mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-19 17:31:42 +00:00
Auto-Update: 2025-03-28T15:00:20.535463+00:00
This commit is contained in:
parent
76753cf6d9
commit
e263b45c8a
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2022-4472",
|
"id": "CVE-2022-4472",
|
||||||
"sourceIdentifier": "contact@wpscan.com",
|
"sourceIdentifier": "contact@wpscan.com",
|
||||||
"published": "2023-01-30T21:15:10.780",
|
"published": "2023-01-30T21:15:10.780",
|
||||||
"lastModified": "2024-11-21T07:35:19.890",
|
"lastModified": "2025-03-28T14:15:18.053",
|
||||||
"vulnStatus": "Modified",
|
"vulnStatus": "Modified",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -36,6 +36,26 @@
|
|||||||
},
|
},
|
||||||
"exploitabilityScore": 2.3,
|
"exploitabilityScore": 2.3,
|
||||||
"impactScore": 2.7
|
"impactScore": 2.7
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||||
|
"baseScore": 5.4,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.3,
|
||||||
|
"impactScore": 2.7
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2022-4496",
|
"id": "CVE-2022-4496",
|
||||||
"sourceIdentifier": "contact@wpscan.com",
|
"sourceIdentifier": "contact@wpscan.com",
|
||||||
"published": "2023-01-30T21:15:10.870",
|
"published": "2023-01-30T21:15:10.870",
|
||||||
"lastModified": "2024-11-21T07:35:22.817",
|
"lastModified": "2025-03-28T14:15:18.247",
|
||||||
"vulnStatus": "Modified",
|
"vulnStatus": "Modified",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -36,6 +36,26 @@
|
|||||||
},
|
},
|
||||||
"exploitabilityScore": 2.8,
|
"exploitabilityScore": 2.8,
|
||||||
"impactScore": 2.7
|
"impactScore": 2.7
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||||
|
"baseScore": 6.1,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 2.7
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2022-4649",
|
"id": "CVE-2022-4649",
|
||||||
"sourceIdentifier": "contact@wpscan.com",
|
"sourceIdentifier": "contact@wpscan.com",
|
||||||
"published": "2023-01-30T21:15:11.357",
|
"published": "2023-01-30T21:15:11.357",
|
||||||
"lastModified": "2024-11-21T07:35:40.203",
|
"lastModified": "2025-03-28T14:15:18.420",
|
||||||
"vulnStatus": "Modified",
|
"vulnStatus": "Modified",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -36,6 +36,26 @@
|
|||||||
},
|
},
|
||||||
"exploitabilityScore": 2.3,
|
"exploitabilityScore": 2.3,
|
||||||
"impactScore": 2.7
|
"impactScore": 2.7
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||||
|
"baseScore": 5.4,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.3,
|
||||||
|
"impactScore": 2.7
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2022-4654",
|
"id": "CVE-2022-4654",
|
||||||
"sourceIdentifier": "contact@wpscan.com",
|
"sourceIdentifier": "contact@wpscan.com",
|
||||||
"published": "2023-01-30T21:15:11.607",
|
"published": "2023-01-30T21:15:11.607",
|
||||||
"lastModified": "2024-11-21T07:35:40.747",
|
"lastModified": "2025-03-28T14:15:18.587",
|
||||||
"vulnStatus": "Modified",
|
"vulnStatus": "Modified",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -36,6 +36,26 @@
|
|||||||
},
|
},
|
||||||
"exploitabilityScore": 2.3,
|
"exploitabilityScore": 2.3,
|
||||||
"impactScore": 2.7
|
"impactScore": 2.7
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||||
|
"baseScore": 5.4,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.3,
|
||||||
|
"impactScore": 2.7
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2023-22332",
|
"id": "CVE-2023-22332",
|
||||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||||
"published": "2023-01-30T07:15:10.003",
|
"published": "2023-01-30T07:15:10.003",
|
||||||
"lastModified": "2024-11-21T07:44:34.840",
|
"lastModified": "2025-03-28T14:15:18.737",
|
||||||
"vulnStatus": "Modified",
|
"vulnStatus": "Modified",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -36,6 +36,26 @@
|
|||||||
},
|
},
|
||||||
"exploitabilityScore": 2.8,
|
"exploitabilityScore": 2.8,
|
||||||
"impactScore": 3.6
|
"impactScore": 3.6
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||||
|
"baseScore": 6.5,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "NONE"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 3.6
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
@ -49,6 +69,16 @@
|
|||||||
"value": "CWE-312"
|
"value": "CWE-312"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-312"
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"configurations": [
|
"configurations": [
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2023-49544",
|
"id": "CVE-2023-49544",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-03-01T22:15:47.683",
|
"published": "2024-03-01T22:15:47.683",
|
||||||
"lastModified": "2024-11-21T08:33:31.077",
|
"lastModified": "2025-03-28T14:26:54.410",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -51,30 +51,67 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"configurations": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/geraldoalcantara/CVE-2023-49544",
|
"nodes": [
|
||||||
"source": "cve@mitre.org"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"url": "https://owasp.org/www-project-web-security-testing-guide/v42/4-Web_Application_Security_Testing/07-Input_Validation_Testing/11.1-Testing_for_Local_File_Inclusion",
|
"operator": "OR",
|
||||||
"source": "cve@mitre.org"
|
"negate": false,
|
||||||
},
|
"cpeMatch": [
|
||||||
{
|
{
|
||||||
"url": "https://www.sourcecodester.com/php/14587/customer-support-system-using-phpmysqli-source-code.html",
|
"vulnerable": true,
|
||||||
"source": "cve@mitre.org"
|
"criteria": "cpe:2.3:a:oretnom23:customer_support_system:1.0:*:*:*:*:*:*:*",
|
||||||
},
|
"matchCriteriaId": "0ACD80DD-AA36-4A3D-9E42-4BFE7B7E6AD4"
|
||||||
{
|
}
|
||||||
"url": "https://github.com/geraldoalcantara/CVE-2023-49544",
|
]
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
}
|
||||||
},
|
]
|
||||||
{
|
}
|
||||||
"url": "https://owasp.org/www-project-web-security-testing-guide/v42/4-Web_Application_Security_Testing/07-Input_Validation_Testing/11.1-Testing_for_Local_File_Inclusion",
|
],
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"references": [
|
||||||
},
|
{
|
||||||
{
|
"url": "https://github.com/geraldoalcantara/CVE-2023-49544",
|
||||||
"url": "https://www.sourcecodester.com/php/14587/customer-support-system-using-phpmysqli-source-code.html",
|
"source": "cve@mitre.org",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"tags": [
|
||||||
|
"Exploit",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://owasp.org/www-project-web-security-testing-guide/v42/4-Web_Application_Security_Testing/07-Input_Validation_Testing/11.1-Testing_for_Local_File_Inclusion",
|
||||||
|
"source": "cve@mitre.org",
|
||||||
|
"tags": [
|
||||||
|
"Technical Description"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://www.sourcecodester.com/php/14587/customer-support-system-using-phpmysqli-source-code.html",
|
||||||
|
"source": "cve@mitre.org",
|
||||||
|
"tags": [
|
||||||
|
"Product"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/geraldoalcantara/CVE-2023-49544",
|
||||||
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Exploit",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://owasp.org/www-project-web-security-testing-guide/v42/4-Web_Application_Security_Testing/07-Input_Validation_Testing/11.1-Testing_for_Local_File_Inclusion",
|
||||||
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Technical Description"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://www.sourcecodester.com/php/14587/customer-support-system-using-phpmysqli-source-code.html",
|
||||||
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Product"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2023-49545",
|
"id": "CVE-2023-49545",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-03-01T22:15:47.730",
|
"published": "2024-03-01T22:15:47.730",
|
||||||
"lastModified": "2024-11-21T08:33:31.297",
|
"lastModified": "2025-03-28T14:33:00.380",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -51,30 +51,67 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"configurations": [
|
||||||
{
|
{
|
||||||
"url": "https://cwe.mitre.org/data/definitions/548.html",
|
"nodes": [
|
||||||
"source": "cve@mitre.org"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"url": "https://github.com/geraldoalcantara/CVE-2023-49545",
|
"operator": "OR",
|
||||||
"source": "cve@mitre.org"
|
"negate": false,
|
||||||
},
|
"cpeMatch": [
|
||||||
{
|
{
|
||||||
"url": "https://www.sourcecodester.com/php/14587/customer-support-system-using-phpmysqli-source-code.html",
|
"vulnerable": true,
|
||||||
"source": "cve@mitre.org"
|
"criteria": "cpe:2.3:a:oretnom23:customer_support_system:1.0:*:*:*:*:*:*:*",
|
||||||
},
|
"matchCriteriaId": "0ACD80DD-AA36-4A3D-9E42-4BFE7B7E6AD4"
|
||||||
{
|
}
|
||||||
"url": "https://cwe.mitre.org/data/definitions/548.html",
|
]
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
}
|
||||||
},
|
]
|
||||||
{
|
}
|
||||||
"url": "https://github.com/geraldoalcantara/CVE-2023-49545",
|
],
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"references": [
|
||||||
},
|
{
|
||||||
{
|
"url": "https://cwe.mitre.org/data/definitions/548.html",
|
||||||
"url": "https://www.sourcecodester.com/php/14587/customer-support-system-using-phpmysqli-source-code.html",
|
"source": "cve@mitre.org",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"tags": [
|
||||||
|
"Not Applicable"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/geraldoalcantara/CVE-2023-49545",
|
||||||
|
"source": "cve@mitre.org",
|
||||||
|
"tags": [
|
||||||
|
"Exploit",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://www.sourcecodester.com/php/14587/customer-support-system-using-phpmysqli-source-code.html",
|
||||||
|
"source": "cve@mitre.org",
|
||||||
|
"tags": [
|
||||||
|
"Product"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://cwe.mitre.org/data/definitions/548.html",
|
||||||
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Not Applicable"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/geraldoalcantara/CVE-2023-49545",
|
||||||
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Exploit",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://www.sourcecodester.com/php/14587/customer-support-system-using-phpmysqli-source-code.html",
|
||||||
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Product"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2023-49546",
|
"id": "CVE-2023-49546",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-03-05T00:15:52.077",
|
"published": "2024-03-05T00:15:52.077",
|
||||||
"lastModified": "2024-11-21T08:33:31.500",
|
"lastModified": "2025-03-28T14:32:41.870",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -51,22 +51,53 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"configurations": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/geraldoalcantara/CVE-2023-49546",
|
"nodes": [
|
||||||
"source": "cve@mitre.org"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"url": "https://www.sourcecodester.com/php/14587/customer-support-system-using-phpmysqli-source-code.html",
|
"operator": "OR",
|
||||||
"source": "cve@mitre.org"
|
"negate": false,
|
||||||
},
|
"cpeMatch": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/geraldoalcantara/CVE-2023-49546",
|
"vulnerable": true,
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"criteria": "cpe:2.3:a:oretnom23:customer_support_system:1.0:*:*:*:*:*:*:*",
|
||||||
},
|
"matchCriteriaId": "0ACD80DD-AA36-4A3D-9E42-4BFE7B7E6AD4"
|
||||||
{
|
}
|
||||||
"url": "https://www.sourcecodester.com/php/14587/customer-support-system-using-phpmysqli-source-code.html",
|
]
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/geraldoalcantara/CVE-2023-49546",
|
||||||
|
"source": "cve@mitre.org",
|
||||||
|
"tags": [
|
||||||
|
"Exploit",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://www.sourcecodester.com/php/14587/customer-support-system-using-phpmysqli-source-code.html",
|
||||||
|
"source": "cve@mitre.org",
|
||||||
|
"tags": [
|
||||||
|
"Product"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/geraldoalcantara/CVE-2023-49546",
|
||||||
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Exploit",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://www.sourcecodester.com/php/14587/customer-support-system-using-phpmysqli-source-code.html",
|
||||||
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Product"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2023-49547",
|
"id": "CVE-2023-49547",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-03-05T00:15:52.150",
|
"published": "2024-03-05T00:15:52.150",
|
||||||
"lastModified": "2024-11-21T08:33:31.720",
|
"lastModified": "2025-03-28T14:32:37.313",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -51,22 +51,53 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"configurations": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/geraldoalcantara/CVE-2023-49547",
|
"nodes": [
|
||||||
"source": "cve@mitre.org"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"url": "https://www.sourcecodester.com/php/14587/customer-support-system-using-phpmysqli-source-code.html",
|
"operator": "OR",
|
||||||
"source": "cve@mitre.org"
|
"negate": false,
|
||||||
},
|
"cpeMatch": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/geraldoalcantara/CVE-2023-49547",
|
"vulnerable": true,
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"criteria": "cpe:2.3:a:oretnom23:customer_support_system:1.0:*:*:*:*:*:*:*",
|
||||||
},
|
"matchCriteriaId": "0ACD80DD-AA36-4A3D-9E42-4BFE7B7E6AD4"
|
||||||
{
|
}
|
||||||
"url": "https://www.sourcecodester.com/php/14587/customer-support-system-using-phpmysqli-source-code.html",
|
]
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/geraldoalcantara/CVE-2023-49547",
|
||||||
|
"source": "cve@mitre.org",
|
||||||
|
"tags": [
|
||||||
|
"Exploit",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://www.sourcecodester.com/php/14587/customer-support-system-using-phpmysqli-source-code.html",
|
||||||
|
"source": "cve@mitre.org",
|
||||||
|
"tags": [
|
||||||
|
"Product"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/geraldoalcantara/CVE-2023-49547",
|
||||||
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Exploit",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://www.sourcecodester.com/php/14587/customer-support-system-using-phpmysqli-source-code.html",
|
||||||
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Product"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2023-49548",
|
"id": "CVE-2023-49548",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-03-05T00:15:52.203",
|
"published": "2024-03-05T00:15:52.203",
|
||||||
"lastModified": "2024-11-21T08:33:31.930",
|
"lastModified": "2025-03-28T14:32:32.823",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -51,22 +51,53 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"configurations": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/geraldoalcantara/CVE-2023-49548",
|
"nodes": [
|
||||||
"source": "cve@mitre.org"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"url": "https://www.sourcecodester.com/php/14587/customer-support-system-using-phpmysqli-source-code.html",
|
"operator": "OR",
|
||||||
"source": "cve@mitre.org"
|
"negate": false,
|
||||||
},
|
"cpeMatch": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/geraldoalcantara/CVE-2023-49548",
|
"vulnerable": true,
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"criteria": "cpe:2.3:a:oretnom23:customer_support_system:1.0:*:*:*:*:*:*:*",
|
||||||
},
|
"matchCriteriaId": "0ACD80DD-AA36-4A3D-9E42-4BFE7B7E6AD4"
|
||||||
{
|
}
|
||||||
"url": "https://www.sourcecodester.com/php/14587/customer-support-system-using-phpmysqli-source-code.html",
|
]
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/geraldoalcantara/CVE-2023-49548",
|
||||||
|
"source": "cve@mitre.org",
|
||||||
|
"tags": [
|
||||||
|
"Exploit",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://www.sourcecodester.com/php/14587/customer-support-system-using-phpmysqli-source-code.html",
|
||||||
|
"source": "cve@mitre.org",
|
||||||
|
"tags": [
|
||||||
|
"Product"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/geraldoalcantara/CVE-2023-49548",
|
||||||
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Exploit",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://www.sourcecodester.com/php/14587/customer-support-system-using-phpmysqli-source-code.html",
|
||||||
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Product"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2023-49968",
|
"id": "CVE-2023-49968",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-03-05T00:15:52.253",
|
"published": "2024-03-05T00:15:52.253",
|
||||||
"lastModified": "2024-11-21T08:34:06.490",
|
"lastModified": "2025-03-28T14:32:27.133",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -51,22 +51,53 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"configurations": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/geraldoalcantara/CVE-2023-49968",
|
"nodes": [
|
||||||
"source": "cve@mitre.org"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"url": "https://www.sourcecodester.com/php/14587/customer-support-system-using-phpmysqli-source-code.html",
|
"operator": "OR",
|
||||||
"source": "cve@mitre.org"
|
"negate": false,
|
||||||
},
|
"cpeMatch": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/geraldoalcantara/CVE-2023-49968",
|
"vulnerable": true,
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"criteria": "cpe:2.3:a:oretnom23:customer_support_system:1.0:*:*:*:*:*:*:*",
|
||||||
},
|
"matchCriteriaId": "0ACD80DD-AA36-4A3D-9E42-4BFE7B7E6AD4"
|
||||||
{
|
}
|
||||||
"url": "https://www.sourcecodester.com/php/14587/customer-support-system-using-phpmysqli-source-code.html",
|
]
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/geraldoalcantara/CVE-2023-49968",
|
||||||
|
"source": "cve@mitre.org",
|
||||||
|
"tags": [
|
||||||
|
"Exploit",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://www.sourcecodester.com/php/14587/customer-support-system-using-phpmysqli-source-code.html",
|
||||||
|
"source": "cve@mitre.org",
|
||||||
|
"tags": [
|
||||||
|
"Product"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/geraldoalcantara/CVE-2023-49968",
|
||||||
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Exploit",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://www.sourcecodester.com/php/14587/customer-support-system-using-phpmysqli-source-code.html",
|
||||||
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Product"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2023-49969",
|
"id": "CVE-2023-49969",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-03-05T00:15:52.303",
|
"published": "2024-03-05T00:15:52.303",
|
||||||
"lastModified": "2024-11-21T08:34:06.703",
|
"lastModified": "2025-03-28T14:32:21.523",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -51,22 +51,53 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"configurations": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/geraldoalcantara/CVE-2023-49969",
|
"nodes": [
|
||||||
"source": "cve@mitre.org"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"url": "https://www.sourcecodester.com/php/14587/customer-support-system-using-phpmysqli-source-code.html",
|
"operator": "OR",
|
||||||
"source": "cve@mitre.org"
|
"negate": false,
|
||||||
},
|
"cpeMatch": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/geraldoalcantara/CVE-2023-49969",
|
"vulnerable": true,
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"criteria": "cpe:2.3:a:oretnom23:customer_support_system:1.0:*:*:*:*:*:*:*",
|
||||||
},
|
"matchCriteriaId": "0ACD80DD-AA36-4A3D-9E42-4BFE7B7E6AD4"
|
||||||
{
|
}
|
||||||
"url": "https://www.sourcecodester.com/php/14587/customer-support-system-using-phpmysqli-source-code.html",
|
]
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/geraldoalcantara/CVE-2023-49969",
|
||||||
|
"source": "cve@mitre.org",
|
||||||
|
"tags": [
|
||||||
|
"Exploit",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://www.sourcecodester.com/php/14587/customer-support-system-using-phpmysqli-source-code.html",
|
||||||
|
"source": "cve@mitre.org",
|
||||||
|
"tags": [
|
||||||
|
"Product"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/geraldoalcantara/CVE-2023-49969",
|
||||||
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Exploit",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://www.sourcecodester.com/php/14587/customer-support-system-using-phpmysqli-source-code.html",
|
||||||
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Product"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2023-49970",
|
"id": "CVE-2023-49970",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-03-05T00:15:52.350",
|
"published": "2024-03-05T00:15:52.350",
|
||||||
"lastModified": "2024-11-21T08:34:06.910",
|
"lastModified": "2025-03-28T14:32:11.623",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -51,22 +51,53 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"configurations": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/geraldoalcantara/CVE-2023-49970",
|
"nodes": [
|
||||||
"source": "cve@mitre.org"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"url": "https://www.sourcecodester.com/php/14587/customer-support-system-using-phpmysqli-source-code.html",
|
"operator": "OR",
|
||||||
"source": "cve@mitre.org"
|
"negate": false,
|
||||||
},
|
"cpeMatch": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/geraldoalcantara/CVE-2023-49970",
|
"vulnerable": true,
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"criteria": "cpe:2.3:a:oretnom23:customer_support_system:1.0:*:*:*:*:*:*:*",
|
||||||
},
|
"matchCriteriaId": "0ACD80DD-AA36-4A3D-9E42-4BFE7B7E6AD4"
|
||||||
{
|
}
|
||||||
"url": "https://www.sourcecodester.com/php/14587/customer-support-system-using-phpmysqli-source-code.html",
|
]
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/geraldoalcantara/CVE-2023-49970",
|
||||||
|
"source": "cve@mitre.org",
|
||||||
|
"tags": [
|
||||||
|
"Exploit",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://www.sourcecodester.com/php/14587/customer-support-system-using-phpmysqli-source-code.html",
|
||||||
|
"source": "cve@mitre.org",
|
||||||
|
"tags": [
|
||||||
|
"Product"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/geraldoalcantara/CVE-2023-49970",
|
||||||
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Exploit",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://www.sourcecodester.com/php/14587/customer-support-system-using-phpmysqli-source-code.html",
|
||||||
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Product"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2023-49974",
|
"id": "CVE-2023-49974",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-03-06T01:15:07.103",
|
"published": "2024-03-06T01:15:07.103",
|
||||||
"lastModified": "2024-11-21T08:34:07.537",
|
"lastModified": "2025-03-28T14:35:30.683",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -51,22 +51,53 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"configurations": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/geraldoalcantara/CVE-2023-49974",
|
"nodes": [
|
||||||
"source": "cve@mitre.org"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"url": "https://www.sourcecodester.com/php/14587/customer-support-system-using-phpmysqli-source-code.html",
|
"operator": "OR",
|
||||||
"source": "cve@mitre.org"
|
"negate": false,
|
||||||
},
|
"cpeMatch": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/geraldoalcantara/CVE-2023-49974",
|
"vulnerable": true,
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"criteria": "cpe:2.3:a:oretnom23:customer_support_system:1.0:*:*:*:*:*:*:*",
|
||||||
},
|
"matchCriteriaId": "0ACD80DD-AA36-4A3D-9E42-4BFE7B7E6AD4"
|
||||||
{
|
}
|
||||||
"url": "https://www.sourcecodester.com/php/14587/customer-support-system-using-phpmysqli-source-code.html",
|
]
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/geraldoalcantara/CVE-2023-49974",
|
||||||
|
"source": "cve@mitre.org",
|
||||||
|
"tags": [
|
||||||
|
"Exploit",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://www.sourcecodester.com/php/14587/customer-support-system-using-phpmysqli-source-code.html",
|
||||||
|
"source": "cve@mitre.org",
|
||||||
|
"tags": [
|
||||||
|
"Product"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/geraldoalcantara/CVE-2023-49974",
|
||||||
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Exploit",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://www.sourcecodester.com/php/14587/customer-support-system-using-phpmysqli-source-code.html",
|
||||||
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Product"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2023-49976",
|
"id": "CVE-2023-49976",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-03-06T01:15:07.147",
|
"published": "2024-03-06T01:15:07.147",
|
||||||
"lastModified": "2024-11-21T08:34:07.757",
|
"lastModified": "2025-03-28T14:35:34.803",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -51,22 +51,53 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"configurations": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/geraldoalcantara/CVE-2023-49976",
|
"nodes": [
|
||||||
"source": "cve@mitre.org"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"url": "https://www.sourcecodester.com/php/14587/customer-support-system-using-phpmysqli-source-code.html",
|
"operator": "OR",
|
||||||
"source": "cve@mitre.org"
|
"negate": false,
|
||||||
},
|
"cpeMatch": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/geraldoalcantara/CVE-2023-49976",
|
"vulnerable": true,
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"criteria": "cpe:2.3:a:oretnom23:customer_support_system:1.0:*:*:*:*:*:*:*",
|
||||||
},
|
"matchCriteriaId": "0ACD80DD-AA36-4A3D-9E42-4BFE7B7E6AD4"
|
||||||
{
|
}
|
||||||
"url": "https://www.sourcecodester.com/php/14587/customer-support-system-using-phpmysqli-source-code.html",
|
]
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/geraldoalcantara/CVE-2023-49976",
|
||||||
|
"source": "cve@mitre.org",
|
||||||
|
"tags": [
|
||||||
|
"Exploit",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://www.sourcecodester.com/php/14587/customer-support-system-using-phpmysqli-source-code.html",
|
||||||
|
"source": "cve@mitre.org",
|
||||||
|
"tags": [
|
||||||
|
"Product"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/geraldoalcantara/CVE-2023-49976",
|
||||||
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Exploit",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://www.sourcecodester.com/php/14587/customer-support-system-using-phpmysqli-source-code.html",
|
||||||
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Product"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2023-49977",
|
"id": "CVE-2023-49977",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-03-06T01:15:07.187",
|
"published": "2024-03-06T01:15:07.187",
|
||||||
"lastModified": "2024-11-21T08:34:07.977",
|
"lastModified": "2025-03-28T14:35:38.520",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -51,22 +51,53 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"configurations": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/geraldoalcantara/CVE-2023-49977",
|
"nodes": [
|
||||||
"source": "cve@mitre.org"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"url": "https://www.sourcecodester.com/php/14587/customer-support-system-using-phpmysqli-source-code.html",
|
"operator": "OR",
|
||||||
"source": "cve@mitre.org"
|
"negate": false,
|
||||||
},
|
"cpeMatch": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/geraldoalcantara/CVE-2023-49977",
|
"vulnerable": true,
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"criteria": "cpe:2.3:a:oretnom23:customer_support_system:1.0:*:*:*:*:*:*:*",
|
||||||
},
|
"matchCriteriaId": "0ACD80DD-AA36-4A3D-9E42-4BFE7B7E6AD4"
|
||||||
{
|
}
|
||||||
"url": "https://www.sourcecodester.com/php/14587/customer-support-system-using-phpmysqli-source-code.html",
|
]
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/geraldoalcantara/CVE-2023-49977",
|
||||||
|
"source": "cve@mitre.org",
|
||||||
|
"tags": [
|
||||||
|
"Exploit",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://www.sourcecodester.com/php/14587/customer-support-system-using-phpmysqli-source-code.html",
|
||||||
|
"source": "cve@mitre.org",
|
||||||
|
"tags": [
|
||||||
|
"Product"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/geraldoalcantara/CVE-2023-49977",
|
||||||
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Exploit",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://www.sourcecodester.com/php/14587/customer-support-system-using-phpmysqli-source-code.html",
|
||||||
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Product"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2023-51281",
|
"id": "CVE-2023-51281",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-03-07T01:15:52.133",
|
"published": "2024-03-07T01:15:52.133",
|
||||||
"lastModified": "2024-11-21T08:37:56.467",
|
"lastModified": "2025-03-28T14:35:27.157",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -51,22 +51,53 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"configurations": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/geraldoalcantara/CVE-2023-51281",
|
"nodes": [
|
||||||
"source": "cve@mitre.org"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"url": "https://www.sourcecodester.com/php/14587/customer-support-system-using-phpmysqli-source-code.html",
|
"operator": "OR",
|
||||||
"source": "cve@mitre.org"
|
"negate": false,
|
||||||
},
|
"cpeMatch": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/geraldoalcantara/CVE-2023-51281",
|
"vulnerable": true,
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"criteria": "cpe:2.3:a:oretnom23:customer_support_system:1.0:*:*:*:*:*:*:*",
|
||||||
},
|
"matchCriteriaId": "0ACD80DD-AA36-4A3D-9E42-4BFE7B7E6AD4"
|
||||||
{
|
}
|
||||||
"url": "https://www.sourcecodester.com/php/14587/customer-support-system-using-phpmysqli-source-code.html",
|
]
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/geraldoalcantara/CVE-2023-51281",
|
||||||
|
"source": "cve@mitre.org",
|
||||||
|
"tags": [
|
||||||
|
"Exploit",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://www.sourcecodester.com/php/14587/customer-support-system-using-phpmysqli-source-code.html",
|
||||||
|
"source": "cve@mitre.org",
|
||||||
|
"tags": [
|
||||||
|
"Product"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/geraldoalcantara/CVE-2023-51281",
|
||||||
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Exploit",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://www.sourcecodester.com/php/14587/customer-support-system-using-phpmysqli-source-code.html",
|
||||||
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Product"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
82
CVE-2024/CVE-2024-115xx/CVE-2024-11504.json
Normal file
82
CVE-2024/CVE-2024-115xx/CVE-2024-11504.json
Normal file
@ -0,0 +1,82 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-11504",
|
||||||
|
"sourceIdentifier": "cvd@cert.pl",
|
||||||
|
"published": "2025-03-28T13:15:39.663",
|
||||||
|
"lastModified": "2025-03-28T13:15:39.663",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Input from multiple fields in\u00a0Streamsoft Presti\u017c is not sanitized properly, leading to an SQL injection vulnerability, which might be exploited by an authenticated remote attacker.\u00a0\nThis issue was fixed in\u00a018.1.376.37 version of the software."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV40": [
|
||||||
|
{
|
||||||
|
"source": "cvd@cert.pl",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "4.0",
|
||||||
|
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||||
|
"baseScore": 8.6,
|
||||||
|
"baseSeverity": "HIGH",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"attackRequirements": "NONE",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"vulnConfidentialityImpact": "HIGH",
|
||||||
|
"vulnIntegrityImpact": "HIGH",
|
||||||
|
"vulnAvailabilityImpact": "NONE",
|
||||||
|
"subConfidentialityImpact": "NONE",
|
||||||
|
"subIntegrityImpact": "NONE",
|
||||||
|
"subAvailabilityImpact": "NONE",
|
||||||
|
"exploitMaturity": "NOT_DEFINED",
|
||||||
|
"confidentialityRequirement": "NOT_DEFINED",
|
||||||
|
"integrityRequirement": "NOT_DEFINED",
|
||||||
|
"availabilityRequirement": "NOT_DEFINED",
|
||||||
|
"modifiedAttackVector": "NOT_DEFINED",
|
||||||
|
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||||
|
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||||
|
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||||
|
"modifiedUserInteraction": "NOT_DEFINED",
|
||||||
|
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||||
|
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||||
|
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||||
|
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||||
|
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||||
|
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||||
|
"Safety": "NOT_DEFINED",
|
||||||
|
"Automatable": "NOT_DEFINED",
|
||||||
|
"Recovery": "NOT_DEFINED",
|
||||||
|
"valueDensity": "NOT_DEFINED",
|
||||||
|
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||||
|
"providerUrgency": "NOT_DEFINED"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "cvd@cert.pl",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-89"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://cert.pl/en/posts/2025/03/CVE-2024-7407/",
|
||||||
|
"source": "cvd@cert.pl"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://www.streamsoft.pl/streamsoft-prestiz/",
|
||||||
|
"source": "cvd@cert.pl"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-12336",
|
"id": "CVE-2024-12336",
|
||||||
"sourceIdentifier": "security@wordfence.com",
|
"sourceIdentifier": "security@wordfence.com",
|
||||||
"published": "2025-03-15T04:15:20.263",
|
"published": "2025-03-15T04:15:20.263",
|
||||||
"lastModified": "2025-03-15T04:15:20.263",
|
"lastModified": "2025-03-28T13:16:07.570",
|
||||||
"vulnStatus": "Undergoing Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -49,16 +49,50 @@
|
|||||||
"value": "CWE-862"
|
"value": "CWE-862"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-862"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:codexpert:wc_affiliate:*:*:*:*:*:wordpress:*:*",
|
||||||
|
"versionEndExcluding": "2.6",
|
||||||
|
"matchCriteriaId": "343EFECD-4BB1-4094-8ECC-C99463C7AC34"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://plugins.trac.wordpress.org/browser/wc-affiliate/trunk/src/AJAX.php#L903",
|
"url": "https://plugins.trac.wordpress.org/browser/wc-affiliate/trunk/src/AJAX.php#L903",
|
||||||
"source": "security@wordfence.com"
|
"source": "security@wordfence.com",
|
||||||
|
"tags": [
|
||||||
|
"Product"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/cf0fb349-4cb8-4cf3-ae7c-5c4dcc6fd4f7?source=cve",
|
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/cf0fb349-4cb8-4cf3-ae7c-5c4dcc6fd4f7?source=cve",
|
||||||
"source": "security@wordfence.com"
|
"source": "security@wordfence.com",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-27558",
|
"id": "CVE-2024-27558",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-03-01T17:15:07.490",
|
"published": "2024-03-01T17:15:07.490",
|
||||||
"lastModified": "2024-11-21T09:04:44.013",
|
"lastModified": "2025-03-28T14:09:20.343",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -51,14 +51,40 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"configurations": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/kilooooo/cms/blob/main/2.md",
|
"nodes": [
|
||||||
"source": "cve@mitre.org"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"url": "https://github.com/kilooooo/cms/blob/main/2.md",
|
"operator": "OR",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:codelyfe:stupid_simple_cms:*:*:*:*:*:*:*:*",
|
||||||
|
"versionEndIncluding": "1.2.4",
|
||||||
|
"matchCriteriaId": "700DA84E-DA65-4B87-B847-E4C61E24F5D1"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/kilooooo/cms/blob/main/2.md",
|
||||||
|
"source": "cve@mitre.org",
|
||||||
|
"tags": [
|
||||||
|
"Exploit",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/kilooooo/cms/blob/main/2.md",
|
||||||
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Exploit",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-27559",
|
"id": "CVE-2024-27559",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-03-01T17:15:07.530",
|
"published": "2024-03-01T17:15:07.530",
|
||||||
"lastModified": "2024-11-21T09:04:44.220",
|
"lastModified": "2025-03-28T14:26:01.253",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -51,14 +51,40 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"configurations": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/kilooooo/cms/blob/main/1.md",
|
"nodes": [
|
||||||
"source": "cve@mitre.org"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"url": "https://github.com/kilooooo/cms/blob/main/1.md",
|
"operator": "OR",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:codelyfe:stupid_simple_cms:*:*:*:*:*:*:*:*",
|
||||||
|
"versionEndIncluding": "1.2.4",
|
||||||
|
"matchCriteriaId": "700DA84E-DA65-4B87-B847-E4C61E24F5D1"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/kilooooo/cms/blob/main/1.md",
|
||||||
|
"source": "cve@mitre.org",
|
||||||
|
"tags": [
|
||||||
|
"Exploit",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/kilooooo/cms/blob/main/1.md",
|
||||||
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Exploit",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-27689",
|
"id": "CVE-2024-27689",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-03-01T17:15:07.573",
|
"published": "2024-03-01T17:15:07.573",
|
||||||
"lastModified": "2024-11-21T09:04:53.813",
|
"lastModified": "2025-03-28T14:25:42.963",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -51,14 +51,40 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"configurations": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/Xin246/cms/blob/main/2.md",
|
"nodes": [
|
||||||
"source": "cve@mitre.org"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"url": "https://github.com/Xin246/cms/blob/main/2.md",
|
"operator": "OR",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:codelyfe:stupid_simple_cms:*:*:*:*:*:*:*:*",
|
||||||
|
"versionEndIncluding": "1.2.4",
|
||||||
|
"matchCriteriaId": "700DA84E-DA65-4B87-B847-E4C61E24F5D1"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/Xin246/cms/blob/main/2.md",
|
||||||
|
"source": "cve@mitre.org",
|
||||||
|
"tags": [
|
||||||
|
"Exploit",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/Xin246/cms/blob/main/2.md",
|
||||||
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Exploit",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-27743",
|
"id": "CVE-2024-27743",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-03-01T22:15:47.823",
|
"published": "2024-03-01T22:15:47.823",
|
||||||
"lastModified": "2025-03-24T18:15:19.060",
|
"lastModified": "2025-03-28T14:34:38.150",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -51,14 +51,39 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"configurations": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/shubham-s-pandey/CVE_POC/blob/main/CVE-2024-27743.md",
|
"nodes": [
|
||||||
"source": "cve@mitre.org"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"url": "https://github.com/shubham-s-pandey/CVE_POC/blob/main/CVE-2024-27743.md",
|
"operator": "OR",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:mayurik:petrol_pump_management:1.0:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "A334E610-B489-4A7C-B31A-1132B26FFF0B"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/shubham-s-pandey/CVE_POC/blob/main/CVE-2024-27743.md",
|
||||||
|
"source": "cve@mitre.org",
|
||||||
|
"tags": [
|
||||||
|
"Exploit",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/shubham-s-pandey/CVE_POC/blob/main/CVE-2024-27743.md",
|
||||||
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Exploit",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-27744",
|
"id": "CVE-2024-27744",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-03-01T22:15:47.870",
|
"published": "2024-03-01T22:15:47.870",
|
||||||
"lastModified": "2024-11-21T09:04:58.937",
|
"lastModified": "2025-03-28T14:34:30.930",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -51,14 +51,39 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"configurations": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/shubham-s-pandey/CVE_POC/blob/main/CVE-2024-27744.md",
|
"nodes": [
|
||||||
"source": "cve@mitre.org"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"url": "https://github.com/shubham-s-pandey/CVE_POC/blob/main/CVE-2024-27744.md",
|
"operator": "OR",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:mayurik:petrol_pump_management:1.0:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "A334E610-B489-4A7C-B31A-1132B26FFF0B"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/shubham-s-pandey/CVE_POC/blob/main/CVE-2024-27744.md",
|
||||||
|
"source": "cve@mitre.org",
|
||||||
|
"tags": [
|
||||||
|
"Exploit",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/shubham-s-pandey/CVE_POC/blob/main/CVE-2024-27744.md",
|
||||||
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Exploit",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-27746",
|
"id": "CVE-2024-27746",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-03-01T22:15:47.923",
|
"published": "2024-03-01T22:15:47.923",
|
||||||
"lastModified": "2024-11-21T09:04:59.170",
|
"lastModified": "2025-03-28T14:34:25.407",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -51,14 +51,39 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"configurations": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/shubham-s-pandey/CVE_POC/blob/main/CVE-2024-27746.md",
|
"nodes": [
|
||||||
"source": "cve@mitre.org"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"url": "https://github.com/shubham-s-pandey/CVE_POC/blob/main/CVE-2024-27746.md",
|
"operator": "OR",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:mayurik:petrol_pump_management:1.0:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "A334E610-B489-4A7C-B31A-1132B26FFF0B"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/shubham-s-pandey/CVE_POC/blob/main/CVE-2024-27746.md",
|
||||||
|
"source": "cve@mitre.org",
|
||||||
|
"tags": [
|
||||||
|
"Exploit",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/shubham-s-pandey/CVE_POC/blob/main/CVE-2024-27746.md",
|
||||||
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Exploit",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-27747",
|
"id": "CVE-2024-27747",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-03-01T22:15:47.973",
|
"published": "2024-03-01T22:15:47.973",
|
||||||
"lastModified": "2024-11-21T09:04:59.400",
|
"lastModified": "2025-03-28T14:34:16.973",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -51,14 +51,39 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"configurations": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/shubham-s-pandey/CVE_POC/blob/main/CVE-2024-27747.md",
|
"nodes": [
|
||||||
"source": "cve@mitre.org"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"url": "https://github.com/shubham-s-pandey/CVE_POC/blob/main/CVE-2024-27747.md",
|
"operator": "OR",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:mayurik:petrol_pump_management:1.0:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "A334E610-B489-4A7C-B31A-1132B26FFF0B"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/shubham-s-pandey/CVE_POC/blob/main/CVE-2024-27747.md",
|
||||||
|
"source": "cve@mitre.org",
|
||||||
|
"tags": [
|
||||||
|
"Exploit",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/shubham-s-pandey/CVE_POC/blob/main/CVE-2024-27747.md",
|
||||||
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Exploit",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-28562",
|
"id": "CVE-2024-28562",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-03-20T06:15:08.127",
|
"published": "2024-03-20T06:15:08.127",
|
||||||
"lastModified": "2024-11-21T09:06:32.213",
|
"lastModified": "2025-03-28T14:44:56.623",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -51,38 +51,87 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"configurations": [
|
||||||
{
|
{
|
||||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/11/10",
|
"nodes": [
|
||||||
"source": "cve@mitre.org"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/11/2",
|
"operator": "OR",
|
||||||
"source": "cve@mitre.org"
|
"negate": false,
|
||||||
},
|
"cpeMatch": [
|
||||||
{
|
{
|
||||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/11/3",
|
"vulnerable": true,
|
||||||
"source": "cve@mitre.org"
|
"criteria": "cpe:2.3:a:freeimage_project:freeimage:3.19.0:*:*:*:*:*:*:*",
|
||||||
},
|
"matchCriteriaId": "63EC5C7E-8EF9-4AD3-ABF1-2E63313B764C"
|
||||||
{
|
}
|
||||||
"url": "https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909",
|
]
|
||||||
"source": "cve@mitre.org"
|
}
|
||||||
},
|
]
|
||||||
{
|
}
|
||||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/11/10",
|
],
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"references": [
|
||||||
},
|
{
|
||||||
{
|
"url": "http://www.openwall.com/lists/oss-security/2024/04/11/10",
|
||||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/11/2",
|
"source": "cve@mitre.org",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"tags": [
|
||||||
},
|
"Mailing List",
|
||||||
{
|
"Third Party Advisory"
|
||||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/11/3",
|
]
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
},
|
||||||
},
|
{
|
||||||
{
|
"url": "http://www.openwall.com/lists/oss-security/2024/04/11/2",
|
||||||
"url": "https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909",
|
"source": "cve@mitre.org",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"tags": [
|
||||||
|
"Mailing List",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "http://www.openwall.com/lists/oss-security/2024/04/11/3",
|
||||||
|
"source": "cve@mitre.org",
|
||||||
|
"tags": [
|
||||||
|
"Mailing List",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909",
|
||||||
|
"source": "cve@mitre.org",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory",
|
||||||
|
"Exploit"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "http://www.openwall.com/lists/oss-security/2024/04/11/10",
|
||||||
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Mailing List",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "http://www.openwall.com/lists/oss-security/2024/04/11/2",
|
||||||
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Mailing List",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "http://www.openwall.com/lists/oss-security/2024/04/11/3",
|
||||||
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Mailing List",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909",
|
||||||
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory",
|
||||||
|
"Exploit"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-28563",
|
"id": "CVE-2024-28563",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-03-20T06:15:08.780",
|
"published": "2024-03-20T06:15:08.780",
|
||||||
"lastModified": "2024-11-21T09:06:32.600",
|
"lastModified": "2025-03-28T14:52:00.437",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -51,38 +51,87 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"configurations": [
|
||||||
{
|
{
|
||||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/11/10",
|
"nodes": [
|
||||||
"source": "cve@mitre.org"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/11/2",
|
"operator": "OR",
|
||||||
"source": "cve@mitre.org"
|
"negate": false,
|
||||||
},
|
"cpeMatch": [
|
||||||
{
|
{
|
||||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/11/3",
|
"vulnerable": true,
|
||||||
"source": "cve@mitre.org"
|
"criteria": "cpe:2.3:a:freeimage_project:freeimage:3.19.0:*:*:*:*:*:*:*",
|
||||||
},
|
"matchCriteriaId": "63EC5C7E-8EF9-4AD3-ABF1-2E63313B764C"
|
||||||
{
|
}
|
||||||
"url": "https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909",
|
]
|
||||||
"source": "cve@mitre.org"
|
}
|
||||||
},
|
]
|
||||||
{
|
}
|
||||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/11/10",
|
],
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"references": [
|
||||||
},
|
{
|
||||||
{
|
"url": "http://www.openwall.com/lists/oss-security/2024/04/11/10",
|
||||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/11/2",
|
"source": "cve@mitre.org",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"tags": [
|
||||||
},
|
"Mailing List",
|
||||||
{
|
"Third Party Advisory"
|
||||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/11/3",
|
]
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
},
|
||||||
},
|
{
|
||||||
{
|
"url": "http://www.openwall.com/lists/oss-security/2024/04/11/2",
|
||||||
"url": "https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909",
|
"source": "cve@mitre.org",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"tags": [
|
||||||
|
"Mailing List",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "http://www.openwall.com/lists/oss-security/2024/04/11/3",
|
||||||
|
"source": "cve@mitre.org",
|
||||||
|
"tags": [
|
||||||
|
"Mailing List",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909",
|
||||||
|
"source": "cve@mitre.org",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory",
|
||||||
|
"Exploit"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "http://www.openwall.com/lists/oss-security/2024/04/11/10",
|
||||||
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Mailing List",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "http://www.openwall.com/lists/oss-security/2024/04/11/2",
|
||||||
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Mailing List",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "http://www.openwall.com/lists/oss-security/2024/04/11/3",
|
||||||
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Mailing List",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909",
|
||||||
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory",
|
||||||
|
"Exploit"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-28564",
|
"id": "CVE-2024-28564",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-03-20T06:15:08.933",
|
"published": "2024-03-20T06:15:08.933",
|
||||||
"lastModified": "2024-11-21T09:06:32.927",
|
"lastModified": "2025-03-28T14:51:57.007",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -51,38 +51,87 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"configurations": [
|
||||||
{
|
{
|
||||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/11/10",
|
"nodes": [
|
||||||
"source": "cve@mitre.org"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/11/2",
|
"operator": "OR",
|
||||||
"source": "cve@mitre.org"
|
"negate": false,
|
||||||
},
|
"cpeMatch": [
|
||||||
{
|
{
|
||||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/11/3",
|
"vulnerable": true,
|
||||||
"source": "cve@mitre.org"
|
"criteria": "cpe:2.3:a:freeimage_project:freeimage:3.19.0:*:*:*:*:*:*:*",
|
||||||
},
|
"matchCriteriaId": "63EC5C7E-8EF9-4AD3-ABF1-2E63313B764C"
|
||||||
{
|
}
|
||||||
"url": "https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909",
|
]
|
||||||
"source": "cve@mitre.org"
|
}
|
||||||
},
|
]
|
||||||
{
|
}
|
||||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/11/10",
|
],
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"references": [
|
||||||
},
|
{
|
||||||
{
|
"url": "http://www.openwall.com/lists/oss-security/2024/04/11/10",
|
||||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/11/2",
|
"source": "cve@mitre.org",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"tags": [
|
||||||
},
|
"Mailing List",
|
||||||
{
|
"Third Party Advisory"
|
||||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/11/3",
|
]
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
},
|
||||||
},
|
{
|
||||||
{
|
"url": "http://www.openwall.com/lists/oss-security/2024/04/11/2",
|
||||||
"url": "https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909",
|
"source": "cve@mitre.org",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"tags": [
|
||||||
|
"Mailing List",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "http://www.openwall.com/lists/oss-security/2024/04/11/3",
|
||||||
|
"source": "cve@mitre.org",
|
||||||
|
"tags": [
|
||||||
|
"Mailing List",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909",
|
||||||
|
"source": "cve@mitre.org",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory",
|
||||||
|
"Exploit"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "http://www.openwall.com/lists/oss-security/2024/04/11/10",
|
||||||
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Mailing List",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "http://www.openwall.com/lists/oss-security/2024/04/11/2",
|
||||||
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Mailing List",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "http://www.openwall.com/lists/oss-security/2024/04/11/3",
|
||||||
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Mailing List",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909",
|
||||||
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory",
|
||||||
|
"Exploit"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-28565",
|
"id": "CVE-2024-28565",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-03-20T06:15:09.087",
|
"published": "2024-03-20T06:15:09.087",
|
||||||
"lastModified": "2024-12-04T21:15:23.083",
|
"lastModified": "2025-03-28T14:51:53.900",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -51,38 +51,87 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"configurations": [
|
||||||
{
|
{
|
||||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/11/10",
|
"nodes": [
|
||||||
"source": "cve@mitre.org"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/11/2",
|
"operator": "OR",
|
||||||
"source": "cve@mitre.org"
|
"negate": false,
|
||||||
},
|
"cpeMatch": [
|
||||||
{
|
{
|
||||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/11/3",
|
"vulnerable": true,
|
||||||
"source": "cve@mitre.org"
|
"criteria": "cpe:2.3:a:freeimage_project:freeimage:3.19.0:*:*:*:*:*:*:*",
|
||||||
},
|
"matchCriteriaId": "63EC5C7E-8EF9-4AD3-ABF1-2E63313B764C"
|
||||||
{
|
}
|
||||||
"url": "https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909",
|
]
|
||||||
"source": "cve@mitre.org"
|
}
|
||||||
},
|
]
|
||||||
{
|
}
|
||||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/11/10",
|
],
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"references": [
|
||||||
},
|
{
|
||||||
{
|
"url": "http://www.openwall.com/lists/oss-security/2024/04/11/10",
|
||||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/11/2",
|
"source": "cve@mitre.org",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"tags": [
|
||||||
},
|
"Mailing List",
|
||||||
{
|
"Third Party Advisory"
|
||||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/11/3",
|
]
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
},
|
||||||
},
|
{
|
||||||
{
|
"url": "http://www.openwall.com/lists/oss-security/2024/04/11/2",
|
||||||
"url": "https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909",
|
"source": "cve@mitre.org",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"tags": [
|
||||||
|
"Mailing List",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "http://www.openwall.com/lists/oss-security/2024/04/11/3",
|
||||||
|
"source": "cve@mitre.org",
|
||||||
|
"tags": [
|
||||||
|
"Mailing List",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909",
|
||||||
|
"source": "cve@mitre.org",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory",
|
||||||
|
"Exploit"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "http://www.openwall.com/lists/oss-security/2024/04/11/10",
|
||||||
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Mailing List",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "http://www.openwall.com/lists/oss-security/2024/04/11/2",
|
||||||
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Mailing List",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "http://www.openwall.com/lists/oss-security/2024/04/11/3",
|
||||||
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Mailing List",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909",
|
||||||
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory",
|
||||||
|
"Exploit"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-28566",
|
"id": "CVE-2024-28566",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-03-20T06:15:09.270",
|
"published": "2024-03-20T06:15:09.270",
|
||||||
"lastModified": "2024-11-21T09:06:34.113",
|
"lastModified": "2025-03-28T14:51:49.903",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -51,14 +51,39 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"configurations": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909",
|
"nodes": [
|
||||||
"source": "cve@mitre.org"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"url": "https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909",
|
"operator": "OR",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:freeimage_project:freeimage:3.19.0:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "63EC5C7E-8EF9-4AD3-ABF1-2E63313B764C"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909",
|
||||||
|
"source": "cve@mitre.org",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory",
|
||||||
|
"Exploit"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909",
|
||||||
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory",
|
||||||
|
"Exploit"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-28567",
|
"id": "CVE-2024-28567",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-03-20T06:15:09.447",
|
"published": "2024-03-20T06:15:09.447",
|
||||||
"lastModified": "2024-11-21T09:06:34.490",
|
"lastModified": "2025-03-28T14:49:08.173",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -51,14 +51,39 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"configurations": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909",
|
"nodes": [
|
||||||
"source": "cve@mitre.org"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"url": "https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909",
|
"operator": "OR",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:freeimage_project:freeimage:3.19.0:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "63EC5C7E-8EF9-4AD3-ABF1-2E63313B764C"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909",
|
||||||
|
"source": "cve@mitre.org",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory",
|
||||||
|
"Exploit"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909",
|
||||||
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory",
|
||||||
|
"Exploit"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-28568",
|
"id": "CVE-2024-28568",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-03-20T06:15:09.640",
|
"published": "2024-03-20T06:15:09.640",
|
||||||
"lastModified": "2024-11-21T09:06:34.790",
|
"lastModified": "2025-03-28T14:49:04.690",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -51,14 +51,39 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"configurations": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909",
|
"nodes": [
|
||||||
"source": "cve@mitre.org"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"url": "https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909",
|
"operator": "OR",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:freeimage_project:freeimage:3.19.0:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "63EC5C7E-8EF9-4AD3-ABF1-2E63313B764C"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909",
|
||||||
|
"source": "cve@mitre.org",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory",
|
||||||
|
"Exploit"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909",
|
||||||
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory",
|
||||||
|
"Exploit"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-28569",
|
"id": "CVE-2024-28569",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-03-20T06:15:09.797",
|
"published": "2024-03-20T06:15:09.797",
|
||||||
"lastModified": "2024-11-21T09:06:35.107",
|
"lastModified": "2025-03-28T14:49:01.337",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -51,14 +51,39 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"configurations": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909",
|
"nodes": [
|
||||||
"source": "cve@mitre.org"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"url": "https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909",
|
"operator": "OR",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:freeimage_project:freeimage:3.19.0:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "63EC5C7E-8EF9-4AD3-ABF1-2E63313B764C"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909",
|
||||||
|
"source": "cve@mitre.org",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory",
|
||||||
|
"Exploit"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909",
|
||||||
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory",
|
||||||
|
"Exploit"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-28570",
|
"id": "CVE-2024-28570",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-03-20T06:15:09.970",
|
"published": "2024-03-20T06:15:09.970",
|
||||||
"lastModified": "2024-11-21T09:06:35.440",
|
"lastModified": "2025-03-28T14:48:56.937",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -51,14 +51,39 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"configurations": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909",
|
"nodes": [
|
||||||
"source": "cve@mitre.org"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"url": "https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909",
|
"operator": "OR",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:freeimage_project:freeimage:3.19.0:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "63EC5C7E-8EF9-4AD3-ABF1-2E63313B764C"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909",
|
||||||
|
"source": "cve@mitre.org",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory",
|
||||||
|
"Exploit"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909",
|
||||||
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory",
|
||||||
|
"Exploit"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-28571",
|
"id": "CVE-2024-28571",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-03-20T06:15:10.137",
|
"published": "2024-03-20T06:15:10.137",
|
||||||
"lastModified": "2024-11-21T09:06:35.760",
|
"lastModified": "2025-03-28T14:48:54.140",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -51,14 +51,39 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"configurations": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909",
|
"nodes": [
|
||||||
"source": "cve@mitre.org"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"url": "https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909",
|
"operator": "OR",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:freeimage_project:freeimage:3.19.0:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "63EC5C7E-8EF9-4AD3-ABF1-2E63313B764C"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909",
|
||||||
|
"source": "cve@mitre.org",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory",
|
||||||
|
"Exploit"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909",
|
||||||
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory",
|
||||||
|
"Exploit"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-28572",
|
"id": "CVE-2024-28572",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-03-20T06:15:10.290",
|
"published": "2024-03-20T06:15:10.290",
|
||||||
"lastModified": "2024-11-21T09:06:36.090",
|
"lastModified": "2025-03-28T14:48:51.143",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -51,14 +51,39 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"configurations": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909",
|
"nodes": [
|
||||||
"source": "cve@mitre.org"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"url": "https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909",
|
"operator": "OR",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:freeimage_project:freeimage:3.19.0:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "63EC5C7E-8EF9-4AD3-ABF1-2E63313B764C"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909",
|
||||||
|
"source": "cve@mitre.org",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory",
|
||||||
|
"Exploit"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909",
|
||||||
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory",
|
||||||
|
"Exploit"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-28573",
|
"id": "CVE-2024-28573",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-03-20T06:15:10.460",
|
"published": "2024-03-20T06:15:10.460",
|
||||||
"lastModified": "2024-11-21T09:06:37.043",
|
"lastModified": "2025-03-28T14:48:47.437",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -51,14 +51,39 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"configurations": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909",
|
"nodes": [
|
||||||
"source": "cve@mitre.org"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"url": "https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909",
|
"operator": "OR",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:freeimage_project:freeimage:3.19.0:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "63EC5C7E-8EF9-4AD3-ABF1-2E63313B764C"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909",
|
||||||
|
"source": "cve@mitre.org",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory",
|
||||||
|
"Exploit"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909",
|
||||||
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory",
|
||||||
|
"Exploit"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-28574",
|
"id": "CVE-2024-28574",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-03-20T06:15:10.623",
|
"published": "2024-03-20T06:15:10.623",
|
||||||
"lastModified": "2024-11-21T09:06:37.343",
|
"lastModified": "2025-03-28T14:48:43.373",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -51,14 +51,39 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"configurations": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909",
|
"nodes": [
|
||||||
"source": "cve@mitre.org"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"url": "https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909",
|
"operator": "OR",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:freeimage_project:freeimage:3.19.0:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "63EC5C7E-8EF9-4AD3-ABF1-2E63313B764C"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909",
|
||||||
|
"source": "cve@mitre.org",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory",
|
||||||
|
"Exploit"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909",
|
||||||
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory",
|
||||||
|
"Exploit"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-28575",
|
"id": "CVE-2024-28575",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-03-20T06:15:10.790",
|
"published": "2024-03-20T06:15:10.790",
|
||||||
"lastModified": "2024-11-21T09:06:37.643",
|
"lastModified": "2025-03-28T14:48:40.390",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -51,14 +51,39 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"configurations": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909",
|
"nodes": [
|
||||||
"source": "cve@mitre.org"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"url": "https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909",
|
"operator": "OR",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:freeimage_project:freeimage:3.19.0:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "63EC5C7E-8EF9-4AD3-ABF1-2E63313B764C"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909",
|
||||||
|
"source": "cve@mitre.org",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory",
|
||||||
|
"Exploit"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909",
|
||||||
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory",
|
||||||
|
"Exploit"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-28576",
|
"id": "CVE-2024-28576",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-03-20T06:15:10.950",
|
"published": "2024-03-20T06:15:10.950",
|
||||||
"lastModified": "2024-11-21T09:06:37.980",
|
"lastModified": "2025-03-28T14:48:37.483",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -51,14 +51,39 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"configurations": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909",
|
"nodes": [
|
||||||
"source": "cve@mitre.org"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"url": "https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909",
|
"operator": "OR",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:freeimage_project:freeimage:3.19.0:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "63EC5C7E-8EF9-4AD3-ABF1-2E63313B764C"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909",
|
||||||
|
"source": "cve@mitre.org",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory",
|
||||||
|
"Exploit"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909",
|
||||||
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory",
|
||||||
|
"Exploit"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-28577",
|
"id": "CVE-2024-28577",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-03-20T06:15:11.120",
|
"published": "2024-03-20T06:15:11.120",
|
||||||
"lastModified": "2024-11-21T09:06:38.280",
|
"lastModified": "2025-03-28T14:48:33.360",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -51,14 +51,39 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"configurations": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909",
|
"nodes": [
|
||||||
"source": "cve@mitre.org"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"url": "https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909",
|
"operator": "OR",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:freeimage_project:freeimage:3.19.0:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "63EC5C7E-8EF9-4AD3-ABF1-2E63313B764C"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909",
|
||||||
|
"source": "cve@mitre.org",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory",
|
||||||
|
"Exploit"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909",
|
||||||
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory",
|
||||||
|
"Exploit"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-28578",
|
"id": "CVE-2024-28578",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-03-20T06:15:11.277",
|
"published": "2024-03-20T06:15:11.277",
|
||||||
"lastModified": "2024-11-21T09:06:38.590",
|
"lastModified": "2025-03-28T14:48:28.610",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -51,14 +51,39 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"configurations": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909",
|
"nodes": [
|
||||||
"source": "cve@mitre.org"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"url": "https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909",
|
"operator": "OR",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:freeimage_project:freeimage:3.19.0:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "63EC5C7E-8EF9-4AD3-ABF1-2E63313B764C"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909",
|
||||||
|
"source": "cve@mitre.org",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory",
|
||||||
|
"Exploit"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909",
|
||||||
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory",
|
||||||
|
"Exploit"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-28579",
|
"id": "CVE-2024-28579",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-03-20T06:15:11.440",
|
"published": "2024-03-20T06:15:11.440",
|
||||||
"lastModified": "2024-11-21T09:06:38.930",
|
"lastModified": "2025-03-28T14:48:24.560",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -51,14 +51,39 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"configurations": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909",
|
"nodes": [
|
||||||
"source": "cve@mitre.org"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"url": "https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909",
|
"operator": "OR",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:freeimage_project:freeimage:3.19.0:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "63EC5C7E-8EF9-4AD3-ABF1-2E63313B764C"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909",
|
||||||
|
"source": "cve@mitre.org",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory",
|
||||||
|
"Exploit"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909",
|
||||||
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory",
|
||||||
|
"Exploit"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-28580",
|
"id": "CVE-2024-28580",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-03-20T06:15:11.590",
|
"published": "2024-03-20T06:15:11.590",
|
||||||
"lastModified": "2024-11-21T09:06:39.213",
|
"lastModified": "2025-03-28T14:48:19.057",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -51,14 +51,39 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"configurations": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909",
|
"nodes": [
|
||||||
"source": "cve@mitre.org"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"url": "https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909",
|
"operator": "OR",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:freeimage_project:freeimage:3.19.0:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "63EC5C7E-8EF9-4AD3-ABF1-2E63313B764C"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909",
|
||||||
|
"source": "cve@mitre.org",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory",
|
||||||
|
"Exploit"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909",
|
||||||
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory",
|
||||||
|
"Exploit"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-28581",
|
"id": "CVE-2024-28581",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-03-20T06:15:11.770",
|
"published": "2024-03-20T06:15:11.770",
|
||||||
"lastModified": "2024-11-21T09:06:39.493",
|
"lastModified": "2025-03-28T14:48:15.920",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -51,14 +51,39 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"configurations": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909",
|
"nodes": [
|
||||||
"source": "cve@mitre.org"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"url": "https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909",
|
"operator": "OR",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:freeimage_project:freeimage:3.19.0:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "63EC5C7E-8EF9-4AD3-ABF1-2E63313B764C"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909",
|
||||||
|
"source": "cve@mitre.org",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory",
|
||||||
|
"Exploit"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909",
|
||||||
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory",
|
||||||
|
"Exploit"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-28582",
|
"id": "CVE-2024-28582",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-03-20T06:15:11.920",
|
"published": "2024-03-20T06:15:11.920",
|
||||||
"lastModified": "2024-11-21T09:06:39.790",
|
"lastModified": "2025-03-28T14:48:12.423",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -51,14 +51,39 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"configurations": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909",
|
"nodes": [
|
||||||
"source": "cve@mitre.org"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"url": "https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909",
|
"operator": "OR",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:freeimage_project:freeimage:3.19.0:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "63EC5C7E-8EF9-4AD3-ABF1-2E63313B764C"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909",
|
||||||
|
"source": "cve@mitre.org",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory",
|
||||||
|
"Exploit"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909",
|
||||||
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory",
|
||||||
|
"Exploit"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-28583",
|
"id": "CVE-2024-28583",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-03-20T06:15:12.087",
|
"published": "2024-03-20T06:15:12.087",
|
||||||
"lastModified": "2024-11-21T09:06:40.073",
|
"lastModified": "2025-03-28T14:48:08.290",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -51,14 +51,39 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"configurations": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909",
|
"nodes": [
|
||||||
"source": "cve@mitre.org"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"url": "https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909",
|
"operator": "OR",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:freeimage_project:freeimage:3.19.0:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "63EC5C7E-8EF9-4AD3-ABF1-2E63313B764C"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909",
|
||||||
|
"source": "cve@mitre.org",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory",
|
||||||
|
"Exploit"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909",
|
||||||
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory",
|
||||||
|
"Exploit"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-28584",
|
"id": "CVE-2024-28584",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-03-20T06:15:12.247",
|
"published": "2024-03-20T06:15:12.247",
|
||||||
"lastModified": "2024-11-21T09:06:40.357",
|
"lastModified": "2025-03-28T14:47:52.610",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -51,38 +51,87 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"configurations": [
|
||||||
{
|
{
|
||||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/11/10",
|
"nodes": [
|
||||||
"source": "cve@mitre.org"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/11/2",
|
"operator": "OR",
|
||||||
"source": "cve@mitre.org"
|
"negate": false,
|
||||||
},
|
"cpeMatch": [
|
||||||
{
|
{
|
||||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/11/3",
|
"vulnerable": true,
|
||||||
"source": "cve@mitre.org"
|
"criteria": "cpe:2.3:a:freeimage_project:freeimage:3.19.0:*:*:*:*:*:*:*",
|
||||||
},
|
"matchCriteriaId": "63EC5C7E-8EF9-4AD3-ABF1-2E63313B764C"
|
||||||
{
|
}
|
||||||
"url": "https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909",
|
]
|
||||||
"source": "cve@mitre.org"
|
}
|
||||||
},
|
]
|
||||||
{
|
}
|
||||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/11/10",
|
],
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"references": [
|
||||||
},
|
{
|
||||||
{
|
"url": "http://www.openwall.com/lists/oss-security/2024/04/11/10",
|
||||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/11/2",
|
"source": "cve@mitre.org",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"tags": [
|
||||||
},
|
"Mailing List",
|
||||||
{
|
"Third Party Advisory"
|
||||||
"url": "http://www.openwall.com/lists/oss-security/2024/04/11/3",
|
]
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
},
|
||||||
},
|
{
|
||||||
{
|
"url": "http://www.openwall.com/lists/oss-security/2024/04/11/2",
|
||||||
"url": "https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909",
|
"source": "cve@mitre.org",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"tags": [
|
||||||
|
"Mailing List",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "http://www.openwall.com/lists/oss-security/2024/04/11/3",
|
||||||
|
"source": "cve@mitre.org",
|
||||||
|
"tags": [
|
||||||
|
"Mailing List",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909",
|
||||||
|
"source": "cve@mitre.org",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory",
|
||||||
|
"Exploit"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "http://www.openwall.com/lists/oss-security/2024/04/11/10",
|
||||||
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Mailing List",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "http://www.openwall.com/lists/oss-security/2024/04/11/2",
|
||||||
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Mailing List",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "http://www.openwall.com/lists/oss-security/2024/04/11/3",
|
||||||
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Mailing List",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909",
|
||||||
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory",
|
||||||
|
"Exploit"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-44276",
|
"id": "CVE-2024-44276",
|
||||||
"sourceIdentifier": "product-security@apple.com",
|
"sourceIdentifier": "product-security@apple.com",
|
||||||
"published": "2025-03-17T20:15:13.130",
|
"published": "2025-03-17T20:15:13.130",
|
||||||
"lastModified": "2025-03-21T17:15:38.070",
|
"lastModified": "2025-03-28T14:09:35.787",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -51,10 +51,38 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"configurations": [
|
||||||
{
|
{
|
||||||
"url": "https://support.apple.com/en-us/121837",
|
"nodes": [
|
||||||
"source": "product-security@apple.com"
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
|
||||||
|
"versionEndExcluding": "18.2",
|
||||||
|
"matchCriteriaId": "61B67D76-E2DA-46D7-9E43-4E18D542AA57"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
|
||||||
|
"versionEndExcluding": "18.2",
|
||||||
|
"matchCriteriaId": "02BF92BD-305C-46CA-8A77-C247AF8B1BC0"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://support.apple.com/en-us/121837",
|
||||||
|
"source": "product-security@apple.com",
|
||||||
|
"tags": [
|
||||||
|
"Release Notes",
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
82
CVE-2024/CVE-2024-74xx/CVE-2024-7407.json
Normal file
82
CVE-2024/CVE-2024-74xx/CVE-2024-7407.json
Normal file
@ -0,0 +1,82 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-7407",
|
||||||
|
"sourceIdentifier": "cvd@cert.pl",
|
||||||
|
"published": "2025-03-28T13:15:40.760",
|
||||||
|
"lastModified": "2025-03-28T13:15:40.760",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Use of a custom password encoding algorithm\u00a0in Streamsoft Presti\u017c software allows straightforward decoding of passwords using their encoded forms, which are stored in the application's database. One has to know the encoding algorithm, but it can be deduced by observing how password are transformed.\u00a0\nThis issue was fixed in 18.2.377 version of the software."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV40": [
|
||||||
|
{
|
||||||
|
"source": "cvd@cert.pl",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "4.0",
|
||||||
|
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||||
|
"baseScore": 8.2,
|
||||||
|
"baseSeverity": "HIGH",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"attackRequirements": "PRESENT",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"vulnConfidentialityImpact": "HIGH",
|
||||||
|
"vulnIntegrityImpact": "NONE",
|
||||||
|
"vulnAvailabilityImpact": "NONE",
|
||||||
|
"subConfidentialityImpact": "NONE",
|
||||||
|
"subIntegrityImpact": "NONE",
|
||||||
|
"subAvailabilityImpact": "NONE",
|
||||||
|
"exploitMaturity": "NOT_DEFINED",
|
||||||
|
"confidentialityRequirement": "NOT_DEFINED",
|
||||||
|
"integrityRequirement": "NOT_DEFINED",
|
||||||
|
"availabilityRequirement": "NOT_DEFINED",
|
||||||
|
"modifiedAttackVector": "NOT_DEFINED",
|
||||||
|
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||||
|
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||||
|
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||||
|
"modifiedUserInteraction": "NOT_DEFINED",
|
||||||
|
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||||
|
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||||
|
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||||
|
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||||
|
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||||
|
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||||
|
"Safety": "NOT_DEFINED",
|
||||||
|
"Automatable": "NOT_DEFINED",
|
||||||
|
"Recovery": "NOT_DEFINED",
|
||||||
|
"valueDensity": "NOT_DEFINED",
|
||||||
|
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||||
|
"providerUrgency": "NOT_DEFINED"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "cvd@cert.pl",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-261"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://cert.pl/en/posts/2025/03/CVE-2024-7407/",
|
||||||
|
"source": "cvd@cert.pl"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://www.streamsoft.pl/streamsoft-prestiz/",
|
||||||
|
"source": "cvd@cert.pl"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2025-0189",
|
"id": "CVE-2025-0189",
|
||||||
"sourceIdentifier": "security@huntr.dev",
|
"sourceIdentifier": "security@huntr.dev",
|
||||||
"published": "2025-03-20T10:15:51.660",
|
"published": "2025-03-20T10:15:51.660",
|
||||||
"lastModified": "2025-03-20T10:15:51.660",
|
"lastModified": "2025-03-28T14:31:37.077",
|
||||||
"vulnStatus": "Undergoing Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -16,6 +16,28 @@
|
|||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||||
|
"baseScore": 7.5,
|
||||||
|
"baseSeverity": "HIGH",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 3.6
|
||||||
|
}
|
||||||
|
],
|
||||||
"cvssMetricV30": [
|
"cvssMetricV30": [
|
||||||
{
|
{
|
||||||
"source": "security@huntr.dev",
|
"source": "security@huntr.dev",
|
||||||
@ -49,12 +71,43 @@
|
|||||||
"value": "CWE-400"
|
"value": "CWE-400"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "NVD-CWE-noinfo"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:aimstack:aim:3.25.0:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "A9850B23-8420-4636-8BCF-DBFB56C51026"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://huntr.com/bounties/e4c9bf41-72cf-4d04-baaf-8f12b5b7926e",
|
"url": "https://huntr.com/bounties/e4c9bf41-72cf-4d04-baaf-8f12b5b7926e",
|
||||||
"source": "security@huntr.dev"
|
"source": "security@huntr.dev",
|
||||||
|
"tags": [
|
||||||
|
"Exploit",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2025-0190",
|
"id": "CVE-2025-0190",
|
||||||
"sourceIdentifier": "security@huntr.dev",
|
"sourceIdentifier": "security@huntr.dev",
|
||||||
"published": "2025-03-20T10:15:51.780",
|
"published": "2025-03-20T10:15:51.780",
|
||||||
"lastModified": "2025-03-20T10:15:51.780",
|
"lastModified": "2025-03-28T14:28:25.273",
|
||||||
"vulnStatus": "Undergoing Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -16,6 +16,28 @@
|
|||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||||
|
"baseScore": 7.5,
|
||||||
|
"baseSeverity": "HIGH",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 3.6
|
||||||
|
}
|
||||||
|
],
|
||||||
"cvssMetricV30": [
|
"cvssMetricV30": [
|
||||||
{
|
{
|
||||||
"source": "security@huntr.dev",
|
"source": "security@huntr.dev",
|
||||||
@ -49,12 +71,43 @@
|
|||||||
"value": "CWE-1049"
|
"value": "CWE-1049"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "NVD-CWE-Other"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:aimstack:aim:3.25.0:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "A9850B23-8420-4636-8BCF-DBFB56C51026"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://huntr.com/bounties/38d151f1-abb4-443a-86b0-6c26f0c6cb70",
|
"url": "https://huntr.com/bounties/38d151f1-abb4-443a-86b0-6c26f0c6cb70",
|
||||||
"source": "security@huntr.dev"
|
"source": "security@huntr.dev",
|
||||||
|
"tags": [
|
||||||
|
"Exploit",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2025-0281",
|
"id": "CVE-2025-0281",
|
||||||
"sourceIdentifier": "security@huntr.dev",
|
"sourceIdentifier": "security@huntr.dev",
|
||||||
"published": "2025-03-20T10:15:52.153",
|
"published": "2025-03-20T10:15:52.153",
|
||||||
"lastModified": "2025-03-20T10:15:52.153",
|
"lastModified": "2025-03-28T14:22:53.790",
|
||||||
"vulnStatus": "Undergoing Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -16,6 +16,28 @@
|
|||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||||
|
"baseScore": 5.4,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.3,
|
||||||
|
"impactScore": 2.7
|
||||||
|
}
|
||||||
|
],
|
||||||
"cvssMetricV30": [
|
"cvssMetricV30": [
|
||||||
{
|
{
|
||||||
"source": "security@huntr.dev",
|
"source": "security@huntr.dev",
|
||||||
@ -49,16 +71,51 @@
|
|||||||
"value": "CWE-79"
|
"value": "CWE-79"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-79"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:lunary:lunary:*:*:*:*:*:*:*:*",
|
||||||
|
"versionEndExcluding": "1.7.10",
|
||||||
|
"matchCriteriaId": "5106B674-3156-4590-AE06-FB38C5CF7424"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/lunary-ai/lunary/commit/fa0fd7742ae029ed934690d282519263f5d838de",
|
"url": "https://github.com/lunary-ai/lunary/commit/fa0fd7742ae029ed934690d282519263f5d838de",
|
||||||
"source": "security@huntr.dev"
|
"source": "security@huntr.dev",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://huntr.com/bounties/b3f4a655-5b08-4fef-be2c-aac8703ad5d0",
|
"url": "https://huntr.com/bounties/b3f4a655-5b08-4fef-be2c-aac8703ad5d0",
|
||||||
"source": "security@huntr.dev"
|
"source": "security@huntr.dev",
|
||||||
|
"tags": [
|
||||||
|
"Exploit",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2025-0312",
|
"id": "CVE-2025-0312",
|
||||||
"sourceIdentifier": "security@huntr.dev",
|
"sourceIdentifier": "security@huntr.dev",
|
||||||
"published": "2025-03-20T10:15:52.280",
|
"published": "2025-03-20T10:15:52.280",
|
||||||
"lastModified": "2025-03-20T10:15:52.280",
|
"lastModified": "2025-03-28T14:11:12.457",
|
||||||
"vulnStatus": "Undergoing Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -16,6 +16,28 @@
|
|||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||||
|
"baseScore": 7.5,
|
||||||
|
"baseSeverity": "HIGH",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 3.6
|
||||||
|
}
|
||||||
|
],
|
||||||
"cvssMetricV30": [
|
"cvssMetricV30": [
|
||||||
{
|
{
|
||||||
"source": "security@huntr.dev",
|
"source": "security@huntr.dev",
|
||||||
@ -49,12 +71,44 @@
|
|||||||
"value": "CWE-476"
|
"value": "CWE-476"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-476"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:ollama:ollama:*:*:*:*:*:*:*:*",
|
||||||
|
"versionEndIncluding": "0.3.14",
|
||||||
|
"matchCriteriaId": "F416AD53-06BC-45FB-A167-23869CC4E37A"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://huntr.com/bounties/522c87b6-a7ac-41b2-84f3-62fd58921f21",
|
"url": "https://huntr.com/bounties/522c87b6-a7ac-41b2-84f3-62fd58921f21",
|
||||||
"source": "security@huntr.dev"
|
"source": "security@huntr.dev",
|
||||||
|
"tags": [
|
||||||
|
"Exploit",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
56
CVE-2025/CVE-2025-09xx/CVE-2025-0986.json
Normal file
56
CVE-2025/CVE-2025-09xx/CVE-2025-0986.json
Normal file
@ -0,0 +1,56 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2025-0986",
|
||||||
|
"sourceIdentifier": "psirt@us.ibm.com",
|
||||||
|
"published": "2025-03-28T14:15:19.357",
|
||||||
|
"lastModified": "2025-03-28T14:15:19.357",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "IBM PowerVM Hypervisor FW1050.00 through FW1050.30 and FW1060.00 through FW1060.20 could allow a local user, under certain Linux processor combability mode configurations, to cause undetected data loss or errors when performing gzip compression using HW acceleration."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "psirt@us.ibm.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:L",
|
||||||
|
"baseScore": 4.5,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "HIGH",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "LOW"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.4,
|
||||||
|
"impactScore": 2.7
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "psirt@us.ibm.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-409"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://www.ibm.com/support/pages/node/7229349",
|
||||||
|
"source": "psirt@us.ibm.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2025-1653",
|
"id": "CVE-2025-1653",
|
||||||
"sourceIdentifier": "security@wordfence.com",
|
"sourceIdentifier": "security@wordfence.com",
|
||||||
"published": "2025-03-15T03:15:34.457",
|
"published": "2025-03-15T03:15:34.457",
|
||||||
"lastModified": "2025-03-15T03:15:34.457",
|
"lastModified": "2025-03-28T13:17:33.270",
|
||||||
"vulnStatus": "Undergoing Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -49,16 +49,51 @@
|
|||||||
"value": "CWE-266"
|
"value": "CWE-266"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "NVD-CWE-noinfo"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:stylemixthemes:ulisting:*:*:*:*:*:wordpress:*:*",
|
||||||
|
"versionEndIncluding": "2.1.7",
|
||||||
|
"matchCriteriaId": "FD860D19-4C83-4043-8152-782413B7C1B0"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://wordpress.org/plugins/ulisting/",
|
"url": "https://wordpress.org/plugins/ulisting/",
|
||||||
"source": "security@wordfence.com"
|
"source": "security@wordfence.com",
|
||||||
|
"tags": [
|
||||||
|
"Product"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/4181b26e-89c7-4020-a3d4-29bdc88d7438?source=cve",
|
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/4181b26e-89c7-4020-a3d4-29bdc88d7438?source=cve",
|
||||||
"source": "security@wordfence.com"
|
"source": "security@wordfence.com",
|
||||||
|
"tags": [
|
||||||
|
"Mitigation",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
78
CVE-2025/CVE-2025-17xx/CVE-2025-1781.json
Normal file
78
CVE-2025/CVE-2025-17xx/CVE-2025-1781.json
Normal file
@ -0,0 +1,78 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2025-1781",
|
||||||
|
"sourceIdentifier": "cve-coordination@google.com",
|
||||||
|
"published": "2025-03-28T14:15:19.687",
|
||||||
|
"lastModified": "2025-03-28T14:15:19.687",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "There is a XXE in W3CSS Validator versions before\u00a0cssval-20250226 that allows an attacker to use specially-crafted XML objects to coerce server-side request forgery (SSRF).\u00a0 This could be exploited to read arbitrary local files if an attacker has access to exception messages."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV40": [
|
||||||
|
{
|
||||||
|
"source": "cve-coordination@google.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "4.0",
|
||||||
|
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:L/SC:N/SI:H/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||||
|
"baseScore": 8.4,
|
||||||
|
"baseSeverity": "HIGH",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"attackRequirements": "NONE",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"vulnConfidentialityImpact": "NONE",
|
||||||
|
"vulnIntegrityImpact": "HIGH",
|
||||||
|
"vulnAvailabilityImpact": "LOW",
|
||||||
|
"subConfidentialityImpact": "NONE",
|
||||||
|
"subIntegrityImpact": "HIGH",
|
||||||
|
"subAvailabilityImpact": "LOW",
|
||||||
|
"exploitMaturity": "NOT_DEFINED",
|
||||||
|
"confidentialityRequirement": "NOT_DEFINED",
|
||||||
|
"integrityRequirement": "NOT_DEFINED",
|
||||||
|
"availabilityRequirement": "NOT_DEFINED",
|
||||||
|
"modifiedAttackVector": "NOT_DEFINED",
|
||||||
|
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||||
|
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||||
|
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||||
|
"modifiedUserInteraction": "NOT_DEFINED",
|
||||||
|
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||||
|
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||||
|
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||||
|
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||||
|
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||||
|
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||||
|
"Safety": "NOT_DEFINED",
|
||||||
|
"Automatable": "NOT_DEFINED",
|
||||||
|
"Recovery": "NOT_DEFINED",
|
||||||
|
"valueDensity": "NOT_DEFINED",
|
||||||
|
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||||
|
"providerUrgency": "NOT_DEFINED"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "cve-coordination@google.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-611"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/google/security-research/security/advisories/GHSA-745m-xmq6-g6x7",
|
||||||
|
"source": "cve-coordination@google.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2025-20124",
|
"id": "CVE-2025-20124",
|
||||||
"sourceIdentifier": "psirt@cisco.com",
|
"sourceIdentifier": "psirt@cisco.com",
|
||||||
"published": "2025-02-05T17:15:22.457",
|
"published": "2025-02-05T17:15:22.457",
|
||||||
"lastModified": "2025-02-05T17:15:22.457",
|
"lastModified": "2025-03-28T13:22:42.077",
|
||||||
"vulnStatus": "Undergoing Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -19,7 +19,7 @@
|
|||||||
"cvssMetricV31": [
|
"cvssMetricV31": [
|
||||||
{
|
{
|
||||||
"source": "psirt@cisco.com",
|
"source": "psirt@cisco.com",
|
||||||
"type": "Primary",
|
"type": "Secondary",
|
||||||
"cvssData": {
|
"cvssData": {
|
||||||
"version": "3.1",
|
"version": "3.1",
|
||||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:H/A:H",
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:H/A:H",
|
||||||
@ -36,6 +36,26 @@
|
|||||||
},
|
},
|
||||||
"exploitabilityScore": 3.1,
|
"exploitabilityScore": 3.1,
|
||||||
"impactScore": 6.0
|
"impactScore": 6.0
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"baseScore": 7.2,
|
||||||
|
"baseSeverity": "HIGH",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "HIGH",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.2,
|
||||||
|
"impactScore": 5.9
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
@ -51,10 +71,136 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"configurations": [
|
||||||
{
|
{
|
||||||
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-multivuls-FTW9AOXF",
|
"nodes": [
|
||||||
"source": "psirt@cisco.com"
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:cisco:identity_services_engine:*:*:*:*:*:*:*:*",
|
||||||
|
"versionEndExcluding": "3.1",
|
||||||
|
"matchCriteriaId": "742B3761-9FD6-4E67-BDDD-D4DD2C3111D2"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:cisco:identity_services_engine:3.1.0:-:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "7A789B44-7E6C-4FE9-BD40-702A871AB8AC"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch1:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "93920663-445E-4456-A905-81CEC6CA1833"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch2:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "33DA5BB8-4CFE-44BD-9CEB-BC26577E8477"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch3:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "D3AEFA85-66B5-4145-A4AD-96D1FF86B46D"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch4:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "7A6A0697-6A9E-48EF-82D8-36C75E0CDFDC"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch5:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "E939B65A-7912-4C36-8799-03A1526D7BD3"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch6:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "833B438F-0869-4C0D-9952-750C00702E8D"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch7:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "E8B2588D-01F9-450B-B2E3-ADC4125E354E"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch8:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "E41016C0-19E6-4BCC-A8DD-F6C9A2B0003E"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch9:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "654E946A-07C5-4036-BC54-85EF42B808DD"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:cisco:identity_services_engine:3.2.0:-:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "7932D5D5-83E1-4BEF-845A-D0783D4BB750"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:cisco:identity_services_engine:3.2.0:patch1:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "1B818846-4A6E-4256-B344-281E8C786C43"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:cisco:identity_services_engine:3.2.0:patch2:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "A44858A2-922A-425A-8B38-0C47DB911A3C"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:cisco:identity_services_engine:3.2.0:patch3:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "53484A32-757B-42F8-B655-554C34222060"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:cisco:identity_services_engine:3.2.0:patch4:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "0CCAC61F-C273-49B3-A631-31D3AE3EB148"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:cisco:identity_services_engine:3.2.0:patch5:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "51AEFCE6-FB4A-4B1C-A23D-83CC3CF3FBBD"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:cisco:identity_services_engine:3.2.0:patch6:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "B452B4F0-8510-475E-9AE8-B48FABB4D7D3"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:cisco:identity_services_engine:3.3.0:-:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "F1B9C2C1-59A4-49A0-9B74-83CCB063E55D"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:cisco:identity_services_engine:3.3.0:patch1:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "DFD29A0B-0D75-4EAB-BCE0-79450EC75DD0"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:cisco:identity_services_engine:3.3.0:patch2:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "E6C94CC4-CC08-4DAF-A606-FDAFC92720A9"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:cisco:identity_services_engine:3.3.0:patch3:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "BB069EA3-7B8C-42B5-8035-2EE5ED3F56E4"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-multivuls-FTW9AOXF",
|
||||||
|
"source": "psirt@cisco.com",
|
||||||
|
"tags": [
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2025-20125",
|
"id": "CVE-2025-20125",
|
||||||
"sourceIdentifier": "psirt@cisco.com",
|
"sourceIdentifier": "psirt@cisco.com",
|
||||||
"published": "2025-02-05T17:15:22.610",
|
"published": "2025-02-05T17:15:22.610",
|
||||||
"lastModified": "2025-02-05T17:15:22.610",
|
"lastModified": "2025-03-28T13:37:16.650",
|
||||||
"vulnStatus": "Undergoing Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -19,7 +19,7 @@
|
|||||||
"cvssMetricV31": [
|
"cvssMetricV31": [
|
||||||
{
|
{
|
||||||
"source": "psirt@cisco.com",
|
"source": "psirt@cisco.com",
|
||||||
"type": "Primary",
|
"type": "Secondary",
|
||||||
"cvssData": {
|
"cvssData": {
|
||||||
"version": "3.1",
|
"version": "3.1",
|
||||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:H",
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:H",
|
||||||
@ -36,6 +36,26 @@
|
|||||||
},
|
},
|
||||||
"exploitabilityScore": 3.1,
|
"exploitabilityScore": 3.1,
|
||||||
"impactScore": 5.3
|
"impactScore": 5.3
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"baseScore": 7.2,
|
||||||
|
"baseSeverity": "HIGH",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "HIGH",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.2,
|
||||||
|
"impactScore": 5.9
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
@ -49,12 +69,148 @@
|
|||||||
"value": "CWE-285"
|
"value": "CWE-285"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-862"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:cisco:identity_services_engine:*:*:*:*:*:*:*:*",
|
||||||
|
"versionEndExcluding": "3.1",
|
||||||
|
"matchCriteriaId": "742B3761-9FD6-4E67-BDDD-D4DD2C3111D2"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:cisco:identity_services_engine:3.1.0:-:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "7A789B44-7E6C-4FE9-BD40-702A871AB8AC"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch1:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "93920663-445E-4456-A905-81CEC6CA1833"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch2:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "33DA5BB8-4CFE-44BD-9CEB-BC26577E8477"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch3:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "D3AEFA85-66B5-4145-A4AD-96D1FF86B46D"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch4:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "7A6A0697-6A9E-48EF-82D8-36C75E0CDFDC"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch5:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "E939B65A-7912-4C36-8799-03A1526D7BD3"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch6:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "833B438F-0869-4C0D-9952-750C00702E8D"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch7:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "E8B2588D-01F9-450B-B2E3-ADC4125E354E"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch8:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "E41016C0-19E6-4BCC-A8DD-F6C9A2B0003E"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch9:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "654E946A-07C5-4036-BC54-85EF42B808DD"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:cisco:identity_services_engine:3.2.0:-:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "7932D5D5-83E1-4BEF-845A-D0783D4BB750"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:cisco:identity_services_engine:3.2.0:patch1:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "1B818846-4A6E-4256-B344-281E8C786C43"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:cisco:identity_services_engine:3.2.0:patch2:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "A44858A2-922A-425A-8B38-0C47DB911A3C"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:cisco:identity_services_engine:3.2.0:patch3:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "53484A32-757B-42F8-B655-554C34222060"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:cisco:identity_services_engine:3.2.0:patch4:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "0CCAC61F-C273-49B3-A631-31D3AE3EB148"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:cisco:identity_services_engine:3.2.0:patch5:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "51AEFCE6-FB4A-4B1C-A23D-83CC3CF3FBBD"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:cisco:identity_services_engine:3.2.0:patch6:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "B452B4F0-8510-475E-9AE8-B48FABB4D7D3"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:cisco:identity_services_engine:3.3.0:-:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "F1B9C2C1-59A4-49A0-9B74-83CCB063E55D"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:cisco:identity_services_engine:3.3.0:patch1:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "DFD29A0B-0D75-4EAB-BCE0-79450EC75DD0"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:cisco:identity_services_engine:3.3.0:patch2:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "E6C94CC4-CC08-4DAF-A606-FDAFC92720A9"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:cisco:identity_services_engine:3.3.0:patch3:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "BB069EA3-7B8C-42B5-8035-2EE5ED3F56E4"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-multivuls-FTW9AOXF",
|
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-multivuls-FTW9AOXF",
|
||||||
"source": "psirt@cisco.com"
|
"source": "psirt@cisco.com",
|
||||||
|
"tags": [
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2025-20204",
|
"id": "CVE-2025-20204",
|
||||||
"sourceIdentifier": "psirt@cisco.com",
|
"sourceIdentifier": "psirt@cisco.com",
|
||||||
"published": "2025-02-05T17:15:26.077",
|
"published": "2025-02-05T17:15:26.077",
|
||||||
"lastModified": "2025-02-05T17:15:26.077",
|
"lastModified": "2025-03-28T13:42:57.807",
|
||||||
"vulnStatus": "Undergoing Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -19,6 +19,26 @@
|
|||||||
"cvssMetricV31": [
|
"cvssMetricV31": [
|
||||||
{
|
{
|
||||||
"source": "psirt@cisco.com",
|
"source": "psirt@cisco.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
|
||||||
|
"baseScore": 4.8,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "HIGH",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.7,
|
||||||
|
"impactScore": 2.7
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
"type": "Primary",
|
"type": "Primary",
|
||||||
"cvssData": {
|
"cvssData": {
|
||||||
"version": "3.1",
|
"version": "3.1",
|
||||||
@ -51,10 +71,92 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"configurations": [
|
||||||
{
|
{
|
||||||
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-xss-42tgsdMG",
|
"nodes": [
|
||||||
"source": "psirt@cisco.com"
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:cisco:identity_services_engine:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "3.0.0",
|
||||||
|
"versionEndExcluding": "3.2",
|
||||||
|
"matchCriteriaId": "AB8613FB-8E3D-4DA9-9A1D-9161090C7890"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:cisco:identity_services_engine:3.2.0:-:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "7932D5D5-83E1-4BEF-845A-D0783D4BB750"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:cisco:identity_services_engine:3.2.0:patch1:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "1B818846-4A6E-4256-B344-281E8C786C43"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:cisco:identity_services_engine:3.2.0:patch2:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "A44858A2-922A-425A-8B38-0C47DB911A3C"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:cisco:identity_services_engine:3.2.0:patch3:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "53484A32-757B-42F8-B655-554C34222060"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:cisco:identity_services_engine:3.2.0:patch4:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "0CCAC61F-C273-49B3-A631-31D3AE3EB148"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:cisco:identity_services_engine:3.2.0:patch5:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "51AEFCE6-FB4A-4B1C-A23D-83CC3CF3FBBD"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:cisco:identity_services_engine:3.2.0:patch6:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "B452B4F0-8510-475E-9AE8-B48FABB4D7D3"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:cisco:identity_services_engine:3.2.0:patch7:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "5733512D-12B5-4098-AF90-9D68217FAC27"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:cisco:identity_services_engine:3.3.0:-:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "F1B9C2C1-59A4-49A0-9B74-83CCB063E55D"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:cisco:identity_services_engine:3.3.0:patch1:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "DFD29A0B-0D75-4EAB-BCE0-79450EC75DD0"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:cisco:identity_services_engine:3.3.0:patch2:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "E6C94CC4-CC08-4DAF-A606-FDAFC92720A9"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:cisco:identity_services_engine:3.4.0:-:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "D23905E0-E525-49B1-8E5F-4EB42D186768"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-xss-42tgsdMG",
|
||||||
|
"source": "psirt@cisco.com",
|
||||||
|
"tags": [
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2025-20205",
|
"id": "CVE-2025-20205",
|
||||||
"sourceIdentifier": "psirt@cisco.com",
|
"sourceIdentifier": "psirt@cisco.com",
|
||||||
"published": "2025-02-05T17:15:26.243",
|
"published": "2025-02-05T17:15:26.243",
|
||||||
"lastModified": "2025-02-05T17:15:26.243",
|
"lastModified": "2025-03-28T13:46:02.393",
|
||||||
"vulnStatus": "Undergoing Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -19,6 +19,26 @@
|
|||||||
"cvssMetricV31": [
|
"cvssMetricV31": [
|
||||||
{
|
{
|
||||||
"source": "psirt@cisco.com",
|
"source": "psirt@cisco.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
|
||||||
|
"baseScore": 4.8,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "HIGH",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.7,
|
||||||
|
"impactScore": 2.7
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
"type": "Primary",
|
"type": "Primary",
|
||||||
"cvssData": {
|
"cvssData": {
|
||||||
"version": "3.1",
|
"version": "3.1",
|
||||||
@ -51,10 +71,92 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"configurations": [
|
||||||
{
|
{
|
||||||
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-xss-42tgsdMG",
|
"nodes": [
|
||||||
"source": "psirt@cisco.com"
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:cisco:identity_services_engine:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "3.0.0",
|
||||||
|
"versionEndExcluding": "3.2",
|
||||||
|
"matchCriteriaId": "AB8613FB-8E3D-4DA9-9A1D-9161090C7890"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:cisco:identity_services_engine:3.2.0:-:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "7932D5D5-83E1-4BEF-845A-D0783D4BB750"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:cisco:identity_services_engine:3.2.0:patch1:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "1B818846-4A6E-4256-B344-281E8C786C43"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:cisco:identity_services_engine:3.2.0:patch2:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "A44858A2-922A-425A-8B38-0C47DB911A3C"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:cisco:identity_services_engine:3.2.0:patch3:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "53484A32-757B-42F8-B655-554C34222060"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:cisco:identity_services_engine:3.2.0:patch4:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "0CCAC61F-C273-49B3-A631-31D3AE3EB148"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:cisco:identity_services_engine:3.2.0:patch5:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "51AEFCE6-FB4A-4B1C-A23D-83CC3CF3FBBD"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:cisco:identity_services_engine:3.2.0:patch6:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "B452B4F0-8510-475E-9AE8-B48FABB4D7D3"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:cisco:identity_services_engine:3.3.0:-:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "F1B9C2C1-59A4-49A0-9B74-83CCB063E55D"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:cisco:identity_services_engine:3.3.0:patch1:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "DFD29A0B-0D75-4EAB-BCE0-79450EC75DD0"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:cisco:identity_services_engine:3.3.0:patch2:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "E6C94CC4-CC08-4DAF-A606-FDAFC92720A9"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:cisco:identity_services_engine:3.3.0:patch3:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "BB069EA3-7B8C-42B5-8035-2EE5ED3F56E4"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:cisco:identity_services_engine:3.4.0:-:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "D23905E0-E525-49B1-8E5F-4EB42D186768"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-xss-42tgsdMG",
|
||||||
|
"source": "psirt@cisco.com",
|
||||||
|
"tags": [
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2025-21117",
|
"id": "CVE-2025-21117",
|
||||||
"sourceIdentifier": "security_alert@emc.com",
|
"sourceIdentifier": "security_alert@emc.com",
|
||||||
"published": "2025-02-05T14:15:27.417",
|
"published": "2025-02-05T14:15:27.417",
|
||||||
"lastModified": "2025-02-05T14:15:27.417",
|
"lastModified": "2025-03-28T13:24:51.620",
|
||||||
"vulnStatus": "Undergoing Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -36,6 +36,26 @@
|
|||||||
},
|
},
|
||||||
"exploitabilityScore": 1.3,
|
"exploitabilityScore": 1.3,
|
||||||
"impactScore": 5.2
|
"impactScore": 5.2
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
|
||||||
|
"baseScore": 5.5,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "NONE"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.8,
|
||||||
|
"impactScore": 3.6
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
@ -51,10 +71,55 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"configurations": [
|
||||||
{
|
{
|
||||||
"url": "https://www.dell.com/support/kbdoc/en-us/000281275/dsa-2025-071-security-update-for-dell-avamar-for-multiple-component-vulnerabilities",
|
"nodes": [
|
||||||
"source": "security_alert@emc.com"
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:dell:avamar_server:19.4:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "A19DD36F-1EE9-4FBF-9968-DF270C5FD1C4"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:dell:avamar_server:19.7:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "D8C50D2C-B787-4366-AAED-057F9439A6A5"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:dell:avamar_server:19.8:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "41028ABC-C574-42AE-897B-E1C65CD0D0BB"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:dell:avamar_server:19.9:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "2B1D9257-AA6C-4D68-B209-E72128A017D1"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:dell:avamar_server:19.10:-:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "7ADB97BD-3E80-439D-950C-93EF391DDA8F"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:dell:avamar_server:19.10:sp1:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "D0075FDA-26E4-4687-9D94-21283E2B5028"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://www.dell.com/support/kbdoc/en-us/000281275/dsa-2025-071-security-update-for-dell-avamar-for-multiple-component-vulnerabilities",
|
||||||
|
"source": "security_alert@emc.com",
|
||||||
|
"tags": [
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
21
CVE-2025/CVE-2025-282xx/CVE-2025-28219.json
Normal file
21
CVE-2025/CVE-2025-282xx/CVE-2025-28219.json
Normal file
@ -0,0 +1,21 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2025-28219",
|
||||||
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
|
"published": "2025-03-28T14:15:20.253",
|
||||||
|
"lastModified": "2025-03-28T14:15:20.253",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Netgear DC112A V1.0.0.64 has an OS command injection vulnerability in the usb_adv.cgi, which allows remote attackers to execute arbitrary commands via parameter \"deviceName\" passed to the binary through a POST request."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/IdaJea/IOT_vuln_1/blob/master/DC112A_V1.0.0.64/sub_69600.pdf",
|
||||||
|
"source": "cve@mitre.org"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
21
CVE-2025/CVE-2025-282xx/CVE-2025-28220.json
Normal file
21
CVE-2025/CVE-2025-282xx/CVE-2025-28220.json
Normal file
@ -0,0 +1,21 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2025-28220",
|
||||||
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
|
"published": "2025-03-28T14:15:20.377",
|
||||||
|
"lastModified": "2025-03-28T14:15:20.377",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Tenda W6_S v1.0.0.4_510 has a Buffer Overflow vulnerability in the setcfm function, which allows remote attackers to cause web server crash via parameter funcpara1 passed to the binary through a POST request."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/IdaJea/IOT_vuln_1/blob/master/w6_s_v1.0.0.4/setcfm.pdf",
|
||||||
|
"source": "cve@mitre.org"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
21
CVE-2025/CVE-2025-282xx/CVE-2025-28221.json
Normal file
21
CVE-2025/CVE-2025-282xx/CVE-2025-28221.json
Normal file
@ -0,0 +1,21 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2025-28221",
|
||||||
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
|
"published": "2025-03-28T14:15:20.483",
|
||||||
|
"lastModified": "2025-03-28T14:15:20.483",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Tenda W6_S v1.0.0.4_510 has a Buffer Overflow vulnerability in the set_local_time function, which allows remote attackers to cause web server crash via parameter time passed to the binary through a POST request."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/IdaJea/IOT_vuln_1/blob/master/w6_s_v1.0.0.4/time.pdf",
|
||||||
|
"source": "cve@mitre.org"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2025-2854",
|
"id": "CVE-2025-2854",
|
||||||
"sourceIdentifier": "cna@vuldb.com",
|
"sourceIdentifier": "cna@vuldb.com",
|
||||||
"published": "2025-03-27T15:16:01.713",
|
"published": "2025-03-27T15:16:01.713",
|
||||||
"lastModified": "2025-03-27T16:45:12.210",
|
"lastModified": "2025-03-28T13:15:40.923",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -59,7 +59,7 @@
|
|||||||
"cvssMetricV31": [
|
"cvssMetricV31": [
|
||||||
{
|
{
|
||||||
"source": "cna@vuldb.com",
|
"source": "cna@vuldb.com",
|
||||||
"type": "Primary",
|
"type": "Secondary",
|
||||||
"cvssData": {
|
"cvssData": {
|
||||||
"version": "3.1",
|
"version": "3.1",
|
||||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||||
@ -107,7 +107,7 @@
|
|||||||
"weaknesses": [
|
"weaknesses": [
|
||||||
{
|
{
|
||||||
"source": "cna@vuldb.com",
|
"source": "cna@vuldb.com",
|
||||||
"type": "Primary",
|
"type": "Secondary",
|
||||||
"description": [
|
"description": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
@ -126,7 +126,7 @@
|
|||||||
"source": "cna@vuldb.com"
|
"source": "cna@vuldb.com"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://github.com/Fizz-L/CVE/blob/main/sql-fizz.md",
|
"url": "https://github.com/hak0neP/cve/blob/main/sql-fizz.md",
|
||||||
"source": "cna@vuldb.com"
|
"source": "cna@vuldb.com"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
78
CVE-2025/CVE-2025-28xx/CVE-2025-2858.json
Normal file
78
CVE-2025/CVE-2025-28xx/CVE-2025-2858.json
Normal file
@ -0,0 +1,78 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2025-2858",
|
||||||
|
"sourceIdentifier": "cve-coordination@incibe.es",
|
||||||
|
"published": "2025-03-28T14:15:20.650",
|
||||||
|
"lastModified": "2025-03-28T14:15:20.650",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Privilege escalation vulnerability in the saTECH BCU firmware version 2.1.3. An attacker with access to the CLI of the device could make use of the nice command to bypass all restrictions and elevate privileges as a superuser."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV40": [
|
||||||
|
{
|
||||||
|
"source": "cve-coordination@incibe.es",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "4.0",
|
||||||
|
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:L/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||||
|
"baseScore": 8.5,
|
||||||
|
"baseSeverity": "HIGH",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"attackRequirements": "NONE",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"vulnConfidentialityImpact": "HIGH",
|
||||||
|
"vulnIntegrityImpact": "HIGH",
|
||||||
|
"vulnAvailabilityImpact": "HIGH",
|
||||||
|
"subConfidentialityImpact": "LOW",
|
||||||
|
"subIntegrityImpact": "NONE",
|
||||||
|
"subAvailabilityImpact": "LOW",
|
||||||
|
"exploitMaturity": "NOT_DEFINED",
|
||||||
|
"confidentialityRequirement": "NOT_DEFINED",
|
||||||
|
"integrityRequirement": "NOT_DEFINED",
|
||||||
|
"availabilityRequirement": "NOT_DEFINED",
|
||||||
|
"modifiedAttackVector": "NOT_DEFINED",
|
||||||
|
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||||
|
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||||
|
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||||
|
"modifiedUserInteraction": "NOT_DEFINED",
|
||||||
|
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||||
|
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||||
|
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||||
|
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||||
|
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||||
|
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||||
|
"Safety": "NOT_DEFINED",
|
||||||
|
"Automatable": "NOT_DEFINED",
|
||||||
|
"Recovery": "NOT_DEFINED",
|
||||||
|
"valueDensity": "NOT_DEFINED",
|
||||||
|
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||||
|
"providerUrgency": "NOT_DEFINED"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "cve-coordination@incibe.es",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-269"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso-sci/multiple-vulnerabilities-arteches-satech-bcu",
|
||||||
|
"source": "cve-coordination@incibe.es"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
78
CVE-2025/CVE-2025-28xx/CVE-2025-2859.json
Normal file
78
CVE-2025/CVE-2025-28xx/CVE-2025-2859.json
Normal file
@ -0,0 +1,78 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2025-2859",
|
||||||
|
"sourceIdentifier": "cve-coordination@incibe.es",
|
||||||
|
"published": "2025-03-28T14:15:20.810",
|
||||||
|
"lastModified": "2025-03-28T14:15:20.810",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "An attacker with access to the network where the vulnerable device is located could capture traffic and obtain cookies from the user, allowing them to steal a user's active session and make changes to the device via the web, depending on the privileges obtained by the user."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV40": [
|
||||||
|
{
|
||||||
|
"source": "cve-coordination@incibe.es",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "4.0",
|
||||||
|
"vectorString": "CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:P/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||||
|
"baseScore": 6.9,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "ADJACENT",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"attackRequirements": "NONE",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "PASSIVE",
|
||||||
|
"vulnConfidentialityImpact": "HIGH",
|
||||||
|
"vulnIntegrityImpact": "NONE",
|
||||||
|
"vulnAvailabilityImpact": "NONE",
|
||||||
|
"subConfidentialityImpact": "NONE",
|
||||||
|
"subIntegrityImpact": "NONE",
|
||||||
|
"subAvailabilityImpact": "NONE",
|
||||||
|
"exploitMaturity": "NOT_DEFINED",
|
||||||
|
"confidentialityRequirement": "NOT_DEFINED",
|
||||||
|
"integrityRequirement": "NOT_DEFINED",
|
||||||
|
"availabilityRequirement": "NOT_DEFINED",
|
||||||
|
"modifiedAttackVector": "NOT_DEFINED",
|
||||||
|
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||||
|
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||||
|
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||||
|
"modifiedUserInteraction": "NOT_DEFINED",
|
||||||
|
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||||
|
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||||
|
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||||
|
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||||
|
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||||
|
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||||
|
"Safety": "NOT_DEFINED",
|
||||||
|
"Automatable": "NOT_DEFINED",
|
||||||
|
"Recovery": "NOT_DEFINED",
|
||||||
|
"valueDensity": "NOT_DEFINED",
|
||||||
|
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||||
|
"providerUrgency": "NOT_DEFINED"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "cve-coordination@incibe.es",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-287"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso-sci/multiple-vulnerabilities-arteches-satech-bcu",
|
||||||
|
"source": "cve-coordination@incibe.es"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
78
CVE-2025/CVE-2025-28xx/CVE-2025-2860.json
Normal file
78
CVE-2025/CVE-2025-28xx/CVE-2025-2860.json
Normal file
@ -0,0 +1,78 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2025-2860",
|
||||||
|
"sourceIdentifier": "cve-coordination@incibe.es",
|
||||||
|
"published": "2025-03-28T14:15:20.967",
|
||||||
|
"lastModified": "2025-03-28T14:15:20.967",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "SaTECH BCU in its firmware version 2.1.3, allows an authenticated attacker to access information about the credentials that users have within the web (.xml file). In order to exploit this vulnerability, the attacker must know the path, regardless of the user's privileges on the website."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV40": [
|
||||||
|
{
|
||||||
|
"source": "cve-coordination@incibe.es",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "4.0",
|
||||||
|
"vectorString": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||||
|
"baseScore": 6.9,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "ADJACENT",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"attackRequirements": "NONE",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"vulnConfidentialityImpact": "HIGH",
|
||||||
|
"vulnIntegrityImpact": "NONE",
|
||||||
|
"vulnAvailabilityImpact": "NONE",
|
||||||
|
"subConfidentialityImpact": "NONE",
|
||||||
|
"subIntegrityImpact": "NONE",
|
||||||
|
"subAvailabilityImpact": "NONE",
|
||||||
|
"exploitMaturity": "NOT_DEFINED",
|
||||||
|
"confidentialityRequirement": "NOT_DEFINED",
|
||||||
|
"integrityRequirement": "NOT_DEFINED",
|
||||||
|
"availabilityRequirement": "NOT_DEFINED",
|
||||||
|
"modifiedAttackVector": "NOT_DEFINED",
|
||||||
|
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||||
|
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||||
|
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||||
|
"modifiedUserInteraction": "NOT_DEFINED",
|
||||||
|
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||||
|
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||||
|
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||||
|
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||||
|
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||||
|
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||||
|
"Safety": "NOT_DEFINED",
|
||||||
|
"Automatable": "NOT_DEFINED",
|
||||||
|
"Recovery": "NOT_DEFINED",
|
||||||
|
"valueDensity": "NOT_DEFINED",
|
||||||
|
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||||
|
"providerUrgency": "NOT_DEFINED"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "cve-coordination@incibe.es",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-200"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso-sci/multiple-vulnerabilities-arteches-satech-bcu",
|
||||||
|
"source": "cve-coordination@incibe.es"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
78
CVE-2025/CVE-2025-28xx/CVE-2025-2861.json
Normal file
78
CVE-2025/CVE-2025-28xx/CVE-2025-2861.json
Normal file
@ -0,0 +1,78 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2025-2861",
|
||||||
|
"sourceIdentifier": "cve-coordination@incibe.es",
|
||||||
|
"published": "2025-03-28T14:15:21.113",
|
||||||
|
"lastModified": "2025-03-28T14:15:21.113",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "SaTECH BCU in its firmware version 2.1.3 uses the HTTP protocol. The use of the HTTP protocol for web browsing has the problem that information is exchanged in unencrypted text. Since sensitive data such as credentials are exchanged, an attacker could obtain them and log in legitimately."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV40": [
|
||||||
|
{
|
||||||
|
"source": "cve-coordination@incibe.es",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "4.0",
|
||||||
|
"vectorString": "CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:P/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||||
|
"baseScore": 6.9,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "ADJACENT",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"attackRequirements": "NONE",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "PASSIVE",
|
||||||
|
"vulnConfidentialityImpact": "HIGH",
|
||||||
|
"vulnIntegrityImpact": "NONE",
|
||||||
|
"vulnAvailabilityImpact": "NONE",
|
||||||
|
"subConfidentialityImpact": "NONE",
|
||||||
|
"subIntegrityImpact": "NONE",
|
||||||
|
"subAvailabilityImpact": "NONE",
|
||||||
|
"exploitMaturity": "NOT_DEFINED",
|
||||||
|
"confidentialityRequirement": "NOT_DEFINED",
|
||||||
|
"integrityRequirement": "NOT_DEFINED",
|
||||||
|
"availabilityRequirement": "NOT_DEFINED",
|
||||||
|
"modifiedAttackVector": "NOT_DEFINED",
|
||||||
|
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||||
|
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||||
|
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||||
|
"modifiedUserInteraction": "NOT_DEFINED",
|
||||||
|
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||||
|
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||||
|
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||||
|
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||||
|
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||||
|
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||||
|
"Safety": "NOT_DEFINED",
|
||||||
|
"Automatable": "NOT_DEFINED",
|
||||||
|
"Recovery": "NOT_DEFINED",
|
||||||
|
"valueDensity": "NOT_DEFINED",
|
||||||
|
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||||
|
"providerUrgency": "NOT_DEFINED"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "cve-coordination@incibe.es",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-319"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso-sci/multiple-vulnerabilities-arteches-satech-bcu",
|
||||||
|
"source": "cve-coordination@incibe.es"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
78
CVE-2025/CVE-2025-28xx/CVE-2025-2862.json
Normal file
78
CVE-2025/CVE-2025-28xx/CVE-2025-2862.json
Normal file
@ -0,0 +1,78 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2025-2862",
|
||||||
|
"sourceIdentifier": "cve-coordination@incibe.es",
|
||||||
|
"published": "2025-03-28T14:15:21.257",
|
||||||
|
"lastModified": "2025-03-28T14:15:21.257",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "SaTECH BCU, in its firmware version 2.1.3, performs weak password encryption. This allows an attacker with access to the device's system or website to obtain the credentials, as the storage methods used are not strong enough in terms of encryption."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV40": [
|
||||||
|
{
|
||||||
|
"source": "cve-coordination@incibe.es",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "4.0",
|
||||||
|
"vectorString": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||||
|
"baseScore": 6.9,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "ADJACENT",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"attackRequirements": "NONE",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"vulnConfidentialityImpact": "HIGH",
|
||||||
|
"vulnIntegrityImpact": "NONE",
|
||||||
|
"vulnAvailabilityImpact": "NONE",
|
||||||
|
"subConfidentialityImpact": "NONE",
|
||||||
|
"subIntegrityImpact": "NONE",
|
||||||
|
"subAvailabilityImpact": "NONE",
|
||||||
|
"exploitMaturity": "NOT_DEFINED",
|
||||||
|
"confidentialityRequirement": "NOT_DEFINED",
|
||||||
|
"integrityRequirement": "NOT_DEFINED",
|
||||||
|
"availabilityRequirement": "NOT_DEFINED",
|
||||||
|
"modifiedAttackVector": "NOT_DEFINED",
|
||||||
|
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||||
|
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||||
|
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||||
|
"modifiedUserInteraction": "NOT_DEFINED",
|
||||||
|
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||||
|
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||||
|
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||||
|
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||||
|
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||||
|
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||||
|
"Safety": "NOT_DEFINED",
|
||||||
|
"Automatable": "NOT_DEFINED",
|
||||||
|
"Recovery": "NOT_DEFINED",
|
||||||
|
"valueDensity": "NOT_DEFINED",
|
||||||
|
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||||
|
"providerUrgency": "NOT_DEFINED"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "cve-coordination@incibe.es",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-261"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso-sci/multiple-vulnerabilities-arteches-satech-bcu",
|
||||||
|
"source": "cve-coordination@incibe.es"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
78
CVE-2025/CVE-2025-28xx/CVE-2025-2863.json
Normal file
78
CVE-2025/CVE-2025-28xx/CVE-2025-2863.json
Normal file
@ -0,0 +1,78 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2025-2863",
|
||||||
|
"sourceIdentifier": "cve-coordination@incibe.es",
|
||||||
|
"published": "2025-03-28T14:15:21.410",
|
||||||
|
"lastModified": "2025-03-28T14:15:21.410",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Cross-site request forgery (CSRF) vulnerability in the web application of saTECH BCU firmware version 2.1.3, which could allow an unauthenticated local attacker to exploit active administrator sessions and perform malicious actions. The malicious actions that can be executed by the attacker depend on the logged-in user, and may include rebooting the device or modifying roles and permissions."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV40": [
|
||||||
|
{
|
||||||
|
"source": "cve-coordination@incibe.es",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "4.0",
|
||||||
|
"vectorString": "CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:A/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||||
|
"baseScore": 5.7,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "HIGH",
|
||||||
|
"attackRequirements": "NONE",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "ACTIVE",
|
||||||
|
"vulnConfidentialityImpact": "LOW",
|
||||||
|
"vulnIntegrityImpact": "LOW",
|
||||||
|
"vulnAvailabilityImpact": "HIGH",
|
||||||
|
"subConfidentialityImpact": "NONE",
|
||||||
|
"subIntegrityImpact": "NONE",
|
||||||
|
"subAvailabilityImpact": "NONE",
|
||||||
|
"exploitMaturity": "NOT_DEFINED",
|
||||||
|
"confidentialityRequirement": "NOT_DEFINED",
|
||||||
|
"integrityRequirement": "NOT_DEFINED",
|
||||||
|
"availabilityRequirement": "NOT_DEFINED",
|
||||||
|
"modifiedAttackVector": "NOT_DEFINED",
|
||||||
|
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||||
|
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||||
|
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||||
|
"modifiedUserInteraction": "NOT_DEFINED",
|
||||||
|
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||||
|
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||||
|
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||||
|
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||||
|
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||||
|
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||||
|
"Safety": "NOT_DEFINED",
|
||||||
|
"Automatable": "NOT_DEFINED",
|
||||||
|
"Recovery": "NOT_DEFINED",
|
||||||
|
"valueDensity": "NOT_DEFINED",
|
||||||
|
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||||
|
"providerUrgency": "NOT_DEFINED"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "cve-coordination@incibe.es",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-352"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso-sci/multiple-vulnerabilities-arteches-satech-bcu",
|
||||||
|
"source": "cve-coordination@incibe.es"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
78
CVE-2025/CVE-2025-28xx/CVE-2025-2864.json
Normal file
78
CVE-2025/CVE-2025-28xx/CVE-2025-2864.json
Normal file
@ -0,0 +1,78 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2025-2864",
|
||||||
|
"sourceIdentifier": "cve-coordination@incibe.es",
|
||||||
|
"published": "2025-03-28T14:15:21.570",
|
||||||
|
"lastModified": "2025-03-28T14:15:21.570",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "SaTECH BCU in its firmware version 2.1.3 allows an attacker to inject malicious code into the legitimate website owning the affected device, once the cookie is set. This attack only impacts the victim's browser (reflected XSS)."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV40": [
|
||||||
|
{
|
||||||
|
"source": "cve-coordination@incibe.es",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "4.0",
|
||||||
|
"vectorString": "CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:A/VC:L/VI:N/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||||
|
"baseScore": 2.0,
|
||||||
|
"baseSeverity": "LOW",
|
||||||
|
"attackVector": "ADJACENT",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"attackRequirements": "PRESENT",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "ACTIVE",
|
||||||
|
"vulnConfidentialityImpact": "LOW",
|
||||||
|
"vulnIntegrityImpact": "NONE",
|
||||||
|
"vulnAvailabilityImpact": "NONE",
|
||||||
|
"subConfidentialityImpact": "LOW",
|
||||||
|
"subIntegrityImpact": "LOW",
|
||||||
|
"subAvailabilityImpact": "NONE",
|
||||||
|
"exploitMaturity": "NOT_DEFINED",
|
||||||
|
"confidentialityRequirement": "NOT_DEFINED",
|
||||||
|
"integrityRequirement": "NOT_DEFINED",
|
||||||
|
"availabilityRequirement": "NOT_DEFINED",
|
||||||
|
"modifiedAttackVector": "NOT_DEFINED",
|
||||||
|
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||||
|
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||||
|
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||||
|
"modifiedUserInteraction": "NOT_DEFINED",
|
||||||
|
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||||
|
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||||
|
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||||
|
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||||
|
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||||
|
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||||
|
"Safety": "NOT_DEFINED",
|
||||||
|
"Automatable": "NOT_DEFINED",
|
||||||
|
"Recovery": "NOT_DEFINED",
|
||||||
|
"valueDensity": "NOT_DEFINED",
|
||||||
|
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||||
|
"providerUrgency": "NOT_DEFINED"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "cve-coordination@incibe.es",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-79"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso-sci/multiple-vulnerabilities-arteches-satech-bcu",
|
||||||
|
"source": "cve-coordination@incibe.es"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
78
CVE-2025/CVE-2025-28xx/CVE-2025-2865.json
Normal file
78
CVE-2025/CVE-2025-28xx/CVE-2025-2865.json
Normal file
@ -0,0 +1,78 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2025-2865",
|
||||||
|
"sourceIdentifier": "cve-coordination@incibe.es",
|
||||||
|
"published": "2025-03-28T14:15:21.727",
|
||||||
|
"lastModified": "2025-03-28T14:15:21.727",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "SaTECH BCU, in its firmware version 2.1.3, could allow XSS attacks and other malicious resources to be stored on the web server. An attacker with some knowledge of the web application could send a malicious request to the victim users. Through this request, the victims would interpret the code (resources) stored on another malicious website owned by the attacker."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV40": [
|
||||||
|
{
|
||||||
|
"source": "cve-coordination@incibe.es",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "4.0",
|
||||||
|
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:A/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||||
|
"baseScore": 2.4,
|
||||||
|
"baseSeverity": "LOW",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"attackRequirements": "NONE",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "ACTIVE",
|
||||||
|
"vulnConfidentialityImpact": "NONE",
|
||||||
|
"vulnIntegrityImpact": "NONE",
|
||||||
|
"vulnAvailabilityImpact": "NONE",
|
||||||
|
"subConfidentialityImpact": "LOW",
|
||||||
|
"subIntegrityImpact": "LOW",
|
||||||
|
"subAvailabilityImpact": "NONE",
|
||||||
|
"exploitMaturity": "NOT_DEFINED",
|
||||||
|
"confidentialityRequirement": "NOT_DEFINED",
|
||||||
|
"integrityRequirement": "NOT_DEFINED",
|
||||||
|
"availabilityRequirement": "NOT_DEFINED",
|
||||||
|
"modifiedAttackVector": "NOT_DEFINED",
|
||||||
|
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||||
|
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||||
|
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||||
|
"modifiedUserInteraction": "NOT_DEFINED",
|
||||||
|
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||||
|
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||||
|
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||||
|
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||||
|
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||||
|
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||||
|
"Safety": "NOT_DEFINED",
|
||||||
|
"Automatable": "NOT_DEFINED",
|
||||||
|
"Recovery": "NOT_DEFINED",
|
||||||
|
"valueDensity": "NOT_DEFINED",
|
||||||
|
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||||
|
"providerUrgency": "NOT_DEFINED"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "cve-coordination@incibe.es",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-942"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso-sci/multiple-vulnerabilities-arteches-satech-bcu",
|
||||||
|
"source": "cve-coordination@incibe.es"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
60
CVE-2025/CVE-2025-28xx/CVE-2025-2877.json
Normal file
60
CVE-2025/CVE-2025-28xx/CVE-2025-2877.json
Normal file
@ -0,0 +1,60 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2025-2877",
|
||||||
|
"sourceIdentifier": "secalert@redhat.com",
|
||||||
|
"published": "2025-03-28T14:15:21.877",
|
||||||
|
"lastModified": "2025-03-28T14:15:21.877",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "A flaw was found in the Ansible Automation Platform's Event-Driven Ansible. In configurations where verbosity is set to \"debug\", inventory passwords are exposed in plain text when starting a rulebook activation. This issue exists for any \"debug\" action in a rulebook and also affects Event Streams."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "secalert@redhat.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||||
|
"baseScore": 6.5,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "NONE"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 3.6
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "secalert@redhat.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-1295"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://access.redhat.com/security/cve/CVE-2025-2877",
|
||||||
|
"source": "secalert@redhat.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2355540",
|
||||||
|
"source": "secalert@redhat.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
60
CVE-2025/CVE-2025-29xx/CVE-2025-2901.json
Normal file
60
CVE-2025/CVE-2025-29xx/CVE-2025-2901.json
Normal file
@ -0,0 +1,60 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2025-2901",
|
||||||
|
"sourceIdentifier": "secalert@redhat.com",
|
||||||
|
"published": "2025-03-28T14:15:22.020",
|
||||||
|
"lastModified": "2025-03-28T14:15:22.020",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "A flaw was found in the JBoss EAP Management Console, where a stored Cross-site scripting vulnerability occurs when an application improperly sanitizes user input before storing it in a data store. When this stored data is later included in web pages without adequate sanitization, malicious scripts can execute in the context of users who view these pages, leading to potential data theft, session hijacking, or other malicious activities."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "secalert@redhat.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N",
|
||||||
|
"baseScore": 4.6,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.1,
|
||||||
|
"impactScore": 2.5
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "secalert@redhat.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-79"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://access.redhat.com/security/cve/CVE-2025-2901",
|
||||||
|
"source": "secalert@redhat.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2355685",
|
||||||
|
"source": "secalert@redhat.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
78
CVE-2025/CVE-2025-29xx/CVE-2025-2908.json
Normal file
78
CVE-2025/CVE-2025-29xx/CVE-2025-2908.json
Normal file
@ -0,0 +1,78 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2025-2908",
|
||||||
|
"sourceIdentifier": "cve-coordination@incibe.es",
|
||||||
|
"published": "2025-03-28T13:15:41.217",
|
||||||
|
"lastModified": "2025-03-28T13:15:41.217",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "The exposure of credentials in the call forwarding configuration module in MeetMe products in versions prior to 2024-09 allows an attacker to gain access to some important assets via configuration files."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV40": [
|
||||||
|
{
|
||||||
|
"source": "cve-coordination@incibe.es",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "4.0",
|
||||||
|
"vectorString": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||||
|
"baseScore": 8.5,
|
||||||
|
"baseSeverity": "HIGH",
|
||||||
|
"attackVector": "ADJACENT",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"attackRequirements": "NONE",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"vulnConfidentialityImpact": "HIGH",
|
||||||
|
"vulnIntegrityImpact": "HIGH",
|
||||||
|
"vulnAvailabilityImpact": "NONE",
|
||||||
|
"subConfidentialityImpact": "NONE",
|
||||||
|
"subIntegrityImpact": "NONE",
|
||||||
|
"subAvailabilityImpact": "NONE",
|
||||||
|
"exploitMaturity": "NOT_DEFINED",
|
||||||
|
"confidentialityRequirement": "NOT_DEFINED",
|
||||||
|
"integrityRequirement": "NOT_DEFINED",
|
||||||
|
"availabilityRequirement": "NOT_DEFINED",
|
||||||
|
"modifiedAttackVector": "NOT_DEFINED",
|
||||||
|
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||||
|
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||||
|
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||||
|
"modifiedUserInteraction": "NOT_DEFINED",
|
||||||
|
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||||
|
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||||
|
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||||
|
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||||
|
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||||
|
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||||
|
"Safety": "NOT_DEFINED",
|
||||||
|
"Automatable": "NOT_DEFINED",
|
||||||
|
"Recovery": "NOT_DEFINED",
|
||||||
|
"valueDensity": "NOT_DEFINED",
|
||||||
|
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||||
|
"providerUrgency": "NOT_DEFINED"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "cve-coordination@incibe.es",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-522"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-fermax-mobile-applications",
|
||||||
|
"source": "cve-coordination@incibe.es"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
78
CVE-2025/CVE-2025-29xx/CVE-2025-2909.json
Normal file
78
CVE-2025/CVE-2025-29xx/CVE-2025-2909.json
Normal file
@ -0,0 +1,78 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2025-2909",
|
||||||
|
"sourceIdentifier": "cve-coordination@incibe.es",
|
||||||
|
"published": "2025-03-28T13:15:41.387",
|
||||||
|
"lastModified": "2025-03-28T13:15:41.387",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "The lack of encryption in the DuoxMe (formerly Blue) application binary in versions prior to 3.3.1 for iOS devices allows an attacker to gain unauthorised access to the application code and discover sensitive information."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV40": [
|
||||||
|
{
|
||||||
|
"source": "cve-coordination@incibe.es",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "4.0",
|
||||||
|
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||||
|
"baseScore": 6.9,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"attackRequirements": "NONE",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"vulnConfidentialityImpact": "HIGH",
|
||||||
|
"vulnIntegrityImpact": "NONE",
|
||||||
|
"vulnAvailabilityImpact": "NONE",
|
||||||
|
"subConfidentialityImpact": "NONE",
|
||||||
|
"subIntegrityImpact": "NONE",
|
||||||
|
"subAvailabilityImpact": "NONE",
|
||||||
|
"exploitMaturity": "NOT_DEFINED",
|
||||||
|
"confidentialityRequirement": "NOT_DEFINED",
|
||||||
|
"integrityRequirement": "NOT_DEFINED",
|
||||||
|
"availabilityRequirement": "NOT_DEFINED",
|
||||||
|
"modifiedAttackVector": "NOT_DEFINED",
|
||||||
|
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||||
|
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||||
|
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||||
|
"modifiedUserInteraction": "NOT_DEFINED",
|
||||||
|
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||||
|
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||||
|
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||||
|
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||||
|
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||||
|
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||||
|
"Safety": "NOT_DEFINED",
|
||||||
|
"Automatable": "NOT_DEFINED",
|
||||||
|
"Recovery": "NOT_DEFINED",
|
||||||
|
"valueDensity": "NOT_DEFINED",
|
||||||
|
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||||
|
"providerUrgency": "NOT_DEFINED"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "cve-coordination@incibe.es",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-312"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-fermax-mobile-applications",
|
||||||
|
"source": "cve-coordination@incibe.es"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
78
CVE-2025/CVE-2025-29xx/CVE-2025-2910.json
Normal file
78
CVE-2025/CVE-2025-29xx/CVE-2025-2910.json
Normal file
@ -0,0 +1,78 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2025-2910",
|
||||||
|
"sourceIdentifier": "cve-coordination@incibe.es",
|
||||||
|
"published": "2025-03-28T13:15:41.533",
|
||||||
|
"lastModified": "2025-03-28T13:15:41.533",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "User enumeration in the password reset module of the MeetMe authentication service in versions prior to 2024-09 allows an attacker to determine whether an email address is registered through specific error messages."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV40": [
|
||||||
|
{
|
||||||
|
"source": "cve-coordination@incibe.es",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "4.0",
|
||||||
|
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||||
|
"baseScore": 6.9,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"attackRequirements": "NONE",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"vulnConfidentialityImpact": "LOW",
|
||||||
|
"vulnIntegrityImpact": "NONE",
|
||||||
|
"vulnAvailabilityImpact": "NONE",
|
||||||
|
"subConfidentialityImpact": "NONE",
|
||||||
|
"subIntegrityImpact": "NONE",
|
||||||
|
"subAvailabilityImpact": "NONE",
|
||||||
|
"exploitMaturity": "NOT_DEFINED",
|
||||||
|
"confidentialityRequirement": "NOT_DEFINED",
|
||||||
|
"integrityRequirement": "NOT_DEFINED",
|
||||||
|
"availabilityRequirement": "NOT_DEFINED",
|
||||||
|
"modifiedAttackVector": "NOT_DEFINED",
|
||||||
|
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||||
|
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||||
|
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||||
|
"modifiedUserInteraction": "NOT_DEFINED",
|
||||||
|
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||||
|
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||||
|
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||||
|
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||||
|
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||||
|
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||||
|
"Safety": "NOT_DEFINED",
|
||||||
|
"Automatable": "NOT_DEFINED",
|
||||||
|
"Recovery": "NOT_DEFINED",
|
||||||
|
"valueDensity": "NOT_DEFINED",
|
||||||
|
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||||
|
"providerUrgency": "NOT_DEFINED"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "cve-coordination@incibe.es",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-204"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-fermax-mobile-applications",
|
||||||
|
"source": "cve-coordination@incibe.es"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
78
CVE-2025/CVE-2025-29xx/CVE-2025-2911.json
Normal file
78
CVE-2025/CVE-2025-29xx/CVE-2025-2911.json
Normal file
@ -0,0 +1,78 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2025-2911",
|
||||||
|
"sourceIdentifier": "cve-coordination@incibe.es",
|
||||||
|
"published": "2025-03-28T13:15:41.673",
|
||||||
|
"lastModified": "2025-03-28T13:15:41.673",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Unauthorised access to the call forwarding service system in MeetMe products in versions prior to 2024-09 allows an attacker to identify multiple users and perform brute force attacks via extensions."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV40": [
|
||||||
|
{
|
||||||
|
"source": "cve-coordination@incibe.es",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "4.0",
|
||||||
|
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||||
|
"baseScore": 5.3,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"attackRequirements": "NONE",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"vulnConfidentialityImpact": "LOW",
|
||||||
|
"vulnIntegrityImpact": "NONE",
|
||||||
|
"vulnAvailabilityImpact": "LOW",
|
||||||
|
"subConfidentialityImpact": "NONE",
|
||||||
|
"subIntegrityImpact": "NONE",
|
||||||
|
"subAvailabilityImpact": "NONE",
|
||||||
|
"exploitMaturity": "NOT_DEFINED",
|
||||||
|
"confidentialityRequirement": "NOT_DEFINED",
|
||||||
|
"integrityRequirement": "NOT_DEFINED",
|
||||||
|
"availabilityRequirement": "NOT_DEFINED",
|
||||||
|
"modifiedAttackVector": "NOT_DEFINED",
|
||||||
|
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||||
|
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||||
|
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||||
|
"modifiedUserInteraction": "NOT_DEFINED",
|
||||||
|
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||||
|
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||||
|
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||||
|
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||||
|
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||||
|
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||||
|
"Safety": "NOT_DEFINED",
|
||||||
|
"Automatable": "NOT_DEFINED",
|
||||||
|
"Recovery": "NOT_DEFINED",
|
||||||
|
"valueDensity": "NOT_DEFINED",
|
||||||
|
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||||
|
"providerUrgency": "NOT_DEFINED"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "cve-coordination@incibe.es",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-307"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-fermax-mobile-applications",
|
||||||
|
"source": "cve-coordination@incibe.es"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
85
README.md
85
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
|||||||
### Last Repository Update
|
### Last Repository Update
|
||||||
|
|
||||||
```plain
|
```plain
|
||||||
2025-03-28T13:00:19.840324+00:00
|
2025-03-28T15:00:20.535463+00:00
|
||||||
```
|
```
|
||||||
|
|
||||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||||
|
|
||||||
```plain
|
```plain
|
||||||
2025-03-28T12:59:00.413000+00:00
|
2025-03-28T14:52:00.437000+00:00
|
||||||
```
|
```
|
||||||
|
|
||||||
### Last Data Feed Release
|
### Last Data Feed Release
|
||||||
@ -33,48 +33,65 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
|||||||
### Total Number of included CVEs
|
### Total Number of included CVEs
|
||||||
|
|
||||||
```plain
|
```plain
|
||||||
287218
|
287239
|
||||||
```
|
```
|
||||||
|
|
||||||
### CVEs added in the last Commit
|
### CVEs added in the last Commit
|
||||||
|
|
||||||
Recently added CVEs: `37`
|
Recently added CVEs: `21`
|
||||||
|
|
||||||
- [CVE-2025-31440](CVE-2025/CVE-2025-314xx/CVE-2025-31440.json) (`2025-03-28T12:15:16.770`)
|
- [CVE-2024-11504](CVE-2024/CVE-2024-115xx/CVE-2024-11504.json) (`2025-03-28T13:15:39.663`)
|
||||||
- [CVE-2025-31443](CVE-2025/CVE-2025-314xx/CVE-2025-31443.json) (`2025-03-28T12:15:16.927`)
|
- [CVE-2024-7407](CVE-2024/CVE-2024-74xx/CVE-2024-7407.json) (`2025-03-28T13:15:40.760`)
|
||||||
- [CVE-2025-31444](CVE-2025/CVE-2025-314xx/CVE-2025-31444.json) (`2025-03-28T12:15:17.080`)
|
- [CVE-2025-0986](CVE-2025/CVE-2025-09xx/CVE-2025-0986.json) (`2025-03-28T14:15:19.357`)
|
||||||
- [CVE-2025-31447](CVE-2025/CVE-2025-314xx/CVE-2025-31447.json) (`2025-03-28T12:15:17.227`)
|
- [CVE-2025-1781](CVE-2025/CVE-2025-17xx/CVE-2025-1781.json) (`2025-03-28T14:15:19.687`)
|
||||||
- [CVE-2025-31448](CVE-2025/CVE-2025-314xx/CVE-2025-31448.json) (`2025-03-28T12:15:17.377`)
|
- [CVE-2025-28219](CVE-2025/CVE-2025-282xx/CVE-2025-28219.json) (`2025-03-28T14:15:20.253`)
|
||||||
- [CVE-2025-31449](CVE-2025/CVE-2025-314xx/CVE-2025-31449.json) (`2025-03-28T12:15:17.527`)
|
- [CVE-2025-28220](CVE-2025/CVE-2025-282xx/CVE-2025-28220.json) (`2025-03-28T14:15:20.377`)
|
||||||
- [CVE-2025-31450](CVE-2025/CVE-2025-314xx/CVE-2025-31450.json) (`2025-03-28T12:15:17.677`)
|
- [CVE-2025-28221](CVE-2025/CVE-2025-282xx/CVE-2025-28221.json) (`2025-03-28T14:15:20.483`)
|
||||||
- [CVE-2025-31451](CVE-2025/CVE-2025-314xx/CVE-2025-31451.json) (`2025-03-28T12:15:17.817`)
|
- [CVE-2025-2858](CVE-2025/CVE-2025-28xx/CVE-2025-2858.json) (`2025-03-28T14:15:20.650`)
|
||||||
- [CVE-2025-31452](CVE-2025/CVE-2025-314xx/CVE-2025-31452.json) (`2025-03-28T12:15:17.960`)
|
- [CVE-2025-2859](CVE-2025/CVE-2025-28xx/CVE-2025-2859.json) (`2025-03-28T14:15:20.810`)
|
||||||
- [CVE-2025-31453](CVE-2025/CVE-2025-314xx/CVE-2025-31453.json) (`2025-03-28T12:15:18.103`)
|
- [CVE-2025-2860](CVE-2025/CVE-2025-28xx/CVE-2025-2860.json) (`2025-03-28T14:15:20.967`)
|
||||||
- [CVE-2025-31456](CVE-2025/CVE-2025-314xx/CVE-2025-31456.json) (`2025-03-28T12:15:18.250`)
|
- [CVE-2025-2861](CVE-2025/CVE-2025-28xx/CVE-2025-2861.json) (`2025-03-28T14:15:21.113`)
|
||||||
- [CVE-2025-31457](CVE-2025/CVE-2025-314xx/CVE-2025-31457.json) (`2025-03-28T12:15:18.393`)
|
- [CVE-2025-2862](CVE-2025/CVE-2025-28xx/CVE-2025-2862.json) (`2025-03-28T14:15:21.257`)
|
||||||
- [CVE-2025-31458](CVE-2025/CVE-2025-314xx/CVE-2025-31458.json) (`2025-03-28T12:15:18.543`)
|
- [CVE-2025-2863](CVE-2025/CVE-2025-28xx/CVE-2025-2863.json) (`2025-03-28T14:15:21.410`)
|
||||||
- [CVE-2025-31459](CVE-2025/CVE-2025-314xx/CVE-2025-31459.json) (`2025-03-28T12:15:18.680`)
|
- [CVE-2025-2864](CVE-2025/CVE-2025-28xx/CVE-2025-2864.json) (`2025-03-28T14:15:21.570`)
|
||||||
- [CVE-2025-31460](CVE-2025/CVE-2025-314xx/CVE-2025-31460.json) (`2025-03-28T12:15:18.820`)
|
- [CVE-2025-2865](CVE-2025/CVE-2025-28xx/CVE-2025-2865.json) (`2025-03-28T14:15:21.727`)
|
||||||
- [CVE-2025-31463](CVE-2025/CVE-2025-314xx/CVE-2025-31463.json) (`2025-03-28T12:15:18.960`)
|
- [CVE-2025-2877](CVE-2025/CVE-2025-28xx/CVE-2025-2877.json) (`2025-03-28T14:15:21.877`)
|
||||||
- [CVE-2025-31464](CVE-2025/CVE-2025-314xx/CVE-2025-31464.json) (`2025-03-28T12:15:19.107`)
|
- [CVE-2025-2901](CVE-2025/CVE-2025-29xx/CVE-2025-2901.json) (`2025-03-28T14:15:22.020`)
|
||||||
- [CVE-2025-31465](CVE-2025/CVE-2025-314xx/CVE-2025-31465.json) (`2025-03-28T12:15:19.237`)
|
- [CVE-2025-2908](CVE-2025/CVE-2025-29xx/CVE-2025-2908.json) (`2025-03-28T13:15:41.217`)
|
||||||
- [CVE-2025-31466](CVE-2025/CVE-2025-314xx/CVE-2025-31466.json) (`2025-03-28T12:15:19.383`)
|
- [CVE-2025-2909](CVE-2025/CVE-2025-29xx/CVE-2025-2909.json) (`2025-03-28T13:15:41.387`)
|
||||||
- [CVE-2025-31469](CVE-2025/CVE-2025-314xx/CVE-2025-31469.json) (`2025-03-28T12:15:19.530`)
|
- [CVE-2025-2910](CVE-2025/CVE-2025-29xx/CVE-2025-2910.json) (`2025-03-28T13:15:41.533`)
|
||||||
- [CVE-2025-31470](CVE-2025/CVE-2025-314xx/CVE-2025-31470.json) (`2025-03-28T12:15:19.673`)
|
- [CVE-2025-2911](CVE-2025/CVE-2025-29xx/CVE-2025-2911.json) (`2025-03-28T13:15:41.673`)
|
||||||
- [CVE-2025-31471](CVE-2025/CVE-2025-314xx/CVE-2025-31471.json) (`2025-03-28T12:15:19.820`)
|
|
||||||
- [CVE-2025-31472](CVE-2025/CVE-2025-314xx/CVE-2025-31472.json) (`2025-03-28T12:15:19.963`)
|
|
||||||
- [CVE-2025-31473](CVE-2025/CVE-2025-314xx/CVE-2025-31473.json) (`2025-03-28T12:15:20.110`)
|
|
||||||
- [CVE-2025-31474](CVE-2025/CVE-2025-314xx/CVE-2025-31474.json) (`2025-03-28T12:15:20.257`)
|
|
||||||
|
|
||||||
|
|
||||||
### CVEs modified in the last Commit
|
### CVEs modified in the last Commit
|
||||||
|
|
||||||
Recently modified CVEs: `4`
|
Recently modified CVEs: `60`
|
||||||
|
|
||||||
- [CVE-2023-42118](CVE-2023/CVE-2023-421xx/CVE-2023-42118.json) (`2025-03-28T12:15:14.780`)
|
- [CVE-2024-28572](CVE-2024/CVE-2024-285xx/CVE-2024-28572.json) (`2025-03-28T14:48:51.143`)
|
||||||
- [CVE-2024-13847](CVE-2024/CVE-2024-138xx/CVE-2024-13847.json) (`2025-03-28T12:50:32.090`)
|
- [CVE-2024-28573](CVE-2024/CVE-2024-285xx/CVE-2024-28573.json) (`2025-03-28T14:48:47.437`)
|
||||||
- [CVE-2025-1657](CVE-2025/CVE-2025-16xx/CVE-2025-1657.json) (`2025-03-28T12:59:00.413`)
|
- [CVE-2024-28574](CVE-2024/CVE-2024-285xx/CVE-2024-28574.json) (`2025-03-28T14:48:43.373`)
|
||||||
- [CVE-2025-1667](CVE-2025/CVE-2025-16xx/CVE-2025-1667.json) (`2025-03-28T12:46:27.840`)
|
- [CVE-2024-28575](CVE-2024/CVE-2024-285xx/CVE-2024-28575.json) (`2025-03-28T14:48:40.390`)
|
||||||
|
- [CVE-2024-28576](CVE-2024/CVE-2024-285xx/CVE-2024-28576.json) (`2025-03-28T14:48:37.483`)
|
||||||
|
- [CVE-2024-28577](CVE-2024/CVE-2024-285xx/CVE-2024-28577.json) (`2025-03-28T14:48:33.360`)
|
||||||
|
- [CVE-2024-28578](CVE-2024/CVE-2024-285xx/CVE-2024-28578.json) (`2025-03-28T14:48:28.610`)
|
||||||
|
- [CVE-2024-28579](CVE-2024/CVE-2024-285xx/CVE-2024-28579.json) (`2025-03-28T14:48:24.560`)
|
||||||
|
- [CVE-2024-28580](CVE-2024/CVE-2024-285xx/CVE-2024-28580.json) (`2025-03-28T14:48:19.057`)
|
||||||
|
- [CVE-2024-28581](CVE-2024/CVE-2024-285xx/CVE-2024-28581.json) (`2025-03-28T14:48:15.920`)
|
||||||
|
- [CVE-2024-28582](CVE-2024/CVE-2024-285xx/CVE-2024-28582.json) (`2025-03-28T14:48:12.423`)
|
||||||
|
- [CVE-2024-28583](CVE-2024/CVE-2024-285xx/CVE-2024-28583.json) (`2025-03-28T14:48:08.290`)
|
||||||
|
- [CVE-2024-28584](CVE-2024/CVE-2024-285xx/CVE-2024-28584.json) (`2025-03-28T14:47:52.610`)
|
||||||
|
- [CVE-2024-44276](CVE-2024/CVE-2024-442xx/CVE-2024-44276.json) (`2025-03-28T14:09:35.787`)
|
||||||
|
- [CVE-2025-0189](CVE-2025/CVE-2025-01xx/CVE-2025-0189.json) (`2025-03-28T14:31:37.077`)
|
||||||
|
- [CVE-2025-0190](CVE-2025/CVE-2025-01xx/CVE-2025-0190.json) (`2025-03-28T14:28:25.273`)
|
||||||
|
- [CVE-2025-0281](CVE-2025/CVE-2025-02xx/CVE-2025-0281.json) (`2025-03-28T14:22:53.790`)
|
||||||
|
- [CVE-2025-0312](CVE-2025/CVE-2025-03xx/CVE-2025-0312.json) (`2025-03-28T14:11:12.457`)
|
||||||
|
- [CVE-2025-1653](CVE-2025/CVE-2025-16xx/CVE-2025-1653.json) (`2025-03-28T13:17:33.270`)
|
||||||
|
- [CVE-2025-20124](CVE-2025/CVE-2025-201xx/CVE-2025-20124.json) (`2025-03-28T13:22:42.077`)
|
||||||
|
- [CVE-2025-20125](CVE-2025/CVE-2025-201xx/CVE-2025-20125.json) (`2025-03-28T13:37:16.650`)
|
||||||
|
- [CVE-2025-20204](CVE-2025/CVE-2025-202xx/CVE-2025-20204.json) (`2025-03-28T13:42:57.807`)
|
||||||
|
- [CVE-2025-20205](CVE-2025/CVE-2025-202xx/CVE-2025-20205.json) (`2025-03-28T13:46:02.393`)
|
||||||
|
- [CVE-2025-21117](CVE-2025/CVE-2025-211xx/CVE-2025-21117.json) (`2025-03-28T13:24:51.620`)
|
||||||
|
- [CVE-2025-2854](CVE-2025/CVE-2025-28xx/CVE-2025-2854.json) (`2025-03-28T13:15:40.923`)
|
||||||
|
|
||||||
|
|
||||||
## Download and Usage
|
## Download and Usage
|
||||||
|
223
_state.csv
223
_state.csv
@ -170164,7 +170164,7 @@ CVE-2021-24002,0,0,addc5eef10d2818e03f7e15b6eac319d4f4160522b2da84506fdf9afee446
|
|||||||
CVE-2021-24005,0,0,90b643847db1ffbda88a1e24fd39a6d41ba3ed869904aacfe0f12013ff128369,2024-11-21T05:52:11.520000
|
CVE-2021-24005,0,0,90b643847db1ffbda88a1e24fd39a6d41ba3ed869904aacfe0f12013ff128369,2024-11-21T05:52:11.520000
|
||||||
CVE-2021-24006,0,0,86422d585823531724bba7d81a507595d8b212f8cd4a7e1633c3ead27b68d9ca,2024-11-21T05:52:11.643000
|
CVE-2021-24006,0,0,86422d585823531724bba7d81a507595d8b212f8cd4a7e1633c3ead27b68d9ca,2024-11-21T05:52:11.643000
|
||||||
CVE-2021-24007,0,0,220048f00966eddc01c92bfbc5adffcb09ffb6bb101362af86860eb6aad6c3d8,2024-11-21T05:52:11.773000
|
CVE-2021-24007,0,0,220048f00966eddc01c92bfbc5adffcb09ffb6bb101362af86860eb6aad6c3d8,2024-11-21T05:52:11.773000
|
||||||
CVE-2021-24008,1,1,ad739447e0ed4d35a8cb16bb14292da3b34e66046247843babdfa7aadfdb6b58,2025-03-28T11:15:36.620000
|
CVE-2021-24008,0,0,ad739447e0ed4d35a8cb16bb14292da3b34e66046247843babdfa7aadfdb6b58,2025-03-28T11:15:36.620000
|
||||||
CVE-2021-24009,0,0,fb92da175d73dc74b6a1a2076c75478b767f109414e2f9be9cbde10ba77e9f4b,2024-11-21T05:52:11.923000
|
CVE-2021-24009,0,0,fb92da175d73dc74b6a1a2076c75478b767f109414e2f9be9cbde10ba77e9f4b,2024-11-21T05:52:11.923000
|
||||||
CVE-2021-2401,0,0,e836cbf9b9529d542b335d1267d910fa46c8af303aca0af0f04193133dede53f,2024-11-21T06:03:03.020000
|
CVE-2021-2401,0,0,e836cbf9b9529d542b335d1267d910fa46c8af303aca0af0f04193133dede53f,2024-11-21T06:03:03.020000
|
||||||
CVE-2021-24010,0,0,10717fa162d2085ac94ce76810cd605f18c622ea6cfe839a903f2b0b65019295,2024-11-21T05:52:12.053000
|
CVE-2021-24010,0,0,10717fa162d2085ac94ce76810cd605f18c622ea6cfe839a903f2b0b65019295,2024-11-21T05:52:12.053000
|
||||||
@ -210139,7 +210139,7 @@ CVE-2022-44715,0,0,5b241799ae6b884fe57141f2d8c41ed6fa02914a646428e290f97256578fe
|
|||||||
CVE-2022-44717,0,0,370b019989f037e96a2c2262b0f3225e0b3668c0e0eb0527ab6534489888b4cf,2024-11-21T07:28:21.630000
|
CVE-2022-44717,0,0,370b019989f037e96a2c2262b0f3225e0b3668c0e0eb0527ab6534489888b4cf,2024-11-21T07:28:21.630000
|
||||||
CVE-2022-44718,0,0,c025de4fda89deb0c067b8ab3aea8e39e154a2f234fe3d24caaab84771ed0768,2024-11-21T07:28:21.773000
|
CVE-2022-44718,0,0,c025de4fda89deb0c067b8ab3aea8e39e154a2f234fe3d24caaab84771ed0768,2024-11-21T07:28:21.773000
|
||||||
CVE-2022-44719,0,0,95f36d24d2c2f52c1dda61947950688f864c0a30d123ed3b6f30e7b10efb6d32,2024-11-21T07:28:21.920000
|
CVE-2022-44719,0,0,95f36d24d2c2f52c1dda61947950688f864c0a30d123ed3b6f30e7b10efb6d32,2024-11-21T07:28:21.920000
|
||||||
CVE-2022-4472,0,0,0ea638e835bc1d80a1ffb9e044f212975fba8567f11fdf1ed75f1e27845c977f,2024-11-21T07:35:19.890000
|
CVE-2022-4472,0,1,b29e148154b8d93946c2fa2b80f2586b95f0fb1c529e9a6fe708b58805235ad4,2025-03-28T14:15:18.053000
|
||||||
CVE-2022-44720,0,0,2978ccbe30cfbda91896f60a736487ad01b21b513e713e778a2a081311beff67,2024-11-21T07:28:22.087000
|
CVE-2022-44720,0,0,2978ccbe30cfbda91896f60a736487ad01b21b513e713e778a2a081311beff67,2024-11-21T07:28:22.087000
|
||||||
CVE-2022-44721,0,0,2e97be297496e44c127508c29458d8f33303250a874d5f326d4cccfed3156c62,2023-11-07T03:54:25.470000
|
CVE-2022-44721,0,0,2e97be297496e44c127508c29458d8f33303250a874d5f326d4cccfed3156c62,2023-11-07T03:54:25.470000
|
||||||
CVE-2022-44724,0,0,a0eaf24c5c29bd813efd4d612a631475cbc4b4deda27fceea2d2c9a15aa2b006,2024-11-21T07:28:22.253000
|
CVE-2022-44724,0,0,a0eaf24c5c29bd813efd4d612a631475cbc4b4deda27fceea2d2c9a15aa2b006,2024-11-21T07:28:22.253000
|
||||||
@ -210260,7 +210260,7 @@ CVE-2022-44955,0,0,e6b0c638389d060355a0f3905e6dd762d666f9040db16167319772a36a253
|
|||||||
CVE-2022-44956,0,0,d1b70adfdab776c1c5c0b014d9feac2cad77496972cb9a7a631c2121e94f64d3,2024-11-21T07:28:35.273000
|
CVE-2022-44956,0,0,d1b70adfdab776c1c5c0b014d9feac2cad77496972cb9a7a631c2121e94f64d3,2024-11-21T07:28:35.273000
|
||||||
CVE-2022-44957,0,0,fe0e43a3c399e52a8e98ea2a394a187e7e1da0eea6ef55796b0674d6e8d37057,2024-11-21T07:28:35.423000
|
CVE-2022-44957,0,0,fe0e43a3c399e52a8e98ea2a394a187e7e1da0eea6ef55796b0674d6e8d37057,2024-11-21T07:28:35.423000
|
||||||
CVE-2022-44959,0,0,afe42cf127e64338dbf62adbd3682575b6ae471a5c7331b91c6e58ec6af6d692,2024-11-21T07:28:35.567000
|
CVE-2022-44959,0,0,afe42cf127e64338dbf62adbd3682575b6ae471a5c7331b91c6e58ec6af6d692,2024-11-21T07:28:35.567000
|
||||||
CVE-2022-4496,0,0,4209ce18f0602b75266699a7fea741ade7db9543f5f266ec65bb4f4113acf480,2024-11-21T07:35:22.817000
|
CVE-2022-4496,0,1,93cef721d9340e9008a0624cfee0845c06778940086c8173d2422cfccf83f5c1,2025-03-28T14:15:18.247000
|
||||||
CVE-2022-44960,0,0,5c57a054c5232484ba125138b2e5ab52b6bc141f4e49d5a562f6cefb060d96f3,2024-11-21T07:28:35.707000
|
CVE-2022-44960,0,0,5c57a054c5232484ba125138b2e5ab52b6bc141f4e49d5a562f6cefb060d96f3,2024-11-21T07:28:35.707000
|
||||||
CVE-2022-44961,0,0,dc0026edf8d696785d4ad8685d73d54e682943337771cc165b834e50c32149f7,2024-11-21T07:28:35.863000
|
CVE-2022-44961,0,0,dc0026edf8d696785d4ad8685d73d54e682943337771cc165b834e50c32149f7,2024-11-21T07:28:35.863000
|
||||||
CVE-2022-44962,0,0,e872b1aec92c00d7b59fb3535b11b1ddc2890769fa87f1d1b3c5799210cb1ca3,2024-11-21T07:28:36.020000
|
CVE-2022-44962,0,0,e872b1aec92c00d7b59fb3535b11b1ddc2890769fa87f1d1b3c5799210cb1ca3,2024-11-21T07:28:36.020000
|
||||||
@ -211342,7 +211342,7 @@ CVE-2022-46485,0,0,c0c6dff55283dfb771f1a5b37a71bcda6eb783b9616964cb839caae868642
|
|||||||
CVE-2022-46486,0,0,273bdea328c05f53d2935ee8b7a4d92db36b6cf750418b0fcbf9c9ac94631bba,2024-11-21T07:30:37.913000
|
CVE-2022-46486,0,0,273bdea328c05f53d2935ee8b7a4d92db36b6cf750418b0fcbf9c9ac94631bba,2024-11-21T07:30:37.913000
|
||||||
CVE-2022-46487,0,0,65fe5e22876afc2cb9c6b96f2f17c89cd6669debe9e703f15386e0a779e67884,2024-11-21T07:30:38.080000
|
CVE-2022-46487,0,0,65fe5e22876afc2cb9c6b96f2f17c89cd6669debe9e703f15386e0a779e67884,2024-11-21T07:30:38.080000
|
||||||
CVE-2022-46489,0,0,7e5278eabce0e4178abbc2321c3e1cb938d848560691becda1a2dd3dbb795ffc,2024-11-21T07:30:38.257000
|
CVE-2022-46489,0,0,7e5278eabce0e4178abbc2321c3e1cb938d848560691becda1a2dd3dbb795ffc,2024-11-21T07:30:38.257000
|
||||||
CVE-2022-4649,0,0,5190915e0998b8a32aaf3a07b1fe27236b601a9523d83e7aac8c0fa4989a67d3,2024-11-21T07:35:40.203000
|
CVE-2022-4649,0,1,4397e99c546f206fb5608e5d52d00f6a11918bbe5a94a37f22c72384e078b82d,2025-03-28T14:15:18.420000
|
||||||
CVE-2022-46490,0,0,0aba57b3e2c6acedfab8943eea7d30e9d0d314e0e1ad14ca907ef24ac2a1aeb4,2024-11-21T07:30:38.400000
|
CVE-2022-46490,0,0,0aba57b3e2c6acedfab8943eea7d30e9d0d314e0e1ad14ca907ef24ac2a1aeb4,2024-11-21T07:30:38.400000
|
||||||
CVE-2022-46491,0,0,1935572f3715f36fc93538c008dc76c9b9fcc6be4c0c502750bd2d8154d14b6b,2024-11-21T07:30:38.557000
|
CVE-2022-46491,0,0,1935572f3715f36fc93538c008dc76c9b9fcc6be4c0c502750bd2d8154d14b6b,2024-11-21T07:30:38.557000
|
||||||
CVE-2022-46492,0,0,ea33259e380519928079c589c50e4fd70a12dd967d5e0ef95d74810d65324acf,2024-11-21T07:30:38.693000
|
CVE-2022-46492,0,0,ea33259e380519928079c589c50e4fd70a12dd967d5e0ef95d74810d65324acf,2024-11-21T07:30:38.693000
|
||||||
@ -211370,7 +211370,7 @@ CVE-2022-46536,0,0,ba5b7d5056f87a59e895d74fb72cc3d15f19f4be6f0ad992b5fba775595bc
|
|||||||
CVE-2022-46537,0,0,12906b63d2f5ad59fda29ada33f3d31b7a7c5331fff3bd5aa033e84dc3f38b67,2024-11-21T07:30:41.460000
|
CVE-2022-46537,0,0,12906b63d2f5ad59fda29ada33f3d31b7a7c5331fff3bd5aa033e84dc3f38b67,2024-11-21T07:30:41.460000
|
||||||
CVE-2022-46538,0,0,d9bc61ef0e5ef0fa6f8492952fe761045187c8f765eaebfc4f01b4f3011fd250,2024-11-21T07:30:41.603000
|
CVE-2022-46538,0,0,d9bc61ef0e5ef0fa6f8492952fe761045187c8f765eaebfc4f01b4f3011fd250,2024-11-21T07:30:41.603000
|
||||||
CVE-2022-46539,0,0,fbb842b44c65b836721a9ca80d64c29a6175b84f4a452e4905d88976fa78e76e,2024-11-21T07:30:41.753000
|
CVE-2022-46539,0,0,fbb842b44c65b836721a9ca80d64c29a6175b84f4a452e4905d88976fa78e76e,2024-11-21T07:30:41.753000
|
||||||
CVE-2022-4654,0,0,0ea5d85160f95bb36c64b655c1e31a22e86b1a408e894ebf014bc7af90927578,2024-11-21T07:35:40.747000
|
CVE-2022-4654,0,1,a11ae60e7a08e302805d9954c19f704fabaa96a1b3e3cb64005becb7d6259b17,2025-03-28T14:15:18.587000
|
||||||
CVE-2022-46540,0,0,371160f698a610d84ddca173575f46caef28646a1f08e43352262b6cad9c9354,2024-11-21T07:30:41.893000
|
CVE-2022-46540,0,0,371160f698a610d84ddca173575f46caef28646a1f08e43352262b6cad9c9354,2024-11-21T07:30:41.893000
|
||||||
CVE-2022-46541,0,0,42d88c6d87824269997cb6db2986e2590b1873121ed705f61857a8ae4a496132,2024-11-21T07:30:42.043000
|
CVE-2022-46541,0,0,42d88c6d87824269997cb6db2986e2590b1873121ed705f61857a8ae4a496132,2024-11-21T07:30:42.043000
|
||||||
CVE-2022-46542,0,0,12f57bc9080a641356a575564eaec43bb7c38161002f8b8efec9ad7b6d66cc25,2024-11-21T07:30:42.187000
|
CVE-2022-46542,0,0,12f57bc9080a641356a575564eaec43bb7c38161002f8b8efec9ad7b6d66cc25,2024-11-21T07:30:42.187000
|
||||||
@ -218005,7 +218005,7 @@ CVE-2023-22329,0,0,f87a257a3f491ed4d593d771327413fcc27bcb682b9124de27e798796cef2
|
|||||||
CVE-2023-2233,0,0,03f299c1d59d076f3123647077160e666b5ecb77282bd585e0ab47f916f62f95,2024-11-21T07:58:12.350000
|
CVE-2023-2233,0,0,03f299c1d59d076f3123647077160e666b5ecb77282bd585e0ab47f916f62f95,2024-11-21T07:58:12.350000
|
||||||
CVE-2023-22330,0,0,2f72b562c10a58f1bde1370f048bf90c89a94766f9eeedb9676c2eca440dc010,2024-11-21T07:44:34.537000
|
CVE-2023-22330,0,0,2f72b562c10a58f1bde1370f048bf90c89a94766f9eeedb9676c2eca440dc010,2024-11-21T07:44:34.537000
|
||||||
CVE-2023-22331,0,0,975a66678c947c6fd9643dc7b61d657f7c1544ac1f02f7181b9b7b2352404e77,2024-11-21T07:44:34.737000
|
CVE-2023-22331,0,0,975a66678c947c6fd9643dc7b61d657f7c1544ac1f02f7181b9b7b2352404e77,2024-11-21T07:44:34.737000
|
||||||
CVE-2023-22332,0,0,5b53881cc7f561923a7307a21fa724cf6206fbff5ce2eff252fbfaafd93e829c,2024-11-21T07:44:34.840000
|
CVE-2023-22332,0,1,5746d28b54a6c8dc7e3f62f577c9fe75e1bb9e110108e5130fa681493f0f185b,2025-03-28T14:15:18.737000
|
||||||
CVE-2023-22333,0,0,f8db12d8428f1a8ad7049d32b56eb3660d94221ec6bac9fcf6874edf8c2b1e2d,2024-11-21T07:44:34.950000
|
CVE-2023-22333,0,0,f8db12d8428f1a8ad7049d32b56eb3660d94221ec6bac9fcf6874edf8c2b1e2d,2024-11-21T07:44:34.950000
|
||||||
CVE-2023-22334,0,0,59460f6c544ae5c2a09037f61f18c7df553834d7cb5bdb8f6cd83508a0355120,2024-11-21T07:44:35.050000
|
CVE-2023-22334,0,0,59460f6c544ae5c2a09037f61f18c7df553834d7cb5bdb8f6cd83508a0355120,2024-11-21T07:44:35.050000
|
||||||
CVE-2023-22335,0,0,e2cdbe44d7f025f42ed55394ac631a52bcf1b0b793133f5a3a5c8a0edc560d3f,2025-03-06T17:15:16.593000
|
CVE-2023-22335,0,0,e2cdbe44d7f025f42ed55394ac631a52bcf1b0b793133f5a3a5c8a0edc560d3f,2025-03-06T17:15:16.593000
|
||||||
@ -233754,7 +233754,7 @@ CVE-2023-42114,0,0,ad1a046a818ca4b20463d80ac89b1049e84653b66c693cc244ddfc0c00b1e
|
|||||||
CVE-2023-42115,0,0,21769ede9e84e26c1380598e55d2f624532dccb5b8b369223818c2ae41774076,2024-11-21T08:22:18.330000
|
CVE-2023-42115,0,0,21769ede9e84e26c1380598e55d2f624532dccb5b8b369223818c2ae41774076,2024-11-21T08:22:18.330000
|
||||||
CVE-2023-42116,0,0,9899b100c38c999410b18eeecefc878bbc0323520bcc7d06ff618379e98e6aa1,2024-11-21T08:22:18.447000
|
CVE-2023-42116,0,0,9899b100c38c999410b18eeecefc878bbc0323520bcc7d06ff618379e98e6aa1,2024-11-21T08:22:18.447000
|
||||||
CVE-2023-42117,0,0,ab08f119534538e55f65871fd32c926ab70b39b85c50a7f7fe2c5b05738aa08e,2024-11-21T08:22:18.567000
|
CVE-2023-42117,0,0,ab08f119534538e55f65871fd32c926ab70b39b85c50a7f7fe2c5b05738aa08e,2024-11-21T08:22:18.567000
|
||||||
CVE-2023-42118,0,1,b1bbcc0c160baa5cb550278009c048889080ece1a70ce0e420235d67073e726f,2025-03-28T12:15:14.780000
|
CVE-2023-42118,0,0,b1bbcc0c160baa5cb550278009c048889080ece1a70ce0e420235d67073e726f,2025-03-28T12:15:14.780000
|
||||||
CVE-2023-42119,0,0,b1d4aac8a3f507a8b31b7bd5e8dc22c958e0e00f7935a091d5ed823b09b4b3a2,2024-11-21T08:22:18.800000
|
CVE-2023-42119,0,0,b1d4aac8a3f507a8b31b7bd5e8dc22c958e0e00f7935a091d5ed823b09b4b3a2,2024-11-21T08:22:18.800000
|
||||||
CVE-2023-4212,0,0,f7298e966ffc27e10318893d708c8b683881dff5cadb9b4411422a970ebf2514,2024-11-21T08:34:37.997000
|
CVE-2023-4212,0,0,f7298e966ffc27e10318893d708c8b683881dff5cadb9b4411422a970ebf2514,2024-11-21T08:34:37.997000
|
||||||
CVE-2023-42120,0,0,84a1fd81aae92051990d5fe3a42231e8412a6ff7d68907f4300cca585c000a9a,2024-11-21T08:22:18.917000
|
CVE-2023-42120,0,0,84a1fd81aae92051990d5fe3a42231e8412a6ff7d68907f4300cca585c000a9a,2024-11-21T08:22:18.917000
|
||||||
@ -239044,11 +239044,11 @@ CVE-2023-49528,0,0,ae59a6a1bbac46ad56a1a54c31382ae08b7998b27d77cdcde165b61ff049b
|
|||||||
CVE-2023-49539,0,0,fa31534f56545ea133b0ffca594c9cec771dfcd7a58fe43a64b5181a65ad6cb7,2024-11-21T08:33:30.410000
|
CVE-2023-49539,0,0,fa31534f56545ea133b0ffca594c9cec771dfcd7a58fe43a64b5181a65ad6cb7,2024-11-21T08:33:30.410000
|
||||||
CVE-2023-49540,0,0,e1bbeead0d4c47048abd2a39187eb4c0af1ee24fb9641e708f014f21bbd6a369,2024-11-21T08:33:30.643000
|
CVE-2023-49540,0,0,e1bbeead0d4c47048abd2a39187eb4c0af1ee24fb9641e708f014f21bbd6a369,2024-11-21T08:33:30.643000
|
||||||
CVE-2023-49543,0,0,fa8051b8098d156d6e67409c2f03a6fbf1ec445cc35240b3209d3f41a86c13ec,2024-11-21T08:33:30.863000
|
CVE-2023-49543,0,0,fa8051b8098d156d6e67409c2f03a6fbf1ec445cc35240b3209d3f41a86c13ec,2024-11-21T08:33:30.863000
|
||||||
CVE-2023-49544,0,0,badf3336354fd428ac051cb158cc2c42075aafeb25a1b391644301fd9a1b0704,2024-11-21T08:33:31.077000
|
CVE-2023-49544,0,1,0301b7ebbb7307dcf91d87a01cd77032d46e6521bb077908d4fae3d5f9e2e193,2025-03-28T14:26:54.410000
|
||||||
CVE-2023-49545,0,0,7570226ead50169cb0268ad44f464d13fced0980a94a18172fe7d25f2d6c9844,2024-11-21T08:33:31.297000
|
CVE-2023-49545,0,1,47f3429e08f2c293fa1cc12b36624cb4d5f68d2ea9bef0685b799dd88a7d2b5b,2025-03-28T14:33:00.380000
|
||||||
CVE-2023-49546,0,0,14bf84d5f066cb1d89d1ee61eac57297f8caa27e955851129c11b8a32ccabacb,2024-11-21T08:33:31.500000
|
CVE-2023-49546,0,1,e46a5d6ba9f928f5ccce6110cf05864cdb8c95510d303e32eb9d6ba14881858a,2025-03-28T14:32:41.870000
|
||||||
CVE-2023-49547,0,0,e0538cc52a0cdaf8e61e583e2e310cd671a3c72017eae9bcfe30b65867f891f0,2024-11-21T08:33:31.720000
|
CVE-2023-49547,0,1,62a6f6e3b035cf2acd18665693229ea22aac788ca296ee7a229b4a2dce9eae2c,2025-03-28T14:32:37.313000
|
||||||
CVE-2023-49548,0,0,e5c89103e97bb2744a3548d98ad1b6269e2bd4690ee8567560a3b7d544f875b8,2024-11-21T08:33:31.930000
|
CVE-2023-49548,0,1,e74378dd5804e4ba9b3280e9ef7d96db58590c88b07392a11d8977286e3b39c9,2025-03-28T14:32:32.823000
|
||||||
CVE-2023-49549,0,0,9a2cebaebaf97239f2bfd9173576257a692bf9d1d5d1560d13729dd131766317,2024-11-21T08:33:32.147000
|
CVE-2023-49549,0,0,9a2cebaebaf97239f2bfd9173576257a692bf9d1d5d1560d13729dd131766317,2024-11-21T08:33:32.147000
|
||||||
CVE-2023-49550,0,0,90ae251e67635b7fa54b057d1493ed9eea320b49928086b9b51c17ca0a7c6b29,2024-11-21T08:33:32.297000
|
CVE-2023-49550,0,0,90ae251e67635b7fa54b057d1493ed9eea320b49928086b9b51c17ca0a7c6b29,2024-11-21T08:33:32.297000
|
||||||
CVE-2023-49551,0,0,ed28c559f9ba8d4b8aae8d2d4e401c8834ea212cf18214e50de777924bce03bc,2024-11-21T08:33:32.447000
|
CVE-2023-49551,0,0,ed28c559f9ba8d4b8aae8d2d4e401c8834ea212cf18214e50de777924bce03bc,2024-11-21T08:33:32.447000
|
||||||
@ -239373,15 +239373,15 @@ CVE-2023-49963,0,0,716a28f46de42a2e56dd2dbb762be5dc774690d8da0a8361cd05a453c1e45
|
|||||||
CVE-2023-49964,0,0,68e81d9007921be61201b4b69446355cbaa46e44d19df4f8532af74e68f85bb0,2024-11-21T08:34:06
|
CVE-2023-49964,0,0,68e81d9007921be61201b4b69446355cbaa46e44d19df4f8532af74e68f85bb0,2024-11-21T08:34:06
|
||||||
CVE-2023-49965,0,0,ef388bac4cc546bedef71999d058081ade12398c6f30adb285e66370d4c444b9,2025-03-27T17:15:41.540000
|
CVE-2023-49965,0,0,ef388bac4cc546bedef71999d058081ade12398c6f30adb285e66370d4c444b9,2025-03-27T17:15:41.540000
|
||||||
CVE-2023-49967,0,0,7455fad67fada8a71e63581ef71704562d617d7986216f8b4aed77f63a5a1ef2,2024-11-21T08:34:06.340000
|
CVE-2023-49967,0,0,7455fad67fada8a71e63581ef71704562d617d7986216f8b4aed77f63a5a1ef2,2024-11-21T08:34:06.340000
|
||||||
CVE-2023-49968,0,0,e27c0d39fec3cc8d78cbcdbda5600060aa4aa6025ea7df0c05b60635677b9f80,2024-11-21T08:34:06.490000
|
CVE-2023-49968,0,1,97377596cdba5536ff0311c7d520808ab6dc15969b28250280847661805e1558,2025-03-28T14:32:27.133000
|
||||||
CVE-2023-49969,0,0,1c6e721c03f56e0577536da9bf5b7c5c7b3559914e0b7dbdfb0a379adc55a5d7,2024-11-21T08:34:06.703000
|
CVE-2023-49969,0,1,b0aa2df24f015e2ec9dd6eaf374adcb2f950caeca313a4a225d569537ebe772a,2025-03-28T14:32:21.523000
|
||||||
CVE-2023-4997,0,0,4fe9a3ee9fae40bbb6d40dfd328b8595f2fd5fbfb2596c65f27ae22282aa5cb0,2025-03-03T17:15:11.153000
|
CVE-2023-4997,0,0,4fe9a3ee9fae40bbb6d40dfd328b8595f2fd5fbfb2596c65f27ae22282aa5cb0,2025-03-03T17:15:11.153000
|
||||||
CVE-2023-49970,0,0,b6b21cd662c6188652027dde752dfbe4d17bfefd4a2e3df151e2c3955d71ee50,2024-11-21T08:34:06.910000
|
CVE-2023-49970,0,1,554f580e23ae19185eca0545f17817222c5a39acf2827ea39ca7f2b008b86908,2025-03-28T14:32:11.623000
|
||||||
CVE-2023-49971,0,0,df8ebc04397853587b183e5e501cceacb90d46b4cec9e39b49a79d04bda2daf6,2025-01-15T16:38:44.307000
|
CVE-2023-49971,0,0,df8ebc04397853587b183e5e501cceacb90d46b4cec9e39b49a79d04bda2daf6,2025-01-15T16:38:44.307000
|
||||||
CVE-2023-49973,0,0,0b8457fedb29078695c5eaf42c4bcb75a5f9487ca6a772330139e3edda79513c,2025-01-15T16:38:19.337000
|
CVE-2023-49973,0,0,0b8457fedb29078695c5eaf42c4bcb75a5f9487ca6a772330139e3edda79513c,2025-01-15T16:38:19.337000
|
||||||
CVE-2023-49974,0,0,7f488a86d0ae45569225fc0c424bbd7132352109d96dc64d8e092ba38bbad293,2024-11-21T08:34:07.537000
|
CVE-2023-49974,0,1,348ee359439081d72ce9187bf69627ba1126d6b681312b67518b561274e51026,2025-03-28T14:35:30.683000
|
||||||
CVE-2023-49976,0,0,dc813de2d491266ed91a01eb71b0caae473397cd5b519c212f1230a701290a59,2024-11-21T08:34:07.757000
|
CVE-2023-49976,0,1,7842662c4b0af2daa6730e8628313d9027337d2060a5820d0de30539d035a521,2025-03-28T14:35:34.803000
|
||||||
CVE-2023-49977,0,0,e2d356c1ee7ec3d1bf058adc4ff2c7dbd4c712f6da8f95ff297395fbe12d4026,2024-11-21T08:34:07.977000
|
CVE-2023-49977,0,1,b7af45a0db923330a861cac6d351021b003f94dac16375865374f3de5ce43d3d,2025-03-28T14:35:38.520000
|
||||||
CVE-2023-49978,0,0,fa500e23f48da6df2a860b98eda481781ba05e9f7f13de0b425bad34116a5f73,2025-03-05T18:51:00.240000
|
CVE-2023-49978,0,0,fa500e23f48da6df2a860b98eda481781ba05e9f7f13de0b425bad34116a5f73,2025-03-05T18:51:00.240000
|
||||||
CVE-2023-49979,0,0,75f23943a375ce8279e3286ef1840c70cb95a9e90cf00813fe39f1dd23977277,2025-03-05T18:51:45.150000
|
CVE-2023-49979,0,0,75f23943a375ce8279e3286ef1840c70cb95a9e90cf00813fe39f1dd23977277,2025-03-05T18:51:45.150000
|
||||||
CVE-2023-4998,0,0,e165eb9587ade3f2685138122c6908d08aa666717671177d785c6c36e56a4e40,2025-02-11T02:15:32.447000
|
CVE-2023-4998,0,0,e165eb9587ade3f2685138122c6908d08aa666717671177d785c6c36e56a4e40,2025-02-11T02:15:32.447000
|
||||||
@ -240145,7 +240145,7 @@ CVE-2023-5126,0,0,9ada6a8f2e9b9491a8fe3f4eeafb2a31d386842291921479a06d9dd8a73add
|
|||||||
CVE-2023-5127,0,0,3fdbc762852bea80fea6b909cf2814d7df78ac1c27f25416e9e0960c134130e0,2024-11-21T08:41:06.983000
|
CVE-2023-5127,0,0,3fdbc762852bea80fea6b909cf2814d7df78ac1c27f25416e9e0960c134130e0,2024-11-21T08:41:06.983000
|
||||||
CVE-2023-51277,0,0,ab81eaea8de114fbc99d2d9587fb99b0e511144ce0a98dd0d340bbd095f06374,2024-11-21T08:37:56.290000
|
CVE-2023-51277,0,0,ab81eaea8de114fbc99d2d9587fb99b0e511144ce0a98dd0d340bbd095f06374,2024-11-21T08:37:56.290000
|
||||||
CVE-2023-5128,0,0,bfe204edd11054b27893926793a261843cc5aafcba80836f465a9cbe06b587f5,2024-11-21T08:41:07.113000
|
CVE-2023-5128,0,0,bfe204edd11054b27893926793a261843cc5aafcba80836f465a9cbe06b587f5,2024-11-21T08:41:07.113000
|
||||||
CVE-2023-51281,0,0,13c5d72ef411be7896310c619236218fa85e3239b473c76db8a7fc7598f5af7d,2024-11-21T08:37:56.467000
|
CVE-2023-51281,0,1,79b04eca98fe1dab6ef30c2f8202fae9473ab06251454d69918e9613759ab9ff,2025-03-28T14:35:27.157000
|
||||||
CVE-2023-51282,0,0,8e64a1bfc8d57aa569e5ddaeb84ba0deccb82f824ea2197546b9a82d011d8c15,2024-11-21T08:37:56.710000
|
CVE-2023-51282,0,0,8e64a1bfc8d57aa569e5ddaeb84ba0deccb82f824ea2197546b9a82d011d8c15,2024-11-21T08:37:56.710000
|
||||||
CVE-2023-5129,0,0,3c0d5df1426e0bdb75917cedbbb32908a5a7c5fa2c2f7eca16ba24a2fca6eb00,2023-11-07T04:23:29.527000
|
CVE-2023-5129,0,0,3c0d5df1426e0bdb75917cedbbb32908a5a7c5fa2c2f7eca16ba24a2fca6eb00,2023-11-07T04:23:29.527000
|
||||||
CVE-2023-51293,0,0,572ed6a446805f6a16a7884a5b142aaa064f4477ce8cda8bdc3dc8fa68963f57,2025-02-20T16:15:34.460000
|
CVE-2023-51293,0,0,572ed6a446805f6a16a7884a5b142aaa064f4477ce8cda8bdc3dc8fa68963f57,2025-02-20T16:15:34.460000
|
||||||
@ -245947,6 +245947,7 @@ CVE-2024-11499,0,0,a966028160491791da709ee5dab2133093b1d72d985c5f69229a93bd1e155
|
|||||||
CVE-2024-1150,0,0,1edff0fc21d5f22172836448fdcc7da772ab8a792f462f53ba0bc1c0fbae9271,2024-11-21T08:49:54.780000
|
CVE-2024-1150,0,0,1edff0fc21d5f22172836448fdcc7da772ab8a792f462f53ba0bc1c0fbae9271,2024-11-21T08:49:54.780000
|
||||||
CVE-2024-11501,0,0,6aa155b5e971a466b4f7473002330671c6add4e056433a95089c7dc638a9cf0a,2024-12-07T12:15:19.783000
|
CVE-2024-11501,0,0,6aa155b5e971a466b4f7473002330671c6add4e056433a95089c7dc638a9cf0a,2024-12-07T12:15:19.783000
|
||||||
CVE-2024-11503,0,0,ccfec7b9e7ee62b0fba4f13aa631b8746a746bacca8dcef766080a60ce07d27c,2025-03-27T16:45:46.410000
|
CVE-2024-11503,0,0,ccfec7b9e7ee62b0fba4f13aa631b8746a746bacca8dcef766080a60ce07d27c,2025-03-27T16:45:46.410000
|
||||||
|
CVE-2024-11504,1,1,2d88e5e7be479df873d338e951bab20c84937b0425549a8c20401e5aaf19ae80,2025-03-28T13:15:39.663000
|
||||||
CVE-2024-11506,0,0,84ff33f5409ba7fdd242f7a002e540f941fbaac1999270cf94d333eb3dd6c642,2024-11-29T16:56:17.683000
|
CVE-2024-11506,0,0,84ff33f5409ba7fdd242f7a002e540f941fbaac1999270cf94d333eb3dd6c642,2024-11-29T16:56:17.683000
|
||||||
CVE-2024-11507,0,0,f51856fd0c1fbab3042c354bc79fded82f076866bf612d2a253f6b3e90cd74a1,2024-11-29T16:55:51.040000
|
CVE-2024-11507,0,0,f51856fd0c1fbab3042c354bc79fded82f076866bf612d2a253f6b3e90cd74a1,2024-11-29T16:55:51.040000
|
||||||
CVE-2024-11508,0,0,6df8d4fdf035a324cf214a606e6dac615e3c6d7dc7dffb21787b06165120710c,2024-11-29T16:55:14.120000
|
CVE-2024-11508,0,0,6df8d4fdf035a324cf214a606e6dac615e3c6d7dc7dffb21787b06165120710c,2024-11-29T16:55:14.120000
|
||||||
@ -246788,7 +246789,7 @@ CVE-2024-12332,0,0,f0bf328e81e8dc6e6391061dc5bf4110c5e0a30cef25e410954b9a99df4db
|
|||||||
CVE-2024-12333,0,0,f9b36bf24b65a5eadc34be133c8efc135d615c6b77b9af6e424c71705bac5515,2024-12-12T09:15:05.390000
|
CVE-2024-12333,0,0,f9b36bf24b65a5eadc34be133c8efc135d615c6b77b9af6e424c71705bac5515,2024-12-12T09:15:05.390000
|
||||||
CVE-2024-12334,0,0,c80372a41d2c6dabd9e527eb47f4ae66d07465d732e862625492ebe86b1e9b0e,2025-02-04T19:32:48.487000
|
CVE-2024-12334,0,0,c80372a41d2c6dabd9e527eb47f4ae66d07465d732e862625492ebe86b1e9b0e,2025-02-04T19:32:48.487000
|
||||||
CVE-2024-12335,0,0,811e1f31fde162cfb07e19f2dc625fd9888bd35150e2bacee10a476425d11394,2024-12-25T07:15:11.980000
|
CVE-2024-12335,0,0,811e1f31fde162cfb07e19f2dc625fd9888bd35150e2bacee10a476425d11394,2024-12-25T07:15:11.980000
|
||||||
CVE-2024-12336,0,0,b86f4af004d571796d9d81fc12500ffb5f7f4413ff686cdb6692c2f887191e69,2025-03-15T04:15:20.263000
|
CVE-2024-12336,0,1,7b7e61b285b99c957c91a3f1d446f328029fec78f08723d69662d400fd057cfd,2025-03-28T13:16:07.570000
|
||||||
CVE-2024-12337,0,0,0ac824defe049d65b98a787c3f5b6e8a7c26d83f20e6b104dc20776aaa16a0de,2025-01-08T11:15:06.613000
|
CVE-2024-12337,0,0,0ac824defe049d65b98a787c3f5b6e8a7c26d83f20e6b104dc20776aaa16a0de,2025-01-08T11:15:06.613000
|
||||||
CVE-2024-12338,0,0,202a85d7d49dabb95d9680ff72787a60f1c4021e681feb9be8640c62beb774ef,2024-12-12T04:15:07.497000
|
CVE-2024-12338,0,0,202a85d7d49dabb95d9680ff72787a60f1c4021e681feb9be8640c62beb774ef,2024-12-12T04:15:07.497000
|
||||||
CVE-2024-12339,0,0,3eb83436990555e2815b093662c73c0abac18956e62294ddc11370b3651631b5,2025-02-19T08:15:13.907000
|
CVE-2024-12339,0,0,3eb83436990555e2815b093662c73c0abac18956e62294ddc11370b3651631b5,2025-02-19T08:15:13.907000
|
||||||
@ -248252,7 +248253,7 @@ CVE-2024-13842,0,0,e27bb87d0390ea96b584ec0f6fbe747157fb2de816ea15a1791b354e66567
|
|||||||
CVE-2024-13843,0,0,7b075d61798f8069984290c52e4033a7424dc56423296944d32554dce61a6d7f,2025-02-20T15:55:03.547000
|
CVE-2024-13843,0,0,7b075d61798f8069984290c52e4033a7424dc56423296944d32554dce61a6d7f,2025-02-20T15:55:03.547000
|
||||||
CVE-2024-13844,0,0,df23a30d386c8f5781c2dae0c047c9a36c6ad162f944596bb205e62e61aafc42,2025-03-13T13:10:31.303000
|
CVE-2024-13844,0,0,df23a30d386c8f5781c2dae0c047c9a36c6ad162f944596bb205e62e61aafc42,2025-03-13T13:10:31.303000
|
||||||
CVE-2024-13846,0,0,bc15bbce097a905951a0b88c5b6aded5de0269f145c99c529b730210812bf05d,2025-02-25T03:27:13.767000
|
CVE-2024-13846,0,0,bc15bbce097a905951a0b88c5b6aded5de0269f145c99c529b730210812bf05d,2025-02-25T03:27:13.767000
|
||||||
CVE-2024-13847,0,1,7374deac36adec445bd3a6895bad5f61cf78eb6111cd9143014657300e12cfeb,2025-03-28T12:50:32.090000
|
CVE-2024-13847,0,0,7374deac36adec445bd3a6895bad5f61cf78eb6111cd9143014657300e12cfeb,2025-03-28T12:50:32.090000
|
||||||
CVE-2024-13848,0,0,5623c6bf6e4d11fedf071f2d8a6a41f683ea08f022ec414f86d8eab78ceadbd1,2025-02-21T15:51:59.213000
|
CVE-2024-13848,0,0,5623c6bf6e4d11fedf071f2d8a6a41f683ea08f022ec414f86d8eab78ceadbd1,2025-02-21T15:51:59.213000
|
||||||
CVE-2024-13849,0,0,ff236b733a56083f87d9fda1374c64bc737bce2f85ab541b6c51d8f632de7db5,2025-02-25T20:58:18.983000
|
CVE-2024-13849,0,0,ff236b733a56083f87d9fda1374c64bc737bce2f85ab541b6c51d8f632de7db5,2025-02-25T20:58:18.983000
|
||||||
CVE-2024-1385,0,0,123d772d2fc5a1002531080710a3a85de4715677f769e2db13af2736e10a6c92,2024-11-21T08:50:27.933000
|
CVE-2024-1385,0,0,123d772d2fc5a1002531080710a3a85de4715677f769e2db13af2736e10a6c92,2024-11-21T08:50:27.933000
|
||||||
@ -254944,8 +254945,8 @@ CVE-2024-27532,0,0,9f0aec5ca15522830fc73ae5aa06182b31976dd61b4748273dd5b79432618
|
|||||||
CVE-2024-27536,0,0,c377b0d21fbb5c7de68c4946896ec2f8ec67ef0d39bad02515cbb41c44d1bebd,2024-04-23T22:15:07.037000
|
CVE-2024-27536,0,0,c377b0d21fbb5c7de68c4946896ec2f8ec67ef0d39bad02515cbb41c44d1bebd,2024-04-23T22:15:07.037000
|
||||||
CVE-2024-27537,0,0,3cbe9bcef09fe4fba870050d9e0c130363a525b398fa9371487301911d20249d,2024-04-23T22:15:07.087000
|
CVE-2024-27537,0,0,3cbe9bcef09fe4fba870050d9e0c130363a525b398fa9371487301911d20249d,2024-04-23T22:15:07.087000
|
||||||
CVE-2024-2754,0,0,3c146feabec526a8d57153969ca10ec7861e0891282d7465bc0903e40372f4e2,2025-02-18T16:56:54.550000
|
CVE-2024-2754,0,0,3c146feabec526a8d57153969ca10ec7861e0891282d7465bc0903e40372f4e2,2025-02-18T16:56:54.550000
|
||||||
CVE-2024-27558,0,0,29db5a13608bb797a92629c9ce33c296f606c134c5e4938eb8a0ccaf5895c0db,2024-11-21T09:04:44.013000
|
CVE-2024-27558,0,1,5761ec9fdce6ef2e5e63b6775d933b83bee2438c99df0ca7e9c1f4893296dc22,2025-03-28T14:09:20.343000
|
||||||
CVE-2024-27559,0,0,71c1073ce70c0a5981360edceff2e9e6fee7537870ee9d7f5743c89a522a485f,2024-11-21T09:04:44.220000
|
CVE-2024-27559,0,1,ae8f360ea3bfb9b14662fbb3b1eacc93b9bb3567ce84bd5abdf4e632b00e9db4,2025-03-28T14:26:01.253000
|
||||||
CVE-2024-2756,0,0,a5e32d8741cc26d296895613cf08c20905d9f2aa36e0d7124d341861eb8226fa,2025-02-13T18:17:57.060000
|
CVE-2024-2756,0,0,a5e32d8741cc26d296895613cf08c20905d9f2aa36e0d7124d341861eb8226fa,2025-02-13T18:17:57.060000
|
||||||
CVE-2024-27561,0,0,fc16f92d17651bc7c1c4e9050d562b06f5135d4a3f335b425cd240bae1399bcf,2025-01-21T15:08:34.140000
|
CVE-2024-27561,0,0,fc16f92d17651bc7c1c4e9050d562b06f5135d4a3f335b425cd240bae1399bcf,2025-01-21T15:08:34.140000
|
||||||
CVE-2024-27563,0,0,5533c243cccd53d02317f51d488d5c114a766a4a03a83659e29f733a18ae8237,2025-01-21T15:08:45.213000
|
CVE-2024-27563,0,0,5533c243cccd53d02317f51d488d5c114a766a4a03a83659e29f733a18ae8237,2025-01-21T15:08:45.213000
|
||||||
@ -255006,7 +255007,7 @@ CVE-2024-2768,0,0,73606e2fcaa404aa5195b229503329bf796940cee0d4ef224671a9d1016ab4
|
|||||||
CVE-2024-27680,0,0,045ae7f21a76d8b5dcbb31c4b83eae90c185f080a0865122dfcb71911a8e3350,2025-03-26T11:41:33.737000
|
CVE-2024-27680,0,0,045ae7f21a76d8b5dcbb31c4b83eae90c185f080a0865122dfcb71911a8e3350,2025-03-26T11:41:33.737000
|
||||||
CVE-2024-27683,0,0,e240f9a72cf4b7568ca46ea6bb64ddcf3a6ec5aa03a9416b260ae22da9008b86,2024-11-21T09:04:53.367000
|
CVE-2024-27683,0,0,e240f9a72cf4b7568ca46ea6bb64ddcf3a6ec5aa03a9416b260ae22da9008b86,2024-11-21T09:04:53.367000
|
||||||
CVE-2024-27684,0,0,8f9956a4a0b43c906740d1106a32a742a9fcef0903170255a4a05b3de7b55181,2024-11-21T09:04:53.583000
|
CVE-2024-27684,0,0,8f9956a4a0b43c906740d1106a32a742a9fcef0903170255a4a05b3de7b55181,2024-11-21T09:04:53.583000
|
||||||
CVE-2024-27689,0,0,b8125c9204d9b7912d4a758cf2a362c6f50eefc46a69eade4a7f53332972070e,2024-11-21T09:04:53.813000
|
CVE-2024-27689,0,1,8a82051a1b625705a6ee303980dd7e966cd157a680599291139b4a2e7a1c6fba,2025-03-28T14:25:42.963000
|
||||||
CVE-2024-2769,0,0,f5fed59b7bca296011d1da69594ac44436bea25a4aa43870a75a391217b8bea1,2025-02-21T17:14:54.783000
|
CVE-2024-2769,0,0,f5fed59b7bca296011d1da69594ac44436bea25a4aa43870a75a391217b8bea1,2025-02-21T17:14:54.783000
|
||||||
CVE-2024-27692,0,0,482b2ba8b1ff0d0cb0360c392cb51ab93e1109f90456f6b1fac8e0ba94bfdc36,2024-03-01T17:15:07.617000
|
CVE-2024-27692,0,0,482b2ba8b1ff0d0cb0360c392cb51ab93e1109f90456f6b1fac8e0ba94bfdc36,2024-03-01T17:15:07.617000
|
||||||
CVE-2024-27694,0,0,65be1510c627f1b7ae975b30c061f7f32000663aae7cc739ce3905e521a11919,2024-11-21T09:04:54.060000
|
CVE-2024-27694,0,0,65be1510c627f1b7ae975b30c061f7f32000663aae7cc739ce3905e521a11919,2024-11-21T09:04:54.060000
|
||||||
@ -255036,10 +255037,10 @@ CVE-2024-27731,0,0,0d3ba0916b089cf85ebb0d7f3b887a2201a141773d2892b38832e38a6bc4a
|
|||||||
CVE-2024-27733,0,0,539349bc579d8094317996ab3ddf62f89037e0f53da0557ec04eca7f3ed5858f,2024-11-21T09:04:58.253000
|
CVE-2024-27733,0,0,539349bc579d8094317996ab3ddf62f89037e0f53da0557ec04eca7f3ed5858f,2024-11-21T09:04:58.253000
|
||||||
CVE-2024-27734,0,0,5520fe6516adbd7c3f921cf16d2643163c02ae324582977bf7301b0b4ba5b2bc,2024-11-21T09:04:58.490000
|
CVE-2024-27734,0,0,5520fe6516adbd7c3f921cf16d2643163c02ae324582977bf7301b0b4ba5b2bc,2024-11-21T09:04:58.490000
|
||||||
CVE-2024-2774,0,0,0c25920b57d442dd5a233b579cf27e95446a07cdad8c6e0e7b03eb2c3014b13c,2025-02-21T17:49:07.243000
|
CVE-2024-2774,0,0,0c25920b57d442dd5a233b579cf27e95446a07cdad8c6e0e7b03eb2c3014b13c,2025-02-21T17:49:07.243000
|
||||||
CVE-2024-27743,0,0,0540c412bdea80c8596cda3a58c6fc461f8217735346b7c84cfb5c47eeb10d9e,2025-03-24T18:15:19.060000
|
CVE-2024-27743,0,1,cd7c0a0ce5fe4f27e3ad8aff189ec43ab8a8aa92d1fa4e983c682c35b1e638a4,2025-03-28T14:34:38.150000
|
||||||
CVE-2024-27744,0,0,d87bcdd72cf7cf7c0ffdb2aaccde30128c133219c9b50f003c292157283c3c73,2024-11-21T09:04:58.937000
|
CVE-2024-27744,0,1,d280c6a50d1acc2279803f87f5fd590eca421c9059b05f8d5d568ff9b17bc89a,2025-03-28T14:34:30.930000
|
||||||
CVE-2024-27746,0,0,cccbd29f894f9698774bcae5e4bc2377fa7c94e3f6464de4b19ea803ef2d352b,2024-11-21T09:04:59.170000
|
CVE-2024-27746,0,1,b585be55013faaaa137868651d1760039a51ba5162ac0d5a3114230e67117775,2025-03-28T14:34:25.407000
|
||||||
CVE-2024-27747,0,0,730bf8bc21e4bbd04a9fa6e13239843c2634744b55e747c9304ef4f250570fce,2024-11-21T09:04:59.400000
|
CVE-2024-27747,0,1,6f1ddae8b249acf53b9166e440726ecfc1ce36472977a70dc04ccd917691be1b,2025-03-28T14:34:16.973000
|
||||||
CVE-2024-2775,0,0,c7ffaeb0461f05cca21e646af6acc77ea3eef3d3454b74ba7b43a7ce629618f8,2025-02-20T18:29:08.757000
|
CVE-2024-2775,0,0,c7ffaeb0461f05cca21e646af6acc77ea3eef3d3454b74ba7b43a7ce629618f8,2025-02-20T18:29:08.757000
|
||||||
CVE-2024-27752,0,0,51f44ea4d791b236f1be7a96290ec94dc23c429a938add370ee6be6fe01f7126,2024-11-21T09:04:59.627000
|
CVE-2024-27752,0,0,51f44ea4d791b236f1be7a96290ec94dc23c429a938add370ee6be6fe01f7126,2024-11-21T09:04:59.627000
|
||||||
CVE-2024-27756,0,0,e93ad2fc2a071bfb70f8b4c256623e40cfa1d2e82cb7ead180eb27a2cd889aaf,2024-11-21T09:04:59.863000
|
CVE-2024-27756,0,0,e93ad2fc2a071bfb70f8b4c256623e40cfa1d2e82cb7ead180eb27a2cd889aaf,2024-11-21T09:04:59.863000
|
||||||
@ -255639,31 +255640,31 @@ CVE-2024-28558,0,0,24ed2b1cfce4e96fcbcee4e64a040e4cf59f931fa5753e4720f142851ea0c
|
|||||||
CVE-2024-28559,0,0,c52a4d432129d055b2df7a1847c5e2e7d5e5af30e6b89cf04e75ceb459f01023,2024-11-21T09:06:31.393000
|
CVE-2024-28559,0,0,c52a4d432129d055b2df7a1847c5e2e7d5e5af30e6b89cf04e75ceb459f01023,2024-11-21T09:06:31.393000
|
||||||
CVE-2024-2856,0,0,343ae9af072612aedcf7acc8762d75b718c23a8bab91fa487ec947fe2044f289,2024-11-21T09:10:41.460000
|
CVE-2024-2856,0,0,343ae9af072612aedcf7acc8762d75b718c23a8bab91fa487ec947fe2044f289,2024-11-21T09:10:41.460000
|
||||||
CVE-2024-28560,0,0,bb940286b1ac2c7041e7fd9a499645864d82efca5b646de14d7cabba2bdacf62,2024-11-21T09:06:31.887000
|
CVE-2024-28560,0,0,bb940286b1ac2c7041e7fd9a499645864d82efca5b646de14d7cabba2bdacf62,2024-11-21T09:06:31.887000
|
||||||
CVE-2024-28562,0,0,c23ec7d823a2a23e2493c2b6a806d90969d2ecfa7e74ea1bf53aa21020a44d03,2024-11-21T09:06:32.213000
|
CVE-2024-28562,0,1,546f9e95f1ac7221637a3c37ac915ba60e52c8426360cde1cf4cc63831388938,2025-03-28T14:44:56.623000
|
||||||
CVE-2024-28563,0,0,9d20a62f27af2278ecc98d77f5752e3b254c56fa684c78e9f54bb2334840b7c3,2024-11-21T09:06:32.600000
|
CVE-2024-28563,0,1,822cdb8b0e5e61e29acef8fcea7528fc6793f08518f6f570a4af369999fc5e2b,2025-03-28T14:52:00.437000
|
||||||
CVE-2024-28564,0,0,a8ef29c6a90869a6dfc5492ac9b9ac5f45e11589d92c3c49160e3eb562887c0a,2024-11-21T09:06:32.927000
|
CVE-2024-28564,0,1,edb16379ed48243b327497243e538094e4fe994646ba0dedf46e13be97bb55f2,2025-03-28T14:51:57.007000
|
||||||
CVE-2024-28565,0,0,5a6ceee2d5138821eecccd0d3bd97028a77e63b602fbf1848ccb99b554d0096c,2024-12-04T21:15:23.083000
|
CVE-2024-28565,0,1,618b66620abb3c0bb79b06e8932dfaaac3a3b1cac10f5266e1bbed23527a9220,2025-03-28T14:51:53.900000
|
||||||
CVE-2024-28566,0,0,c4cb53a722870a1e466972d057623fe51132fbd1f271e535243e850dfdacf7cb,2024-11-21T09:06:34.113000
|
CVE-2024-28566,0,1,81ac8320f758b1290567ab5bbff6732548d5cbd00ed4018aa55d9406326b287b,2025-03-28T14:51:49.903000
|
||||||
CVE-2024-28567,0,0,2233c8d561911bbfcae8b480b60c96357013bfcfd626417e55d935d27a853308,2024-11-21T09:06:34.490000
|
CVE-2024-28567,0,1,30291626499bb9e642bdbcddcc7d995098d34c83a7fdbb9365bc256dab3d9e35,2025-03-28T14:49:08.173000
|
||||||
CVE-2024-28568,0,0,b6239db453737ce12112565e6329ee4005b4bde8803bac4e3f3aeac673f44c68,2024-11-21T09:06:34.790000
|
CVE-2024-28568,0,1,5dcf253cce1d2e0ec342a381869dbadcf4885f82a3c38c89389ff9298b986b10,2025-03-28T14:49:04.690000
|
||||||
CVE-2024-28569,0,0,e18c17dc7c140f78b0c49e6b86f735b0249b9ad9ad5fd08bb7943d60924aafdf,2024-11-21T09:06:35.107000
|
CVE-2024-28569,0,1,89f94c291c3764568419aeba0eea5234bfeda10e1719928f6e04eda112f29a96,2025-03-28T14:49:01.337000
|
||||||
CVE-2024-2857,0,0,6295ecc20584366c794ee0ccb42f15320623f61e630cf97810cfc422fe1c34d8,2024-11-21T09:10:41.607000
|
CVE-2024-2857,0,0,6295ecc20584366c794ee0ccb42f15320623f61e630cf97810cfc422fe1c34d8,2024-11-21T09:10:41.607000
|
||||||
CVE-2024-28570,0,0,cd43c950e92d5fb85fda8d55d430af60c3766505129358221264cfe21f7d1579,2024-11-21T09:06:35.440000
|
CVE-2024-28570,0,1,ad2785ae9617051620d5840e06eafe4ff9dfef47c56d434ee1acd01fb2e620e8,2025-03-28T14:48:56.937000
|
||||||
CVE-2024-28571,0,0,77821d61ceb1300ed2b24e5619fbf76f2fcecc8669ad3a2082e5ad2bc7ba64af,2024-11-21T09:06:35.760000
|
CVE-2024-28571,0,1,40b1f850be2810c82e5fb19cd21bcf0a3e3ac534513afaedf079c7e24a03f718,2025-03-28T14:48:54.140000
|
||||||
CVE-2024-28572,0,0,3bb27a3adeafd1fb4ed083baafbdea4ecb9669cd8370041f5067e336474f9469,2024-11-21T09:06:36.090000
|
CVE-2024-28572,0,1,04fc282e4b7f64248bc2cb60eff2823593936b427825c6a62dff9231c9ea838e,2025-03-28T14:48:51.143000
|
||||||
CVE-2024-28573,0,0,92a1aa05a0925f8e0d13ea69c87ea3f5c0a150b14964c861265af5650677d388,2024-11-21T09:06:37.043000
|
CVE-2024-28573,0,1,f48b33ec35392a77c74384a73dbb40982da7413ac85987a6ae26244b20fcb870,2025-03-28T14:48:47.437000
|
||||||
CVE-2024-28574,0,0,61a0b950619f652f02e3676284c06d6b9e691dcc0a7ff3c3f5fd34459e372949,2024-11-21T09:06:37.343000
|
CVE-2024-28574,0,1,e24221c7f9c0dc767f1a4af68f67dac8b863bc93b77a4d3fc34c5f9e8dd5eb3a,2025-03-28T14:48:43.373000
|
||||||
CVE-2024-28575,0,0,3dc2726b4ac33cf5f9bbc002474d5e874eac209d915b34a448166c2b93ece6cd,2024-11-21T09:06:37.643000
|
CVE-2024-28575,0,1,6d698b31f6a8ee56112b639023cf9679319442f063850d57ad76a28d58acd6a3,2025-03-28T14:48:40.390000
|
||||||
CVE-2024-28576,0,0,185448f5a53bd09b9a8344f16402235ff6ababf796fba0b80a7c9822ec33996f,2024-11-21T09:06:37.980000
|
CVE-2024-28576,0,1,0351857f9663fe04411fd141642711a40532f1c9ea1f0c9c81917feb5c58bf9d,2025-03-28T14:48:37.483000
|
||||||
CVE-2024-28577,0,0,49a541d4928b94265658ace3c346e57f6b187582c36ad32ce075967892160e48,2024-11-21T09:06:38.280000
|
CVE-2024-28577,0,1,a7cb6c7ed03f3487ca50cdc6503815f6723fe0131c0bbe949ef36ec326df72a7,2025-03-28T14:48:33.360000
|
||||||
CVE-2024-28578,0,0,81b54243ee9a5cd52843af67b64a0053311cb00bf594a5f9ffe53c9e3612ebb4,2024-11-21T09:06:38.590000
|
CVE-2024-28578,0,1,cf270d69ca34a93783a0b985174a8c47f840b263a63da4a88622d3d39feb79cb,2025-03-28T14:48:28.610000
|
||||||
CVE-2024-28579,0,0,8a00dc64b0e12a997407db93510392e7be4a1411310af762d68a642a06dde63e,2024-11-21T09:06:38.930000
|
CVE-2024-28579,0,1,7a9c0efba9c8a73c1ffa4bd3ee26fdfe2e3e640138bbe9e85ad9a2ceb4968d3a,2025-03-28T14:48:24.560000
|
||||||
CVE-2024-2858,0,0,1b76ee215a17131c0be72ed024c7b73b1e03349dc8f6072a53a0e1699d6fdc20,2024-11-21T09:10:41.807000
|
CVE-2024-2858,0,0,1b76ee215a17131c0be72ed024c7b73b1e03349dc8f6072a53a0e1699d6fdc20,2024-11-21T09:10:41.807000
|
||||||
CVE-2024-28580,0,0,21016dfa398d7ab18a333730814af582263ab196c0f628886bb2dd18ec9f99ec,2024-11-21T09:06:39.213000
|
CVE-2024-28580,0,1,0c82968f6366c553f74f7c6ec07a86559c4777b7d5e30537a1d20c17d787afcb,2025-03-28T14:48:19.057000
|
||||||
CVE-2024-28581,0,0,ad58e0c381e7b5558a330d002f43ec5a22ea846a59a430c220c528f9a9a974ec,2024-11-21T09:06:39.493000
|
CVE-2024-28581,0,1,191b8c9324750f099e546daee36bcabaa27fb826baee53f51e3285fbb77b43a2,2025-03-28T14:48:15.920000
|
||||||
CVE-2024-28582,0,0,04799e93ceccd9cc4b3d5e6db53e76424895199be69cbe96cfb9fe2b3cd39628,2024-11-21T09:06:39.790000
|
CVE-2024-28582,0,1,6e69e62a685361851f0997bc47167c320b84ea905c873f3b4702a12de5a6a826,2025-03-28T14:48:12.423000
|
||||||
CVE-2024-28583,0,0,dd3c0b8d8072bd6a8dcd0e860b02c395eb40124b9c8f43138e219d628568beb0,2024-11-21T09:06:40.073000
|
CVE-2024-28583,0,1,871d5e7614a91d5aa7be768444e4b1a611dd29c5c2e4535b36fd330788bc9c11,2025-03-28T14:48:08.290000
|
||||||
CVE-2024-28584,0,0,48b2b30bfacc95821daf411318d5a1df0132f3fefe454b07829432d1245ec198,2024-11-21T09:06:40.357000
|
CVE-2024-28584,0,1,280815d56b9906ce1763261fe7a802bfeefc69e503ae39d7d5e342479901b86d,2025-03-28T14:47:52.610000
|
||||||
CVE-2024-28589,0,0,1bfa399e8667380e57d79d60e7e8112d34b500470544fbd640b99eb387afba8c,2024-11-21T09:06:40.680000
|
CVE-2024-28589,0,0,1bfa399e8667380e57d79d60e7e8112d34b500470544fbd640b99eb387afba8c,2024-11-21T09:06:40.680000
|
||||||
CVE-2024-2859,0,0,caa75afab36dcf492b03d579a92cc4d5b32496de16e8a53f8ac97b57d5699ab1,2025-03-19T19:15:40.793000
|
CVE-2024-2859,0,0,caa75afab36dcf492b03d579a92cc4d5b32496de16e8a53f8ac97b57d5699ab1,2025-03-19T19:15:40.793000
|
||||||
CVE-2024-28593,0,0,1a079ea18745517fd72417a437989c95fe391bb286fe69494ae3e8d32ae13d70,2024-11-21T09:06:40.980000
|
CVE-2024-28593,0,0,1a079ea18745517fd72417a437989c95fe391bb286fe69494ae3e8d32ae13d70,2024-11-21T09:06:40.980000
|
||||||
@ -267884,7 +267885,7 @@ CVE-2024-44270,0,0,51d4b52a115ad2f279bed3a378d4fb4fa92b6583bd4c55801137fe6a87bcf
|
|||||||
CVE-2024-44273,0,0,caae658c20ea929becd6a50f15cc5040f32d55f5bf0889d84daca4b410aa6c36,2024-12-09T15:15:16.147000
|
CVE-2024-44273,0,0,caae658c20ea929becd6a50f15cc5040f32d55f5bf0889d84daca4b410aa6c36,2024-12-09T15:15:16.147000
|
||||||
CVE-2024-44274,0,0,d4611874fae8cf46b4ebeede4c74afb829adabc974787d5151107510971373f7,2024-10-30T21:35:09.203000
|
CVE-2024-44274,0,0,d4611874fae8cf46b4ebeede4c74afb829adabc974787d5151107510971373f7,2024-10-30T21:35:09.203000
|
||||||
CVE-2024-44275,0,0,ae4f014c6d01e8a3d13555cccb97f78d51a6a2d56fdb3201e11be9cbc301fbd5,2024-12-11T18:10:43.967000
|
CVE-2024-44275,0,0,ae4f014c6d01e8a3d13555cccb97f78d51a6a2d56fdb3201e11be9cbc301fbd5,2024-12-11T18:10:43.967000
|
||||||
CVE-2024-44276,0,0,853c05d3f4de752a5779d9ab38688aa26cee392bebe6566daa96ce87ff3947db,2025-03-21T17:15:38.070000
|
CVE-2024-44276,0,1,1cb833ffb18fa9f2e36eaf915a97fc850b9e1576b6bef756fa1155e91f6af5a1,2025-03-28T14:09:35.787000
|
||||||
CVE-2024-44277,0,0,416642d85105a1b053290a8297fa3dafbcfa733e6016ecf82fd3765564a269c3,2024-12-11T18:02:08.390000
|
CVE-2024-44277,0,0,416642d85105a1b053290a8297fa3dafbcfa733e6016ecf82fd3765564a269c3,2024-12-11T18:02:08.390000
|
||||||
CVE-2024-44278,0,0,92c8ffff1d26b209c14a014b695aae7202ba326c6d599f23f579cecea24b8f80,2024-12-11T17:56:28.003000
|
CVE-2024-44278,0,0,92c8ffff1d26b209c14a014b695aae7202ba326c6d599f23f579cecea24b8f80,2024-12-11T17:56:28.003000
|
||||||
CVE-2024-44279,0,0,812b461493404626705b5c366e9a37ba4b5cce2f8aa8a61ee91e148ba4ee6083,2024-12-11T17:46:27.933000
|
CVE-2024-44279,0,0,812b461493404626705b5c366e9a37ba4b5cce2f8aa8a61ee91e148ba4ee6083,2024-12-11T17:46:27.933000
|
||||||
@ -278653,6 +278654,7 @@ CVE-2024-7399,0,0,c63a2f56ac97180c8eeaff7425fc4e1891afb5117e5e5ee0a06426ef5c6cec
|
|||||||
CVE-2024-7400,0,0,b76f467bea873c8198d239fa89d885a8d397522f6f80ed1fa2b1862679c1bdd0,2024-09-30T12:46:20.237000
|
CVE-2024-7400,0,0,b76f467bea873c8198d239fa89d885a8d397522f6f80ed1fa2b1862679c1bdd0,2024-09-30T12:46:20.237000
|
||||||
CVE-2024-7401,0,0,0c1aa626bf1f013cd6efcf64cafc89bc58668305e616bb93bc951d283ad465e7,2024-09-05T18:34:17.433000
|
CVE-2024-7401,0,0,0c1aa626bf1f013cd6efcf64cafc89bc58668305e616bb93bc951d283ad465e7,2024-09-05T18:34:17.433000
|
||||||
CVE-2024-7404,0,0,6148e9ce6d58228af84e4655cbde2088c6036af50794e9b6097ba0e8b415003e,2024-12-12T21:48:13.673000
|
CVE-2024-7404,0,0,6148e9ce6d58228af84e4655cbde2088c6036af50794e9b6097ba0e8b415003e,2024-12-12T21:48:13.673000
|
||||||
|
CVE-2024-7407,1,1,d00d43dbbd913d662b499a9096f6a0c797a075c158935863f0d5c141726d1d39,2025-03-28T13:15:40.760000
|
||||||
CVE-2024-7408,0,0,941fb6d771fbc604d540f68018eab8ecb75ec650c1b66e874ba92cbbafa4a029,2024-08-13T16:06:08.213000
|
CVE-2024-7408,0,0,941fb6d771fbc604d540f68018eab8ecb75ec650c1b66e874ba92cbbafa4a029,2024-08-13T16:06:08.213000
|
||||||
CVE-2024-7409,0,0,745add50a7f9f83aeae3165fe582507d9b760d467cb9268750136f81de9a6463,2024-12-12T04:15:08.177000
|
CVE-2024-7409,0,0,745add50a7f9f83aeae3165fe582507d9b760d467cb9268750136f81de9a6463,2024-12-12T04:15:08.177000
|
||||||
CVE-2024-7410,0,0,3acc879284fb297363138787309c2aa9ff410cc3958418c08efd55e0119fa6e8,2024-08-12T13:41:36.517000
|
CVE-2024-7410,0,0,3acc879284fb297363138787309c2aa9ff410cc3958418c08efd55e0119fa6e8,2024-08-12T13:41:36.517000
|
||||||
@ -281085,8 +281087,8 @@ CVE-2025-0184,0,0,b184a63ccfba52aab27fef6691d340e1daddf4d99a47576e2d38909af97d37
|
|||||||
CVE-2025-0185,0,0,d75cbde56c2ad4e1d5ce5e009af1542f1e03f93240aef9022459166776d2c825,2025-03-27T19:18:14.417000
|
CVE-2025-0185,0,0,d75cbde56c2ad4e1d5ce5e009af1542f1e03f93240aef9022459166776d2c825,2025-03-27T19:18:14.417000
|
||||||
CVE-2025-0187,0,0,d12a337bc74d87519d5374b684a3dea7ffdd06cf77effdc0f40e0dc463609868,2025-03-20T10:15:51.413000
|
CVE-2025-0187,0,0,d12a337bc74d87519d5374b684a3dea7ffdd06cf77effdc0f40e0dc463609868,2025-03-20T10:15:51.413000
|
||||||
CVE-2025-0188,0,0,e9031ff53ffef21475c8aa9f8ab1c19b6522b51f136de0f15b15cb0b70e0e528,2025-03-20T10:15:51.533000
|
CVE-2025-0188,0,0,e9031ff53ffef21475c8aa9f8ab1c19b6522b51f136de0f15b15cb0b70e0e528,2025-03-20T10:15:51.533000
|
||||||
CVE-2025-0189,0,0,fca222ba5bcbefdec4f0f915caf83951aab0638cdf91dbb61c81c563a9c01f3f,2025-03-20T10:15:51.660000
|
CVE-2025-0189,0,1,eb102a6a48c92eda67c16e70908cbfabd41b03486056a8f701abee55cf0ab25b,2025-03-28T14:31:37.077000
|
||||||
CVE-2025-0190,0,0,87463b3557c4bc61fb931a39e3e245581aed7238b9b83b8060f262ebd2487c12,2025-03-20T10:15:51.780000
|
CVE-2025-0190,0,1,53e2908612bb73c2c24609187f041bdce849fd9fe447d49d2376c215d06f80fc,2025-03-28T14:28:25.273000
|
||||||
CVE-2025-0191,0,0,64c66c7c1427f64cc3892b0da850af5ec28804e7cd62aedbe5c560debd12fdd9,2025-03-20T10:15:51.907000
|
CVE-2025-0191,0,0,64c66c7c1427f64cc3892b0da850af5ec28804e7cd62aedbe5c560debd12fdd9,2025-03-20T10:15:51.907000
|
||||||
CVE-2025-0192,0,0,4efec9c1255ccd0a3d2bb956c84c31801bd3aa354ef28ec5fc9595ff9332bb67,2025-03-20T10:15:52.033000
|
CVE-2025-0192,0,0,4efec9c1255ccd0a3d2bb956c84c31801bd3aa354ef28ec5fc9595ff9332bb67,2025-03-20T10:15:52.033000
|
||||||
CVE-2025-0193,0,0,e17fc9e0ccd728e301ded30b14f7be42c74aa85aac5db475710fd304e3ff3102,2025-01-15T11:15:09.280000
|
CVE-2025-0193,0,0,e17fc9e0ccd728e301ded30b14f7be42c74aa85aac5db475710fd304e3ff3102,2025-01-15T11:15:09.280000
|
||||||
@ -281145,7 +281147,7 @@ CVE-2025-0254,0,0,c0b515e46d918691acf880cf7e48dd1484bbbda9200e70d05e0bbba9fd762e
|
|||||||
CVE-2025-0255,0,0,90e000215482e5d86d475fb05ccdd376d187c17524748e399eb015064435daf9,2025-03-27T16:45:46.410000
|
CVE-2025-0255,0,0,90e000215482e5d86d475fb05ccdd376d187c17524748e399eb015064435daf9,2025-03-27T16:45:46.410000
|
||||||
CVE-2025-0256,0,0,8d93191b3f6273482cd2e738a4c8458f1bcb7229ea685df9d486553726ab45e7,2025-03-27T16:45:46.410000
|
CVE-2025-0256,0,0,8d93191b3f6273482cd2e738a4c8458f1bcb7229ea685df9d486553726ab45e7,2025-03-27T16:45:46.410000
|
||||||
CVE-2025-0273,0,0,3150c7718d39b3b9c8949458a965540861c1e233ba5c78d9d601688f1cc14f07,2025-03-27T16:45:27.850000
|
CVE-2025-0273,0,0,3150c7718d39b3b9c8949458a965540861c1e233ba5c78d9d601688f1cc14f07,2025-03-27T16:45:27.850000
|
||||||
CVE-2025-0281,0,0,3eed2c9ac115be61f8948fe5ec86ee9cb61bbdd7dd3b065a4b62fe68aa7cd3a6,2025-03-20T10:15:52.153000
|
CVE-2025-0281,0,1,2f178337cc54bece29a62c185e27ac31b0fc9ea32855fcb9c996c42739c26e1a,2025-03-28T14:22:53.790000
|
||||||
CVE-2025-0282,0,0,0b79992968afdfd3dca90a89278588bc0fa8213f971654a2b0fa6c3c0b74907e,2025-03-17T19:24:45.253000
|
CVE-2025-0282,0,0,0b79992968afdfd3dca90a89278588bc0fa8213f971654a2b0fa6c3c0b74907e,2025-03-17T19:24:45.253000
|
||||||
CVE-2025-0283,0,0,170559952a9515dd5478b031ee87167014dac9ea49e5e0d222b13defbaf7dddd,2025-01-14T15:58:55.813000
|
CVE-2025-0283,0,0,170559952a9515dd5478b031ee87167014dac9ea49e5e0d222b13defbaf7dddd,2025-01-14T15:58:55.813000
|
||||||
CVE-2025-0285,0,0,fe226670f49530c985559403e3ad9db8f35b8f4315101eb15992a9624d3e9b83,2025-03-27T19:15:48.520000
|
CVE-2025-0285,0,0,fe226670f49530c985559403e3ad9db8f35b8f4315101eb15992a9624d3e9b83,2025-03-27T19:15:48.520000
|
||||||
@ -281170,7 +281172,7 @@ CVE-2025-0306,0,0,d624312a1c8b12756fc5d0bd3e740f6bb7afb0946b71499dfca32a0f9d8ebf
|
|||||||
CVE-2025-0307,0,0,4e3801b147f3e7e52232663dc15ea796a293389a992c3bbff51b0d288d5da39d,2025-02-07T18:15:28.337000
|
CVE-2025-0307,0,0,4e3801b147f3e7e52232663dc15ea796a293389a992c3bbff51b0d288d5da39d,2025-02-07T18:15:28.337000
|
||||||
CVE-2025-0308,0,0,69aa7199372cd49af22bdf53a6d4af3a3fe1a182a67295d9df7e0ede45a3d01c,2025-02-25T22:14:17.707000
|
CVE-2025-0308,0,0,69aa7199372cd49af22bdf53a6d4af3a3fe1a182a67295d9df7e0ede45a3d01c,2025-02-25T22:14:17.707000
|
||||||
CVE-2025-0311,0,0,366f4de7a1625931fb622647148fc1b4e4ac9da9319c64a1d46f443dbcb2d417,2025-01-16T21:29:36.977000
|
CVE-2025-0311,0,0,366f4de7a1625931fb622647148fc1b4e4ac9da9319c64a1d46f443dbcb2d417,2025-01-16T21:29:36.977000
|
||||||
CVE-2025-0312,0,0,1db620337b03173e2a129e5a59186b34821b78014a02642160c03623255c750e,2025-03-20T10:15:52.280000
|
CVE-2025-0312,0,1,a77dfe55b9b8e9fd0cba677d874c5e6e1fc87ea1c4a7421660dac4e10405e186,2025-03-28T14:11:12.457000
|
||||||
CVE-2025-0313,0,0,e04e59ca18724183fc504276fd01824f7c821656cc44b0d64bb8f617e07b8fd8,2025-03-20T16:15:14.923000
|
CVE-2025-0313,0,0,e04e59ca18724183fc504276fd01824f7c821656cc44b0d64bb8f617e07b8fd8,2025-03-20T16:15:14.923000
|
||||||
CVE-2025-0314,0,0,1d3079b899db5cea9ef18879fdd816101b3bdaab275230e6cdfc0e0479fa12ac,2025-01-24T03:15:07.320000
|
CVE-2025-0314,0,0,1d3079b899db5cea9ef18879fdd816101b3bdaab275230e6cdfc0e0479fa12ac,2025-01-24T03:15:07.320000
|
||||||
CVE-2025-0315,0,0,5d98fa6a770161856e42c23257da6b1a5bceff2066d6b0d41a72d94c75bb0350,2025-03-20T10:15:52.530000
|
CVE-2025-0315,0,0,5d98fa6a770161856e42c23257da6b1a5bceff2066d6b0d41a72d94c75bb0350,2025-03-20T10:15:52.530000
|
||||||
@ -281653,6 +281655,7 @@ CVE-2025-0975,0,0,66ea3569903c32b0f1028941b4e2b9b642924beee794715a495485e8fe53b5
|
|||||||
CVE-2025-0981,0,0,c89c9554a0a46e5bb181583fd08bedc64f240c126360b9216686d47b4afcea4a,2025-02-21T15:23:43.717000
|
CVE-2025-0981,0,0,c89c9554a0a46e5bb181583fd08bedc64f240c126360b9216686d47b4afcea4a,2025-02-21T15:23:43.717000
|
||||||
CVE-2025-0982,0,0,521fffa92ca7a4349f9839f1725ef4c0f2728323e40055a01784086e989d43e4,2025-02-06T12:15:27.267000
|
CVE-2025-0982,0,0,521fffa92ca7a4349f9839f1725ef4c0f2728323e40055a01784086e989d43e4,2025-02-06T12:15:27.267000
|
||||||
CVE-2025-0985,0,0,b7e69fe9aab5a8f8f386d8658128b018c3bd5d2957b0618e798c2f6db4110f39,2025-02-28T17:15:15.937000
|
CVE-2025-0985,0,0,b7e69fe9aab5a8f8f386d8658128b018c3bd5d2957b0618e798c2f6db4110f39,2025-02-28T17:15:15.937000
|
||||||
|
CVE-2025-0986,1,1,ed15f2edadbeabb249f8bae31b072a394f7d803c08951aaaa5c8a49022221b78,2025-03-28T14:15:19.357000
|
||||||
CVE-2025-0989,0,0,346e8aea80123cafe9a430449f66c84d4597763274e13e564f95baea22982f1f,2025-02-11T21:15:12.823000
|
CVE-2025-0989,0,0,346e8aea80123cafe9a430449f66c84d4597763274e13e564f95baea22982f1f,2025-02-11T21:15:12.823000
|
||||||
CVE-2025-0990,0,0,9b2eed3f7502ec84e40a9484b52b4383e088954c71b4d8a99cc5047d894e17c3,2025-03-05T09:15:09.947000
|
CVE-2025-0990,0,0,9b2eed3f7502ec84e40a9484b52b4383e088954c71b4d8a99cc5047d894e17c3,2025-03-05T09:15:09.947000
|
||||||
CVE-2025-0994,0,0,eda51bab1788ff49d0428b581e74a138c45a84d2ffb837b73d45b8cc098d090f,2025-02-12T19:29:30.383000
|
CVE-2025-0994,0,0,eda51bab1788ff49d0428b581e74a138c45a84d2ffb837b73d45b8cc098d090f,2025-02-12T19:29:30.383000
|
||||||
@ -282094,13 +282097,13 @@ CVE-2025-1649,0,0,3b5fbb2e4731dcc40a7a4ed88d2c8a60211ff1f5cbe5c969993021f107517e
|
|||||||
CVE-2025-1650,0,0,4218c32cbb82256e1ff0a9ceabf09dcbbee0c890d930e1b88a57eb073009cf05,2025-03-13T17:15:35.990000
|
CVE-2025-1650,0,0,4218c32cbb82256e1ff0a9ceabf09dcbbee0c890d930e1b88a57eb073009cf05,2025-03-13T17:15:35.990000
|
||||||
CVE-2025-1651,0,0,dc02b23df4eb433cfaae6381155dd744e0ca82e8901f8e7d30555b36cffdf17c,2025-03-13T17:15:36.153000
|
CVE-2025-1651,0,0,dc02b23df4eb433cfaae6381155dd744e0ca82e8901f8e7d30555b36cffdf17c,2025-03-13T17:15:36.153000
|
||||||
CVE-2025-1652,0,0,40ae07eb9aa50c5b6645abc9188293b11d3a3751f84fa68087927a34dfc8a3ac,2025-03-13T17:15:36.297000
|
CVE-2025-1652,0,0,40ae07eb9aa50c5b6645abc9188293b11d3a3751f84fa68087927a34dfc8a3ac,2025-03-13T17:15:36.297000
|
||||||
CVE-2025-1653,0,0,45c5b5763cb35873214a415caf0c192b98443eb35cd3acdbf4f60c0bf83ce0e5,2025-03-15T03:15:34.457000
|
CVE-2025-1653,0,1,81399ad7d0a3dd190eaf3e76c57ec1bd3ec75f06763142e168c62e4df94036c7,2025-03-28T13:17:33.270000
|
||||||
CVE-2025-1657,0,1,00b8c4fa900fcbf8fcc8352570319a690900e4acdb978bf02695203588721ccc,2025-03-28T12:59:00.413000
|
CVE-2025-1657,0,0,00b8c4fa900fcbf8fcc8352570319a690900e4acdb978bf02695203588721ccc,2025-03-28T12:59:00.413000
|
||||||
CVE-2025-1661,0,0,fc56e5229eb6ac1a864e12ea87f6baac0d11f126c1fe50c79da09acd396fb73c,2025-03-19T20:48:03.360000
|
CVE-2025-1661,0,0,fc56e5229eb6ac1a864e12ea87f6baac0d11f126c1fe50c79da09acd396fb73c,2025-03-19T20:48:03.360000
|
||||||
CVE-2025-1662,0,0,0b069e39d7b9c2cac3bb89ddd5f385bc750d1df17050dae193b4f39dcff51d62,2025-03-06T15:30:52.347000
|
CVE-2025-1662,0,0,0b069e39d7b9c2cac3bb89ddd5f385bc750d1df17050dae193b4f39dcff51d62,2025-03-06T15:30:52.347000
|
||||||
CVE-2025-1664,0,0,2ddafd8220da97f286feaff6915cac1d1018546efd24c59b88969afcb5318c21,2025-03-11T21:25:56.700000
|
CVE-2025-1664,0,0,2ddafd8220da97f286feaff6915cac1d1018546efd24c59b88969afcb5318c21,2025-03-11T21:25:56.700000
|
||||||
CVE-2025-1666,0,0,578bd41069680734171dab8b0d965c7a5d9feef84ecb4800477ec06c1e88653d,2025-03-06T12:15:36.117000
|
CVE-2025-1666,0,0,578bd41069680734171dab8b0d965c7a5d9feef84ecb4800477ec06c1e88653d,2025-03-06T12:15:36.117000
|
||||||
CVE-2025-1667,0,1,0a7578ad0c7de4d6aeb33733f4906f5ca6d53d4d71b45718607596d6bed0ce27,2025-03-28T12:46:27.840000
|
CVE-2025-1667,0,0,0a7578ad0c7de4d6aeb33733f4906f5ca6d53d4d71b45718607596d6bed0ce27,2025-03-28T12:46:27.840000
|
||||||
CVE-2025-1668,0,0,fb6fe17ba902179b9f864e7701447d584a85a08da3f165d7c1b4a87eba49d58c,2025-03-15T04:15:21.457000
|
CVE-2025-1668,0,0,fb6fe17ba902179b9f864e7701447d584a85a08da3f165d7c1b4a87eba49d58c,2025-03-15T04:15:21.457000
|
||||||
CVE-2025-1669,0,0,bb0ba6e29c17865aece93ca88373c70e2636476bd67e8ad6897876d52b0f2fbe,2025-03-15T04:15:21.630000
|
CVE-2025-1669,0,0,bb0ba6e29c17865aece93ca88373c70e2636476bd67e8ad6897876d52b0f2fbe,2025-03-15T04:15:21.630000
|
||||||
CVE-2025-1670,0,0,34f6432a2c4ff486a01a5492943cf82db27fc67975886281ea3f8042dbb52fed,2025-03-15T04:15:21.810000
|
CVE-2025-1670,0,0,34f6432a2c4ff486a01a5492943cf82db27fc67975886281ea3f8042dbb52fed,2025-03-15T04:15:21.810000
|
||||||
@ -282162,6 +282165,7 @@ CVE-2025-1773,0,0,8ec8dbded090ba64a07cfd6b14e86950d4c62160e124de793edae4c60a6f92
|
|||||||
CVE-2025-1774,0,0,b7bc9b6d14117ea41567dc2b1ec0413a34cc48ebc3a8f058e66c949851cae578,2025-03-17T15:15:43.523000
|
CVE-2025-1774,0,0,b7bc9b6d14117ea41567dc2b1ec0413a34cc48ebc3a8f058e66c949851cae578,2025-03-17T15:15:43.523000
|
||||||
CVE-2025-1776,0,0,9f5910c7138c13ec1de71b228a6c2b4d183ead70b893aab7547c66452e55fc54,2025-02-28T14:15:35.943000
|
CVE-2025-1776,0,0,9f5910c7138c13ec1de71b228a6c2b4d183ead70b893aab7547c66452e55fc54,2025-02-28T14:15:35.943000
|
||||||
CVE-2025-1780,0,0,3f45bedc6155c2b8b2fa77d1259dea132c1de7996dc227477ece460ea93a3593,2025-03-01T04:15:09.713000
|
CVE-2025-1780,0,0,3f45bedc6155c2b8b2fa77d1259dea132c1de7996dc227477ece460ea93a3593,2025-03-01T04:15:09.713000
|
||||||
|
CVE-2025-1781,1,1,9110731c3988f380d19d25549f49f14dcac832bed7aa92d5e3ee29cdbb0c344e,2025-03-28T14:15:19.687000
|
||||||
CVE-2025-1783,0,0,abaa00c601bee956b3371bfcaaba76ce7a717f99aa4b7c3f09c9ab4a67269a90,2025-03-24T18:10:03.760000
|
CVE-2025-1783,0,0,abaa00c601bee956b3371bfcaaba76ce7a717f99aa4b7c3f09c9ab4a67269a90,2025-03-24T18:10:03.760000
|
||||||
CVE-2025-1784,0,0,c2e88433e5f4fd53c57a5f2e70483cc7b56c5c77ed5450625dda142b6e60f89a,2025-03-27T16:45:46.410000
|
CVE-2025-1784,0,0,c2e88433e5f4fd53c57a5f2e70483cc7b56c5c77ed5450625dda142b6e60f89a,2025-03-27T16:45:46.410000
|
||||||
CVE-2025-1785,0,0,1f076f0c9f192b8e8f14d346f2656e13d4fb6e02482d8046f76354a15aebf16f,2025-03-13T08:15:10.950000
|
CVE-2025-1785,0,0,1f076f0c9f192b8e8f14d346f2656e13d4fb6e02482d8046f76354a15aebf16f,2025-03-13T08:15:10.950000
|
||||||
@ -282361,8 +282365,8 @@ CVE-2025-20118,0,0,46ee44de51b9da02bd8d432dfa199efdea3d4009128ccc31daf3be958d7ba
|
|||||||
CVE-2025-20119,0,0,966174a4c9d991ad6b83e65d9f7d13b4b14250c9460c971b03cac87408097d39,2025-02-26T18:15:14.570000
|
CVE-2025-20119,0,0,966174a4c9d991ad6b83e65d9f7d13b4b14250c9460c971b03cac87408097d39,2025-02-26T18:15:14.570000
|
||||||
CVE-2025-2012,0,0,0b8d8afd00eda96ec005af8edf0d7d04b1fb0ed2ed11512934641682f43663d5,2025-03-11T21:15:52.333000
|
CVE-2025-2012,0,0,0b8d8afd00eda96ec005af8edf0d7d04b1fb0ed2ed11512934641682f43663d5,2025-03-11T21:15:52.333000
|
||||||
CVE-2025-20123,0,0,de0e2ee9204f4a04ceea1910b99fa9c19c34866a6ef4e69299265f979ffad510,2025-01-08T16:15:38.150000
|
CVE-2025-20123,0,0,de0e2ee9204f4a04ceea1910b99fa9c19c34866a6ef4e69299265f979ffad510,2025-01-08T16:15:38.150000
|
||||||
CVE-2025-20124,0,0,a552df7c1491927fb804e7dc9b9a36b3c2e8600d44023d2c0543cde9f617a5df,2025-02-05T17:15:22.457000
|
CVE-2025-20124,0,1,6db356d2fcd38b26aa3e47d7a0ec82ed7c18925211d51966c9b8a29c55acd1c9,2025-03-28T13:22:42.077000
|
||||||
CVE-2025-20125,0,0,4979feeb29abd7ebb200e1d60ab3dfc583af50ced839733628565f6d68c7724f,2025-02-05T17:15:22.610000
|
CVE-2025-20125,0,1,d061ff1519e48d95901944b45526454224b9d67046eae5a72bdd0b7b8937d87d,2025-03-28T13:37:16.650000
|
||||||
CVE-2025-20126,0,0,3777d2eff476c85da5fc4cb45d8938a798421c8f7fbe1d8cce16b92ec7e53c3f,2025-01-08T19:15:38.553000
|
CVE-2025-20126,0,0,3777d2eff476c85da5fc4cb45d8938a798421c8f7fbe1d8cce16b92ec7e53c3f,2025-01-08T19:15:38.553000
|
||||||
CVE-2025-20128,0,0,3e7bfcfe64214b1d05a38309ad1e448af5e2709fe869b3c3c8be43fb507306b9,2025-02-18T20:15:24.877000
|
CVE-2025-20128,0,0,3e7bfcfe64214b1d05a38309ad1e448af5e2709fe869b3c3c8be43fb507306b9,2025-02-18T20:15:24.877000
|
||||||
CVE-2025-2013,0,0,7432ed434a81be08eebea71dc536132f3b4153ef4361ce42ddf523e2ec29dcd5,2025-03-11T21:15:52.473000
|
CVE-2025-2013,0,0,7432ed434a81be08eebea71dc536132f3b4153ef4361ce42ddf523e2ec29dcd5,2025-03-11T21:15:52.473000
|
||||||
@ -282402,8 +282406,8 @@ CVE-2025-20184,0,0,9eb256a52263cf40f2a0e3559972cb02a910d9338675658a6b6e99c16dd38
|
|||||||
CVE-2025-20185,0,0,d91cdec4770a3b57d38bd59b46eef47ee3c325e1ce185af9d0c0b74204bb3b1c,2025-02-05T17:15:25.883000
|
CVE-2025-20185,0,0,d91cdec4770a3b57d38bd59b46eef47ee3c325e1ce185af9d0c0b74204bb3b1c,2025-02-05T17:15:25.883000
|
||||||
CVE-2025-2019,0,0,ce7a9cbc0a7eb98392e8b644905555ade42dac13612963c992df55a4ab3df595,2025-03-11T21:15:53.337000
|
CVE-2025-2019,0,0,ce7a9cbc0a7eb98392e8b644905555ade42dac13612963c992df55a4ab3df595,2025-03-11T21:15:53.337000
|
||||||
CVE-2025-2020,0,0,ce26c5965e99864b9e0a9b9af3af837a751d1f222c43aeb691010c4ea46e517a,2025-03-11T21:15:53.477000
|
CVE-2025-2020,0,0,ce26c5965e99864b9e0a9b9af3af837a751d1f222c43aeb691010c4ea46e517a,2025-03-11T21:15:53.477000
|
||||||
CVE-2025-20204,0,0,e2329a8c28cf5009e8a52cfcdda91fee2624e7d144e716f9c9385179bd8ebf9f,2025-02-05T17:15:26.077000
|
CVE-2025-20204,0,1,2b6b6ddefc7e8c547b3afe6dfb9aa6736ec6236ca717a0ced1d667cab3b86129,2025-03-28T13:42:57.807000
|
||||||
CVE-2025-20205,0,0,66723e04ee64d8f2ce9c062ef81145ef5093d18d03a4e1c8ebd198732ad0d765,2025-02-05T17:15:26.243000
|
CVE-2025-20205,0,1,03630bbe3c11efc78e3ed40a1f588f87d7d457dd8b7e950dc0ee6df5e2126d41,2025-03-28T13:46:02.393000
|
||||||
CVE-2025-20206,0,0,9a82394590b91b4aed7223068e34dd2e6c890c30b29f73231c2aa9f9587d8fd0,2025-03-05T17:15:14.450000
|
CVE-2025-20206,0,0,9a82394590b91b4aed7223068e34dd2e6c890c30b29f73231c2aa9f9587d8fd0,2025-03-05T17:15:14.450000
|
||||||
CVE-2025-20207,0,0,537a08241e1e6ea4cdc531e9044478bd507e9b33494cfba735a09875a6c335c1,2025-02-05T17:15:26.410000
|
CVE-2025-20207,0,0,537a08241e1e6ea4cdc531e9044478bd507e9b33494cfba735a09875a6c335c1,2025-02-05T17:15:26.410000
|
||||||
CVE-2025-20208,0,0,45b43fd4f645d8486ce3497dd3b02efc447963dd55a40bf6f4c38297ced5b708,2025-03-25T12:59:40.957000
|
CVE-2025-20208,0,0,45b43fd4f645d8486ce3497dd3b02efc447963dd55a40bf6f4c38297ced5b708,2025-03-25T12:59:40.957000
|
||||||
@ -282587,7 +282591,7 @@ CVE-2025-21105,0,0,7769ede7d6d67929cda835ad36f1b7f8a4f0b24a4fa55bfbbf6043d06ace2
|
|||||||
CVE-2025-21106,0,0,f21695bcd3dc50ebb62318d228568a1613cd20d1a89ae6dcd1f4af03df1c2f91,2025-02-20T12:15:11.373000
|
CVE-2025-21106,0,0,f21695bcd3dc50ebb62318d228568a1613cd20d1a89ae6dcd1f4af03df1c2f91,2025-02-20T12:15:11.373000
|
||||||
CVE-2025-21107,0,0,0827735892f4001f988a0739aad719c8ee1fb9144fe1da312da1da34f24b5ce6,2025-02-07T20:01:14.760000
|
CVE-2025-21107,0,0,0827735892f4001f988a0739aad719c8ee1fb9144fe1da312da1da34f24b5ce6,2025-02-07T20:01:14.760000
|
||||||
CVE-2025-21111,0,0,36449c466fabe660f3fc2f10d8992e6a7d9c5e3d2cf72d3dce2cc840c6da552b,2025-01-24T19:11:42.417000
|
CVE-2025-21111,0,0,36449c466fabe660f3fc2f10d8992e6a7d9c5e3d2cf72d3dce2cc840c6da552b,2025-01-24T19:11:42.417000
|
||||||
CVE-2025-21117,0,0,dd144b173b452426d878a3667413e685d7e43f03cad313557afe62f172876567,2025-02-05T14:15:27.417000
|
CVE-2025-21117,0,1,645b1da2e8af06c5f3d21bae0eae50f754102ea2f31528d1d042846d09e2ec44,2025-03-28T13:24:51.620000
|
||||||
CVE-2025-2112,0,0,12876043094c79f81e904e1d2257170a373b17e7d0d24c6eb1a19e93cc051c0d,2025-03-10T16:15:13.817000
|
CVE-2025-2112,0,0,12876043094c79f81e904e1d2257170a373b17e7d0d24c6eb1a19e93cc051c0d,2025-03-10T16:15:13.817000
|
||||||
CVE-2025-21121,0,0,802c8ab06cca7a283fc5df774dee22f4815bee93ce4d27eceff64530964239b4,2025-03-03T14:59:35.637000
|
CVE-2025-21121,0,0,802c8ab06cca7a283fc5df774dee22f4815bee93ce4d27eceff64530964239b4,2025-03-03T14:59:35.637000
|
||||||
CVE-2025-21122,0,0,969e44e0224fb47d95b87aed16b2a93d9ca09db3ac6fe7fd40cad9e935dc7db9,2025-02-11T14:47:41.453000
|
CVE-2025-21122,0,0,969e44e0224fb47d95b87aed16b2a93d9ca09db3ac6fe7fd40cad9e935dc7db9,2025-02-11T14:47:41.453000
|
||||||
@ -286627,9 +286631,12 @@ CVE-2025-28015,0,0,648b242f524f2d1e65282c0d2ade8d5979df5a4c9cf086b42e2449484b2f9
|
|||||||
CVE-2025-2804,0,0,84020102f277b538ffb8ab51ba7022798f05e2dde9899675eb282f2dc201e37b,2025-03-28T06:15:34.157000
|
CVE-2025-2804,0,0,84020102f277b538ffb8ab51ba7022798f05e2dde9899675eb282f2dc201e37b,2025-03-28T06:15:34.157000
|
||||||
CVE-2025-28135,0,0,67520c1f57ea15ce6a3fbebf8fb1a036612a258dbeeaf68f8167eb1360c1936d,2025-03-27T16:45:12.210000
|
CVE-2025-28135,0,0,67520c1f57ea15ce6a3fbebf8fb1a036612a258dbeeaf68f8167eb1360c1936d,2025-03-27T16:45:12.210000
|
||||||
CVE-2025-28138,0,0,8c0673577a1929357533e79b7892ab1b2319abdda1d9f5bd31a1a742b947848b,2025-03-27T16:45:12.210000
|
CVE-2025-28138,0,0,8c0673577a1929357533e79b7892ab1b2319abdda1d9f5bd31a1a742b947848b,2025-03-27T16:45:12.210000
|
||||||
CVE-2025-2815,1,1,ae8483c7dc37fd3e44032d03f541292a385437aa962e27f88b8c36a255e50f41,2025-03-28T12:15:15.550000
|
CVE-2025-2815,0,0,ae8483c7dc37fd3e44032d03f541292a385437aa962e27f88b8c36a255e50f41,2025-03-28T12:15:15.550000
|
||||||
CVE-2025-2819,0,0,38e9c36ae873a346ecdd7625eb6881a65dff946dea1e4d5fe1469a7230964dac,2025-03-27T16:45:27.850000
|
CVE-2025-2819,0,0,38e9c36ae873a346ecdd7625eb6881a65dff946dea1e4d5fe1469a7230964dac,2025-03-27T16:45:27.850000
|
||||||
CVE-2025-2820,0,0,6cdeb95f9b6504397d792f97c785fc6adf2ecfa6c7ab16f1c8d1d83356fe06c9,2025-03-27T16:45:27.850000
|
CVE-2025-2820,0,0,6cdeb95f9b6504397d792f97c785fc6adf2ecfa6c7ab16f1c8d1d83356fe06c9,2025-03-27T16:45:27.850000
|
||||||
|
CVE-2025-28219,1,1,d7fe6408904eaf7d1b8df2498bf4e47705c64034b5d3901d1f8d354d75fdc406,2025-03-28T14:15:20.253000
|
||||||
|
CVE-2025-28220,1,1,19854ddd28ca5587c3d8eceae6031d6a48f7eae409d298a89bc08248184124c1,2025-03-28T14:15:20.377000
|
||||||
|
CVE-2025-28221,1,1,ae9d4c3b6977b54666ee5723ceeaac1c5cc795e338ba7aa47e34a0f2f6384543,2025-03-28T14:15:20.483000
|
||||||
CVE-2025-2825,0,0,b0ac602f299249f0031cd4605db7336883e5a9c727d54fb2508254997b2a81ae,2025-03-27T16:45:27.850000
|
CVE-2025-2825,0,0,b0ac602f299249f0031cd4605db7336883e5a9c727d54fb2508254997b2a81ae,2025-03-27T16:45:27.850000
|
||||||
CVE-2025-28253,0,0,817483eedee34c743a4481820dc3dbf577051ae76a82bf6f0b0a1c9d13de7780,2025-03-27T23:15:34.867000
|
CVE-2025-28253,0,0,817483eedee34c743a4481820dc3dbf577051ae76a82bf6f0b0a1c9d13de7780,2025-03-27T23:15:34.867000
|
||||||
CVE-2025-2831,0,0,1ae81597715ce516aca81a4f719c74684bee390c094eaf6c3092e19f96d27ebc,2025-03-27T16:45:27.850000
|
CVE-2025-2831,0,0,1ae81597715ce516aca81a4f719c74684bee390c094eaf6c3092e19f96d27ebc,2025-03-27T16:45:27.850000
|
||||||
@ -286643,13 +286650,22 @@ CVE-2025-2846,0,0,3b5287c806e8bc80973f9baaf0ea026d933f9fa8ff940c7a3667c18ec778e5
|
|||||||
CVE-2025-2847,0,0,432b048d8c8afdfd4c92ac64bc4ec034bc3baee4250e2624e5d27f22cf3fe391,2025-03-27T16:45:12.210000
|
CVE-2025-2847,0,0,432b048d8c8afdfd4c92ac64bc4ec034bc3baee4250e2624e5d27f22cf3fe391,2025-03-27T16:45:12.210000
|
||||||
CVE-2025-2849,0,0,aab8d1f56c075f21b703da5aa19a56b01d2820e429e86a8a01410d01a8185f9f,2025-03-27T16:45:12.210000
|
CVE-2025-2849,0,0,aab8d1f56c075f21b703da5aa19a56b01d2820e429e86a8a01410d01a8185f9f,2025-03-27T16:45:12.210000
|
||||||
CVE-2025-2852,0,0,765e659269b1e0d3eb25b4a8bbde2d93ec95002b11855016ed47d09f9b6497d1,2025-03-27T16:45:12.210000
|
CVE-2025-2852,0,0,765e659269b1e0d3eb25b4a8bbde2d93ec95002b11855016ed47d09f9b6497d1,2025-03-27T16:45:12.210000
|
||||||
CVE-2025-2854,0,0,185208968a442a85cdd6b4f4f60fcb2b65d89a8cdf76ae7b9385fd96015563ab,2025-03-27T16:45:12.210000
|
CVE-2025-2854,0,1,281d4fc379506fb237df8903b8089035b874fedbc255b747985b9c9923b31a3d,2025-03-28T13:15:40.923000
|
||||||
CVE-2025-2855,0,0,5aaa475d5b8aab66a1ff02a7daf81660e986d985c8ef92681c11f5951c238f6a,2025-03-27T16:45:12.210000
|
CVE-2025-2855,0,0,5aaa475d5b8aab66a1ff02a7daf81660e986d985c8ef92681c11f5951c238f6a,2025-03-27T16:45:12.210000
|
||||||
CVE-2025-2857,0,0,534c1b6cfe6b9ed9ccff3901b8416b780c90b4a15ff93b7fb3f5f15710cf5d81,2025-03-27T20:15:28.440000
|
CVE-2025-2857,0,0,534c1b6cfe6b9ed9ccff3901b8416b780c90b4a15ff93b7fb3f5f15710cf5d81,2025-03-27T20:15:28.440000
|
||||||
|
CVE-2025-2858,1,1,6bbee639dd0aab6dd26bbfcd974d0bcddafdc32a33a61593861e278ccf5bda8f,2025-03-28T14:15:20.650000
|
||||||
|
CVE-2025-2859,1,1,67f56f2fbf417b2f61e42c53ed212a256361b5ba25b19b84b5ca84c7ed2c0b9d,2025-03-28T14:15:20.810000
|
||||||
|
CVE-2025-2860,1,1,2f5f3312ae65adf4f8e2a2e3b13946f9917e6188fdcd30086ab5d086b3970fba,2025-03-28T14:15:20.967000
|
||||||
|
CVE-2025-2861,1,1,45a0b85fdef388e3fa22ae322d4e453181f488a75d88d85c29f8ce89913c6443,2025-03-28T14:15:21.113000
|
||||||
|
CVE-2025-2862,1,1,fe00293c4cf30ffbab114d7bf2f7dee730dc374d918c22070c7ec496d286c22c,2025-03-28T14:15:21.257000
|
||||||
|
CVE-2025-2863,1,1,34e0071c0cdcac7436cc82f177934ff700cbed706c62795b825c9d44db7660cc,2025-03-28T14:15:21.410000
|
||||||
|
CVE-2025-2864,1,1,493b556778b174bf0df7fb7bf034c03dcd1c20da8165cd4f2a8ad8b89ce26c0e,2025-03-28T14:15:21.570000
|
||||||
|
CVE-2025-2865,1,1,3b9a08d9359bdaa5849a4681ad69ec471503afa2c59d2d24179744630a925929,2025-03-28T14:15:21.727000
|
||||||
CVE-2025-2867,0,0,88c0b57b1eb2be7b9f20a6a0d30f4f131c9b8b7b6d84647043831a11c1cbba58,2025-03-27T16:45:12.210000
|
CVE-2025-2867,0,0,88c0b57b1eb2be7b9f20a6a0d30f4f131c9b8b7b6d84647043831a11c1cbba58,2025-03-27T16:45:12.210000
|
||||||
CVE-2025-2868,1,1,33f03011f98d9b773c14b1eaa32de439498e396e9d02b847bc09f3a2dda95cda,2025-03-28T11:15:37.840000
|
CVE-2025-2868,0,0,33f03011f98d9b773c14b1eaa32de439498e396e9d02b847bc09f3a2dda95cda,2025-03-28T11:15:37.840000
|
||||||
CVE-2025-2869,1,1,70e39c53ec99674bbca84518f2d52539d24d976a5693f00166c6a21ea8ec0e44,2025-03-28T11:15:38.053000
|
CVE-2025-2869,0,0,70e39c53ec99674bbca84518f2d52539d24d976a5693f00166c6a21ea8ec0e44,2025-03-28T11:15:38.053000
|
||||||
CVE-2025-2870,1,1,b58b8becc9dd52506e052ae4c75da0c6f2fc105e0d55b4b26829d67c68e704ee,2025-03-28T11:15:38.207000
|
CVE-2025-2870,0,0,b58b8becc9dd52506e052ae4c75da0c6f2fc105e0d55b4b26829d67c68e704ee,2025-03-28T11:15:38.207000
|
||||||
|
CVE-2025-2877,1,1,cc98c6b852ffd3902484764384f64302df452aade6e9454fddef82a200fbdcb4,2025-03-28T14:15:21.877000
|
||||||
CVE-2025-2878,0,0,28f11500fb554822acb92093abd5f7f7b4e10dac47c29b89b43c371fafe7f359,2025-03-27T23:15:35.067000
|
CVE-2025-2878,0,0,28f11500fb554822acb92093abd5f7f7b4e10dac47c29b89b43c371fafe7f359,2025-03-27T23:15:35.067000
|
||||||
CVE-2025-2885,0,0,1f299ee6f9c1687c7ad3d5b4a66ac1f9f94c352f666602218763c98e2dde7ca0,2025-03-27T23:15:35.240000
|
CVE-2025-2885,0,0,1f299ee6f9c1687c7ad3d5b4a66ac1f9f94c352f666602218763c98e2dde7ca0,2025-03-27T23:15:35.240000
|
||||||
CVE-2025-28855,0,0,75330c0a82318338b0154938e1fd86b9e7a50bcf39b7166c9aad55a9af1a4355,2025-03-27T16:45:27.850000
|
CVE-2025-28855,0,0,75330c0a82318338b0154938e1fd86b9e7a50bcf39b7166c9aad55a9af1a4355,2025-03-27T16:45:27.850000
|
||||||
@ -286744,13 +286760,18 @@ CVE-2025-28940,0,0,04135ac8d9c1245669acb25f77e12e09d3c1430ccba901da70a0adf514651
|
|||||||
CVE-2025-28941,0,0,d1dc35fbe2a033c04e261359b97e6eb5a7f518fa1842a2a100fc7c3dd1630b83,2025-03-11T21:15:52.030000
|
CVE-2025-28941,0,0,d1dc35fbe2a033c04e261359b97e6eb5a7f518fa1842a2a100fc7c3dd1630b83,2025-03-11T21:15:52.030000
|
||||||
CVE-2025-28942,0,0,13661206a69e4d0b8a31139510417b818a8d6f6daa40fe60ee4e3d972c089172,2025-03-27T16:45:27.850000
|
CVE-2025-28942,0,0,13661206a69e4d0b8a31139510417b818a8d6f6daa40fe60ee4e3d972c089172,2025-03-27T16:45:27.850000
|
||||||
CVE-2025-28943,0,0,f13533c6ec40779f6c4eb31c17c71b8bf7e67bb9305109da8899c164336e7b7c,2025-03-11T21:15:52.187000
|
CVE-2025-28943,0,0,f13533c6ec40779f6c4eb31c17c71b8bf7e67bb9305109da8899c164336e7b7c,2025-03-11T21:15:52.187000
|
||||||
|
CVE-2025-2901,1,1,38f9c417a6c20fb5be2bc1a8b73e0b30e4b01f4859c5680551c20eedbe06df17,2025-03-28T14:15:22.020000
|
||||||
CVE-2025-29029,0,0,39541c2aec3ae7c63f9d62e0a3860448d6ebc46233cbb2f267704a4d9534c15a,2025-03-18T18:15:28.817000
|
CVE-2025-29029,0,0,39541c2aec3ae7c63f9d62e0a3860448d6ebc46233cbb2f267704a4d9534c15a,2025-03-18T18:15:28.817000
|
||||||
CVE-2025-29030,0,0,5c6a6bbb988d8463666139df5df874e45be8a953aa025e17f70aff541e298642,2025-03-19T19:15:47.790000
|
CVE-2025-29030,0,0,5c6a6bbb988d8463666139df5df874e45be8a953aa025e17f70aff541e298642,2025-03-19T19:15:47.790000
|
||||||
CVE-2025-29031,0,0,fc79f4214f85e8c2dc7f22a3d332d338110c9a0fc6645f125dc5ea2077bdeb39,2025-03-19T19:15:47.940000
|
CVE-2025-29031,0,0,fc79f4214f85e8c2dc7f22a3d332d338110c9a0fc6645f125dc5ea2077bdeb39,2025-03-19T19:15:47.940000
|
||||||
CVE-2025-29032,0,0,de0e6dba36725e7eb376f4f499583a9ba773e23f18ca4062299593c1211d4783,2025-03-19T19:15:48.083000
|
CVE-2025-29032,0,0,de0e6dba36725e7eb376f4f499583a9ba773e23f18ca4062299593c1211d4783,2025-03-19T19:15:48.083000
|
||||||
CVE-2025-29072,0,0,35ce48c77c318e6003a1e18972edd70a67880d00b73ee6fdb606d5e887da4951,2025-03-27T16:45:12.210000
|
CVE-2025-29072,0,0,35ce48c77c318e6003a1e18972edd70a67880d00b73ee6fdb606d5e887da4951,2025-03-27T16:45:12.210000
|
||||||
|
CVE-2025-2908,1,1,f64cd7fcb5d24ae83e31008923f3bbe96834955e323591c3be0523672ebfdf4d,2025-03-28T13:15:41.217000
|
||||||
|
CVE-2025-2909,1,1,3a720593aa3fbf005f652d39614ce0640eb45ef48808a9985cc786293f08c174,2025-03-28T13:15:41.387000
|
||||||
|
CVE-2025-2910,1,1,4978130c69eda3969fc4aaa24df412c9ffafc7d3ed2c7fd50401dcf2d877cc1e,2025-03-28T13:15:41.533000
|
||||||
CVE-2025-29100,0,0,0625adea7bf9c09ffed0ed9abe2303de146d9db5873c20263fd526077ae2d8d9,2025-03-27T16:45:46.410000
|
CVE-2025-29100,0,0,0625adea7bf9c09ffed0ed9abe2303de146d9db5873c20263fd526077ae2d8d9,2025-03-27T16:45:46.410000
|
||||||
CVE-2025-29101,0,0,631f68202f0ba6d4c9f3ed426c27faae222de97b256af10f375c50c01476ace9,2025-03-25T17:37:22.543000
|
CVE-2025-29101,0,0,631f68202f0ba6d4c9f3ed426c27faae222de97b256af10f375c50c01476ace9,2025-03-25T17:37:22.543000
|
||||||
|
CVE-2025-2911,1,1,9bae5cfa1688da65016914b89758dc8a004a890da707071921228c5eff17be45,2025-03-28T13:15:41.673000
|
||||||
CVE-2025-29118,0,0,02b4ab91e325cbc424c9f611f5094198724d25665ee3e3789b08bbc51de55607,2025-03-21T14:15:16.487000
|
CVE-2025-29118,0,0,02b4ab91e325cbc424c9f611f5094198724d25665ee3e3789b08bbc51de55607,2025-03-21T14:15:16.487000
|
||||||
CVE-2025-29121,0,0,c3aa438f62a6a9f84e07b89449cc7c5ee42d049ab9d1947268d5247e6de8d563,2025-03-21T19:15:45.557000
|
CVE-2025-29121,0,0,c3aa438f62a6a9f84e07b89449cc7c5ee42d049ab9d1947268d5247e6de8d563,2025-03-21T19:15:45.557000
|
||||||
CVE-2025-29135,0,0,da45252de14e5b082a9bdba4d9fc8b7a9e0d31f1a0a6a8b0f99fb851cd8fdacf,2025-03-27T16:45:46.410000
|
CVE-2025-29135,0,0,da45252de14e5b082a9bdba4d9fc8b7a9e0d31f1a0a6a8b0f99fb851cd8fdacf,2025-03-27T16:45:46.410000
|
||||||
@ -287185,35 +287206,35 @@ CVE-2025-31179,0,0,cda1c9467c3475201d82575e129fca6c85eec975e0bfb5c626efdafa30a80
|
|||||||
CVE-2025-31180,0,0,96a8b1c900905723c52b2ac8ec7d74d27ca8fc06e172a796b6c77948919bf976,2025-03-27T16:45:12.210000
|
CVE-2025-31180,0,0,96a8b1c900905723c52b2ac8ec7d74d27ca8fc06e172a796b6c77948919bf976,2025-03-27T16:45:12.210000
|
||||||
CVE-2025-31181,0,0,adf787fa7be98612076fa1d074f2dd202915c081eba78290d23e687b246de36d,2025-03-27T16:45:12.210000
|
CVE-2025-31181,0,0,adf787fa7be98612076fa1d074f2dd202915c081eba78290d23e687b246de36d,2025-03-27T16:45:12.210000
|
||||||
CVE-2025-31335,0,0,10ae6e3d427bfe13348b2d10ee12f129bdeadfbd4a1839e0c92366307e617223,2025-03-28T06:15:34.723000
|
CVE-2025-31335,0,0,10ae6e3d427bfe13348b2d10ee12f129bdeadfbd4a1839e0c92366307e617223,2025-03-28T06:15:34.723000
|
||||||
CVE-2025-31432,1,1,25bc159d068d8b11bbfd2e82882b60badd159381fb91fbbb09310647eacf62d9,2025-03-28T12:15:15.720000
|
CVE-2025-31432,0,0,25bc159d068d8b11bbfd2e82882b60badd159381fb91fbbb09310647eacf62d9,2025-03-28T12:15:15.720000
|
||||||
CVE-2025-31433,1,1,fb5feb10c87b50d2292ab26087cbe0271a286f1ad7b9900a875f0e928bbfc8d5,2025-03-28T12:15:15.877000
|
CVE-2025-31433,0,0,fb5feb10c87b50d2292ab26087cbe0271a286f1ad7b9900a875f0e928bbfc8d5,2025-03-28T12:15:15.877000
|
||||||
CVE-2025-31434,1,1,f404c1f9296f5cc4f6608e82db18e122e85aac73710e020cf75329c9f05a252e,2025-03-28T12:15:16.030000
|
CVE-2025-31434,0,0,f404c1f9296f5cc4f6608e82db18e122e85aac73710e020cf75329c9f05a252e,2025-03-28T12:15:16.030000
|
||||||
CVE-2025-31435,1,1,e6720d556a315fb5a211c472b7222f2a6f7b8c6717119885dbdd250540398a1f,2025-03-28T12:15:16.183000
|
CVE-2025-31435,0,0,e6720d556a315fb5a211c472b7222f2a6f7b8c6717119885dbdd250540398a1f,2025-03-28T12:15:16.183000
|
||||||
CVE-2025-31437,1,1,6619e9d7a38250b6f6e54aa033b353b5ac4953a756154ec02cae2afcccd74de3,2025-03-28T12:15:16.330000
|
CVE-2025-31437,0,0,6619e9d7a38250b6f6e54aa033b353b5ac4953a756154ec02cae2afcccd74de3,2025-03-28T12:15:16.330000
|
||||||
CVE-2025-31438,1,1,39f33e0b7da32d2575d9bf5ffb03241e690c196e8d3f3a185b3211122b278e56,2025-03-28T12:15:16.473000
|
CVE-2025-31438,0,0,39f33e0b7da32d2575d9bf5ffb03241e690c196e8d3f3a185b3211122b278e56,2025-03-28T12:15:16.473000
|
||||||
CVE-2025-31439,1,1,4e88cdb3c6771b0ba0705ab38a02b0f8153fab9cb4a31cb566006ea9daf66bcd,2025-03-28T12:15:16.630000
|
CVE-2025-31439,0,0,4e88cdb3c6771b0ba0705ab38a02b0f8153fab9cb4a31cb566006ea9daf66bcd,2025-03-28T12:15:16.630000
|
||||||
CVE-2025-31440,1,1,6d4cd64caa25a1035545924fe771e499dd195b9060f85377542b0e224ccb188c,2025-03-28T12:15:16.770000
|
CVE-2025-31440,0,0,6d4cd64caa25a1035545924fe771e499dd195b9060f85377542b0e224ccb188c,2025-03-28T12:15:16.770000
|
||||||
CVE-2025-31443,1,1,cf1e9bdc25ab04035766a90ff493a0813fa3d3e26bee5e776223158138f0799b,2025-03-28T12:15:16.927000
|
CVE-2025-31443,0,0,cf1e9bdc25ab04035766a90ff493a0813fa3d3e26bee5e776223158138f0799b,2025-03-28T12:15:16.927000
|
||||||
CVE-2025-31444,1,1,da9687bcad9e851f822c4ab3e2dd95151115a8fb1aed688ad6dcf4b25b8a57f5,2025-03-28T12:15:17.080000
|
CVE-2025-31444,0,0,da9687bcad9e851f822c4ab3e2dd95151115a8fb1aed688ad6dcf4b25b8a57f5,2025-03-28T12:15:17.080000
|
||||||
CVE-2025-31447,1,1,257473642ea4b5a122b9318424269372438457c148e9e51c4d9cfa0b09fba970,2025-03-28T12:15:17.227000
|
CVE-2025-31447,0,0,257473642ea4b5a122b9318424269372438457c148e9e51c4d9cfa0b09fba970,2025-03-28T12:15:17.227000
|
||||||
CVE-2025-31448,1,1,8d805d1c02631c331a604e706ab9fd43da5d4954bff250791de953b728f862df,2025-03-28T12:15:17.377000
|
CVE-2025-31448,0,0,8d805d1c02631c331a604e706ab9fd43da5d4954bff250791de953b728f862df,2025-03-28T12:15:17.377000
|
||||||
CVE-2025-31449,1,1,80af217e5222584ec3432efe3af573bfa671778545d7d32bf0789ad62fe59c7b,2025-03-28T12:15:17.527000
|
CVE-2025-31449,0,0,80af217e5222584ec3432efe3af573bfa671778545d7d32bf0789ad62fe59c7b,2025-03-28T12:15:17.527000
|
||||||
CVE-2025-31450,1,1,f5fc950c056d9fa39b0981b5c58995b3d79c63ba1dc02e3fb588a9734560d362,2025-03-28T12:15:17.677000
|
CVE-2025-31450,0,0,f5fc950c056d9fa39b0981b5c58995b3d79c63ba1dc02e3fb588a9734560d362,2025-03-28T12:15:17.677000
|
||||||
CVE-2025-31451,1,1,4adbbca474cfd1c9cac9ebbb4ba368570f2357c569c2a8a1fdebb675c6e186d1,2025-03-28T12:15:17.817000
|
CVE-2025-31451,0,0,4adbbca474cfd1c9cac9ebbb4ba368570f2357c569c2a8a1fdebb675c6e186d1,2025-03-28T12:15:17.817000
|
||||||
CVE-2025-31452,1,1,edda209bd6d18c8a5e97937d344298652229ef3d6bf32c221955123472d3660c,2025-03-28T12:15:17.960000
|
CVE-2025-31452,0,0,edda209bd6d18c8a5e97937d344298652229ef3d6bf32c221955123472d3660c,2025-03-28T12:15:17.960000
|
||||||
CVE-2025-31453,1,1,62fc5563c1134340d25faf0dbe1fda654a217144034f86cf305b62c3d34b274f,2025-03-28T12:15:18.103000
|
CVE-2025-31453,0,0,62fc5563c1134340d25faf0dbe1fda654a217144034f86cf305b62c3d34b274f,2025-03-28T12:15:18.103000
|
||||||
CVE-2025-31456,1,1,813401e651397cd511522aeaedc628247fe69c087bdffff4a153b7d2eb9c43f0,2025-03-28T12:15:18.250000
|
CVE-2025-31456,0,0,813401e651397cd511522aeaedc628247fe69c087bdffff4a153b7d2eb9c43f0,2025-03-28T12:15:18.250000
|
||||||
CVE-2025-31457,1,1,4e03e3de7a5103e4f6eb3a101a8047ca557ffc69b0f5a54554fa254aac451bb9,2025-03-28T12:15:18.393000
|
CVE-2025-31457,0,0,4e03e3de7a5103e4f6eb3a101a8047ca557ffc69b0f5a54554fa254aac451bb9,2025-03-28T12:15:18.393000
|
||||||
CVE-2025-31458,1,1,37f0a6996a0fb42f0944f4486b2201fec6ff17bae16d9d6544311969c986c8be,2025-03-28T12:15:18.543000
|
CVE-2025-31458,0,0,37f0a6996a0fb42f0944f4486b2201fec6ff17bae16d9d6544311969c986c8be,2025-03-28T12:15:18.543000
|
||||||
CVE-2025-31459,1,1,8ffce8584c771b9ae4083e062635ffe966165a1d39a6e6a7d5e6af26e7dad25a,2025-03-28T12:15:18.680000
|
CVE-2025-31459,0,0,8ffce8584c771b9ae4083e062635ffe966165a1d39a6e6a7d5e6af26e7dad25a,2025-03-28T12:15:18.680000
|
||||||
CVE-2025-31460,1,1,64d79fdc8e018eacfd020142bf950144e98c3acbf9cb16393fafe3453ebb86bf,2025-03-28T12:15:18.820000
|
CVE-2025-31460,0,0,64d79fdc8e018eacfd020142bf950144e98c3acbf9cb16393fafe3453ebb86bf,2025-03-28T12:15:18.820000
|
||||||
CVE-2025-31463,1,1,ff257a1ace8748a77178f2aa592768ef98203ab278c94a47629901b247e69c24,2025-03-28T12:15:18.960000
|
CVE-2025-31463,0,0,ff257a1ace8748a77178f2aa592768ef98203ab278c94a47629901b247e69c24,2025-03-28T12:15:18.960000
|
||||||
CVE-2025-31464,1,1,843f0754c7eb11f753c3d2538edba550c3e711dbef07a870784201a3f8460ed8,2025-03-28T12:15:19.107000
|
CVE-2025-31464,0,0,843f0754c7eb11f753c3d2538edba550c3e711dbef07a870784201a3f8460ed8,2025-03-28T12:15:19.107000
|
||||||
CVE-2025-31465,1,1,10f874d8e2a3a666b99aee57560ff73c98d10fd5c3c545b86fd7b96b2950f724,2025-03-28T12:15:19.237000
|
CVE-2025-31465,0,0,10f874d8e2a3a666b99aee57560ff73c98d10fd5c3c545b86fd7b96b2950f724,2025-03-28T12:15:19.237000
|
||||||
CVE-2025-31466,1,1,d83e5defa81c9a6cf405fdc1b6dcc9194362770a11a27f2195cf99940a0f7d7d,2025-03-28T12:15:19.383000
|
CVE-2025-31466,0,0,d83e5defa81c9a6cf405fdc1b6dcc9194362770a11a27f2195cf99940a0f7d7d,2025-03-28T12:15:19.383000
|
||||||
CVE-2025-31469,1,1,3feb53cd0a36b9081325de9ecedb3d10c939d49f5083eb8620a74858238e2af3,2025-03-28T12:15:19.530000
|
CVE-2025-31469,0,0,3feb53cd0a36b9081325de9ecedb3d10c939d49f5083eb8620a74858238e2af3,2025-03-28T12:15:19.530000
|
||||||
CVE-2025-31470,1,1,ab0bf34d871d75b080c897ac4241a4d4ae70b8bcad1095860dfaae42c5e81856,2025-03-28T12:15:19.673000
|
CVE-2025-31470,0,0,ab0bf34d871d75b080c897ac4241a4d4ae70b8bcad1095860dfaae42c5e81856,2025-03-28T12:15:19.673000
|
||||||
CVE-2025-31471,1,1,7e2d1c5850e6e581133a26f55dd506e0806e9e4475c733bb8298a165a51a92ab,2025-03-28T12:15:19.820000
|
CVE-2025-31471,0,0,7e2d1c5850e6e581133a26f55dd506e0806e9e4475c733bb8298a165a51a92ab,2025-03-28T12:15:19.820000
|
||||||
CVE-2025-31472,1,1,93d2fa62c30bcb35ff3749d1a4b02b0e459ed099b73e00ba33ed099624a1498e,2025-03-28T12:15:19.963000
|
CVE-2025-31472,0,0,93d2fa62c30bcb35ff3749d1a4b02b0e459ed099b73e00ba33ed099624a1498e,2025-03-28T12:15:19.963000
|
||||||
CVE-2025-31473,1,1,05715cac65626e990bcb1403e6662740a9c505e5ac6f6115908360db5e4dbf0c,2025-03-28T12:15:20.110000
|
CVE-2025-31473,0,0,05715cac65626e990bcb1403e6662740a9c505e5ac6f6115908360db5e4dbf0c,2025-03-28T12:15:20.110000
|
||||||
CVE-2025-31474,1,1,19485a4efcf74b35a8e81d54b4ca4fc9d240e836e203a816dbd62ab8fa82bd2f,2025-03-28T12:15:20.257000
|
CVE-2025-31474,0,0,19485a4efcf74b35a8e81d54b4ca4fc9d240e836e203a816dbd62ab8fa82bd2f,2025-03-28T12:15:20.257000
|
||||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user