706042d56e,2025-03-11T12:15:12.277000
|
||||
CVE-2025-2192,0,0,154f3902bcd5e64a72bf0ae06aa3f84eb0e5031d75ead63c96aedd6785aca290,2025-03-11T14:15:27.443000
|
||||
@ -285613,7 +285623,7 @@ CVE-2025-25567,0,0,0e3c48ab6a4496288811058f80eb7d29339ca7638242416df9fb706fe2ad4
|
||||
CVE-2025-25568,0,0,dcddcadc1916e01c6212aad8a0f1d787a9f9a493dfbdbc2db4d93a5e91a64889,2025-03-19T19:15:44.790000
|
||||
CVE-2025-2557,0,0,a42b70c78dcd89b9d3e57fec472337c34078e8807b7744b63a4210d869265076,2025-03-20T19:15:38.220000
|
||||
CVE-2025-25570,0,0,a1a60fff83d4e58f97f6cb73bc995dd008cce7cbdda97b57369c1d11bafc9be9,2025-02-28T22:15:39.630000
|
||||
CVE-2025-25579,0,1,5d939121eb276c7ecee1a29df62e11fe223cac6be7be94a5d22d93cbcd0562dd,2025-03-31T18:15:32.783000
|
||||
CVE-2025-25579,0,0,5d939121eb276c7ecee1a29df62e11fe223cac6be7be94a5d22d93cbcd0562dd,2025-03-31T18:15:32.783000
|
||||
CVE-2025-25580,0,0,981db6fd6e3e758c95a7a3f18e0cb48f5883f5e68031cb88007741a3d3ada90e,2025-03-19T19:15:44.917000
|
||||
CVE-2025-25582,0,0,71a429a4688f0b98eba65a76fc9404b2639d529bc96a639c12359f9c6efb4809,2025-03-19T19:15:45.050000
|
||||
CVE-2025-25585,0,0,aa4f3350849e7a6d1d328ba035f3acd3940e4357ca726a2c6819200e720715c1,2025-03-19T19:15:45.203000
|
||||
@ -286339,11 +286349,11 @@ CVE-2025-27162,0,0,c8a873ec2f347494d3d41f4d6681990bc645e58bd3c39e33b011e49921441
|
||||
CVE-2025-27163,0,0,be9f753c41485f106d11ef9915fc4e361a052626e525b314de4c44cc95c404c0,2025-03-12T14:15:16.447000
|
||||
CVE-2025-27164,0,0,03f0ef0c440ec2fdb9d4dc234d5039887fd3a0dc69a422dcc0d797b26efec6e3,2025-03-12T14:15:16.557000
|
||||
CVE-2025-27166,0,0,b79788c4fdccc241a4bf7f90619735b442ab253b044d6be62992503f1b3e47a6,2025-03-11T18:15:34.580000
|
||||
CVE-2025-27167,0,0,482f29e987878fe25988a572ce45a267c50ddf32167f67d5c354d3bbaff05d77,2025-03-11T18:15:34.730000
|
||||
CVE-2025-27168,0,0,807af9ba36e5529c822db751bf81df9cf34521f5f9d52647f44b26e4df0d5dd0,2025-03-11T18:15:34.893000
|
||||
CVE-2025-27167,0,1,9fc03919f99441cc6e5924699f0b5c87cd969352015206acd2e76f4d0a20cd30,2025-03-31T20:06:44.963000
|
||||
CVE-2025-27168,0,1,c854660c04ae74863042de804529bb7219f13c8265d2faffac9e2184be17e3fe,2025-03-31T20:06:08.030000
|
||||
CVE-2025-27169,0,0,d5608e0c74c50f0a7a42281f3fdcdcaa1a3d612052706dc929ba06e7701adb33,2025-03-11T18:15:35.077000
|
||||
CVE-2025-2717,0,0,a2a688c228e7eb03eb19b61a2532f80168264fd17e51134150518690e88bab28,2025-03-27T16:45:46.410000
|
||||
CVE-2025-27170,0,0,b96e4ffaebc56916f484b466d583f7d3b36625d540473ebe18865b2b793f41b3,2025-03-11T18:15:35.227000
|
||||
CVE-2025-27170,0,1,4798b678d1edbc7dfece125d548cec25bb6248e6edea565df19aaaea350e970e,2025-03-31T20:02:08.903000
|
||||
CVE-2025-27171,0,0,11bfabbfe795ecd5b004555bf156a1f2031ec4849cea31dc93fa58c4a625d087,2025-03-11T18:15:35.377000
|
||||
CVE-2025-27172,0,0,1fbf8b09dd6176ac8d843dcc615a1bf482be9a0380a5c5839de3ae8abc924dc0,2025-03-11T17:16:44.420000
|
||||
CVE-2025-27173,0,0,d2957505941740af6a42c6319581f72d9d2dd8e1c5b9f1c7029eb0863a6e0c67,2025-03-11T21:15:42.307000
|
||||
@ -286698,13 +286708,13 @@ CVE-2025-28011,0,0,fdcb5591ea26e059e8d35048712169c6e42fd9f817189e1097ee50f0c5ccd
|
||||
CVE-2025-28015,0,0,2ec3b03d6a2c5b451e55cb244fde2066264789b2e32a98f716bffd5d4cc31009,2025-03-28T19:49:16.520000
|
||||
CVE-2025-2803,0,0,aea0c457978a84bf5185af25a34152b6f525228f24aa7933021e5368f307da22,2025-03-29T07:15:18.770000
|
||||
CVE-2025-2804,0,0,920f730e5efd8732e0e5abb52416672a1a115bcae2eab5cbf394b4b15549c65b,2025-03-28T18:11:40.180000
|
||||
CVE-2025-28087,0,0,a083116acf70a088348013bdd27f52f04c87f16d9dd7398d42c6f7120e98d2af,2025-03-28T22:15:17.717000
|
||||
CVE-2025-28089,0,0,55f44d2427798bd3e256ca55bca62ba0a32c851325aedfb0df89721b1e121c5f,2025-03-28T22:15:17.847000
|
||||
CVE-2025-28090,0,0,6f9f220ae0185a93de530a112ef6866e689dfdcdd268a4483e27c677f80b8df8,2025-03-28T22:15:17.980000
|
||||
CVE-2025-28091,0,0,e9eb73da16a1e1ebd7ccc9c4de8f5a66b42f4596b5cfb86129d2dfa324680177,2025-03-28T22:15:18.107000
|
||||
CVE-2025-28092,0,0,67281ba6ae9fe6b82cabba74a4b589f6e13899072cae60ba58e4096063bd9fce,2025-03-28T22:15:18.237000
|
||||
CVE-2025-28093,0,0,0f75d6032cdd86e0fdfd7eb67c7196f1d5298411cf0156c82964fa444bc3986c,2025-03-28T22:15:18.410000
|
||||
CVE-2025-28094,0,1,ca6bedfa8e464efc37dc706e258708723d2ac1c1298ac529e150b4cdda83f083,2025-03-31T18:15:33.010000
|
||||
CVE-2025-28087,0,1,99ff68793ff561c53991516e6858da6f9fb2ba20569700be50a56f72c6c94e8c,2025-03-31T21:15:52.970000
|
||||
CVE-2025-28089,0,1,18f3d3abab164a0919170c1bf1ca2024f9a0c6def48cc9e42a79859b62355583,2025-03-31T21:15:53.133000
|
||||
CVE-2025-28090,0,1,460ab53b1e36837aca74081864b1733eb6fef90892f911c9f9bf809cb11369a5,2025-03-31T20:15:14.967000
|
||||
CVE-2025-28091,0,1,733d641f537c0daa2763e825a3541d600d1b34d5d840a65ee2cce378da0172de,2025-03-31T21:15:53.287000
|
||||
CVE-2025-28092,0,1,ce2fc65993a7770d015575705c8546f2b5d9b1a3206d36ccd201861e6650a0b0,2025-03-31T20:15:15.203000
|
||||
CVE-2025-28093,0,1,0db5efaab21895470fe1bf42a856b01d320239c4d837e7ccab2e9e129e18f465,2025-03-31T20:15:15.363000
|
||||
CVE-2025-28094,0,0,ca6bedfa8e464efc37dc706e258708723d2ac1c1298ac529e150b4cdda83f083,2025-03-31T18:15:33.010000
|
||||
CVE-2025-28096,0,0,16d024745a7aef83121952f4fe39c64486ee7ed76aa52fcde001a2a6410e237e,2025-03-31T17:15:40.403000
|
||||
CVE-2025-28097,0,0,7b978a840b839efdbb92782b35164535e64ad57d5c7c1ac6787e57af8db77906,2025-03-28T22:15:18.827000
|
||||
CVE-2025-28135,0,0,ce5da46c9ae66e075cac4fbd39873077e479e00a68bacb4de079df96e23d166b,2025-03-28T17:15:28.550000
|
||||
@ -286994,7 +287004,7 @@ CVE-2025-2990,0,0,9e58b2fa7f0db839eeed13ac974d5dc271117bb2e9ce130153ef40d31c37cc
|
||||
CVE-2025-29903,0,0,10c68e7ddaac62cfaf56fa2d0c36952343de94dcaf74d7de9700d239804e47d3,2025-03-12T13:15:37.823000
|
||||
CVE-2025-29904,0,0,8151be9d68bba0e8c527ecea5490dd29fd8894724b2933080703a0ecee03e639,2025-03-12T13:15:38.050000
|
||||
CVE-2025-29907,0,0,630761e684cdf47ad290db608dea22d61cb6820178858ded042fbee7359f058b,2025-03-18T19:15:51.197000
|
||||
CVE-2025-29908,1,1,0d1c357cefb5d4d044e0ce372f570977795acdddd7899e18a82b0735522a38bd,2025-03-31T19:15:40.367000
|
||||
CVE-2025-29908,0,0,0d1c357cefb5d4d044e0ce372f570977795acdddd7899e18a82b0735522a38bd,2025-03-31T19:15:40.367000
|
||||
CVE-2025-29909,0,0,63c6e761924bf096ec7d819f389c28c4b1d7a8c4b34a3508047a025be39f7788,2025-03-18T14:15:43.803000
|
||||
CVE-2025-2991,0,0,cf6d69e7615143d5a585d26b547b3530c6beb880a98c9a55d6170ec976c1b8f2,2025-03-31T11:15:39.160000
|
||||
CVE-2025-29910,0,0,17418d93c360088fb66ebccca58b51ead2474e70341b6b176cd0d5acb2eed2d6,2025-03-18T14:15:43.913000
|
||||
@ -287032,25 +287042,27 @@ CVE-2025-30004,0,0,1364d107bb6c7f41c95a057bca66f2aa1afe5de34c484fea06ad70bb85a67
|
||||
CVE-2025-30005,0,0,16505715170d88cde58145933126fb581063c9cbd194515fa6e178a97b7eb38f,2025-03-31T17:15:41.880000
|
||||
CVE-2025-30006,0,0,94dbaa3c46ffedfc3603ead204fb6ce24795883ef875e52a66e81cb24e1573ed,2025-03-31T17:15:42.020000
|
||||
CVE-2025-3001,0,0,6783170e18f794e5e0220e82172d0170aca6943d1ee9cf4188f46e9839779a5a,2025-03-31T16:15:27.277000
|
||||
CVE-2025-3002,0,1,31254f82336e62811d3675fbc17d806beda70782dc6467cfa7c14849ff699d05,2025-03-31T19:15:43.390000
|
||||
CVE-2025-3002,0,0,31254f82336e62811d3675fbc17d806beda70782dc6467cfa7c14849ff699d05,2025-03-31T19:15:43.390000
|
||||
CVE-2025-30022,0,0,c29865dc2c1c53a7dddbda80ab65c0b183de989ceaa003da3dfe172b934c1c01,2025-03-19T19:15:50.703000
|
||||
CVE-2025-3003,0,0,fae928727d58bdd1e791ffc9c9e860a745865a854a222942833fd71e698ef09d,2025-03-31T17:15:43.557000
|
||||
CVE-2025-3004,0,1,1b1a33d3221a15bb48ac0f67bb6e59953f99b6c918e266711e7564b830656b2f,2025-03-31T19:15:43.613000
|
||||
CVE-2025-3005,1,1,e8d18a39da8bec5bfe9835be84291d8cf2a7d3c6835d8a510fc7c4892e6b278a,2025-03-31T18:15:34.180000
|
||||
CVE-2025-3006,1,1,2d33ee538d0bbe357b92b9a59900f1f8aa3ec564493ed3f392da23820ed4350b,2025-03-31T18:15:34.413000
|
||||
CVE-2025-3004,0,0,1b1a33d3221a15bb48ac0f67bb6e59953f99b6c918e266711e7564b830656b2f,2025-03-31T19:15:43.613000
|
||||
CVE-2025-3005,0,0,e8d18a39da8bec5bfe9835be84291d8cf2a7d3c6835d8a510fc7c4892e6b278a,2025-03-31T18:15:34.180000
|
||||
CVE-2025-3006,0,0,2d33ee538d0bbe357b92b9a59900f1f8aa3ec564493ed3f392da23820ed4350b,2025-03-31T18:15:34.413000
|
||||
CVE-2025-30066,0,0,7f23398934e792b1c90dbe88228c40d734b32c51332b192223c783ade90f06e4,2025-03-29T01:00:02.337000
|
||||
CVE-2025-30067,0,0,63d999ebc0b33c0cceea6e046469ec2f368e6f60354a2b2a24d59bf06e6b7bef,2025-03-27T18:17:36.267000
|
||||
CVE-2025-3007,1,1,600ae9144fe6b576066fa764c55adc3b9ad15d8bf179e66f0114aa1fe8496eb3,2025-03-31T19:15:43.860000
|
||||
CVE-2025-3007,0,0,600ae9144fe6b576066fa764c55adc3b9ad15d8bf179e66f0114aa1fe8496eb3,2025-03-31T19:15:43.860000
|
||||
CVE-2025-30073,0,0,34725e2ee66a680252fcf6be47611a992f4a93cad025a76602eb6cbba6a5215b,2025-03-27T16:45:27.850000
|
||||
CVE-2025-30074,0,0,c994f8833240724dd3b207dc3daf9a3403659cb85de62da850d9ebebe8cf0f27,2025-03-16T03:15:39.117000
|
||||
CVE-2025-30076,0,0,ae70a6cce406a05e108d38c82fa058b5f2fc46a32f1bafe789b6ecdef84b3c03,2025-03-17T16:15:28.220000
|
||||
CVE-2025-30077,0,0,3552a491790a6839d39471705d681d0b56a0da48a2daaa633f419312864c12e5,2025-03-17T16:15:28.360000
|
||||
CVE-2025-3008,1,1,a039dd199d432daa0649a2bf01f67d9e9353b33e21ee900eb9843641001ac6ea,2025-03-31T19:15:44.060000
|
||||
CVE-2025-3008,0,0,a039dd199d432daa0649a2bf01f67d9e9353b33e21ee900eb9843641001ac6ea,2025-03-31T19:15:44.060000
|
||||
CVE-2025-30089,0,0,94fa5ca45d8355546d9ceb129470f63603acc7f5a96fbd0d387c59c0d7484c0e,2025-03-17T16:15:28.507000
|
||||
CVE-2025-3009,1,1,4f85d1e7e08b0ed48fca7ac201b457402e7371fffd1a072fc4da4be6d359b5b1,2025-03-31T20:15:15.850000
|
||||
CVE-2025-30091,0,0,39538125ede0e29a71cad30eeddad6386506108313b0620cfdbf5d936f5285c5,2025-03-27T16:45:46.410000
|
||||
CVE-2025-30092,0,0,81be76bd5e4d358e5e497793b136a481ab98791f4e442314445db080e37b822d,2025-03-24T14:15:20.007000
|
||||
CVE-2025-30093,0,0,655931c237d66508239faf3d38e961694a438293c2ddfd8c753f3093a3e9d18e,2025-03-28T18:11:40.180000
|
||||
CVE-2025-30095,0,0,b9f53d0615109fa8a40a64e91748d4558a1f7b46ead0706de16c5ce66b014a08,2025-03-31T15:15:44.843000
|
||||
CVE-2025-30095,0,1,961f91ea6e39b3b6dbb8556a6976c468608b0031b978e5f73b127b8f2e65064d,2025-03-31T21:15:53.653000
|
||||
CVE-2025-3010,1,1,f723b3e2db26da254387f80fa5fe1ab59324981dd2dd4ccd0c3a29fdf242986b,2025-03-31T20:15:16.023000
|
||||
CVE-2025-30106,0,0,d0ec2fed531a791fcdb7e275c6cc676f11c96b4c23a970884370a41e87a3b6a0,2025-03-21T17:15:40.227000
|
||||
CVE-2025-30107,0,0,7ae7d3e2db9a3bcfc7100b14968701083bbe2237ed720df55c99fa3bf4e70491,2025-03-24T22:15:14.450000
|
||||
CVE-2025-30109,0,0,c697d3ced89db3fb240ff33efe8653842b736020e748d3eead592e6135cb99ac,2025-03-21T17:15:40.447000
|
||||
@ -287077,12 +287089,14 @@ CVE-2025-30141,0,0,4828215ddc551f721f9119cc66fd0b6301157a9edecaa8b1bbaf43bada37f
|
||||
CVE-2025-30142,0,0,e6345e1b8b1602cf6baee1bb466c15695f398722ed692cc5b3b87414578f99b0,2025-03-25T16:15:27.130000
|
||||
CVE-2025-30143,0,0,c72031c589e36c3d2604bcb120ba9a6dd94ff4f6eee14259c749d5630ebbfba8,2025-03-17T16:15:28.643000
|
||||
CVE-2025-30144,0,0,15bf5f8218ba2223682697484bbc86f902d5a148eb49e6248d7c2412b7737d74,2025-03-19T16:15:33.080000
|
||||
CVE-2025-30149,0,1,c2ba50a8e7fcbfc5cf76c24f8b9200b3aa74b80685d3e0787e18421f001cdd0c,2025-03-31T18:15:33.847000
|
||||
CVE-2025-30149,0,0,c2ba50a8e7fcbfc5cf76c24f8b9200b3aa74b80685d3e0787e18421f001cdd0c,2025-03-31T18:15:33.847000
|
||||
CVE-2025-3015,1,1,1ec4abe6ca9685caa91be7781559ad04bca71965f78a710b93168620aa3e9844,2025-03-31T21:15:53.757000
|
||||
CVE-2025-30152,0,0,fb7d8b36a0a9757a199a4cf8f9b4b43b19a772c330ea1d3bb0186654fc6f920c,2025-03-19T16:15:33.313000
|
||||
CVE-2025-30153,0,0,da47524558affc65b6874f9bef3637406802e7d0a047ff83de555cab022828e8,2025-03-19T16:15:33.607000
|
||||
CVE-2025-30154,0,0,f4c8f04ec10c8608001f5ee4aec87a1247d8c3c0588d5bdb69da7f038e16b9a7,2025-03-29T01:00:02.337000
|
||||
CVE-2025-30155,0,0,ce9991316faec2414fb0a11e64d60f00b90c2addae9a6a86c74d235d6c0c7f76,2025-03-31T16:15:25.187000
|
||||
CVE-2025-30157,0,0,b7d565fa042efeea73d550fb215fb58640989cdcd04813767e503c6d1f6d08fe,2025-03-21T16:15:19.767000
|
||||
CVE-2025-3016,1,1,d17e6f6e24307c3e04fedc601a315663d76d400d1c2a3cdfc9509d651d2a7c64,2025-03-31T21:15:53.940000
|
||||
CVE-2025-30160,0,0,25be472787022894833e0e3357865514f4516e8d537c62073ee43066a681f12b,2025-03-20T19:15:38.383000
|
||||
CVE-2025-30161,0,0,4ef401440b9ae76c291cb5599321f65dce6026d9a737cbde8025803161077f04,2025-03-31T16:15:25.333000
|
||||
CVE-2025-30162,0,0,8641e47d280f65cb3bb61486e9cfbaa56cd67a484749372cb3bbdafe7ce809ee,2025-03-27T16:45:46.410000
|
||||
@ -287385,12 +287399,14 @@ CVE-2025-31110,0,0,9c1e095e916574b5bad3dc98545645eb35bcfc3a15748b26a91c424286375
|
||||
CVE-2025-31111,0,0,708ed17ed7ca590b80cc7bf7efff771b88139eb264b9a4c93912c661b895b119,2025-03-27T04:15:29.310000
|
||||
CVE-2025-31112,0,0,19710893cdeca6b79e6ed61173b8773b8204171d0fa597c5282b3a5c8595c248,2025-03-27T04:15:29.427000
|
||||
CVE-2025-31113,0,0,e197f9731c7d6bd9e53ba8f025a3a8ac307f507846eecfd137f3c958a7e0d19f,2025-03-27T04:15:29.493000
|
||||
CVE-2025-31116,0,1,4dc37202ba5cfc688675486793efbc376cb6720b795658ab674573a1a487e976,2025-03-31T19:15:42.300000
|
||||
CVE-2025-31117,0,1,a341ea634906413f5449e7fc5b04d4e7dd1445d72f8402c95d9d9551d604471a,2025-03-31T18:15:33.957000
|
||||
CVE-2025-31116,0,0,4dc37202ba5cfc688675486793efbc376cb6720b795658ab674573a1a487e976,2025-03-31T19:15:42.300000
|
||||
CVE-2025-31117,0,0,a341ea634906413f5449e7fc5b04d4e7dd1445d72f8402c95d9d9551d604471a,2025-03-31T18:15:33.957000
|
||||
CVE-2025-31122,0,0,b8c01e9f1f9dbc740fffeb9cedbc00b2fb56d1c193bda8eacfaf89659abfd347,2025-03-31T17:15:42.997000
|
||||
CVE-2025-31125,0,1,4f24719a409f1c71fb4356091c2ef8c13936da376c5b3c37899a2aa8d1e00a54,2025-03-31T18:15:34.070000
|
||||
CVE-2025-31128,1,1,40d1078ce7b3be9014af04296fe4f0f6918a4957b1af7ce145e0df724a2fbf7e,2025-03-31T19:15:42.883000
|
||||
CVE-2025-31129,1,1,afc3d6039e1ba3f50fedc504a1975daea8f0d0c314f23d884355292a999ea830,2025-03-31T19:15:43.023000
|
||||
CVE-2025-31123,1,1,a6d1d8d5bdd67a19a035f82d179dbb1c83a1582e59d5b7125fb816b7c2eaa9af,2025-03-31T20:15:15.547000
|
||||
CVE-2025-31124,1,1,d866a6df4a48afbef1d9d2b6ed84930ed340ef6c5aaf014355825f2f9a296b29,2025-03-31T20:15:15.707000
|
||||
CVE-2025-31125,0,0,4f24719a409f1c71fb4356091c2ef8c13936da376c5b3c37899a2aa8d1e00a54,2025-03-31T18:15:34.070000
|
||||
CVE-2025-31128,0,0,40d1078ce7b3be9014af04296fe4f0f6918a4957b1af7ce145e0df724a2fbf7e,2025-03-31T19:15:42.883000
|
||||
CVE-2025-31129,0,0,afc3d6039e1ba3f50fedc504a1975daea8f0d0c314f23d884355292a999ea830,2025-03-31T19:15:43.023000
|
||||
CVE-2025-31139,0,0,f77a452b5e1edddf158af71a264cde2428ac6b657f8dcbc921a40f17dadbb16d,2025-03-27T16:45:12.210000
|
||||
CVE-2025-31140,0,0,b5354da0d0be6641b36fd62d7ae5da72fa26945541a5950d6dcb5ec04d83adab,2025-03-27T16:45:12.210000
|
||||
CVE-2025-31141,0,0,406867c864568f6048dee1b7cffcd596f08f273e12b98bc9b9a899fec211a190,2025-03-27T16:45:12.210000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user