mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-05 10:18:41 +00:00
Auto-Update: 2025-04-08T14:00:19.459633+00:00
This commit is contained in:
parent
7d8f77075b
commit
e48a893195
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-25428",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-02-20T22:15:08.727",
|
||||
"lastModified": "2025-03-13T19:15:43.037",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-04-08T13:19:04.327",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,14 +51,41 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:mrcms:mrcms:3.1.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "254B64CD-32D5-4E91-8A4C-54C155EA7E0B"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/wuweiit/mushroom/issues/19",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/wuweiit/mushroom/issues/19",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-0444",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2025-02-04T19:15:32.237",
|
||||
"lastModified": "2025-02-07T22:15:13.807",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-04-08T12:26:11.430",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -49,16 +49,51 @@
|
||||
"value": "CWE-416"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-416"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "133.0.6943.53",
|
||||
"matchCriteriaId": "619AD205-1050-4377-9DA6-E20DF49B4112"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2025/02/stable-channel-update-for-desktop.html",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://issues.chromium.org/issues/390889644",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Issue Tracking",
|
||||
"Permissions Required"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-0445",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2025-02-04T19:15:32.353",
|
||||
"lastModified": "2025-02-07T22:15:13.980",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-04-08T12:25:50.060",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,14 +51,39 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "133.0.6943.53",
|
||||
"matchCriteriaId": "619AD205-1050-4377-9DA6-E20DF49B4112"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2025/02/stable-channel-update-for-desktop.html",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://issues.chromium.org/issues/392521083",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Issue Tracking",
|
||||
"Permissions Required"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-0451",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2025-02-04T19:15:32.477",
|
||||
"lastModified": "2025-02-07T22:15:14.130",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-04-08T12:25:41.690",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,14 +51,38 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "133.0.6943.53",
|
||||
"matchCriteriaId": "619AD205-1050-4377-9DA6-E20DF49B4112"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2025/02/stable-channel-update-for-desktop.html",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://issues.chromium.org/issues/40061026",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
"tags": [
|
||||
"Issue Tracking"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-1013",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2025-02-04T14:15:32.123",
|
||||
"lastModified": "2025-02-04T22:15:41.743",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-04-08T12:26:22.417",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,26 +51,78 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:esr:*:*:*",
|
||||
"versionEndExcluding": "128.7.0",
|
||||
"matchCriteriaId": "B1B11C09-3033-44F5-ACC7-591196075CB1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "135.0",
|
||||
"matchCriteriaId": "BADF1FB6-FA36-4AD1-B176-0DD893E0CD9A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "128.7.0",
|
||||
"matchCriteriaId": "1E4B98F4-AC9B-402A-B7D2-829373BFBD66"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "129.0",
|
||||
"versionEndExcluding": "135.0",
|
||||
"matchCriteriaId": "5E83B28A-FF6A-4C0A-B5BD-1CE5DEC24C64"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1932555",
|
||||
"source": "security@mozilla.org"
|
||||
"source": "security@mozilla.org",
|
||||
"tags": [
|
||||
"Issue Tracking"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2025-07/",
|
||||
"source": "security@mozilla.org"
|
||||
"source": "security@mozilla.org",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2025-09/",
|
||||
"source": "security@mozilla.org"
|
||||
"source": "security@mozilla.org",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2025-10/",
|
||||
"source": "security@mozilla.org"
|
||||
"source": "security@mozilla.org",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2025-11/",
|
||||
"source": "security@mozilla.org"
|
||||
"source": "security@mozilla.org",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2025-1062",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2025-03-24T06:15:12.910",
|
||||
"lastModified": "2025-03-24T18:15:22.217",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-04-08T13:20:11.020",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Slider, Gallery, and Carousel by MetaSlider WordPress plugin before 3.95.0 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El complemento Slider, Gallery, and Carousel de MetaSlider para WordPress anterior a la versi\u00f3n 3.95.0 no depura ni escapa de algunas de sus configuraciones, lo que podr\u00eda permitir a usuarios con privilegios elevados como el administrador realizar ataques de cross site scripting almacenado incluso cuando la capacidad unfiltered_html no est\u00e1 permitida (por ejemplo, en una configuraci\u00f3n de varios sitios)."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -35,10 +39,44 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:metaslider:slider\\,_gallery\\,_and_carousel:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "3.95.0",
|
||||
"matchCriteriaId": "6F2E1BBE-4255-4319-80A3-229CDFDE414F"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/657b355b-e38f-46d6-b574-7ce736d25f31/",
|
||||
"source": "contact@wpscan.com"
|
||||
"source": "contact@wpscan.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2025-1203",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2025-03-24T06:15:13.013",
|
||||
"lastModified": "2025-03-24T18:15:22.360",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-04-08T13:13:35.707",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Slider, Gallery, and Carousel by MetaSlider WordPress plugin before 3.95.0 does not sanitise and escape some of its settings, which could allow high privilege users such as editor to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El complemento Slider, Gallery, and Carousel de MetaSlider para WordPress anterior a la versi\u00f3n 3.95.0 no depura ni escapa de algunas de sus configuraciones, lo que podr\u00eda permitir a usuarios con privilegios elevados como el editor realizar ataques de cross site scripting almacenado incluso cuando la capacidad unfiltered_html no est\u00e1 permitida (por ejemplo, en una configuraci\u00f3n de varios sitios)."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -35,10 +39,44 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:metaslider:slider\\,_gallery\\,_and_carousel:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "3.95.0",
|
||||
"matchCriteriaId": "6F2E1BBE-4255-4319-80A3-229CDFDE414F"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/fca0b129-3299-46d6-9231-ca5afd2fdb66/",
|
||||
"source": "contact@wpscan.com"
|
||||
"source": "contact@wpscan.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-22457",
|
||||
"sourceIdentifier": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75",
|
||||
"published": "2025-04-03T16:15:35.370",
|
||||
"lastModified": "2025-04-08T01:00:02.673",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-04-08T13:39:05.933",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 6.0
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -53,12 +73,279 @@
|
||||
"value": "CWE-121"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:connect_secure:*:-:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "22.7",
|
||||
"matchCriteriaId": "A0EC2FCD-5402-4269-B86A-18F8DFB8F2C9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:connect_secure:22.7:-:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F788F6D9-5368-4B8E-BFA0-E8FB3CDADB01"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:connect_secure:22.7:r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2927A40D-E8A3-4DB6-9C93-04A6C6035C3D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:connect_secure:22.7:r1.1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1399BBB4-E62B-4FF6-B9E3-6AAC68D4D583"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:connect_secure:22.7:r1.2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1EAD1423-4477-4C35-BF93-697A2C0697C6"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:connect_secure:22.7:r1.3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "858353BC-12CB-4014-BFCA-DA7B1B3DD4B9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:connect_secure:22.7:r1.4:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "865F72BF-57B2-4B0C-BACE-3500E0AE6751"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:connect_secure:22.7:r1.5:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "39E11407-E0C0-454F-B731-7DA4CBC696EB"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:connect_secure:22.7:r2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "247E71F8-A03B-4097-B7BF-09F8BF3ED4D6"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:connect_secure:22.7:r2.1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E0059C69-4A18-4153-9D9A-5C1B03AD1453"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:connect_secure:22.7:r2.2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FC523C88-115E-4CD9-A8CB-AE6E6610F7D4"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:connect_secure:22.7:r2.3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3447428E-DBCD-4553-B51D-AC08ECAFD881"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:connect_secure:22.7:r2.4:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A08BAF98-7F05-4596-8BFC-91F1A79D3BD1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:connect_secure:22.7:r2.5:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "40717D97-A062-49C4-B105-C22AAC3A206A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:neurons_for_zero-trust_access:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0E4387B4-BC5C-41DE-92DA-84866A649AD2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:neurons_for_zero-trust_access:22.2:r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "24514B40-540E-45D7-90DC-BCC1D9D7E92C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:neurons_for_zero-trust_access:22.2:r4:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BFD510E9-12DC-4942-BAA0-6405CBD905EF"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:neurons_for_zero-trust_access:22.2:r5:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EA11BB6D-36C7-438B-A5A7-71C3CB2E5EC8"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:neurons_for_zero-trust_access:22.3:r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7B01001B-FA11-4297-AB81-12A00B97C820"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:neurons_for_zero-trust_access:22.3:r4:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9F28E6B1-44AB-4635-8939-5B0A44BED1E6"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:neurons_for_zero-trust_access:22.4:r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3E9D957B-49F9-492D-A66A-0D25BA27AD35"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:neurons_for_zero-trust_access:22.4:r3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D1AB497E-E403-4DEE-A83D-CB2E119E5E96"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:neurons_for_zero-trust_access:22.5:r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CA6B3322-9AFB-44B5-B571-995AB606FD01"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:neurons_for_zero-trust_access:22.5:r1.2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "47CB7C12-D642-4015-842C-37241F87DB86"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:neurons_for_zero-trust_access:22.6:r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "58E49DF1-F66A-4F52-87FA-A50DFD735ECB"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:neurons_for_zero-trust_access:22.6:r1.2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "62A0393A-C1C6-4708-BC41-5A5B8FB765FF"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:neurons_for_zero-trust_access:22.6:r1.3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1F3358B0-4751-4DCD-8BFC-BB4C68505658"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:neurons_for_zero-trust_access:22.6:r1.5:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5C9313A0-2F33-412B-A6F0-E51AE19E199B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:neurons_for_zero-trust_access:22.6:r1.6:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2979603E-F5CF-4C53-9828-36795E1B6247"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:neurons_for_zero-trust_access:22.6:r1.7:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D0D33C96-EE5C-41EB-8D9F-88ED025C191A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:neurons_for_zero-trust_access:22.7:r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9F0A44E1-3670-4AD5-A54D-FDA6C200AA73"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:neurons_for_zero-trust_access:22.7:r1.2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C5B4CE43-2D9B-4DF9-AC2A-F649622CD190"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:neurons_for_zero-trust_access:22.7:r1.3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3C9B3FF8-F613-404D-BC85-9DD6F2A6DB5C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:neurons_for_zero-trust_access:22.7:r1.4:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CFC583B5-18F5-4943-8C68-6C601857CE5E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:neurons_for_zero-trust_access:22.7:r1.5:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6E4DE5D9-C92B-4143-835F-2D16F0CC328F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:neurons_for_zero-trust_access:22.7:r1.6:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F874F69E-C621-4C4B-802F-900E7BFAB71B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:neurons_for_zero-trust_access:22.7:r2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "67D43D1D-564D-4ACD-B0FF-3828B95E9864"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:neurons_for_zero-trust_access:22.7:r2.2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BC8480E0-17C0-4590-950F-D3954E735365"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:neurons_for_zero-trust_access:22.7:r2.3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3FAF4FB0-A88C-4A87-B6CB-32EF7B415885"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:neurons_for_zero-trust_access:22.8:r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9779B197-1A14-4750-B8BC-9CA00F46D123"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:neurons_for_zero-trust_access:22.8:r1.1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BAFF5CD8-AB78-436B-AA16-8447706D0E86"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:neurons_for_zero-trust_access:22.8:r2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2ADB0039-5652-428A-96A4-66B29DFB0F9D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:policy_secure:*:-:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "22.7",
|
||||
"matchCriteriaId": "48EFA63B-1322-45B0-B86D-87F24A2B4E8A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:policy_secure:22.7:-:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1F22B988-2585-4853-9838-AB3746C8B888"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:policy_secure:22.7:r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FD9BE8C2-43EB-4870-A4B7-267CB17A19F1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:policy_secure:22.7:r1.1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C8915BB2-C1C0-4189-A847-DDB2EF161D62"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:policy_secure:22.7:r1.2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8D24A8DB-D697-4C60-935D-B08EE36861CB"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:policy_secure:22.7:r1.3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4C12D325-77E1-4873-8A77-D76F4A73BCF8"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://forums.ivanti.com/s/article/April-Security-Advisory-Ivanti-Connect-Secure-Policy-Secure-ZTA-Gateways-CVE-2025-22457",
|
||||
"source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75"
|
||||
"source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-25914",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-03-17T20:15:14.013",
|
||||
"lastModified": "2025-04-07T20:31:44.523",
|
||||
"lastModified": "2025-04-08T13:41:36.747",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -60,8 +60,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:carmelogarcia:online_exam_mastering_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CBE0D98A-8407-4C1B-9A52-8C571F31DF8A"
|
||||
"criteria": "cpe:2.3:a:carmelo:online_exam_mastering_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6CF5A638-55FA-4E3A-A2BB-BE6C2D8D6A6B"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
76
CVE-2025/CVE-2025-25xx/CVE-2025-2568.json
Normal file
76
CVE-2025/CVE-2025-25xx/CVE-2025-2568.json
Normal file
@ -0,0 +1,76 @@
|
||||
{
|
||||
"id": "CVE-2025-2568",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2025-04-08T12:15:15.760",
|
||||
"lastModified": "2025-04-08T12:15:15.760",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Vayu Blocks \u2013 Gutenberg Blocks for WordPress & WooCommerce plugin for WordPress is vulnerable to unauthorized access and modification of data due to missing capability checks on the 'vayu_blocks_get_toggle_switch_values_callback' and 'vayu_blocks_save_toggle_switch_callback' function in versions 1.0.4 to 1.2.1. This makes it possible for unauthenticated attackers to read plugin options and update any option with a key name ending in '_value'."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/vayu-blocks/trunk/inc/function.php#L126",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/vayu-blocks/trunk/inc/function.php#L133",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/vayu-blocks/trunk/inc/function.php#L139",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/vayu-blocks/trunk/inc/function.php#L182",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3263702/",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/27ca93a1-3dfc-4bbd-834a-1c04d9e22ebf?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
68
CVE-2025/CVE-2025-28xx/CVE-2025-2876.json
Normal file
68
CVE-2025/CVE-2025-28xx/CVE-2025-2876.json
Normal file
@ -0,0 +1,68 @@
|
||||
{
|
||||
"id": "CVE-2025-2876",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2025-04-08T12:15:16.820",
|
||||
"lastModified": "2025-04-08T12:15:16.820",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The MelaPress Login Security and MelaPress Login Security Premium plugins for WordPress is vulnerable to unauthorized loss of data due to a missing capability check on the 'monitor_admin_actions' function in version 2.1.0. This makes it possible for unauthenticated attackers to delete any user."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://melapress.com/wordpress-login-security/releases/",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/melapress-login-security/trunk/app/modules/temporary-logins/class-temporary-logins.php#L71",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3267748/",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/559cbc69-85b6-4bad-9bb2-26d64195ba7e?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2025-2995",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-03-31T13:15:45.310",
|
||||
"lastModified": "2025-04-01T20:26:30.593",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-04-08T13:05:30.387",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability has been found in Tenda FH1202 1.2.0.14(408) and classified as critical. This vulnerability affects unknown code of the file /goform/SysToolChangePwd of the component Web Management Interface. The manipulation leads to improper access controls. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se ha detectado una vulnerabilidad en Tenda FH1202 1.2.0.14(408), clasificada como cr\u00edtica. Esta vulnerabilidad afecta al c\u00f3digo desconocido del archivo /goform/SysToolChangePwd del componente Interfaz de Administraci\u00f3n Web. La manipulaci\u00f3n genera controles de acceso inadecuados. El ataque puede iniciarse remotamente. Se ha hecho p\u00fablico el exploit y puede que sea utilizado."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -118,32 +122,94 @@
|
||||
"value": "CWE-284"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:tenda:fh1202_firmware:1.2.0.14\\(408\\):*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B9FD9D0A-39F4-4AD8-AEE0-71C9E77D2799"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:tenda:fh1202:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4A632A11-60A0-457C-A039-BED32F83BD52"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://lavender-bicycle-a5a.notion.site/Tenda-FH1202-SysToolChangePwd-1bc53a41781f809b95a4efb617090d3c?pvs=4",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.302044",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.302044",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.523418",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.tenda.com.cn/",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lavender-bicycle-a5a.notion.site/Tenda-FH1202-SysToolChangePwd-1bc53a41781f809b95a4efb617090d3c",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2025-2996",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-03-31T13:15:45.503",
|
||||
"lastModified": "2025-04-01T20:26:30.593",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-04-08T13:04:38.877",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in Tenda FH1202 1.2.0.14(408) and classified as critical. This issue affects some unknown processing of the file /goform/SysToolDDNS of the component Web Management Interface. The manipulation leads to improper access controls. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se encontr\u00f3 una vulnerabilidad en Tenda FH1202 1.2.0.14(408) y se clasific\u00f3 como cr\u00edtica. Este problema afecta a un procesamiento desconocido del archivo /goform/SysToolDDNS del componente Interfaz de Administraci\u00f3n Web. La manipulaci\u00f3n genera controles de acceso inadecuados. El ataque puede iniciarse remotamente. Se ha hecho p\u00fablico el exploit y puede que sea utilizado."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -59,6 +63,26 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
@ -118,28 +142,86 @@
|
||||
"value": "CWE-284"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:tenda:fh1202_firmware:1.2.0.14\\(408\\):*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B9FD9D0A-39F4-4AD8-AEE0-71C9E77D2799"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:tenda:fh1202:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4A632A11-60A0-457C-A039-BED32F83BD52"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://lavender-bicycle-a5a.notion.site/Tenda-FH1202-SysToolDDNS-1bc53a41781f8012a03be8bebed1125b?pvs=4",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.302045",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.302045",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.523419",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.tenda.com.cn/",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-3155",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2025-04-03T14:15:46.413",
|
||||
"lastModified": "2025-04-07T14:18:34.453",
|
||||
"lastModified": "2025-04-08T13:15:41.573",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -63,6 +63,10 @@
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2025/04/04/1",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
},
|
||||
{
|
||||
"url": "https://gist.github.com/parrot409/e970b155358d45b298d7024edd9b17f2",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-3167",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-04-03T17:15:31.390",
|
||||
"lastModified": "2025-04-07T14:18:34.453",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-04-08T13:50:05.433",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -80,6 +80,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -120,30 +140,82 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:tenda:ac23_firmware:16.03.07.52:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A70D64A9-3FF1-4777-ACB5-0D66D5B9448F"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:tenda:ac23:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9B730D9E-D9B0-480B-9941-7C48C56BBE94"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/LZY0522/CVE/blob/main/CVE_1.md",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.303113",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.303113",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.543150",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.tenda.com.cn/",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/LZY0522/CVE/blob/main/CVE_1.md",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-3203",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-04-04T03:15:14.207",
|
||||
"lastModified": "2025-04-07T14:18:15.560",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-04-08T13:41:35.810",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -122,32 +122,92 @@
|
||||
"value": "CWE-121"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:tenda:w18e_firmware:16.01.0.11:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "125BF798-C5BA-40C5-A7C9-CC3F09102584"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:tenda:w18e:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "169334F3-1B6E-4A8A-99E5-2B4B98D92BE0"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/ZIKH26/tmp_store_reports/blob/main/tenda-w18e.md",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.303157",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.303157",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.545883",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.tenda.com.cn/",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/ZIKH26/tmp_store_reports/blob/main/tenda-w18e.md",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
34
README.md
34
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2025-04-08T12:00:20.635458+00:00
|
||||
2025-04-08T14:00:19.459633+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2025-04-08T11:15:44.267000+00:00
|
||||
2025-04-08T13:50:05.433000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,27 +33,35 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
289014
|
||||
289016
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `7`
|
||||
Recently added CVEs: `2`
|
||||
|
||||
- [CVE-2025-2807](CVE-2025/CVE-2025-28xx/CVE-2025-2807.json) (`2025-04-08T10:15:16.780`)
|
||||
- [CVE-2025-2808](CVE-2025/CVE-2025-28xx/CVE-2025-2808.json) (`2025-04-08T10:15:18.940`)
|
||||
- [CVE-2025-2883](CVE-2025/CVE-2025-28xx/CVE-2025-2883.json) (`2025-04-08T10:15:19.197`)
|
||||
- [CVE-2025-29985](CVE-2025/CVE-2025-299xx/CVE-2025-29985.json) (`2025-04-08T11:15:42.707`)
|
||||
- [CVE-2025-29986](CVE-2025/CVE-2025-299xx/CVE-2025-29986.json) (`2025-04-08T11:15:44.033`)
|
||||
- [CVE-2025-30166](CVE-2025/CVE-2025-301xx/CVE-2025-30166.json) (`2025-04-08T11:15:44.267`)
|
||||
- [CVE-2025-3437](CVE-2025/CVE-2025-34xx/CVE-2025-3437.json) (`2025-04-08T10:15:19.413`)
|
||||
- [CVE-2025-2568](CVE-2025/CVE-2025-25xx/CVE-2025-2568.json) (`2025-04-08T12:15:15.760`)
|
||||
- [CVE-2025-2876](CVE-2025/CVE-2025-28xx/CVE-2025-2876.json) (`2025-04-08T12:15:16.820`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `1`
|
||||
Recently modified CVEs: `14`
|
||||
|
||||
- [CVE-2025-3436](CVE-2025/CVE-2025-34xx/CVE-2025-3436.json) (`2025-04-08T09:15:29.300`)
|
||||
- [CVE-2024-25428](CVE-2024/CVE-2024-254xx/CVE-2024-25428.json) (`2025-04-08T13:19:04.327`)
|
||||
- [CVE-2025-0444](CVE-2025/CVE-2025-04xx/CVE-2025-0444.json) (`2025-04-08T12:26:11.430`)
|
||||
- [CVE-2025-0445](CVE-2025/CVE-2025-04xx/CVE-2025-0445.json) (`2025-04-08T12:25:50.060`)
|
||||
- [CVE-2025-0451](CVE-2025/CVE-2025-04xx/CVE-2025-0451.json) (`2025-04-08T12:25:41.690`)
|
||||
- [CVE-2025-1013](CVE-2025/CVE-2025-10xx/CVE-2025-1013.json) (`2025-04-08T12:26:22.417`)
|
||||
- [CVE-2025-1062](CVE-2025/CVE-2025-10xx/CVE-2025-1062.json) (`2025-04-08T13:20:11.020`)
|
||||
- [CVE-2025-1203](CVE-2025/CVE-2025-12xx/CVE-2025-1203.json) (`2025-04-08T13:13:35.707`)
|
||||
- [CVE-2025-22457](CVE-2025/CVE-2025-224xx/CVE-2025-22457.json) (`2025-04-08T13:39:05.933`)
|
||||
- [CVE-2025-25914](CVE-2025/CVE-2025-259xx/CVE-2025-25914.json) (`2025-04-08T13:41:36.747`)
|
||||
- [CVE-2025-2995](CVE-2025/CVE-2025-29xx/CVE-2025-2995.json) (`2025-04-08T13:05:30.387`)
|
||||
- [CVE-2025-2996](CVE-2025/CVE-2025-29xx/CVE-2025-2996.json) (`2025-04-08T13:04:38.877`)
|
||||
- [CVE-2025-3155](CVE-2025/CVE-2025-31xx/CVE-2025-3155.json) (`2025-04-08T13:15:41.573`)
|
||||
- [CVE-2025-3167](CVE-2025/CVE-2025-31xx/CVE-2025-3167.json) (`2025-04-08T13:50:05.433`)
|
||||
- [CVE-2025-3203](CVE-2025/CVE-2025-32xx/CVE-2025-3203.json) (`2025-04-08T13:41:35.810`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
46
_state.csv
46
_state.csv
@ -253187,7 +253187,7 @@ CVE-2024-25420,0,0,e7efd1ed23ca746b8704e9c9ed47bae8368187f076c5294cba2da51c48b1f
|
||||
CVE-2024-25421,0,0,4aaa4c906586deeb67dc43ed5331c3d0f3499a1d45ec23efb878770db6ed62f1,2024-11-21T09:00:47.180000
|
||||
CVE-2024-25422,0,0,fd73cf22ceb02c6d1e99c3c5f2ec1ae1e4fb298d4ce867f4d1c13cae5d716e9e,2025-03-29T00:15:18.687000
|
||||
CVE-2024-25423,0,0,94ea816a321c84c96a2ebe547c547d669f3866b10bc313b7f77b960fe74089b8,2024-11-21T09:00:47.563000
|
||||
CVE-2024-25428,0,0,c1f8565d15f7bd231c5fb8c027cc10a0d0772315131ae0f14d1dd29e933516ae,2025-03-13T19:15:43.037000
|
||||
CVE-2024-25428,0,1,d32399d8410f8e07f69a05223c98e83a079bf5b4c6fdae245110c0891b91b7de,2025-04-08T13:19:04.327000
|
||||
CVE-2024-2543,0,0,e35575ccd402f68f321b7401fe74212ccd49958980ed309abbebc7424e6af3c9,2025-02-05T17:11:54.403000
|
||||
CVE-2024-25431,0,0,a8f01c9a37ff069c7fe24fb46f974e9aa02888ea78827e75d08c3ba0b43d9f70,2024-11-14T20:42:47.297000
|
||||
CVE-2024-25434,0,0,f6e4f2fadc8ceca96061be4132e7b90e015d2912a1fcf0291427a1223fb2e0f5,2024-11-21T09:00:48.197000
|
||||
@ -281429,13 +281429,13 @@ CVE-2025-0440,0,0,bab5646fe57be32b81759b8d43c7715137b5a3dd2925726f076ac6ff1f1698
|
||||
CVE-2025-0441,0,0,9be667b7ca3d6b0c4024db684ea154da0a17206dccf5623644eeb5915a246618,2025-03-18T15:15:58.760000
|
||||
CVE-2025-0442,0,0,b67a5ab0a614c9dcc349e6c0e7630de1fb2af7af324e655577d77f7fa5f9a38f,2025-03-14T18:15:31.303000
|
||||
CVE-2025-0443,0,0,1c12e337dcd70248f9855587510cef5c758f6b380d7c66c9f8bf888012a95d02,2025-03-19T19:15:44.070000
|
||||
CVE-2025-0444,0,0,b57406504b58c76909f2c14a128c362cf7e0f5ed01cd46bcebd537920650043d,2025-02-07T22:15:13.807000
|
||||
CVE-2025-0445,0,0,757acb8a0cefc693cbaf9e83fdad6cd24630be0355ff9a4060422c2852425aa3,2025-02-07T22:15:13.980000
|
||||
CVE-2025-0444,0,1,1efb751b59aa45ed04e864bea01bc8adcc91e8c80cd105fb2b653639e4bd415b,2025-04-08T12:26:11.430000
|
||||
CVE-2025-0445,0,1,1f0c7fcb92d671b93522c916f7edddd00703164b635b638ea3f141d50a752722,2025-04-08T12:25:50.060000
|
||||
CVE-2025-0446,0,0,fa18d3e516501e304df9d785a2dd2f8e211e5095ae3d05bc045a0067edb62028,2025-03-14T17:15:50.033000
|
||||
CVE-2025-0447,0,0,8d240d6923af2f79d18d6792cf7889c4bb668a774bac90a2a65697cac9d0826d,2025-03-14T16:15:39.803000
|
||||
CVE-2025-0448,0,0,a91e2ae4b6f8dabbb6ae6cf566ef088075dfbe12391b6ba99af7e04d16a0c199,2025-03-24T18:15:21.910000
|
||||
CVE-2025-0450,0,0,b38cc1b8bbfcc6d3647330d9f8e0167854327a3c3ad51d1f3e314ec78717ad4d,2025-01-21T11:15:10.593000
|
||||
CVE-2025-0451,0,0,db4561898a7688dcdda2a1ca729c77eb37f2f44c57b9474f78cbce6bdceedaa2,2025-02-07T22:15:14.130000
|
||||
CVE-2025-0451,0,1,ec162982b97bd5a4c8706791bf9297009e6b97295238977b32f66ef504825b2e,2025-04-08T12:25:41.690000
|
||||
CVE-2025-0452,0,0,599e6d76f34b4186a031b1b81a37a110510d71d0a0d59cb5cc0da33a1062cba5,2025-03-20T10:15:52.890000
|
||||
CVE-2025-0453,0,0,272cd88ee03bee6d7c6dd41617c8778ef9dd8ff18c14bc2fd8f315016111d90f,2025-04-02T16:10:48.930000
|
||||
CVE-2025-0454,0,0,c42580a24b871e3fa3d3cd6f1a94379fb78f76a962d205b211328d7bbd6206cb,2025-03-20T10:15:53.157000
|
||||
@ -281844,7 +281844,7 @@ CVE-2025-1009,0,0,2eaef1afd010c535fd50fceaedaa339dbea694d459d94247ca2cdf1816ccd1
|
||||
CVE-2025-1010,0,0,62a03586b01b5384628b2b24394869ef4f272c9b8354e05188dae652a849042c,2025-02-06T19:30:13.637000
|
||||
CVE-2025-1011,0,0,c7aab2f6a9c0415627154b90d3f96ebb209e4ddce064fa55ea39e2629e66c93d,2025-02-06T19:31:38.610000
|
||||
CVE-2025-1012,0,0,4df28ce86cbd4e49559b6caf4f9713bdb42cefc5aa3a7f0ac2efbb26c1309b49,2025-02-06T19:33:46.407000
|
||||
CVE-2025-1013,0,0,651300f5a902e2a90163edfab2155a83dd0507c6882d48dd9ffa23457be2f8b0,2025-02-04T22:15:41.743000
|
||||
CVE-2025-1013,0,1,a694ebadfb836aa5cd945940b6983167477e640ab4f752d26f4c3011a4a51b06,2025-04-08T12:26:22.417000
|
||||
CVE-2025-1014,0,0,c6156421e09c044512d56480035ada4fc6ec0f71d0de078370b84abda2b3d73f,2025-02-06T21:15:22.397000
|
||||
CVE-2025-1015,0,0,c0fb0efc7bcd0a499f759d56d25d3e4c19351e1b390774630a281c721e58035d,2025-03-10T19:15:39.590000
|
||||
CVE-2025-1016,0,0,2e0db284a246d9cb5702937ac7dbd1f00f468e9b4a4a58c00bbc39db26d0ee7b,2025-02-06T21:15:22.560000
|
||||
@ -281871,7 +281871,7 @@ CVE-2025-1058,0,0,931565082cf6be7adcbf5c17fdfd20136c63742e85ad7be32de9be500e9b28
|
||||
CVE-2025-1059,0,0,c8e08f393241882abd9f520991c8527e65d38e4d6c43516ed6bd207e016f7d2f,2025-02-13T06:15:21.680000
|
||||
CVE-2025-1060,0,0,249a972722a8ea5c8c8703c094cf839a07a282f53cdfa1c21d84e389f952edae,2025-02-13T06:15:22.213000
|
||||
CVE-2025-1061,0,0,719d74f0f0646df1bcdf5186f15b6b006503d4de7dcd7fdf659e983ae5a27990,2025-02-07T02:15:29.587000
|
||||
CVE-2025-1062,0,0,0417d6496f79757d2c368398369c1b186f30d26153fee17b3f67f7bd395be185,2025-03-24T18:15:22.217000
|
||||
CVE-2025-1062,0,1,7c0cf9c21117ca1714e5223a23745f872db0f1f3c0df124b87c28b2d150da2ed,2025-04-08T13:20:11.020000
|
||||
CVE-2025-1063,0,0,f6ebc08f6e2568783d19012ba06b647ad752279ad00c89461f145d2a92f0083e,2025-02-28T16:07:01.990000
|
||||
CVE-2025-1064,0,0,7b7164b210697e056675206baf5cc1f85c1aa8eb0b02774ad30b163694ee3ea3,2025-02-25T20:41:01.500000
|
||||
CVE-2025-1065,0,0,70a90000a3a4cb679474daa22883e05e6abe48ed1e55dd42dffa8e01fc4b0bec,2025-02-19T06:15:21.507000
|
||||
@ -281982,7 +281982,7 @@ CVE-2025-1199,0,0,b293e1750426e162cd73c69f2470f66e74330c6db9c1208ddcbe2ec678b89d
|
||||
CVE-2025-1200,0,0,2cf33b7c7420072fbc797907606ea05888cf6aaff43c22f0ef1f03dfb676810e,2025-02-12T14:15:32.090000
|
||||
CVE-2025-1201,0,0,9013de96c060dac01f3dd28cb24bb7efd9ce2730a40f3d2bb427bc4ce086e7ef,2025-02-18T18:01:07.620000
|
||||
CVE-2025-1202,0,0,145e416d76817c96da29e1ee25f9dd444dc5ef4d95ddc6c06c93503cc4db41a1,2025-02-18T18:02:04.383000
|
||||
CVE-2025-1203,0,0,34455ec817352faef1d2803275dfeff65d4d0b3cf199e494d0d41977b4eb990a,2025-03-24T18:15:22.360000
|
||||
CVE-2025-1203,0,1,f2cbe4d9ffe40b5c9d21320d372187afdf27e726c0bb8950fba8244f09423775,2025-04-08T13:13:35.707000
|
||||
CVE-2025-1204,0,0,1a6a6d6d7e9c4d6739bac4886c5ffe95dd752abb1877293a1f41dffddd75c21f,2025-02-25T17:15:14.057000
|
||||
CVE-2025-1206,0,0,ea94e082f0fb2c3e9cbf9071800bfcaa07133d59e9c405a94dd3f8f199626042,2025-02-20T20:39:04.393000
|
||||
CVE-2025-1207,0,0,7d124cbc886c8b13b8ddd3ab6b7b5525d0938d2d0afc4dcd7d8089b241a520f5,2025-02-12T16:15:44.393000
|
||||
@ -283868,7 +283868,7 @@ CVE-2025-2245,0,0,47aa418e84b3637e8df058444cbc8a6e983fd5867c6c8fc35a1ae9e7ece391
|
||||
CVE-2025-22450,0,0,08efaa8a0b7289f6e07d2143106d9ab0ee4947a312acaf42c999e908a6f4e398,2025-01-22T06:15:14.327000
|
||||
CVE-2025-22452,0,0,ff338c2acc92abbef6e1d867487b0bd2693a0084a4ebaee6adef7d21d7f92aea,2025-04-07T14:17:50.220000
|
||||
CVE-2025-22454,0,0,04f15e88e5a975efe8c2b32608cedcfad6c31392d1260fbd49043c6c8c78ea98,2025-03-11T15:15:44.737000
|
||||
CVE-2025-22457,0,0,a8c6ac00f7a19b689fb44e74a369d2d9a441ce2727c1482a225f467e61dae066,2025-04-08T01:00:02.673000
|
||||
CVE-2025-22457,0,1,06854130f0059ca72764b9c6e13d7893e783ab5e6f2271d978b176c2139c91f1,2025-04-08T13:39:05.933000
|
||||
CVE-2025-22467,0,0,8bd8bd517db848742ab03a7d28d508822057ab7be14ae3f2dcda13c476e2f133,2025-02-20T15:53:06.133000
|
||||
CVE-2025-22472,0,0,da7c2c2731a1940c60b4ae6c1edcbbf175ca5a2d3964a03701282be7a86cbe41,2025-03-17T18:15:20.930000
|
||||
CVE-2025-22473,0,0,24aeaee52dbfb2b3f71ea7cd4512b20455b60139bbfda5acf051e65598986ddc,2025-03-17T18:15:21.077000
|
||||
@ -286127,6 +286127,7 @@ CVE-2025-25675,0,0,c72dca8ea86886a3af81f324f3cf1b0ae0870a19e6aae0e2e014084eb2e1c
|
||||
CVE-2025-25676,0,0,daf85732e597f1793e01b57a88af2ab73ae5e7b139e5e84dbb4cacf83744c130,2025-02-21T18:16:04.577000
|
||||
CVE-2025-25678,0,0,64aaf58170ee4d79f4247ea2c0b96da46219dfaa04983aca5741969381b237f2,2025-02-21T18:16:08.493000
|
||||
CVE-2025-25679,0,0,3cebd49dfacc441892528658235bae2847665b7e89bb57bdaf15bcd2a8d49f09,2025-02-24T18:15:19.213000
|
||||
CVE-2025-2568,1,1,e63a9e1a5153be668a020909330e347014fc2091f50aceab3c0ade02f9bc05ac,2025-04-08T12:15:15.760000
|
||||
CVE-2025-25680,0,0,8919bd2c5780d2fa1291e3679750e4e12f0c9d491f8dd8781fc99e5d4e2ec16e,2025-03-21T21:15:36.390000
|
||||
CVE-2025-25683,0,0,3255bc8ab1d20b4d3f7b9e4f7d5ecc3209c23b4404d764181c9a91c6bf864bb3,2025-03-12T19:15:39.490000
|
||||
CVE-2025-25684,0,0,3b58a1bef0cae9aea4ea5fa2ee9c7e1f876d6c7c88d8df3de973a9b1df4c99cc,2025-03-19T20:15:19.383000
|
||||
@ -286220,7 +286221,7 @@ CVE-2025-25901,0,0,dbbaa66456410cc814c13398a9419347a95d4c008549889e82c9e08064439
|
||||
CVE-2025-25907,0,0,042fa44ae3449a91128a4cfdb3781e1176518918252daa0010b67c1143785aa9,2025-03-11T03:15:39.160000
|
||||
CVE-2025-25908,0,0,fe355032e83d1fcac48ab80d23790fbbd6e28bd9d81eb2d8242e10204ea981e4,2025-03-11T03:15:39.350000
|
||||
CVE-2025-2591,0,0,a1e4a67e01889d41f47571b6e9a1809cdf5b6c98f2756860cfcf5e05b47f2705,2025-03-21T14:15:16.853000
|
||||
CVE-2025-25914,0,0,8f10f68b5ad601ca334924ef18a3f5e524caafa2d515f094f584596ea979480c,2025-04-07T20:31:44.523000
|
||||
CVE-2025-25914,0,1,5f56c66d8de9bee616cb1da5ef251af605f05e5d5c498321787e18b7ebe1d356,2025-04-08T13:41:36.747000
|
||||
CVE-2025-25916,0,0,91ba974117f22dab8d3678a8beecd3ea90efc52e588600708e1af441e5e35add,2025-02-28T16:15:39.867000
|
||||
CVE-2025-2592,0,0,802101c6825ef87ca411ff48e867fc157f089d6dc8c2b07fbcff6e162493f0c0,2025-03-21T14:15:17.037000
|
||||
CVE-2025-25925,0,0,992a4d92cdd1ca6c67a633afcfd4f776b6fb4440a7e0f0b6613ea419786bbe59,2025-03-12T16:15:23.337000
|
||||
@ -287207,8 +287208,8 @@ CVE-2025-28011,0,0,fdcb5591ea26e059e8d35048712169c6e42fd9f817189e1097ee50f0c5ccd
|
||||
CVE-2025-28015,0,0,2ec3b03d6a2c5b451e55cb244fde2066264789b2e32a98f716bffd5d4cc31009,2025-03-28T19:49:16.520000
|
||||
CVE-2025-2803,0,0,e47ecd50bab8435762f20a0360685d74e0ceaca5cc3e5df3e0509ccc4da5c57f,2025-04-01T20:26:30.593000
|
||||
CVE-2025-2804,0,0,920f730e5efd8732e0e5abb52416672a1a115bcae2eab5cbf394b4b15549c65b,2025-03-28T18:11:40.180000
|
||||
CVE-2025-2807,1,1,13a598db827a1b55c2d01d688eae408cbeef468c81f7cf27eaeefd3d38b0e726,2025-04-08T10:15:16.780000
|
||||
CVE-2025-2808,1,1,e7bfb734c1a2ea1587a06fb6b2eabdf9987ab02a2a6212e24d126411d61c6573,2025-04-08T10:15:18.940000
|
||||
CVE-2025-2807,0,0,13a598db827a1b55c2d01d688eae408cbeef468c81f7cf27eaeefd3d38b0e726,2025-04-08T10:15:16.780000
|
||||
CVE-2025-2808,0,0,e7bfb734c1a2ea1587a06fb6b2eabdf9987ab02a2a6212e24d126411d61c6573,2025-04-08T10:15:18.940000
|
||||
CVE-2025-28087,0,0,1a24fc8fa031815998ab3cec95d83c4ceea417049d18cb4b484e469d0233d5a6,2025-04-07T14:22:33.160000
|
||||
CVE-2025-28089,0,0,67dcb00b253159ea36147dba2ae48f5f5632d8f7c0e820c0f6cd1525d263b4dd,2025-04-07T14:20:46.543000
|
||||
CVE-2025-28090,0,0,493fc323568428ac078046a31d0aa0ab344284d8b92655b7299afbb44b2e5613,2025-04-07T14:18:13.877000
|
||||
@ -287278,10 +287279,11 @@ CVE-2025-2868,0,0,85b9dc17660105c1d52e94e9c61b1a822461960fd4e0c0e93de75ddcee9642
|
||||
CVE-2025-2869,0,0,5066d8ca712c82ee845e66f8b1fc3a6c9e0a4e6b74c2b3263804ec9c98b4e586,2025-03-28T18:11:40.180000
|
||||
CVE-2025-2870,0,0,532ce24468347275f11c46ecc24e5d6555c309a32268ad9ae9a421f0ae266a95,2025-03-28T18:11:40.180000
|
||||
CVE-2025-2874,0,0,6a503ede6640ff91644e2f2d002d5c6c981994fafd27ed943d3456640dee218b,2025-04-07T14:18:34.453000
|
||||
CVE-2025-2876,1,1,8a04444f60d0c286f113af81e09efd398da0aec904766cae13c72e9a062c1e16,2025-04-08T12:15:16.820000
|
||||
CVE-2025-2877,0,0,84ec84d2bfb12624c83348efbdfe58ac8be43428be65066c732bbd9fdb6142cb,2025-04-07T16:15:25.720000
|
||||
CVE-2025-2878,0,0,125728ac281a69ac5ecf14e31ba48aa14b6b6ffc7aef5853980db8dfb30bd674,2025-03-28T18:11:40.180000
|
||||
CVE-2025-2882,0,0,37159719a6744bd7c4b3e5214bb194116cb1f154395ebf42cd3293c288a9a410,2025-04-08T08:15:16.860000
|
||||
CVE-2025-2883,1,1,545a7679e9b3c6c1b299cd5e1d8da407be62e3f85141aaa4314765c3b1cf020f,2025-04-08T10:15:19.197000
|
||||
CVE-2025-2883,0,0,545a7679e9b3c6c1b299cd5e1d8da407be62e3f85141aaa4314765c3b1cf020f,2025-04-08T10:15:19.197000
|
||||
CVE-2025-2885,0,0,e2d01fa5043ddafa560e776b063da46f782fa630659191bee2d9e55b0a2acc15,2025-03-28T18:11:40.180000
|
||||
CVE-2025-28855,0,0,75330c0a82318338b0154938e1fd86b9e7a50bcf39b7166c9aad55a9af1a4355,2025-03-27T16:45:27.850000
|
||||
CVE-2025-28856,0,0,db2bbb32cf52cca2ced522652c0571cdcf66f2f5f62f3cd167e79253416a8f6a,2025-03-11T21:15:42.763000
|
||||
@ -287585,15 +287587,15 @@ CVE-2025-2993,0,0,e3a05f1130ad000a2e8949a1f58bab2527b1b4fcefaa78154e627a74dbdd1c
|
||||
CVE-2025-29930,0,0,5c209ec60ca4eeb14d225cb677e5ddb09384395f274bc0cae2e3304b0a41e066,2025-03-18T19:15:51.340000
|
||||
CVE-2025-29932,0,0,4b9314c077daab23a79ad834ada6389de74731b87a8def4d7d8999f0fd1a08b1,2025-03-27T16:45:46.410000
|
||||
CVE-2025-2994,0,0,3998d75b7f0f42041f2d8938e2e7cae9fc19fcfd6624d2244213d422cfb3dff5,2025-04-07T14:38:29.277000
|
||||
CVE-2025-2995,0,0,e694bb93662e3e6bb0f401f6372c51929ff3990a96ab9a67d9309580fd0f358c,2025-04-01T20:26:30.593000
|
||||
CVE-2025-2996,0,0,7bbdd53b483fc5fbc9f485fbcd7ea4957b8c349b8017466a9f0d8bb20d88140c,2025-04-01T20:26:30.593000
|
||||
CVE-2025-2995,0,1,5436a78f06a70eb8d33e1fe2c9cd6f31aabdc45a26a44233afe5c6b73ef22b68,2025-04-08T13:05:30.387000
|
||||
CVE-2025-2996,0,1,ed0c2bf67d75b7c11a9588f001f1b50b2ae957ae2e7644b79be0a93f378f18b1,2025-04-08T13:04:38.877000
|
||||
CVE-2025-2997,0,0,bc69099f8d7511956f428361eaf24eeb839dd67cac5eb37cbb44b2b22459dbf9,2025-04-01T20:26:30.593000
|
||||
CVE-2025-2998,0,0,827aa23e1866da63b394bb2878f39c7208b378e6225cdb1e91f5f1852d0e36c0,2025-04-01T20:26:30.593000
|
||||
CVE-2025-29980,0,0,02b1f4fe8cc2958b2decdcfb4a2e99acadf56a3773103d9215c6253bff189364,2025-03-20T20:15:33.233000
|
||||
CVE-2025-29981,0,0,0cc2dcfb5af6923aabfbdf35cc06825eda3d5f1d817d89ebee60d30dc3aea5db,2025-04-02T14:58:07.527000
|
||||
CVE-2025-29982,0,0,23affa7daecc4825576e77403823b6557774b9426b2d4d0f7cba7e9e66506adc,2025-04-02T14:58:07.527000
|
||||
CVE-2025-29985,1,1,89052bb19c7af55c8aa0a03957e6893eab53a59e520f2de71daaca4dadc653ef,2025-04-08T11:15:42.707000
|
||||
CVE-2025-29986,1,1,4acd386576fc63796eeeeb7ff01e5cdc5814f3dd50f3c5d462bb02ab309f26e7,2025-04-08T11:15:44.033000
|
||||
CVE-2025-29985,0,0,89052bb19c7af55c8aa0a03957e6893eab53a59e520f2de71daaca4dadc653ef,2025-04-08T11:15:42.707000
|
||||
CVE-2025-29986,0,0,4acd386576fc63796eeeeb7ff01e5cdc5814f3dd50f3c5d462bb02ab309f26e7,2025-04-08T11:15:44.033000
|
||||
CVE-2025-29987,0,0,962644397d15823d289c2ad8de7be5eae2dfe8787c0957eaa9f9d8409e9ed1a4,2025-04-07T14:18:34.453000
|
||||
CVE-2025-2999,0,0,81444588dd7906e6c8cac51c6c8e57e7e231b44db369bc45695ecb3a2d560ed4,2025-04-01T20:26:22.890000
|
||||
CVE-2025-29991,0,0,40bf08e0cf4babdcbf62be0cd1c52dbd14323391ac7d7ab9cf689de3abb126a1,2025-04-07T14:18:34.453000
|
||||
@ -287678,7 +287680,7 @@ CVE-2025-30161,0,0,93f02337f899fffc0a069554c6055fbd6fabd15132725d35bb3b73cfadbf6
|
||||
CVE-2025-30162,0,0,8641e47d280f65cb3bb61486e9cfbaa56cd67a484749372cb3bbdafe7ce809ee,2025-03-27T16:45:46.410000
|
||||
CVE-2025-30163,0,0,655322787d885aa61d50ea5e7ecff74dc9237e2c1710cc57eaf106a5eadfb182,2025-03-27T16:45:46.410000
|
||||
CVE-2025-30164,0,0,c838231ddadd650538b91334381739f0e5f84496049f4ab61b98fedaf2408f7b,2025-03-27T16:45:27.850000
|
||||
CVE-2025-30166,1,1,e488d3d7d257df7e5f7a5bae3073f2d1e075901bd28792ff49f682935a366064,2025-04-08T11:15:44.267000
|
||||
CVE-2025-30166,0,0,e488d3d7d257df7e5f7a5bae3073f2d1e075901bd28792ff49f682935a366064,2025-04-08T11:15:44.267000
|
||||
CVE-2025-30168,0,0,650d771cf97916a28afc5f172eb3b832385c1c5e1b844b714aca8ef5a55b9cbc,2025-03-21T15:15:43.440000
|
||||
CVE-2025-3017,0,0,ae6477a257eae8225bc122e9d2ffd840d22d835e0499aad249230b11392c7bd0,2025-04-01T20:26:22.890000
|
||||
CVE-2025-30177,0,0,bc31f6237a8a75bdd9699eb57e1c446258bc4f357acb1c9dcc48b902103b6e3c,2025-04-01T20:26:11.547000
|
||||
@ -288368,7 +288370,7 @@ CVE-2025-31546,0,0,c81be945160530a5d8972f502c8b6dccdcbc4f31426d17fb23e7ca1bda644
|
||||
CVE-2025-31547,0,0,34c1819315aa0af394560d2aea8a2920a9d3d7da1f143da584c8e8a4f22c83cb,2025-04-01T20:26:30.593000
|
||||
CVE-2025-31548,0,0,d1b4214b4f31dcd8a9025f858166713a075840a49164ed00e12986869a0aecde,2025-04-02T14:58:07.527000
|
||||
CVE-2025-31549,0,0,83b4a5c9d8badcd5b96931246bf4796624e241c3b1f405e59a18f12c8a783db6,2025-04-01T20:26:30.593000
|
||||
CVE-2025-3155,0,0,3f7b5f8d08ab088a1e15be062cb74cd7dd4d9668dbb82032ec1d0b05943b204f,2025-04-07T14:18:34.453000
|
||||
CVE-2025-3155,0,1,4c655058ba8507752997992f548ef355bd8a4c2040437a6bcc8ac21390dc4ebb,2025-04-08T13:15:41.573000
|
||||
CVE-2025-31550,0,0,83f208aa53a9d367608231584d9c7b6b24f74f32a0a08dd8a80b85123a4b82ee,2025-04-02T14:58:07.527000
|
||||
CVE-2025-31551,0,0,01a6ff107cfbcc3282db3d6ad9a7d1be104aab604084a23cac69debe8b4c1934,2025-04-02T14:58:07.527000
|
||||
CVE-2025-31552,0,0,acadf09f28068f6285801331d50088e92d056876ddaa343a4a85705dae7fcdc2,2025-04-02T14:58:07.527000
|
||||
@ -288457,7 +288459,7 @@ CVE-2025-3163,0,0,1abd6db1045bbae70669f1f8c9907280a5478489e8b1ebabb8eb88b115451d
|
||||
CVE-2025-3164,0,0,524d9769a71affe8b81690c3ed0b562fd00f5c5232f9c0d91b2d9be6cf9796fb,2025-04-07T14:18:34.453000
|
||||
CVE-2025-3165,0,0,2e02105ce99f3564dd878406ce8c0b7835d84010bc4a7c0c3ba88c3a6192f2c5,2025-04-07T14:18:34.453000
|
||||
CVE-2025-3166,0,0,f93ee5d98274aaf48b0d321ffa90ba737cb5d64397eeed1cfa876157b59d3cfa,2025-04-07T14:18:34.453000
|
||||
CVE-2025-3167,0,0,bd9c89afe51e40001d9fecf9a1da318ca968fce494dd47fa136274010ffe6747,2025-04-07T14:18:34.453000
|
||||
CVE-2025-3167,0,1,b34599c040918980d6f606e5670b68090d1729d06d9c44998cbb7c2b6c7b9e52,2025-04-08T13:50:05.433000
|
||||
CVE-2025-31673,0,0,4d87be6269b25250eebf5a9fce7cb9a2b88c94e00b9796d1018bcbd1dcf3b9cf,2025-04-01T20:26:22.890000
|
||||
CVE-2025-31674,0,0,4c83b8fc56b3a5cdd09f994e999ba9d59f2e5140397359adac70c0dab25f825d,2025-04-03T18:15:47.417000
|
||||
CVE-2025-31675,0,0,49c705166752735d64cb862d463bc2edf7315c17b8526bfff696b889b2b4e1b7,2025-04-01T20:26:22.890000
|
||||
@ -288710,7 +288712,7 @@ CVE-2025-32013,0,0,c2a630586e3eb8d59df4073f809ec2e7f81c5bc7cc9d9bbbdf8f221f6d3ab
|
||||
CVE-2025-32014,0,0,56762cbef9e5296f371a227e3d5a52cd9e157a1f840b6fd7cbb75f28d1fdeb59,2025-04-07T15:15:44.593000
|
||||
CVE-2025-3202,0,0,b5df9a4f10b6a094526640bce151f74d263fe1512b1e3334f9249ec0e5e39a5f,2025-04-07T14:18:15.560000
|
||||
CVE-2025-32029,0,0,8d9488255e68c0b28514f596d0e50e6d91cda4981696c0a5900811d7c043f680,2025-04-07T21:15:42.880000
|
||||
CVE-2025-3203,0,0,8fa48768394bcd70db4b42e0cbf522ee067f4bdfadf116a6b0c16ce5e749253b,2025-04-07T14:18:15.560000
|
||||
CVE-2025-3203,0,1,78b57c278226d9f3a2b475550553a6fb17775b43c46bacbb60b11f6ff85b8c2e,2025-04-08T13:41:35.810000
|
||||
CVE-2025-32030,0,0,6501cbda6f1602cfd9282e8257ed63760701f2685f6445d31ec8f27cc31c7ac2,2025-04-07T21:15:43.037000
|
||||
CVE-2025-32031,0,0,fbce7391a766676a7fa0a4ed2e770435aee21097045cdea7e0749ce233431124,2025-04-07T21:15:43.220000
|
||||
CVE-2025-32032,0,0,d1ecde2a08cd3b8c264c932685f37069a85c50652ba63181ea45821acd643460,2025-04-07T21:15:43.363000
|
||||
@ -289011,5 +289013,5 @@ CVE-2025-3430,0,0,b6c40d6b0ef3c8648892c15b77657ef236c19f9740d69b867859874e4fc547
|
||||
CVE-2025-3431,0,0,e670e7d054e601025cf0eb72b723d5b37fb9fbb720309197877ef8f8d03470f7,2025-04-08T08:15:18.447000
|
||||
CVE-2025-3432,0,0,2bf3e23b6bedbebc6bd8cdc2583c4de94eee07f3a92d57f813cb35a4cfad2133,2025-04-08T09:15:28.630000
|
||||
CVE-2025-3433,0,0,c3110812ae023f72ad64a55b3ad2c3c0f766c027fee5bad7535d072d777395fa,2025-04-08T09:15:28.943000
|
||||
CVE-2025-3436,0,1,9f90f52a69532e8408936e7cbb7e0f366cbd02a815f6e064670c79628bd8cc03,2025-04-08T09:15:29.300000
|
||||
CVE-2025-3437,1,1,6875252e368ccc0365c18def92525cae93bda325f2d7ee4896a66443f4d3e9bf,2025-04-08T10:15:19.413000
|
||||
CVE-2025-3436,0,0,9f90f52a69532e8408936e7cbb7e0f366cbd02a815f6e064670c79628bd8cc03,2025-04-08T09:15:29.300000
|
||||
CVE-2025-3437,0,0,6875252e368ccc0365c18def92525cae93bda325f2d7ee4896a66443f4d3e9bf,2025-04-08T10:15:19.413000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user