mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-07 19:16:29 +00:00
Auto-Update: 2025-03-04T07:00:20.632914+00:00
This commit is contained in:
parent
03529fb78d
commit
e96ffcdf5b
21
CVE-2024/CVE-2024-136xx/CVE-2024-13685.json
Normal file
21
CVE-2024/CVE-2024-136xx/CVE-2024-13685.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-13685",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2025-03-04T06:15:27.240",
|
||||
"lastModified": "2025-03-04T06:15:27.240",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Admin and Site Enhancements (ASE) WordPress plugin before 7.6.10 retrieves client IP addresses from potentially untrusted headers, allowing an attacker to manipulate their value to bypass the login limit feature in the Admin and Site Enhancements (ASE) WordPress plugin before 7.6.10."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/72c61904-253d-42d1-9edd-7ea2162a2f85/",
|
||||
"source": "contact@wpscan.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-472xx/CVE-2024-47259.json
Normal file
56
CVE-2024/CVE-2024-472xx/CVE-2024-47259.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-47259",
|
||||
"sourceIdentifier": "product-security@axis.com",
|
||||
"published": "2025-03-04T06:15:29.190",
|
||||
"lastModified": "2025-03-04T06:15:29.190",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Girishunawane, member of the AXIS OS Bug Bounty Program, has found that the VAPIX API dynamicoverlay.cgi did not have a sufficient input validation allowing for a possible command injection leading to being able to transfer files to the Axis device with the purpose to exhaust system resources. \nAxis has released patched AXIS OS versions for the highlighted flaw. Please refer to the Axis security advisory for more information and solution."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "product-security@axis.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:N",
|
||||
"baseScore": 3.5,
|
||||
"baseSeverity": "LOW",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "product-security@axis.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-434"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.axis.com/dam/public/13/cd/4a/cve-2024-47259pdf-en-US-466882.pdf",
|
||||
"source": "product-security@axis.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-472xx/CVE-2024-47260.json
Normal file
56
CVE-2024/CVE-2024-472xx/CVE-2024-47260.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-47260",
|
||||
"sourceIdentifier": "product-security@axis.com",
|
||||
"published": "2025-03-04T06:15:29.710",
|
||||
"lastModified": "2025-03-04T06:15:29.710",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "51l3nc3, member of the AXIS OS Bug Bounty Program, has found that the VAPIX API mediaclip.cgi did not have a sufficient input validation allowing for uploading more audio clips then designed resulting in the Axis device running out of memory.\u00a0\nAxis has released patched AXIS OS versions for the highlighted flaw. Please refer to the Axis security advisory for more information and solution."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "product-security@axis.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "product-security@axis.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-641"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.axis.com/dam/public/1d/d3/ef/cve-2024-47260pdf-en-US-466883.pdf",
|
||||
"source": "product-security@axis.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-472xx/CVE-2024-47262.json
Normal file
56
CVE-2024/CVE-2024-472xx/CVE-2024-47262.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-47262",
|
||||
"sourceIdentifier": "product-security@axis.com",
|
||||
"published": "2025-03-04T06:15:29.867",
|
||||
"lastModified": "2025-03-04T06:15:29.867",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Dzmitry Lukyanenka, member of the AXIS OS Bug Bounty Program, has found that the VAPIX API param.cgi was vulnerable to a race condition attack allowing for an attacker to block access to the web interface of the Axis device. Other API endpoints or services not making use of param.cgi are not affected. \nAxis has released patched AXIS OS versions for the highlighted flaw. Please refer to the Axis security advisory for more information and solution."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "product-security@axis.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "product-security@axis.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-1287"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.axis.com/dam/public/a3/18/6e/cve-2024-47262pdf-en-US-466884.pdf",
|
||||
"source": "product-security@axis.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2025/CVE-2025-03xx/CVE-2025-0359.json
Normal file
56
CVE-2025/CVE-2025-03xx/CVE-2025-0359.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-0359",
|
||||
"sourceIdentifier": "product-security@axis.com",
|
||||
"published": "2025-03-04T06:15:30.023",
|
||||
"lastModified": "2025-03-04T06:15:30.023",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "During an annual penetration test conducted on behalf of Axis Communication, Truesec discovered a flaw in the ACAP Application framework that allowed applications to access restricted D-Bus methods within the framework. \nAxis has released patched AXIS OS versions for the highlighted flaw. Please refer to the Axis security advisory for more information and solution."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "product-security@axis.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:H/A:L",
|
||||
"baseScore": 8.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.5,
|
||||
"impactScore": 5.3
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "product-security@axis.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-863"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.axis.com/dam/public/68/08/c5/cve-2025-0359pdf-en-US-466885.pdf",
|
||||
"source": "product-security@axis.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2025/CVE-2025-03xx/CVE-2025-0360.json
Normal file
56
CVE-2025/CVE-2025-03xx/CVE-2025-0360.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-0360",
|
||||
"sourceIdentifier": "product-security@axis.com",
|
||||
"published": "2025-03-04T06:15:30.180",
|
||||
"lastModified": "2025-03-04T06:15:30.180",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "During an annual penetration test conducted on behalf of Axis Communication, Truesec discovered a flaw in the VAPIX Device Configuration framework that could lead to an incorrect user privilege level in the VAPIX service account D-Bus API."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "product-security@axis.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "product-security@axis.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-863"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.axis.com/dam/public/b1/fe/46/cve-2025-0360pdf-en-US-466887.pdf",
|
||||
"source": "product-security@axis.com"
|
||||
}
|
||||
]
|
||||
}
|
64
CVE-2025/CVE-2025-13xx/CVE-2025-1306.json
Normal file
64
CVE-2025/CVE-2025-13xx/CVE-2025-1306.json
Normal file
@ -0,0 +1,64 @@
|
||||
{
|
||||
"id": "CVE-2025-1306",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2025-03-04T05:15:13.590",
|
||||
"lastModified": "2025-03-04T05:15:13.590",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Newscrunch theme for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.8.4. This is due to missing or incorrect nonce validation on the newscrunch_install_and_activate_plugin() function. This makes it possible for unauthenticated attackers to upload arbitrary files via a forged request granted they can trick a site administrator into performing an action such as clicking on a link."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://themes.trac.wordpress.org/browser/newscrunch/1.8.3/functions.php#L486",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://themes.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=261789%40newscrunch&new=261789%40newscrunch&sfp_email=&sfph_mail=",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/1c507681-61e9-4bf0-8fe5-e2f401a7a8be?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
64
CVE-2025/CVE-2025-13xx/CVE-2025-1307.json
Normal file
64
CVE-2025/CVE-2025-13xx/CVE-2025-1307.json
Normal file
@ -0,0 +1,64 @@
|
||||
{
|
||||
"id": "CVE-2025-1307",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2025-03-04T05:15:14.233",
|
||||
"lastModified": "2025-03-04T05:15:14.233",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Newscrunch theme for WordPress is vulnerable to arbitrary file uploads due to a missing capability check in the newscrunch_install_and_activate_plugin() function in all versions up to, and including, 1.8.4.1. This makes it possible for authenticated attackers, with Subscriber-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://themes.trac.wordpress.org/browser/newscrunch/1.8.3/functions.php#L486",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://themes.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=261789%40newscrunch&new=261789%40newscrunch&sfp_email=&sfph_mail=",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/b55567e9-24e6-4738-b7f7-b95b541e6067?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
145
CVE-2025/CVE-2025-19xx/CVE-2025-1904.json
Normal file
145
CVE-2025/CVE-2025-19xx/CVE-2025-1904.json
Normal file
@ -0,0 +1,145 @@
|
||||
{
|
||||
"id": "CVE-2025-1904",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-03-04T05:15:14.440",
|
||||
"lastModified": "2025-03-04T05:15:14.440",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability, which was classified as problematic, has been found in code-projects Blood Bank System 1.0. Affected by this issue is some unknown functionality of the file /Blood/A+.php. The manipulation of the argument Availibility leads to cross site scripting. The attack may be launched remotely."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 5.1,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "PASSIVE",
|
||||
"vulnConfidentialityImpact": "NONE",
|
||||
"vulnIntegrityImpact": "LOW",
|
||||
"vulnAvailabilityImpact": "NONE",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
|
||||
"baseScore": 3.5,
|
||||
"baseSeverity": "LOW",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
|
||||
"baseScore": 4.0,
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 2.9,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-94"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://code-projects.org/",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/lokihardk/cve/blob/main/xss-2_25.md",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.298424",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.298424",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.506868",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
145
CVE-2025/CVE-2025-19xx/CVE-2025-1905.json
Normal file
145
CVE-2025/CVE-2025-19xx/CVE-2025-1905.json
Normal file
@ -0,0 +1,145 @@
|
||||
{
|
||||
"id": "CVE-2025-1905",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-03-04T05:15:14.680",
|
||||
"lastModified": "2025-03-04T05:15:14.680",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability, which was classified as problematic, was found in SourceCodester Employee Management System 1.0. This affects an unknown part of the file employee.php. The manipulation of the argument Full Name leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 5.1,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "PASSIVE",
|
||||
"vulnConfidentialityImpact": "NONE",
|
||||
"vulnIntegrityImpact": "LOW",
|
||||
"vulnAvailabilityImpact": "NONE",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
|
||||
"baseScore": 3.5,
|
||||
"baseSeverity": "LOW",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
|
||||
"baseScore": 4.0,
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 2.9,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-94"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/sorcha-l/cve/blob/main/Employee%20Management%20System%20by%20rems%20has%20xss.md",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.298425",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.298425",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.508301",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.sourcecodester.com/",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
145
CVE-2025/CVE-2025-19xx/CVE-2025-1906.json
Normal file
145
CVE-2025/CVE-2025-19xx/CVE-2025-1906.json
Normal file
@ -0,0 +1,145 @@
|
||||
{
|
||||
"id": "CVE-2025-1906",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-03-04T05:15:14.903",
|
||||
"lastModified": "2025-03-04T05:15:14.903",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability has been found in PHPGurukul Restaurant Table Booking System 1.0 and classified as critical. This vulnerability affects unknown code of the file /admin/profile.php. The manipulation of the argument mobilenumber leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 5.1,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "LOW",
|
||||
"vulnIntegrityImpact": "LOW",
|
||||
"vulnAvailabilityImpact": "LOW",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L",
|
||||
"baseScore": 4.7,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:M/C:P/I:P/A:P",
|
||||
"baseScore": 5.8,
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "MULTIPLE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL"
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 6.4,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-74"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/HaroldFinch-L/CVE/issues/2",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://phpgurukul.com/",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.298426",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.298426",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.508915",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
44
README.md
44
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2025-03-04T05:00:20.588431+00:00
|
||||
2025-03-04T07:00:20.632914+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2025-03-04T04:15:15.940000+00:00
|
||||
2025-03-04T06:15:30.180000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,38 +33,24 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
284022
|
||||
284033
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `35`
|
||||
Recently added CVEs: `11`
|
||||
|
||||
- [CVE-2025-20011](CVE-2025/CVE-2025-200xx/CVE-2025-20011.json) (`2025-03-04T04:15:12.563`)
|
||||
- [CVE-2025-20021](CVE-2025/CVE-2025-200xx/CVE-2025-20021.json) (`2025-03-04T04:15:12.703`)
|
||||
- [CVE-2025-20024](CVE-2025/CVE-2025-200xx/CVE-2025-20024.json) (`2025-03-04T04:15:12.840`)
|
||||
- [CVE-2025-20042](CVE-2025/CVE-2025-200xx/CVE-2025-20042.json) (`2025-03-04T04:15:12.970`)
|
||||
- [CVE-2025-20081](CVE-2025/CVE-2025-200xx/CVE-2025-20081.json) (`2025-03-04T04:15:13.120`)
|
||||
- [CVE-2025-20091](CVE-2025/CVE-2025-200xx/CVE-2025-20091.json) (`2025-03-04T04:15:13.253`)
|
||||
- [CVE-2025-20626](CVE-2025/CVE-2025-206xx/CVE-2025-20626.json) (`2025-03-04T04:15:13.393`)
|
||||
- [CVE-2025-21084](CVE-2025/CVE-2025-210xx/CVE-2025-21084.json) (`2025-03-04T04:15:13.537`)
|
||||
- [CVE-2025-21089](CVE-2025/CVE-2025-210xx/CVE-2025-21089.json) (`2025-03-04T04:15:13.680`)
|
||||
- [CVE-2025-21097](CVE-2025/CVE-2025-210xx/CVE-2025-21097.json) (`2025-03-04T04:15:13.813`)
|
||||
- [CVE-2025-21098](CVE-2025/CVE-2025-210xx/CVE-2025-21098.json) (`2025-03-04T04:15:13.953`)
|
||||
- [CVE-2025-22443](CVE-2025/CVE-2025-224xx/CVE-2025-22443.json) (`2025-03-04T04:15:14.097`)
|
||||
- [CVE-2025-22835](CVE-2025/CVE-2025-228xx/CVE-2025-22835.json) (`2025-03-04T04:15:14.250`)
|
||||
- [CVE-2025-22837](CVE-2025/CVE-2025-228xx/CVE-2025-22837.json) (`2025-03-04T04:15:14.387`)
|
||||
- [CVE-2025-22841](CVE-2025/CVE-2025-228xx/CVE-2025-22841.json) (`2025-03-04T04:15:14.530`)
|
||||
- [CVE-2025-22847](CVE-2025/CVE-2025-228xx/CVE-2025-22847.json) (`2025-03-04T04:15:14.663`)
|
||||
- [CVE-2025-22897](CVE-2025/CVE-2025-228xx/CVE-2025-22897.json) (`2025-03-04T04:15:14.807`)
|
||||
- [CVE-2025-23234](CVE-2025/CVE-2025-232xx/CVE-2025-23234.json) (`2025-03-04T04:15:14.953`)
|
||||
- [CVE-2025-23240](CVE-2025/CVE-2025-232xx/CVE-2025-23240.json) (`2025-03-04T04:15:15.097`)
|
||||
- [CVE-2025-23409](CVE-2025/CVE-2025-234xx/CVE-2025-23409.json) (`2025-03-04T04:15:15.240`)
|
||||
- [CVE-2025-23414](CVE-2025/CVE-2025-234xx/CVE-2025-23414.json) (`2025-03-04T04:15:15.377`)
|
||||
- [CVE-2025-23418](CVE-2025/CVE-2025-234xx/CVE-2025-23418.json) (`2025-03-04T04:15:15.523`)
|
||||
- [CVE-2025-23420](CVE-2025/CVE-2025-234xx/CVE-2025-23420.json) (`2025-03-04T04:15:15.657`)
|
||||
- [CVE-2025-24301](CVE-2025/CVE-2025-243xx/CVE-2025-24301.json) (`2025-03-04T04:15:15.803`)
|
||||
- [CVE-2025-24309](CVE-2025/CVE-2025-243xx/CVE-2025-24309.json) (`2025-03-04T04:15:15.940`)
|
||||
- [CVE-2024-13685](CVE-2024/CVE-2024-136xx/CVE-2024-13685.json) (`2025-03-04T06:15:27.240`)
|
||||
- [CVE-2024-47259](CVE-2024/CVE-2024-472xx/CVE-2024-47259.json) (`2025-03-04T06:15:29.190`)
|
||||
- [CVE-2024-47260](CVE-2024/CVE-2024-472xx/CVE-2024-47260.json) (`2025-03-04T06:15:29.710`)
|
||||
- [CVE-2024-47262](CVE-2024/CVE-2024-472xx/CVE-2024-47262.json) (`2025-03-04T06:15:29.867`)
|
||||
- [CVE-2025-0359](CVE-2025/CVE-2025-03xx/CVE-2025-0359.json) (`2025-03-04T06:15:30.023`)
|
||||
- [CVE-2025-0360](CVE-2025/CVE-2025-03xx/CVE-2025-0360.json) (`2025-03-04T06:15:30.180`)
|
||||
- [CVE-2025-1306](CVE-2025/CVE-2025-13xx/CVE-2025-1306.json) (`2025-03-04T05:15:13.590`)
|
||||
- [CVE-2025-1307](CVE-2025/CVE-2025-13xx/CVE-2025-1307.json) (`2025-03-04T05:15:14.233`)
|
||||
- [CVE-2025-1904](CVE-2025/CVE-2025-19xx/CVE-2025-1904.json) (`2025-03-04T05:15:14.440`)
|
||||
- [CVE-2025-1905](CVE-2025/CVE-2025-19xx/CVE-2025-1905.json) (`2025-03-04T05:15:14.680`)
|
||||
- [CVE-2025-1906](CVE-2025/CVE-2025-19xx/CVE-2025-1906.json) (`2025-03-04T05:15:14.903`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
81
_state.csv
81
_state.csv
@ -247601,7 +247601,8 @@ CVE-2024-13680,0,0,74b46f50e9e8190b451f914492933fe4a5d6196724bd1fb0611ec5e03b0be
|
||||
CVE-2024-13681,0,0,f9b5888e5600eddb54eab02d107b8219d0a2ff1dd821d3ec69a804f466f47fda,2025-02-21T14:22:38.737000
|
||||
CVE-2024-13683,0,0,60466d727e6596c848a3b384eab039ecd16e7bfc142b0f259b6e51a93695759b,2025-02-05T17:18:36.090000
|
||||
CVE-2024-13684,0,0,29bd0282adaed7c145caec3d49c703050082025937ad2fcfe46d4b20fa2f4a61,2025-02-21T15:57:57.993000
|
||||
CVE-2024-13686,1,1,4691e12d5168bb7d67360fcc2a73944d7fa732d6ecc8775af952ebb6f3141b5d,2025-03-04T04:15:11.070000
|
||||
CVE-2024-13685,1,1,03de3c2f4567b362885b87939b3221f81be18564e943cae2676e8a3616a94948,2025-03-04T06:15:27.240000
|
||||
CVE-2024-13686,0,0,4691e12d5168bb7d67360fcc2a73944d7fa732d6ecc8775af952ebb6f3141b5d,2025-03-04T04:15:11.070000
|
||||
CVE-2024-13687,0,0,8a954d90e2ecf3e0bfefe90b1ebf331e7dcd9b3ff81bc3892382c9536696e182,2025-02-21T16:00:16.287000
|
||||
CVE-2024-13689,0,0,41b530aa4ba65a02f514116414a57fc5db58dbb6ffe52efa3c6202ae2808e2eb,2025-02-18T15:15:15.547000
|
||||
CVE-2024-1369,0,0,6f4848b431d59906fc570cd21627f350db35226c120e93c5a8a911f55c4de4fa,2024-11-21T08:50:25.857000
|
||||
@ -269153,7 +269154,10 @@ CVE-2024-47255,0,0,ee701a38d60abc2f20bd1d451be45a629b86833aefda6f8e361d6c4f9004e
|
||||
CVE-2024-47256,0,0,4301094a6476a5380c4c5aae0b9d93aa83f68d1387f6e04d900365697aaa867a,2025-02-21T13:15:11.207000
|
||||
CVE-2024-47257,0,0,25b7637c67a9d4ed1044dbe0e4e54d94537d623f9f8ff95f637768d659647510,2024-11-29T06:15:07.170000
|
||||
CVE-2024-47258,0,0,9a4a5c7393716979191d8b2658cfc20c67a5be5e7a582de99084d292c7b321b8,2025-02-21T13:15:11.300000
|
||||
CVE-2024-47259,1,1,0c24dadc9acbe950b47a2a966d90c2b961a7689f983ad36b33d4cf1393b2caa6,2025-03-04T06:15:29.190000
|
||||
CVE-2024-4726,0,0,1c18580068aa06c19f8d582895fda7543593a552999763ed068e65be081d2ec9,2025-02-19T18:33:05.473000
|
||||
CVE-2024-47260,1,1,58c9b143a3491f881b27c75a0cebe3e5648a11b2fb790b0f69647ca922161b3e,2025-03-04T06:15:29.710000
|
||||
CVE-2024-47262,1,1,12e60decbe92c983d0bd4efbd2ac4f87b2841434d278283df9d1079d5044e488,2025-03-04T06:15:29.867000
|
||||
CVE-2024-47264,0,0,d54fe244881b7e5c414df0af4606542f59c360dc75511e77f72d84fc11d1faed,2025-02-18T18:15:24.630000
|
||||
CVE-2024-47265,0,0,8efdd4318786503cf0f39cc0c8ad040b17c802a2f969a2910ba793ae4b4f6dc6,2025-02-13T15:15:19.600000
|
||||
CVE-2024-47266,0,0,90cb14c9aceeed35d9c240ff0c2975561e1a5559a7d8f6e46559ec80407f7fd4,2025-02-13T07:15:10.383000
|
||||
@ -280130,6 +280134,8 @@ CVE-2025-0354,0,0,55d23a0a87a8729e983746f1f043f903439316639d87df33d11e2f4253dd49
|
||||
CVE-2025-0355,0,0,60139aab38184d5553deea3c96ee67451ff405f2b0f65acb32b8c01c91586866,2025-01-21T04:15:07.877000
|
||||
CVE-2025-0356,0,0,7e522859a3d0689ccb777c8fef64a1b2b2f878cb4a2c9cceba026470a39874f6,2025-02-17T10:15:08.973000
|
||||
CVE-2025-0357,0,0,0ae647dab29c7a227a1c7ef392ca808faddaedd9823b613fe8bd7952dd9efb7a,2025-01-25T02:15:26.990000
|
||||
CVE-2025-0359,1,1,a8b9f71317bbd31b8acc25e76b447b373672102c20d6b40a65f8bb1cb7b008ed,2025-03-04T06:15:30.023000
|
||||
CVE-2025-0360,1,1,6257e8ae0cf638e78f20fda6cb79099a2705eecfd085eac3a721f563b42934cb,2025-03-04T06:15:30.180000
|
||||
CVE-2025-0364,0,0,d86e1de6aeb2da3860f3a6864380bb4611cec9a62b9db022fce493a15089702c,2025-02-28T20:15:46.323000
|
||||
CVE-2025-0365,0,0,1b8565779f76dbc2dcd5a3d916c320dbd38623a9ae7b55c218867abc471d9737,2025-02-24T15:56:57.453000
|
||||
CVE-2025-0366,0,0,920cbf026bda2b01c51576327bc7f0315b5ccf05dfdbae1172aca359c4e3431e,2025-02-24T15:56:36.713000
|
||||
@ -280298,7 +280304,7 @@ CVE-2025-0583,0,0,3309be0bd9417030616155e70103c52eaa78dc57edd605475e0a342fdeb599
|
||||
CVE-2025-0584,0,0,b6ebfcb7703542335a8173fc5a4ab8c33a7e3e0c6c92bba5dc58412b0c892d56,2025-01-20T03:15:09.120000
|
||||
CVE-2025-0585,0,0,119134bf231d480ab92b157699965013bafbfc56920a2e232ae3b58aecfc3ffd,2025-01-20T03:15:09.283000
|
||||
CVE-2025-0586,0,0,c173218ec5f02f93feb0d4cf939be10f56c7035ad9f75a3f6402979497f3b437,2025-01-20T03:15:09.433000
|
||||
CVE-2025-0587,1,1,23ce5eee650538bc74a103f6c2cf53486587001e14603c6d3aa60a954275c59d,2025-03-04T04:15:11.240000
|
||||
CVE-2025-0587,0,0,23ce5eee650538bc74a103f6c2cf53486587001e14603c6d3aa60a954275c59d,2025-03-04T04:15:11.240000
|
||||
CVE-2025-0588,0,0,105c6e2f1707afb6fe1d795e929817750010d681e996f4066665b271dfe4e5c8,2025-02-11T15:15:19.673000
|
||||
CVE-2025-0589,0,0,b8e8405a2d4c9e015de1ea53fbbafdf6cbc934d741c73f04d4cecba6da66759b,2025-02-11T16:15:49.667000
|
||||
CVE-2025-0590,0,0,d81cd8b36faa71d41ba820106853d8f1ea4eee3f00df9dab8137d82c49b237d6,2025-02-18T20:15:23.477000
|
||||
@ -280483,7 +280489,7 @@ CVE-2025-0908,0,0,d299598e6a9f28ce78543471bc7557b8f443bf108ba075d719a9c0a22f15b6
|
||||
CVE-2025-0909,0,0,1ff7d78519026d4b0df5324b5b84f781600c6266238b96b6e6fda4fafcd94e70,2025-02-12T18:59:31.043000
|
||||
CVE-2025-0910,0,0,5441c161f7257bb6355c09b7b0bb2df312d9b6c6d59e58e837649ec8c68777c9,2025-02-12T18:59:18.447000
|
||||
CVE-2025-0911,0,0,b9aa939093c00e0782e255aa47e49c2cf1d4559eb848b6a9c47f1e00b8bd8fad,2025-02-12T19:00:17
|
||||
CVE-2025-0912,1,1,7d91fe8bdf75dc10fc3a6ee045af78f6d8511b1dffa7e9ab755c8337b5808dd8,2025-03-04T04:15:11.390000
|
||||
CVE-2025-0912,0,0,7d91fe8bdf75dc10fc3a6ee045af78f6d8511b1dffa7e9ab755c8337b5808dd8,2025-03-04T04:15:11.390000
|
||||
CVE-2025-0914,0,0,9e1fc990beb9632007c48895ab7342f6dbef3aadc843d2d68815604598633e4c,2025-02-27T16:15:38.237000
|
||||
CVE-2025-0916,0,0,b3e2dfc1a782ae4e58fd745e6dc8ce9f3019ca5ca64e71e978c066cc4fb2d49f,2025-02-25T20:19:48.457000
|
||||
CVE-2025-0918,0,0,bf7ea5d39eee8251bb807510dd4b154e6c47cd25d1f1b7d645bbb739c9503983,2025-02-22T13:15:11.687000
|
||||
@ -280711,8 +280717,10 @@ CVE-2025-1295,0,0,24bdaaeb758634ffe52b87573cb2760c08e1a07ac9682ba1ed20b65d22033c
|
||||
CVE-2025-1298,0,0,46bbd0640b99e3a8c29a7cfa1112effb80548c1779a987abd8d49502f38fdf00,2025-02-18T15:15:18.007000
|
||||
CVE-2025-1300,0,0,8af8030eda5bcffd3329ecb9ab76f19bacf9a248f66c16097998067a1fef5ddf,2025-02-28T13:15:27.043000
|
||||
CVE-2025-1302,0,0,4c600c674f22378513ee28ce145975f04e5b0e89605ff80d937b77394d750b70,2025-02-15T05:15:11.683000
|
||||
CVE-2025-1306,1,1,c815f9214bfa0f9103e9c9589a2152e369fe587367a69e9ba80dc350749ba81b,2025-03-04T05:15:13.590000
|
||||
CVE-2025-1307,1,1,772431524fea13dc6d4f62c6ce6ee7e302de8db818ceb219340d02b934bfb44b,2025-03-04T05:15:14.233000
|
||||
CVE-2025-1319,0,0,5e2010b65b7a6bd1939d4ac58e8aeeec8f3a828211b9c76b062b0f9265a18963,2025-02-28T13:15:27.267000
|
||||
CVE-2025-1321,1,1,fe193fa44353594440aac216be48f78f1d1914788baa79c358bb03fb8eb369f9,2025-03-04T04:15:11.547000
|
||||
CVE-2025-1321,0,0,fe193fa44353594440aac216be48f78f1d1914788baa79c358bb03fb8eb369f9,2025-03-04T04:15:11.547000
|
||||
CVE-2025-1328,0,0,e2b9ad996048bde72d17ec9a6affa826b875b275e51ef749199b511eae0ab088,2025-02-25T18:03:46.410000
|
||||
CVE-2025-1332,0,0,04253da72e8edd91cac77b4f2ad8533b669f4d496d09ec3f2573f85295be125b,2025-02-16T01:15:20.440000
|
||||
CVE-2025-1335,0,0,bb409ff99c8e3378896a9535373b62c93c367d19339145f6746127b81b9cf3e2,2025-02-28T19:47:07.220000
|
||||
@ -280850,7 +280858,7 @@ CVE-2025-1629,0,0,98e40b68e5632eb91f4db527ca6594bcd0a0e66070641abd7d2f14eb9bdef0
|
||||
CVE-2025-1632,0,0,28fe99b7a4053d94bf92a115fabddf2bf6f2fcf0d6264d4d013a0dc1f70735ec,2025-02-24T15:15:13.217000
|
||||
CVE-2025-1634,0,0,4cd063c32518b09ae8b07ad657bad146c97cc4d931f5189e3d631a7cc1d23de7,2025-03-03T14:15:34.237000
|
||||
CVE-2025-1638,0,0,73f08267213d85fae6cfc79fe8ee252b893947fe65424e2f84e6465aca895ec5,2025-03-01T08:15:34.167000
|
||||
CVE-2025-1639,1,1,5303a0c80213944ee87437e0d453dd5a13f420bef52e515a9556f6a6ccdc836b,2025-03-04T04:15:11.697000
|
||||
CVE-2025-1639,0,0,5303a0c80213944ee87437e0d453dd5a13f420bef52e515a9556f6a6ccdc836b,2025-03-04T04:15:11.697000
|
||||
CVE-2025-1640,0,0,a0f8f210f37587375db5b38f353b81a59e9ce28e661d11d8fbd0998061d8e8e7,2025-02-28T01:55:41.530000
|
||||
CVE-2025-1641,0,0,298e7bd3f12e0ff5b9a9caf6661079e526cc4d770741d969c699c4454e05db34,2025-02-28T01:55:41.530000
|
||||
CVE-2025-1642,0,0,33d55f220307ffb92ee160bb35401cd9d8f51dff5d5fa56b0deb6dbdc0aebe78,2025-02-28T01:55:41.530000
|
||||
@ -280980,20 +280988,23 @@ CVE-2025-1895,0,0,f7fdb5ea44d811a741cda1ad116677cd04f10a970b0ce5da888f126de44023
|
||||
CVE-2025-1896,0,0,d6468fd7c73c75a3b36bb29f1c2fee1b2fb32ea5a7c8aea8e3f379d9e7426436,2025-03-04T02:15:36.340000
|
||||
CVE-2025-1897,0,0,ef6eeecac44103a3a11c26621ef98dac5d2bbb27b9150790aed2c97e99413493,2025-03-04T02:15:36.513000
|
||||
CVE-2025-1898,0,0,6dd4f4dd3867537e2273be7442c60d9cdb3ccf4846f81ef9fd2704d9557f1c1e,2025-03-04T02:15:36.680000
|
||||
CVE-2025-1899,1,1,24ac0955bb8ab305b10d11752dd11577ff372d3c64c52ac3f3dc346b3a4f860a,2025-03-04T03:15:08.970000
|
||||
CVE-2025-1900,1,1,56495ed13bfaa437b11956412ae3622f0f7e022503c4516e140801944af10308,2025-03-04T04:15:11.853000
|
||||
CVE-2025-1901,1,1,f5888ab7c140e56993335d3850c5a603cb408753be3d9e12594cb142bda21c0b,2025-03-04T04:15:12.030000
|
||||
CVE-2025-1902,1,1,471c441de14373e77348d0bbdc653bd5f8e13826241da34d0938b9485f96b4a8,2025-03-04T04:15:12.210000
|
||||
CVE-2025-1903,1,1,ad39b59b593243038c6c2b3182d79a3798b1c4d73d43fb52278944b750429807,2025-03-04T04:15:12.383000
|
||||
CVE-2025-20011,1,1,5d2fdc5455e5c161d4353b8b7d096a2e122865a9c5759753d2f12b06ccf9a6a1,2025-03-04T04:15:12.563000
|
||||
CVE-2025-1899,0,0,24ac0955bb8ab305b10d11752dd11577ff372d3c64c52ac3f3dc346b3a4f860a,2025-03-04T03:15:08.970000
|
||||
CVE-2025-1900,0,0,56495ed13bfaa437b11956412ae3622f0f7e022503c4516e140801944af10308,2025-03-04T04:15:11.853000
|
||||
CVE-2025-1901,0,0,f5888ab7c140e56993335d3850c5a603cb408753be3d9e12594cb142bda21c0b,2025-03-04T04:15:12.030000
|
||||
CVE-2025-1902,0,0,471c441de14373e77348d0bbdc653bd5f8e13826241da34d0938b9485f96b4a8,2025-03-04T04:15:12.210000
|
||||
CVE-2025-1903,0,0,ad39b59b593243038c6c2b3182d79a3798b1c4d73d43fb52278944b750429807,2025-03-04T04:15:12.383000
|
||||
CVE-2025-1904,1,1,c3f8c1fa1d9579c4d82bc617eae230933b987e0aaee6ca3786c17750a6074cf8,2025-03-04T05:15:14.440000
|
||||
CVE-2025-1905,1,1,544d2a978ea2a42a58a9b1374a4628e0334caacaa4fa4d5b01db57902479138d,2025-03-04T05:15:14.680000
|
||||
CVE-2025-1906,1,1,459dada4012727e3771610e3a7119b7d5a5efce1dfb2febc2be2da9752686a5c,2025-03-04T05:15:14.903000
|
||||
CVE-2025-20011,0,0,5d2fdc5455e5c161d4353b8b7d096a2e122865a9c5759753d2f12b06ccf9a6a1,2025-03-04T04:15:12.563000
|
||||
CVE-2025-20014,0,0,f4fd1db051e4652a5d7e7863a21c37faec75062d4b5ce0e4f2c6bffc2f3ee854,2025-01-29T20:15:35.207000
|
||||
CVE-2025-20016,0,0,6fccb84eb01c2cd66b422e82777f9738bfe5004121e1b551d0ae454724543c0e,2025-01-14T10:15:07.500000
|
||||
CVE-2025-20021,1,1,66a94e623e1723d00944dbd9310096e4ff5e82a401f26bfed91397ed39eb53b4,2025-03-04T04:15:12.703000
|
||||
CVE-2025-20024,1,1,0159949bdab7327d63f433619bdc4be1d3e6fa1fa50f03655303b722c242b1e6,2025-03-04T04:15:12.840000
|
||||
CVE-2025-20021,0,0,66a94e623e1723d00944dbd9310096e4ff5e82a401f26bfed91397ed39eb53b4,2025-03-04T04:15:12.703000
|
||||
CVE-2025-20024,0,0,0159949bdab7327d63f433619bdc4be1d3e6fa1fa50f03655303b722c242b1e6,2025-03-04T04:15:12.840000
|
||||
CVE-2025-20029,0,0,d9e3ca63dc18f9436b5043ebae0bcb543cc6452f75921963fed59e1df065c2d7,2025-02-05T18:15:29.573000
|
||||
CVE-2025-20033,0,0,6c60c85e451f1d6db70378d678ddf83dacc7c823ecfb493748ed6d94114eff49,2025-01-09T07:15:28.450000
|
||||
CVE-2025-20036,0,0,a1d7639f0e568c5953a2962f5a2be630b5737d729f8c4f565a3eec7e4bf19549,2025-01-15T17:15:18.950000
|
||||
CVE-2025-20042,1,1,a487a39c2a60c13d8580c0e630350b8f1bc5c8369c4dba737050e86f9f443804,2025-03-04T04:15:12.970000
|
||||
CVE-2025-20042,0,0,a487a39c2a60c13d8580c0e630350b8f1bc5c8369c4dba737050e86f9f443804,2025-03-04T04:15:12.970000
|
||||
CVE-2025-20045,0,0,415d73f9fa018669b6b7896f4e36fdab92f13949bd42dccb63d15f65c73eedf3,2025-02-05T18:15:29.760000
|
||||
CVE-2025-20049,0,0,3911b8c375043e4ad147832fc3846511b3247cf229746da0a50bbc3da242183c,2025-02-28T17:15:16.277000
|
||||
CVE-2025-20051,0,0,f5960a6a14861956075cfae09439ba801517edcedfe4aa263146ae0b9ad313be,2025-02-24T08:15:10.087000
|
||||
@ -281004,10 +281015,10 @@ CVE-2025-20060,0,0,693c96187fad6559d71e047a6bc8c0d698d09cdfad790284793c6000b73c5
|
||||
CVE-2025-20061,0,0,6979d6e76b2847064c2a9b7a24215846556b4a731cf1290fe0f120404af6a611,2025-01-29T20:15:35.363000
|
||||
CVE-2025-20072,0,0,b9e9cb3d894db8c29d56585c14d2cf06ce7800f36f472c346f2184b6fcf02e0f,2025-01-16T18:15:28.517000
|
||||
CVE-2025-20075,0,0,d1a101f734614c5c8c3625d1b34c0ffc62ba95c1554396b4b462975c1a68bfc3,2025-02-18T00:15:21.107000
|
||||
CVE-2025-20081,1,1,785ac0a630bcba72d23ef31bddd9d99fa383bd93b1c363cc6e58a6b9d51a221e,2025-03-04T04:15:13.120000
|
||||
CVE-2025-20081,0,0,785ac0a630bcba72d23ef31bddd9d99fa383bd93b1c363cc6e58a6b9d51a221e,2025-03-04T04:15:13.120000
|
||||
CVE-2025-20086,0,0,c718ee138c5d706935ee7319c465eb1db60c32a8ee92f074be268892106cc0d1,2025-01-15T17:15:19.107000
|
||||
CVE-2025-20088,0,0,d069a0a8d0e55448ae448cb2d1bba620f97cc6785542779fdc1ef2f2206cb89e,2025-01-15T17:15:19.243000
|
||||
CVE-2025-20091,1,1,b9d1dce1ed45549e77916a09d472eab7dad5c2ee97791200be71edbb8dfee1dd,2025-03-04T04:15:13.253000
|
||||
CVE-2025-20091,0,0,b9d1dce1ed45549e77916a09d472eab7dad5c2ee97791200be71edbb8dfee1dd,2025-03-04T04:15:13.253000
|
||||
CVE-2025-20094,0,0,cc9826181bf1f83e2cac160833fefdc5cca091c7fe9a0c6abd476a3468c0bc65,2025-02-06T08:15:29.837000
|
||||
CVE-2025-20097,0,0,44f65a5475190446e165a44597504f8f11f3d766148b58ad519cc1d02d7b02f9,2025-02-12T22:15:41.850000
|
||||
CVE-2025-20111,0,0,b7e309cf82d57f91e316b45a9e015a8043e3dd714b1d240577557215ada70862,2025-02-26T17:15:22.240000
|
||||
@ -281049,7 +281060,7 @@ CVE-2025-20615,0,0,246812c21ea1208c6577dd2f9795a7d98215e290c9dd9fcc59c79b81edac8
|
||||
CVE-2025-20617,0,0,c8bfdf3a13c0fef33afce1eb72104d7b2280ba78c5b2dced7cd944ea31c0a2c7,2025-02-20T06:15:20.277000
|
||||
CVE-2025-20620,0,0,3537bfd354e2e5606a7442449870297aadd63b5c6f244c03eb513f3f9ee090eb,2025-01-14T10:15:07.860000
|
||||
CVE-2025-20621,0,0,060306fc4f84916fe909badb69a5829b34e2103b61fada341bb3713a68cfaebc,2025-01-16T19:15:29.960000
|
||||
CVE-2025-20626,1,1,11d2c1166da72a9729a40d211579b4896bbbd70d36c79dcb79c1739952b5245f,2025-03-04T04:15:13.393000
|
||||
CVE-2025-20626,0,0,11d2c1166da72a9729a40d211579b4896bbbd70d36c79dcb79c1739952b5245f,2025-03-04T04:15:13.393000
|
||||
CVE-2025-20630,0,0,0cb6d1c0b91807d74fd49faca2a027b3e775f1213907ee8f88e4e58cb3b78a59,2025-01-16T19:15:30.110000
|
||||
CVE-2025-20631,0,0,eae48a24cdb26043896339096d80c579b21423122c0cfb7d1789d616416831f6,2025-02-18T19:15:24.347000
|
||||
CVE-2025-20632,0,0,a969832868dfeb065ef85d46f111fa582b74e32bc8195140bed8e964787add5d,2025-02-18T19:15:24.460000
|
||||
@ -281101,13 +281112,13 @@ CVE-2025-20905,0,0,a956dc69bd97b881e89bd16659a244ea0d2dfdbee0596702ba457566048c8
|
||||
CVE-2025-20906,0,0,227b94242ada97f5f1b38d2297103a593c8ae5078c64d6e33b6eecd693ed4b68,2025-02-04T08:15:32.263000
|
||||
CVE-2025-20907,0,0,379c340eb54b31b9cb5f71668b76a83cd25f313f0ca982b642024600b12637ce,2025-02-12T13:49:49.460000
|
||||
CVE-2025-21083,0,0,b1f881e778d473a44d11cfcbd38b4988ccf3c0bae1e47d54950fb32a165015e0,2025-01-15T17:15:19.393000
|
||||
CVE-2025-21084,1,1,a6ccac491e8fd860362cb1b473826781c3d964715a65af957853ceb55ad630ba,2025-03-04T04:15:13.537000
|
||||
CVE-2025-21084,0,0,a6ccac491e8fd860362cb1b473826781c3d964715a65af957853ceb55ad630ba,2025-03-04T04:15:13.537000
|
||||
CVE-2025-21087,0,0,28561df062c57bddb73cb1503a50933afccce81ed6c2872e01fa7d13e8dbf5f5,2025-02-05T18:15:30.430000
|
||||
CVE-2025-21088,0,0,2fc6ecd1dae8270574ff01139ed8a42b63c05aa457c258a8d76906ce3a93ca54,2025-01-15T16:15:32.413000
|
||||
CVE-2025-21089,1,1,e738ca8aba977772b86ebd3ae454f771f8037c092c0a97f070d66bd278ffae75,2025-03-04T04:15:13.680000
|
||||
CVE-2025-21089,0,0,e738ca8aba977772b86ebd3ae454f771f8037c092c0a97f070d66bd278ffae75,2025-03-04T04:15:13.680000
|
||||
CVE-2025-21091,0,0,c802a7b25882d42a090b27badb1537fcdda8854c4d36451323648d734d1e16cc,2025-02-05T18:15:30.613000
|
||||
CVE-2025-21097,1,1,da0506b0f8f381393fdc99df275174ef6f455eaaace2f30a63e7d5c90c865651,2025-03-04T04:15:13.813000
|
||||
CVE-2025-21098,1,1,a193a406b493161331e8c0047ba76e17ef891d131b44cddf900c465d6f51a0c8,2025-03-04T04:15:13.953000
|
||||
CVE-2025-21097,0,0,da0506b0f8f381393fdc99df275174ef6f455eaaace2f30a63e7d5c90c865651,2025-03-04T04:15:13.813000
|
||||
CVE-2025-21098,0,0,a193a406b493161331e8c0047ba76e17ef891d131b44cddf900c465d6f51a0c8,2025-03-04T04:15:13.953000
|
||||
CVE-2025-21101,0,0,0410baf8ce887e4bee4e642f5416b4c957a9c2a93d873e61b46c5aa6fe5ccada,2025-02-04T15:50:56.233000
|
||||
CVE-2025-21102,0,0,933ca72a52260837d55d5545fa75f1f12ce9dc7f55e3f7d4f145fee0707ab4ba,2025-01-24T19:10:11.977000
|
||||
CVE-2025-21103,0,0,e47eb06001984d8500d168dff51756d65a465cd5cf145d2cfc8ed0911d350714,2025-02-17T14:15:08.597000
|
||||
@ -281821,7 +281832,7 @@ CVE-2025-22394,0,0,74bb5d327b5fabc5afe5722acba49dd35fe0c1d26a691784f120eb1e4f911
|
||||
CVE-2025-22395,0,0,57c4b1d051c16506745f86a05c2206d0865c29f77486f620f2a0dfc5c8b5dd11,2025-02-04T15:49:52.617000
|
||||
CVE-2025-22399,0,0,c37486f8439a24e18965df381b1fbd8facfe56e4e036c4d759697286660e2568,2025-02-11T17:15:34.453000
|
||||
CVE-2025-22402,0,0,f76cbab41280a8de72b99de03f7ca0b8e04580815d7e99e01923e9b1697ba28c,2025-02-07T03:15:12.287000
|
||||
CVE-2025-22443,1,1,1c071c52aacf8a22841389b33ab1759d8b0571488fd50df74383b3b5be8316b7,2025-03-04T04:15:14.097000
|
||||
CVE-2025-22443,0,0,1c071c52aacf8a22841389b33ab1759d8b0571488fd50df74383b3b5be8316b7,2025-03-04T04:15:14.097000
|
||||
CVE-2025-22445,0,0,b624e4e02bffb5e86c49cb4f27a7947d07caad44049ae2738e6a5025f36e7b72,2025-01-09T07:15:28.617000
|
||||
CVE-2025-22449,0,0,bbe6983ada373fe96f2acc3f2babe8a504c2fad76654b8fe6101ea89ee7b3f6f,2025-01-09T07:15:28.777000
|
||||
CVE-2025-22450,0,0,08efaa8a0b7289f6e07d2143106d9ab0ee4947a312acaf42c999e908a6f4e398,2025-01-22T06:15:14.327000
|
||||
@ -282097,11 +282108,11 @@ CVE-2025-22825,0,0,c21ca5713a1aa3bda508edf6d7ba0513358e0245a32198c391997dcabc4fd
|
||||
CVE-2025-22826,0,0,36b6e140cfbfa94ee1e1f9414c9bba12f6b84f8e81d4c4eb37d1cc60556b529d,2025-01-09T16:16:33.047000
|
||||
CVE-2025-22827,0,0,3baed988c384781b752e63a63aac2d02b4618a6f769d736ff71142b8ba1a8f98,2025-01-09T16:16:33.200000
|
||||
CVE-2025-22828,0,0,327d4fbb4775debb7974f74b72faad2a6d9350ed385605b18892cfc7691fc3c9,2025-01-13T19:15:11.373000
|
||||
CVE-2025-22835,1,1,65f8f025b66dc12096c15d5621dd955024f35c23b59c4c3cde6816f0a58a7344,2025-03-04T04:15:14.250000
|
||||
CVE-2025-22837,1,1,5bcf94d71de1560c279c447dc9eb1b776336014724e04358a3f277e340414c8c,2025-03-04T04:15:14.387000
|
||||
CVE-2025-22841,1,1,072ba533aa369b15076e8797aefadd90cb80a40f29b8c8d07a2570aef9cd7dc4,2025-03-04T04:15:14.530000
|
||||
CVE-2025-22835,0,0,65f8f025b66dc12096c15d5621dd955024f35c23b59c4c3cde6816f0a58a7344,2025-03-04T04:15:14.250000
|
||||
CVE-2025-22837,0,0,5bcf94d71de1560c279c447dc9eb1b776336014724e04358a3f277e340414c8c,2025-03-04T04:15:14.387000
|
||||
CVE-2025-22841,0,0,072ba533aa369b15076e8797aefadd90cb80a40f29b8c8d07a2570aef9cd7dc4,2025-03-04T04:15:14.530000
|
||||
CVE-2025-22846,0,0,ccaf4947a08c20d6717ec860a31060641d37d75a3b98ee7b0493f2b2542b18e8,2025-02-05T18:15:31
|
||||
CVE-2025-22847,1,1,ef613b7f7ebb09f8e1ade69ae655ad00540703cacc9e91ad810215178c207167,2025-03-04T04:15:14.663000
|
||||
CVE-2025-22847,0,0,ef613b7f7ebb09f8e1ade69ae655ad00540703cacc9e91ad810215178c207167,2025-03-04T04:15:14.663000
|
||||
CVE-2025-22865,0,0,19a89c82649ad3129bff7c393f18a8aa29547854e8bed3a25f76183fca3a3ccc,2025-01-28T16:15:40.540000
|
||||
CVE-2025-22866,0,0,c708175c229fdd910b5da4acb829b622112b0d84eed2186edc0f9bf19e465443,2025-02-21T18:15:32.243000
|
||||
CVE-2025-22867,0,0,89eb6539ba2561e6ed2f62e1706818e853753182ae09675c0ce3557a15684ce3,2025-02-06T22:15:40.393000
|
||||
@ -282114,7 +282125,7 @@ CVE-2025-22890,0,0,8dd6ffe45f0151dcb8b41a48dac74b1e668a5294c2f1614982860358b9b03
|
||||
CVE-2025-22891,0,0,5058a67448259ac9abdaa428b056ef85a9f11123cf1683cf0699d5426be467a6,2025-02-05T18:15:31.190000
|
||||
CVE-2025-22894,0,0,099d82dc8568fb50b5dde7926f3fbb32a13311bb5c7a970a54e9828e99c29a1c,2025-02-06T08:15:30.027000
|
||||
CVE-2025-22896,0,0,9d75a19ade9d91162e9a0c4a13a263140173b5a69917e95ab6dc8bbc94c9913f,2025-02-13T22:15:11.737000
|
||||
CVE-2025-22897,1,1,f517f7dffa30cf34d1b81f125c504122235d16d524cc2ae99f3398e0f171cc87,2025-03-04T04:15:14.807000
|
||||
CVE-2025-22897,0,0,f517f7dffa30cf34d1b81f125c504122235d16d524cc2ae99f3398e0f171cc87,2025-03-04T04:15:14.807000
|
||||
CVE-2025-22904,0,0,11fbec6328b596ed08ed392234d8935217007830badddad8b05907ab798c39a5,2025-02-18T21:15:26.993000
|
||||
CVE-2025-22905,0,0,bda5091cb8423b637c26775857bce84858d2915411a8d309230a6bd8a5902766,2025-02-18T21:15:27.153000
|
||||
CVE-2025-22906,0,0,dc0fdd210fffe08c72f299afbea7194cb399434a76d04819d6004eb76b91742b,2025-02-18T21:15:27.327000
|
||||
@ -282266,11 +282277,11 @@ CVE-2025-23221,0,0,66ab94f1e6d3ea457770d55c62f0e0360d1ef2f8abc298fcd5936362cd0cc
|
||||
CVE-2025-23222,0,0,18aa2a1e2bf6061bb8eb2028cc63aa7a30f3ae667c4d6d42b09c703374489ff5,2025-01-24T17:15:15.730000
|
||||
CVE-2025-23225,0,0,b99e53df48ff7dbc8278465c04d7942c23b33f567d4baaf05829539899047092,2025-02-28T03:15:10.807000
|
||||
CVE-2025-23227,0,0,f9f92843c2672f819b4e02923b915715941f2a484ada128843c5fed7ba6fe29c,2025-01-23T18:15:33.440000
|
||||
CVE-2025-23234,1,1,c99890ea5803634d3b44ab04d07f89c51e4ede9c03d8a36461768b37a382390a,2025-03-04T04:15:14.953000
|
||||
CVE-2025-23234,0,0,c99890ea5803634d3b44ab04d07f89c51e4ede9c03d8a36461768b37a382390a,2025-03-04T04:15:14.953000
|
||||
CVE-2025-23236,0,0,190a8ddc8688f8aa0a88d8a027b6b33a7ce91edfda9c184dc87404da93cc5156,2025-02-06T08:15:30.170000
|
||||
CVE-2025-23237,0,0,c0ce202263a02631ffe1db2dee5ed008b2b4991928cf61026697f648aec08853,2025-01-22T06:15:14.480000
|
||||
CVE-2025-23239,0,0,73761053f1cf486225f31cfbe2c5d7282e449e2379e63bc42bc6b88358fef062,2025-02-05T18:15:31.373000
|
||||
CVE-2025-23240,1,1,e955cbe93738c965e335514d4f82c583433490aee69fdbf7b523e5c1a0c095ad,2025-03-04T04:15:15.097000
|
||||
CVE-2025-23240,0,0,e955cbe93738c965e335514d4f82c583433490aee69fdbf7b523e5c1a0c095ad,2025-03-04T04:15:15.097000
|
||||
CVE-2025-23359,0,0,078a2b254b9542e7cfbdc0b2539045b6c597acb96680d65380627cec160e1602,2025-02-12T01:15:09.230000
|
||||
CVE-2025-23362,0,0,f1b04109bb5a53f0fa12693fb841988a838f82d29d11cab82e724120097242c3,2025-01-29T02:15:27.910000
|
||||
CVE-2025-23363,0,0,9d847654d50480688aa91cb0e62a450466f9daa5cc4a3d346e469c34ce48abe5,2025-02-25T17:15:14.227000
|
||||
@ -282282,15 +282293,15 @@ CVE-2025-23385,0,0,44f68c3210fdb2f588e2b733b3276d4f924d74ac5df4660c1e28e1d2bd89e
|
||||
CVE-2025-23403,0,0,644047de2ce1ffb265b5a42cecfc2f854cd0e7552ab44d86c93242e1e0442a91,2025-02-11T11:15:16.420000
|
||||
CVE-2025-23405,0,0,1d766bc4849324d5a2aa10241aa29cfa3fa9dddb8599893bc0ba377c47067ae6,2025-02-28T17:15:16.637000
|
||||
CVE-2025-23406,0,0,38d5c87f4e786637cbc4fcb4a2f7006ad80927b3c7219b037e30cf1414c39e8c,2025-02-14T05:15:12.567000
|
||||
CVE-2025-23409,1,1,791c1b5e3844624d112a68844f0f5da6d88602db9084bc743d9422721a2c22e6,2025-03-04T04:15:15.240000
|
||||
CVE-2025-23409,0,0,791c1b5e3844624d112a68844f0f5da6d88602db9084bc743d9422721a2c22e6,2025-03-04T04:15:15.240000
|
||||
CVE-2025-23411,0,0,2149399d3d8cce275d78a69bd832e8585ca8be81bc1e889fab80ae4194b4819b,2025-02-13T22:15:11.913000
|
||||
CVE-2025-23412,0,0,879dc1f233cd1ed0927b887a0c257bb01d6c254311c7a39c5817d5ae0b0fbc54,2025-02-05T18:15:31.580000
|
||||
CVE-2025-23413,0,0,5d8a681b56b331debf19dc9f08d08646859aabde28ec61411300a927339c1e48,2025-02-05T18:15:31.930000
|
||||
CVE-2025-23414,1,1,598762937910804a093c0bf5df13b9d5781a045eafc5b25828b98a5f86372da1,2025-03-04T04:15:15.377000
|
||||
CVE-2025-23414,0,0,598762937910804a093c0bf5df13b9d5781a045eafc5b25828b98a5f86372da1,2025-03-04T04:15:15.377000
|
||||
CVE-2025-23415,0,0,c2dd48094efc8e1bfacac6004cbfdb2acecbbfdd3e26439f960c8800a711bd88,2025-02-05T18:15:32.573000
|
||||
CVE-2025-23418,1,1,9cc8343191dd3c890a4f9a16d8794def53350e53f4801e87e832763786a05569,2025-03-04T04:15:15.523000
|
||||
CVE-2025-23418,0,0,9cc8343191dd3c890a4f9a16d8794def53350e53f4801e87e832763786a05569,2025-03-04T04:15:15.523000
|
||||
CVE-2025-23419,0,0,dcd7b3325727301465e5372f86361f511c377c0aa3f87515df8f22306063b58f,2025-02-05T20:15:45.717000
|
||||
CVE-2025-23420,1,1,24aa341ef76549f447dd7cf59a7ef0d5380fe732c6f6d07339c148187a33cdb3,2025-03-04T04:15:15.657000
|
||||
CVE-2025-23420,0,0,24aa341ef76549f447dd7cf59a7ef0d5380fe732c6f6d07339c148187a33cdb3,2025-03-04T04:15:15.657000
|
||||
CVE-2025-23421,0,0,00e828297d8c47e57ba7a8d1a3f41d7d51541a2cde4acbd6d1a3d704f1af2297,2025-02-13T22:15:12.073000
|
||||
CVE-2025-23422,0,0,02fa1caf24a4eabe3a7a82363ae4ebce4a671b3054c1ebfa03694d43e05e5f21,2025-01-24T11:15:09.987000
|
||||
CVE-2025-23423,0,0,9f2a3a8c7b19b98ddcb037c2f429da3cdced4a5dd5f2091389a187de7a6bb398,2025-01-16T20:15:33.573000
|
||||
@ -282905,8 +282916,8 @@ CVE-2025-24174,0,0,95dfb379df306aeb43eb6243b1abac4c2b93f5fa4cc8ec6eac185094887da
|
||||
CVE-2025-24176,0,0,0a13e167281064295cb7d6ac3b662de69e357179cbe1fefabb03dbb784e50b69,2025-01-28T16:15:44.630000
|
||||
CVE-2025-24177,0,0,79a71d65a51a9b6afaebd476d0d597d4ed4eaba333259a9c33b9b13f1b1bef2f,2025-02-04T22:15:43.237000
|
||||
CVE-2025-24200,0,0,d9c7918e8a07e18518c12bcf14fe92863d4e1d1a93377db97d110f68957cafff,2025-02-18T18:15:33.667000
|
||||
CVE-2025-24301,1,1,396e3699cc53a7536e4b7469729e85d0b112cbb5e39b71450afa9a2c7bb9d7a2,2025-03-04T04:15:15.803000
|
||||
CVE-2025-24309,1,1,54349ac3caee4d6f49000e54e0207b04497279b635a9d3d68364b4bbb6e50b75,2025-03-04T04:15:15.940000
|
||||
CVE-2025-24301,0,0,396e3699cc53a7536e4b7469729e85d0b112cbb5e39b71450afa9a2c7bb9d7a2,2025-03-04T04:15:15.803000
|
||||
CVE-2025-24309,0,0,54349ac3caee4d6f49000e54e0207b04497279b635a9d3d68364b4bbb6e50b75,2025-03-04T04:15:15.940000
|
||||
CVE-2025-24312,0,0,95c47bb536b453078b50948ffe457339fcccb14868a3af4b230325aee112d79c,2025-02-05T18:15:34.060000
|
||||
CVE-2025-24316,0,0,770bef4f97559304e30386e8115bd7582afb0c9db56f36e83bccb579d61f5751,2025-02-28T17:15:16.790000
|
||||
CVE-2025-24318,0,0,141558a454419e2326c0c64b4fbc3e837b318d293574156c8e8685ddefe4e612,2025-02-28T17:15:16.937000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user