Auto-Update: 2025-03-19T15:00:19.479491+00:00

This commit is contained in:
cad-safe-bot 2025-03-19 15:03:50 +00:00
parent 977dcd9644
commit fd76f99df0
50 changed files with 1738 additions and 205 deletions

View File

@ -2,7 +2,7 @@
"id": "CVE-2018-9447",
"sourceIdentifier": "security@android.com",
"published": "2025-01-17T23:15:12.327",
"lastModified": "2025-02-18T21:15:13.370",
"lastModified": "2025-03-19T14:15:34.120",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "En onCreate de EmergencyCallbackModeExitDialog.java, existe una forma posible de bloquear el modo de devoluci\u00f3n de llamada de emergencia debido a la falta de una verificaci\u00f3n nula. Esto podr\u00eda provocar una denegaci\u00f3n de servicio local sin necesidad de privilegios de ejecuci\u00f3n adicionales. No se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-400"
}
]
}
],
"references": [
{
"url": "https://source.android.com/security/bulletin/pixel/2018-08-01",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-32110",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-05-17T07:15:53.300",
"lastModified": "2024-11-21T08:02:43.730",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-19T13:37:32.060",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 4.7
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
@ -51,14 +71,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:artbees:jupiterx:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "3.1.0",
"matchCriteriaId": "98564483-27C8-4969-A3F1-CF751AF09A4C"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/jupiterx/wordpress-jupiterx-theme-3-0-0-subscriber-local-file-inclusion-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://patchstack.com/database/vulnerability/jupiterx/wordpress-jupiterx-theme-3-0-0-subscriber-local-file-inclusion-vulnerability?_s_id=cve",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-38385",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-12-13T15:15:19.183",
"lastModified": "2024-12-13T15:15:19.183",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-19T13:57:05.610",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 5.5
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
@ -51,10 +71,32 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:artbees:jupiter_x_core:*:*:*:*:*:wordpress:*:*",
"versionStartIncluding": "3.0.0",
"versionEndExcluding": "3.3.5",
"matchCriteriaId": "1D82A557-9559-442C-9A1B-9E67ABDFD987"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/jupiterx-core/vulnerability/wordpress-jupiter-x-core-plugin-3-0-0-3-3-0-multiple-contributor-broken-access-control-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-38388",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-03-26T21:15:51.113",
"lastModified": "2024-11-21T08:13:27.650",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-19T13:49:31.673",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.2,
"impactScore": 6.0
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
@ -51,14 +71,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:artbees:jupiter_x_core:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "3.3.8",
"matchCriteriaId": "0B4BF657-5A8E-43E8-834B-B0C0B65D5373"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/jupiterx-core/wordpress-jupiter-x-core-plugin-3-3-0-unauthenticated-arbitrary-file-upload-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://patchstack.com/database/vulnerability/jupiterx-core/wordpress-jupiter-x-core-plugin-3-3-0-unauthenticated-arbitrary-file-upload-vulnerability?_s_id=cve",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-6047",
"sourceIdentifier": "iletisim@usom.gov.tr",
"published": "2024-03-29T12:15:07.570",
"lastModified": "2024-11-21T08:43:02.383",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-19T14:28:26.253",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
@ -51,14 +71,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:algoritimbilisim:e-commerce_software:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3.9.2",
"matchCriteriaId": "B2D85945-1413-41C8-BEB9-907FCC4646A9"
}
]
}
]
}
],
"references": [
{
"url": "https://www.usom.gov.tr/bildirim/tr-24-0252",
"source": "iletisim@usom.gov.tr"
"source": "iletisim@usom.gov.tr",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.usom.gov.tr/bildirim/tr-24-0252",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-6191",
"sourceIdentifier": "iletisim@usom.gov.tr",
"published": "2024-03-29T12:15:07.907",
"lastModified": "2024-11-21T08:43:19.497",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-19T14:45:55.020",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,37 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:webpdks:webpdks:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3742DBF3-034C-40DA-839F-680B5A6B3928"
}
]
}
]
}
],
"references": [
{
"url": "https://www.usom.gov.tr/bildirim/tr-24-0253",
"source": "iletisim@usom.gov.tr"
"source": "iletisim@usom.gov.tr",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.usom.gov.tr/bildirim/tr-24-0253",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-0020",
"sourceIdentifier": "security@android.com",
"published": "2024-02-16T20:15:47.667",
"lastModified": "2024-12-16T18:59:20.550",
"vulnStatus": "Analyzed",
"lastModified": "2025-03-19T14:15:34.860",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -69,6 +69,16 @@
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-12604",
"sourceIdentifier": "iletisim@usom.gov.tr",
"published": "2025-03-10T15:15:36.947",
"lastModified": "2025-03-10T15:15:36.947",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-03-19T14:55:40.523",
"vulnStatus": "Analyzed",
"cveTags": [
{
"sourceIdentifier": "iletisim@usom.gov.tr",
@ -26,7 +26,7 @@
"cvssMetricV31": [
{
"source": "iletisim@usom.gov.tr",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
@ -43,6 +43,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 2.5
}
]
},
@ -60,16 +80,54 @@
"value": "CWE-640"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-312"
},
{
"lang": "en",
"value": "CWE-640"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tapandsign:tap\\&sign:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.025",
"matchCriteriaId": "7E38B9DF-2BC7-40C1-A07F-77CEE465DF41"
}
]
}
]
}
],
"references": [
{
"url": "https://docs.tapandsign.com/tap-and-sign/tap-and-sign-v.1.025-surum-notlari",
"source": "iletisim@usom.gov.tr"
"source": "iletisim@usom.gov.tr",
"tags": [
"Release Notes"
]
},
{
"url": "https://www.usom.gov.tr/bildirim/tr-25-0063",
"source": "iletisim@usom.gov.tr"
"source": "iletisim@usom.gov.tr",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-13222",
"sourceIdentifier": "contact@wpscan.com",
"published": "2025-01-31T06:15:28.813",
"lastModified": "2025-02-18T19:15:13.130",
"lastModified": "2025-03-19T14:15:35.370",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,30 @@
"value": "El complemento User Messages de WordPress hasta la versi\u00f3n 1.2.4 no desinfecta ni escapa un par\u00e1metro antes de mostrarlo nuevamente en la p\u00e1gina, lo que genera un Cross-Site Scripting Reflejado que podr\u00eda usarse contra usuarios con privilegios altos, como el administrador."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"references": [
{
"url": "https://wpscan.com/vulnerability/069e1f81-448d-4d27-b288-87111dade2f2/",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-13225",
"sourceIdentifier": "contact@wpscan.com",
"published": "2025-01-31T06:15:29.117",
"lastModified": "2025-02-18T19:15:13.430",
"lastModified": "2025-03-19T14:15:35.517",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,30 @@
"value": "El complemento ECT Home Page Products de WordPress hasta la versi\u00f3n 1.9 no desinfecta ni escapa un par\u00e1metro antes de mostrarlo nuevamente en la p\u00e1gina, lo que genera un Cross-Site Scripting Reflejado que podr\u00eda usarse contra usuarios con privilegios altos, como el administrador."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"references": [
{
"url": "https://wpscan.com/vulnerability/8efd7d62-3f74-4108-970e-bd5ed24914ff/",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-20059",
"sourceIdentifier": "security@mediatek.com",
"published": "2024-05-06T03:15:09.787",
"lastModified": "2024-11-21T08:51:55.990",
"lastModified": "2025-03-19T14:15:35.787",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,30 @@
"value": "En este caso, existe una posible escalada de privilegios debido a una verificaci\u00f3n de estado incorrecta. Esto podr\u00eda conducir a una escalada local de privilegios con permisos de ejecuci\u00f3n de System necesarios. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n. ID de parche: ALPS08541749; ID del problema: ALPS08541749."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 0.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "security@mediatek.com",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-23788",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2024-02-14T10:15:08.830",
"lastModified": "2024-12-13T17:32:04.810",
"vulnStatus": "Analyzed",
"lastModified": "2025-03-19T14:15:36.007",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -69,6 +69,16 @@
"value": "CWE-918"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-918"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-23945",
"sourceIdentifier": "security@apache.org",
"published": "2024-12-23T16:15:05.590",
"lastModified": "2025-02-18T22:15:10.600",
"lastModified": "2025-03-19T14:15:36.173",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,11 +15,44 @@
"value": "Signing cookies es una caracter\u00edstica de seguridad de la aplicaci\u00f3n que agrega una firma digital a los datos de las cookies para verificar su autenticidad e integridad. La firma ayuda a evitar que actores malintencionados modifiquen el valor de la cookie, lo que puede provocar vulnerabilidades de seguridad y explotaci\u00f3n. El componente de servicio de Apache Hive expone accidentalmente la cookie firmada al usuario final cuando hay una discrepancia en la firma entre la cookie actual y la esperada. Exponer la firma de cookie correcta puede conducir a una mayor explotaci\u00f3n. La l\u00f3gica vulnerable de CookieSigner se introdujo en Apache Hive mediante HIVE-9710 (1.2.0) y en Apache Spark mediante SPARK-14987 (2.0.0). Los componentes afectados son los siguientes: * org.apache.hive:hive-service * org.apache.spark:spark-hive-thriftserver_2.11 * org.apache.spark:spark-hive-thriftserver_2.12"
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.2,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "security@apache.org",
"type": "Secondary",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-209"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Primary",
"description": [
{
"lang": "en",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-24422",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-01-21T23:15:12.267",
"lastModified": "2025-02-18T21:15:21.150",
"lastModified": "2025-03-19T14:15:36.380",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-787"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-4289",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-05-21T06:15:09.517",
"lastModified": "2024-11-21T09:42:32.977",
"lastModified": "2025-03-19T14:15:37.420",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,30 @@
"value": " El complemento de WordPress Sailthru Triggermail hasta la versi\u00f3n 1.1 no sanitiza ni escapa varios par\u00e1metros antes de devolverlos a p\u00e1ginas y atributos, lo que genera Cross Site Scripting Reflejado que podr\u00eda usarse contra usuarios con altos privilegios, como administradores."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"references": [
{
"url": "https://wpscan.com/vulnerability/072785de-0ce5-42a4-a3fd-4eb1d1a2f1be/",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-43096",
"sourceIdentifier": "security@android.com",
"published": "2025-01-21T23:15:13.497",
"lastModified": "2025-02-18T21:15:21.990",
"lastModified": "2025-03-19T14:15:36.567",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "En build_read_multi_rsp de gatt_sr.cc, existe una posible escritura fuera de los l\u00edmites debido a una neutra. Esto podr\u00eda provocar la ejecuci\u00f3n remota de c\u00f3digo (proximal/adyacente) sin necesidad de privilegios de ejecuci\u00f3n adicionales. No se necesita interacci\u00f3n del usuario para la explotaci\u00f3n."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"references": [
{
"url": "https://source.android.com/security/bulletin/2025-01-01",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-44152",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-09-17T00:15:50.763",
"lastModified": "2024-09-24T15:55:06.100",
"vulnStatus": "Analyzed",
"lastModified": "2025-03-19T14:15:36.703",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
@ -49,6 +69,16 @@
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-45239",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-24T23:15:04.353",
"lastModified": "2024-08-27T15:49:31.417",
"vulnStatus": "Analyzed",
"lastModified": "2025-03-19T14:15:36.867",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-476"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-46564",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-18T15:15:17.263",
"lastModified": "2024-09-24T16:41:55.907",
"vulnStatus": "Analyzed",
"lastModified": "2025-03-19T14:15:37.093",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-120"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-48789",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-14T18:15:05.230",
"lastModified": "2024-10-15T15:35:19.560",
"lastModified": "2025-03-19T14:15:37.263",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -39,6 +39,18 @@
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
],
"references": [
{
"url": "https://drivedeck.de/",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-54519",
"sourceIdentifier": "product-security@apple.com",
"published": "2025-01-27T22:15:13.367",
"lastModified": "2025-03-04T16:02:20.193",
"vulnStatus": "Analyzed",
"lastModified": "2025-03-19T14:15:37.577",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,12 +36,42 @@
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-532"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{

View File

@ -0,0 +1,29 @@
{
"id": "CVE-2024-55551",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-03-19T14:15:37.733",
"lastModified": "2025-03-19T14:15:37.733",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in Exasol jdbc driver 24.2.0. Attackers can inject malicious parameters into the JDBC URL, triggering JNDI injection during the process when the JDBC Driver uses this URL to connect to the database. This can further lead to remote code execution vulnerability."
}
],
"metrics": {},
"references": [
{
"url": "https://docs.exasol.com/db/latest/connect_exasol/drivers/jdbc.htm",
"source": "cve@mitre.org"
},
{
"url": "https://gist.github.com/azraelxuemo/9565ec9219e0c3e9afd5474904c39d0f",
"source": "cve@mitre.org"
},
{
"url": "https://www.blackhat.com/eu-24/briefings/schedule/index.html#a-novel-attack-surface-java-authentication-and-authorization-service-jaas-42179",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-56310",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-12-22T21:15:16.433",
"lastModified": "2025-01-14T17:15:18.487",
"lastModified": "2025-03-19T14:15:37.850",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "REDCap hasta la versi\u00f3n 15.0.0 tiene una falla de seguridad en el nombre de Project Dashboards, lo que expone a los usuarios a un ataque de Cross-Site Request Forgery (CSRF). Un atacante puede aprovechar esto al atraer a los usuarios para que hagan clic en un nombre de Project Dashboards que contenga la carga maliciosa, lo que desencadena una solicitud de cierre de sesi\u00f3n y finaliza su sesi\u00f3n. Esta vulnerabilidad se origina en la ausencia de protecciones CSRF en la funcionalidad de cierre de sesi\u00f3n, lo que permite que se ejecuten acciones maliciosas sin el consentimiento del usuario."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://github.com/ping-oui-no/Vulnerability-Research-CVESS/tree/main/RedCap",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-57022",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-01-15T17:15:18.083",
"lastModified": "2025-03-10T17:27:02.037",
"vulnStatus": "Analyzed",
"lastModified": "2025-03-19T14:15:38.007",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-78"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-57451",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-03T21:15:14.893",
"lastModified": "2025-02-18T19:15:22.057",
"lastModified": "2025-03-19T14:15:38.187",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "ChestnutCMS <=1.5.0 tiene una vulnerabilidad Directory Traversal en contentcore.controller.FileController#getFileList, que permite a los atacantes ver cualquier directorio."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"references": [
{
"url": "https://locrian-lightning-dc7.notion.site/Directory-traversal-1628e5e2b1a280fdb463c2235acc7f75",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-57724",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-01-23T01:15:27.387",
"lastModified": "2025-02-18T20:15:23.023",
"lastModified": "2025-03-19T14:15:38.337",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Se descubri\u00f3 que lunasvg v3.0.0 conten\u00eda una violaci\u00f3n de segmentaci\u00f3n a trav\u00e9s del componente gray_record_cell."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-400"
}
]
}
],
"references": [
{
"url": "https://github.com/keepinggg/poc/blob/main/poc_of_lunasvg_3.1.0",

View File

@ -2,13 +2,13 @@
"id": "CVE-2025-2280",
"sourceIdentifier": "security@devolutions.net",
"published": "2025-03-13T13:15:58.533",
"lastModified": "2025-03-18T17:15:47.873",
"lastModified": "2025-03-19T14:15:39.743",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper access control in web extension restriction feature in Devolutions Server 2024.3.13 and earlier allows an authenticated user to bypass the browser extension restriction feature."
"value": "Improper access control in web extension restriction feature in Devolutions Server 2024.3.4.0\n\n and earlier allows an authenticated user to bypass the browser extension restriction feature."
},
{
"lang": "es",

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-24109",
"sourceIdentifier": "product-security@apple.com",
"published": "2025-01-27T22:15:16.347",
"lastModified": "2025-03-04T15:26:30.650",
"vulnStatus": "Analyzed",
"lastModified": "2025-03-19T14:15:38.700",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,19 +36,49 @@
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Secondary",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-24159",
"sourceIdentifier": "product-security@apple.com",
"published": "2025-01-27T22:15:19.897",
"lastModified": "2025-03-04T14:57:16.473",
"vulnStatus": "Analyzed",
"lastModified": "2025-03-19T14:15:38.853",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,19 +36,49 @@
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Secondary",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"configurations": [

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-25500",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-03-18T14:15:43.493",
"lastModified": "2025-03-18T14:15:43.493",
"lastModified": "2025-03-19T14:15:39.033",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue in CosmWasm prior to v2.2.0 allows attackers to bypass capability restrictions in blockchains by exploiting a lack of runtime capability validation. This allows attackers to deploy a contract without capability enforcement, and execute unauthorized actions on the blockchain."
},
{
"lang": "es",
"value": "Un problema en CosmWasm anterior a la versi\u00f3n 2.2.0 permite a los atacantes eludir las restricciones de capacidad en las cadenas de bloques aprovechando la falta de validaci\u00f3n de capacidad en tiempo de ejecuci\u00f3n. Esto permite a los atacantes implementar un contrato sin la aplicaci\u00f3n de la capacidad y ejecutar acciones no autorizadas en la cadena de bloques."
}
],
"metrics": {},
@ -16,10 +20,6 @@
{
"url": "https://gist.github.com/H3T76/8096a6ff9410f3a6d9a25db1a68ae657#file-cve-2025-25500",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/CVEProject/cveproject.github.io/blob/gh-pages/requester/reservation-guidelines.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-25598",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-03-13T18:15:50.857",
"lastModified": "2025-03-13T18:15:50.857",
"vulnStatus": "Received",
"lastModified": "2025-03-19T14:15:39.140",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
@ -15,7 +15,42 @@
"value": "El control de acceso incorrecto en la consola de tareas programadas de Inova Logic CUSTOMER MONITOR (CM) v3.1.757.1 permite a los atacantes escalar privilegios mediante la colocaci\u00f3n de un ejecutable manipulado en una tarea programada."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-284"
}
]
}
],
"references": [
{
"url": "https://github.com/quriusfox/vulnerability-research/tree/main/CVE-2025-25598",

View File

@ -2,13 +2,13 @@
"id": "CVE-2025-26263",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-28T16:15:40.127",
"lastModified": "2025-03-17T06:15:24.630",
"lastModified": "2025-03-19T14:15:39.293",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "GeoVision ASManager Windows desktop application with the version 6.1.2.0 or less, is vulnerable to credentials disclosure due to improper memory handling in the ASManagerService.exe process."
"value": "GeoVision ASManager Windows desktop application with the version 6.1.2.0 or less (fixed in 6.2.0), is vulnerable to credentials disclosure due to improper memory handling in the ASManagerService.exe process."
},
{
"lang": "es",

View File

@ -2,13 +2,13 @@
"id": "CVE-2025-26264",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-27T22:15:38.947",
"lastModified": "2025-03-17T06:15:25.070",
"lastModified": "2025-03-19T14:15:39.440",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "GeoVision GV-ASWeb with the version 6.1.2.0 or less, contains a Remote Code Execution (RCE) vulnerability within its Notification Settings feature. An authenticated attacker with \"System Settings\" privileges in ASWeb can exploit this flaw to execute arbitrary commands on the server, leading to a full system compromise."
"value": "GeoVision GV-ASWeb with the version 6.1.2.0 or less (fixed in 6.2.0), contains a Remote Code Execution (RCE) vulnerability within its Notification Settings feature. An authenticated attacker with \"System Settings\" privileges in ASWeb can exploit this flaw to execute arbitrary commands on the server, leading to a full system compromise."
},
{
"lang": "es",

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-26702",
"sourceIdentifier": "psirt@zte.com.cn",
"published": "2025-03-11T07:15:34.133",
"lastModified": "2025-03-11T07:15:34.133",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-03-19T14:08:01.357",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.2,
"impactScore": 3.6
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
@ -49,12 +69,44 @@
"value": "CWE-20"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zte:goldendb:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.1.03",
"versionEndExcluding": "6.1.03.05",
"matchCriteriaId": "26E446FB-FC8E-4FCE-8E89-275726CB572B"
}
]
}
]
}
],
"references": [
{
"url": "https://support.zte.com.cn/zte-iccp-isupport-webui/bulletin/detail/1820079027271819342",
"source": "psirt@zte.com.cn"
"source": "psirt@zte.com.cn",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-26703",
"sourceIdentifier": "psirt@zte.com.cn",
"published": "2025-03-11T07:15:34.580",
"lastModified": "2025-03-11T07:15:34.580",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-03-19T14:09:38.080",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
@ -49,12 +69,44 @@
"value": "CWE-269"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zte:goldendb:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.1.03",
"versionEndExcluding": "6.1.03.05",
"matchCriteriaId": "26E446FB-FC8E-4FCE-8E89-275726CB572B"
}
]
}
]
}
],
"references": [
{
"url": "https://support.zte.com.cn/zte-iccp-isupport-webui/bulletin/detail/5666152569221570627",
"source": "psirt@zte.com.cn"
"source": "psirt@zte.com.cn",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-26704",
"sourceIdentifier": "psirt@zte.com.cn",
"published": "2025-03-11T07:15:34.967",
"lastModified": "2025-03-11T07:15:34.967",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-03-19T14:11:17.600",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
@ -49,12 +69,44 @@
"value": "CWE-269"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zte:goldendb:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.1.03 ",
"versionEndIncluding": "6.1.03.05",
"matchCriteriaId": "1C51DC63-52FE-4472-936B-843E5779BD21"
}
]
}
]
}
],
"references": [
{
"url": "https://support.zte.com.cn/zte-iccp-isupport-webui/bulletin/detail/6999218053484646494",
"source": "psirt@zte.com.cn"
"source": "psirt@zte.com.cn",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-26705",
"sourceIdentifier": "psirt@zte.com.cn",
"published": "2025-03-11T07:15:35.330",
"lastModified": "2025-03-11T07:15:35.330",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-03-19T14:12:26.253",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
@ -49,12 +69,44 @@
"value": "CWE-269"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zte:goldendb:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.1.03 ",
"versionEndExcluding": "6.1.03.06",
"matchCriteriaId": "11809C5D-1649-478C-9D20-FA1DEDAB143B"
}
]
}
]
}
],
"references": [
{
"url": "https://support.zte.com.cn/zte-iccp-isupport-webui/bulletin/detail/577084989971263576",
"source": "psirt@zte.com.cn"
"source": "psirt@zte.com.cn",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-26706",
"sourceIdentifier": "psirt@zte.com.cn",
"published": "2025-03-11T07:15:35.703",
"lastModified": "2025-03-11T07:15:35.703",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-03-19T14:15:36.417",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 2.5
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
@ -49,12 +69,44 @@
"value": "CWE-269"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zte:goldendb:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.1.03 ",
"versionEndIncluding": "6.1.03.07",
"matchCriteriaId": "7F571305-1F0A-4A17-A7B3-532965576C3F"
}
]
}
]
}
],
"references": [
{
"url": "https://support.zte.com.cn/zte-iccp-isupport-webui/bulletin/detail/6999218053484646486",
"source": "psirt@zte.com.cn"
"source": "psirt@zte.com.cn",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-28857",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-03-11T21:15:42.903",
"lastModified": "2025-03-11T21:15:42.903",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-03-19T13:41:38.270",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 3.7
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
@ -51,10 +71,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:rankchecker:rankchecker:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "1.0.9",
"matchCriteriaId": "CB37F6EA-5711-4307-82AD-2EB718289689"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/rankchecker-io-integration/vulnerability/wordpress-rankchecker-io-integration-plugin-1-0-9-csrf-to-stored-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-28859",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-03-11T21:15:43.050",
"lastModified": "2025-03-11T21:15:43.050",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-03-19T14:01:43.707",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
@ -51,10 +71,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:codevibrant:maintenance_notice:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "1.0.5",
"matchCriteriaId": "127CD716-70AF-45EF-8F72-4E0E64BD1A0C"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/maintenance-notice/vulnerability/wordpress-maintenance-notice-plugin-1-0-5-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-28860",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-03-11T21:15:43.193",
"lastModified": "2025-03-11T21:15:43.193",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-03-19T14:06:00.333",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 3.7
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
@ -51,10 +71,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ppdpurveyor:google_news_editors_picks_feed_generator:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "2.1",
"matchCriteriaId": "2C47212C-D0BC-4402-90B9-4CDB2FF249CE"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/google-news-editors-picks-news-feeds/vulnerability/wordpress-google-news-editors-picks-feed-generator-plugin-2-1-csrf-to-stored-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-28861",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-03-11T21:15:43.337",
"lastModified": "2025-03-11T21:15:43.337",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-03-19T14:08:16.920",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 3.7
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
@ -51,10 +71,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:bhzad:wp_jquery_persian_datepicker:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "0.1.0",
"matchCriteriaId": "65AF6282-5B7F-425A-892C-9960FE036E7D"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/wpjqp-datepicker/vulnerability/wordpress-wp-jquery-persian-datepicker-plugin-0-1-0-csrf-to-stored-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-28862",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-03-11T21:15:43.490",
"lastModified": "2025-03-11T21:15:43.490",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-03-19T14:13:16.610",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
@ -51,10 +71,30 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:venugopal:comment_date_and_gravatar_remover:1.0:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "10C8FFD7-31F6-4696-BA34-DA2B59F67522"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/remove-date-and-gravatar-under-comment/vulnerability/wordpress-comment-date-and-gravatar-remover-plugin-1-0-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-28863",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-03-11T21:15:43.647",
"lastModified": "2025-03-11T21:15:43.647",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-03-19T14:14:18.080",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
@ -51,10 +71,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:carlosminatti:delete_original_image:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "0.4",
"matchCriteriaId": "ADFDC217-657F-4D84-9B55-BB61C4ED47E1"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/delete-original-image/vulnerability/wordpress-delete-original-image-plugin-0-4-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-28864",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-03-11T21:15:43.810",
"lastModified": "2025-03-11T21:15:43.810",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-03-19T14:16:41.287",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
@ -51,10 +71,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:planetstudio:builder_for_contact_form_7:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "1.2.2",
"matchCriteriaId": "FBF6364E-259A-44A2-8533-B73DBB729EBC"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/cf7-builder/vulnerability/wordpress-builder-for-contact-form-7-by-webconstruct-plugin-1-2-2-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-28866",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-03-11T21:15:43.970",
"lastModified": "2025-03-11T21:15:43.970",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-03-19T14:17:39.090",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
@ -51,10 +71,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:smerriman:login_logger:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "1.2.1",
"matchCriteriaId": "130C0737-23E4-4828-BD71-F6532F40797D"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/login-logger/vulnerability/wordpress-login-logger-plugin-1-2-1-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-28868",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-03-11T21:15:44.283",
"lastModified": "2025-03-11T21:15:44.283",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-03-19T14:27:00.497",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
@ -51,10 +71,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ziplist:recipes:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "3.1",
"matchCriteriaId": "19222997-375C-4574-831B-2B680C174A4B"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/ziplist-recipe-plugin/vulnerability/wordpress-ziplist-recipe-plugin-3-1-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2025-29891",
"sourceIdentifier": "security@apache.org",
"published": "2025-03-12T15:15:40.997",
"lastModified": "2025-03-13T09:15:14.860",
"lastModified": "2025-03-19T14:15:39.573",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -22,19 +22,19 @@
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L",
"baseScore": 4.2,
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 1.6,
"exploitabilityScore": 2.2,
"impactScore": 2.5
}
]
@ -42,17 +42,7 @@
"weaknesses": [
{
"source": "security@apache.org",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-164"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"type": "Primary",
"description": [
{
"lang": "en",
@ -69,6 +59,10 @@
{
"url": "https://camel.apache.org/security/CVE-2025-29891.html",
"source": "security@apache.org"
},
{
"url": "https://github.com/akamai/CVE-2025-27636-Apache-Camel-PoC",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2025-03-19T13:00:19.786508+00:00
2025-03-19T15:00:19.479491+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2025-03-19T12:15:14.463000+00:00
2025-03-19T14:55:40.523000+00:00
```
### Last Data Feed Release
@ -33,26 +33,45 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
285667
285668
```
### CVEs added in the last Commit
Recently added CVEs: `6`
Recently added CVEs: `1`
- [CVE-2024-12920](CVE-2024/CVE-2024-129xx/CVE-2024-12920.json) (`2025-03-19T12:15:12.797`)
- [CVE-2024-13442](CVE-2024/CVE-2024-134xx/CVE-2024-13442.json) (`2025-03-19T12:15:13.857`)
- [CVE-2024-13933](CVE-2024/CVE-2024-139xx/CVE-2024-13933.json) (`2025-03-19T12:15:14.003`)
- [CVE-2024-45644](CVE-2024/CVE-2024-456xx/CVE-2024-45644.json) (`2025-03-19T12:15:14.153`)
- [CVE-2025-2511](CVE-2025/CVE-2025-25xx/CVE-2025-2511.json) (`2025-03-19T12:15:14.313`)
- [CVE-2025-2512](CVE-2025/CVE-2025-25xx/CVE-2025-2512.json) (`2025-03-19T12:15:14.463`)
- [CVE-2024-55551](CVE-2024/CVE-2024-555xx/CVE-2024-55551.json) (`2025-03-19T14:15:37.733`)
### CVEs modified in the last Commit
Recently modified CVEs: `1`
Recently modified CVEs: `47`
- [CVE-2024-26795](CVE-2024/CVE-2024-267xx/CVE-2024-26795.json) (`2025-03-19T11:42:41.993`)
- [CVE-2024-57022](CVE-2024/CVE-2024-570xx/CVE-2024-57022.json) (`2025-03-19T14:15:38.007`)
- [CVE-2024-57451](CVE-2024/CVE-2024-574xx/CVE-2024-57451.json) (`2025-03-19T14:15:38.187`)
- [CVE-2024-57724](CVE-2024/CVE-2024-577xx/CVE-2024-57724.json) (`2025-03-19T14:15:38.337`)
- [CVE-2025-2280](CVE-2025/CVE-2025-22xx/CVE-2025-2280.json) (`2025-03-19T14:15:39.743`)
- [CVE-2025-24109](CVE-2025/CVE-2025-241xx/CVE-2025-24109.json) (`2025-03-19T14:15:38.700`)
- [CVE-2025-24159](CVE-2025/CVE-2025-241xx/CVE-2025-24159.json) (`2025-03-19T14:15:38.853`)
- [CVE-2025-25500](CVE-2025/CVE-2025-255xx/CVE-2025-25500.json) (`2025-03-19T14:15:39.033`)
- [CVE-2025-25598](CVE-2025/CVE-2025-255xx/CVE-2025-25598.json) (`2025-03-19T14:15:39.140`)
- [CVE-2025-26263](CVE-2025/CVE-2025-262xx/CVE-2025-26263.json) (`2025-03-19T14:15:39.293`)
- [CVE-2025-26264](CVE-2025/CVE-2025-262xx/CVE-2025-26264.json) (`2025-03-19T14:15:39.440`)
- [CVE-2025-26702](CVE-2025/CVE-2025-267xx/CVE-2025-26702.json) (`2025-03-19T14:08:01.357`)
- [CVE-2025-26703](CVE-2025/CVE-2025-267xx/CVE-2025-26703.json) (`2025-03-19T14:09:38.080`)
- [CVE-2025-26704](CVE-2025/CVE-2025-267xx/CVE-2025-26704.json) (`2025-03-19T14:11:17.600`)
- [CVE-2025-26705](CVE-2025/CVE-2025-267xx/CVE-2025-26705.json) (`2025-03-19T14:12:26.253`)
- [CVE-2025-26706](CVE-2025/CVE-2025-267xx/CVE-2025-26706.json) (`2025-03-19T14:15:36.417`)
- [CVE-2025-28857](CVE-2025/CVE-2025-288xx/CVE-2025-28857.json) (`2025-03-19T13:41:38.270`)
- [CVE-2025-28859](CVE-2025/CVE-2025-288xx/CVE-2025-28859.json) (`2025-03-19T14:01:43.707`)
- [CVE-2025-28860](CVE-2025/CVE-2025-288xx/CVE-2025-28860.json) (`2025-03-19T14:06:00.333`)
- [CVE-2025-28861](CVE-2025/CVE-2025-288xx/CVE-2025-28861.json) (`2025-03-19T14:08:16.920`)
- [CVE-2025-28862](CVE-2025/CVE-2025-288xx/CVE-2025-28862.json) (`2025-03-19T14:13:16.610`)
- [CVE-2025-28863](CVE-2025/CVE-2025-288xx/CVE-2025-28863.json) (`2025-03-19T14:14:18.080`)
- [CVE-2025-28864](CVE-2025/CVE-2025-288xx/CVE-2025-28864.json) (`2025-03-19T14:16:41.287`)
- [CVE-2025-28866](CVE-2025/CVE-2025-288xx/CVE-2025-28866.json) (`2025-03-19T14:17:39.090`)
- [CVE-2025-28868](CVE-2025/CVE-2025-288xx/CVE-2025-28868.json) (`2025-03-19T14:27:00.497`)
- [CVE-2025-29891](CVE-2025/CVE-2025-298xx/CVE-2025-29891.json) (`2025-03-19T14:15:39.573`)
## Download and Usage

View File

@ -127032,7 +127032,7 @@ CVE-2018-9441,0,0,575f828caed05d70445398c6546d07e6187af95dfab7246adaf485e88049a8
CVE-2018-9444,0,0,71c23de0a19dd0833cbf31bcd17198f1ee23b3012d3e983445d1d8427624bfea,2024-11-21T04:15:29.460000
CVE-2018-9445,0,0,6f497d920b5dea1dff5b6fdf23b01b78b0db0eccdf0018e269ce9b214bfe106e,2024-11-21T04:15:29.570000
CVE-2018-9446,0,0,c234b9792d5f51536c0fd269b29b1abbbcfb1e948520636234fcd7501d794384,2024-11-21T04:15:29.697000
CVE-2018-9447,0,0,c76e06ec9a4508f07296cb0ca9614aa80994653f7590c5bed8eafda199c21832,2025-02-18T21:15:13.370000
CVE-2018-9447,0,1,db5297e04cb86cbd19de4ce1da388e9ae6978c5e078051658a3b64eb380d8cc8,2025-03-19T14:15:34.120000
CVE-2018-9448,0,0,69c64fe6ebbff0200617e0b85ea10efd9da70ed74749831ad78b183a3e956ce7,2024-11-21T04:15:29.810000
CVE-2018-9449,0,0,40c2935e250f77217097c1d24f2eb94cea68528fe2bd69e2fca6dbdff2691446,2024-12-18T20:10:01.940000
CVE-2018-9450,0,0,71a6672dc17cc007950c7f48e044c7117901d3605e37bc8deb02b63ead4edb96,2024-11-21T04:15:29.930000
@ -225714,7 +225714,7 @@ CVE-2023-32107,0,0,b5793e75f71371b8b6819f39eb03f5486732b0ba2bf9ce407a16cdea099c4
CVE-2023-32108,0,0,a934ffc0869767d2ad20cbf489ed2b68feb2f8c481d9bfda763b1daaca8eb204,2024-11-21T08:02:43.510000
CVE-2023-32109,0,0,3a4edfa6c3aa31ce79dc3464d8877bcae3fd1ddf0b4075d905032ec1aeed0b39,2024-11-21T08:02:43.630000
CVE-2023-3211,0,0,5c79f5a4ab5a20ff2e0ea2542823beb167db99bcb267301c9da9f52382558d68,2024-11-21T08:16:42.377000
CVE-2023-32110,0,0,9e53bc70ab5b02228129bce6dfaed418995d97678d4ac5a9c6c4e76a4638ba71,2024-11-21T08:02:43.730000
CVE-2023-32110,0,1,c56f591d1b9ebf82f565782ef9fcf1991f96a352778cbc1f827433756a699450,2025-03-19T13:37:32.060000
CVE-2023-32111,0,0,1a327c689519230b35e18a611794e24d3e69479285b03916de59f343d5f0344e,2024-11-21T08:02:43.860000
CVE-2023-32112,0,0,2d658551346032135fc4df8eadb527925bcf203d0c4b6a1317eaa815c5079e00,2024-11-21T08:02:43.980000
CVE-2023-32113,0,0,eeb889f962c9abb8e1fc15bbf3a79439dddc270b385947deb2b48db8cf398f03,2024-11-21T08:02:44.100000
@ -230663,10 +230663,10 @@ CVE-2023-38381,0,0,131f40c03c1f7c264d58a993d2664cc9ca18c7dc79fcb5b324e793ba6bfc6
CVE-2023-38382,0,0,46aabdbde1d21403733e25a801806deda3d759b7a59108f1e0327e2612369c97,2024-11-21T08:13:27.137000
CVE-2023-38383,0,0,8750a7ad87b6af9dbfb5f26ec581da61550af89d93e4c27561c0df9189eaadbe,2024-12-13T15:15:19.040000
CVE-2023-38384,0,0,432bc4918ca36135512b55018dda0e35c3b42e4dbc1a5c07f3fe37017ce25831,2024-11-21T08:13:27.263000
CVE-2023-38385,0,0,669acb867d506d6026e6dd7115fdb47c6ff8d51138d21b934b1f3f835198d76e,2024-12-13T15:15:19.183000
CVE-2023-38385,0,1,5d3cab033bba45025423f86e1a0659404e7528890b35519c19d613144e5855b0,2025-03-19T13:57:05.610000
CVE-2023-38386,0,0,e07e32a1fe94194f1f4c10c32b9d3e83fd8d13afef2568102c653b4d924cba1b,2024-11-21T08:13:27.407000
CVE-2023-38387,0,0,623d775bcaa266a5dc196962abc1582b099379588fb4d57e840c1c6cf4fa5e54,2024-11-21T08:13:27.520000
CVE-2023-38388,0,0,b7f9db4f6c00e03cf568aaa88d65f74e7aaf06894a52d739b3d18b76af545ea8,2024-11-21T08:13:27.650000
CVE-2023-38388,0,1,9cb26bf3fa9bc4d7936e19c52d6924d10bdd5aa64565af0e3fbf58a49b358a9d,2025-03-19T13:49:31.673000
CVE-2023-38389,0,0,53d2268dadb48f9591f9849be4d6f9352278d753ebf289d9c3421edfea35839e,2024-11-21T08:13:27.780000
CVE-2023-3839,0,0,99e4f38992390f0792bd1d9c3f9258e68ba21ad7fd20cf000ca333b339e9434a,2024-11-21T08:18:11.323000
CVE-2023-38390,0,0,04540ba10d5b9db941783df86eaf593c37aa0ff8ebfe2841b802123d5603c4f1,2024-11-21T08:13:27.913000
@ -242305,7 +242305,7 @@ CVE-2023-6043,0,0,4d42ba0e4248fe66359ed05a1105448d1de43c6b28a8a42326e051bf553c2c
CVE-2023-6044,0,0,8488b0c2d64eaa394ac1e3ea1a8d07bf823d734aa681fcc8f9f80375294cb645,2024-11-21T08:43:02.067000
CVE-2023-6045,0,0,76a475eac8826ed563f079c0db54754b4e53e106a6075c3fd8ea1a519b7171fd,2024-11-21T08:43:02.177000
CVE-2023-6046,0,0,83b94aa63a7eb00bfbac001e7c18dbf142feb1ad6b62ec50413f35175e462282,2024-11-21T08:43:02.283000
CVE-2023-6047,0,0,cc9794086fc5bfcae68de9aaacc0f8fbc5d36bd80fb3a14c98b3ddc2bd4b2c4b,2024-11-21T08:43:02.383000
CVE-2023-6047,0,1,8346245556da8f8494199d0db060767ebd0e6231ec0b0ebb0a9924640c15eff5,2025-03-19T14:28:26.253000
CVE-2023-6048,0,0,067012cb654f53d5db93a1350dd348e4f2947ac9ac3b7fa72a8e5d0708989146,2024-11-21T08:43:02.490000
CVE-2023-6049,0,0,481e4a5d6e72e8ce41e29e3b424a68dbe30b0171d92f9fc9f17ac971e6297e1e,2024-11-21T08:43:02.593000
CVE-2023-6050,0,0,60c3b462fc30a652d1716b02c3dad5506b3f869a4b27869644e1d4ff3ddb9858,2024-11-21T08:43:02.693000
@ -242438,7 +242438,7 @@ CVE-2023-6187,0,0,8fd9b319140e1592996939e0f05ce20e8fbb504e761af0771471c23ab164f9
CVE-2023-6188,0,0,09daa23440d3cd568eaf0ecbfbc6bb5d7b90ca340bfb9250a0e00eccd46fe784,2024-11-21T08:43:19.057000
CVE-2023-6189,0,0,beafa23b6653271d960b0efe9b1c8f7edcdb0a8b75d12a9c0e5a9673ca00b8fe,2024-11-21T08:43:19.213000
CVE-2023-6190,0,0,8ed78538c4041525960b803e88198605546a55c3cf47128d1e30e8cf0cec0d48,2024-11-27T13:15:16.383000
CVE-2023-6191,0,0,674a3b71d2e03d1cc751fb32a048486d4c88546b883dd69f41cb5965fd00e87e,2024-11-21T08:43:19.497000
CVE-2023-6191,0,1,9c5fe08c799b97bbfa6e0631b81cc5f350115f9c9817f807e3cb1531d73541d5,2025-03-19T14:45:55.020000
CVE-2023-6193,0,0,03fd5b3cb55751a3ff3471e4986ed4557dc70e8bb42417035f31e70fadacbbe5,2024-11-21T08:43:19.627000
CVE-2023-6194,0,0,59f670df72e72c8f09561909ca051857ec403afebd9ce05e440183cf16436235,2024-11-21T08:43:19.773000
CVE-2023-6195,0,0,51a9f5b9008872aaff8589cee46ad94ee1bf658d97994daf14236f72e8e38faf,2025-02-18T19:15:11.923000
@ -243433,7 +243433,7 @@ CVE-2024-0016,0,0,fe6b8d0cdbee34b3261a95c211b84f84a8146c7eb2580e083114d9eb74442b
CVE-2024-0017,0,0,c3ae32d0f7f4b3aee825adaba904bd8ea33c38296423e6c492125686085b5834,2024-12-16T14:32:15.203000
CVE-2024-0018,0,0,dc97236025a554ca5d9fbcfefeab22ae1ca03e1bafa99ec450476dfed39ed381,2024-12-16T19:00:35.303000
CVE-2024-0019,0,0,1a2ededa1eb1dbcaa0bc1c1d84127480128e02c1cf238c266ddf5fd5d1d39ff4,2025-03-13T15:15:39.900000
CVE-2024-0020,0,0,84928478478ec6809853ed64e00fe038f952f115b30fa79973cc6031347ede5f,2024-12-16T18:59:20.550000
CVE-2024-0020,0,1,21a32907b1564d9154c7d4ff0db8ff8780ea7a747120fe57f3cbe387673b9075,2025-03-19T14:15:34.860000
CVE-2024-0021,0,0,2f55bcbb539911a384d09c17dc49f9cbee4d4635d4ce4c2c8eb44a4eddc9fffc,2024-12-16T18:55:59.723000
CVE-2024-0022,0,0,402a489de6f1bd8f13060138ca2475aa4ffd848181598d1e0ce78b5176103ba0,2024-11-25T13:52:21.147000
CVE-2024-0023,0,0,5e7948fc0aa641b348227e3064c75dac9ed5853b9bbb4d73d03fc98001f44017,2024-12-16T18:52:54.037000
@ -246791,7 +246791,7 @@ CVE-2024-12600,0,0,25cdf4243a182c8f825652731ae4cdb22588842da143c4d91d8fa5b7ce663
CVE-2024-12601,0,0,f9b91f2d20d6914a3b5ca3c9af2a431f615ff9e20926a30171bf1c35967a6eba,2024-12-17T12:15:20.543000
CVE-2024-12602,0,0,83ff0b84c52513b06515c71947664c6af329bbac5217b6b55ffe20fc2f9da714,2025-03-17T14:19:31.137000
CVE-2024-12603,0,0,1329ad6d4bb1404a279e066983b81ffbd19fd699c3731f10f6b510964794facc,2025-03-14T17:15:40.923000
CVE-2024-12604,0,0,a6f4270c625ae221b7f85c4bc776086e42b147f47e8fbeef861cbdbdca9ec761,2025-03-10T15:15:36.947000
CVE-2024-12604,0,1,d9d8da7a2652a20e74bc7819a8c68623b940ac46df22f67266e2f292fdb1975e,2025-03-19T14:55:40.523000
CVE-2024-12605,0,0,a0f2993b097a4c99b97e822aef9d508fcc987f27fa00acaa2c8fa4c5ee5e87b3,2025-01-09T15:15:14.150000
CVE-2024-12606,0,0,640593522db4b989e186e13bcaa1c8fc14a8675964d1b9990cbdc5261025156e,2025-01-10T04:15:19.667000
CVE-2024-12607,0,0,40c18637fc3558dc9dc09323eb99bf48f8a620096ef9648f41f49596324b9617,2025-03-07T09:15:14.700000
@ -247045,7 +247045,7 @@ CVE-2024-12917,0,0,d8b07f4bcfb7f08bc2f227c861fa1e6577e90bb6cc2a5373042cad71096d6
CVE-2024-12918,0,0,1035e9b27a2101293cfa4dc6b919699346b5a15e701cb7622e7b4fe97d2a43ff,2025-02-24T15:15:12.537000
CVE-2024-12919,0,0,267cd9cf604b008de2f506d778d176d8d6c4286f989194d3cfe533433123b414,2025-01-22T17:29:01.883000
CVE-2024-1292,0,0,38d9bc6a557167174bf37c6662c68d5de6a783380fb5a30941c923054e3f2f16,2024-11-21T08:50:14.983000
CVE-2024-12920,1,1,d6f114f30dddb8026f9b48238182ca4b26050e33db17a50e2255eac2718edb6a,2025-03-19T12:15:12.797000
CVE-2024-12920,0,0,d6f114f30dddb8026f9b48238182ca4b26050e33db17a50e2255eac2718edb6a,2025-03-19T12:15:12.797000
CVE-2024-12921,0,0,66514a714672aa9f260463c855267bb42fb72ace141e13c7370829c4ab97853e,2025-01-30T06:15:29.653000
CVE-2024-12922,0,0,3c37006850d140c98149834c97117e5d90bae2ea48a41001d4db464e7915c4fd,2025-03-19T06:15:15.120000
CVE-2024-12926,0,0,34efd8bf14c03e0212df6da35930928f45cf16a2638f05d82d7eb2cf46388400,2024-12-27T15:15:10.360000
@ -247339,10 +247339,10 @@ CVE-2024-13219,0,0,a03a53f4e8ee76aae1f68ea77b3d02d84a8b663ce18b5d410a5e09c6d7e9e
CVE-2024-1322,0,0,6d01a44e4ccc96742bbde907457ae18a669aea26c3c00f3c945d2c4b2b833c47,2025-02-28T03:12:58.057000
CVE-2024-13220,0,0,2a29f93de8fe785956cee813d639f3b7bb31198e316ff621daafc5854ef7c753,2025-02-18T19:15:12.920000
CVE-2024-13221,0,0,cbd1a7d3e900c883178aa5ebf5e7730a05696e4d330353970b2ee62e177da934,2025-03-14T16:15:28.530000
CVE-2024-13222,0,0,3369cae0a43fcf974ee9682b40ff21b7fd6cb19d101c9348f9e995ea2e1296da,2025-02-18T19:15:13.130000
CVE-2024-13222,0,1,58f0085a1407de24c3cbe5e9312e8772fe787b4e9a861aa13f1a7dfd4a9c64f1,2025-03-19T14:15:35.370000
CVE-2024-13223,0,0,30235d227081c2fe7536cc919cc2f0b95ea40b13ff9e4c274ce474e2acc32f0c,2025-03-14T18:15:27.667000
CVE-2024-13224,0,0,e5b7f02a42d65820fa96ecfbf1042671230975524d8d07a6555cf2ef2492a842,2025-02-18T19:15:13.330000
CVE-2024-13225,0,0,fd5bdb87f02a5554907e108887a0ec447c92e5005d465261f05bb066fe20b559,2025-02-18T19:15:13.430000
CVE-2024-13225,0,1,6b43d53a9f0c4910354c6a7419b4cc9a74975f7fd7ceed90095e0d3896c67dc0,2025-03-19T14:15:35.517000
CVE-2024-13226,0,0,0a148293be1e169e2bc3e7ec9c58bba636bd4d289f9d716d22106c8fd333fec0,2025-02-18T19:15:13.530000
CVE-2024-13227,0,0,c34ede3feb9dba7e466b356b6917ab16c078ee64224ad65ef9ea2ba00b4f2945,2025-02-24T16:44:13.157000
CVE-2024-13228,0,0,40cdaa381c65554c70f52b52abe8e4f273527cf6f5176b112ffc2cc6f91fc27e,2025-03-11T07:15:32.670000
@ -247561,7 +247561,7 @@ CVE-2024-13439,0,0,2f059501bc7533dd49b97287e80dce5e31332841fdcf6ed4dd7d300b721f1
CVE-2024-1344,0,0,3c7e3680ada5d2af6c947ff7713f6316fa39154980892782020553f5d0042cd7,2024-11-21T08:50:22.543000
CVE-2024-13440,0,0,5766e7a438a8e4269354aacca2cf4360d814b2b0ba936161bc318042a1e4abc8,2025-02-13T17:17:19.413000
CVE-2024-13441,0,0,c4feb7fa45e58abcf7c01d5df380ea3f267be46791773adc8606a649a8a16fa9,2025-02-04T19:37:08.100000
CVE-2024-13442,1,1,07100fbb2c07d587b77e0245f7176c7fe6e4992c54326ed9b3e9e185dd254356,2025-03-19T12:15:13.857000
CVE-2024-13442,0,0,07100fbb2c07d587b77e0245f7176c7fe6e4992c54326ed9b3e9e185dd254356,2025-03-19T12:15:13.857000
CVE-2024-13443,0,0,45895be01f051ac07538c729bc325487d84fe178af27003bb0a84004bc553820,2025-02-19T04:15:10.360000
CVE-2024-13444,0,0,f559be4a09d3b0d4718253e232ed1d6b01b700beffd4896c1d6f62eac4116d3c,2025-01-21T11:15:09.450000
CVE-2024-13445,0,0,e320e7547c6eda6e85243dd50e1b8e91047011502ea9fdec246dbbf1d042f305,2025-02-25T20:22:07.157000
@ -247994,7 +247994,7 @@ CVE-2024-13919,0,0,7c5ab092a55439dc8c02bc97bab1d29d32b755887059a3b61b9ad224908cb
CVE-2024-1392,0,0,7d376d426c7bde42291bb43e543815dd80a04cb004b570eb44a0e5840366c498,2025-01-17T19:53:57.010000
CVE-2024-13924,0,0,e36e603c0c6b6f9989e25340b54970575d329cf8a84edf152fc0708bf80f6812,2025-03-12T16:23:39.567000
CVE-2024-1393,0,0,807d9a3a72d3c227cf073d19ae4d043ce29012d9a81f19ad09766963a4531e84,2025-01-17T19:54:07.350000
CVE-2024-13933,1,1,5443dbf12b39bfc2acfe1adbc39c04300f987a9bcfb56ac22130681b41f5e2db,2025-03-19T12:15:14.003000
CVE-2024-13933,0,0,5443dbf12b39bfc2acfe1adbc39c04300f987a9bcfb56ac22130681b41f5e2db,2025-03-19T12:15:14.003000
CVE-2024-1394,0,0,3bfb4bdf7cbd2e83903d52b6ed8359606dbe1ee24d71dfdae11060be7f14efdb,2024-11-21T08:50:29.120000
CVE-2024-1395,0,0,aa14344d5f3c417e75370dfad240218276bccf85a1cff8add87ecef1ce7213df,2024-11-21T08:50:29.483000
CVE-2024-1396,0,0,99c867002ef97abbaaafea27abb6c91c61f510e73a2f0816bc88ba650d70c41c,2024-11-21T08:50:29.700000
@ -248630,7 +248630,7 @@ CVE-2024-20055,0,0,0cd1a1a1bc134a6a6fa4bf90d380bff04abbc6c81e19c2261236da7a278b9
CVE-2024-20056,0,0,81d428e4d181e8312b32dda0cff6cfde75ef18609600caa3b7da7e981bb2a321,2025-03-13T18:15:36.880000
CVE-2024-20057,0,0,d41872e09ed050e0d60edcf8c8cb9f2f16a39b7414f40d966be0c0dadc633d3d,2024-11-21T08:51:55.623000
CVE-2024-20058,0,0,b1aea78d08cecbe8a6797a2eccae67b4216de9f124a4ec0b1bd505c4bb859c46,2024-11-21T08:51:55.767000
CVE-2024-20059,0,0,3f92e7624e6793baad95bf5c5fda85b21dadfac2599351333cf7d3804b909f8b,2024-11-21T08:51:55.990000
CVE-2024-20059,0,1,f43e5b062f45304be39bcb5dae92b6ee1c5b2ee5de21825d3ba6a3416a54bde3,2025-03-19T14:15:35.787000
CVE-2024-2006,0,0,8edf579119d048fb0addb069e3e97e116defb6c81523e84fb8ce83f7cf4b6a4b,2025-03-13T00:55:44.487000
CVE-2024-20060,0,0,1b6d1c96c2231d4d9ba37c21fcd6bc05cee0dac4de2ebf5068d932765cec69ca,2024-11-21T08:51:56.120000
CVE-2024-20064,0,0,f1797f19de889df3b42c4b5ef9ef75484488143de4782f4bd3126dc110b5671d,2025-02-03T19:35:24.340000
@ -251705,7 +251705,7 @@ CVE-2024-23784,0,0,fbb08b4f0a06140ba3336bcd5ca10e9f46eba5802513fb502c644b9cd1ce9
CVE-2024-23785,0,0,69098fe97dc1e2e17c091ef031f069829d6e9d34880e18423c024bf6d8297afb,2024-11-21T08:58:23.857000
CVE-2024-23786,0,0,9b17729227428fd4f10a45c71207334db1786e3f72acd0de4b6b69c1fed63828,2025-03-18T14:15:38.450000
CVE-2024-23787,0,0,029004547be72f5abdeaa1081c2db892ce33ae9fa873b72d24ff48254b202124,2024-11-25T18:54:34.530000
CVE-2024-23788,0,0,6560a1aa3a129015b4a3affeba177920091f2bc65e89a77b92a05faa90249853,2024-12-13T17:32:04.810000
CVE-2024-23788,0,1,3ed6bafda21901799a4dfbdf04ba8447f3ad68fc5855c91f97130a2370e8a954,2025-03-19T14:15:36.007000
CVE-2024-23789,0,0,bfb78a7de0bc7e7925bb84311505f5172d598e532ae0da2c006f3536a9f5dacf,2024-11-21T08:58:25.217000
CVE-2024-2379,0,0,cf840ac82667bfb1ae0d634974b612d7cc2367516dec6dcacc2bf89b9ebdc547,2024-11-21T09:09:37.570000
CVE-2024-23790,0,0,7f508ff20070766ba08735fb62c77bc7a886506baf978895b0d3cf0b2340c928,2024-11-21T08:58:25.423000
@ -251865,7 +251865,7 @@ CVE-2024-23941,0,0,377e40ad54a332b818df016f5e6db38286f42aa52aa09ea13a642fb9c9a22
CVE-2024-23942,0,0,b8b7a23af4a9c98af1108069667a31130c84842a8fcb9e546c0dc8f6de5a3e93,2025-03-18T11:15:38.777000
CVE-2024-23943,0,0,602551addfaf9449d22eafb915e2f6ab0ff3b2123ab4dc6ea23f9b224b0664d7,2025-03-18T11:15:39.090000
CVE-2024-23944,0,0,d1f7d065765e5643c2171d654a3fe7a15ded2542e5ae0ba9d07c168a5a5837bf,2025-02-13T18:17:05.470000
CVE-2024-23945,0,0,0e48186ccb42f1ffb7728a08d36dafb5b233965e5e36ffdb7b0875fe5f7c17ad,2025-02-18T22:15:10.600000
CVE-2024-23945,0,1,bb56c069ffece046c263afd9a32b159f25c8a81747a129854e78ff3251c300b0,2025-03-19T14:15:36.173000
CVE-2024-23946,0,0,9c898cf09e521a2a31019dd3080db79ce9c32f7697e5321cb7301cafff4ddf89,2024-11-21T08:58:44.260000
CVE-2024-23947,0,0,71278d4a159cc549aab5b7dbabd025fce93076b316a17d3e2ac8c5a91e551401,2025-02-12T18:43:20.107000
CVE-2024-23948,0,0,c4340c793641d823b9f3789f568fd96f3e2cea4b888e1ca28a5883e79c28a251,2025-02-12T18:43:24.687000
@ -252103,7 +252103,7 @@ CVE-2024-24419,0,0,6461e4afd495f91efaae96c55ee7f319576a8bc399f40f12fa7c06ee46c44
CVE-2024-2442,0,0,253b87e62399d3a6af245d178e21fd710ca2545ac6e1dfd17779d2dcf3253a0c,2024-11-21T09:09:45.697000
CVE-2024-24420,0,0,a9427fa07db4986b0d9c0e963da0c4c6a915285d7c2c249b528b587f5ffa804d,2025-02-18T21:15:20.800000
CVE-2024-24421,0,0,97a85089fd7991d19460b26cfacbebab9e686820dc534e03e0b00953674d1be4,2025-02-18T21:15:20.973000
CVE-2024-24422,0,0,880bfd6c9396281614ba81f8dd610f47d3689bbb0133e6a43850002af7027433,2025-02-18T21:15:21.150000
CVE-2024-24422,0,1,cc1fe911e5d9bb47992bcf93c1d25d6815fc8e41d6031807026099db7d254742,2025-03-19T14:15:36.380000
CVE-2024-24423,0,0,2121b9c97716cc2d66ab960276b0a7ffe452fd6d2561b1b2c197696cdf4f4830,2025-03-18T19:15:42.503000
CVE-2024-24424,0,0,c7c1f65a8bf5b7819bfe95e7f58b682fa72633acefcfa8308066d9af4263deb3,2025-03-14T16:15:29.560000
CVE-2024-24425,0,0,f020647313a266e9b26d920d7b3ff0c5a70298ceb4b38f72086ac27d496b3748,2024-11-19T17:35:09.450000
@ -253881,7 +253881,7 @@ CVE-2024-26791,0,0,c8ef10c6f04ed9c66fd762d6a0b3a45e0c79cbce1caed02d55dfa6a1faf6f
CVE-2024-26792,0,0,785771b4bfd2e03416e2a07ada6b7ec1391a403eee900f868d4d1d8145ef2354,2024-12-20T16:15:54.653000
CVE-2024-26793,0,0,aa90abb3d1121ccaaf349ab01239e4c0a4a16759efda564be699ec746faed484,2024-12-20T15:56:00.320000
CVE-2024-26794,0,0,23d739d3565f17af447122df5e00eeef05a8ec54d56457d32b6380cc23d7ee66,2024-11-21T09:03:05.240000
CVE-2024-26795,0,1,d43373becd1a2a0dc874625192219b12b2ce199f209c7afab1c87714eb89d672,2025-03-19T11:42:41.993000
CVE-2024-26795,0,0,d43373becd1a2a0dc874625192219b12b2ce199f209c7afab1c87714eb89d672,2025-03-19T11:42:41.993000
CVE-2024-26796,0,0,740b63b874106b1735e661fa59a152bb86da8899659de0c6c2baad5e3560a4e5,2025-02-27T14:42:59.307000
CVE-2024-26797,0,0,d555849e5fdf34e0c546a7c8e0d877b819832c74438f586ca3128c8a5874d4a2,2024-11-21T09:03:05.660000
CVE-2024-26798,0,0,0a31e852f2f7b601301225ce2a65456a90e397455c97cc5be42b040cfac0e775,2024-11-21T09:03:05.853000
@ -266270,7 +266270,7 @@ CVE-2024-42861,0,0,5ac4827af3e3142d1b282b5930c3cc4ee3777c4ff3aba0df8482c0899ef1a
CVE-2024-4287,0,0,b8a2cf136b3083f6bb500806e5afada31dbc16efa97357879361c58428559568,2024-11-21T09:42:32.727000
CVE-2024-4288,0,0,c3337da044993bbbc180fcf8a19f1690cecb1ffe7d7876ad254d73c7461b14d3,2025-01-28T16:28:47.287000
CVE-2024-42885,0,0,ee56590959e67a72b05a6cda20f46f0a9d3647870a63123321ef2d7e471b6b35,2024-09-05T18:35:07.060000
CVE-2024-4289,0,0,aeefeb9696ba85f6773564fa5c4f7cdcbdf5edbf7d32a7520045491e7a4d015f,2024-11-21T09:42:32.977000
CVE-2024-4289,0,1,6e68774b9b4cf6699540b01a235c3deca6971edc315dab7ec717a2422c223e69,2025-03-19T14:15:37.420000
CVE-2024-42898,0,0,f0a404c15dfbdd17bf8fc2fff1d0150e98b26ac04c520196b856ef45cfd1089a,2025-01-10T18:15:21.670000
CVE-2024-4290,0,0,6a2079683ecc1d5a391a845f1e72b85d31a18e6140a0ac8996a297bb31d2d7cf,2024-11-21T09:42:33.080000
CVE-2024-42900,0,0,b64f85d57002cf7240c8feee5b45ad026c6f41850d03e921da1c59ae967003ac,2024-08-29T13:25:27.537000
@ -266394,7 +266394,7 @@ CVE-2024-43090,0,0,bfb455ba3b27b8e5f909736d7638aa4c244eafab69b7641e19b79e78332f1
CVE-2024-43091,0,0,18a7813067907079929e1aa7a03c2ea14a6eb858fe26b9c9489160580668468c,2024-12-17T20:35:58.717000
CVE-2024-43093,0,0,3f092629a0cce74f6f59bab52d6247e2ce3f3aaa2972aab5920268e0f2acfa91,2024-11-14T21:42:34.923000
CVE-2024-43095,0,0,4f9b3e24c320d2860d2ce22850ffdfb7559aa75a9e29352b4ab30371d10a8710,2025-01-22T18:15:19.013000
CVE-2024-43096,0,0,f0917337ccbf01aac70cf0fc4c11a03157db072c393a2498dc0158709302e31e,2025-02-18T21:15:21.990000
CVE-2024-43096,0,1,754ea5dc94f38edb500836a10edd3af13c0a9f6840364bf5983f93c9c05f47fd,2025-03-19T14:15:36.567000
CVE-2024-43097,0,0,004c4d6e0d21742822f66f64708df4b2724897f8929303b830f9e30aebcf9183,2025-01-03T22:15:07.503000
CVE-2024-43098,0,0,e6cfab1a6a9535db9ca658414c0bc9df5fe4048cd784e47787ef38dd04ca751f,2025-02-03T15:15:19.603000
CVE-2024-43099,0,0,7fb5b3a3641a114d0dbda5969491e20e79493c82b2229b8431c4fab73912a211,2024-09-14T11:47:14.677000
@ -267426,7 +267426,7 @@ CVE-2024-44147,0,0,0010b4e6f55ac982db2f0d22f0bf5765f6a7a167f9f9e0d3c647be24e3c70
CVE-2024-44148,0,0,335338cc9709ff206063b9ab9c7d9114b0044f4fd6d0a94bd7c6bf382ee12cf9,2025-03-14T17:15:46.850000
CVE-2024-44149,0,0,6eeeb205f0113be4e2296a27ada921710ab4d7c81a3e95e9aa805acec5d12597,2024-09-24T15:58:38.770000
CVE-2024-44151,0,0,3adb3cc493ef9fc3cca2cec3a09f77a8995ed8befc9b50d495377265c5c0fed5,2025-03-18T14:15:40.260000
CVE-2024-44152,0,0,7550f779a958464ffd932d586cb89d009c0ca7eab9087769b3575744cdc01796,2024-09-24T15:55:06.100000
CVE-2024-44152,0,1,7a7a0a7282d399fdff70a8c927df72e5141929745d24a60a917ba2999ca54cc8,2025-03-19T14:15:36.703000
CVE-2024-44153,0,0,82097411ba307b5977c3f59bb78c96925324f15ed043a95bad15fc0eb0059c7f,2024-09-24T16:19:32.593000
CVE-2024-44154,0,0,89a24bfbf234a70641ab7749eab7b5da9037b819fafebdffc1a16e298ce587bb,2025-03-18T19:15:44.260000
CVE-2024-44155,0,0,dd8c2f2995ac2dd10c9ef39e8cc88034d185cb75998040610feb68362606bf0f,2025-03-18T19:15:44.467000
@ -268081,7 +268081,7 @@ CVE-2024-45235,0,0,462ae6816185738fa34814bdc082285af9bb3670e44f64ad6e7c839ac8e78
CVE-2024-45236,0,0,10a3f25b1ce0fad9bae9efcffb3b32f23962c65836cda92b85e58e7719d1f481,2024-08-27T15:48:05.687000
CVE-2024-45237,0,0,8d0848c5954ca709a4ae70b4b78d8928a8c3e70a6fc3cc7805b63f3324320128,2024-08-27T15:48:34.030000
CVE-2024-45238,0,0,48fd855edea987481de083e60b583119b838c97c2f2219b92f30f3c9aed602d5,2024-08-26T16:35:13.637000
CVE-2024-45239,0,0,ce62a7c9f68fbc3e39168952ca22874ec7092ed70581d5bdc84358a9b5fe364a,2024-08-27T15:49:31.417000
CVE-2024-45239,0,1,308ad4017eec50af32375d82991c06ade20cb132c31cbe263f6c3c9bb55e3d3a,2025-03-19T14:15:36.867000
CVE-2024-4524,0,0,1a29c8363e54142cc04ff20a6c077338074ef9e68a92e0da5cb57a49d3b660ca,2025-02-19T18:02:32.757000
CVE-2024-45240,0,0,a153a5aa66216b02c77221395996978741fedbb71234eea04b7daf427a770991,2024-11-05T22:35:10.623000
CVE-2024-45241,0,0,969a49dfd5da3343c207df3cb1b1cc1199ba4de4eb98ea86e16e4fe39d572348,2024-08-26T16:35:14.650000
@ -268407,7 +268407,7 @@ CVE-2024-4564,0,0,ee8f47044242c05a630f54d8d399a7051500b8cbd4c8fa39ec50216846d2f2
CVE-2024-45640,0,0,923abe7b70ac2297df80331720303a7ee55474d7dd4031afdf0c5f6c2b1c1e0c,2025-01-07T13:15:07.690000
CVE-2024-45642,0,0,cfb188922d2de3d0a2e624109932e190c43782f5c9c1e7fb30a5b975a8a432ea,2024-11-16T00:13:06.017000
CVE-2024-45643,0,0,50fab40ddb7c4d5d733822515e92d29c9d1df8bc52244fdea80f3613919e43c1,2025-03-14T15:15:42.820000
CVE-2024-45644,1,1,b89fec9e44b59ed56ea1614d3b241e14e3bc17ed2f6376deb1749ef91d55dd06,2025-03-19T12:15:14.153000
CVE-2024-45644,0,0,b89fec9e44b59ed56ea1614d3b241e14e3bc17ed2f6376deb1749ef91d55dd06,2025-03-19T12:15:14.153000
CVE-2024-45647,0,0,99690f8ec38bd0cb79a3ca6e5d0b11de3bd4c9f2564c73834cc738f80a3b4cff,2025-01-29T21:11:50.207000
CVE-2024-4565,0,0,7eafc37f7621bbcecc9df42111f1503d84607d3815c6d13bfc741bedf44b3a75,2024-11-21T09:43:07.187000
CVE-2024-45650,0,0,4e5537e03b2a804010ec65f14134e876717537795080f933ff3b04a2def30a14,2025-01-31T15:15:13.350000
@ -268851,7 +268851,7 @@ CVE-2024-46559,0,0,574bb782de67d3ca843eb7dadf7886c850048a085dbeb205a59363fd8a35f
CVE-2024-4656,0,0,6d241fc1cd2c4b7cf0efdf2dccdedfe28029ef7d9e8fd963203fc60e3122a942,2024-11-21T09:43:19.090000
CVE-2024-46560,0,0,a586c31a90480257b3b10d2df129325a006d5274100f26e7023a1ac0621f5b47,2025-03-14T16:15:35.920000
CVE-2024-46561,0,0,c25954c2fd9d3ad9e3b0bbe0be5d2cc787aa6e3078e6f23b1b9e5e3ce54e8b97,2024-09-24T16:41:54.337000
CVE-2024-46564,0,0,e3650601e6103c25c0638469ece4f175000c7656b133c286eaafe2153db2c0e0,2024-09-24T16:41:55.907000
CVE-2024-46564,0,1,e60856fed0c5c52ec0575c0a0cf7d21f60315a4cf6ad706c961eaee2c7364f69,2025-03-19T14:15:37.093000
CVE-2024-46565,0,0,f5657924f5aa18ab256492c2fb84533af8b2d2b6dc20c817da65bf4bfa08a6a2,2025-03-13T16:15:23.200000
CVE-2024-46566,0,0,a645300cad5cbc9678845ef13387d0ff84f678de8f2f73f755a1a4420c48c73c,2025-03-18T21:15:30.230000
CVE-2024-46567,0,0,dc3cb195e900cad9c5ba8c571a707de430f78c6e79b59e5d2ca6aa377b09ee20,2025-03-18T16:15:24.277000
@ -270480,7 +270480,7 @@ CVE-2024-48784,0,0,0480c0cbca95176a3691abe719169608ed92e96fcba60ce2d516ea18e95c0
CVE-2024-48786,0,0,bbe4462c021ce09fcf89f5b2a0dcd0f951296fd770a62d8b0d79a432dfee8ecc,2024-10-15T19:35:43.413000
CVE-2024-48787,0,0,6564c1e5dbdb27e3c0da30d8c57cbe4f0f15455d949b017d5245d35b4ceece19,2024-10-15T19:35:44.190000
CVE-2024-48788,0,0,8b8214a71f356be931cff2267f2702ed7740182cbb0eb5f3d3efd807a79c28bc,2024-10-15T19:35:44.980000
CVE-2024-48789,0,0,f8ae2ce83f7bf2d0047756f47e3e493d33946c0823d005b7c7c693bbc20847e9,2024-10-15T15:35:19.560000
CVE-2024-48789,0,1,67cfce7daeaffa58ebeccb4737bd5b5552cbc794635a12c93461c29c61a25e83,2025-03-19T14:15:37.263000
CVE-2024-4879,0,0,7c395d6e4031631ba9ee91c0f43da9eb3fc030b6d50ab41e344463ed9baa2ff0,2024-11-27T19:07:32.497000
CVE-2024-48790,0,0,927501c5af40d914a6b115eaf64ce905b5d2c59b8ad73c575fddb443d1f4656e,2024-10-16T19:35:13.893000
CVE-2024-48791,0,0,9bb2b832e1e23b3a96788cb485be5297b76b1fc9e62778e7aade734bd9ca825d,2024-10-15T15:35:19.917000
@ -274864,7 +274864,7 @@ CVE-2024-54515,0,0,c445bd848e4bc13ffd78ff33c0ea49b95c8a73b35bda3dc25adccc76a7fc0
CVE-2024-54516,0,0,e8ba1fcfdb5f47f03fbd36d5449c88d813bc63b8b64d5b9b4efdf797cf304aff,2025-01-31T22:15:09.917000
CVE-2024-54517,0,0,0fd8179ccbd0365cba7e573ee71cbe811419d7ef1458fbfe931e08b20e6d2a7f,2025-01-31T21:15:10.470000
CVE-2024-54518,0,0,d38c926bb772a5ff5d57f8a717fd3f35da4b9e51aa8e226408c9ace4c51813f4,2025-03-14T13:52:08.567000
CVE-2024-54519,0,0,53097084da19dd38b3872df86440f9d1c2398ee8c0c32a99274a20e3f8ad0a33,2025-03-04T16:02:20.193000
CVE-2024-54519,0,1,038d1614cfbdc4572202581f7fbe878fb47b32cab7391d269a22f5ea96706a76,2025-03-19T14:15:37.577000
CVE-2024-5452,0,0,b01b2e3bd56dc4d1c97364b861c6906ac1d43b69b37e06474f7fb830a26b907e,2024-11-21T09:47:42.793000
CVE-2024-54520,0,0,18b891d1690a96408f82842735c71853309121502ff683d7104fb85f6fd3edce,2025-03-04T16:04:48.440000
CVE-2024-54522,0,0,80fb36ed2a4a59a992326abc248d0ec330053d9d33dbfa34981ed62e5e38966c,2025-02-06T16:15:38.563000
@ -275193,6 +275193,7 @@ CVE-2024-55548,0,0,60ec3cfbffa02335f07d92ff09758467617c9784164eac84c7091a0b78c95
CVE-2024-55549,0,0,e40a4c580768b58c769dfa4be1cd90fded892afed66fc33fbb18edf2d01cebbf,2025-03-14T02:15:15.333000
CVE-2024-5555,0,0,742073dac4de00aad4cb6df58c8d366b01298901468c1f8f2b3d987b01395142,2024-11-21T09:47:55.300000
CVE-2024-55550,0,0,9c9a30509bff8c2bca43bc78e6a45113dde5cc452b32a2969aee61b5f7aef23c,2025-01-08T20:46:01.203000
CVE-2024-55551,1,1,d05413b76fecbece613f7fd256c99c60af75cf161dd1a411dbd915fd8153a063,2025-03-19T14:15:37.733000
CVE-2024-55553,0,0,7eeb75a14e5e1d77aed9e75af34c2f5c49991b3437b2609ee4ab7150515fb433,2025-01-23T18:15:31.327000
CVE-2024-55554,0,0,09e3cdaa4a820daeb6598bb5a8faaf533e66285f3e6a4797b593c193d2a0933a,2024-12-17T17:15:09.843000
CVE-2024-55555,0,0,23cb115ef4fe2561a6a7fcc2062f11f2cd9ea52ba2e0bb52e449ed37dbe2da95,2025-01-07T20:15:30.430000
@ -275626,7 +275627,7 @@ CVE-2024-56300,0,0,fd8f91c54d7b2d2f0c20bf657c6cc558d46dbec655d8d7ad2230066619d3c
CVE-2024-56301,0,0,f46c9c676999b63d81039c9a073e3c1760c3de4da85396c862849172997d41f7,2025-01-13T14:15:09.887000
CVE-2024-56302,0,0,3cc2e63549a8e725e4b4c7af568502951e05c6a235ad3d0ca614770a8ee20a50,2025-01-02T12:15:28.753000
CVE-2024-5631,0,0,1180039d5b51b355c10882902757c5bad7937e7ec31e81b99a019ddedc795440,2024-11-21T09:48:03.210000
CVE-2024-56310,0,0,a3b0ecf50e8c7209a61a57095969ecfd6c116faafd65e192eb51abe661a5112b,2025-01-14T17:15:18.487000
CVE-2024-56310,0,1,81cb9cd8f363d6d459acd5f1bfeec92cede3b03d846b7830ab32877ba7e765a8,2025-03-19T14:15:37.850000
CVE-2024-56311,0,0,a5f3b806b958921d1fdd47ae934460856fc391070c28ff5582bd271a9abc04fa,2025-03-13T19:15:48.973000
CVE-2024-56312,0,0,ec6ad9e3aff51a846de9bba86b7c3a52a17ae2fffb31510f4ca2dae81601a513,2025-03-18T15:15:57.893000
CVE-2024-56313,0,0,1b88794497f6eabc0004fec8ac6a8d185d6145923adb3ec2e2c9ede1c7b79c65,2025-03-18T14:15:40.837000
@ -276149,7 +276150,7 @@ CVE-2024-57019,0,0,51cc8b086b8447cea4ec896f4a4e59d09678a95b81b389fa4b6049d603cd1
CVE-2024-5702,0,0,0475f3c0e898a1e0fb13fcae8449da95e6752ec9b4d015e07dac4bfa56be1ef3,2024-11-21T09:48:12.273000
CVE-2024-57020,0,0,9454e1c3b56fc45c0cf376ca86b2277ead569dba13637690be836b10ddc0b8da,2025-03-18T19:15:46.330000
CVE-2024-57021,0,0,0783ac9280f5195c94c82d43c182876342e5cdb245119e654e821d65ed0809e6,2025-03-10T17:26:48.597000
CVE-2024-57022,0,0,1356d2451b9537ddd5990de88e26abbbe2cccf3f2db031034069b49632d38abe,2025-03-10T17:27:02.037000
CVE-2024-57022,0,1,c99a0b15c70fa516c5e22b536ddcece1907ef44e69d46228494e189b49dab6e4,2025-03-19T14:15:38.007000
CVE-2024-57023,0,0,01de6489e57ac073c34548807079eb2db864fcfb3e5a1353732f75c9ed7380a6,2025-01-21T18:15:14.677000
CVE-2024-57024,0,0,dd6768df4410fc37cc8c4e8a948bb715a9d72db959034294e4bc9c1d5752aa77,2025-01-21T17:15:14.723000
CVE-2024-57025,0,0,ba6eba255be4ec8bea25a2cdeb615de849af222ae85f044e2a8f32f3b1f8d1b7,2025-01-21T17:15:14.910000
@ -276316,7 +276317,7 @@ CVE-2024-57439,0,0,6e64e016f192ab733e54f5a3035d1b158d0cb22bcd6abee8112395eba7b19
CVE-2024-5744,0,0,f08529b05aa9992ca46f071419027f83a7c3d97cd6c27e854ef9ed714ed839f1,2024-11-21T09:48:16.267000
CVE-2024-5745,0,0,7e65c88ad788c6b0931bb1e2e7e3abdcf09fad20076d859b2aa0fb4c2f137ddf,2024-11-21T09:48:16.423000
CVE-2024-57450,0,0,d39c86b260ea84f1a2f257f30527cffe772404e6d44d8d70c9ac83512b1d5bb2,2025-03-15T16:15:13.963000
CVE-2024-57451,0,0,457f8d0d04958505765bd5482d60461b04ad42fa6a9db7053da5d51c60da0d3a,2025-02-18T19:15:22.057000
CVE-2024-57451,0,1,2db3406871d80bd68bbad68d68fa327b18fbac1129e57466460b4f3ccd88e278,2025-03-19T14:15:38.187000
CVE-2024-57452,0,0,69b2caf34cf7071b96ea6471a5e6fc7e5be69ea985d031aa0ac8d466b99d25d7,2025-02-04T20:15:49.260000
CVE-2024-5746,0,0,983f92b35d2851c40a6d833edd298ce544be182f3cbb073e4d5723a172283607,2024-11-21T09:48:16.580000
CVE-2024-5747,0,0,b0a73052a2b0fb8e91ca0186eb03a0a139ee155bf24624c988c4f85a0b80da72,2025-02-11T02:15:35.543000
@ -276476,7 +276477,7 @@ CVE-2024-57720,0,0,c6ea7c04d1f31cae7cfb088d00930ccdd0afdbf506292dce573bf98c3a055
CVE-2024-57721,0,0,c83b53b1f3da4e985aa3e8c6db4fa9cfaecd34c84a7a02eed4e5ae091c579b1b,2025-03-18T20:15:24.810000
CVE-2024-57722,0,0,fe5f4b3d273b2bf55fcc76e08e5390fbe140aa7e5c09f86912f960a4c7a9604f,2025-03-14T18:15:31.113000
CVE-2024-57723,0,0,c92af6f34b1e7a77bd52395245ab2a0062aa33af3c30b437ed91059e3220852d,2025-03-18T21:15:32.023000
CVE-2024-57724,0,0,43482da76e1d3664f5827ca7ff902585915c01a2cfee87e8119ace671edec575,2025-02-18T20:15:23.023000
CVE-2024-57724,0,1,487089e408f484b4e1d087661cae83e75947526a640613ebbcac96e43dd9db55,2025-03-19T14:15:38.337000
CVE-2024-57725,0,0,37c96803862b631e561de51a48e8624822d17dc31067e76ef4d04e27dbd1c96e,2025-02-18T15:15:17.067000
CVE-2024-57726,0,0,b06228a1f549336c575c9af51a5eec97f13915f9b87b92d879c22e35b9610a8c,2025-01-31T21:15:11.857000
CVE-2024-57727,0,0,40a8243c73e2ffb483061a8498545f248d48c8fe22413e0fd73f6459bc3cda9b,2025-03-14T20:01:25.483000
@ -283037,7 +283038,7 @@ CVE-2025-22795,0,0,6ef875d457c8e19bcf577814595be38d790143627f91775ea895c88416ac9
CVE-2025-22797,0,0,bfb6494fa60ec5385c83095c381eb3d371c5ac04e9a0e3e98e9fb531b781c320,2025-01-15T16:15:42.200000
CVE-2025-22798,0,0,4bb5a9aaf24c54efe5fc5f3912b846eb9cce5d1ee04c046662973251c02694d2,2025-01-15T16:15:42.343000
CVE-2025-22799,0,0,6e8872882381d68d869db15147218f1df6746b9c043b33787660b5e87e5fc5e6,2025-01-15T16:15:42.490000
CVE-2025-2280,0,0,c600ee299db6fbe4dea5dbc115e68093f4f6491d41513b4303a551f9be05f78f,2025-03-18T17:15:47.873000
CVE-2025-2280,0,1,f4a48035829663cfae86ea311e78db4fe353e4689096d30459dc2c2261cf7c40,2025-03-19T14:15:39.743000
CVE-2025-22800,0,0,997e3835a4655649ba94b8ddeb47fb1ff239e42030c36467b8eb9689698fed1a,2025-01-13T14:15:13.067000
CVE-2025-22801,0,0,c83deac6a5c5c2cba0bd79ad3064ebb1b72b5ce6e25705a33f2e1f95b55a8ff2,2025-01-09T16:16:29.323000
CVE-2025-22802,0,0,4ee09a11670407cea09cb459dd4de4a2924f74334017dc53487f4f767d32ad7b,2025-01-09T16:16:29.470000
@ -283955,7 +283956,7 @@ CVE-2025-24104,0,0,eaf2341118958cce67dbc21070a8e2f4a62ff3d770291a310ec877a84b56e
CVE-2025-24106,0,0,7b1652442d8e4a2ef42869db0a96088570ce1bd80744fef4434e3c62e98b9210,2025-03-04T15:25:19.603000
CVE-2025-24107,0,0,96402cf84c64acffc4d1662c29f8a3c8a0f854a65ff188084b5ba4a1a1ec5a35,2025-02-05T16:15:42.013000
CVE-2025-24108,0,0,9aaaaccaacf9017079892b606e6940de8d3cf8011d17b629bcde5009dfc6e215,2025-03-18T14:15:42.627000
CVE-2025-24109,0,0,3a06e33059ab25d8437d67978eebded22edd06fe8c09a21c862e225782f2c988,2025-03-04T15:26:30.650000
CVE-2025-24109,0,1,8eb130cf27592d50192927f1b19c4211e2d1fcf396c33ec739b688659623e038,2025-03-19T14:15:38.700000
CVE-2025-24112,0,0,00ac1ad70de7c95aa177469e4cbf1b6a59be3178c8668d42d9efaad7c292453f,2025-02-04T22:15:41.893000
CVE-2025-24113,0,0,dfb8fdeba08350f2d1ba047bdfca5272552cfc4b72a68de35cf8a6aa8ccbdc7b,2025-01-31T22:15:13.443000
CVE-2025-24114,0,0,060f1a53826cabb1840c2e97a20d5ed1dcd10135e4439b8b05507d5cf354517c,2025-02-04T22:15:42.030000
@ -283993,7 +283994,7 @@ CVE-2025-24153,0,0,a962e00376d57b532ea670dc465405ba54e446d5423d2019e225758957981
CVE-2025-24154,0,0,2133416aad04106ad04753c0c4ad3643abc6a261600e1250147cb0b1c5f17046,2025-03-18T20:15:25.680000
CVE-2025-24156,0,0,8fa4c1a03f09991e5c2bed2e07959c1558a8892a2864cd53dcb29d166373a914,2025-01-30T16:43:39.593000
CVE-2025-24158,0,0,acc7809ab4701d1dee654bd85d3ea355491d3c160b1e018c6b17b635a2e8852d,2025-03-03T22:51:31.440000
CVE-2025-24159,0,0,3b398e5ec735d86e63a66bb20838217a4d8bb188393327507b8a692d20b032c8,2025-03-04T14:57:16.473000
CVE-2025-24159,0,1,5049ee423dfbceaaa990b18ae981888a723164635f4aec7b443286d0a98a6096,2025-03-19T14:15:38.853000
CVE-2025-24160,0,0,ae6edae2205c08dd8b969920bf8cb3dc84d26eaf5297b5739349f27fb704a2f3,2025-01-28T16:15:44.003000
CVE-2025-24161,0,0,6d02f0f01530cc9b917612d04abebc1e6d67d88a440e864a6d1a14a27e3f4034,2025-02-04T22:15:43.057000
CVE-2025-24162,0,0,e7182d7278474afcab3466a5bca917be81e38e822e2649153160baaeab126f37,2025-03-18T15:15:59.527000
@ -284516,7 +284517,7 @@ CVE-2025-25106,0,0,5adf6027f92cb35d0099585e7a65f3fb0596ff1c0a8b0759d2eee782d9073
CVE-2025-25107,0,0,e2af2faa3c90d7cdee713a48892bd288f889534c19b4e3defad819e99fdaf327,2025-02-07T10:15:16.570000
CVE-2025-25108,0,0,4216f31163792796c6d7a76b0dff1cbbb671cc5df74f5753efeaa4b4e5746e06,2025-03-03T14:15:50.767000
CVE-2025-25109,0,0,6d682a3d6df717c26d33e232bce785fcc26b0d6fbdfb125423df3b58afab6248,2025-03-03T14:15:50.907000
CVE-2025-2511,1,1,7ebf0f149ba9d30fea37aadf5b0642b4c17d468dddde4eb7642ff1405e2ac138,2025-03-19T12:15:14.313000
CVE-2025-2511,0,0,7ebf0f149ba9d30fea37aadf5b0642b4c17d468dddde4eb7642ff1405e2ac138,2025-03-19T12:15:14.313000
CVE-2025-25110,0,0,4041c70c5aea0a8415f9f6d363010815ba5afaf620d0b4cbccab698ef7bc642a,2025-02-07T10:15:16.747000
CVE-2025-25111,0,0,94fd198f7a55281e7e3f3a1093ff63f49472757f065ea1d6a6e9b48f0d5e39ef,2025-02-07T10:15:16.910000
CVE-2025-25112,0,0,6606855c1cd27f20e8867aa9a0e41193608500ababbffad4e75be64d9d182194,2025-03-03T14:15:51.050000
@ -284527,7 +284528,7 @@ CVE-2025-25116,0,0,bcf37afc318f5e9ac3f628960ea4fa413ee951eab0cc5618b798180318935
CVE-2025-25117,0,0,315c56cbaf5ff1e3498f8b9cf6b2965e180d3e2a738da99a953fe4b2580fbd4a,2025-02-07T10:15:17.267000
CVE-2025-25118,0,0,367270eb5aa7e76ca009abbeed8d68dc0bd7338562d262954a33f7fa4cf2772a,2025-03-03T14:15:51.610000
CVE-2025-25119,0,0,f12a4fb304e58f7685a75296c77c9d95278051f76c1b47108438f8d261173f37,2025-03-03T14:15:51.750000
CVE-2025-2512,1,1,04dc0e32b86bba275816258b77d4ca6c96e821bcde40da19d3d57e7407c1771f,2025-03-19T12:15:14.463000
CVE-2025-2512,0,0,04dc0e32b86bba275816258b77d4ca6c96e821bcde40da19d3d57e7407c1771f,2025-03-19T12:15:14.463000
CVE-2025-25120,0,0,37d7efddee9451cb8bdde13d5063d3355ce365b4be1738cfe09d05a928d650ba,2025-02-07T10:15:17.453000
CVE-2025-25121,0,0,affb830fba7b58ecca3c4dde16bde250272ea421c2c05bb933f1730e460c4449,2025-03-03T14:15:51.887000
CVE-2025-25122,0,0,c7933c3b08bb5046faca8cf2e06c3abb9ff38205e55e352fa2bc9dd4eb25abca,2025-03-03T14:15:52.033000
@ -284695,7 +284696,7 @@ CVE-2025-25476,0,0,dcb05a63fbcff084bcf1c5df3723664abe2b9f2707596be8a1333f910233c
CVE-2025-25477,0,0,186e1b1b42cd761794319ad88366f1783c2b185a5c4c7ba09f90886d766f572b,2025-02-28T16:15:39.550000
CVE-2025-25478,0,0,5d678bf64fff284866af822721a081473e94720053a6940e94e8607a25812368,2025-03-05T16:15:39.297000
CVE-2025-25497,0,0,342cc8c3073c7b4fb963ce6919474125872366956f79f35d55abc4517740c1dc,2025-03-07T20:15:38.013000
CVE-2025-25500,0,0,111d4db0bc81dd7cc682206d7f44a5f888cd685ec97f9d39953e9264ebcd56f7,2025-03-18T14:15:43.493000
CVE-2025-25500,0,1,da1c898cfcbd810f078b7294d1eec0d9905e50224c954d32d8cd7908e965ddf3,2025-03-19T14:15:39.033000
CVE-2025-25505,0,0,11c4c75af440f82d715defaf6782907c0744a464a1a91c9d9aeef14ada87484d,2025-02-21T21:15:23.723000
CVE-2025-25507,0,0,aaa8b5a00bc14c6200ce4ada5e546d091bf3632fba77c66b3ac71c873b2a184e,2025-02-21T21:15:23.870000
CVE-2025-25510,0,0,80b49d96f8cfea96d2e40e1145bf347e93013db39579b2b941514912fbfd558e,2025-02-21T21:15:24.023000
@ -284728,7 +284729,7 @@ CVE-2025-25586,0,0,744a470f770a9515b6f7dfb52c66d60af37830e5dc13b1912db087fb3afac
CVE-2025-25589,0,0,824725523e28132dad4cb2619d08cb50c773fd7753d8cafe5fb64b8961821ca3,2025-03-18T16:15:27.200000
CVE-2025-25590,0,0,0ad36cf80c5032a80ad0bf8eb00193fecda94b0782be77115fea9b1209b274e1,2025-03-18T15:16:00.373000
CVE-2025-25595,0,0,fcc81d79cad074e1bddfc729b95a0032a9eb1c3955175115764d73587af47da7,2025-03-18T17:15:46.203000
CVE-2025-25598,0,0,77f039cd06718093e1c276e16fe184c5d4efc61143dbb11eacdc3787cfa066aa,2025-03-13T18:15:50.857000
CVE-2025-25598,0,1,ea8ff451786059144f97b5402e36a3bbb5df978993f22c0b25b2578aad85418d,2025-03-19T14:15:39.140000
CVE-2025-25604,0,0,7a8cc3234dfcf2fd463e6a54d1695816511ffd986519d0bafcb53e4f83d303ac,2025-02-21T21:15:24.170000
CVE-2025-25605,0,0,c0858a3094cad59e4cf6248dc23b2aa0633fe28bfdda9aca36970755a7dbfbce,2025-02-21T21:15:24.317000
CVE-2025-25609,0,0,266dd94a110ece3c3e14be6241a6b4dfd9dca67d8afeac437f4e4e876c6d5556,2025-03-05T16:15:39.460000
@ -284892,8 +284893,8 @@ CVE-2025-26206,0,0,bc67999dabe96502b241246d2665faf1f09178bdb9b72e5e7dd5401b748e2
CVE-2025-26215,0,0,398e0534dde9630858e15022c6decb119d529efa2fc59efd24b3f1a57cdf3f89,2025-03-14T17:15:51.613000
CVE-2025-26216,0,0,fa35563faa6505245c7f05bc4878e14310c206fdd07c5771663544280eaa71b8,2025-03-14T17:15:51.730000
CVE-2025-26260,0,0,23c98183c981924ff624691f004f57ca0a3b3fc9df97cc744f6e86e7322bfeaf,2025-03-12T16:15:23.907000
CVE-2025-26263,0,0,33c82bcdd68cdcef2d06780800c3ab6c6f6af78532f2208935cfab51d7c78d3f,2025-03-17T06:15:24.630000
CVE-2025-26264,0,0,78a1bd2e43e9b3b3479a5073d67ff29ef6c7b849522e2d6fc7c934784cc466cb,2025-03-17T06:15:25.070000
CVE-2025-26263,0,1,87852969ca209a829a551b3d11cffebf3ca020061fd4d362c34f3d6a1719258e,2025-03-19T14:15:39.293000
CVE-2025-26264,0,1,7eeeb1b8e87d7e06484f4d071bc6d32b977cfa79c395c4fbca1cefbdfdd35c84,2025-03-19T14:15:39.440000
CVE-2025-26304,0,0,70c8f37d4db2054dfe1099a4a2c4b06129c826d4de254465b9316b6b41e402d7,2025-02-21T21:15:24.653000
CVE-2025-26305,0,0,1a1d603a79ab0dad9b04f449d78f3a3bb9f5de25113a59f9bb3a8e492946e3de,2025-02-21T21:15:24.803000
CVE-2025-26306,0,0,f6318b29dc3c8fcf62d8d059c582dc4ed277312d31ede047e5262baa26bd01da,2025-02-24T18:15:21.357000
@ -285068,11 +285069,11 @@ CVE-2025-26698,0,0,02e1c85350f9590f950db8be3fe5f72c9485333903c0f224a4be86e1fd66b
CVE-2025-26699,0,0,e88af5cce40368f723e525bfe75ade49611d14fa54ea6a0ae28e1d64f24ae73d,2025-03-06T19:15:27.683000
CVE-2025-26700,0,0,6e3b394d53337ab4fe903b88ec563a5f9fa1519ac62684b203abb3bd4f953337,2025-02-17T03:15:09.750000
CVE-2025-26701,0,0,89b8b735021c8ba1b57a31289c67376fd76e788ad77a06946ec19e6114a95335,2025-03-11T18:15:33.210000
CVE-2025-26702,0,0,52293558e0b7c22cf2e8f2ca3cd772feb4c403ac4e7748fff5fc7c1ca294fde9,2025-03-11T07:15:34.133000
CVE-2025-26703,0,0,094c28df5cba22d3b953f9d7043ec8e7fd878498977b463b336b76b278bde734,2025-03-11T07:15:34.580000
CVE-2025-26704,0,0,7df36e8590b1e0c4f22127c1f776f171e7128457eb7e10f2d3d1ede0719a6c5e,2025-03-11T07:15:34.967000
CVE-2025-26705,0,0,6e647080e395211b558a87f67b0324083d4c877d83b69fccf1c9b798f8ff4d63,2025-03-11T07:15:35.330000
CVE-2025-26706,0,0,c64ce4dfa97ebe74ab023bc4aec6b6c65436ef95ad63caeb02e265c0af10d6a2,2025-03-11T07:15:35.703000
CVE-2025-26702,0,1,1839f93bfb7ace4325903035b3bb74add19b6f08607cfe0196f58c5d53bcb05c,2025-03-19T14:08:01.357000
CVE-2025-26703,0,1,5d0f4e93d2d8f53943eec95a19382fdc01adc6b71ca5902ffd41b3078a42a0fe,2025-03-19T14:09:38.080000
CVE-2025-26704,0,1,419ed24de70dea575c53e5d2943423e1ee68404dd42f3936f3e41631976d677a,2025-03-19T14:11:17.600000
CVE-2025-26705,0,1,60ec52a3a37b8a1198549fd1a80bc727c4794d468b4358c4011967c60a257f05,2025-03-19T14:12:26.253000
CVE-2025-26706,0,1,b51b241e56d67a82d489bdb9e6cf7f91b77a7162f00bdf295468d48446e749e2,2025-03-19T14:15:36.417000
CVE-2025-26707,0,0,96aa33e65cf78737f84fce85389a49f91137e43bd9dc650590985bf2da9a0450,2025-03-11T04:15:25.093000
CVE-2025-26708,0,0,2f79eae1bf3a9e2cd078bee2e260f7de2077d1f5b314f379e5bf317e129bf549,2025-03-07T03:15:33.307000
CVE-2025-26750,0,0,d88bdcd674193a8c592f1b97cbf3fbf882d139c99406f62e08a860c366f790c0,2025-02-22T16:15:31.210000
@ -285526,16 +285527,16 @@ CVE-2025-28010,0,0,0a11d87519d9b22f0f2ae9be8ae1be8db80c1ae4bdfd1cb8d0cf77b19c42d
CVE-2025-28011,0,0,2a370ee125823dd49484207db37abe8d21873504d43764feea8f4c2dabc113d2,2025-03-13T17:15:37.530000
CVE-2025-28015,0,0,0603e9cbef2e5ee55344938ebfb39b43a9cec4a734d3544a5d237aff3bf7420a,2025-03-13T16:15:27.810000
CVE-2025-28856,0,0,db2bbb32cf52cca2ced522652c0571cdcf66f2f5f62f3cd167e79253416a8f6a,2025-03-11T21:15:42.763000
CVE-2025-28857,0,0,7639d5f3953225b459d1bad1ea0b4ccaa2504977cf138c727b6fb2178ec9f366,2025-03-11T21:15:42.903000
CVE-2025-28859,0,0,6f1cc910637d00c9ac6a4de42a12398aecbc5ea7960b119921c942487abc24e7,2025-03-11T21:15:43.050000
CVE-2025-28860,0,0,6a8a0b0b17c320bdd0b234f5d94b4edbc9f7bbc4a57c83549a224117fd3464a8,2025-03-11T21:15:43.193000
CVE-2025-28861,0,0,8cd4229cbec76109810d5b343e5b05de1f3301639f651f97050ebe36e9bcd987,2025-03-11T21:15:43.337000
CVE-2025-28862,0,0,498e18a442d30fb8e225f96e842cc7c3a56b99221a7a581ac6944ff55b2dd6f4,2025-03-11T21:15:43.490000
CVE-2025-28863,0,0,3800fe89a39973b6b1231d056a9a553d8b250263bbb47326e4368baee010353b,2025-03-11T21:15:43.647000
CVE-2025-28864,0,0,476816835ccebd5f68ac74b6072001d700dfb9d6006755533c883c8ada0f5cce,2025-03-11T21:15:43.810000
CVE-2025-28866,0,0,e6e8567798ae0e1def137ae8a79778279de6d299a623ad6b571a34e8fbecf55b,2025-03-11T21:15:43.970000
CVE-2025-28857,0,1,e1c738bc9844b1bfe2c67596adaf7c2a8564c2cc541068f87b173d55a262a1b8,2025-03-19T13:41:38.270000
CVE-2025-28859,0,1,1a821bc58dbd31b9f48e7a0ed4774a6a9b375dee8d99a0455626f76a2b5564f8,2025-03-19T14:01:43.707000
CVE-2025-28860,0,1,66dc2154f8e6a7d5fe774501386200cf25568fdb5590c8e79b061d6b8471f51a,2025-03-19T14:06:00.333000
CVE-2025-28861,0,1,8f06dd797c877ac540417e774f13db9bcbfcb5efd0679398413b1a7d851d0a33,2025-03-19T14:08:16.920000
CVE-2025-28862,0,1,262a0346545485f6d48b7aaaaae4bfd67403a534df363d75e6b444693b4d15c9,2025-03-19T14:13:16.610000
CVE-2025-28863,0,1,30697552adbf533d5aedc6bffbf20d0c5bb50d79e9020ff1669e6e6b9af3055d,2025-03-19T14:14:18.080000
CVE-2025-28864,0,1,fa24a3929b56ed50394276a64f3f8bff3c17a1ca074b88848c593735e282f43a,2025-03-19T14:16:41.287000
CVE-2025-28866,0,1,6216179861a4260f9ff8f846c033be3d21e175874bd3a83d400d670ba4d4e4a8,2025-03-19T14:17:39.090000
CVE-2025-28867,0,0,4ca8db1ab3b6a1f94a88ba6b89b60f18839f31c5ac8e654bb73f4f011fc98a3c,2025-03-18T20:43:40.300000
CVE-2025-28868,0,0,09db76947750674e0f3b002c373925c37261fe218f54cb6c55eebe5eeb4518c8,2025-03-11T21:15:44.283000
CVE-2025-28868,0,1,cb75dcce807bf86a4d7596310f6bed7a2a7832b4c4f7cc8be6554b5078689d39,2025-03-19T14:27:00.497000
CVE-2025-28870,0,0,e4153cd68c5e457e5fb1a3618dd0f3fc9e338446e1283f587e70001d5bee2ff3,2025-03-18T20:29:41.383000
CVE-2025-28871,0,0,96091a1c69b0d922d056c2a14a5d867c146a33cfc934a23b3119118821cf1523,2025-03-17T18:45:11.073000
CVE-2025-28872,0,0,f3b7d21384421d1eeb12498b153df5e281517aad4a4d3aff96a3e023ae3b23ad,2025-03-11T21:15:44.757000
@ -285622,7 +285623,7 @@ CVE-2025-29786,0,0,0c40fa5408515757638473e28641812347d31da5efea9c126f50ced0bd11d
CVE-2025-29787,0,0,f2e861b6c4dbf868707fba7b3fb131d1b9814d3e4021455a52a8a2d5236bf0cb,2025-03-17T14:15:22.447000
CVE-2025-29788,0,0,e1a88fbf2eb4e52db6d664e73916facba347fa2e80c6c15ea20d2760d435bf11,2025-03-17T14:15:22.653000
CVE-2025-29790,0,0,675222ea0eab8ae3f29f8b94428bcad2e1e1b41b05f6926d11004b88739188d2,2025-03-18T19:15:50.813000
CVE-2025-29891,0,0,19957216c682a927ada7fbe8d799bf8aa1337ea00af552d450ee80a227a50322,2025-03-13T09:15:14.860000
CVE-2025-29891,0,1,6f656b5325e6e317e0701bf37e32b1fd845a6f162de74687e113855da8de633f,2025-03-19T14:15:39.573000
CVE-2025-29903,0,0,10c68e7ddaac62cfaf56fa2d0c36952343de94dcaf74d7de9700d239804e47d3,2025-03-12T13:15:37.823000
CVE-2025-29904,0,0,8151be9d68bba0e8c527ecea5490dd29fd8894724b2933080703a0ecee03e639,2025-03-12T13:15:38.050000
CVE-2025-29907,0,0,cfa2108f203bb2d21cc6fdede35a67ff448b143468e6b33a2073415a2c48ea4c,2025-03-18T19:15:51.197000

Can't render this file because it is too large.