mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-08 03:27:17 +00:00
Auto-Update: 2025-02-24T23:00:29.175028+00:00
This commit is contained in:
parent
ae08ba54a7
commit
dc646d78ad
@ -2,94 +2,15 @@
|
||||
"id": "CVE-2024-13636",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2025-02-18T11:15:10.143",
|
||||
"lastModified": "2025-02-21T15:21:17.950",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2025-02-24T22:15:11.277",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Brooklyn theme for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 4.9.9.2 via deserialization of untrusted input in the ot_decode function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to inject a PHP Object. No known POP chain is present in the vulnerable software, which means this vulnerability has no impact unless another plugin or theme containing a POP chain is installed on the site. If a POP chain is present via an additional plugin or theme installed on the target system, it may allow the attacker to perform actions like delete arbitrary files, retrieve sensitive data, or execute code depending on the POP chain present."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El tema de Brooklyn para WordPress es vulnerable a la inyecci\u00f3n de objetos PHP en todas las versiones hasta 4.9.9.2 incluida, mediante la deserializaci\u00f3n de la entrada no confiable en la funci\u00f3n OT_Decode. Esto hace posible que los atacantes autenticados, con acceso a nivel de suscriptor y superior, inyecten un objeto PHP. No hay una cadena POP conocida en el software vulnerable, lo que significa que esta vulnerabilidad no tiene impacto a menos que se instale otro complemento o tema que contenga una cadena POP en el sitio. Si hay una cadena POP presente a trav\u00e9s de un complemento o tema adicional instalado en el destino sistema, puede permitir al atacante realizar acciones como eliminar archivos arbitrarios, recuperar datos confidenciales o ejecutar c\u00f3digo dependiendo de la cadena POP presente."
|
||||
"value": "Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2024-24926. Reason: This candidate is a reservation duplicate of CVE-2024-24926. Notes: All CVE users should reference CVE-2024-24926 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-502"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:unitedthemes:brooklyn:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "4.9.9.3",
|
||||
"matchCriteriaId": "9EDE880E-D7F6-46EE-BD0C-9F674615A525"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://themeforest.net/item/brooklyn-responsive-multipurpose-wordpress-theme/6221179",
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://unitedthemes.com/changelog/",
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/50cc3bd5-91ee-4b57-8159-60dd700375f3?source=cve",
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
21
CVE-2024/CVE-2024-576xx/CVE-2024-57608.json
Normal file
21
CVE-2024/CVE-2024-576xx/CVE-2024-57608.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-57608",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-24T22:15:22.157",
|
||||
"lastModified": "2025-02-24T22:15:22.157",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue in Via Browser 6.1.0 allows a a remote attacker to execute arbitrary code via the mark.via.Shell component."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Zkplo/AppVulHub/blob/main/mark.via.Shell/CWE-94.md",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2025/CVE-2025-255xx/CVE-2025-25513.json
Normal file
21
CVE-2025/CVE-2025-255xx/CVE-2025-25513.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2025-25513",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-24T22:15:22.807",
|
||||
"lastModified": "2025-02-24T22:15:22.807",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Seacms <=13.3 is vulnerable to SQL Injection in admin_members.php."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Colorado-all/cve/blob/main/seacms/seacms%20V13.3-sql-1.md",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2025/CVE-2025-265xx/CVE-2025-26533.json
Normal file
60
CVE-2025/CVE-2025-265xx/CVE-2025-26533.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2025-26533",
|
||||
"sourceIdentifier": "patrick@puiterwijk.org",
|
||||
"published": "2025-02-24T21:15:11.057",
|
||||
"lastModified": "2025-02-24T21:15:11.057",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An SQL injection risk was identified in the module list filter within course search."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "patrick@puiterwijk.org",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.1,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "patrick@puiterwijk.org",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-84271",
|
||||
"source": "patrick@puiterwijk.org"
|
||||
},
|
||||
{
|
||||
"url": "https://moodle.org/mod/forum/discuss.php?d=466150",
|
||||
"source": "patrick@puiterwijk.org"
|
||||
}
|
||||
]
|
||||
}
|
76
CVE-2025/CVE-2025-271xx/CVE-2025-27137.json
Normal file
76
CVE-2025/CVE-2025-271xx/CVE-2025-27137.json
Normal file
@ -0,0 +1,76 @@
|
||||
{
|
||||
"id": "CVE-2025-27137",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-02-24T21:15:11.213",
|
||||
"lastModified": "2025-02-24T21:15:11.213",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Dependency-Track is a component analysis platform that allows organizations to identify and reduce risk in the software supply chain. Dependency-Track allows users with the `SYSTEM_CONFIGURATION` permission to customize notification templates. Templates are evaluated using the Pebble template engine. Pebble supports an `include` tag, which allows template authors to include the content of arbitrary files upon evaluation. Prior to version 4.12.6, users of Dependency-Track with the `SYSTEM_CONFIGURATION` permission can abuse the `include` tag by crafting notification templates that `include` sensitive local files, such as `/etc/passwd` or `/proc/1/environ`. By configuring such a template for a notification rule (aka \"Alert\"), and having it send notifications to a destination controlled by the actor, sensitive information may be leaked. The issue has been fixed in Dependency-Track 4.12.6. In fixed versions, the `include` tag can no longer be used. Usage of the tag will cause template evaluation to fail. As a workaround, avoid assigning the `SYSTEM_CONFIGURATION` permission to untrusted users. The `SYSTEM_CONFIGURATION` permission per default is only granted to members of the `Administrators` team. Assigning this permission to non-administrative users or teams is a security risk in itself, and highly discouraged."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 4.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-73"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/DependencyTrack/dependency-track/pull/4684",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/DependencyTrack/dependency-track/pull/4685",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/DependencyTrack/dependency-track/security/advisories/GHSA-9582-88hr-54w3",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/JLLeitschuh/security-research/security/advisories/GHSA-p75g-cxfj-7wrx",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/PebbleTemplates/pebble/issues/680",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://pebbletemplates.io/wiki/tag/include",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
86
CVE-2025/CVE-2025-271xx/CVE-2025-27140.json
Normal file
86
CVE-2025/CVE-2025-271xx/CVE-2025-27140.json
Normal file
@ -0,0 +1,86 @@
|
||||
{
|
||||
"id": "CVE-2025-27140",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-02-24T22:15:22.913",
|
||||
"lastModified": "2025-02-24T22:15:22.913",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "WeGIA is a Web manager for charitable institutions. An OS Command Injection vulnerability was discovered in versions prior to 3.2.15 of the WeGIA application, `importar_dump.php` endpoint. This vulnerability could allow an attacker to execute arbitrary code remotely. The command is basically a command to move a temporary file, so a webshell upload is also possible. Version 3.2.15 contains a patch for the issue."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 10.0,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"vulnerableSystemConfidentiality": "HIGH",
|
||||
"vulnerableSystemIntegrity": "HIGH",
|
||||
"vulnerableSystemAvailability": "HIGH",
|
||||
"subsequentSystemConfidentiality": "HIGH",
|
||||
"subsequentSystemIntegrity": "HIGH",
|
||||
"subsequentSystemAvailability": "HIGH",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-78"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-284"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/LabRedesCefetRJ/WeGIA/commit/7d0df8c9a0b8b7d6862bbc23dc729d73e39672a1",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-xw6w-x28r-2p5c",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
86
CVE-2025/CVE-2025-271xx/CVE-2025-27141.json
Normal file
86
CVE-2025/CVE-2025-271xx/CVE-2025-27141.json
Normal file
@ -0,0 +1,86 @@
|
||||
{
|
||||
"id": "CVE-2025-27141",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-02-24T22:15:23.077",
|
||||
"lastModified": "2025-02-24T22:15:23.077",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Metabase Enterprise Edition is the enterprise version of Metabase business intelligence and data analytics software. Starting in version 1.47.0 and prior to versions 1.50.36, 1.51.14, 1.52.11, and 1.53.2 of Metabase Enterprise Edition, users with impersonation permissions may be able to see results of cached questions, even if their permissions don\u2019t allow them to see the data. If some user runs a question which gets cached, and then an impersonated user runs that question, then the impersonated user sees the same results as the previous user. These cached results may include data the impersonated user should not have access to. This vulnerability only impacts the Enterprise Edition of Metabase and not the Open Source Edition. Versions 1.53.2, 1.52.11, 1.51.14, and 1.50.36 contains a patch. Versions on the 1.49.X, 1.48.X, and 1.47.X branches are vulnerable but do not have a patch available, so users should upgrade to a major version with an available fix. Disabling question caching is a workaround for this issue."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:A/VC:N/VI:N/VA:N/SC:L/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 4.8,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "ACTIVE",
|
||||
"vulnerableSystemConfidentiality": "NONE",
|
||||
"vulnerableSystemIntegrity": "NONE",
|
||||
"vulnerableSystemAvailability": "NONE",
|
||||
"subsequentSystemConfidentiality": "LOW",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-732"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/metabase/metabase/security/advisories/GHSA-6cc4-h534-xh5p",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.metabase.com/docs/latest/configuring-metabase/caching",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.metabase.com/docs/latest/permissions/impersonation",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
43
README.md
43
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2025-02-24T21:00:43.964845+00:00
|
||||
2025-02-24T23:00:29.175028+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2025-02-24T20:15:34.180000+00:00
|
||||
2025-02-24T22:15:23.077000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,45 +33,26 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
282222
|
||||
282228
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `11`
|
||||
Recently added CVEs: `6`
|
||||
|
||||
- [CVE-2025-26525](CVE-2025/CVE-2025-265xx/CVE-2025-26525.json) (`2025-02-24T20:15:33.103`)
|
||||
- [CVE-2025-26526](CVE-2025/CVE-2025-265xx/CVE-2025-26526.json) (`2025-02-24T20:15:33.263`)
|
||||
- [CVE-2025-26527](CVE-2025/CVE-2025-265xx/CVE-2025-26527.json) (`2025-02-24T20:15:33.403`)
|
||||
- [CVE-2025-26528](CVE-2025/CVE-2025-265xx/CVE-2025-26528.json) (`2025-02-24T20:15:33.543`)
|
||||
- [CVE-2025-26529](CVE-2025/CVE-2025-265xx/CVE-2025-26529.json) (`2025-02-24T20:15:33.677`)
|
||||
- [CVE-2025-26530](CVE-2025/CVE-2025-265xx/CVE-2025-26530.json) (`2025-02-24T20:15:33.807`)
|
||||
- [CVE-2025-26531](CVE-2025/CVE-2025-265xx/CVE-2025-26531.json) (`2025-02-24T20:15:33.933`)
|
||||
- [CVE-2025-26532](CVE-2025/CVE-2025-265xx/CVE-2025-26532.json) (`2025-02-24T20:15:34.053`)
|
||||
- [CVE-2025-27112](CVE-2025/CVE-2025-271xx/CVE-2025-27112.json) (`2025-02-24T19:15:14.597`)
|
||||
- [CVE-2025-27133](CVE-2025/CVE-2025-271xx/CVE-2025-27133.json) (`2025-02-24T19:15:14.763`)
|
||||
- [CVE-2025-27364](CVE-2025/CVE-2025-273xx/CVE-2025-27364.json) (`2025-02-24T19:15:14.917`)
|
||||
- [CVE-2024-57608](CVE-2024/CVE-2024-576xx/CVE-2024-57608.json) (`2025-02-24T22:15:22.157`)
|
||||
- [CVE-2025-25513](CVE-2025/CVE-2025-255xx/CVE-2025-25513.json) (`2025-02-24T22:15:22.807`)
|
||||
- [CVE-2025-26533](CVE-2025/CVE-2025-265xx/CVE-2025-26533.json) (`2025-02-24T21:15:11.057`)
|
||||
- [CVE-2025-27137](CVE-2025/CVE-2025-271xx/CVE-2025-27137.json) (`2025-02-24T21:15:11.213`)
|
||||
- [CVE-2025-27140](CVE-2025/CVE-2025-271xx/CVE-2025-27140.json) (`2025-02-24T22:15:22.913`)
|
||||
- [CVE-2025-27141](CVE-2025/CVE-2025-271xx/CVE-2025-27141.json) (`2025-02-24T22:15:23.077`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `15`
|
||||
Recently modified CVEs: `1`
|
||||
|
||||
- [CVE-2018-25083](CVE-2018/CVE-2018-250xx/CVE-2018-25083.json) (`2025-02-24T20:15:31.150`)
|
||||
- [CVE-2021-3923](CVE-2021/CVE-2021-39xx/CVE-2021-3923.json) (`2025-02-24T20:15:31.777`)
|
||||
- [CVE-2022-2237](CVE-2022/CVE-2022-22xx/CVE-2022-2237.json) (`2025-02-24T20:15:31.973`)
|
||||
- [CVE-2022-3116](CVE-2022/CVE-2022-31xx/CVE-2022-3116.json) (`2025-02-24T19:15:12.707`)
|
||||
- [CVE-2022-48348](CVE-2022/CVE-2022-483xx/CVE-2022-48348.json) (`2025-02-24T19:15:14.043`)
|
||||
- [CVE-2022-48349](CVE-2022/CVE-2022-483xx/CVE-2022-48349.json) (`2025-02-24T19:15:14.227`)
|
||||
- [CVE-2023-21044](CVE-2023/CVE-2023-210xx/CVE-2023-21044.json) (`2025-02-24T20:15:32.190`)
|
||||
- [CVE-2023-21045](CVE-2023/CVE-2023-210xx/CVE-2023-21045.json) (`2025-02-24T20:15:32.380`)
|
||||
- [CVE-2023-21048](CVE-2023/CVE-2023-210xx/CVE-2023-21048.json) (`2025-02-24T20:15:32.620`)
|
||||
- [CVE-2024-10222](CVE-2024/CVE-2024-102xx/CVE-2024-10222.json) (`2025-02-24T19:43:57.037`)
|
||||
- [CVE-2024-13775](CVE-2024/CVE-2024-137xx/CVE-2024-13775.json) (`2025-02-24T19:04:52.170`)
|
||||
- [CVE-2024-45781](CVE-2024/CVE-2024-457xx/CVE-2024-45781.json) (`2025-02-24T19:15:14.423`)
|
||||
- [CVE-2024-57160](CVE-2024/CVE-2024-571xx/CVE-2024-57160.json) (`2025-02-24T19:38:22.867`)
|
||||
- [CVE-2024-57161](CVE-2024/CVE-2024-571xx/CVE-2024-57161.json) (`2025-02-24T19:38:43.083`)
|
||||
- [CVE-2025-1489](CVE-2025/CVE-2025-14xx/CVE-2025-1489.json) (`2025-02-24T19:45:21.653`)
|
||||
- [CVE-2024-13636](CVE-2024/CVE-2024-136xx/CVE-2024-13636.json) (`2025-02-24T22:15:11.277`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
60
_state.csv
60
_state.csv
@ -121411,7 +121411,7 @@ CVE-2018-25079,0,0,48685ce9847add0e1ab9b8fceec97ce7a120ddb8b1b4b09c009c856d198e6
|
||||
CVE-2018-25080,0,0,6c04fa6da42f79e635cc0cfe6f9f34c19609115b31e939d312cadffd27491508,2024-11-21T04:03:30.707000
|
||||
CVE-2018-25081,0,0,4806ebac23e887becfaf51184ce6d12d8c88b37f8b3dfc1b14c300e4e20c2294,2024-11-21T04:03:30.847000
|
||||
CVE-2018-25082,0,0,d7307469bd8b245316599e3552df8df9a48e8e1e76dbf66ac43e7bcba9fe864c,2024-11-21T04:03:31.080000
|
||||
CVE-2018-25083,0,1,74ba0756e5dafa541e4aaaaefcaefb10d8ede7ee35c986b20dfd74cd307530e8,2025-02-24T20:15:31.150000
|
||||
CVE-2018-25083,0,0,74ba0756e5dafa541e4aaaaefcaefb10d8ede7ee35c986b20dfd74cd307530e8,2025-02-24T20:15:31.150000
|
||||
CVE-2018-25084,0,0,9c184f17da7aafecde9ed5052529315a36ee449d7077376af8b33a2cbd5d6c43,2024-11-21T04:03:31.363000
|
||||
CVE-2018-25085,0,0,73bfea48ffd0c9cdf4c809f671883689556215e478ba2335dea12376d92bdc92,2024-11-21T04:03:31.500000
|
||||
CVE-2018-25086,0,0,b66fd9bd4e9ee72936a4458a94a97d90fafb9ae16612a4f6f711df55e0868a80,2024-11-21T04:03:31.630000
|
||||
@ -181593,7 +181593,7 @@ CVE-2021-39226,0,0,8f5b383c5a1b4edaefcf29c875a1af7a57ef26e606fb88396216b3f688a78
|
||||
CVE-2021-39227,0,0,b565dd80d12e5fc792bf53c83afbb0df18396a7f4bd06f4abb75f6be489edf81,2024-11-21T06:18:57.397000
|
||||
CVE-2021-39228,0,0,f36eb8db813850239f055aaec343d16d3f88b3e91fadb62dd009ee0ffa13b3fe,2024-11-21T06:18:57.560000
|
||||
CVE-2021-39229,0,0,19d99295ac275c3a2907f9ccafd6f9fcd679acf6e78619f479c455440e3594c8,2024-11-21T06:18:57.723000
|
||||
CVE-2021-3923,0,1,8f33120d39dbfb40fa5931a99dfe1de830ad6771a3e98d91fa15e273454439b2,2025-02-24T20:15:31.777000
|
||||
CVE-2021-3923,0,0,8f33120d39dbfb40fa5931a99dfe1de830ad6771a3e98d91fa15e273454439b2,2025-02-24T20:15:31.777000
|
||||
CVE-2021-39230,0,0,a1ff4462fdf7e73cfc9f905531f8050df43fde4ffa355fe087d4f58aa28b9f70,2024-11-21T06:18:57.887000
|
||||
CVE-2021-39231,0,0,69ac8f30e5ab6fd510e2644b69e1647296deefa37af2bf4373d60b90a662deae,2024-11-21T06:18:58.047000
|
||||
CVE-2021-39232,0,0,46dca2479f21c28a81ec3dbdc29193e04bd5bd93ca4c70f295f263619234968f,2024-11-21T06:18:58.203000
|
||||
@ -192084,7 +192084,7 @@ CVE-2022-22366,0,0,09a7cac2af7c3326b1c4db129ec697d7b77dfaf6bb69f773673a6a77e39ca
|
||||
CVE-2022-22367,0,0,f882ca26722150b960229aa69678dc678f007562e394dfb4b417a39357dc7df4,2024-11-21T06:46:42.593000
|
||||
CVE-2022-22368,0,0,4575f523f8115fcbc6bf4fcce9d55648189bfb8804149d364401ff13b317f534,2024-11-21T06:46:42.703000
|
||||
CVE-2022-22369,0,0,57d094f830c9aade14309e978b8c909e905f3069a575a6823563de9c6cc548bf,2024-11-21T06:46:42.820000
|
||||
CVE-2022-2237,0,1,e4713513ef55760b84ff9456d90526423f234823f2124885ce696e1691eae550,2025-02-24T20:15:31.973000
|
||||
CVE-2022-2237,0,0,e4713513ef55760b84ff9456d90526423f234823f2124885ce696e1691eae550,2025-02-24T20:15:31.973000
|
||||
CVE-2022-22370,0,0,67d4116112ef932abd2bd63b802bb14e3f709993807fc0144ff90914519a656f,2024-11-21T06:46:42.937000
|
||||
CVE-2022-22371,0,0,3c0ad31752e89144bb37a83b9d144a252c96c6ec5b4551862b225a581279dc8a,2024-11-21T06:46:43.060000
|
||||
CVE-2022-22373,0,0,75763a7cca7f104d29029f2448a59f86f6607bf8aa5b41517082c08af9f29e22,2024-11-21T06:46:43.190000
|
||||
@ -199498,7 +199498,7 @@ CVE-2022-31156,0,0,2eaf51f38380072e6df6598bc8ce64fdddae7651edad8425e219157401a34
|
||||
CVE-2022-31157,0,0,f97dabe995205a4290cb284ef75e2678e935f9593f36e46051a4473bd3747780,2024-11-21T07:04:01.233000
|
||||
CVE-2022-31158,0,0,d0bb5395bc1894916b6f96263e1c2b4f3801271bb0dc425949da7198d4395245,2024-11-21T07:04:01.367000
|
||||
CVE-2022-31159,0,0,73592c7c0c7382416e092a874c18103dd659c120906594ad5be3f95252b49a45,2024-11-21T07:04:01.497000
|
||||
CVE-2022-3116,0,1,a66a78018254a28a9aa08fd9b8f04f2685a8ae4c0cd4ad20cf04b7b4f10b3d37,2025-02-24T19:15:12.707000
|
||||
CVE-2022-3116,0,0,a66a78018254a28a9aa08fd9b8f04f2685a8ae4c0cd4ad20cf04b7b4f10b3d37,2025-02-24T19:15:12.707000
|
||||
CVE-2022-31160,0,0,3f3c950e160a4c2913d6e10c3f9e06df49d400b943dc94f33bbeae200029c88e,2024-11-21T07:04:01.617000
|
||||
CVE-2022-31161,0,0,50f1400bdf87989a0c6d37c9cf60d06f1c39bde3cac5984099d4324714a40142,2024-11-21T07:04:01.790000
|
||||
CVE-2022-31162,0,0,60ece6ef2e20ad2436826f672bc8ae1cdedb95d111b3216c989d89e826d75bb6,2024-11-21T07:04:01.930000
|
||||
@ -212452,8 +212452,8 @@ CVE-2022-48344,0,0,99cfe32832587baf5d1527923c94101a148d12b13e3382d19bbf5f4f88a41
|
||||
CVE-2022-48345,0,0,c43bfd3ba9d46379c49b9847b6f17f16ace8072a4eee27968587d44b52b60457,2024-11-21T07:33:13.103000
|
||||
CVE-2022-48346,0,0,e9a6fca484067f694b4295c67382bb27add976e780c49b7a6de551ef92454947,2025-02-19T19:15:11.730000
|
||||
CVE-2022-48347,0,0,2a2a2e7682966e3b51f22fc18957ee285c28256a87b17e92c00e8dd8185e131a,2025-02-19T19:15:11.850000
|
||||
CVE-2022-48348,0,1,1fbf30f19ecab0a282ff16469c0a7585a79384bd8136e172a029a776f0e3e667,2025-02-24T19:15:14.043000
|
||||
CVE-2022-48349,0,1,3cafff10218da465dea3f1346ade258785a42c143f3561c49ad224634cf5807d,2025-02-24T19:15:14.227000
|
||||
CVE-2022-48348,0,0,1fbf30f19ecab0a282ff16469c0a7585a79384bd8136e172a029a776f0e3e667,2025-02-24T19:15:14.043000
|
||||
CVE-2022-48349,0,0,3cafff10218da465dea3f1346ade258785a42c143f3561c49ad224634cf5807d,2025-02-24T19:15:14.227000
|
||||
CVE-2022-4835,0,0,0342ae1f95dc8d2e957e0430756d0a4236a488c4c4e1a010bf206123dd786fcd,2024-11-21T07:36:02.473000
|
||||
CVE-2022-48350,0,0,c7022cfd8983ed22fa83066929e8846047af189c89fd47850d32a3e22883438e,2025-02-24T18:15:14.217000
|
||||
CVE-2022-48351,0,0,3cd0204c57902a844bf6efc014b88cedf93c969fad61f5ba77eb613c37617299,2025-02-24T18:15:16.057000
|
||||
@ -215941,11 +215941,11 @@ CVE-2023-21040,0,0,c774c5983f36a821f7c5e24674b2f104bfce612ef836674ee849ac3705d7a
|
||||
CVE-2023-21041,0,0,6a99a6b0541876b22115214a822814538877e83cbef9875bd54521daf0d2d9cb,2024-11-21T07:42:03.070000
|
||||
CVE-2023-21042,0,0,92ab35321b2fd324542efae6d2f60a172590991a879dc4bde56d7ee1e48c0b18,2025-02-19T22:15:11.810000
|
||||
CVE-2023-21043,0,0,4cf28ca85bcbd27b9227b2573af8a0495fc89cd1fdcf1c2734276d761401f69f,2024-11-21T07:42:03.320000
|
||||
CVE-2023-21044,0,1,d546efe130a0e8b835c1a714bf68d2df24c0e09247ccbe869006e82495f3584f,2025-02-24T20:15:32.190000
|
||||
CVE-2023-21045,0,1,c7c3c273f0be1c563af52eae3c5ca603c13c6789a4270f0a2032e21fcdad0ce1,2025-02-24T20:15:32.380000
|
||||
CVE-2023-21044,0,0,d546efe130a0e8b835c1a714bf68d2df24c0e09247ccbe869006e82495f3584f,2025-02-24T20:15:32.190000
|
||||
CVE-2023-21045,0,0,c7c3c273f0be1c563af52eae3c5ca603c13c6789a4270f0a2032e21fcdad0ce1,2025-02-24T20:15:32.380000
|
||||
CVE-2023-21046,0,0,157a9520e5ae8a81ac1e742275b614c5004e15922aec14a449810537f3053229,2024-11-21T07:42:03.653000
|
||||
CVE-2023-21047,0,0,a8d476de5c22475a663a6cd0b7905a4e2678b820fc08e9b5926d525d5d6554e1,2025-02-24T15:15:11.890000
|
||||
CVE-2023-21048,0,1,609d2a83ed3221a308ae0d1de751ad1ffcc2d677804d0c4e261c7271f9a2b453,2025-02-24T20:15:32.620000
|
||||
CVE-2023-21048,0,0,609d2a83ed3221a308ae0d1de751ad1ffcc2d677804d0c4e261c7271f9a2b453,2025-02-24T20:15:32.620000
|
||||
CVE-2023-21049,0,0,bb73e93fe402a1a1fd3c7954e241829b82101223330bf83d184d14f361624b5f,2025-02-21T21:15:12.563000
|
||||
CVE-2023-2105,0,0,2848f7b619a121a5ab92af5f52396afe377fb724ffc0f538c3a9b15300394fc5,2025-02-06T16:15:36.640000
|
||||
CVE-2023-21050,0,0,c97a15ee08f147244a1178bb0faf4b2c275cbb0d598a4d3e22fffa17b5a3621d,2025-02-21T22:15:11.040000
|
||||
@ -243715,7 +243715,7 @@ CVE-2024-10217,0,0,1895a265d2132d6d454e49e4937a0fc01a8d5847eea053c3e93a0984b4bc0
|
||||
CVE-2024-10218,0,0,8c98b77c90ab06758cb11fcdce58d3e978735cbcd3800c729831353228a0e6df,2024-11-22T21:15:07.950000
|
||||
CVE-2024-1022,0,0,2538d56f6669aecae5f12904278656fbaaa9fa83dd2447751caf0dde04c23b1f,2024-11-21T08:49:37.160000
|
||||
CVE-2024-10220,0,0,0717049f6d4c212a875763951e37b8f3da2918e18cb00732d9d60eff6c4a140d,2024-11-22T17:15:06.650000
|
||||
CVE-2024-10222,0,1,832d681b9ef817b9c70fe649db0ec26d6568e99a827bbeb02954537ee5aaf11c,2025-02-24T19:43:57.037000
|
||||
CVE-2024-10222,0,0,832d681b9ef817b9c70fe649db0ec26d6568e99a827bbeb02954537ee5aaf11c,2025-02-24T19:43:57.037000
|
||||
CVE-2024-10223,0,0,5f5e151c95f5ef79d0a7fc297e9a009a73a481f63f2b3ce4a2e96835fd5bc43d,2024-11-01T12:57:03.417000
|
||||
CVE-2024-10224,0,0,b4b06129afa19bd4bd2db86d543a9417ce3496d8c49771d9c2d4f2d051e46d1d,2024-12-03T14:15:19.270000
|
||||
CVE-2024-10226,0,0,90902af4bb0025c8b4afcf3dd7a0c8ab645b3d8bdbe2f31e8aac22ff12a9d686,2024-10-31T16:48:41.553000
|
||||
@ -246791,7 +246791,7 @@ CVE-2024-13625,0,0,556dbc652a367567d8dc0a1aca4ef96fa3721288585ae7ce8b84a84c5a8c1
|
||||
CVE-2024-13626,0,0,5f376c892890a386d15b17c9d9f7768803772784cb9f45a9f61e63e74ea1223e,2025-02-19T22:15:22.753000
|
||||
CVE-2024-13627,0,0,faf1d9bd245281ef1f9edc55f8aca71639e95b5ef38efdbbf353c5fc7ae2924c,2025-02-19T19:15:14.720000
|
||||
CVE-2024-1363,0,0,d8d6ccccee9c9def4bc84105015213aa12c981523f1a518cfb483c29cffbd734,2024-11-21T08:50:25.093000
|
||||
CVE-2024-13636,0,0,8f7090f3cee37c858f7afaf2983a2cabcdc65da940d26a01a270d2b24bb2e042,2025-02-21T15:21:17.950000
|
||||
CVE-2024-13636,0,1,060ea877f973da3e3139131075fc6b65a68ba520ee71166120bdf003d38b6862,2025-02-24T22:15:11.277000
|
||||
CVE-2024-13639,0,0,071381e5184000ecf8c72dcde14c2011c1cb4ea4b355e15fb5e9c5b4fb270c14,2025-02-18T18:15:51.587000
|
||||
CVE-2024-1364,0,0,47f33fd19586ab96196a2cb0337c2030aca42f1bd8c4ab84cfa2e52c3dbe5e59,2024-11-21T08:50:25.223000
|
||||
CVE-2024-13641,0,0,cd1890f30f24c13413424555c34b5a8741240269cfb8c1f67ec9e1b8c16fa87b,2025-02-14T06:15:19.957000
|
||||
@ -246886,7 +246886,7 @@ CVE-2024-13767,0,0,5e2a432b5514ebb28e43fc58238979fb079695a503a95ef3a2bddb1da15de
|
||||
CVE-2024-13769,0,0,6fa2e289d8cf3e90cab0c96a01fffe9940909434acbdd1bee567bf2a5e72cf56,2025-02-24T15:54:05.167000
|
||||
CVE-2024-1377,0,0,76446229d1bded69224cd2e98212f244bd2380b3470adb0152ce2b85f9216c33,2025-01-07T18:20:57.347000
|
||||
CVE-2024-13770,0,0,eedd6cc35f686f8347a61efabc64272551833ee2e82bdd330567f722ff99ade8,2025-02-24T17:08:04.307000
|
||||
CVE-2024-13775,0,1,4f9074e732a3ab519a109b5697b6e141a486c1977d56f68019ad553f34df5449,2025-02-24T19:04:52.170000
|
||||
CVE-2024-13775,0,0,4f9074e732a3ab519a109b5697b6e141a486c1977d56f68019ad553f34df5449,2025-02-24T19:04:52.170000
|
||||
CVE-2024-1378,0,0,041aa523b6aa5691bc95edbf2c3845e6125399d35aa90aa412089416e101b866,2024-11-21T08:50:26.997000
|
||||
CVE-2024-13783,0,0,4d1adc087edd34d52079e199658ef345cbd94c9c74350c99493fda1d34bf23f7,2025-02-21T12:19:42.537000
|
||||
CVE-2024-13789,0,0,7e93b6d08cc6df1b6bc2f867c0f4be1ee78646a7a043ad72e374fd176f679c40,2025-02-20T10:15:10.637000
|
||||
@ -267361,7 +267361,7 @@ CVE-2024-45775,0,0,dc9934913719b7ba371689f85d372f27a1c5a62c61667ba391c7f8d330af4
|
||||
CVE-2024-45776,0,0,7a04b7c7af22da1288ed82b6f5b30f15805ed4d914e4fc273482119cb2625695,2025-02-18T20:15:19.313000
|
||||
CVE-2024-45777,0,0,bcd0bab214a719b58ddcd730a7be37124827cbe868fcd457da07097e9b2f3848,2025-02-19T18:15:23.210000
|
||||
CVE-2024-4578,0,0,bdbd727086f88b7c6dce9bba415908bda128d8ea217ac43f45c5788929d872c3,2024-11-21T09:43:08.790000
|
||||
CVE-2024-45781,0,1,133ac0cb92299a7df10b4b06b4cea79c7c1972b417bc5974d3666a0db7bf0b58,2025-02-24T19:15:14.423000
|
||||
CVE-2024-45781,0,0,133ac0cb92299a7df10b4b06b4cea79c7c1972b417bc5974d3666a0db7bf0b58,2025-02-24T19:15:14.423000
|
||||
CVE-2024-45783,0,0,e4aa133b1a4c5368c5e922eb069f3b52cda2e750027d303f7902e92d25e80622,2025-02-18T20:15:19.560000
|
||||
CVE-2024-45784,0,0,3048a1cb0fccc9c661b7edc8375d75b46aaf139acaa67371a0b13f350fb0ec33,2024-11-21T09:38:05.210000
|
||||
CVE-2024-45785,0,0,fd50e853f09ab6c2230e086d2435c3cb1d80eb0fdb3f5f2bda7ceb6deffb7b10,2024-11-06T17:08:40.507000
|
||||
@ -274846,8 +274846,8 @@ CVE-2024-5714,0,0,849fc94b6902757fdfdae1f78ce00df63ab2c5ba63744e880696de74b0f190
|
||||
CVE-2024-5715,0,0,8c569768d6a890bf6135b49c7618937c530109ec67dd48fa94109e61c60d211f,2024-11-21T09:48:13.567000
|
||||
CVE-2024-57159,0,0,911ad61bac17d2746002becb8935568acc29955e7cfb0ab09e0435bacf9ef975,2025-02-03T19:15:12.880000
|
||||
CVE-2024-5716,0,0,3d427df7306e5a73dc01967e843a1c8b689a272b3aba62391281a97b5c9d3d70,2024-11-22T20:15:10.100000
|
||||
CVE-2024-57160,0,1,21efe21d39d81640d4b28d9b56e9e9917bc8862bd99f1332fce5cfffc07d8da0,2025-02-24T19:38:22.867000
|
||||
CVE-2024-57161,0,1,2a35bb3f44d198292743676a0dabcc3033caa3631e24c5b8bbfb982d9a2e1148,2025-02-24T19:38:43.083000
|
||||
CVE-2024-57160,0,0,21efe21d39d81640d4b28d9b56e9e9917bc8862bd99f1332fce5cfffc07d8da0,2025-02-24T19:38:22.867000
|
||||
CVE-2024-57161,0,0,2a35bb3f44d198292743676a0dabcc3033caa3631e24c5b8bbfb982d9a2e1148,2025-02-24T19:38:43.083000
|
||||
CVE-2024-57162,0,0,34980dbe4a72538efbb960a6cb249b8769ab30e4af22e079fea439e34fa66900,2025-02-18T21:15:23.657000
|
||||
CVE-2024-5717,0,0,fb2d4ea07d345b00fdb2b42ddabd6660deece1c7e8bb1f887295d0c9d91575e3,2024-11-22T20:15:10.227000
|
||||
CVE-2024-57175,0,0,e96a8c9420e12c8730fd044f61e074cae6b4f8900e0333d25afa5aec6b9ff461,2025-02-03T18:15:37.437000
|
||||
@ -275011,6 +275011,7 @@ CVE-2024-57603,0,0,8818c006a29d6f4bd13b4237aca8900d379684c37788b65eab93543c45a04
|
||||
CVE-2024-57604,0,0,543c5b4910b41c72e908210bd3581236fe15916a3051d75b0cb98013a23bf9f9,2025-02-18T18:15:27.827000
|
||||
CVE-2024-57605,0,0,7963b6f1477133cb94cbd1a3b1ada130c7fa95a02e2999810ff3a185f251a2ce,2025-02-18T18:15:27.983000
|
||||
CVE-2024-57606,0,0,282e31e88d82eac2f58eed0179e45942a66af52f2bd7847e92a7866919540d55,2025-02-18T19:15:22.280000
|
||||
CVE-2024-57608,1,1,4db4a039024361010a94538fd2696a2c6c6a3deeb62e035387a43fb1117798b9,2025-02-24T22:15:22.157000
|
||||
CVE-2024-57609,0,0,7e89dbfffc522c22f84645f0c7d618897ea46d1866f82abe6573f3d9437ce18a,2025-02-10T22:15:36.660000
|
||||
CVE-2024-5761,0,0,1fdad964c86313b412878f67fac5999c9a1ea015b844614bc58b000414661a53,2024-06-07T19:15:24.467000
|
||||
CVE-2024-57610,0,0,fb8a513d5a0e34ee3275d17e53b163d875527cc466c4bde851405005eb787883,2025-02-07T16:15:38.303000
|
||||
@ -279696,7 +279697,7 @@ CVE-2025-1470,0,0,c431c34122bd455693ae857da134c11078dd424d889a110192af0d8789781c
|
||||
CVE-2025-1471,0,0,5f2308ef243e2997d93c627b7cee213af79efe1fdd8602f268a3ff3acb063cf9,2025-02-21T10:15:11.413000
|
||||
CVE-2025-1483,0,0,ce3e2374c8ceeb73bbc31bdc8dbf6b8de9bfef289bdc35ff175139154a83c52b,2025-02-20T10:15:12.537000
|
||||
CVE-2025-1488,0,0,43cfa98a915bcf0660c9d6b45b3151f7578e9794c9b93f44777c487cb0fa081f,2025-02-24T11:15:10.193000
|
||||
CVE-2025-1489,0,1,3008549e3d2861f78796256b763f59eec371226dd4b84353f864c64443cf0ecb,2025-02-24T19:45:21.653000
|
||||
CVE-2025-1489,0,0,3008549e3d2861f78796256b763f59eec371226dd4b84353f864c64443cf0ecb,2025-02-24T19:45:21.653000
|
||||
CVE-2025-1492,0,0,a12c05d7276816932001573681340e79b217d21be6e278e421f34f68972737e1,2025-02-20T02:15:38.553000
|
||||
CVE-2025-1509,0,0,23e6d59505826ac4948dc80673c03ff2b0aed485111f57186985eb2e5cb2ebc3,2025-02-22T04:15:09.883000
|
||||
CVE-2025-1510,0,0,9b376c589154983b1ec02250f9735f4521be8d5584c35e34e9235c478622092f,2025-02-22T04:15:10.040000
|
||||
@ -281917,6 +281918,7 @@ CVE-2025-25475,0,0,da2a2d1f29106b1a0859c6a65cc60cebccb336e99ff5a9bda978918b583eb
|
||||
CVE-2025-25505,0,0,c69812bbe3b275d3bc181fb00a5a8c8f1f26c31684ed982db7260503469e7b3d,2025-02-21T21:15:23.723000
|
||||
CVE-2025-25507,0,0,de0377abf29412c164b8ddbcc15e82dfdb0b23020e12eca7c6e04a6e73ed3fd7,2025-02-21T21:15:23.870000
|
||||
CVE-2025-25510,0,0,4997c3387297db121e4e9c1042fc244ebe3429ef8058fdf6dffa5196020cd974,2025-02-21T21:15:24.023000
|
||||
CVE-2025-25513,1,1,e1943590b94885dd95437dc0873156668d062e8b298f484c30409dc6927e7d11,2025-02-24T22:15:22.807000
|
||||
CVE-2025-25522,0,0,9f2c0bc0a6dbb67154353c2da3969483621b5d35364f73acfaa2a34b0ff5a40b,2025-02-13T17:17:20.517000
|
||||
CVE-2025-25523,0,0,9c6d5a6c8c747b7673e69ebf58bf535f17db00e0831b58073ddd586410cf36d9,2025-02-13T18:18:23.400000
|
||||
CVE-2025-25524,0,0,40af9c5e5be067f2e684b500c6cae4a5dab6d519bde35d9c0fd3353781274a87,2025-02-13T18:18:23.597000
|
||||
@ -282062,14 +282064,15 @@ CVE-2025-26520,0,0,17d02b8206df6278a5daac40c2b231fb3d4ebedc90f89b701d393457344ae
|
||||
CVE-2025-26522,0,0,81134038c496481bfa5c560aae63c4f4621e7f68899375180dc3955b52ec6e4d,2025-02-14T12:15:29.583000
|
||||
CVE-2025-26523,0,0,cd12665da062e93af2c690c3b3ac969d692dcb2b834904fb031d67807c219377,2025-02-14T12:15:29.723000
|
||||
CVE-2025-26524,0,0,bd7001926462f269d35a46f341242eea9f256eba3c891acb3af12e0119a6db89,2025-02-14T12:15:29.887000
|
||||
CVE-2025-26525,1,1,e2470c0b89fb5f4c317b46f89a75742cf40aaeb4834d01cf3fd91c3994e3b2df,2025-02-24T20:15:33.103000
|
||||
CVE-2025-26526,1,1,6425f2747c445b6d9158d4211ff4088ba074b3474102b40bdc631e2e2abbb90b,2025-02-24T20:15:33.263000
|
||||
CVE-2025-26527,1,1,bf2779fcba04200fdcb75a5a7a9f5531a86e849eab0d085762947141b3c2eaf1,2025-02-24T20:15:33.403000
|
||||
CVE-2025-26528,1,1,a365d827164795bc1ef58abd6171679d3069ce4ccde2807be350c01d0b3aa5d5,2025-02-24T20:15:33.543000
|
||||
CVE-2025-26529,1,1,a4ee1915d14b95ea82ab1944c3df3a492d57176e49f9ca84129b30a726b6a965,2025-02-24T20:15:33.677000
|
||||
CVE-2025-26530,1,1,63219eb639d784006748b7e9b7585eb4cb931b1cccb20a31dfcf93c2af986358,2025-02-24T20:15:33.807000
|
||||
CVE-2025-26531,1,1,4454ead5716d53108591ae776002c8d02ed96d405f2b930f023008b300798475,2025-02-24T20:15:33.933000
|
||||
CVE-2025-26532,1,1,598f624e5c9d1c4c60a7140797a329e77af0a449c9c4b34a91bafc0972369445,2025-02-24T20:15:34.053000
|
||||
CVE-2025-26525,0,0,e2470c0b89fb5f4c317b46f89a75742cf40aaeb4834d01cf3fd91c3994e3b2df,2025-02-24T20:15:33.103000
|
||||
CVE-2025-26526,0,0,6425f2747c445b6d9158d4211ff4088ba074b3474102b40bdc631e2e2abbb90b,2025-02-24T20:15:33.263000
|
||||
CVE-2025-26527,0,0,bf2779fcba04200fdcb75a5a7a9f5531a86e849eab0d085762947141b3c2eaf1,2025-02-24T20:15:33.403000
|
||||
CVE-2025-26528,0,0,a365d827164795bc1ef58abd6171679d3069ce4ccde2807be350c01d0b3aa5d5,2025-02-24T20:15:33.543000
|
||||
CVE-2025-26529,0,0,a4ee1915d14b95ea82ab1944c3df3a492d57176e49f9ca84129b30a726b6a965,2025-02-24T20:15:33.677000
|
||||
CVE-2025-26530,0,0,63219eb639d784006748b7e9b7585eb4cb931b1cccb20a31dfcf93c2af986358,2025-02-24T20:15:33.807000
|
||||
CVE-2025-26531,0,0,4454ead5716d53108591ae776002c8d02ed96d405f2b930f023008b300798475,2025-02-24T20:15:33.933000
|
||||
CVE-2025-26532,0,0,598f624e5c9d1c4c60a7140797a329e77af0a449c9c4b34a91bafc0972369445,2025-02-24T20:15:34.053000
|
||||
CVE-2025-26533,1,1,2e8a56b149dbe20ccfc4e827ae1bcb7f473041b99ea11c02d4ecd8f4b9b62686,2025-02-24T21:15:11.057000
|
||||
CVE-2025-26538,0,0,1b562cf933ca4f85387b9ad113a7e0bff6d82f6dfd74192b752d3543af30d3f6,2025-02-13T14:16:19.100000
|
||||
CVE-2025-26539,0,0,276f32835753e35ddba03e434efdb4b7cdb02fdf3cdfcf4922e56feaff65d802,2025-02-13T14:16:19.383000
|
||||
CVE-2025-26543,0,0,b3dbce2448f1125de716ecbc885f7a4be61adfbd3d23eb6c2c769d8219c9a560,2025-02-18T18:15:36.597000
|
||||
@ -282166,9 +282169,12 @@ CVE-2025-27105,0,0,2bcb6c340eab97672213237573c8f6ca4eeeb614b47978107b021b4da927b
|
||||
CVE-2025-27106,0,0,2aea6dfc75b6de975e9d792b22b24672e89a28876099e5c80ae756f94e64cf9c,2025-02-22T16:15:33.003000
|
||||
CVE-2025-27108,0,0,7cd07cb1baebc7581e6189da86b0f89ab8f66cca7350d7768234c5e33b5a7c6f,2025-02-21T22:15:14.170000
|
||||
CVE-2025-27109,0,0,887a9677b59d7647aa063bf92caff49be61f0df690b2560df78fd44f58dfdb6b,2025-02-24T17:15:14.850000
|
||||
CVE-2025-27112,1,1,ee0d927c6fb13b15cf89a5e5e15c73d10b42a1b52bf52c1bf9cbd01c1bbcaebd,2025-02-24T19:15:14.597000
|
||||
CVE-2025-27112,0,0,ee0d927c6fb13b15cf89a5e5e15c73d10b42a1b52bf52c1bf9cbd01c1bbcaebd,2025-02-24T19:15:14.597000
|
||||
CVE-2025-27113,0,0,d170fa3c72db3eb74309693f02d592d61ed72cb3e9e67a063d1482cf1b9614a1,2025-02-18T23:15:10.960000
|
||||
CVE-2025-27133,1,1,29844716abafc4dda273789005e3e16abe4d7d6eca7ec6dff9bfc7d4679fc1f2,2025-02-24T19:15:14.763000
|
||||
CVE-2025-27133,0,0,29844716abafc4dda273789005e3e16abe4d7d6eca7ec6dff9bfc7d4679fc1f2,2025-02-24T19:15:14.763000
|
||||
CVE-2025-27137,1,1,5036444bad86a0c9ebb929b7c838035a7163ade99e11b550d9873b63f4ee5567,2025-02-24T21:15:11.213000
|
||||
CVE-2025-27140,1,1,2964053422621195e160e6550b952cf184c5edc007d9580344eb7b008bf03c85,2025-02-24T22:15:22.913000
|
||||
CVE-2025-27141,1,1,19a3c923af6f6f4189d4be91702969bf59100e645a0e1d60c810d2a5f034238b,2025-02-24T22:15:23.077000
|
||||
CVE-2025-27218,0,0,efa55c2dc9300fcbe5554c514f0fd9c100e33cfb72ff20b2eedb0bf35dee5b0b,2025-02-20T21:15:26.510000
|
||||
CVE-2025-27265,0,0,f92ef224928c265ed828ba40cf1c61290404ad79163953c8c2df56f81d7b8ab6,2025-02-24T15:15:14.310000
|
||||
CVE-2025-27266,0,0,7b4f333de7657eb474765345c5822ee79cdee853af3b515f2a266de5b5a75147,2025-02-24T15:15:14.443000
|
||||
@ -282220,4 +282226,4 @@ CVE-2025-27353,0,0,e9330e465bd2b224e768917457bf183dd9e6e3a03d6a86b1c73c647172eb9
|
||||
CVE-2025-27355,0,0,66e7c6f2a2b25e7dd96aabb373de405f0d7238e697b5f6eca301307be69d4dd5,2025-02-24T15:15:20.917000
|
||||
CVE-2025-27356,0,0,451dc4587cf2e56d947661dd5ce87ee61b0a9c7d0fddf41bb2794ffa4d5028c9,2025-02-24T15:15:21.077000
|
||||
CVE-2025-27357,0,0,a7a6432997c064e16448c81c4ebf75b9895532aa24152d8d607748003751d3d3,2025-02-24T15:15:21.233000
|
||||
CVE-2025-27364,1,1,a6f68b00caeb3fd723cefacab1c9d3bfa45e0696d3b00b1760eeb7e038956a23,2025-02-24T20:15:34.180000
|
||||
CVE-2025-27364,0,0,a6f68b00caeb3fd723cefacab1c9d3bfa45e0696d3b00b1760eeb7e038956a23,2025-02-24T20:15:34.180000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user