mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-21 17:41:05 +00:00
Auto-Update: 2025-06-13T18:00:19.979595+00:00
This commit is contained in:
parent
ce05e5718b
commit
d9b19b0d88
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2018-16210",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2018-10-12T22:15:07.377",
|
||||
"lastModified": "2024-11-21T03:52:17.730",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-06-13T17:56:26.900",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -16,13 +16,13 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
@ -77,6 +77,370 @@
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:wago:750-362_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "05",
|
||||
"matchCriteriaId": "051F8A1F-4792-44FE-A35E-DD1BFD71FC43"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:wago:750-362:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6330A839-FAE3-43EB-B1AA-BA6844D9906D"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:wago:750-363_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "05",
|
||||
"matchCriteriaId": "AA136553-094E-4760-9C25-89E0954F4B95"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:wago:750-363:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "54E13E9C-226E-4BD6-8F0C-3061092E892A"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:wago:750-823_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "05",
|
||||
"matchCriteriaId": "0E3196F5-4242-40DB-8D56-9E580C69D478"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:wago:750-823:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CB88572A-CB05-4B52-8BFC-05EFDC819244"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:wago:750-832_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "05",
|
||||
"matchCriteriaId": "488896BD-593D-46AA-9521-CA089F8D6977"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:wago:750-832:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "13D1FA8D-C8BA-4D1C-8372-DECD40177631"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:wago:750-862_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "05",
|
||||
"matchCriteriaId": "8C6FB898-CBBC-4D80-ABCD-04B3E9BA5B82"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:wago:750-862:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FA04FBFB-9E1C-4618-9FDC-70675506D8D5"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:wago:750-891_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "05",
|
||||
"matchCriteriaId": "BE14C0B9-8B13-479D-9341-866B9FC71F9D"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:wago:750-891:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "22BAABD9-A10D-4904-AA02-C37C4490B47A"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:wago:750-890_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "05",
|
||||
"matchCriteriaId": "E61D2577-BB7F-4EC0-8709-C68026322EA9"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:wago:750-890:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "11751A8B-FCFD-433B-9065-B4FC85168A93"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:wago:750-352_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "14",
|
||||
"matchCriteriaId": "8E001859-A338-43DA-877E-C43F57E7F9AD"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:wago:750-352:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6C0865A4-6C89-4470-98E3-7E90BDF94D15"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:wago:750-831_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "14",
|
||||
"matchCriteriaId": "3631065F-27D6-4217-84EA-A8B40CC1F38F"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:wago:750-831:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F0631884-FF6F-4AA9-9D76-CDECB5A738FC"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:wago:750-852_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "14",
|
||||
"matchCriteriaId": "1E940C38-F03A-4D81-9AEA-C3CAC90916E8"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:wago:750-852:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9D6739E1-EF0B-48EE-90FC-5708756FC362"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:wago:750-880_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "14",
|
||||
"matchCriteriaId": "A5974664-66D9-45BC-8977-98E3CE1D282F"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:wago:750-880:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CFEAC4D9-15CF-44B8-844D-C012AA4637A2"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:wago:750-881_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "14",
|
||||
"matchCriteriaId": "72B66D0B-53CF-4018-831A-5A67CBA51B14"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:wago:750-881:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6FE51647-62C1-4D3C-91FA-13ACA6CD71D2"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:wago:750-889_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "14",
|
||||
"matchCriteriaId": "FF2B7B07-532C-4D7B-B168-A9C3700EE8DD"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:wago:750-889:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "57919AAB-2962-4543-810A-C143300351F8"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-45064",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2023-04-13T11:15:06.737",
|
||||
"lastModified": "2025-05-23T16:44:02.653",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-06-13T17:55:57.933",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -76,8 +76,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apache:sling:2.13.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F0452CA1-A3AB-430A-9011-25A37AD1F2A9"
|
||||
"criteria": "cpe:2.3:a:apache:apache_sling_engine:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "2.14.0",
|
||||
"matchCriteriaId": "F89F26B7-0485-4677-A00E-3A6B6B7D67AA"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-4976",
|
||||
"sourceIdentifier": "9b29abf9-4ab0-4765-b253-1875cd9b441e",
|
||||
"published": "2025-06-12T01:15:25.370",
|
||||
"lastModified": "2025-06-12T16:06:20.180",
|
||||
"lastModified": "2025-06-13T16:15:23.827",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,30 @@
|
||||
"value": "Archive::Unzip::Burst (versi\u00f3n 0.01-0.09) para Perl incluye una librer\u00eda InfoZip afectada por varias vulnerabilidades. Esta librer\u00eda est\u00e1 afectada por CVE-2014-8139, CVE-2014-8140 y CVE-2014-8141."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://rt.cpan.org/Public/Bug/Display.html?id=143547",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-0224",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-01-16T16:15:10.440",
|
||||
"lastModified": "2024-11-21T07:36:46.640",
|
||||
"lastModified": "2025-06-13T16:15:24.050",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-52074",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-01-08T22:15:45.267",
|
||||
"lastModified": "2024-11-21T08:39:06.930",
|
||||
"lastModified": "2025-06-13T16:15:24.240",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,16 @@
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-52115",
|
||||
"sourceIdentifier": "psirt@huawei.com",
|
||||
"published": "2024-01-16T09:15:07.933",
|
||||
"lastModified": "2024-11-21T08:39:12.530",
|
||||
"lastModified": "2025-06-13T16:15:24.457",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-21733",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2024-01-19T11:15:08.043",
|
||||
"lastModified": "2025-02-13T18:16:43.363",
|
||||
"lastModified": "2025-06-13T16:15:24.760",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,13 +36,33 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@apache.org",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-31503",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-17T00:15:07.220",
|
||||
"lastModified": "2024-11-21T09:13:39.700",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-06-13T16:22:08.547",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -40,6 +40,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -51,14 +61,38 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:dolibarr:dolibarr_erp\\/crm:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "19.0.1",
|
||||
"matchCriteriaId": "CF5533A5-6CDB-4FB2-9031-A3758F995F0F"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/alexbsec/CVEs/blob/master/2024/CVE-2024-31503.md",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/alexbsec/CVEs/blob/master/2024/CVE-2024-31503.md",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-32405",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-22T20:15:07.737",
|
||||
"lastModified": "2024-11-21T09:14:52.610",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-06-13T16:10:19.593",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,22 +51,58 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:inducer:relate:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "2024.1",
|
||||
"matchCriteriaId": "B37DF50A-E856-4111-8584-D04B26CBB9F7"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://cxsecurity.com/issue/WLB-2024040051",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory",
|
||||
"Issue Tracking"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://packetstormsecurity.com/files/178101/Relate-Cross-Site-Scripting.html",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://cxsecurity.com/issue/WLB-2024040051",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory",
|
||||
"Issue Tracking"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://packetstormsecurity.com/files/178101/Relate-Cross-Site-Scripting.html",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-32407",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-22T19:15:46.680",
|
||||
"lastModified": "2024-11-21T09:14:53.060",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-06-13T16:11:59.863",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,22 +51,54 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:inducer:relate:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "2024.1",
|
||||
"matchCriteriaId": "B37DF50A-E856-4111-8584-D04B26CBB9F7"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://book.hacktricks.xyz/v/jp/pentesting-web/ssti-server-side-template-injection",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://cxsecurity.com/issue/WLB-2024040049",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://book.hacktricks.xyz/v/jp/pentesting-web/ssti-server-side-template-injection",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://cxsecurity.com/issue/WLB-2024040049",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-33900",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-05-20T21:15:09.177",
|
||||
"lastModified": "2024-11-21T09:17:42.003",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-06-13T16:16:24.497",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [
|
||||
{
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
@ -58,38 +58,79 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:keepassxc:keepassxc:2.7.7:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F0371F11-5591-4125-A5C9-BAF33F1F7969"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/Fastor01/30c6d89c842feb1865ec2cd2d3806838",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/keepassxreboot/keepassxc/issues/10784",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Issue Tracking"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://keepassxc.org/blog/",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://keepassxc.org/blog/2019-02-21-memory-security/",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://gist.github.com/Fastor01/30c6d89c842feb1865ec2cd2d3806838",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/keepassxreboot/keepassxc/issues/10784",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Issue Tracking"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://keepassxc.org/blog/",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://keepassxc.org/blog/2019-02-21-memory-security/",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-33901",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-05-20T21:15:09.243",
|
||||
"lastModified": "2024-11-21T09:17:42.220",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-06-13T16:13:44.500",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [
|
||||
{
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
@ -58,38 +58,79 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:keepassxc:keepassxc:2.7.7:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F0371F11-5591-4125-A5C9-BAF33F1F7969"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/Fastor01/30c6d89c842feb1865ec2cd2d3806838",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/keepassxreboot/keepassxc/issues/10784",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Issue Tracking"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://keepassxc.org/blog/",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://keepassxc.org/blog/2019-02-21-memory-security/",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://gist.github.com/Fastor01/30c6d89c842feb1865ec2cd2d3806838",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/keepassxreboot/keepassxc/issues/10784",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Issue Tracking"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://keepassxc.org/blog/",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://keepassxc.org/blog/2019-02-21-memory-security/",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-37821",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-06-18T20:15:13.640",
|
||||
"lastModified": "2024-11-21T09:24:20.780",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-06-13T16:17:59.667",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,22 +51,52 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:dolibarr:dolibarr_erp\\/crm:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "19.0.2",
|
||||
"matchCriteriaId": "3DE01B5C-BB48-4C7E-883C-2B325E89092C"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://dolibarr.com",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/alexbsec/CVEs/blob/master/2024/CVE-2024-37821.md",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://dolibarr.com",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/alexbsec/CVEs/blob/master/2024/CVE-2024-37821.md",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-50849",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-11-18T21:15:06.360",
|
||||
"lastModified": "2024-11-21T21:15:22.790",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-06-13T16:06:03.393",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,14 +51,37 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:rws:worldserver:11.8.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "64E10421-18E3-4D62-9DAA-CF742298A85F"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Wh1teSnak3/CVE-2024-50849",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.trados.com/product/worldserver/",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-57459",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-06-02T16:15:27.390",
|
||||
"lastModified": "2025-06-02T17:32:17.397",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-06-13T16:29:02.383",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,14 +51,37 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:vishalmathur:cloudclassroom-php_project:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4C9EE693-395C-473A-95BD-57C656C61AB3"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/b0mk35h/921cfa00f9ea1af66645574537d38587",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://owasp.org/www-community/attacks/SQL_Injection",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Not Applicable"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-22941",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-03-31T15:15:43.873",
|
||||
"lastModified": "2025-04-01T20:26:22.890",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-06-13T16:22:57.000",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,14 +51,51 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:adtran:411_firmware:l80.00.0011.m2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "ECFFEF0A-A1ED-4291-8D27-C35E4380C459"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:adtran:411:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "92259AC3-268C-4305-A5B5-4FD24524312E"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://drive.google.com/file/d/1levaZk5aC6g6a2zPW8xlOIVAu9MFYvAz/view",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://drive.google.com/file/d/1levaZk5aC6g6a2zPW8xlOIVAu9MFYvAz/view",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-23104",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-06-02T18:15:23.770",
|
||||
"lastModified": "2025-06-09T14:15:22.403",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-06-13T17:46:36.533",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,14 +51,49 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:exynos_2200_firmware:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "63C0D9AC-BD23-48C9-83E7-301DEC06E583"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:samsung:exynos_2200:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A72ADEBB-ED72-4A5B-BB27-95EDE43F8116"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/cve-2025-23104/",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-26013",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-21T16:15:33.313",
|
||||
"lastModified": "2025-02-21T21:15:24.470",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-06-13T16:03:12.363",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,10 +51,32 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:olajowon:loggrove:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8BDBFB14-6451-4192-B0B3-80C21629D5C4"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gitee.com/olajowon/loggrove/issues/IBJSXS",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-26014",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-21T17:15:14.680",
|
||||
"lastModified": "2025-04-17T16:15:34.477",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-06-13T16:00:56.813",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,18 +51,46 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:olajowon:loggrove:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8BDBFB14-6451-4192-B0B3-80C21629D5C4"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gitee.com/olajowon/loggrove/",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://gitee.com/olajowon/loggrove/issues/IBJT1K",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/olajowon/loggrove/",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-27953",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-06-02T18:15:23.903",
|
||||
"lastModified": "2025-06-04T14:54:53.980",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-06-13T17:52:01.717",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,10 +51,30 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:philips:clinical_collaboration_platform:12.2.1.5:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "46E3EB9F-09D5-4331-9ABF-7E8A4E87389B"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/intruderlabs/cvex/tree/main/Carestream/session-token-in-url",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-27954",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-06-02T18:15:24.030",
|
||||
"lastModified": "2025-06-04T16:15:35.770",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-06-13T17:53:04.447",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,14 +51,37 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:philips:clinical_collaboration_platform:12.2.1.5:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "46E3EB9F-09D5-4331-9ABF-7E8A4E87389B"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/intruderlabs/cvex/tree/main/Carestream/session-token-in-url",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://portswigger.net/kb/issues/00500700_session-token-in-url",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Issue Tracking"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-28381",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-06-13T14:15:20.177",
|
||||
"lastModified": "2025-06-13T14:15:20.177",
|
||||
"lastModified": "2025-06-13T16:15:25.227",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "A credential leak in OpenC3 COSMOS v6.0.0 allows attackers to access service credentials as environment variables stored in all containers."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-526"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://openc3.com/",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-28388",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-06-13T14:15:20.883",
|
||||
"lastModified": "2025-06-13T14:15:20.883",
|
||||
"lastModified": "2025-06-13T16:15:25.387",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "OpenC3 COSMOS v6.0.0 was discovered to contain hardcoded credentials for the Service Account."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-798"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://openc3.com/",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-28389",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-06-13T14:15:21.010",
|
||||
"lastModified": "2025-06-13T14:15:21.010",
|
||||
"lastModified": "2025-06-13T16:15:25.550",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "Weak password requirements in OpenC3 COSMOS v6.0.0 allow attackers to bypass authentication via a brute force attack."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-521"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://openc3.com/",
|
||||
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2025-44091",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-06-12T21:15:21.347",
|
||||
"lastModified": "2025-06-12T21:15:21.347",
|
||||
"lastModified": "2025-06-13T16:15:25.863",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "yangyouwang crud v1.0.0 is vulnerable to Cross Site Scripting (XSS) via the role management function."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "yangyouwang crud v1.0.0 es vulnerable a Cross Site Scripting (XSS) a trav\u00e9s de la funci\u00f3n de administraci\u00f3n de roles."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/HL4245/f2e88b7afea9ee08cc4282f38b5ea1cf",
|
||||
@ -20,6 +59,10 @@
|
||||
{
|
||||
"url": "https://github.com/HL4245/CVE/blob/main/%E7%AE%80%E7%BA%A6%E5%90%8E%E5%8F%B0%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F.md",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/HL4245/CVE/blob/main/%E7%AE%80%E7%BA%A6%E5%90%8E%E5%8F%B0%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F.md",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-44115",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-06-02T16:15:29.593",
|
||||
"lastModified": "2025-06-02T20:15:22.637",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-06-13T17:21:25.870",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,18 +51,47 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cotonti:cotonti_siena:0.9.25:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CF2E67AA-DA0D-42D3-A681-FB1F67B2CFB6"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/yA0-Z/9666b1a333607381ab8dfcc137f2b65c",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/Cotonti/Cotonti/issues/1650",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory",
|
||||
"Issue Tracking"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/Cotonti/Cotonti/issues/1834",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-45542",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-06-02T16:15:29.707",
|
||||
"lastModified": "2025-06-03T16:15:25.397",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-06-13T17:45:40.463",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,18 +51,46 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:vishalmathur:cloudclassroom-php_project:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4C9EE693-395C-473A-95BD-57C656C61AB3"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/mathurvishal/CloudClassroom-PHP-Project",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://medium.com/@sanjay70023/cve-2025-45542-time-based-blind-sql-injection-in-cloudclassroom-php-project-v1-0-1fa0efc8a94a",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"Exploit"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2025/Jun/12",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-46060",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-06-13T13:15:21.187",
|
||||
"lastModified": "2025-06-13T13:15:21.187",
|
||||
"lastModified": "2025-06-13T16:15:26.030",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "Buffer Overflow vulnerability in TOTOLINK N600R v4.3.0cu.7866_B2022506 allows a remote attacker to execute arbitrary code via the UPLOAD_FILENAME component"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-120"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://totolink.com",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-46096",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-06-13T13:15:21.710",
|
||||
"lastModified": "2025-06-13T13:15:21.710",
|
||||
"lastModified": "2025-06-13T16:15:26.193",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,46 @@
|
||||
"value": "Directory Traversal vulnerability in solon v.3.1.2 allows a remote attacker to conduct XSS attacks via the solon-faas-luffy component"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-22"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/yaoyao-cool/1b7d80930fea88b6fd4839646cedc437",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-46976",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2025-06-10T23:15:42.103",
|
||||
"lastModified": "2025-06-12T16:06:29.520",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-06-13T17:29:49.670",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,10 +51,37 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:-:*:*:*",
|
||||
"versionEndExcluding": "6.5.23.0",
|
||||
"matchCriteriaId": "15DC0724-7B85-4EC8-B9E6-76DA0F26F6D5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*",
|
||||
"versionEndExcluding": "2025.5.0",
|
||||
"matchCriteriaId": "8A395D75-088D-41C2-BCE6-30CB049798FE"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://helpx.adobe.com/security/products/experience-manager/apsb25-48.html",
|
||||
"source": "psirt@adobe.com"
|
||||
"source": "psirt@adobe.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-46977",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2025-06-10T23:15:42.267",
|
||||
"lastModified": "2025-06-12T16:06:29.520",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-06-13T17:33:20.470",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,10 +51,37 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:-:*:*:*",
|
||||
"versionEndExcluding": "6.5.23.0",
|
||||
"matchCriteriaId": "15DC0724-7B85-4EC8-B9E6-76DA0F26F6D5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*",
|
||||
"versionEndExcluding": "2025.5.0",
|
||||
"matchCriteriaId": "8A395D75-088D-41C2-BCE6-30CB049798FE"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://helpx.adobe.com/security/products/experience-manager/apsb25-48.html",
|
||||
"source": "psirt@adobe.com"
|
||||
"source": "psirt@adobe.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-46978",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2025-06-10T23:15:42.447",
|
||||
"lastModified": "2025-06-12T16:06:29.520",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-06-13T17:41:41.383",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,10 +51,37 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:-:*:*:*",
|
||||
"versionEndExcluding": "6.5.23.0",
|
||||
"matchCriteriaId": "15DC0724-7B85-4EC8-B9E6-76DA0F26F6D5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*",
|
||||
"versionEndExcluding": "2025.5.0",
|
||||
"matchCriteriaId": "8A395D75-088D-41C2-BCE6-30CB049798FE"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://helpx.adobe.com/security/products/experience-manager/apsb25-48.html",
|
||||
"source": "psirt@adobe.com"
|
||||
"source": "psirt@adobe.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-46979",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2025-06-10T23:15:42.597",
|
||||
"lastModified": "2025-06-12T16:06:29.520",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-06-13T17:44:35.590",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,10 +51,37 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:-:*:*:*",
|
||||
"versionEndExcluding": "6.5.23.0",
|
||||
"matchCriteriaId": "15DC0724-7B85-4EC8-B9E6-76DA0F26F6D5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*",
|
||||
"versionEndExcluding": "2025.5.0",
|
||||
"matchCriteriaId": "8A395D75-088D-41C2-BCE6-30CB049798FE"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://helpx.adobe.com/security/products/experience-manager/apsb25-48.html",
|
||||
"source": "psirt@adobe.com"
|
||||
"source": "psirt@adobe.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-46981",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2025-06-10T23:15:42.743",
|
||||
"lastModified": "2025-06-12T16:06:29.520",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-06-13T17:44:41.920",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,10 +51,37 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:-:*:*:*",
|
||||
"versionEndExcluding": "6.5.23.0",
|
||||
"matchCriteriaId": "15DC0724-7B85-4EC8-B9E6-76DA0F26F6D5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*",
|
||||
"versionEndExcluding": "2025.5.0",
|
||||
"matchCriteriaId": "8A395D75-088D-41C2-BCE6-30CB049798FE"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://helpx.adobe.com/security/products/experience-manager/apsb25-48.html",
|
||||
"source": "psirt@adobe.com"
|
||||
"source": "psirt@adobe.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
33
CVE-2025/CVE-2025-489xx/CVE-2025-48914.json
Normal file
33
CVE-2025/CVE-2025-489xx/CVE-2025-48914.json
Normal file
@ -0,0 +1,33 @@
|
||||
{
|
||||
"id": "CVE-2025-48914",
|
||||
"sourceIdentifier": "mlhess@drupal.org",
|
||||
"published": "2025-06-13T16:15:26.457",
|
||||
"lastModified": "2025-06-13T16:15:26.457",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Drupal COOKiES Consent Management allows Cross-Site Scripting (XSS).This issue affects COOKiES Consent Management: from 0.0.0 before 1.2.15."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "mlhess@drupal.org",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.drupal.org/sa-contrib-2025-075",
|
||||
"source": "mlhess@drupal.org"
|
||||
}
|
||||
]
|
||||
}
|
33
CVE-2025/CVE-2025-489xx/CVE-2025-48915.json
Normal file
33
CVE-2025/CVE-2025-489xx/CVE-2025-48915.json
Normal file
@ -0,0 +1,33 @@
|
||||
{
|
||||
"id": "CVE-2025-48915",
|
||||
"sourceIdentifier": "mlhess@drupal.org",
|
||||
"published": "2025-06-13T16:15:26.580",
|
||||
"lastModified": "2025-06-13T16:15:26.580",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Drupal COOKiES Consent Management allows Cross-Site Scripting (XSS).This issue affects COOKiES Consent Management: from 0.0.0 before 1.2.15."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "mlhess@drupal.org",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.drupal.org/sa-contrib-2025-076",
|
||||
"source": "mlhess@drupal.org"
|
||||
}
|
||||
]
|
||||
}
|
33
CVE-2025/CVE-2025-489xx/CVE-2025-48916.json
Normal file
33
CVE-2025/CVE-2025-489xx/CVE-2025-48916.json
Normal file
@ -0,0 +1,33 @@
|
||||
{
|
||||
"id": "CVE-2025-48916",
|
||||
"sourceIdentifier": "mlhess@drupal.org",
|
||||
"published": "2025-06-13T16:15:26.790",
|
||||
"lastModified": "2025-06-13T16:15:26.790",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Missing Authorization vulnerability in Drupal Bookable Calendar allows Forceful Browsing.This issue affects Bookable Calendar: from 0.0.0 before 2.2.13."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "mlhess@drupal.org",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.drupal.org/sa-contrib-2025-070",
|
||||
"source": "mlhess@drupal.org"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2025/CVE-2025-489xx/CVE-2025-48917.json
Normal file
56
CVE-2025/CVE-2025-489xx/CVE-2025-48917.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-48917",
|
||||
"sourceIdentifier": "mlhess@drupal.org",
|
||||
"published": "2025-06-13T16:15:26.930",
|
||||
"lastModified": "2025-06-13T17:15:21.713",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Drupal EU Cookie Compliance (GDPR Compliance) allows Cross-Site Scripting (XSS).This issue affects EU Cookie Compliance (GDPR Compliance): from 0.0.0 before 1.26.0."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"baseScore": 5.0,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 1.6,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "mlhess@drupal.org",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.drupal.org/sa-contrib-2025-072",
|
||||
"source": "mlhess@drupal.org"
|
||||
}
|
||||
]
|
||||
}
|
33
CVE-2025/CVE-2025-489xx/CVE-2025-48918.json
Normal file
33
CVE-2025/CVE-2025-489xx/CVE-2025-48918.json
Normal file
@ -0,0 +1,33 @@
|
||||
{
|
||||
"id": "CVE-2025-48918",
|
||||
"sourceIdentifier": "mlhess@drupal.org",
|
||||
"published": "2025-06-13T16:15:27.053",
|
||||
"lastModified": "2025-06-13T16:15:27.053",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Drupal Simple Klaro allows Cross-Site Scripting (XSS).This issue affects Simple Klaro: from 0.0.0 before 1.10.0."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "mlhess@drupal.org",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.drupal.org/sa-contrib-2025-071",
|
||||
"source": "mlhess@drupal.org"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2025/CVE-2025-489xx/CVE-2025-48919.json
Normal file
56
CVE-2025/CVE-2025-489xx/CVE-2025-48919.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-48919",
|
||||
"sourceIdentifier": "mlhess@drupal.org",
|
||||
"published": "2025-06-13T16:15:27.177",
|
||||
"lastModified": "2025-06-13T17:15:22.757",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Drupal Simple Klaro allows Cross-Site Scripting (XSS).This issue affects Simple Klaro: from 0.0.0 before 1.10.0."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"baseScore": 5.0,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 1.6,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "mlhess@drupal.org",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.drupal.org/sa-contrib-2025-073",
|
||||
"source": "mlhess@drupal.org"
|
||||
}
|
||||
]
|
||||
}
|
33
CVE-2025/CVE-2025-489xx/CVE-2025-48920.json
Normal file
33
CVE-2025/CVE-2025-489xx/CVE-2025-48920.json
Normal file
@ -0,0 +1,33 @@
|
||||
{
|
||||
"id": "CVE-2025-48920",
|
||||
"sourceIdentifier": "mlhess@drupal.org",
|
||||
"published": "2025-06-13T16:15:27.293",
|
||||
"lastModified": "2025-06-13T16:15:27.293",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Drupal etracker allows Cross-Site Scripting (XSS).This issue affects etracker: from 0.0.0 before 3.1.0."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "mlhess@drupal.org",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.drupal.org/sa-contrib-2025-074",
|
||||
"source": "mlhess@drupal.org"
|
||||
}
|
||||
]
|
||||
}
|
86
CVE-2025/CVE-2025-495xx/CVE-2025-49580.json
Normal file
86
CVE-2025/CVE-2025-495xx/CVE-2025-49580.json
Normal file
@ -0,0 +1,86 @@
|
||||
{
|
||||
"id": "CVE-2025-49580",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-06-13T16:15:27.417",
|
||||
"lastModified": "2025-06-13T16:15:27.417",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "XWiki is a generic wiki platform. From 8.2 and 7.4.5 until 17.1.0-rc-1, 16.10.4, and 16.4.7, pages can gain script or programming rights when they contain a link and the target of the link is renamed or moved. This might lead to execution of scripts contained in xobjects that should have never been executed. This vulnerability is fixed in 17.1.0-rc-1, 16.10.4, and 16.4.7."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 8.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "ACTIVE",
|
||||
"vulnConfidentialityImpact": "HIGH",
|
||||
"vulnIntegrityImpact": "HIGH",
|
||||
"vulnAvailabilityImpact": "HIGH",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-266"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/xwiki/xwiki-platform/commit/ab209acd780da69a4c5ff77ff011efd698273cec",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-jm43-hrq7-r7w6",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://jira.xwiki.org/browse/XWIKI-22836",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
94
CVE-2025/CVE-2025-495xx/CVE-2025-49581.json
Normal file
94
CVE-2025/CVE-2025-495xx/CVE-2025-49581.json
Normal file
@ -0,0 +1,94 @@
|
||||
{
|
||||
"id": "CVE-2025-49581",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-06-13T16:15:27.570",
|
||||
"lastModified": "2025-06-13T16:15:27.570",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "XWiki is a generic wiki platform. Any user with edit right on a page (could be the user's profile) can execute code (Groovy, Python, Velocity) with programming right by defining a wiki macro. This allows full access to the whole XWiki installation. The main problem is that if a wiki macro parameter allows wiki syntax, its default value is executed with the rights of the author of the document where it is used. This can be exploited by overriding a macro like the children macro that is used in a page that has programming right like the page XWiki.ChildrenMacro and thus allows arbitrary script macros. This vulnerability has been patched in XWiki 16.4.7, 16.10.3 and 17.0.0 by executing wiki parameters with the rights of the wiki macro's author when the parameter's value is the default value."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 8.7,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "HIGH",
|
||||
"vulnIntegrityImpact": "HIGH",
|
||||
"vulnAvailabilityImpact": "HIGH",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-94"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-250"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-270"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/xwiki/xwiki-platform/commit/c99d501ed41cbee6a3c02ff927714531570789de",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-9875-cw22-f7cx",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://jira.xwiki.org/browse/XWIKI-22760",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
110
CVE-2025/CVE-2025-495xx/CVE-2025-49582.json
Normal file
110
CVE-2025/CVE-2025-495xx/CVE-2025-49582.json
Normal file
@ -0,0 +1,110 @@
|
||||
{
|
||||
"id": "CVE-2025-49582",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-06-13T17:15:23.180",
|
||||
"lastModified": "2025-06-13T17:15:23.180",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "XWiki is a generic wiki platform. When editing content that contains \"dangerous\" macros like malicious script macros that were authored by a user with fewer rights, XWiki warns about the execution of these macros since XWiki 15.9RC1. These required rights analyzers that trigger these warnings are incomplete, allowing an attacker to hide malicious content. For most macros, the existing analyzers don't consider non-lowercase parameters. Further, most macro parameters that can contain XWiki syntax like titles of information boxes weren't analyzed at all. Similarly, the \"source\" parameters of the content and context macro weren't anylzed even though they could contain arbitrary XWiki syntax. In the worst case, this could allow a malicious to add malicious script macros including Groovy or Python macros to a page that are then executed after another user with programming righs edits the page, thus allowing remote code execution. The required rights analyzers have been made more robust and extended to cover those cases in XWiki 16.4.7, 16.10.3 and 17.0.0."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 8.6,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "PASSIVE",
|
||||
"vulnConfidentialityImpact": "HIGH",
|
||||
"vulnIntegrityImpact": "HIGH",
|
||||
"vulnAvailabilityImpact": "HIGH",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-693"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/xwiki/xwiki-platform/commit/0a705e8e253cb871b804e25c53b2bde879c886bd",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/xwiki/xwiki-platform/commit/3d451e957fe2b14459e9ac64172b4a0e4c46971c",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/xwiki/xwiki-platform/commit/abdcefc0db27035b67329add836fd683e0cf92b8",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/xwiki/xwiki-platform/commit/cc74dc802efe0e2d3fa2ba3355dbadc51c5fd8c7",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-c32m-27pj-4xcj",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://jira.xwiki.org/browse/XWIKI-22758",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://jira.xwiki.org/browse/XWIKI-22759",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://jira.xwiki.org/browse/XWIKI-22763",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://jira.xwiki.org/browse/XWIKI-22799",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
86
CVE-2025/CVE-2025-495xx/CVE-2025-49583.json
Normal file
86
CVE-2025/CVE-2025-495xx/CVE-2025-49583.json
Normal file
@ -0,0 +1,86 @@
|
||||
{
|
||||
"id": "CVE-2025-49583",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-06-13T17:15:23.390",
|
||||
"lastModified": "2025-06-13T17:15:23.390",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "XWiki is a generic wiki platform. When a user without script right creates a document with an `XWiki.Notifications.Code.NotificationEmailRendererClass` object, and later an admin edits and saves that document, the email templates in this object will be used for notifications. No malicious code can be executed, though, as while these templates allow Velocity code, the existing generic analyzer already warns admins before editing Velocity code. The main impact would thus be to send spam, e.g., with phishing links to other users or to hide notifications about other attacks. Note that warnings before editing documents with dangerous properties have only been introduced in XWiki 15.9, before that version, this was a known issue and the advice was simply to be careful. This has been patched in XWiki 16.10.2, 16.4.7 and 15.10.16 by adding an analysis for the respective XClass properties."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:N/VA:N/SC:N/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 5.1,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "PASSIVE",
|
||||
"vulnConfidentialityImpact": "NONE",
|
||||
"vulnIntegrityImpact": "NONE",
|
||||
"vulnAvailabilityImpact": "NONE",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "LOW",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-270"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/xwiki/xwiki-platform/commit/3d96bf3ceb167bf0213d63f0be1f7e1732eb0a92",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-ff6v-w58f-v97w",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://jira.xwiki.org/browse/XWIKI-22471",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2025/CVE-2025-60xx/CVE-2025-6035.json
Normal file
60
CVE-2025/CVE-2025-60xx/CVE-2025-6035.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2025-6035",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2025-06-13T16:15:28.067",
|
||||
"lastModified": "2025-06-13T16:15:28.067",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A flaw was found in GIMP. An integer overflow vulnerability exists in the GIMP \"Despeckle\" plug-in. The issue occurs due to unchecked multiplication of image dimensions, such as width, height, and bytes-per-pixel (img_bpp), which can result in allocating insufficient memory and subsequently performing out-of-bounds writes. This issue could lead to heap corruption, a potential denial of service (DoS), or arbitrary code execution in certain scenarios."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "secalert@redhat.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
|
||||
"baseScore": 6.6,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 4.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "secalert@redhat.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2025-6035",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2372515",
|
||||
"source": "secalert@redhat.com"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2025/CVE-2025-60xx/CVE-2025-6052.json
Normal file
60
CVE-2025/CVE-2025-60xx/CVE-2025-6052.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2025-6052",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2025-06-13T16:15:28.230",
|
||||
"lastModified": "2025-06-13T16:15:28.230",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A flaw was found in how GLib\u2019s GString manages memory when adding data to strings. If a string is already very large, combining it with more input can cause a hidden overflow in the size calculation. This makes the system think it has enough memory when it doesn\u2019t. As a result, data may be written past the end of the allocated memory, leading to crashes or memory corruption."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "secalert@redhat.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
|
||||
"baseScore": 3.7,
|
||||
"baseSeverity": "LOW",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "secalert@redhat.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-190"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2025-6052",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2372666",
|
||||
"source": "secalert@redhat.com"
|
||||
}
|
||||
]
|
||||
}
|
82
README.md
82
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2025-06-13T16:00:19.907749+00:00
|
||||
2025-06-13T18:00:19.979595+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2025-06-13T15:49:20.863000+00:00
|
||||
2025-06-13T17:56:26.900000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,55 +33,57 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
297898
|
||||
297911
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `11`
|
||||
Recently added CVEs: `13`
|
||||
|
||||
- [CVE-2025-28380](CVE-2025/CVE-2025-283xx/CVE-2025-28380.json) (`2025-06-13T14:15:20.030`)
|
||||
- [CVE-2025-28381](CVE-2025/CVE-2025-283xx/CVE-2025-28381.json) (`2025-06-13T14:15:20.177`)
|
||||
- [CVE-2025-28382](CVE-2025/CVE-2025-283xx/CVE-2025-28382.json) (`2025-06-13T14:15:20.440`)
|
||||
- [CVE-2025-28384](CVE-2025/CVE-2025-283xx/CVE-2025-28384.json) (`2025-06-13T14:15:20.590`)
|
||||
- [CVE-2025-28386](CVE-2025/CVE-2025-283xx/CVE-2025-28386.json) (`2025-06-13T14:15:20.713`)
|
||||
- [CVE-2025-28388](CVE-2025/CVE-2025-283xx/CVE-2025-28388.json) (`2025-06-13T14:15:20.883`)
|
||||
- [CVE-2025-28389](CVE-2025/CVE-2025-283xx/CVE-2025-28389.json) (`2025-06-13T14:15:21.010`)
|
||||
- [CVE-2025-36631](CVE-2025/CVE-2025-366xx/CVE-2025-36631.json) (`2025-06-13T15:15:19.627`)
|
||||
- [CVE-2025-36633](CVE-2025/CVE-2025-366xx/CVE-2025-36633.json) (`2025-06-13T15:15:20.183`)
|
||||
- [CVE-2025-6029](CVE-2025/CVE-2025-60xx/CVE-2025-6029.json) (`2025-06-13T15:15:21.430`)
|
||||
- [CVE-2025-6030](CVE-2025/CVE-2025-60xx/CVE-2025-6030.json) (`2025-06-13T15:15:21.600`)
|
||||
- [CVE-2025-48914](CVE-2025/CVE-2025-489xx/CVE-2025-48914.json) (`2025-06-13T16:15:26.457`)
|
||||
- [CVE-2025-48915](CVE-2025/CVE-2025-489xx/CVE-2025-48915.json) (`2025-06-13T16:15:26.580`)
|
||||
- [CVE-2025-48916](CVE-2025/CVE-2025-489xx/CVE-2025-48916.json) (`2025-06-13T16:15:26.790`)
|
||||
- [CVE-2025-48917](CVE-2025/CVE-2025-489xx/CVE-2025-48917.json) (`2025-06-13T16:15:26.930`)
|
||||
- [CVE-2025-48918](CVE-2025/CVE-2025-489xx/CVE-2025-48918.json) (`2025-06-13T16:15:27.053`)
|
||||
- [CVE-2025-48919](CVE-2025/CVE-2025-489xx/CVE-2025-48919.json) (`2025-06-13T16:15:27.177`)
|
||||
- [CVE-2025-48920](CVE-2025/CVE-2025-489xx/CVE-2025-48920.json) (`2025-06-13T16:15:27.293`)
|
||||
- [CVE-2025-49580](CVE-2025/CVE-2025-495xx/CVE-2025-49580.json) (`2025-06-13T16:15:27.417`)
|
||||
- [CVE-2025-49581](CVE-2025/CVE-2025-495xx/CVE-2025-49581.json) (`2025-06-13T16:15:27.570`)
|
||||
- [CVE-2025-49582](CVE-2025/CVE-2025-495xx/CVE-2025-49582.json) (`2025-06-13T17:15:23.180`)
|
||||
- [CVE-2025-49583](CVE-2025/CVE-2025-495xx/CVE-2025-49583.json) (`2025-06-13T17:15:23.390`)
|
||||
- [CVE-2025-6035](CVE-2025/CVE-2025-60xx/CVE-2025-6035.json) (`2025-06-13T16:15:28.067`)
|
||||
- [CVE-2025-6052](CVE-2025/CVE-2025-60xx/CVE-2025-6052.json) (`2025-06-13T16:15:28.230`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `34`
|
||||
|
||||
- [CVE-2024-52769](CVE-2024/CVE-2024-527xx/CVE-2024-52769.json) (`2025-06-13T14:14:39.027`)
|
||||
- [CVE-2024-52770](CVE-2024/CVE-2024-527xx/CVE-2024-52770.json) (`2025-06-13T14:17:59.650`)
|
||||
- [CVE-2024-52771](CVE-2024/CVE-2024-527xx/CVE-2024-52771.json) (`2025-06-13T14:23:57.197`)
|
||||
- [CVE-2024-53425](CVE-2024/CVE-2024-534xx/CVE-2024-53425.json) (`2025-06-13T14:27:14.820`)
|
||||
- [CVE-2024-57529](CVE-2024/CVE-2024-575xx/CVE-2024-57529.json) (`2025-06-13T15:38:57.627`)
|
||||
- [CVE-2025-22236](CVE-2025/CVE-2025-222xx/CVE-2025-22236.json) (`2025-06-13T14:15:19.323`)
|
||||
- [CVE-2025-22237](CVE-2025/CVE-2025-222xx/CVE-2025-22237.json) (`2025-06-13T14:15:19.467`)
|
||||
- [CVE-2025-22238](CVE-2025/CVE-2025-222xx/CVE-2025-22238.json) (`2025-06-13T14:15:19.610`)
|
||||
- [CVE-2025-22239](CVE-2025/CVE-2025-222xx/CVE-2025-22239.json) (`2025-06-13T14:15:19.747`)
|
||||
- [CVE-2025-22240](CVE-2025/CVE-2025-222xx/CVE-2025-22240.json) (`2025-06-13T14:15:19.893`)
|
||||
- [CVE-2025-28099](CVE-2025/CVE-2025-280xx/CVE-2025-28099.json) (`2025-06-13T15:18:08.250`)
|
||||
- [CVE-2025-3623](CVE-2025/CVE-2025-36xx/CVE-2025-3623.json) (`2025-06-13T14:15:21.147`)
|
||||
- [CVE-2025-45752](CVE-2025/CVE-2025-457xx/CVE-2025-45752.json) (`2025-06-13T15:49:20.863`)
|
||||
- [CVE-2025-45984](CVE-2025/CVE-2025-459xx/CVE-2025-45984.json) (`2025-06-13T15:15:20.423`)
|
||||
- [CVE-2025-45985](CVE-2025/CVE-2025-459xx/CVE-2025-45985.json) (`2025-06-13T15:15:20.580`)
|
||||
- [CVE-2025-45986](CVE-2025/CVE-2025-459xx/CVE-2025-45986.json) (`2025-06-13T15:15:20.747`)
|
||||
- [CVE-2025-45987](CVE-2025/CVE-2025-459xx/CVE-2025-45987.json) (`2025-06-13T15:15:20.947`)
|
||||
- [CVE-2025-45988](CVE-2025/CVE-2025-459xx/CVE-2025-45988.json) (`2025-06-13T15:15:21.097`)
|
||||
- [CVE-2025-46983](CVE-2025/CVE-2025-469xx/CVE-2025-46983.json) (`2025-06-13T14:30:52.440`)
|
||||
- [CVE-2025-46984](CVE-2025/CVE-2025-469xx/CVE-2025-46984.json) (`2025-06-13T14:30:46.537`)
|
||||
- [CVE-2025-46985](CVE-2025/CVE-2025-469xx/CVE-2025-46985.json) (`2025-06-13T14:30:30.603`)
|
||||
- [CVE-2025-46986](CVE-2025/CVE-2025-469xx/CVE-2025-46986.json) (`2025-06-13T14:30:11.690`)
|
||||
- [CVE-2025-46987](CVE-2025/CVE-2025-469xx/CVE-2025-46987.json) (`2025-06-13T14:30:04.197`)
|
||||
- [CVE-2025-46988](CVE-2025/CVE-2025-469xx/CVE-2025-46988.json) (`2025-06-13T14:26:54.667`)
|
||||
- [CVE-2025-48068](CVE-2025/CVE-2025-480xx/CVE-2025-48068.json) (`2025-06-13T15:15:21.300`)
|
||||
- [CVE-2024-32407](CVE-2024/CVE-2024-324xx/CVE-2024-32407.json) (`2025-06-13T16:11:59.863`)
|
||||
- [CVE-2024-33900](CVE-2024/CVE-2024-339xx/CVE-2024-33900.json) (`2025-06-13T16:16:24.497`)
|
||||
- [CVE-2024-33901](CVE-2024/CVE-2024-339xx/CVE-2024-33901.json) (`2025-06-13T16:13:44.500`)
|
||||
- [CVE-2024-37821](CVE-2024/CVE-2024-378xx/CVE-2024-37821.json) (`2025-06-13T16:17:59.667`)
|
||||
- [CVE-2024-50849](CVE-2024/CVE-2024-508xx/CVE-2024-50849.json) (`2025-06-13T16:06:03.393`)
|
||||
- [CVE-2024-57459](CVE-2024/CVE-2024-574xx/CVE-2024-57459.json) (`2025-06-13T16:29:02.383`)
|
||||
- [CVE-2025-22941](CVE-2025/CVE-2025-229xx/CVE-2025-22941.json) (`2025-06-13T16:22:57.000`)
|
||||
- [CVE-2025-23104](CVE-2025/CVE-2025-231xx/CVE-2025-23104.json) (`2025-06-13T17:46:36.533`)
|
||||
- [CVE-2025-26013](CVE-2025/CVE-2025-260xx/CVE-2025-26013.json) (`2025-06-13T16:03:12.363`)
|
||||
- [CVE-2025-26014](CVE-2025/CVE-2025-260xx/CVE-2025-26014.json) (`2025-06-13T16:00:56.813`)
|
||||
- [CVE-2025-27953](CVE-2025/CVE-2025-279xx/CVE-2025-27953.json) (`2025-06-13T17:52:01.717`)
|
||||
- [CVE-2025-27954](CVE-2025/CVE-2025-279xx/CVE-2025-27954.json) (`2025-06-13T17:53:04.447`)
|
||||
- [CVE-2025-28381](CVE-2025/CVE-2025-283xx/CVE-2025-28381.json) (`2025-06-13T16:15:25.227`)
|
||||
- [CVE-2025-28388](CVE-2025/CVE-2025-283xx/CVE-2025-28388.json) (`2025-06-13T16:15:25.387`)
|
||||
- [CVE-2025-28389](CVE-2025/CVE-2025-283xx/CVE-2025-28389.json) (`2025-06-13T16:15:25.550`)
|
||||
- [CVE-2025-44091](CVE-2025/CVE-2025-440xx/CVE-2025-44091.json) (`2025-06-13T16:15:25.863`)
|
||||
- [CVE-2025-44115](CVE-2025/CVE-2025-441xx/CVE-2025-44115.json) (`2025-06-13T17:21:25.870`)
|
||||
- [CVE-2025-45542](CVE-2025/CVE-2025-455xx/CVE-2025-45542.json) (`2025-06-13T17:45:40.463`)
|
||||
- [CVE-2025-46060](CVE-2025/CVE-2025-460xx/CVE-2025-46060.json) (`2025-06-13T16:15:26.030`)
|
||||
- [CVE-2025-46096](CVE-2025/CVE-2025-460xx/CVE-2025-46096.json) (`2025-06-13T16:15:26.193`)
|
||||
- [CVE-2025-46976](CVE-2025/CVE-2025-469xx/CVE-2025-46976.json) (`2025-06-13T17:29:49.670`)
|
||||
- [CVE-2025-46977](CVE-2025/CVE-2025-469xx/CVE-2025-46977.json) (`2025-06-13T17:33:20.470`)
|
||||
- [CVE-2025-46978](CVE-2025/CVE-2025-469xx/CVE-2025-46978.json) (`2025-06-13T17:41:41.383`)
|
||||
- [CVE-2025-46979](CVE-2025/CVE-2025-469xx/CVE-2025-46979.json) (`2025-06-13T17:44:35.590`)
|
||||
- [CVE-2025-46981](CVE-2025/CVE-2025-469xx/CVE-2025-46981.json) (`2025-06-13T17:44:41.920`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
165
_state.csv
165
_state.csv
@ -116634,7 +116634,7 @@ CVE-2018-16205,0,0,1f86caeec012004b2fd74347fb65b21a5d8869bb035d5d199474adf5b0630
|
||||
CVE-2018-16206,0,0,096f153133d00fa3a9c383a862c234f12cd1410079be9f925b6e0b71fc9a3138,2024-11-21T03:52:17.463000
|
||||
CVE-2018-16207,0,0,f515e2e88f25f4525f5741c734447fcfbd4289d9c7f85b1587b37e2c82594244,2024-11-21T03:52:17.583000
|
||||
CVE-2018-1621,0,0,8e7763bfadb6a9f1b9161ad4d36701746abcc3efcccac159e423574cea723b0b,2024-11-21T04:00:05.857000
|
||||
CVE-2018-16210,0,0,ca9d646c7328347950206c0f5bcfea60f100fd45701699f0e744489e2fdd3a13,2024-11-21T03:52:17.730000
|
||||
CVE-2018-16210,0,1,940b381152ae41a797bf5ea418b76a194b33ad019bef72ea3e18ecbc60ec9aff,2025-06-13T17:56:26.900000
|
||||
CVE-2018-16216,0,0,5717f7973b04da3e3ae49f5bbbef4148153bda6d6c61b07d0ba1e48df934cbd8,2024-11-21T03:52:17.880000
|
||||
CVE-2018-16217,0,0,7fd43189534f945bd6cb20a8ae203685088b4224ad0046495e34d1f26cb6ba2c,2024-11-21T03:52:18.033000
|
||||
CVE-2018-16218,0,0,99bd270f2fd02e047cd8f3c8890ba7e12eba9b1cd0627619c82774a4236f3c27,2024-11-21T03:52:18.180000
|
||||
@ -207875,7 +207875,7 @@ CVE-2022-41568,0,0,fe6de37da0cc7e35a34e070cf787e31c960cfc085a8e6f85999e37f415176
|
||||
CVE-2022-4157,0,0,d662f859f279f16c8788b2c5f2b8f383e9b2c0033612c5b4767e87c54df200ef,2025-04-12T00:15:17.427000
|
||||
CVE-2022-41570,0,0,53855d0d0d1b4104bcdbfd0cb4535849d7ac6282acb641cb229560b5ced02dc3,2025-05-21T16:15:29.900000
|
||||
CVE-2022-41571,0,0,826b4bca65124a8cbcf9a47c0d862fc6e8229576f255a492eb3b18b7d6c166c0,2025-05-21T19:16:05.903000
|
||||
CVE-2022-41572,0,1,96e743ab385e1dc71ffc276660606cc749260f6514d96dc981ed76ee49ed3e1e,2025-06-13T15:10:08.940000
|
||||
CVE-2022-41572,0,0,96e743ab385e1dc71ffc276660606cc749260f6514d96dc981ed76ee49ed3e1e,2025-06-13T15:10:08.940000
|
||||
CVE-2022-41573,0,0,bab3410501c8850e950c5a66d689d391095aee77d84a2c3c751b6585883d88b4,2025-01-08T15:15:09.840000
|
||||
CVE-2022-41574,0,0,21e917fa5154deb6e3b8d21ad116ef9dde7c875c812d3df1ee5d78c46dfa6a1a,2024-11-21T07:23:25.140000
|
||||
CVE-2022-41575,0,0,2300a68e6adfd2ed7ec91333ec432fa68fd5538ac42a7abc4001c973c5b81b6e,2025-05-07T15:15:55.533000
|
||||
@ -210511,7 +210511,7 @@ CVE-2022-45060,0,0,dc748f9dfe0f8348e46270757f3de5f8e4911c7851a993cc419c45d9ad831
|
||||
CVE-2022-45061,0,0,5339cd564b3b73d35ca78b0983fd8ae2780ee0bad2ac35648ae423f2f6179d67,2025-05-01T15:15:58.423000
|
||||
CVE-2022-45062,0,0,0b9bb058574c413c4bdaf89e2db4ad5f58640e2d9087ac12c096a712faf150be,2025-05-01T15:15:58.727000
|
||||
CVE-2022-45063,0,0,227c0b7e4ed15ea588a44eabdc089ffcfa8486ddcf2bf6779ec61efcfe7c0a17,2024-11-21T07:28:42.460000
|
||||
CVE-2022-45064,0,0,ec7d8f6bc3ceebdf973590f414c5e225e2ba2da5e5408a1bfdee0324dd1d56ad,2025-05-23T16:44:02.653000
|
||||
CVE-2022-45064,0,1,2570c4987879b77379ba3ebff986cedfeb04676465652cd00cd446fcf732e1f2,2025-06-13T17:55:57.933000
|
||||
CVE-2022-45065,0,0,2edab8ec30c288436d9e22b9716b26e5c37fdf6edc1164c7c0a372f8197b998e,2024-11-21T07:28:42.777000
|
||||
CVE-2022-45066,0,0,3a5f15f57f42eda080a2888a3f7880f3abe7246bc0dc95b2834d7bf959e29f84,2024-11-21T07:28:42.903000
|
||||
CVE-2022-45067,0,0,e2895a1f219722bd7d8e458690731d98f48a0b0e12c7af783d3995b745f09884,2024-11-21T07:28:43.030000
|
||||
@ -214224,7 +214224,7 @@ CVE-2022-49756,0,0,28920c36f39ed7319bcb4d4236e8245608208e3f90c3360954d712de1c536
|
||||
CVE-2022-49757,0,0,f8d513bb3408f94b37dd44d9f1e8f5e5feb62b8907acb8142b1365c9258f9ce5,2025-04-15T14:51:20.980000
|
||||
CVE-2022-49758,0,0,13ab6803b3172e199b2b62b8f0fd070e3b7f408e7b5f310b0914ea640333e00f,2025-04-15T14:51:37.410000
|
||||
CVE-2022-49759,0,0,16c0668f206f3a39bb8bc5a0a0a170615639fe2527f287f643903901252e5edc,2025-04-15T14:51:51.090000
|
||||
CVE-2022-4976,0,0,8f4dd00e6df8090b2fc757e17bf900e567dbbf06f5fb88fd61120f6590f3f5f2,2025-06-12T16:06:20.180000
|
||||
CVE-2022-4976,0,1,ccd19f2e7e8d5dd2f4b90502c3fefddfe2c6d0901ccc7f52ead04ba2b1a39f49,2025-06-13T16:15:23.827000
|
||||
CVE-2022-49760,0,0,174c6ebf6ffdba46560ee57082a10e2bd736443de432b3c57d79e8c3a863f4d9,2025-03-28T18:11:49.747000
|
||||
CVE-2022-49761,0,0,182b2acd2b419d0dc6631691801e74dd45ce3a727bffa39bafb3990c4066bd75,2025-04-01T15:40:43.063000
|
||||
CVE-2022-49762,0,0,ccaf97e765af5278ad3af6c562d2944eabb4eac5592b6d3bbb9bf7ef819843d2,2025-05-02T13:53:20.943000
|
||||
@ -214617,7 +214617,7 @@ CVE-2023-0219,0,0,8cfe7a4a0277cef2601ec8e0ed6bd1bb04e8ad1292de441a9cbad0289b6373
|
||||
CVE-2023-0220,0,0,784a0224a0dd3c111a203c3d8539476a45ff326eed743db1a47ea1b1c86739db,2025-03-21T17:15:37.220000
|
||||
CVE-2023-0221,0,0,552fdbf9cca2c0cc2192330242786d81d481672178c2df7f8d811d4075e7deb6,2024-11-21T07:36:46.403000
|
||||
CVE-2023-0223,0,0,f970018ad447d52f5c4c73db31e1dc382548828a36a7df9a5f4ce6851743b9e5,2024-11-21T07:36:46.520000
|
||||
CVE-2023-0224,0,0,3bae8323d50ead6a758de985f14ad7ccb408e4655e031f23a9a22291bd0e9c0a,2024-11-21T07:36:46.640000
|
||||
CVE-2023-0224,0,1,706ccaea4684acfdac08f142e8c987cbf8f8f488f5fed6e59000591f9cb9235e,2025-06-13T16:15:24.050000
|
||||
CVE-2023-0225,0,0,a72a7e366297972e0cd4722812cadd80547d328081f7452d3dbadbbc7857ca6c,2025-02-18T16:15:14.343000
|
||||
CVE-2023-0227,0,0,98a0f994aabc24f9a79e73d465c96d5502c3570a3ffff65f257adc1edbd461f5,2024-11-21T07:36:46.873000
|
||||
CVE-2023-0228,0,0,9e2493b74d39b6f51d9410a3ab073ec81fa70112a7384534844033d57893c83b,2024-11-21T07:36:46.990000
|
||||
@ -241242,7 +241242,7 @@ CVE-2023-52070,0,0,250134024d350dfc154d8e35b8085d7897bef84e646a77739f4c15d2bc8cf
|
||||
CVE-2023-52071,0,0,812221a84c238215dcedea186e9ad0947ed6c219cfb74718c68ca339bd585423,2024-02-23T09:15:21.867000
|
||||
CVE-2023-52072,0,0,da47f0f32ccc3973848e15cd0c301535b950c574a4913e948e1c17e24c6846fa,2025-04-17T19:15:58.003000
|
||||
CVE-2023-52073,0,0,bf3a80a7f116b0237280e58fd1d5955464cfab36093fd51e83f88ec763351be4,2025-06-03T15:15:49.393000
|
||||
CVE-2023-52074,0,0,8c8a30c4bc95b4cc098140e899189032dc53c8e311db85ed0acff923c7d4273b,2024-11-21T08:39:06.930000
|
||||
CVE-2023-52074,0,1,2533ddfc13ec8b7da99f125cdeac3d104b6877754542c5240b3df32dd90b8fae,2025-06-13T16:15:24.240000
|
||||
CVE-2023-52075,0,0,6cb7b154b23a7ded2e6e2ff32f253a0202b2ab2ab046e1434391aa5436f4d8b1,2024-11-21T08:39:07.077000
|
||||
CVE-2023-52076,0,0,16004d644550cb5d8dcf358a683e5a43d21402d3ab67056829ed5a1140278995,2024-11-21T08:39:07.200000
|
||||
CVE-2023-52077,0,0,b9d80ba6bb5a119e482597ca36557a484350da39ccb0a2ec375015a35d15ec85,2024-11-21T08:39:07.370000
|
||||
@ -241281,7 +241281,7 @@ CVE-2023-52111,0,0,3b67e0acb2e95e29d9f067ae353c8f5a778d5ab622495d9880a0f43ed407b
|
||||
CVE-2023-52112,0,0,227e27d86a9c9316298e239eaf0139dd29a24be0b462b0e617bcb2267b094bb7,2024-11-21T08:39:12.083000
|
||||
CVE-2023-52113,0,0,7d151873e19965534c24c0943f302b295268a104ac6379b8250facc484d8dbec,2024-11-21T08:39:12.203000
|
||||
CVE-2023-52114,0,0,696b244783e9216372eb73b5cbabebc1983ae7dc8c3c4df795efa89e0c296042,2024-11-21T08:39:12.333000
|
||||
CVE-2023-52115,0,0,7a8c5d1a373e69410d6f5e41b93c760a5859a3f6bbdd585cccb0a84d50aee8f9,2024-11-21T08:39:12.530000
|
||||
CVE-2023-52115,0,1,e32a337dad686a379adc55bae32f3ee4479b23cf12c62a0432df3b49bcff3575,2025-06-13T16:15:24.457000
|
||||
CVE-2023-52116,0,0,1a222d4dfbd11bc07b85f8505e8b3a14bfb073a6d6fca2fff1ce0b06bb2b19e1,2025-06-02T16:15:25.853000
|
||||
CVE-2023-52117,0,0,5a1db97fcb60fa12b005bd5a93a0a6523faf86d1211f03c97f9be4dd238556ca,2024-11-21T08:39:12.767000
|
||||
CVE-2023-52118,0,0,87e36a21e66c915009801742d49f910407d76de310f823220cd6ba7586dd1812,2024-11-21T08:39:12.907000
|
||||
@ -251300,7 +251300,7 @@ CVE-2024-2173,0,0,c84705e6544c7810b2dd24a487d4a093d605aa797e9da01d225283aed5e17c
|
||||
CVE-2024-21730,0,0,3fb54c28ca30ec2bd40b6d6fb2091cbe68d186fd51891abb72beb75eef450a5a,2025-03-19T17:15:39.783000
|
||||
CVE-2024-21731,0,0,5498da9c2571dd8675b69a41552ec2344ce7a7dd99f451ca8cb3acc427b2e6ef,2025-03-13T15:15:41.053000
|
||||
CVE-2024-21732,0,0,24137ad844492856b4c0e788ad2796debe96d3c45db9a67efcbc8ecc63e4982f,2025-06-03T15:15:56.083000
|
||||
CVE-2024-21733,0,0,b4e277d651a67cc40677cb23dcfabd83b71c95e7ccb1c0ef3df3cb43157c87cc,2025-02-13T18:16:43.363000
|
||||
CVE-2024-21733,0,1,70fee4b87268fdffd4777d8f57b33368227512c410f15158c609d571a9b964ee,2025-06-13T16:15:24.760000
|
||||
CVE-2024-21734,0,0,05a714dc545e8464bb57c1634923299c8c0fea8fc589e5ef7cd7d6f5a6804036,2024-11-21T08:54:54.110000
|
||||
CVE-2024-21735,0,0,48d2102a1a8b1e565f1eca95901e1f59c8f6f1a12fe9aee88f5bbf6e5aa085f5,2024-11-21T08:54:54.260000
|
||||
CVE-2024-21736,0,0,2b962fff62a73e04211530a72bb3c53715e2d90806d56ac2accd55133794f464,2024-11-21T08:54:54.400000
|
||||
@ -252145,7 +252145,7 @@ CVE-2024-22889,0,0,bc789a72f7d1e24bd814b0b6d2146517cc600e2afe43b498499dda222266b
|
||||
CVE-2024-2289,0,0,35dfd6fd1bbaaacb962aec793685e482a5818b6aa405dc4199bbd540825768c0,2025-04-15T15:45:34.800000
|
||||
CVE-2024-22891,0,0,a60262184c3c29b0e0c7f3fe22f6adcbb2816519fa464ccdba3d14fcd28d24d4,2025-05-13T14:35:36.937000
|
||||
CVE-2024-22892,0,0,ab4685bd3e54af7b091a985b4e2bd0ce232ea37ad229896d47c941f92093c96e,2025-03-14T16:15:29.140000
|
||||
CVE-2024-22893,0,1,ac777c12867094b25caf3bf4db380ed2caa566135f6f4a056077e3eff696f71a,2025-06-13T15:03:18.493000
|
||||
CVE-2024-22893,0,0,ac777c12867094b25caf3bf4db380ed2caa566135f6f4a056077e3eff696f71a,2025-06-13T15:03:18.493000
|
||||
CVE-2024-22894,0,0,42f5b44dcbf5f726764f56c5b153b80c427e59c7fdf8f4595198f383354dc3bc,2024-11-21T08:56:45.447000
|
||||
CVE-2024-22895,0,0,b8c14c65b8853d2c945aa08790c67740a5056848181492d7c8902cda3d48dd78,2025-06-05T16:15:26.750000
|
||||
CVE-2024-22899,0,0,e0b1270af06adae37849d6178e4aceee74c98c48605efe5906b7249773cb3736,2025-06-04T21:15:37.730000
|
||||
@ -258797,7 +258797,7 @@ CVE-2024-31497,0,0,f8413273b090c2c99439b9ea2d6bf31cf1271980399575d533158182cac51
|
||||
CVE-2024-31498,0,0,b2e6276a70232623190c44e8fb464ed6a164bd12de239edf2266e9b650ae46d0,2024-11-21T09:13:39.247000
|
||||
CVE-2024-3150,0,0,75d0be56062bf1a530210c178aada19a6cec46e37ca674016ee68e74c48916e5,2024-11-21T09:29:00.520000
|
||||
CVE-2024-31502,0,0,e1a3371156b5bfc652018b1d8fcd99dd9bbdd2be7fa3fdac29255561faa54a60,2024-11-21T09:13:39.480000
|
||||
CVE-2024-31503,0,0,518cd08ef865de234cd65cfcb97b45b19d6b39872e738ecf53628254de118758,2024-11-21T09:13:39.700000
|
||||
CVE-2024-31503,0,1,530411a449c8426e81e299f531fc066bec6672190a1939b892141fcba7227e4a,2025-06-13T16:22:08.547000
|
||||
CVE-2024-31504,0,0,e609fdd3d56331d45ea8d49c7af4d1de4b29d053dc7ca378918a58ec72a1ae55,2024-11-21T09:13:39.917000
|
||||
CVE-2024-31506,0,0,616284889025843c021b0726709d0c2938adbe743bbeef4b239aedaa6c11d52a,2025-03-20T19:15:29.227000
|
||||
CVE-2024-31507,0,0,09533bcdb609fea2f5a5fb10fa1fa7fffce9c3a62004ff2e439e8975ef660f06,2025-04-18T18:35:31.437000
|
||||
@ -259339,9 +259339,9 @@ CVE-2024-32394,0,0,fcd63d75d4da407251404a1d2d08afc172eff51aa3e4e8bae9c2e181b13c6
|
||||
CVE-2024-32399,0,0,451fd8b2233e189ac161bb1115242ec61a34c2ccc4b6f8530cbfaeecf7c2697b,2024-11-21T09:14:52.160000
|
||||
CVE-2024-3240,0,0,971173d54c1994d6b1cfc2e3e8433d0c58e5901156fde410070d2514a513396a,2024-11-21T09:29:13.397000
|
||||
CVE-2024-32404,0,0,74a4e470851f7065c54824eefb65f28406cfe534ec539cba27c7d9ad4f1d2283,2024-11-21T09:14:52.383000
|
||||
CVE-2024-32405,0,0,d6cebee4f160fbfebcd1643d9266858f67b5ac275a62bd0c0eb14ec6bc477ccb,2024-11-21T09:14:52.610000
|
||||
CVE-2024-32405,0,1,03b8b3b387fd90d2d3e2e81b9e088d252ad26d5ebcb2d54e41548bc8a9a694ff,2025-06-13T16:10:19.593000
|
||||
CVE-2024-32406,0,0,adc8cb262025358dc4dfe8f438d40cf02ab2906d5eddacd2f331ca567828e67d,2024-11-21T09:14:52.837000
|
||||
CVE-2024-32407,0,0,0df07e739a8ca11adc8e64033efd14a2769f0d1340e998db62e6a377858daa19,2024-11-21T09:14:53.060000
|
||||
CVE-2024-32407,0,1,69b4d3bff3264ca20ca024b87ba188215e92e6004de70e7b110ab1314abf0286,2025-06-13T16:11:59.863000
|
||||
CVE-2024-32409,0,0,bf9e59848caae45d0cc6872d258056c0c656eeada01f508a560f9f71f7f2c3bf,2025-04-04T13:23:40.187000
|
||||
CVE-2024-3241,0,0,99a869aa2cdccb45dc97a20b04d1a56e494390a52ac89cc6fa2586d94a876e7a,2025-05-14T16:47:45.590000
|
||||
CVE-2024-32418,0,0,3b612e1d20e5e03e948db07ab7f08df1357d8d8d34f36f6a6b36d36afa39f251,2025-04-30T16:47:33.967000
|
||||
@ -260516,8 +260516,8 @@ CVE-2024-33896,0,0,5c27b6760d023c29860f84077aa2b8fbe358a20c4089f16c9bf1299102adb
|
||||
CVE-2024-33897,0,0,27ebeedb6fb85da132797c9baf2303375ff3cca126efacc3a0f2865cde364aba,2024-11-21T09:17:41.393000
|
||||
CVE-2024-33898,0,0,7e7b7517b9d975bf9ea39eb343f947bde4dad6c5d7ccb5595643c97b9f74c000,2025-02-06T22:15:37.507000
|
||||
CVE-2024-33899,0,0,b3980927db4f974fd1906c7202adc3e1699df19d4c56878bd1f82fe30f8bed35,2024-11-21T09:17:41.793000
|
||||
CVE-2024-33900,0,0,abfad61d7293c0773d365c121adb2bb9f1f891725591b07fde4167bf5da41918,2024-11-21T09:17:42.003000
|
||||
CVE-2024-33901,0,0,912d048de34a068ceaffe86e576e80e402b91e11759b7e8340515582d90cc739,2024-11-21T09:17:42.220000
|
||||
CVE-2024-33900,0,1,cc7636c398693a35f05f830cd893543244a276686af48247c63a7847025a9b48,2025-06-13T16:16:24.497000
|
||||
CVE-2024-33901,0,1,a7676477cee317ce9b073c5b4c29aa0697ab444b822b02de4cda733693068639,2025-06-13T16:13:44.500000
|
||||
CVE-2024-33903,0,0,d8b08cea7eff76191e72dc5c11afa7582b0eada85d3ac185fdd43eaa6843dd60,2024-11-21T09:17:42.427000
|
||||
CVE-2024-33904,0,0,c7e4cd7a2ae08716b76b395008e60a2a6bc57551c6c48eaaf3388d6fa710d56e,2024-11-21T09:17:42.640000
|
||||
CVE-2024-33905,0,0,a3999c3e7c9fbdd628c02c84460ca35429739070f9c5928b18a5254c26d822d0,2024-11-21T09:17:42.843000
|
||||
@ -262660,7 +262660,7 @@ CVE-2024-36517,0,0,25520f7bbfeaaa0d674db75f5ceb0dc55bd7766c7f78310f1683242faeb8d
|
||||
CVE-2024-36518,0,0,b008988df19e903bad3b0bc86f6b8c800a5baaacddd161bf228ff0ddf48948e3,2024-11-21T23:06:35.190000
|
||||
CVE-2024-3652,0,0,f3d59df85a77fa4be0249e01ff821e4b507f89580101327f0c903d244ca366dd,2024-11-21T09:30:05.313000
|
||||
CVE-2024-36522,0,0,9b80d6d8ad834b2ad12a9c002e135616fd5e236e3616bd648663cccfef77bea3,2024-11-21T09:22:19.577000
|
||||
CVE-2024-36523,0,1,f7b7bcbc5434b21680c168d843b914d0511d30ee8cbb896becb72f25cb745615,2025-06-13T14:46:07.467000
|
||||
CVE-2024-36523,0,0,f7b7bcbc5434b21680c168d843b914d0511d30ee8cbb896becb72f25cb745615,2025-06-13T14:46:07.467000
|
||||
CVE-2024-36526,0,0,7eb130a5f3d73c89b7f5cd8217a059ab207fdeab2df485fcb069aa0328d07168,2024-11-21T09:22:19.993000
|
||||
CVE-2024-36527,0,0,2fe968f9db97e47864d546cb83cbb537d4cf1bd288baee48e4ffbf302a88ab2b,2024-11-21T09:22:20.213000
|
||||
CVE-2024-36528,0,0,7d2ac3f933b7d4ae4e0c8f5c2d73d6177e5b580ae5639fefe1188c34354b0dde,2025-06-10T18:31:33.757000
|
||||
@ -263590,12 +263590,12 @@ CVE-2024-37661,0,0,ee08e04759841bbf9e002e732331f80dee9de5ef526cd60e9627ae7db039d
|
||||
CVE-2024-37662,0,0,9fb609c29e351aae318bf190d1652757771b4257bef2c46e7c384208ed859872,2025-06-06T17:09:55.507000
|
||||
CVE-2024-37663,0,0,0350e1df46b9c03476a6921b27b5739d2a9a16e3abb310ac2c48fd9f451c04a6,2024-11-22T16:15:24.273000
|
||||
CVE-2024-37664,0,0,e6af7d2e65909320ac2e066c551b6342cf322fc988e4e028dd24fa51ad921593,2024-11-22T16:15:24.463000
|
||||
CVE-2024-37665,0,1,2cad5de31fe3539f14a7a59779bc1c1b41d67d74fef14da4545d1089f67dab75,2025-06-13T14:49:18.100000
|
||||
CVE-2024-37665,0,0,2cad5de31fe3539f14a7a59779bc1c1b41d67d74fef14da4545d1089f67dab75,2025-06-13T14:49:18.100000
|
||||
CVE-2024-3767,0,0,b4ea3f0e16993e9f310cfbde1e62879723209ff6ca6fab1f3423f8b6c9db7f57,2025-05-30T12:15:19.907000
|
||||
CVE-2024-37671,0,0,63a7bb054b9783dd1c7933bd57d4a8f7e2cfd8dd008993792ee8177e6854a803,2025-03-14T16:15:32.600000
|
||||
CVE-2024-37672,0,0,e44dfa3a5448c7ddc8be3e7358264cb6292a7fdffc27b2a73e33c9a81cd357fa,2024-11-21T09:24:12.893000
|
||||
CVE-2024-37673,0,0,4948f447146a2f01fa61fd5402a993016f9583881e815929a457af264ecd9e35,2024-11-21T09:24:13.130000
|
||||
CVE-2024-37674,0,1,7f9a9b623444e71e66f7ed4ea494cb947ca04eeb0ae2bc068889dca4f2215949,2025-06-13T14:33:53.170000
|
||||
CVE-2024-37674,0,0,7f9a9b623444e71e66f7ed4ea494cb947ca04eeb0ae2bc068889dca4f2215949,2025-06-13T14:33:53.170000
|
||||
CVE-2024-37675,0,0,cd47fb3488bba19fc49d7577cb541036bb9ed9f63f77e17cc9553db9023f3802,2025-03-18T15:15:51.737000
|
||||
CVE-2024-37676,0,0,415ada6299f7cd143b15bc431799ef76592986b2443e085c31e97cb8bf3da618,2024-11-21T09:24:13.720000
|
||||
CVE-2024-37677,0,0,914b27f644b99c23fa73430b334c2012f02e568866d02ad51d6528274c4668e8,2024-11-21T09:24:13.930000
|
||||
@ -263619,7 +263619,7 @@ CVE-2024-37741,0,0,cdea71c096b6020452f86c61c722c71d411c4901d61352f541581e27bedfb
|
||||
CVE-2024-37742,0,0,7c57418640c4a372993ae3363ea2c4e93948b308f1c699d6cb68e3e245b5578a,2024-11-21T09:24:16.373000
|
||||
CVE-2024-3775,0,0,527f7d608f8da6f09f241b673d5077f6d9275917117f8ac6d0ce1a26efac2c10,2025-04-08T16:30:51.500000
|
||||
CVE-2024-37758,0,0,6aad1ab20925aeaf835ed115698dffcd6067c2af6f08e49e2fb33789c105b9ec,2024-12-20T20:15:22.937000
|
||||
CVE-2024-37759,0,1,606805366b9f9646e3d660f6895299941a599eeb90c9b36368cb920769a669bf,2025-06-13T15:00:19.157000
|
||||
CVE-2024-37759,0,0,606805366b9f9646e3d660f6895299941a599eeb90c9b36368cb920769a669bf,2025-06-13T15:00:19.157000
|
||||
CVE-2024-3776,0,0,f1875e31c2fb41ed87b0999dab19da3668683a670607040ff349bb93a48f4c45,2025-04-08T16:31:04.280000
|
||||
CVE-2024-37762,0,0,e5f736f5834235475cd2df0b4cffb0c488f0e2566543dfa263c43f8239901743,2025-04-30T16:37:36.887000
|
||||
CVE-2024-37763,0,0,7f19c01bae82333f6ad4461e377e4924b7a38f62f73deecf0f18a1d6b2fd4dd4,2025-04-30T16:38:05.183000
|
||||
@ -263654,7 +263654,7 @@ CVE-2024-37816,0,0,0255491dd0ac61fe8f883862d2c202814fc8f53a759901f88a06c7013f466
|
||||
CVE-2024-37818,0,0,adc0803b390ef119b7312d5c108656cbe1c41da7e77dc9f33c1c6c84e04bc7b6,2024-11-21T09:24:20.427000
|
||||
CVE-2024-3782,0,0,4b02780447541e30d62b65dc88b0dcbe597ba7d13fa25dfd48bc608a09152829,2025-04-10T19:54:59.537000
|
||||
CVE-2024-37820,0,0,cd852e1dadcb7edc135763a1f4f8f423dcb6c177e797c3b00dca3df88e5d65fd,2024-11-21T19:15:09.450000
|
||||
CVE-2024-37821,0,0,1453a655cd572a4a0dd83a571605e37d7e86ccc97e2d883b331db535ee79a9ea,2024-11-21T09:24:20.780000
|
||||
CVE-2024-37821,0,1,b539d00cf834395efef42d3baa76a5a606359b4bbefd2096c9686e7daf11886b,2025-06-13T16:17:59.667000
|
||||
CVE-2024-37825,0,0,9415ecb729c8ea23547630f5e9156dca92043a10d0acfd9c137211bd64cfbf2f,2024-11-21T09:24:21.010000
|
||||
CVE-2024-37826,0,0,f9a8ace64d558700333ee9b1f1cf1267d32914e88f1ead58ed9ae128c89a10d7,2025-06-06T20:33:52.350000
|
||||
CVE-2024-37828,0,0,766adf4d444cb8eb6560cf67ecd774e30c8a3685f9d4dfd3f03a2ce063007731,2024-11-21T09:24:21.423000
|
||||
@ -264632,9 +264632,9 @@ CVE-2024-3882,0,0,ff357033633ea83089941ee72ffb1ed520c8dd6a221dd7e52cb47b408a9921
|
||||
CVE-2024-38820,0,0,517fdb1091af57612900b39a11b0b83e3890144a7a4d4cb71cfb71c69b405fa9,2024-11-29T12:15:07.007000
|
||||
CVE-2024-38821,0,0,74b8175803172fc63d22dc332a41fdd98b88e2c1ead7e686074b3e1c775d2446,2025-01-24T20:15:32.427000
|
||||
CVE-2024-38822,0,0,1de129502c834593a380596e49c11c4c982d91761db595315325ff60e1f44ece,2025-06-13T07:15:19.300000
|
||||
CVE-2024-38823,0,1,fb82bf33848268556a877cd19f1a813d141fbec7693a2d4e6c81edd7cf64449f,2025-06-13T14:15:18.823000
|
||||
CVE-2024-38823,0,0,fb82bf33848268556a877cd19f1a813d141fbec7693a2d4e6c81edd7cf64449f,2025-06-13T14:15:18.823000
|
||||
CVE-2024-38824,0,0,54e57dcf925789c6c00c49d9811baccd3488b72aef696e2d154306781f58b0a3,2025-06-13T08:15:18.800000
|
||||
CVE-2024-38825,0,1,53e71332e9b4cba350a68ba9e2de46504d460d834fc9582f4da2d50364c7e4a4,2025-06-13T14:15:18.983000
|
||||
CVE-2024-38825,0,0,53e71332e9b4cba350a68ba9e2de46504d460d834fc9582f4da2d50364c7e4a4,2025-06-13T14:15:18.983000
|
||||
CVE-2024-38826,0,0,506930d335a5efb8c27d5014fa191907479a7be8d8701e39690034739d2c8ebb,2025-03-17T22:15:12.667000
|
||||
CVE-2024-38827,0,0,2e81585c986691122bd5b137a7a8366ca83e5bd591adaec79ae968dfb0819731,2025-01-24T20:15:32.553000
|
||||
CVE-2024-38828,0,0,30ca64d92e91bdd0f728034345a0be072d18df3b4628bfb9f9d8fb65850f39eb,2025-05-09T20:15:38.413000
|
||||
@ -264814,7 +264814,7 @@ CVE-2024-39165,0,0,301bacb9ee4b80bd8b1672f3716e4ccfa691474967bfc0399bcf2a55b330c
|
||||
CVE-2024-3917,0,0,0dcebc99ec7e3d7429f10d31b7200aeec59137894857a495f5e98ebf8939c2ff,2025-05-21T19:04:11.037000
|
||||
CVE-2024-39171,0,0,e487ca51b57de27bab9c91c5e2e674078d69d78bdd6189118036255c96252b16,2024-11-21T09:27:16.373000
|
||||
CVE-2024-39173,0,0,3883906d32a0fb43dd48f587f37a33510baedaa91c6c21f392cdc16e74d96d88,2024-11-21T09:27:16.597000
|
||||
CVE-2024-39174,0,1,b8c707eead574966035941b20eecff50ee4e5344b26f5e09adf439ff3bbb45f6,2025-06-13T14:40:01.927000
|
||||
CVE-2024-39174,0,0,b8c707eead574966035941b20eecff50ee4e5344b26f5e09adf439ff3bbb45f6,2025-06-13T14:40:01.927000
|
||||
CVE-2024-39178,0,0,e3f056e4d2ff7c9e96d849ffa2d88c9c7d209f2223fd8b6f0b13c0297346769c,2024-11-21T09:27:17.017000
|
||||
CVE-2024-3918,0,0,5e88c6bb6c1d350e2e9569b1e46a8f5310347d6785e5496a32d31d232a5a3c35,2025-05-21T19:04:32.700000
|
||||
CVE-2024-39181,0,0,5a637c334e0bde0f3e3c7aa2076e0f80b7362cc211716f1c4adfc099b7fcdb9f,2024-11-21T09:27:17.240000
|
||||
@ -273690,7 +273690,7 @@ CVE-2024-50841,0,0,0c9f5d96c311feed151f0159836ea6d99ded7827df5ad4d8897d729392dc7
|
||||
CVE-2024-50842,0,0,4c735253ec1e8b86c3e85fb3a1ca258bea07d4915643f46399467486251fb604,2025-05-06T13:41:46.400000
|
||||
CVE-2024-50843,0,0,6acc80c8b4614d2e59af8695a22de1b6450b94cce946869e20e2f46f841378a3,2025-03-27T17:49:33.550000
|
||||
CVE-2024-50848,0,0,029be70c6f0581fb2d1c733e95adef6b4abf98e8e75f3950fb323857590bcd24,2024-11-19T21:57:32.967000
|
||||
CVE-2024-50849,0,0,e67c5a6149d8b159c78ff28b73b71340785928f655a17cf30920dcd256664bf0,2024-11-21T21:15:22.790000
|
||||
CVE-2024-50849,0,1,ca7669f43ec1bf5eeadbe4cc0e539fdbaf2d57b49b4d33da7ca7d4551d25db3e,2025-06-13T16:06:03.393000
|
||||
CVE-2024-5085,0,0,6d4282fe0a1ba0f862798def59da3a37fcde959484995ab67584cb690f171172,2025-03-01T02:39:18.967000
|
||||
CVE-2024-50852,0,0,a554aacf991646da5b2721516004d1f4d3015c73785e9e42d26b1a8b27fd0d85,2024-11-21T17:15:21.473000
|
||||
CVE-2024-50853,0,0,a2c16db2d9a48c6744a7c1a41fb13ec1d9457efe837db0d74474da40cef9ea9d,2024-11-21T17:15:21.783000
|
||||
@ -274986,10 +274986,10 @@ CVE-2024-5276,0,0,5f4d0d1d8da4f71778d386f61f8318d411a2daa5050a355330b05dfbb58c55
|
||||
CVE-2024-52762,0,0,0ba93538cdcceffbc2ce711add8a68aa6535f792ec7a07bfa4c816b008d21953,2024-11-29T21:00:39.843000
|
||||
CVE-2024-52763,0,0,bf728b5a47dd0413d8210dc0bce8f5be7122657bdb084f64d14e2b08f6408d30,2024-11-29T21:00:47.937000
|
||||
CVE-2024-52765,0,0,476b03c829577e5243ce6135d79398720058b5846d4e6fe9a1bdd7ebaa31e9c4,2025-03-13T14:15:33.100000
|
||||
CVE-2024-52769,0,1,d45d0df361ea72f170b51634b5ca68bdbfbd03621f0db2bd7c3faf01657c457d,2025-06-13T14:14:39.027000
|
||||
CVE-2024-52769,0,0,d45d0df361ea72f170b51634b5ca68bdbfbd03621f0db2bd7c3faf01657c457d,2025-06-13T14:14:39.027000
|
||||
CVE-2024-5277,0,0,03acecca3b8a13f8db6e023f3de98c1d934c950fd9eaf83bed7426af357ffac9,2024-11-21T09:47:20.217000
|
||||
CVE-2024-52770,0,1,49f50f28d95c2fddf385afcd98377de2d99c4a4d67e6d2d2550353d8e2826762,2025-06-13T14:17:59.650000
|
||||
CVE-2024-52771,0,1,2d525cd95be1799d8a0b84a7f1c1c522c66416841adc7dad735a52afb8223cd2,2025-06-13T14:23:57.197000
|
||||
CVE-2024-52770,0,0,49f50f28d95c2fddf385afcd98377de2d99c4a4d67e6d2d2550353d8e2826762,2025-06-13T14:17:59.650000
|
||||
CVE-2024-52771,0,0,2d525cd95be1799d8a0b84a7f1c1c522c66416841adc7dad735a52afb8223cd2,2025-06-13T14:23:57.197000
|
||||
CVE-2024-52777,0,0,f5e5264bb68ac8b5d172e0cc8c7fdb06682839b5e8788bcfc83ecc35b406d4fc,2024-11-29T18:15:10.153000
|
||||
CVE-2024-52778,0,0,5392ea6a109b7d3fc54a9ea4204adcb9b5d7fe60eec97cc74680b55f7e49c5b0,2024-11-29T18:15:10.380000
|
||||
CVE-2024-52779,0,0,f6c9c20937b78925a2b0164de08d61e7bfbb2d9ee416738f50eb7d042cf69967,2024-11-29T18:15:10.597000
|
||||
@ -275541,7 +275541,7 @@ CVE-2024-53408,0,0,1aab9be4aaf2573b8ac1b0fb3d37a28e2e7437d63a980cdaed7de900ff395
|
||||
CVE-2024-5341,0,0,65ff8689965c5e29ef124f69d82afd0c059edc6db5694aac65d8224f8b995833,2025-01-29T18:09:48.960000
|
||||
CVE-2024-5342,0,0,c19ccffd3ff364daed28ff3ce4f3e63c62c97b909f79a312d9891c60f97a9cce,2024-11-21T09:47:27.517000
|
||||
CVE-2024-53423,0,0,ed5e6f4c3c0fed5d53906280cf00f9afdb869719488d1d9f4f5f554e2cdae7ad,2025-06-03T15:36:02.130000
|
||||
CVE-2024-53425,0,1,fcd149d99e9f74ac38439947fe93ee54860a005dec0bf8524e3cb3476f6ecb46,2025-06-13T14:27:14.820000
|
||||
CVE-2024-53425,0,0,fcd149d99e9f74ac38439947fe93ee54860a005dec0bf8524e3cb3476f6ecb46,2025-06-13T14:27:14.820000
|
||||
CVE-2024-53426,0,0,9339130e86a75243ea176c2c1911663d0047bd370b4ea0fccb09719eca2c3ad9,2024-11-26T18:15:20.330000
|
||||
CVE-2024-53427,0,0,7046890ce65dccc1bf63a6a08e048f989a61810260a23dacfa371c3a036c1add,2025-03-28T17:15:27.420000
|
||||
CVE-2024-53429,0,0,eaa70acb2843e8489abf02d5796dd8a314b9b85961845be919325cda159f0f76,2024-12-03T16:15:23.833000
|
||||
@ -277974,7 +277974,7 @@ CVE-2024-5745,0,0,7e65c88ad788c6b0931bb1e2e7e3abdcf09fad20076d859b2aa0fb4c2f137d
|
||||
CVE-2024-57450,0,0,dca4876f05e9c619adb9a59b22dcaaa94ab25788656ded13536c3752d289859d,2025-05-13T19:40:51.173000
|
||||
CVE-2024-57451,0,0,e8712741c53f94e08c6064dcde30faf3287d36a6d399ce65670c03a0937d1b99,2025-05-13T19:31:39.313000
|
||||
CVE-2024-57452,0,0,8a20887d1f3d68429026240827826abb328116cf3af896137c2c5ffa4395c131,2025-05-13T19:39:27.263000
|
||||
CVE-2024-57459,0,0,b2d0b28ca53dea35095ae17a417e682f9dcdd070f3ee5d2392715184f1fabf37,2025-06-02T17:32:17.397000
|
||||
CVE-2024-57459,0,1,83a0beca9ccaee818da0c53fb032353e9417f68cab17d549f39adbc95b2a0b52,2025-06-13T16:29:02.383000
|
||||
CVE-2024-5746,0,0,983f92b35d2851c40a6d833edd298ce544be182f3cbb073e4d5723a172283607,2024-11-21T09:48:16.580000
|
||||
CVE-2024-5747,0,0,b0a73052a2b0fb8e91ca0186eb03a0a139ee155bf24624c988c4f85a0b80da72,2025-02-11T02:15:35.543000
|
||||
CVE-2024-57471,0,0,6c28f55d6ac6c23c45f2d45459061e089bd18c0bc4656c9d1b783fab10287cf0,2025-05-27T17:00:54.740000
|
||||
@ -278001,7 +278001,7 @@ CVE-2024-5752,0,0,4279b49c1e8f69df93439002f6af091c9949f569d62ed33209701a1ff6b32e
|
||||
CVE-2024-57520,0,0,b3f90fb26fb200b53ae4777fd3baed004f17dd559e6923e11bec593e0ff8203b,2025-02-06T16:15:40.833000
|
||||
CVE-2024-57522,0,0,18e711bef02ec93aea7b480aff73784056d9c41ed01c1af04200010cd11c145d,2025-04-22T20:08:29.483000
|
||||
CVE-2024-57523,0,0,9fd5b8b30d9788fd284244369559ac2fca5a537a05cecae34a4e95bce1786a29,2025-04-22T20:06:16.133000
|
||||
CVE-2024-57529,0,1,417415f3c07912ce2a364a344cee3ae7a31a06936b98edbe69a008646d827c28,2025-06-13T15:38:57.627000
|
||||
CVE-2024-57529,0,0,417415f3c07912ce2a364a344cee3ae7a31a06936b98edbe69a008646d827c28,2025-06-13T15:38:57.627000
|
||||
CVE-2024-5753,0,0,35e5857965ec4fb8ff4da87da0ad57743fc77f757356d105b68f8e07a9b9291a,2024-11-21T09:48:16.923000
|
||||
CVE-2024-57536,0,0,691bbe45b6c8dec1b3fb6ba4e32723d879ed3feb0eb9208588f95b190d231a22,2025-04-22T14:11:56.087000
|
||||
CVE-2024-57537,0,0,2907e2eda64c6ec8a608ebd4f389b1d60cc8d7e07d9c5be63960d897e0e4a121,2025-04-22T14:11:50.577000
|
||||
@ -285595,12 +285595,12 @@ CVE-2025-22231,0,0,bd2ff59ef079880253edeca06616e1c3a205871c44a51a92d95e60e549741
|
||||
CVE-2025-22232,0,0,bee762df9dfabd3d4c6c12e64136a19453238ca07b81d2e49eee527157bf661b,2025-04-11T15:39:52.920000
|
||||
CVE-2025-22233,0,0,50310437fe70f8c52d32549c7a5d723959e232fe0d070a21f27a0de47dd17286,2025-05-19T13:35:20.460000
|
||||
CVE-2025-22235,0,0,9096c227dda3418e3d7b103b041dc8b2cd855202b867daccc1ae1ca882f5e87f,2025-05-16T23:15:19.600000
|
||||
CVE-2025-22236,0,1,dbb7d3a02e1c6d6d2f684cbfdbbcb2430ac0f7e9d9f41812cc45c086eb186b9e,2025-06-13T14:15:19.323000
|
||||
CVE-2025-22237,0,1,db6f32966bfc17ee0f11f666363e02f870457734ae40bcd1b44e6cb1a9576688,2025-06-13T14:15:19.467000
|
||||
CVE-2025-22238,0,1,828c364242003eaf354a1faf07d2a48308c32d665a7d2f838c4c88b3a40f83fb,2025-06-13T14:15:19.610000
|
||||
CVE-2025-22239,0,1,b8e3232987f5bdeb114a6f1bb3eac05b37d07f2823e39c700952228ab1ff5e2b,2025-06-13T14:15:19.747000
|
||||
CVE-2025-22236,0,0,dbb7d3a02e1c6d6d2f684cbfdbbcb2430ac0f7e9d9f41812cc45c086eb186b9e,2025-06-13T14:15:19.323000
|
||||
CVE-2025-22237,0,0,db6f32966bfc17ee0f11f666363e02f870457734ae40bcd1b44e6cb1a9576688,2025-06-13T14:15:19.467000
|
||||
CVE-2025-22238,0,0,828c364242003eaf354a1faf07d2a48308c32d665a7d2f838c4c88b3a40f83fb,2025-06-13T14:15:19.610000
|
||||
CVE-2025-22239,0,0,b8e3232987f5bdeb114a6f1bb3eac05b37d07f2823e39c700952228ab1ff5e2b,2025-06-13T14:15:19.747000
|
||||
CVE-2025-2224,0,0,a251902d7a3f4027222d02a92ceecc551380ed3d87526ebb058f0bdbf9a04b21,2025-03-27T16:45:46.410000
|
||||
CVE-2025-22240,0,1,af29f0df6cdc720e01fa31c02d21fefaf97e9808c7c3c6d48054b8948bbc5d45,2025-06-13T14:15:19.893000
|
||||
CVE-2025-22240,0,0,af29f0df6cdc720e01fa31c02d21fefaf97e9808c7c3c6d48054b8948bbc5d45,2025-06-13T14:15:19.893000
|
||||
CVE-2025-22241,0,0,5f9646794e52bdbc3f490b3330e1f9c68ea5ffdfa0df29aae7c5e61961ca5b57,2025-06-13T07:15:21.567000
|
||||
CVE-2025-22242,0,0,b8a6fb1b6e8de9a5a97438f1176658027665c59502c2549ed9c21537b7ef446a,2025-06-13T07:15:21.710000
|
||||
CVE-2025-22243,0,0,5f41737989264b2994eac99e02c12b9f81310f29baab0cf31082285d453e8c22,2025-06-05T20:12:23.777000
|
||||
@ -286226,7 +286226,7 @@ CVE-2025-22938,0,0,e6807abe137e5b2b47b5ff4158bb661bb62a642f14207093ac8ab43630389
|
||||
CVE-2025-22939,0,0,a81a8c19b454bc9c8043ab6bf7f335372876b8c96ac868e5e90252d024cd56ee,2025-06-12T20:50:44.883000
|
||||
CVE-2025-2294,0,0,1a05467c41eb5981388eaf0b9197f5e7cd9d05937d25f388597e1f34f296e807,2025-03-28T18:11:40.180000
|
||||
CVE-2025-22940,0,0,d97dc2eae3e26fb6624010719f59be6d0b5ca1761f6c260f5028360d669673d5,2025-04-01T20:26:22.890000
|
||||
CVE-2025-22941,0,0,5c314b5cce5a97ff5f95a7de2c69a40ec47fb2a9f0d215e48b7dc301ebe60431,2025-04-01T20:26:22.890000
|
||||
CVE-2025-22941,0,1,6cb077c28cfd3700f1de179829e4cce0a5c3eb1cd11f2b4f0c92951cfc0dd92b,2025-06-13T16:22:57
|
||||
CVE-2025-22946,0,0,8f60ec518577214b45229d7545a35c55879825b19b6c253aab60d563104c0dd8,2025-04-09T18:35:44.810000
|
||||
CVE-2025-22949,0,0,0a7be0866c6b82c18c7c0f13e28a95eb01b8c6d66c113ff800e86b319df10485,2025-04-09T18:36:01.027000
|
||||
CVE-2025-2295,0,0,5afd41ba1c620aa8b1c09ed9d5c8905d7597b06ca6637c246ba28374bca35eb0,2025-03-14T22:15:11.600000
|
||||
@ -286340,7 +286340,7 @@ CVE-2025-23100,0,0,46b37fe2c3228425bf3c04fe972bc0cdefe57e7dc18dacde4550fc6f81a56
|
||||
CVE-2025-23101,0,0,f160545d41ff89f0e2bf53610ce461ba6724caf22d0b5475f217a36457647ba5,2025-06-11T18:56:06.930000
|
||||
CVE-2025-23102,0,0,49abde4781c7970c0963b4225909dbd07917e4ed564029a579d5c8c20b131ddd,2025-06-10T20:07:12.893000
|
||||
CVE-2025-23103,0,0,af7de4223ee48e5d5418763433d6687e1e0444809ae878b4ad8a4335b22ba78e,2025-06-06T18:49:19.250000
|
||||
CVE-2025-23104,0,0,5a4215e79ac958e04815e0d83cdbdc0822de3272f45b4d0aea0c06e194c03746,2025-06-09T14:15:22.403000
|
||||
CVE-2025-23104,0,1,3afd1a0a4ba827e9038f4e466775cf04bc07954c48fd413d8e941185a35a889a,2025-06-13T17:46:36.533000
|
||||
CVE-2025-23105,0,0,0cfe1826e7f6e2704ce0e8c0045a2d064cd7652071b287e953f8c489e8a22a74,2025-06-04T14:54:33.783000
|
||||
CVE-2025-23106,0,0,455bafa176b8cc42b3f4fddb1f1700de46399377a04a2ee53ab833bb2e61e5b7,2025-06-11T18:54:42.973000
|
||||
CVE-2025-23107,0,0,473e9f3950324060da83c2e03546f7606cb24c446ae5eb77e417a460d4770978,2025-06-06T18:49:12.190000
|
||||
@ -288568,8 +288568,8 @@ CVE-2025-26009,0,0,8f7f210f0d6391dc793746a507475487d34df96ad5f97137cea8c79aa3fd6
|
||||
CVE-2025-2601,0,0,b2f2bc957bad364409e842d81b3bbb7a2d8ffe3aa3bf35cd41e278f677537515,2025-05-14T21:18:48.637000
|
||||
CVE-2025-26010,0,0,cf5a04d9860ec5e77e2e34e26dd6be3079064fe7b613efd3b5c093d4f0e21516,2025-04-01T16:33:40.410000
|
||||
CVE-2025-26011,0,0,7d295bbc36362f782172277753f7e055d256a1db3b7bed76509ca8e09eca8473,2025-04-01T15:42:54.437000
|
||||
CVE-2025-26013,0,0,40734f6d8ee5bc23e3bb6d3f316f5ff417211c76e3bd05950ea58ed84cc035a5,2025-02-21T21:15:24.470000
|
||||
CVE-2025-26014,0,0,f214b17d5a22324a838383615ccbc65f42d977244cb293df71aa8e2b4b792ab3,2025-04-17T16:15:34.477000
|
||||
CVE-2025-26013,0,1,f40ce2fe75f7e5fe576fe0336055aea99ffde70101935fe9e09815b8d87995a4,2025-06-13T16:03:12.363000
|
||||
CVE-2025-26014,0,1,55f4f76205f070f91a94c396d3e4534aea6f94fd77d914a86f6c8d7024002e36,2025-06-13T16:00:56.813000
|
||||
CVE-2025-2602,0,0,55184d4444cf6fcb654297213a71fd82f15a6409f468fa51c940547b67d87704,2025-05-14T21:18:56.027000
|
||||
CVE-2025-2603,0,0,625b00c9525209b5099994d377f6407402ebb3e82c4e2dce028f1396925733cd,2025-04-01T20:28:42.917000
|
||||
CVE-2025-2604,0,0,209dc94fc4ece561b20c49ebedaf1fa67845d362ce425198a9d48be9814fba65,2025-04-01T20:26:24.393000
|
||||
@ -289863,8 +289863,8 @@ CVE-2025-27937,0,0,46e59abc87395fad933022253638fee740418314c08fa44c43852bb835ed4
|
||||
CVE-2025-27938,0,0,bf71cc20089ab7c31af5546076ba78a2d82abe6a041a4a3a3ccbdca3b4c0c117,2025-04-16T13:25:59.640000
|
||||
CVE-2025-27939,0,0,62ad4faad8f2ae97298e92fdca3809e2a8391141ef6e47b0825e7d4aff3fc3a9,2025-04-16T13:25:59.640000
|
||||
CVE-2025-2794,0,0,b6c5052929166b2fdf6e3c269a20ead353e60c001082fefc35ed2b51aad72541,2025-04-01T20:26:22.890000
|
||||
CVE-2025-27953,0,0,bbd1e72d5b15b75fe7ef006002f7b1c0e63667796301a844910133745b8912a5,2025-06-04T14:54:53.980000
|
||||
CVE-2025-27954,0,0,6b8d322652df09b5b2dbc4bfc11bc0654d3e25850d0018081e344e4aff72dae8,2025-06-04T16:15:35.770000
|
||||
CVE-2025-27953,0,1,f48e5eb368965a09e5cec3e2f9ad987d5a3179ee9886989bc065a7f4aac22db2,2025-06-13T17:52:01.717000
|
||||
CVE-2025-27954,0,1,a6640143c58c7f0579a3ef9e2925938e49f98c8805c146a9042b42a7de0e1041,2025-06-13T17:53:04.447000
|
||||
CVE-2025-27955,0,0,de6e670ad498a5c71c83e1f0db7a8a75a0c45230e9af658462383b36bffafdf5,2025-06-04T16:15:35.930000
|
||||
CVE-2025-27956,0,0,d55a7b54ffbb480d5dca0bcbefc32df202fac276d1c366d1805bd881a6fc642d,2025-06-04T14:54:53.980000
|
||||
CVE-2025-2796,0,0,53e1f7c20777e5a56703d611323bf74e7aea306b658a5fd01e0390cfe50e5f4f,2025-05-28T15:01:30.720000
|
||||
@ -289926,7 +289926,7 @@ CVE-2025-28093,0,0,29a5b3080e3cbf963755de2e44da431efef91255ecccdc5fdce85267962b8
|
||||
CVE-2025-28094,0,0,43b699593b6066edfc5dc99b07a87e6aa9cb43db61462f8282257bc196f89aa1,2025-04-07T14:09:44.973000
|
||||
CVE-2025-28096,0,0,35d4134d78905af0129462be767cef757b9b22ca399b6d6ee9e18c61774ffdf3,2025-04-07T14:00:57.987000
|
||||
CVE-2025-28097,0,0,6168db1fe1d777fd2d394c22e9d594177390d1d2e476a2272a9ebd5e94287f26,2025-04-07T13:59:18.590000
|
||||
CVE-2025-28099,0,1,c9c7c1d5f2ef23ae8afe0efdf15d6b98c1d7246b1707b7dade78a5c132cd239e,2025-06-13T15:18:08.250000
|
||||
CVE-2025-28099,0,0,c9c7c1d5f2ef23ae8afe0efdf15d6b98c1d7246b1707b7dade78a5c132cd239e,2025-06-13T15:18:08.250000
|
||||
CVE-2025-28100,0,0,47615e085b89dc6af9340e37a1268b38c4739fdcdad9b7a5d078e2055be1f054,2025-04-22T17:54:47.210000
|
||||
CVE-2025-28101,0,0,0f86f2850fd962837a135afcbd92f387d72c4c75bd19f965545a2702eace95f6,2025-04-23T19:03:51.237000
|
||||
CVE-2025-28102,0,0,bb22996fe7772eaf42d446062afc7bbcb989b55312593ee64c6759c7d31fc886,2025-04-23T14:08:13.383000
|
||||
@ -289995,13 +289995,13 @@ CVE-2025-28367,0,0,4a07d437818fe7720795b8f309552d71415612c2033b36795a35ab5455779
|
||||
CVE-2025-2837,0,0,b89aeb2a53f8a50fdc7d1cb971618f78d6548d3dfb914df0b41cb0d9a2a5f82a,2025-03-27T16:45:27.850000
|
||||
CVE-2025-28371,0,0,9134c0b29ad829ee44935d8e974e7c73f0d8c01267cd2682d218b45eeaf0a178,2025-06-12T16:26:26.253000
|
||||
CVE-2025-2838,0,0,ad5519332c14610c417f2ebe0957fac238c08deca06808872c71584919e4dfa3,2025-03-27T16:45:27.850000
|
||||
CVE-2025-28380,1,1,23247cc5b8b71eb021f52bc527b84c9e76321cc685b352c6b9a5086bc52cb2c8,2025-06-13T14:15:20.030000
|
||||
CVE-2025-28381,1,1,88c033b3c7986e3e9b8b3ebe7ed89d82083a26177c80b50560e93131888afd8d,2025-06-13T14:15:20.177000
|
||||
CVE-2025-28382,1,1,ae77e3b4096b42c852587f60023ee9556a5e91831288834e65bea057c3bc1651,2025-06-13T14:15:20.440000
|
||||
CVE-2025-28384,1,1,534f2b9e80a8901e83d20c9e9c6af8d0c5a429d18909ed67a5ede595204be569,2025-06-13T14:15:20.590000
|
||||
CVE-2025-28386,1,1,ef8702069c2f027a92b50e4914636e7631785cdbf48dc34254c8a832b215251d,2025-06-13T14:15:20.713000
|
||||
CVE-2025-28388,1,1,a135b80ca3687db3dc9c98272693fb395d1e0f63bb84ccad9d90a9b3721a68f4,2025-06-13T14:15:20.883000
|
||||
CVE-2025-28389,1,1,129d37b73bf546127ba5a09c2d88ee5f90e77d5418598b6eca029d12e5a4c423,2025-06-13T14:15:21.010000
|
||||
CVE-2025-28380,0,0,23247cc5b8b71eb021f52bc527b84c9e76321cc685b352c6b9a5086bc52cb2c8,2025-06-13T14:15:20.030000
|
||||
CVE-2025-28381,0,1,39b7cc899f9c111fc1c462db749276045ab89748c7ae3428b15001fa97ee1759,2025-06-13T16:15:25.227000
|
||||
CVE-2025-28382,0,0,ae77e3b4096b42c852587f60023ee9556a5e91831288834e65bea057c3bc1651,2025-06-13T14:15:20.440000
|
||||
CVE-2025-28384,0,0,534f2b9e80a8901e83d20c9e9c6af8d0c5a429d18909ed67a5ede595204be569,2025-06-13T14:15:20.590000
|
||||
CVE-2025-28386,0,0,ef8702069c2f027a92b50e4914636e7631785cdbf48dc34254c8a832b215251d,2025-06-13T14:15:20.713000
|
||||
CVE-2025-28388,0,1,0efe3f826c7b8b3aad9492d5d491ce127b3ddb1193b5d8746d93fb8e640fe979,2025-06-13T16:15:25.387000
|
||||
CVE-2025-28389,0,1,82823d94eb606d5aab985c92ed7cf6d86d72b178cc5a4493aee3ed383b0ff367,2025-06-13T16:15:25.550000
|
||||
CVE-2025-2839,0,0,b5f50833ae89a723232ee09a371d928add8cd2f82f45ae4596cf5961719812f4,2025-04-23T14:08:13.383000
|
||||
CVE-2025-28395,0,0,e2a008eff6d871d94e498e18fdcd7ec1a8104377f0bfd0c36d8d69a8cfbea062,2025-04-15T12:52:46.433000
|
||||
CVE-2025-28398,0,0,a80aa3350f7ebc843f0b185d49e6b66d7edf0d8201a54a2ee3a02548dd1b1270,2025-04-15T12:51:12.750000
|
||||
@ -293440,7 +293440,7 @@ CVE-2025-3618,0,0,304b127c053921d914e116b0c3d51c4ee5b2fd33efb8ce7a0d299de12188b5
|
||||
CVE-2025-3619,0,0,d6505a8fbe042bc57caae6de787bee69f36be813ff60b26db9609f14022d6c10,2025-04-23T18:12:45.323000
|
||||
CVE-2025-3620,0,0,fac1ac0d011a3ca6c7407b0f1dd2c7aa4f0d27161282923069a13fa36620f271,2025-04-23T18:11:43.153000
|
||||
CVE-2025-3622,0,0,6b7db9933e6b248f0000367113483a5e806bad53678214380c37af6b793ac885,2025-04-15T18:39:27.967000
|
||||
CVE-2025-3623,0,1,617cffe0141337c7867deb96e2a7d70a856c2a880b7f99e53e2fda3baeae607b,2025-06-13T14:15:21.147000
|
||||
CVE-2025-3623,0,0,617cffe0141337c7867deb96e2a7d70a856c2a880b7f99e53e2fda3baeae607b,2025-06-13T14:15:21.147000
|
||||
CVE-2025-3624,0,0,7ed4cd410ce03398fb8e34cfd1d803d6ee7ef277c76293f0adef5df6e973fd9d,2025-05-16T14:42:18.700000
|
||||
CVE-2025-3625,0,0,d6561c041e4acba7ed90c8d98fbb347b5dba3a1ddd62ef69a31db98635660ea5,2025-04-29T13:52:28.490000
|
||||
CVE-2025-3627,0,0,302bdecab936e184f9bf4ca731ff6de1e144d2e255e7d1f3a730e3c71cb62588,2025-04-29T13:52:28.490000
|
||||
@ -293487,8 +293487,8 @@ CVE-2025-3661,0,0,dd52ef0b5adcc429dab993fa8b0a07866db488604856f931ffdf953b111b04
|
||||
CVE-2025-3662,0,0,3e1dd0745f4aafb27713ee2b3d9daccf1be19770e4b95d3787e2f2ca8d2c3c07,2025-06-05T14:09:58.017000
|
||||
CVE-2025-36625,0,0,45de53deee0dce100ce8c109fcd29d898f18f9e0ae3fd1f38ff75bfff7ae47fe,2025-04-21T14:23:45.950000
|
||||
CVE-2025-3663,0,0,8e1f6f32c25b3b8d1ec3b3a3f1e13e7a7d56fd1e7c8e37fb37a5c673e5d21e5b,2025-05-12T19:50:03.073000
|
||||
CVE-2025-36631,1,1,8e43299b1a01b44d6c1d55f857781480094134c0c9d979f60d21984f36707970,2025-06-13T15:15:19.627000
|
||||
CVE-2025-36633,1,1,d18a02d0f0f971ff43946df3f6f567c8e2d6332a29da376569706a2a73786c3c,2025-06-13T15:15:20.183000
|
||||
CVE-2025-36631,0,0,8e43299b1a01b44d6c1d55f857781480094134c0c9d979f60d21984f36707970,2025-06-13T15:15:19.627000
|
||||
CVE-2025-36633,0,0,d18a02d0f0f971ff43946df3f6f567c8e2d6332a29da376569706a2a73786c3c,2025-06-13T15:15:20.183000
|
||||
CVE-2025-3664,0,0,8622093c787fd6e9e1b160486bb91e2aaa36ebec298b1306944080b7ed6d8600,2025-04-22T16:53:30.190000
|
||||
CVE-2025-3665,0,0,78418ed087f4c6d368331a8d9052902c502665982824123068b1a33cdb306774,2025-04-22T16:54:19.520000
|
||||
CVE-2025-3666,0,0,dfe48caac00032cb0762e3ed3443fb6db6489e0b4c74cf8f9509f4e75c167ddb,2025-05-12T19:49:52.043000
|
||||
@ -294967,10 +294967,10 @@ CVE-2025-44073,0,0,682d7dbf7db857e708c67e0917ba715c71ef5bc25a4925c433f4eaf10db8c
|
||||
CVE-2025-44074,0,0,a07abf1517695aa7f067711dbd8501cec1c1dac19368b70ce83f8cc0a4c96967,2025-05-13T20:05:29.563000
|
||||
CVE-2025-44083,0,0,9046793f34bd6f929b6235055941a80a823b0cd56db66235de77c34aa9f0f37d,2025-06-03T13:52:39.333000
|
||||
CVE-2025-44084,0,0,9e514baa1a1b4ecd455bdc468a519f4662e489440f358688b169a12eb8124052,2025-05-30T16:19:21.193000
|
||||
CVE-2025-44091,0,0,131dbd4bb169d0f84a4c2428b2429058df00d5bc5a27a13a6e24301e6f26007b,2025-06-12T21:15:21.347000
|
||||
CVE-2025-44091,0,1,d8cf7f956cd5564dd70feef953c0451bcabcf253729ed155e4e3cb48c2fc6640,2025-06-13T16:15:25.863000
|
||||
CVE-2025-44108,0,0,7f74cb8563a8e2b89a17733e62268b2a8dcb711594c4c578db48bdedf50f42d6,2025-06-12T16:26:10.203000
|
||||
CVE-2025-44110,0,0,40655c12d535de96e9af0530c97aab6193addb0ec4d9bc7565ff96634b123dda,2025-06-12T13:56:06.197000
|
||||
CVE-2025-44115,0,0,d990fe7228f0dbe35841148aa572f913a3a82f4880f65057c40ef3edd4ebd7bc,2025-06-02T20:15:22.637000
|
||||
CVE-2025-44115,0,1,f4048a768a9c3bfb169ae566f384c1b85dd60f51eddb9136d8a89bd9c2a57faa,2025-06-13T17:21:25.870000
|
||||
CVE-2025-4412,0,0,8c8c59397117a84a167d36fb79f68c5cd99b79261327a1fb082cf24faee6cc19,2025-05-28T15:01:30.720000
|
||||
CVE-2025-44134,0,0,45b85d904dd860695476948041d246707a0696d9dc7fe9b405a5e27a85d44980,2025-05-14T13:05:17.200000
|
||||
CVE-2025-44135,0,0,e8d32c865e9ccdb8b63503c21fad4c48843876d5709a3df063410109f034ccc9,2025-05-14T13:04:58.830000
|
||||
@ -295212,7 +295212,7 @@ CVE-2025-4552,0,0,78d43dd6fb452cd4c88c9ba8880aef53f1ef01b609cdfafec2c65ebbd9c2ca
|
||||
CVE-2025-45529,0,0,e167386bb5394c534585ea5a04f1a046eac90f4928a6eeb5d60ef274f5e67c1c,2025-05-28T15:01:30.720000
|
||||
CVE-2025-4553,0,0,cc42244e3fcc3fa0e4735902b7107755da4e8cf945b2a43e81a0e7fb4c007005,2025-05-16T17:08:50.060000
|
||||
CVE-2025-4554,0,0,689d20479ad000d274d22e94958c98af69dd587a0aebcdb180b3f5df25fbdcf6,2025-05-16T17:05:01.380000
|
||||
CVE-2025-45542,0,0,b39ed42a0e4c5c11d71518fd6553eed4ef45b45571d6a75edac0093585e5f57d,2025-06-03T16:15:25.397000
|
||||
CVE-2025-45542,0,1,8d78c8ce54cce28d25176b8f60395b493e3616afc4cda36b64936d5e7d008d28,2025-06-13T17:45:40.463000
|
||||
CVE-2025-4555,0,0,92efb70deec25d60ec902d20eaa6cf2a584d7395d53612a3fa2dc305d46a0586,2025-05-12T17:32:32.760000
|
||||
CVE-2025-4556,0,0,70e2f3738f440c4cbe1c4fc31d83071c8d6532a4954eceb08e26edbb4a06fb92,2025-05-12T17:32:32.760000
|
||||
CVE-2025-4557,0,0,923891368ba582855d183f0d5ed088d1956f49e0c8ca1b57be2ee3de81550700,2025-05-12T17:32:32.760000
|
||||
@ -295241,7 +295241,7 @@ CVE-2025-4574,0,0,a936e70ea81d08570f1b370d85f904e33ed32b85014f55e350943da2afdfcf
|
||||
CVE-2025-45746,0,0,4f739c19260013516117a27de71915ddd8b481653d1fe15c253a574b15da0223,2025-05-21T14:15:31.553000
|
||||
CVE-2025-4575,0,0,0624d6300232d42a9f90f1e62069c560ca8ea8d361bea47508069c55d62ec0b1,2025-05-23T15:55:02.040000
|
||||
CVE-2025-45751,0,0,de89d7eb563ced8140d03e3271409a0c1ca243ce5972ff6bb5c7d466a89cb054,2025-05-07T19:16:08.903000
|
||||
CVE-2025-45752,0,1,15ad999c256ffcdb41870752b943c0d97b29f8594b1a7d0a56cecab33b114d2c,2025-06-13T15:49:20.863000
|
||||
CVE-2025-45752,0,0,15ad999c256ffcdb41870752b943c0d97b29f8594b1a7d0a56cecab33b114d2c,2025-06-13T15:49:20.863000
|
||||
CVE-2025-45753,0,0,30657d89657a69d831b066e35506609b3d0fe532bff6b15754cd56eb0d90a508,2025-06-10T19:34:41.410000
|
||||
CVE-2025-45754,0,0,a302b00636684b408f789314fb369b31d357d4a411342b7876cf26fe121b9472,2025-05-21T20:24:58.133000
|
||||
CVE-2025-45755,0,0,6fe3262fee3e82261947590b30e342c111c5db410776b66947644241532cfec3,2025-06-10T19:34:54.193000
|
||||
@ -295297,11 +295297,11 @@ CVE-2025-45953,0,0,4ae22ace1fa79622bebb714ee3a1b2bc44139600b15fc188f0269a639daf2
|
||||
CVE-2025-45956,0,0,5c4c4370cebea5362e52ff80785ad75271a9ace1cfcc698a1fc7b6e2a3193f1f,2025-05-14T21:01:22.690000
|
||||
CVE-2025-4597,0,0,dcada8bd747b5d8fe51a3029b8ca767324f59d50104363211751e3771511674b,2025-05-30T16:31:03.107000
|
||||
CVE-2025-4598,0,0,0afb48f5d4beb8ba717edab0a2c1dbaaa02bcad15f4563ef46c0692744ec8051,2025-06-05T07:15:23.047000
|
||||
CVE-2025-45984,0,1,6b171784ee058d3e6808993969caed8226d4084a473bdfcb9f43fe773ed829f1,2025-06-13T15:15:20.423000
|
||||
CVE-2025-45985,0,1,8191aa43d73b19341a3f474123257e698140b7587a971313b35ab7996615e104,2025-06-13T15:15:20.580000
|
||||
CVE-2025-45986,0,1,bc063efdc5ad4cf314751c0d7053687531377bc8a0a36aa7aa9cf55ff009e950,2025-06-13T15:15:20.747000
|
||||
CVE-2025-45987,0,1,187f26ea2f3d7d1fa7ff833a4e9cda040ffd02f12136eabf150be87fb851c4df,2025-06-13T15:15:20.947000
|
||||
CVE-2025-45988,0,1,4401707d0ef8179814241362ac92378693bd31c525f3d07512b13045864312ec,2025-06-13T15:15:21.097000
|
||||
CVE-2025-45984,0,0,6b171784ee058d3e6808993969caed8226d4084a473bdfcb9f43fe773ed829f1,2025-06-13T15:15:20.423000
|
||||
CVE-2025-45985,0,0,8191aa43d73b19341a3f474123257e698140b7587a971313b35ab7996615e104,2025-06-13T15:15:20.580000
|
||||
CVE-2025-45986,0,0,bc063efdc5ad4cf314751c0d7053687531377bc8a0a36aa7aa9cf55ff009e950,2025-06-13T15:15:20.747000
|
||||
CVE-2025-45987,0,0,187f26ea2f3d7d1fa7ff833a4e9cda040ffd02f12136eabf150be87fb851c4df,2025-06-13T15:15:20.947000
|
||||
CVE-2025-45988,0,0,4401707d0ef8179814241362ac92378693bd31c525f3d07512b13045864312ec,2025-06-13T15:15:21.097000
|
||||
CVE-2025-45997,0,0,6427fb401720f5a1ec9f9ddb9a7287b863d0733096e213df5c6d6f0eb039c3d2,2025-06-09T18:53:36.927000
|
||||
CVE-2025-4600,0,0,026383a000ee9b132f9dd97af63a0401be9be3b21241dcdc822424d27f013326,2025-05-16T14:42:18.700000
|
||||
CVE-2025-4601,0,0,420ee2c846cf84b8070c3dfb7dddc6fbabb1090be5e1b7c4bf957aa0ce301eee,2025-06-12T16:06:39.330000
|
||||
@ -295313,11 +295313,11 @@ CVE-2025-46041,0,0,c6bcad8ca808cadc98009ed4cb5205d0538a9f9c0167900e290e14b436daa
|
||||
CVE-2025-4605,0,0,dd03f785e2fc8613696d02a4b9a63d6872b22992f27cd122b6503ea0ee189f65,2025-06-12T16:06:20.180000
|
||||
CVE-2025-46052,0,0,3024fe589e39f7170008b5c168c5578a4d86fe26344910133fdba56a4c51eb38,2025-06-12T13:19:06.093000
|
||||
CVE-2025-46053,0,0,cc1dee8d73635536f4f2cef7e3661b210bf2aa73e288776021aac13839576374,2025-06-12T13:12:25.303000
|
||||
CVE-2025-46060,0,0,5d02123267484ed4fadce9d90d5dc44c47b2bf6aac67f097a5569cf07e008f44,2025-06-13T13:15:21.187000
|
||||
CVE-2025-46060,0,1,4320533b89a2cc7bf2c8001b52d89389eaf59630bfc6e46bd9466bcd404d4934,2025-06-13T16:15:26.030000
|
||||
CVE-2025-4607,0,0,7929f7497a2f3fdbdefa5c40c24e8dfb722bcbca57929b42733b89c15e0bc1dd,2025-06-02T17:32:17.397000
|
||||
CVE-2025-46078,0,0,2fc8a269b5a28c0015e225ca3c3d8f64c503abc0c5a8ea5ce240137e0c4c6776,2025-06-04T19:59:09.353000
|
||||
CVE-2025-46080,0,0,e77557f865cb8f0c8a7b01f1f6fbdee1ca66bad8ebda2925b71b207a25112a43,2025-06-04T19:59:02.890000
|
||||
CVE-2025-46096,0,0,69a5f7e820479bcdf6f300bbb9b43926700871805d8303ba37f658d6fbba1fec,2025-06-13T13:15:21.710000
|
||||
CVE-2025-46096,0,1,81b4884face5e9f6263565f69b82a6c4c962e188f23086cd58a40a64c50976a9,2025-06-13T16:15:26.193000
|
||||
CVE-2025-4610,0,0,d61d953fe0fd6f0d2b21233839836df5133468380db75b47c2a05d78020b6b82,2025-05-19T13:35:20.460000
|
||||
CVE-2025-4611,0,0,551957ca30c77144066c2501102cbe8b5cc59e5d0e8959ef20d14b731299a950,2025-05-21T20:24:58.133000
|
||||
CVE-2025-4613,0,0,3590c372be8e2b7d0c55efde83c979e68177b14db7b7b8f8c25c3457b303607f,2025-06-12T16:06:20.180000
|
||||
@ -295859,19 +295859,19 @@ CVE-2025-46972,0,0,6c1022ed7462b7ffb3adcadfaa2249965de1d0662476b248a5bbf90b6f5b2
|
||||
CVE-2025-46973,0,0,8ec4589ff076d3a7a38666ea17f380feeb966f455cb99e7cb355f5789890cd55,2025-06-12T16:06:29.520000
|
||||
CVE-2025-46974,0,0,89a29de31928970500be797dd33638bbf8b7589ab8bdc06ac619788470950f49,2025-06-12T16:06:29.520000
|
||||
CVE-2025-46975,0,0,db250026b14c9a4396c20df56c259309af38ad43ba3537d5424d673fdf208ab2,2025-06-12T16:06:29.520000
|
||||
CVE-2025-46976,0,0,a40ac69987c3a0b86d819c3e022c1791aa80cd77c3125cc6851f798ba3106838,2025-06-12T16:06:29.520000
|
||||
CVE-2025-46977,0,0,dd291131872a6817b84ba246ed9d25bd8142761eaa2ef4bfc9a85946850275d3,2025-06-12T16:06:29.520000
|
||||
CVE-2025-46978,0,0,cfb562108aeb2bb74e777d599bc1c37ce595750756569d46011bae9a27a54050,2025-06-12T16:06:29.520000
|
||||
CVE-2025-46979,0,0,19f5f7900e66d978f8aeec401edf8371a04f65b4ff8ceea7a9ce6d06a22706cc,2025-06-12T16:06:29.520000
|
||||
CVE-2025-46976,0,1,e0bebf7a9ecd155ee459b645a576bb4c4a412e5a89b74aaead29a5299cd744e7,2025-06-13T17:29:49.670000
|
||||
CVE-2025-46977,0,1,dd0192cdaf141656ebfb7c277f4d8cab8527877cf27cfeb319e095536ad67775,2025-06-13T17:33:20.470000
|
||||
CVE-2025-46978,0,1,cc32f0eda916e17af59a22d63962890a1ded4646c37b392221f421f8bf98ab20,2025-06-13T17:41:41.383000
|
||||
CVE-2025-46979,0,1,3a361370cb3b462c1858237eb3bc6942ae2ea5f44ad70bd37d66dee160b91bd1,2025-06-13T17:44:35.590000
|
||||
CVE-2025-4698,0,0,629d6280fd3d3fe101760664e35242f9f6abe094cabf022cd7d827567767722a,2025-05-28T14:22:16.457000
|
||||
CVE-2025-46981,0,0,93105f711d93284c1ed7d2ab71e677065f7002088fcf10fd6c3b0eba2850ae58,2025-06-12T16:06:29.520000
|
||||
CVE-2025-46981,0,1,8ea206ca3c61530455b9360dea71f17fed4849c7b4fc801f00a17b049464bfed,2025-06-13T17:44:41.920000
|
||||
CVE-2025-46982,0,0,d3803de29452150058e270c2772bc2ac8e02c9b1cdbaf7a435913843cb151440,2025-06-12T16:06:29.520000
|
||||
CVE-2025-46983,0,1,d8b2c11077a2c15c9d1ea632801dd725b34566ea28446af1231775c03900eb59,2025-06-13T14:30:52.440000
|
||||
CVE-2025-46984,0,1,8a96c6283405b49327fdf63c9305583ea8d6f92231c9a26aafdf4b5dea9a26ef,2025-06-13T14:30:46.537000
|
||||
CVE-2025-46985,0,1,b7aafe1eda945998fead91b79c0050185879d1f38e20943c147ced11187c637c,2025-06-13T14:30:30.603000
|
||||
CVE-2025-46986,0,1,0b720a94ea5d38affec22263d5a9e16db2460f05e32acf3197baf2d50bfa7755,2025-06-13T14:30:11.690000
|
||||
CVE-2025-46987,0,1,b43b6fa21445769e94021eb5411604f5e442ce9c55a3fbd8b16d47861a68470c,2025-06-13T14:30:04.197000
|
||||
CVE-2025-46988,0,1,e1ecf207f4eec7395ec43223e98d455a19ef8bf2b592717062ef924ac573ec6c,2025-06-13T14:26:54.667000
|
||||
CVE-2025-46983,0,0,d8b2c11077a2c15c9d1ea632801dd725b34566ea28446af1231775c03900eb59,2025-06-13T14:30:52.440000
|
||||
CVE-2025-46984,0,0,8a96c6283405b49327fdf63c9305583ea8d6f92231c9a26aafdf4b5dea9a26ef,2025-06-13T14:30:46.537000
|
||||
CVE-2025-46985,0,0,b7aafe1eda945998fead91b79c0050185879d1f38e20943c147ced11187c637c,2025-06-13T14:30:30.603000
|
||||
CVE-2025-46986,0,0,0b720a94ea5d38affec22263d5a9e16db2460f05e32acf3197baf2d50bfa7755,2025-06-13T14:30:11.690000
|
||||
CVE-2025-46987,0,0,b43b6fa21445769e94021eb5411604f5e442ce9c55a3fbd8b16d47861a68470c,2025-06-13T14:30:04.197000
|
||||
CVE-2025-46988,0,0,e1ecf207f4eec7395ec43223e98d455a19ef8bf2b592717062ef924ac573ec6c,2025-06-13T14:26:54.667000
|
||||
CVE-2025-46989,0,0,77bf54aae4078dad031403f1bc73002c14f027a010e1601d2e93624f78640fbd,2025-06-12T16:06:29.520000
|
||||
CVE-2025-4699,0,0,8050368b263de08669c173a654994e653b6b74b6e1b034c43e19a012e2c34d52,2025-05-28T14:29:57.107000
|
||||
CVE-2025-46990,0,0,650dd4e8e79fc57160ef4db06cdb156f924c05e39b1c02226f928a3dcdd6b067,2025-06-12T16:06:29.520000
|
||||
@ -296533,7 +296533,7 @@ CVE-2025-48063,0,0,30768bd0b996f4003af001e4f1f93e88434b229ec5305143caf606aa28b95
|
||||
CVE-2025-48064,0,0,f30f6abfc706c8ec009b8e1646b8ce7a94ad294f1fc91f47ca51b619773ad0e0,2025-05-21T20:24:58.133000
|
||||
CVE-2025-48066,0,0,faea31f6567e989a0ef973c3f26a498ca723f84a2b80d40e0205222fbd185beb,2025-05-30T01:18:41.410000
|
||||
CVE-2025-48067,0,0,22969738b1365af0ae4410d8bd56f8dea0ca6b885ed0c705e09d5f2697dbeef5,2025-06-12T16:06:39.330000
|
||||
CVE-2025-48068,0,1,3adf8c4426528e9588d2fb1b989467e898314b1a84e0c17cf8e21dbda6ff768b,2025-06-13T15:15:21.300000
|
||||
CVE-2025-48068,0,0,3adf8c4426528e9588d2fb1b989467e898314b1a84e0c17cf8e21dbda6ff768b,2025-06-13T15:15:21.300000
|
||||
CVE-2025-48069,0,0,d201b903e106fd4e8e9a5c16c5ee97dd49fc9c17d0474c4fa89382c7bdd7010c,2025-05-21T20:24:58.133000
|
||||
CVE-2025-4807,0,0,38e0deb05d9d726281158918611fe40bc8b500e3135a018beac99acf23d735d4,2025-05-28T13:38:25.170000
|
||||
CVE-2025-48070,0,0,bed1805e46e1e55370ff9bc19da5a6d7e3c95e34134426c68a907b0b4c694440,2025-05-23T15:55:02.040000
|
||||
@ -296877,7 +296877,14 @@ CVE-2025-4891,0,0,ce5eadb58621294f252fd31aa2b4c3c08be14da6ad289e0467dbab1173f367
|
||||
CVE-2025-48910,0,0,b0802914093d2b8a5e0d094bc7d58f666a6ae381ef73fed402d6537c5ab4a23d,2025-06-06T14:07:28.330000
|
||||
CVE-2025-48911,0,0,d3230d9fd5ec3a98359dbbf269123ba96a632f8f634d15bc217e0ffc40994451,2025-06-06T14:07:28.330000
|
||||
CVE-2025-48912,0,0,4848d33489117f53b877c948399935df619e976eec472273191f1ca26ec7244c,2025-06-04T18:29:44.323000
|
||||
CVE-2025-48914,1,1,1249dd63a69dfa615bdbac81bcb59663551a90c10e1c48c3ca6651a199a51f69,2025-06-13T16:15:26.457000
|
||||
CVE-2025-48915,1,1,cc5391eff99330511e5b7e8f5f551c790c9cf990adb2b38de00b9d5abd658b02,2025-06-13T16:15:26.580000
|
||||
CVE-2025-48916,1,1,29f7e83b9af2845ed52e45443920e3ba10ffd21ec1b67186918f75a08dab0ed2,2025-06-13T16:15:26.790000
|
||||
CVE-2025-48917,1,1,2b3ea003e3fbb5ea17e7efb6714a05219e09023a587775e2361e2cf00bba1391,2025-06-13T17:15:21.713000
|
||||
CVE-2025-48918,1,1,723e627a849ec44816c08b9cad05f12081a13a99927b424c2a2c2d30ba25d64b,2025-06-13T16:15:27.053000
|
||||
CVE-2025-48919,1,1,9f844d9b572b0a73a73e3a24a2d73e4b4f1070512b4cd3f693eaf76a5374b071,2025-06-13T17:15:22.757000
|
||||
CVE-2025-4892,0,0,002d5f2a93da7cbbf0db54aa5606cb91f8377f6151252d2e3edadf3dcfd06185,2025-05-28T15:32:12.643000
|
||||
CVE-2025-48920,1,1,c59f2722462d21af36e20909bd4c548923faf7d3d085c6a8d3437408e2d660b6,2025-06-13T16:15:27.293000
|
||||
CVE-2025-48925,0,0,21a2cb4f4a9620e34d454c14028a00f2b70dc9544a21aca3383488609c689c05,2025-05-29T14:29:50.247000
|
||||
CVE-2025-48926,0,0,7c30f38d95fc987bd6e8852b968a55a7e51032b7c79b54853568428b8d32ecb1,2025-05-29T14:29:50.247000
|
||||
CVE-2025-48927,0,0,709ff3b5cba6df23c4ebbabd98b2844e61f0bb8547f17efd794502cb0ceeec47,2025-05-29T14:29:50.247000
|
||||
@ -297147,6 +297154,10 @@ CVE-2025-49576,0,0,b2723fb22aa5829f0ce429477c76e5b4be58d4daa1264d569175497beaf60
|
||||
CVE-2025-49577,0,0,bb68f9188472bd2017df69d95e02b7aa5a3a083734396feae9ea2615cb3b51c9,2025-06-12T19:15:20.463000
|
||||
CVE-2025-49578,0,0,288e8c183178acc5000ab891a16029574d6b0212d2674d2101b8418a15ffe81e,2025-06-12T19:15:20.610000
|
||||
CVE-2025-49579,0,0,67dec54330923f2fe11ef6954e0aba932cb47f64147fc09d7fdbce3390833989,2025-06-12T19:15:20.750000
|
||||
CVE-2025-49580,1,1,447e61071a03e5ffc7cd650d9ab130ef5607bb2773b532b44ceeb795ebb4dc4f,2025-06-13T16:15:27.417000
|
||||
CVE-2025-49581,1,1,ef451a72858a865aa49086653e770f6c7c0527c9925847d4c7ffeac26da353c6,2025-06-13T16:15:27.570000
|
||||
CVE-2025-49582,1,1,c9a93ca35303928b2d50696bb46adb9e0493e475da93b14ee8eade13d6db5a71,2025-06-13T17:15:23.180000
|
||||
CVE-2025-49583,1,1,38ffd40f78f3e608242c33f8c493cd99aac26207ac245f95bee02c19e5b96fdd,2025-06-13T17:15:23.390000
|
||||
CVE-2025-49589,0,0,6e39ca9502db96dca38042ca3660dd277813c58c5c4d372f028b81d7ad7dd16c,2025-06-12T21:15:21.480000
|
||||
CVE-2025-49599,0,0,cd0748db942732a0e968c564ce05d560bd51611e52e8cb06dc26ca9e65d8d9b0,2025-06-09T16:15:46.830000
|
||||
CVE-2025-49619,0,0,bf456b7c74aaa6eab01b4c779d57de166fafc9ff7198338c147fed153e2c86a7,2025-06-09T16:15:46.937000
|
||||
@ -297894,6 +297905,8 @@ CVE-2025-6008,0,0,bdfd3cc3e4441917f3e7587cffe8368d1b175ba60e9dbe2f7dbae2a1b2f944
|
||||
CVE-2025-6009,0,0,45d2cd3c349eec086d7dbf8e5d3677c0ad4a90d0009e476cec317ccc54ba0f3a,2025-06-12T16:06:20.180000
|
||||
CVE-2025-6012,0,0,85bb11daadd2c9711de1e56ddc8b0e0022d882d1b7428575f169e5e84f349018,2025-06-13T08:15:19.507000
|
||||
CVE-2025-6021,0,0,d8cb911042c78ed7473b58fa173a0ecc04974b2be82b9747683ed0cea25a5aba,2025-06-12T16:06:20.180000
|
||||
CVE-2025-6029,1,1,0a7d097872a3743dce758382e23d64ef6427ff251b4a0e0984b49fe00ded11c1,2025-06-13T15:15:21.430000
|
||||
CVE-2025-6030,1,1,971340cab3989d6f103f455b80ce687f5365decc2b747d306ee807e98b81854a,2025-06-13T15:15:21.600000
|
||||
CVE-2025-6029,0,0,0a7d097872a3743dce758382e23d64ef6427ff251b4a0e0984b49fe00ded11c1,2025-06-13T15:15:21.430000
|
||||
CVE-2025-6030,0,0,971340cab3989d6f103f455b80ce687f5365decc2b747d306ee807e98b81854a,2025-06-13T15:15:21.600000
|
||||
CVE-2025-6031,0,0,f55877d9a515055d82923e15e107b73e885b2a97ca1430544a245162a02b6450,2025-06-12T20:15:22.450000
|
||||
CVE-2025-6035,1,1,07dd0ef801ecdc5affcaf0e86947bc44410ec1004ed310d74f8d9a296fc9d5aa,2025-06-13T16:15:28.067000
|
||||
CVE-2025-6052,1,1,d6d0e5e14eb20ceb0c3bc2cb2793ad0094d53a851be1a17d6cfc808d70a5cddb,2025-06-13T16:15:28.230000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user