mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-19 17:31:42 +00:00
Auto-Update: 2025-03-19T15:00:19.479491+00:00
This commit is contained in:
parent
977dcd9644
commit
fd76f99df0
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2018-9447",
|
"id": "CVE-2018-9447",
|
||||||
"sourceIdentifier": "security@android.com",
|
"sourceIdentifier": "security@android.com",
|
||||||
"published": "2025-01-17T23:15:12.327",
|
"published": "2025-01-17T23:15:12.327",
|
||||||
"lastModified": "2025-02-18T21:15:13.370",
|
"lastModified": "2025-03-19T14:15:34.120",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -15,7 +15,42 @@
|
|||||||
"value": "En onCreate de EmergencyCallbackModeExitDialog.java, existe una forma posible de bloquear el modo de devoluci\u00f3n de llamada de emergencia debido a la falta de una verificaci\u00f3n nula. Esto podr\u00eda provocar una denegaci\u00f3n de servicio local sin necesidad de privilegios de ejecuci\u00f3n adicionales. No se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n."
|
"value": "En onCreate de EmergencyCallbackModeExitDialog.java, existe una forma posible de bloquear el modo de devoluci\u00f3n de llamada de emergencia debido a la falta de una verificaci\u00f3n nula. Esto podr\u00eda provocar una denegaci\u00f3n de servicio local sin necesidad de privilegios de ejecuci\u00f3n adicionales. No se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||||
|
"baseScore": 5.5,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.8,
|
||||||
|
"impactScore": 3.6
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-400"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://source.android.com/security/bulletin/pixel/2018-08-01",
|
"url": "https://source.android.com/security/bulletin/pixel/2018-08-01",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2023-32110",
|
"id": "CVE-2023-32110",
|
||||||
"sourceIdentifier": "audit@patchstack.com",
|
"sourceIdentifier": "audit@patchstack.com",
|
||||||
"published": "2024-05-17T07:15:53.300",
|
"published": "2024-05-17T07:15:53.300",
|
||||||
"lastModified": "2024-11-21T08:02:43.730",
|
"lastModified": "2025-03-19T13:37:32.060",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -36,6 +36,26 @@
|
|||||||
},
|
},
|
||||||
"exploitabilityScore": 2.8,
|
"exploitabilityScore": 2.8,
|
||||||
"impactScore": 4.7
|
"impactScore": 4.7
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"baseScore": 8.8,
|
||||||
|
"baseSeverity": "HIGH",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 5.9
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
@ -51,14 +71,38 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:artbees:jupiterx:*:*:*:*:*:wordpress:*:*",
|
||||||
|
"versionEndExcluding": "3.1.0",
|
||||||
|
"matchCriteriaId": "98564483-27C8-4969-A3F1-CF751AF09A4C"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://patchstack.com/database/vulnerability/jupiterx/wordpress-jupiterx-theme-3-0-0-subscriber-local-file-inclusion-vulnerability?_s_id=cve",
|
"url": "https://patchstack.com/database/vulnerability/jupiterx/wordpress-jupiterx-theme-3-0-0-subscriber-local-file-inclusion-vulnerability?_s_id=cve",
|
||||||
"source": "audit@patchstack.com"
|
"source": "audit@patchstack.com",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://patchstack.com/database/vulnerability/jupiterx/wordpress-jupiterx-theme-3-0-0-subscriber-local-file-inclusion-vulnerability?_s_id=cve",
|
"url": "https://patchstack.com/database/vulnerability/jupiterx/wordpress-jupiterx-theme-3-0-0-subscriber-local-file-inclusion-vulnerability?_s_id=cve",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2023-38385",
|
"id": "CVE-2023-38385",
|
||||||
"sourceIdentifier": "audit@patchstack.com",
|
"sourceIdentifier": "audit@patchstack.com",
|
||||||
"published": "2024-12-13T15:15:19.183",
|
"published": "2024-12-13T15:15:19.183",
|
||||||
"lastModified": "2024-12-13T15:15:19.183",
|
"lastModified": "2025-03-19T13:57:05.610",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -36,6 +36,26 @@
|
|||||||
},
|
},
|
||||||
"exploitabilityScore": 2.8,
|
"exploitabilityScore": 2.8,
|
||||||
"impactScore": 5.5
|
"impactScore": 5.5
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"baseScore": 8.8,
|
||||||
|
"baseSeverity": "HIGH",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 5.9
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
@ -51,10 +71,32 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:artbees:jupiter_x_core:*:*:*:*:*:wordpress:*:*",
|
||||||
|
"versionStartIncluding": "3.0.0",
|
||||||
|
"versionEndExcluding": "3.3.5",
|
||||||
|
"matchCriteriaId": "1D82A557-9559-442C-9A1B-9E67ABDFD987"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://patchstack.com/database/wordpress/plugin/jupiterx-core/vulnerability/wordpress-jupiter-x-core-plugin-3-0-0-3-3-0-multiple-contributor-broken-access-control-vulnerability?_s_id=cve",
|
"url": "https://patchstack.com/database/wordpress/plugin/jupiterx-core/vulnerability/wordpress-jupiter-x-core-plugin-3-0-0-3-3-0-multiple-contributor-broken-access-control-vulnerability?_s_id=cve",
|
||||||
"source": "audit@patchstack.com"
|
"source": "audit@patchstack.com",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2023-38388",
|
"id": "CVE-2023-38388",
|
||||||
"sourceIdentifier": "audit@patchstack.com",
|
"sourceIdentifier": "audit@patchstack.com",
|
||||||
"published": "2024-03-26T21:15:51.113",
|
"published": "2024-03-26T21:15:51.113",
|
||||||
"lastModified": "2024-11-21T08:13:27.650",
|
"lastModified": "2025-03-19T13:49:31.673",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -36,6 +36,26 @@
|
|||||||
},
|
},
|
||||||
"exploitabilityScore": 2.2,
|
"exploitabilityScore": 2.2,
|
||||||
"impactScore": 6.0
|
"impactScore": 6.0
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"baseScore": 9.8,
|
||||||
|
"baseSeverity": "CRITICAL",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 5.9
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
@ -51,14 +71,38 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:artbees:jupiter_x_core:*:*:*:*:*:wordpress:*:*",
|
||||||
|
"versionEndExcluding": "3.3.8",
|
||||||
|
"matchCriteriaId": "0B4BF657-5A8E-43E8-834B-B0C0B65D5373"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://patchstack.com/database/vulnerability/jupiterx-core/wordpress-jupiter-x-core-plugin-3-3-0-unauthenticated-arbitrary-file-upload-vulnerability?_s_id=cve",
|
"url": "https://patchstack.com/database/vulnerability/jupiterx-core/wordpress-jupiter-x-core-plugin-3-3-0-unauthenticated-arbitrary-file-upload-vulnerability?_s_id=cve",
|
||||||
"source": "audit@patchstack.com"
|
"source": "audit@patchstack.com",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://patchstack.com/database/vulnerability/jupiterx-core/wordpress-jupiter-x-core-plugin-3-3-0-unauthenticated-arbitrary-file-upload-vulnerability?_s_id=cve",
|
"url": "https://patchstack.com/database/vulnerability/jupiterx-core/wordpress-jupiter-x-core-plugin-3-3-0-unauthenticated-arbitrary-file-upload-vulnerability?_s_id=cve",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2023-6047",
|
"id": "CVE-2023-6047",
|
||||||
"sourceIdentifier": "iletisim@usom.gov.tr",
|
"sourceIdentifier": "iletisim@usom.gov.tr",
|
||||||
"published": "2024-03-29T12:15:07.570",
|
"published": "2024-03-29T12:15:07.570",
|
||||||
"lastModified": "2024-11-21T08:43:02.383",
|
"lastModified": "2025-03-19T14:28:26.253",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -36,6 +36,26 @@
|
|||||||
},
|
},
|
||||||
"exploitabilityScore": 2.8,
|
"exploitabilityScore": 2.8,
|
||||||
"impactScore": 2.7
|
"impactScore": 2.7
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||||
|
"baseScore": 6.1,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 2.7
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
@ -51,14 +71,38 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:algoritimbilisim:e-commerce_software:*:*:*:*:*:*:*:*",
|
||||||
|
"versionEndExcluding": "3.9.2",
|
||||||
|
"matchCriteriaId": "B2D85945-1413-41C8-BEB9-907FCC4646A9"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://www.usom.gov.tr/bildirim/tr-24-0252",
|
"url": "https://www.usom.gov.tr/bildirim/tr-24-0252",
|
||||||
"source": "iletisim@usom.gov.tr"
|
"source": "iletisim@usom.gov.tr",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://www.usom.gov.tr/bildirim/tr-24-0252",
|
"url": "https://www.usom.gov.tr/bildirim/tr-24-0252",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2023-6191",
|
"id": "CVE-2023-6191",
|
||||||
"sourceIdentifier": "iletisim@usom.gov.tr",
|
"sourceIdentifier": "iletisim@usom.gov.tr",
|
||||||
"published": "2024-03-29T12:15:07.907",
|
"published": "2024-03-29T12:15:07.907",
|
||||||
"lastModified": "2024-11-21T08:43:19.497",
|
"lastModified": "2025-03-19T14:45:55.020",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -51,14 +51,37 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:webpdks:webpdks:-:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "3742DBF3-034C-40DA-839F-680B5A6B3928"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://www.usom.gov.tr/bildirim/tr-24-0253",
|
"url": "https://www.usom.gov.tr/bildirim/tr-24-0253",
|
||||||
"source": "iletisim@usom.gov.tr"
|
"source": "iletisim@usom.gov.tr",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://www.usom.gov.tr/bildirim/tr-24-0253",
|
"url": "https://www.usom.gov.tr/bildirim/tr-24-0253",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-0020",
|
"id": "CVE-2024-0020",
|
||||||
"sourceIdentifier": "security@android.com",
|
"sourceIdentifier": "security@android.com",
|
||||||
"published": "2024-02-16T20:15:47.667",
|
"published": "2024-02-16T20:15:47.667",
|
||||||
"lastModified": "2024-12-16T18:59:20.550",
|
"lastModified": "2025-03-19T14:15:34.860",
|
||||||
"vulnStatus": "Analyzed",
|
"vulnStatus": "Modified",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -69,6 +69,16 @@
|
|||||||
"value": "NVD-CWE-noinfo"
|
"value": "NVD-CWE-noinfo"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-200"
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"configurations": [
|
"configurations": [
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-12604",
|
"id": "CVE-2024-12604",
|
||||||
"sourceIdentifier": "iletisim@usom.gov.tr",
|
"sourceIdentifier": "iletisim@usom.gov.tr",
|
||||||
"published": "2025-03-10T15:15:36.947",
|
"published": "2025-03-10T15:15:36.947",
|
||||||
"lastModified": "2025-03-10T15:15:36.947",
|
"lastModified": "2025-03-19T14:55:40.523",
|
||||||
"vulnStatus": "Undergoing Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [
|
"cveTags": [
|
||||||
{
|
{
|
||||||
"sourceIdentifier": "iletisim@usom.gov.tr",
|
"sourceIdentifier": "iletisim@usom.gov.tr",
|
||||||
@ -26,7 +26,7 @@
|
|||||||
"cvssMetricV31": [
|
"cvssMetricV31": [
|
||||||
{
|
{
|
||||||
"source": "iletisim@usom.gov.tr",
|
"source": "iletisim@usom.gov.tr",
|
||||||
"type": "Primary",
|
"type": "Secondary",
|
||||||
"cvssData": {
|
"cvssData": {
|
||||||
"version": "3.1",
|
"version": "3.1",
|
||||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||||||
@ -43,6 +43,26 @@
|
|||||||
},
|
},
|
||||||
"exploitabilityScore": 3.9,
|
"exploitabilityScore": 3.9,
|
||||||
"impactScore": 3.4
|
"impactScore": 3.4
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
|
||||||
|
"baseScore": 6.5,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 2.5
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
@ -60,16 +80,54 @@
|
|||||||
"value": "CWE-640"
|
"value": "CWE-640"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-312"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-640"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:tapandsign:tap\\&sign:*:*:*:*:*:*:*:*",
|
||||||
|
"versionEndExcluding": "1.025",
|
||||||
|
"matchCriteriaId": "7E38B9DF-2BC7-40C1-A07F-77CEE465DF41"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://docs.tapandsign.com/tap-and-sign/tap-and-sign-v.1.025-surum-notlari",
|
"url": "https://docs.tapandsign.com/tap-and-sign/tap-and-sign-v.1.025-surum-notlari",
|
||||||
"source": "iletisim@usom.gov.tr"
|
"source": "iletisim@usom.gov.tr",
|
||||||
|
"tags": [
|
||||||
|
"Release Notes"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://www.usom.gov.tr/bildirim/tr-25-0063",
|
"url": "https://www.usom.gov.tr/bildirim/tr-25-0063",
|
||||||
"source": "iletisim@usom.gov.tr"
|
"source": "iletisim@usom.gov.tr",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2024-13222",
|
"id": "CVE-2024-13222",
|
||||||
"sourceIdentifier": "contact@wpscan.com",
|
"sourceIdentifier": "contact@wpscan.com",
|
||||||
"published": "2025-01-31T06:15:28.813",
|
"published": "2025-01-31T06:15:28.813",
|
||||||
"lastModified": "2025-02-18T19:15:13.130",
|
"lastModified": "2025-03-19T14:15:35.370",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -15,7 +15,30 @@
|
|||||||
"value": "El complemento User Messages de WordPress hasta la versi\u00f3n 1.2.4 no desinfecta ni escapa un par\u00e1metro antes de mostrarlo nuevamente en la p\u00e1gina, lo que genera un Cross-Site Scripting Reflejado que podr\u00eda usarse contra usuarios con privilegios altos, como el administrador."
|
"value": "El complemento User Messages de WordPress hasta la versi\u00f3n 1.2.4 no desinfecta ni escapa un par\u00e1metro antes de mostrarlo nuevamente en la p\u00e1gina, lo que genera un Cross-Site Scripting Reflejado que podr\u00eda usarse contra usuarios con privilegios altos, como el administrador."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||||
|
"baseScore": 6.1,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 2.7
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://wpscan.com/vulnerability/069e1f81-448d-4d27-b288-87111dade2f2/",
|
"url": "https://wpscan.com/vulnerability/069e1f81-448d-4d27-b288-87111dade2f2/",
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2024-13225",
|
"id": "CVE-2024-13225",
|
||||||
"sourceIdentifier": "contact@wpscan.com",
|
"sourceIdentifier": "contact@wpscan.com",
|
||||||
"published": "2025-01-31T06:15:29.117",
|
"published": "2025-01-31T06:15:29.117",
|
||||||
"lastModified": "2025-02-18T19:15:13.430",
|
"lastModified": "2025-03-19T14:15:35.517",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -15,7 +15,30 @@
|
|||||||
"value": "El complemento ECT Home Page Products de WordPress hasta la versi\u00f3n 1.9 no desinfecta ni escapa un par\u00e1metro antes de mostrarlo nuevamente en la p\u00e1gina, lo que genera un Cross-Site Scripting Reflejado que podr\u00eda usarse contra usuarios con privilegios altos, como el administrador."
|
"value": "El complemento ECT Home Page Products de WordPress hasta la versi\u00f3n 1.9 no desinfecta ni escapa un par\u00e1metro antes de mostrarlo nuevamente en la p\u00e1gina, lo que genera un Cross-Site Scripting Reflejado que podr\u00eda usarse contra usuarios con privilegios altos, como el administrador."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||||
|
"baseScore": 6.1,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 2.7
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://wpscan.com/vulnerability/8efd7d62-3f74-4108-970e-bd5ed24914ff/",
|
"url": "https://wpscan.com/vulnerability/8efd7d62-3f74-4108-970e-bd5ed24914ff/",
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2024-20059",
|
"id": "CVE-2024-20059",
|
||||||
"sourceIdentifier": "security@mediatek.com",
|
"sourceIdentifier": "security@mediatek.com",
|
||||||
"published": "2024-05-06T03:15:09.787",
|
"published": "2024-05-06T03:15:09.787",
|
||||||
"lastModified": "2024-11-21T08:51:55.990",
|
"lastModified": "2025-03-19T14:15:35.787",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -15,7 +15,30 @@
|
|||||||
"value": "En este caso, existe una posible escalada de privilegios debido a una verificaci\u00f3n de estado incorrecta. Esto podr\u00eda conducir a una escalada local de privilegios con permisos de ejecuci\u00f3n de System necesarios. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n. ID de parche: ALPS08541749; ID del problema: ALPS08541749."
|
"value": "En este caso, existe una posible escalada de privilegios debido a una verificaci\u00f3n de estado incorrecta. Esto podr\u00eda conducir a una escalada local de privilegios con permisos de ejecuci\u00f3n de System necesarios. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n. ID de parche: ALPS08541749; ID del problema: ALPS08541749."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"baseScore": 6.7,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "HIGH",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 0.8,
|
||||||
|
"impactScore": 5.9
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
"weaknesses": [
|
"weaknesses": [
|
||||||
{
|
{
|
||||||
"source": "security@mediatek.com",
|
"source": "security@mediatek.com",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-23788",
|
"id": "CVE-2024-23788",
|
||||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||||
"published": "2024-02-14T10:15:08.830",
|
"published": "2024-02-14T10:15:08.830",
|
||||||
"lastModified": "2024-12-13T17:32:04.810",
|
"lastModified": "2025-03-19T14:15:36.007",
|
||||||
"vulnStatus": "Analyzed",
|
"vulnStatus": "Modified",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -69,6 +69,16 @@
|
|||||||
"value": "CWE-918"
|
"value": "CWE-918"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-918"
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"configurations": [
|
"configurations": [
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2024-23945",
|
"id": "CVE-2024-23945",
|
||||||
"sourceIdentifier": "security@apache.org",
|
"sourceIdentifier": "security@apache.org",
|
||||||
"published": "2024-12-23T16:15:05.590",
|
"published": "2024-12-23T16:15:05.590",
|
||||||
"lastModified": "2025-02-18T22:15:10.600",
|
"lastModified": "2025-03-19T14:15:36.173",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -15,11 +15,44 @@
|
|||||||
"value": "Signing cookies es una caracter\u00edstica de seguridad de la aplicaci\u00f3n que agrega una firma digital a los datos de las cookies para verificar su autenticidad e integridad. La firma ayuda a evitar que actores malintencionados modifiquen el valor de la cookie, lo que puede provocar vulnerabilidades de seguridad y explotaci\u00f3n. El componente de servicio de Apache Hive expone accidentalmente la cookie firmada al usuario final cuando hay una discrepancia en la firma entre la cookie actual y la esperada. Exponer la firma de cookie correcta puede conducir a una mayor explotaci\u00f3n. La l\u00f3gica vulnerable de CookieSigner se introdujo en Apache Hive mediante HIVE-9710 (1.2.0) y en Apache Spark mediante SPARK-14987 (2.0.0). Los componentes afectados son los siguientes: * org.apache.hive:hive-service * org.apache.spark:spark-hive-thriftserver_2.11 * org.apache.spark:spark-hive-thriftserver_2.12"
|
"value": "Signing cookies es una caracter\u00edstica de seguridad de la aplicaci\u00f3n que agrega una firma digital a los datos de las cookies para verificar su autenticidad e integridad. La firma ayuda a evitar que actores malintencionados modifiquen el valor de la cookie, lo que puede provocar vulnerabilidades de seguridad y explotaci\u00f3n. El componente de servicio de Apache Hive expone accidentalmente la cookie firmada al usuario final cuando hay una discrepancia en la firma entre la cookie actual y la esperada. Exponer la firma de cookie correcta puede conducir a una mayor explotaci\u00f3n. La l\u00f3gica vulnerable de CookieSigner se introdujo en Apache Hive mediante HIVE-9710 (1.2.0) y en Apache Spark mediante SPARK-14987 (2.0.0). Los componentes afectados son los siguientes: * org.apache.hive:hive-service * org.apache.spark:spark-hive-thriftserver_2.11 * org.apache.spark:spark-hive-thriftserver_2.12"
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
|
||||||
|
"baseScore": 5.9,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "HIGH",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "NONE"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.2,
|
||||||
|
"impactScore": 3.6
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
"weaknesses": [
|
"weaknesses": [
|
||||||
{
|
{
|
||||||
"source": "security@apache.org",
|
"source": "security@apache.org",
|
||||||
"type": "Secondary",
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-209"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Primary",
|
||||||
"description": [
|
"description": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2024-24422",
|
"id": "CVE-2024-24422",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2025-01-21T23:15:12.267",
|
"published": "2025-01-21T23:15:12.267",
|
||||||
"lastModified": "2025-02-18T21:15:21.150",
|
"lastModified": "2025-03-19T14:15:36.380",
|
||||||
"vulnStatus": "Modified",
|
"vulnStatus": "Modified",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -36,6 +36,26 @@
|
|||||||
},
|
},
|
||||||
"exploitabilityScore": 3.9,
|
"exploitabilityScore": 3.9,
|
||||||
"impactScore": 3.6
|
"impactScore": 3.6
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||||
|
"baseScore": 7.5,
|
||||||
|
"baseSeverity": "HIGH",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 3.6
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
@ -49,6 +69,16 @@
|
|||||||
"value": "CWE-787"
|
"value": "CWE-787"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-787"
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"configurations": [
|
"configurations": [
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2024-4289",
|
"id": "CVE-2024-4289",
|
||||||
"sourceIdentifier": "contact@wpscan.com",
|
"sourceIdentifier": "contact@wpscan.com",
|
||||||
"published": "2024-05-21T06:15:09.517",
|
"published": "2024-05-21T06:15:09.517",
|
||||||
"lastModified": "2024-11-21T09:42:32.977",
|
"lastModified": "2025-03-19T14:15:37.420",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -15,7 +15,30 @@
|
|||||||
"value": " El complemento de WordPress Sailthru Triggermail hasta la versi\u00f3n 1.1 no sanitiza ni escapa varios par\u00e1metros antes de devolverlos a p\u00e1ginas y atributos, lo que genera Cross Site Scripting Reflejado que podr\u00eda usarse contra usuarios con altos privilegios, como administradores."
|
"value": " El complemento de WordPress Sailthru Triggermail hasta la versi\u00f3n 1.1 no sanitiza ni escapa varios par\u00e1metros antes de devolverlos a p\u00e1ginas y atributos, lo que genera Cross Site Scripting Reflejado que podr\u00eda usarse contra usuarios con altos privilegios, como administradores."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||||
|
"baseScore": 6.1,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 2.7
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://wpscan.com/vulnerability/072785de-0ce5-42a4-a3fd-4eb1d1a2f1be/",
|
"url": "https://wpscan.com/vulnerability/072785de-0ce5-42a4-a3fd-4eb1d1a2f1be/",
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2024-43096",
|
"id": "CVE-2024-43096",
|
||||||
"sourceIdentifier": "security@android.com",
|
"sourceIdentifier": "security@android.com",
|
||||||
"published": "2025-01-21T23:15:13.497",
|
"published": "2025-01-21T23:15:13.497",
|
||||||
"lastModified": "2025-02-18T21:15:21.990",
|
"lastModified": "2025-03-19T14:15:36.567",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -15,7 +15,42 @@
|
|||||||
"value": "En build_read_multi_rsp de gatt_sr.cc, existe una posible escritura fuera de los l\u00edmites debido a una neutra. Esto podr\u00eda provocar la ejecuci\u00f3n remota de c\u00f3digo (proximal/adyacente) sin necesidad de privilegios de ejecuci\u00f3n adicionales. No se necesita interacci\u00f3n del usuario para la explotaci\u00f3n."
|
"value": "En build_read_multi_rsp de gatt_sr.cc, existe una posible escritura fuera de los l\u00edmites debido a una neutra. Esto podr\u00eda provocar la ejecuci\u00f3n remota de c\u00f3digo (proximal/adyacente) sin necesidad de privilegios de ejecuci\u00f3n adicionales. No se necesita interacci\u00f3n del usuario para la explotaci\u00f3n."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"baseScore": 8.8,
|
||||||
|
"baseSeverity": "HIGH",
|
||||||
|
"attackVector": "ADJACENT_NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 5.9
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-787"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://source.android.com/security/bulletin/2025-01-01",
|
"url": "https://source.android.com/security/bulletin/2025-01-01",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-44152",
|
"id": "CVE-2024-44152",
|
||||||
"sourceIdentifier": "product-security@apple.com",
|
"sourceIdentifier": "product-security@apple.com",
|
||||||
"published": "2024-09-17T00:15:50.763",
|
"published": "2024-09-17T00:15:50.763",
|
||||||
"lastModified": "2024-09-24T15:55:06.100",
|
"lastModified": "2025-03-19T14:15:36.703",
|
||||||
"vulnStatus": "Analyzed",
|
"vulnStatus": "Modified",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -36,6 +36,26 @@
|
|||||||
},
|
},
|
||||||
"exploitabilityScore": 3.9,
|
"exploitabilityScore": 3.9,
|
||||||
"impactScore": 3.6
|
"impactScore": 3.6
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||||
|
"baseScore": 7.5,
|
||||||
|
"baseSeverity": "HIGH",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "NONE"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 3.6
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
@ -49,6 +69,16 @@
|
|||||||
"value": "NVD-CWE-noinfo"
|
"value": "NVD-CWE-noinfo"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-200"
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"configurations": [
|
"configurations": [
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-45239",
|
"id": "CVE-2024-45239",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-08-24T23:15:04.353",
|
"published": "2024-08-24T23:15:04.353",
|
||||||
"lastModified": "2024-08-27T15:49:31.417",
|
"lastModified": "2025-03-19T14:15:36.867",
|
||||||
"vulnStatus": "Analyzed",
|
"vulnStatus": "Modified",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -36,6 +36,26 @@
|
|||||||
},
|
},
|
||||||
"exploitabilityScore": 3.9,
|
"exploitabilityScore": 3.9,
|
||||||
"impactScore": 3.6
|
"impactScore": 3.6
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||||
|
"baseScore": 7.5,
|
||||||
|
"baseSeverity": "HIGH",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 3.6
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
@ -49,6 +69,16 @@
|
|||||||
"value": "CWE-476"
|
"value": "CWE-476"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-476"
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"configurations": [
|
"configurations": [
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-46564",
|
"id": "CVE-2024-46564",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-09-18T15:15:17.263",
|
"published": "2024-09-18T15:15:17.263",
|
||||||
"lastModified": "2024-09-24T16:41:55.907",
|
"lastModified": "2025-03-19T14:15:37.093",
|
||||||
"vulnStatus": "Analyzed",
|
"vulnStatus": "Modified",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -36,6 +36,26 @@
|
|||||||
},
|
},
|
||||||
"exploitabilityScore": 3.9,
|
"exploitabilityScore": 3.9,
|
||||||
"impactScore": 3.6
|
"impactScore": 3.6
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||||
|
"baseScore": 7.5,
|
||||||
|
"baseSeverity": "HIGH",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 3.6
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
@ -49,6 +69,16 @@
|
|||||||
"value": "CWE-120"
|
"value": "CWE-120"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-120"
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"configurations": [
|
"configurations": [
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2024-48789",
|
"id": "CVE-2024-48789",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-10-14T18:15:05.230",
|
"published": "2024-10-14T18:15:05.230",
|
||||||
"lastModified": "2024-10-15T15:35:19.560",
|
"lastModified": "2025-03-19T14:15:37.263",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -39,6 +39,18 @@
|
|||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-200"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://drivedeck.de/",
|
"url": "https://drivedeck.de/",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-54519",
|
"id": "CVE-2024-54519",
|
||||||
"sourceIdentifier": "product-security@apple.com",
|
"sourceIdentifier": "product-security@apple.com",
|
||||||
"published": "2025-01-27T22:15:13.367",
|
"published": "2025-01-27T22:15:13.367",
|
||||||
"lastModified": "2025-03-04T16:02:20.193",
|
"lastModified": "2025-03-19T14:15:37.577",
|
||||||
"vulnStatus": "Analyzed",
|
"vulnStatus": "Modified",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -36,12 +36,42 @@
|
|||||||
},
|
},
|
||||||
"exploitabilityScore": 1.8,
|
"exploitabilityScore": 1.8,
|
||||||
"impactScore": 3.6
|
"impactScore": 3.6
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||||||
|
"baseScore": 5.5,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "NONE"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.8,
|
||||||
|
"impactScore": 3.6
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
"weaknesses": [
|
"weaknesses": [
|
||||||
{
|
{
|
||||||
"source": "nvd@nist.gov",
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-532"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
"description": [
|
"description": [
|
||||||
{
|
{
|
||||||
|
29
CVE-2024/CVE-2024-555xx/CVE-2024-55551.json
Normal file
29
CVE-2024/CVE-2024-555xx/CVE-2024-55551.json
Normal file
@ -0,0 +1,29 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-55551",
|
||||||
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
|
"published": "2025-03-19T14:15:37.733",
|
||||||
|
"lastModified": "2025-03-19T14:15:37.733",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "An issue was discovered in Exasol jdbc driver 24.2.0. Attackers can inject malicious parameters into the JDBC URL, triggering JNDI injection during the process when the JDBC Driver uses this URL to connect to the database. This can further lead to remote code execution vulnerability."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://docs.exasol.com/db/latest/connect_exasol/drivers/jdbc.htm",
|
||||||
|
"source": "cve@mitre.org"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://gist.github.com/azraelxuemo/9565ec9219e0c3e9afd5474904c39d0f",
|
||||||
|
"source": "cve@mitre.org"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://www.blackhat.com/eu-24/briefings/schedule/index.html#a-novel-attack-surface-java-authentication-and-authorization-service-jaas-42179",
|
||||||
|
"source": "cve@mitre.org"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2024-56310",
|
"id": "CVE-2024-56310",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-12-22T21:15:16.433",
|
"published": "2024-12-22T21:15:16.433",
|
||||||
"lastModified": "2025-01-14T17:15:18.487",
|
"lastModified": "2025-03-19T14:15:37.850",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -15,7 +15,42 @@
|
|||||||
"value": "REDCap hasta la versi\u00f3n 15.0.0 tiene una falla de seguridad en el nombre de Project Dashboards, lo que expone a los usuarios a un ataque de Cross-Site Request Forgery (CSRF). Un atacante puede aprovechar esto al atraer a los usuarios para que hagan clic en un nombre de Project Dashboards que contenga la carga maliciosa, lo que desencadena una solicitud de cierre de sesi\u00f3n y finaliza su sesi\u00f3n. Esta vulnerabilidad se origina en la ausencia de protecciones CSRF en la funcionalidad de cierre de sesi\u00f3n, lo que permite que se ejecuten acciones maliciosas sin el consentimiento del usuario."
|
"value": "REDCap hasta la versi\u00f3n 15.0.0 tiene una falla de seguridad en el nombre de Project Dashboards, lo que expone a los usuarios a un ataque de Cross-Site Request Forgery (CSRF). Un atacante puede aprovechar esto al atraer a los usuarios para que hagan clic en un nombre de Project Dashboards que contenga la carga maliciosa, lo que desencadena una solicitud de cierre de sesi\u00f3n y finaliza su sesi\u00f3n. Esta vulnerabilidad se origina en la ausencia de protecciones CSRF en la funcionalidad de cierre de sesi\u00f3n, lo que permite que se ejecuten acciones maliciosas sin el consentimiento del usuario."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||||
|
"baseScore": 8.8,
|
||||||
|
"baseSeverity": "HIGH",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 5.9
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-352"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/ping-oui-no/Vulnerability-Research-CVESS/tree/main/RedCap",
|
"url": "https://github.com/ping-oui-no/Vulnerability-Research-CVESS/tree/main/RedCap",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-57022",
|
"id": "CVE-2024-57022",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2025-01-15T17:15:18.083",
|
"published": "2025-01-15T17:15:18.083",
|
||||||
"lastModified": "2025-03-10T17:27:02.037",
|
"lastModified": "2025-03-19T14:15:38.007",
|
||||||
"vulnStatus": "Analyzed",
|
"vulnStatus": "Modified",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -36,6 +36,26 @@
|
|||||||
},
|
},
|
||||||
"exploitabilityScore": 2.8,
|
"exploitabilityScore": 2.8,
|
||||||
"impactScore": 5.9
|
"impactScore": 5.9
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"baseScore": 8.8,
|
||||||
|
"baseSeverity": "HIGH",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 5.9
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
@ -49,6 +69,16 @@
|
|||||||
"value": "CWE-78"
|
"value": "CWE-78"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-78"
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"configurations": [
|
"configurations": [
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2024-57451",
|
"id": "CVE-2024-57451",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2025-02-03T21:15:14.893",
|
"published": "2025-02-03T21:15:14.893",
|
||||||
"lastModified": "2025-02-18T19:15:22.057",
|
"lastModified": "2025-03-19T14:15:38.187",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -15,7 +15,42 @@
|
|||||||
"value": "ChestnutCMS <=1.5.0 tiene una vulnerabilidad Directory Traversal en contentcore.controller.FileController#getFileList, que permite a los atacantes ver cualquier directorio."
|
"value": "ChestnutCMS <=1.5.0 tiene una vulnerabilidad Directory Traversal en contentcore.controller.FileController#getFileList, que permite a los atacantes ver cualquier directorio."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||||
|
"baseScore": 7.5,
|
||||||
|
"baseSeverity": "HIGH",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "NONE"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 3.6
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-22"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://locrian-lightning-dc7.notion.site/Directory-traversal-1628e5e2b1a280fdb463c2235acc7f75",
|
"url": "https://locrian-lightning-dc7.notion.site/Directory-traversal-1628e5e2b1a280fdb463c2235acc7f75",
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2024-57724",
|
"id": "CVE-2024-57724",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2025-01-23T01:15:27.387",
|
"published": "2025-01-23T01:15:27.387",
|
||||||
"lastModified": "2025-02-18T20:15:23.023",
|
"lastModified": "2025-03-19T14:15:38.337",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -15,7 +15,42 @@
|
|||||||
"value": "Se descubri\u00f3 que lunasvg v3.0.0 conten\u00eda una violaci\u00f3n de segmentaci\u00f3n a trav\u00e9s del componente gray_record_cell."
|
"value": "Se descubri\u00f3 que lunasvg v3.0.0 conten\u00eda una violaci\u00f3n de segmentaci\u00f3n a trav\u00e9s del componente gray_record_cell."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||||||
|
"baseScore": 6.5,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 3.6
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-400"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/keepinggg/poc/blob/main/poc_of_lunasvg_3.1.0",
|
"url": "https://github.com/keepinggg/poc/blob/main/poc_of_lunasvg_3.1.0",
|
||||||
|
@ -2,13 +2,13 @@
|
|||||||
"id": "CVE-2025-2280",
|
"id": "CVE-2025-2280",
|
||||||
"sourceIdentifier": "security@devolutions.net",
|
"sourceIdentifier": "security@devolutions.net",
|
||||||
"published": "2025-03-13T13:15:58.533",
|
"published": "2025-03-13T13:15:58.533",
|
||||||
"lastModified": "2025-03-18T17:15:47.873",
|
"lastModified": "2025-03-19T14:15:39.743",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "Improper access control in web extension restriction feature in Devolutions Server 2024.3.13 and earlier allows an authenticated user to bypass the browser extension restriction feature."
|
"value": "Improper access control in web extension restriction feature in Devolutions Server 2024.3.4.0\n\n and earlier allows an authenticated user to bypass the browser extension restriction feature."
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"lang": "es",
|
"lang": "es",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2025-24109",
|
"id": "CVE-2025-24109",
|
||||||
"sourceIdentifier": "product-security@apple.com",
|
"sourceIdentifier": "product-security@apple.com",
|
||||||
"published": "2025-01-27T22:15:16.347",
|
"published": "2025-01-27T22:15:16.347",
|
||||||
"lastModified": "2025-03-04T15:26:30.650",
|
"lastModified": "2025-03-19T14:15:38.700",
|
||||||
"vulnStatus": "Analyzed",
|
"vulnStatus": "Modified",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -36,19 +36,49 @@
|
|||||||
},
|
},
|
||||||
"exploitabilityScore": 1.8,
|
"exploitabilityScore": 1.8,
|
||||||
"impactScore": 3.6
|
"impactScore": 3.6
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"baseScore": 9.8,
|
||||||
|
"baseSeverity": "CRITICAL",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 5.9
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
"weaknesses": [
|
"weaknesses": [
|
||||||
{
|
{
|
||||||
"source": "nvd@nist.gov",
|
"source": "nvd@nist.gov",
|
||||||
"type": "Secondary",
|
"type": "Primary",
|
||||||
"description": [
|
"description": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "NVD-CWE-noinfo"
|
"value": "NVD-CWE-noinfo"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-200"
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"configurations": [
|
"configurations": [
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2025-24159",
|
"id": "CVE-2025-24159",
|
||||||
"sourceIdentifier": "product-security@apple.com",
|
"sourceIdentifier": "product-security@apple.com",
|
||||||
"published": "2025-01-27T22:15:19.897",
|
"published": "2025-01-27T22:15:19.897",
|
||||||
"lastModified": "2025-03-04T14:57:16.473",
|
"lastModified": "2025-03-19T14:15:38.853",
|
||||||
"vulnStatus": "Analyzed",
|
"vulnStatus": "Modified",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -36,19 +36,49 @@
|
|||||||
},
|
},
|
||||||
"exploitabilityScore": 1.8,
|
"exploitabilityScore": 1.8,
|
||||||
"impactScore": 5.9
|
"impactScore": 5.9
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"baseScore": 7.8,
|
||||||
|
"baseSeverity": "HIGH",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.8,
|
||||||
|
"impactScore": 5.9
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
"weaknesses": [
|
"weaknesses": [
|
||||||
{
|
{
|
||||||
"source": "nvd@nist.gov",
|
"source": "nvd@nist.gov",
|
||||||
"type": "Secondary",
|
"type": "Primary",
|
||||||
"description": [
|
"description": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "NVD-CWE-noinfo"
|
"value": "NVD-CWE-noinfo"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-94"
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"configurations": [
|
"configurations": [
|
||||||
|
@ -2,13 +2,17 @@
|
|||||||
"id": "CVE-2025-25500",
|
"id": "CVE-2025-25500",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2025-03-18T14:15:43.493",
|
"published": "2025-03-18T14:15:43.493",
|
||||||
"lastModified": "2025-03-18T14:15:43.493",
|
"lastModified": "2025-03-19T14:15:39.033",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Received",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "An issue in CosmWasm prior to v2.2.0 allows attackers to bypass capability restrictions in blockchains by exploiting a lack of runtime capability validation. This allows attackers to deploy a contract without capability enforcement, and execute unauthorized actions on the blockchain."
|
"value": "An issue in CosmWasm prior to v2.2.0 allows attackers to bypass capability restrictions in blockchains by exploiting a lack of runtime capability validation. This allows attackers to deploy a contract without capability enforcement, and execute unauthorized actions on the blockchain."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "Un problema en CosmWasm anterior a la versi\u00f3n 2.2.0 permite a los atacantes eludir las restricciones de capacidad en las cadenas de bloques aprovechando la falta de validaci\u00f3n de capacidad en tiempo de ejecuci\u00f3n. Esto permite a los atacantes implementar un contrato sin la aplicaci\u00f3n de la capacidad y ejecutar acciones no autorizadas en la cadena de bloques."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {},
|
||||||
@ -16,10 +20,6 @@
|
|||||||
{
|
{
|
||||||
"url": "https://gist.github.com/H3T76/8096a6ff9410f3a6d9a25db1a68ae657#file-cve-2025-25500",
|
"url": "https://gist.github.com/H3T76/8096a6ff9410f3a6d9a25db1a68ae657#file-cve-2025-25500",
|
||||||
"source": "cve@mitre.org"
|
"source": "cve@mitre.org"
|
||||||
},
|
|
||||||
{
|
|
||||||
"url": "https://github.com/CVEProject/cveproject.github.io/blob/gh-pages/requester/reservation-guidelines.md",
|
|
||||||
"source": "cve@mitre.org"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2025-25598",
|
"id": "CVE-2025-25598",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2025-03-13T18:15:50.857",
|
"published": "2025-03-13T18:15:50.857",
|
||||||
"lastModified": "2025-03-13T18:15:50.857",
|
"lastModified": "2025-03-19T14:15:39.140",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -15,7 +15,42 @@
|
|||||||
"value": "El control de acceso incorrecto en la consola de tareas programadas de Inova Logic CUSTOMER MONITOR (CM) v3.1.757.1 permite a los atacantes escalar privilegios mediante la colocaci\u00f3n de un ejecutable manipulado en una tarea programada."
|
"value": "El control de acceso incorrecto en la consola de tareas programadas de Inova Logic CUSTOMER MONITOR (CM) v3.1.757.1 permite a los atacantes escalar privilegios mediante la colocaci\u00f3n de un ejecutable manipulado en una tarea programada."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"baseScore": 8.8,
|
||||||
|
"baseSeverity": "HIGH",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 5.9
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-284"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/quriusfox/vulnerability-research/tree/main/CVE-2025-25598",
|
"url": "https://github.com/quriusfox/vulnerability-research/tree/main/CVE-2025-25598",
|
||||||
|
@ -2,13 +2,13 @@
|
|||||||
"id": "CVE-2025-26263",
|
"id": "CVE-2025-26263",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2025-02-28T16:15:40.127",
|
"published": "2025-02-28T16:15:40.127",
|
||||||
"lastModified": "2025-03-17T06:15:24.630",
|
"lastModified": "2025-03-19T14:15:39.293",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "GeoVision ASManager Windows desktop application with the version 6.1.2.0 or less, is vulnerable to credentials disclosure due to improper memory handling in the ASManagerService.exe process."
|
"value": "GeoVision ASManager Windows desktop application with the version 6.1.2.0 or less (fixed in 6.2.0), is vulnerable to credentials disclosure due to improper memory handling in the ASManagerService.exe process."
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"lang": "es",
|
"lang": "es",
|
||||||
|
@ -2,13 +2,13 @@
|
|||||||
"id": "CVE-2025-26264",
|
"id": "CVE-2025-26264",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2025-02-27T22:15:38.947",
|
"published": "2025-02-27T22:15:38.947",
|
||||||
"lastModified": "2025-03-17T06:15:25.070",
|
"lastModified": "2025-03-19T14:15:39.440",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "GeoVision GV-ASWeb with the version 6.1.2.0 or less, contains a Remote Code Execution (RCE) vulnerability within its Notification Settings feature. An authenticated attacker with \"System Settings\" privileges in ASWeb can exploit this flaw to execute arbitrary commands on the server, leading to a full system compromise."
|
"value": "GeoVision GV-ASWeb with the version 6.1.2.0 or less (fixed in 6.2.0), contains a Remote Code Execution (RCE) vulnerability within its Notification Settings feature. An authenticated attacker with \"System Settings\" privileges in ASWeb can exploit this flaw to execute arbitrary commands on the server, leading to a full system compromise."
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"lang": "es",
|
"lang": "es",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2025-26702",
|
"id": "CVE-2025-26702",
|
||||||
"sourceIdentifier": "psirt@zte.com.cn",
|
"sourceIdentifier": "psirt@zte.com.cn",
|
||||||
"published": "2025-03-11T07:15:34.133",
|
"published": "2025-03-11T07:15:34.133",
|
||||||
"lastModified": "2025-03-11T07:15:34.133",
|
"lastModified": "2025-03-19T14:08:01.357",
|
||||||
"vulnStatus": "Undergoing Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -36,6 +36,26 @@
|
|||||||
},
|
},
|
||||||
"exploitabilityScore": 1.2,
|
"exploitabilityScore": 1.2,
|
||||||
"impactScore": 3.6
|
"impactScore": 3.6
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||||
|
"baseScore": 7.5,
|
||||||
|
"baseSeverity": "HIGH",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 3.6
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
@ -49,12 +69,44 @@
|
|||||||
"value": "CWE-20"
|
"value": "CWE-20"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "NVD-CWE-noinfo"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:zte:goldendb:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "6.1.03",
|
||||||
|
"versionEndExcluding": "6.1.03.05",
|
||||||
|
"matchCriteriaId": "26E446FB-FC8E-4FCE-8E89-275726CB572B"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://support.zte.com.cn/zte-iccp-isupport-webui/bulletin/detail/1820079027271819342",
|
"url": "https://support.zte.com.cn/zte-iccp-isupport-webui/bulletin/detail/1820079027271819342",
|
||||||
"source": "psirt@zte.com.cn"
|
"source": "psirt@zte.com.cn",
|
||||||
|
"tags": [
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2025-26703",
|
"id": "CVE-2025-26703",
|
||||||
"sourceIdentifier": "psirt@zte.com.cn",
|
"sourceIdentifier": "psirt@zte.com.cn",
|
||||||
"published": "2025-03-11T07:15:34.580",
|
"published": "2025-03-11T07:15:34.580",
|
||||||
"lastModified": "2025-03-11T07:15:34.580",
|
"lastModified": "2025-03-19T14:09:38.080",
|
||||||
"vulnStatus": "Undergoing Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -36,6 +36,26 @@
|
|||||||
},
|
},
|
||||||
"exploitabilityScore": 2.8,
|
"exploitabilityScore": 2.8,
|
||||||
"impactScore": 1.4
|
"impactScore": 1.4
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
||||||
|
"baseScore": 4.3,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "NONE"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 1.4
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
@ -49,12 +69,44 @@
|
|||||||
"value": "CWE-269"
|
"value": "CWE-269"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "NVD-CWE-noinfo"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:zte:goldendb:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "6.1.03",
|
||||||
|
"versionEndExcluding": "6.1.03.05",
|
||||||
|
"matchCriteriaId": "26E446FB-FC8E-4FCE-8E89-275726CB572B"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://support.zte.com.cn/zte-iccp-isupport-webui/bulletin/detail/5666152569221570627",
|
"url": "https://support.zte.com.cn/zte-iccp-isupport-webui/bulletin/detail/5666152569221570627",
|
||||||
"source": "psirt@zte.com.cn"
|
"source": "psirt@zte.com.cn",
|
||||||
|
"tags": [
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2025-26704",
|
"id": "CVE-2025-26704",
|
||||||
"sourceIdentifier": "psirt@zte.com.cn",
|
"sourceIdentifier": "psirt@zte.com.cn",
|
||||||
"published": "2025-03-11T07:15:34.967",
|
"published": "2025-03-11T07:15:34.967",
|
||||||
"lastModified": "2025-03-11T07:15:34.967",
|
"lastModified": "2025-03-19T14:11:17.600",
|
||||||
"vulnStatus": "Undergoing Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -36,6 +36,26 @@
|
|||||||
},
|
},
|
||||||
"exploitabilityScore": 3.1,
|
"exploitabilityScore": 3.1,
|
||||||
"impactScore": 2.7
|
"impactScore": 2.7
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
|
||||||
|
"baseScore": 4.3,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 1.4
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
@ -49,12 +69,44 @@
|
|||||||
"value": "CWE-269"
|
"value": "CWE-269"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "NVD-CWE-noinfo"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:zte:goldendb:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "6.1.03 ",
|
||||||
|
"versionEndIncluding": "6.1.03.05",
|
||||||
|
"matchCriteriaId": "1C51DC63-52FE-4472-936B-843E5779BD21"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://support.zte.com.cn/zte-iccp-isupport-webui/bulletin/detail/6999218053484646494",
|
"url": "https://support.zte.com.cn/zte-iccp-isupport-webui/bulletin/detail/6999218053484646494",
|
||||||
"source": "psirt@zte.com.cn"
|
"source": "psirt@zte.com.cn",
|
||||||
|
"tags": [
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2025-26705",
|
"id": "CVE-2025-26705",
|
||||||
"sourceIdentifier": "psirt@zte.com.cn",
|
"sourceIdentifier": "psirt@zte.com.cn",
|
||||||
"published": "2025-03-11T07:15:35.330",
|
"published": "2025-03-11T07:15:35.330",
|
||||||
"lastModified": "2025-03-11T07:15:35.330",
|
"lastModified": "2025-03-19T14:12:26.253",
|
||||||
"vulnStatus": "Undergoing Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -36,6 +36,26 @@
|
|||||||
},
|
},
|
||||||
"exploitabilityScore": 3.9,
|
"exploitabilityScore": 3.9,
|
||||||
"impactScore": 1.4
|
"impactScore": 1.4
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||||
|
"baseScore": 7.5,
|
||||||
|
"baseSeverity": "HIGH",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "NONE"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 3.6
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
@ -49,12 +69,44 @@
|
|||||||
"value": "CWE-269"
|
"value": "CWE-269"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "NVD-CWE-noinfo"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:zte:goldendb:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "6.1.03 ",
|
||||||
|
"versionEndExcluding": "6.1.03.06",
|
||||||
|
"matchCriteriaId": "11809C5D-1649-478C-9D20-FA1DEDAB143B"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://support.zte.com.cn/zte-iccp-isupport-webui/bulletin/detail/577084989971263576",
|
"url": "https://support.zte.com.cn/zte-iccp-isupport-webui/bulletin/detail/577084989971263576",
|
||||||
"source": "psirt@zte.com.cn"
|
"source": "psirt@zte.com.cn",
|
||||||
|
"tags": [
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2025-26706",
|
"id": "CVE-2025-26706",
|
||||||
"sourceIdentifier": "psirt@zte.com.cn",
|
"sourceIdentifier": "psirt@zte.com.cn",
|
||||||
"published": "2025-03-11T07:15:35.703",
|
"published": "2025-03-11T07:15:35.703",
|
||||||
"lastModified": "2025-03-11T07:15:35.703",
|
"lastModified": "2025-03-19T14:15:36.417",
|
||||||
"vulnStatus": "Undergoing Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -36,6 +36,26 @@
|
|||||||
},
|
},
|
||||||
"exploitabilityScore": 2.8,
|
"exploitabilityScore": 2.8,
|
||||||
"impactScore": 2.5
|
"impactScore": 2.5
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
|
||||||
|
"baseScore": 5.3,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 1.4
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
@ -49,12 +69,44 @@
|
|||||||
"value": "CWE-269"
|
"value": "CWE-269"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "NVD-CWE-noinfo"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:zte:goldendb:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "6.1.03 ",
|
||||||
|
"versionEndIncluding": "6.1.03.07",
|
||||||
|
"matchCriteriaId": "7F571305-1F0A-4A17-A7B3-532965576C3F"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://support.zte.com.cn/zte-iccp-isupport-webui/bulletin/detail/6999218053484646486",
|
"url": "https://support.zte.com.cn/zte-iccp-isupport-webui/bulletin/detail/6999218053484646486",
|
||||||
"source": "psirt@zte.com.cn"
|
"source": "psirt@zte.com.cn",
|
||||||
|
"tags": [
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2025-28857",
|
"id": "CVE-2025-28857",
|
||||||
"sourceIdentifier": "audit@patchstack.com",
|
"sourceIdentifier": "audit@patchstack.com",
|
||||||
"published": "2025-03-11T21:15:42.903",
|
"published": "2025-03-11T21:15:42.903",
|
||||||
"lastModified": "2025-03-11T21:15:42.903",
|
"lastModified": "2025-03-19T13:41:38.270",
|
||||||
"vulnStatus": "Undergoing Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -36,6 +36,26 @@
|
|||||||
},
|
},
|
||||||
"exploitabilityScore": 2.8,
|
"exploitabilityScore": 2.8,
|
||||||
"impactScore": 3.7
|
"impactScore": 3.7
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||||
|
"baseScore": 6.1,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 2.7
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
@ -51,10 +71,31 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:rankchecker:rankchecker:*:*:*:*:*:wordpress:*:*",
|
||||||
|
"versionEndIncluding": "1.0.9",
|
||||||
|
"matchCriteriaId": "CB37F6EA-5711-4307-82AD-2EB718289689"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://patchstack.com/database/wordpress/plugin/rankchecker-io-integration/vulnerability/wordpress-rankchecker-io-integration-plugin-1-0-9-csrf-to-stored-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
"url": "https://patchstack.com/database/wordpress/plugin/rankchecker-io-integration/vulnerability/wordpress-rankchecker-io-integration-plugin-1-0-9-csrf-to-stored-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||||
"source": "audit@patchstack.com"
|
"source": "audit@patchstack.com",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2025-28859",
|
"id": "CVE-2025-28859",
|
||||||
"sourceIdentifier": "audit@patchstack.com",
|
"sourceIdentifier": "audit@patchstack.com",
|
||||||
"published": "2025-03-11T21:15:43.050",
|
"published": "2025-03-11T21:15:43.050",
|
||||||
"lastModified": "2025-03-11T21:15:43.050",
|
"lastModified": "2025-03-19T14:01:43.707",
|
||||||
"vulnStatus": "Undergoing Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -36,6 +36,26 @@
|
|||||||
},
|
},
|
||||||
"exploitabilityScore": 2.8,
|
"exploitabilityScore": 2.8,
|
||||||
"impactScore": 1.4
|
"impactScore": 1.4
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||||
|
"baseScore": 8.8,
|
||||||
|
"baseSeverity": "HIGH",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 5.9
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
@ -51,10 +71,31 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:codevibrant:maintenance_notice:*:*:*:*:*:wordpress:*:*",
|
||||||
|
"versionEndIncluding": "1.0.5",
|
||||||
|
"matchCriteriaId": "127CD716-70AF-45EF-8F72-4E0E64BD1A0C"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://patchstack.com/database/wordpress/plugin/maintenance-notice/vulnerability/wordpress-maintenance-notice-plugin-1-0-5-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
|
"url": "https://patchstack.com/database/wordpress/plugin/maintenance-notice/vulnerability/wordpress-maintenance-notice-plugin-1-0-5-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
|
||||||
"source": "audit@patchstack.com"
|
"source": "audit@patchstack.com",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2025-28860",
|
"id": "CVE-2025-28860",
|
||||||
"sourceIdentifier": "audit@patchstack.com",
|
"sourceIdentifier": "audit@patchstack.com",
|
||||||
"published": "2025-03-11T21:15:43.193",
|
"published": "2025-03-11T21:15:43.193",
|
||||||
"lastModified": "2025-03-11T21:15:43.193",
|
"lastModified": "2025-03-19T14:06:00.333",
|
||||||
"vulnStatus": "Undergoing Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -36,6 +36,26 @@
|
|||||||
},
|
},
|
||||||
"exploitabilityScore": 2.8,
|
"exploitabilityScore": 2.8,
|
||||||
"impactScore": 3.7
|
"impactScore": 3.7
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||||
|
"baseScore": 6.1,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 2.7
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
@ -51,10 +71,31 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:ppdpurveyor:google_news_editors_picks_feed_generator:*:*:*:*:*:wordpress:*:*",
|
||||||
|
"versionEndIncluding": "2.1",
|
||||||
|
"matchCriteriaId": "2C47212C-D0BC-4402-90B9-4CDB2FF249CE"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://patchstack.com/database/wordpress/plugin/google-news-editors-picks-news-feeds/vulnerability/wordpress-google-news-editors-picks-feed-generator-plugin-2-1-csrf-to-stored-xss-vulnerability?_s_id=cve",
|
"url": "https://patchstack.com/database/wordpress/plugin/google-news-editors-picks-news-feeds/vulnerability/wordpress-google-news-editors-picks-feed-generator-plugin-2-1-csrf-to-stored-xss-vulnerability?_s_id=cve",
|
||||||
"source": "audit@patchstack.com"
|
"source": "audit@patchstack.com",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2025-28861",
|
"id": "CVE-2025-28861",
|
||||||
"sourceIdentifier": "audit@patchstack.com",
|
"sourceIdentifier": "audit@patchstack.com",
|
||||||
"published": "2025-03-11T21:15:43.337",
|
"published": "2025-03-11T21:15:43.337",
|
||||||
"lastModified": "2025-03-11T21:15:43.337",
|
"lastModified": "2025-03-19T14:08:16.920",
|
||||||
"vulnStatus": "Undergoing Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -36,6 +36,26 @@
|
|||||||
},
|
},
|
||||||
"exploitabilityScore": 2.8,
|
"exploitabilityScore": 2.8,
|
||||||
"impactScore": 3.7
|
"impactScore": 3.7
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||||
|
"baseScore": 6.1,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 2.7
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
@ -51,10 +71,31 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:bhzad:wp_jquery_persian_datepicker:*:*:*:*:*:wordpress:*:*",
|
||||||
|
"versionEndIncluding": "0.1.0",
|
||||||
|
"matchCriteriaId": "65AF6282-5B7F-425A-892C-9960FE036E7D"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://patchstack.com/database/wordpress/plugin/wpjqp-datepicker/vulnerability/wordpress-wp-jquery-persian-datepicker-plugin-0-1-0-csrf-to-stored-xss-vulnerability?_s_id=cve",
|
"url": "https://patchstack.com/database/wordpress/plugin/wpjqp-datepicker/vulnerability/wordpress-wp-jquery-persian-datepicker-plugin-0-1-0-csrf-to-stored-xss-vulnerability?_s_id=cve",
|
||||||
"source": "audit@patchstack.com"
|
"source": "audit@patchstack.com",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2025-28862",
|
"id": "CVE-2025-28862",
|
||||||
"sourceIdentifier": "audit@patchstack.com",
|
"sourceIdentifier": "audit@patchstack.com",
|
||||||
"published": "2025-03-11T21:15:43.490",
|
"published": "2025-03-11T21:15:43.490",
|
||||||
"lastModified": "2025-03-11T21:15:43.490",
|
"lastModified": "2025-03-19T14:13:16.610",
|
||||||
"vulnStatus": "Undergoing Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -36,6 +36,26 @@
|
|||||||
},
|
},
|
||||||
"exploitabilityScore": 2.8,
|
"exploitabilityScore": 2.8,
|
||||||
"impactScore": 1.4
|
"impactScore": 1.4
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||||
|
"baseScore": 8.8,
|
||||||
|
"baseSeverity": "HIGH",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 5.9
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
@ -51,10 +71,30 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:venugopal:comment_date_and_gravatar_remover:1.0:*:*:*:*:wordpress:*:*",
|
||||||
|
"matchCriteriaId": "10C8FFD7-31F6-4696-BA34-DA2B59F67522"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://patchstack.com/database/wordpress/plugin/remove-date-and-gravatar-under-comment/vulnerability/wordpress-comment-date-and-gravatar-remover-plugin-1-0-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
|
"url": "https://patchstack.com/database/wordpress/plugin/remove-date-and-gravatar-under-comment/vulnerability/wordpress-comment-date-and-gravatar-remover-plugin-1-0-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
|
||||||
"source": "audit@patchstack.com"
|
"source": "audit@patchstack.com",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2025-28863",
|
"id": "CVE-2025-28863",
|
||||||
"sourceIdentifier": "audit@patchstack.com",
|
"sourceIdentifier": "audit@patchstack.com",
|
||||||
"published": "2025-03-11T21:15:43.647",
|
"published": "2025-03-11T21:15:43.647",
|
||||||
"lastModified": "2025-03-11T21:15:43.647",
|
"lastModified": "2025-03-19T14:14:18.080",
|
||||||
"vulnStatus": "Undergoing Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -36,6 +36,26 @@
|
|||||||
},
|
},
|
||||||
"exploitabilityScore": 2.8,
|
"exploitabilityScore": 2.8,
|
||||||
"impactScore": 1.4
|
"impactScore": 1.4
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||||
|
"baseScore": 8.8,
|
||||||
|
"baseSeverity": "HIGH",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 5.9
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
@ -51,10 +71,31 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:carlosminatti:delete_original_image:*:*:*:*:*:wordpress:*:*",
|
||||||
|
"versionEndIncluding": "0.4",
|
||||||
|
"matchCriteriaId": "ADFDC217-657F-4D84-9B55-BB61C4ED47E1"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://patchstack.com/database/wordpress/plugin/delete-original-image/vulnerability/wordpress-delete-original-image-plugin-0-4-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
|
"url": "https://patchstack.com/database/wordpress/plugin/delete-original-image/vulnerability/wordpress-delete-original-image-plugin-0-4-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
|
||||||
"source": "audit@patchstack.com"
|
"source": "audit@patchstack.com",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2025-28864",
|
"id": "CVE-2025-28864",
|
||||||
"sourceIdentifier": "audit@patchstack.com",
|
"sourceIdentifier": "audit@patchstack.com",
|
||||||
"published": "2025-03-11T21:15:43.810",
|
"published": "2025-03-11T21:15:43.810",
|
||||||
"lastModified": "2025-03-11T21:15:43.810",
|
"lastModified": "2025-03-19T14:16:41.287",
|
||||||
"vulnStatus": "Undergoing Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -36,6 +36,26 @@
|
|||||||
},
|
},
|
||||||
"exploitabilityScore": 2.8,
|
"exploitabilityScore": 2.8,
|
||||||
"impactScore": 1.4
|
"impactScore": 1.4
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||||
|
"baseScore": 8.8,
|
||||||
|
"baseSeverity": "HIGH",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 5.9
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
@ -51,10 +71,31 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:planetstudio:builder_for_contact_form_7:*:*:*:*:*:wordpress:*:*",
|
||||||
|
"versionEndIncluding": "1.2.2",
|
||||||
|
"matchCriteriaId": "FBF6364E-259A-44A2-8533-B73DBB729EBC"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://patchstack.com/database/wordpress/plugin/cf7-builder/vulnerability/wordpress-builder-for-contact-form-7-by-webconstruct-plugin-1-2-2-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
|
"url": "https://patchstack.com/database/wordpress/plugin/cf7-builder/vulnerability/wordpress-builder-for-contact-form-7-by-webconstruct-plugin-1-2-2-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
|
||||||
"source": "audit@patchstack.com"
|
"source": "audit@patchstack.com",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2025-28866",
|
"id": "CVE-2025-28866",
|
||||||
"sourceIdentifier": "audit@patchstack.com",
|
"sourceIdentifier": "audit@patchstack.com",
|
||||||
"published": "2025-03-11T21:15:43.970",
|
"published": "2025-03-11T21:15:43.970",
|
||||||
"lastModified": "2025-03-11T21:15:43.970",
|
"lastModified": "2025-03-19T14:17:39.090",
|
||||||
"vulnStatus": "Undergoing Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -36,6 +36,26 @@
|
|||||||
},
|
},
|
||||||
"exploitabilityScore": 2.8,
|
"exploitabilityScore": 2.8,
|
||||||
"impactScore": 1.4
|
"impactScore": 1.4
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||||
|
"baseScore": 8.8,
|
||||||
|
"baseSeverity": "HIGH",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 5.9
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
@ -51,10 +71,31 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:smerriman:login_logger:*:*:*:*:*:wordpress:*:*",
|
||||||
|
"versionEndIncluding": "1.2.1",
|
||||||
|
"matchCriteriaId": "130C0737-23E4-4828-BD71-F6532F40797D"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://patchstack.com/database/wordpress/plugin/login-logger/vulnerability/wordpress-login-logger-plugin-1-2-1-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
|
"url": "https://patchstack.com/database/wordpress/plugin/login-logger/vulnerability/wordpress-login-logger-plugin-1-2-1-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
|
||||||
"source": "audit@patchstack.com"
|
"source": "audit@patchstack.com",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2025-28868",
|
"id": "CVE-2025-28868",
|
||||||
"sourceIdentifier": "audit@patchstack.com",
|
"sourceIdentifier": "audit@patchstack.com",
|
||||||
"published": "2025-03-11T21:15:44.283",
|
"published": "2025-03-11T21:15:44.283",
|
||||||
"lastModified": "2025-03-11T21:15:44.283",
|
"lastModified": "2025-03-19T14:27:00.497",
|
||||||
"vulnStatus": "Undergoing Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -36,6 +36,26 @@
|
|||||||
},
|
},
|
||||||
"exploitabilityScore": 2.8,
|
"exploitabilityScore": 2.8,
|
||||||
"impactScore": 1.4
|
"impactScore": 1.4
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||||
|
"baseScore": 8.8,
|
||||||
|
"baseSeverity": "HIGH",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 5.9
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
@ -51,10 +71,31 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:ziplist:recipes:*:*:*:*:*:wordpress:*:*",
|
||||||
|
"versionEndIncluding": "3.1",
|
||||||
|
"matchCriteriaId": "19222997-375C-4574-831B-2B680C174A4B"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://patchstack.com/database/wordpress/plugin/ziplist-recipe-plugin/vulnerability/wordpress-ziplist-recipe-plugin-3-1-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
|
"url": "https://patchstack.com/database/wordpress/plugin/ziplist-recipe-plugin/vulnerability/wordpress-ziplist-recipe-plugin-3-1-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
|
||||||
"source": "audit@patchstack.com"
|
"source": "audit@patchstack.com",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2025-29891",
|
"id": "CVE-2025-29891",
|
||||||
"sourceIdentifier": "security@apache.org",
|
"sourceIdentifier": "security@apache.org",
|
||||||
"published": "2025-03-12T15:15:40.997",
|
"published": "2025-03-12T15:15:40.997",
|
||||||
"lastModified": "2025-03-13T09:15:14.860",
|
"lastModified": "2025-03-19T14:15:39.573",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -22,19 +22,19 @@
|
|||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
"cvssData": {
|
"cvssData": {
|
||||||
"version": "3.1",
|
"version": "3.1",
|
||||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L",
|
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L",
|
||||||
"baseScore": 4.2,
|
"baseScore": 4.8,
|
||||||
"baseSeverity": "MEDIUM",
|
"baseSeverity": "MEDIUM",
|
||||||
"attackVector": "NETWORK",
|
"attackVector": "NETWORK",
|
||||||
"attackComplexity": "HIGH",
|
"attackComplexity": "HIGH",
|
||||||
"privilegesRequired": "LOW",
|
"privilegesRequired": "NONE",
|
||||||
"userInteraction": "NONE",
|
"userInteraction": "NONE",
|
||||||
"scope": "UNCHANGED",
|
"scope": "UNCHANGED",
|
||||||
"confidentialityImpact": "NONE",
|
"confidentialityImpact": "NONE",
|
||||||
"integrityImpact": "LOW",
|
"integrityImpact": "LOW",
|
||||||
"availabilityImpact": "LOW"
|
"availabilityImpact": "LOW"
|
||||||
},
|
},
|
||||||
"exploitabilityScore": 1.6,
|
"exploitabilityScore": 2.2,
|
||||||
"impactScore": 2.5
|
"impactScore": 2.5
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
@ -42,17 +42,7 @@
|
|||||||
"weaknesses": [
|
"weaknesses": [
|
||||||
{
|
{
|
||||||
"source": "security@apache.org",
|
"source": "security@apache.org",
|
||||||
"type": "Secondary",
|
"type": "Primary",
|
||||||
"description": [
|
|
||||||
{
|
|
||||||
"lang": "en",
|
|
||||||
"value": "CWE-164"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
|
||||||
"type": "Secondary",
|
|
||||||
"description": [
|
"description": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
@ -69,6 +59,10 @@
|
|||||||
{
|
{
|
||||||
"url": "https://camel.apache.org/security/CVE-2025-29891.html",
|
"url": "https://camel.apache.org/security/CVE-2025-29891.html",
|
||||||
"source": "security@apache.org"
|
"source": "security@apache.org"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/akamai/CVE-2025-27636-Apache-Camel-PoC",
|
||||||
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
43
README.md
43
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
|||||||
### Last Repository Update
|
### Last Repository Update
|
||||||
|
|
||||||
```plain
|
```plain
|
||||||
2025-03-19T13:00:19.786508+00:00
|
2025-03-19T15:00:19.479491+00:00
|
||||||
```
|
```
|
||||||
|
|
||||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||||
|
|
||||||
```plain
|
```plain
|
||||||
2025-03-19T12:15:14.463000+00:00
|
2025-03-19T14:55:40.523000+00:00
|
||||||
```
|
```
|
||||||
|
|
||||||
### Last Data Feed Release
|
### Last Data Feed Release
|
||||||
@ -33,26 +33,45 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
|||||||
### Total Number of included CVEs
|
### Total Number of included CVEs
|
||||||
|
|
||||||
```plain
|
```plain
|
||||||
285667
|
285668
|
||||||
```
|
```
|
||||||
|
|
||||||
### CVEs added in the last Commit
|
### CVEs added in the last Commit
|
||||||
|
|
||||||
Recently added CVEs: `6`
|
Recently added CVEs: `1`
|
||||||
|
|
||||||
- [CVE-2024-12920](CVE-2024/CVE-2024-129xx/CVE-2024-12920.json) (`2025-03-19T12:15:12.797`)
|
- [CVE-2024-55551](CVE-2024/CVE-2024-555xx/CVE-2024-55551.json) (`2025-03-19T14:15:37.733`)
|
||||||
- [CVE-2024-13442](CVE-2024/CVE-2024-134xx/CVE-2024-13442.json) (`2025-03-19T12:15:13.857`)
|
|
||||||
- [CVE-2024-13933](CVE-2024/CVE-2024-139xx/CVE-2024-13933.json) (`2025-03-19T12:15:14.003`)
|
|
||||||
- [CVE-2024-45644](CVE-2024/CVE-2024-456xx/CVE-2024-45644.json) (`2025-03-19T12:15:14.153`)
|
|
||||||
- [CVE-2025-2511](CVE-2025/CVE-2025-25xx/CVE-2025-2511.json) (`2025-03-19T12:15:14.313`)
|
|
||||||
- [CVE-2025-2512](CVE-2025/CVE-2025-25xx/CVE-2025-2512.json) (`2025-03-19T12:15:14.463`)
|
|
||||||
|
|
||||||
|
|
||||||
### CVEs modified in the last Commit
|
### CVEs modified in the last Commit
|
||||||
|
|
||||||
Recently modified CVEs: `1`
|
Recently modified CVEs: `47`
|
||||||
|
|
||||||
- [CVE-2024-26795](CVE-2024/CVE-2024-267xx/CVE-2024-26795.json) (`2025-03-19T11:42:41.993`)
|
- [CVE-2024-57022](CVE-2024/CVE-2024-570xx/CVE-2024-57022.json) (`2025-03-19T14:15:38.007`)
|
||||||
|
- [CVE-2024-57451](CVE-2024/CVE-2024-574xx/CVE-2024-57451.json) (`2025-03-19T14:15:38.187`)
|
||||||
|
- [CVE-2024-57724](CVE-2024/CVE-2024-577xx/CVE-2024-57724.json) (`2025-03-19T14:15:38.337`)
|
||||||
|
- [CVE-2025-2280](CVE-2025/CVE-2025-22xx/CVE-2025-2280.json) (`2025-03-19T14:15:39.743`)
|
||||||
|
- [CVE-2025-24109](CVE-2025/CVE-2025-241xx/CVE-2025-24109.json) (`2025-03-19T14:15:38.700`)
|
||||||
|
- [CVE-2025-24159](CVE-2025/CVE-2025-241xx/CVE-2025-24159.json) (`2025-03-19T14:15:38.853`)
|
||||||
|
- [CVE-2025-25500](CVE-2025/CVE-2025-255xx/CVE-2025-25500.json) (`2025-03-19T14:15:39.033`)
|
||||||
|
- [CVE-2025-25598](CVE-2025/CVE-2025-255xx/CVE-2025-25598.json) (`2025-03-19T14:15:39.140`)
|
||||||
|
- [CVE-2025-26263](CVE-2025/CVE-2025-262xx/CVE-2025-26263.json) (`2025-03-19T14:15:39.293`)
|
||||||
|
- [CVE-2025-26264](CVE-2025/CVE-2025-262xx/CVE-2025-26264.json) (`2025-03-19T14:15:39.440`)
|
||||||
|
- [CVE-2025-26702](CVE-2025/CVE-2025-267xx/CVE-2025-26702.json) (`2025-03-19T14:08:01.357`)
|
||||||
|
- [CVE-2025-26703](CVE-2025/CVE-2025-267xx/CVE-2025-26703.json) (`2025-03-19T14:09:38.080`)
|
||||||
|
- [CVE-2025-26704](CVE-2025/CVE-2025-267xx/CVE-2025-26704.json) (`2025-03-19T14:11:17.600`)
|
||||||
|
- [CVE-2025-26705](CVE-2025/CVE-2025-267xx/CVE-2025-26705.json) (`2025-03-19T14:12:26.253`)
|
||||||
|
- [CVE-2025-26706](CVE-2025/CVE-2025-267xx/CVE-2025-26706.json) (`2025-03-19T14:15:36.417`)
|
||||||
|
- [CVE-2025-28857](CVE-2025/CVE-2025-288xx/CVE-2025-28857.json) (`2025-03-19T13:41:38.270`)
|
||||||
|
- [CVE-2025-28859](CVE-2025/CVE-2025-288xx/CVE-2025-28859.json) (`2025-03-19T14:01:43.707`)
|
||||||
|
- [CVE-2025-28860](CVE-2025/CVE-2025-288xx/CVE-2025-28860.json) (`2025-03-19T14:06:00.333`)
|
||||||
|
- [CVE-2025-28861](CVE-2025/CVE-2025-288xx/CVE-2025-28861.json) (`2025-03-19T14:08:16.920`)
|
||||||
|
- [CVE-2025-28862](CVE-2025/CVE-2025-288xx/CVE-2025-28862.json) (`2025-03-19T14:13:16.610`)
|
||||||
|
- [CVE-2025-28863](CVE-2025/CVE-2025-288xx/CVE-2025-28863.json) (`2025-03-19T14:14:18.080`)
|
||||||
|
- [CVE-2025-28864](CVE-2025/CVE-2025-288xx/CVE-2025-28864.json) (`2025-03-19T14:16:41.287`)
|
||||||
|
- [CVE-2025-28866](CVE-2025/CVE-2025-288xx/CVE-2025-28866.json) (`2025-03-19T14:17:39.090`)
|
||||||
|
- [CVE-2025-28868](CVE-2025/CVE-2025-288xx/CVE-2025-28868.json) (`2025-03-19T14:27:00.497`)
|
||||||
|
- [CVE-2025-29891](CVE-2025/CVE-2025-298xx/CVE-2025-29891.json) (`2025-03-19T14:15:39.573`)
|
||||||
|
|
||||||
|
|
||||||
## Download and Usage
|
## Download and Usage
|
||||||
|
109
_state.csv
109
_state.csv
@ -127032,7 +127032,7 @@ CVE-2018-9441,0,0,575f828caed05d70445398c6546d07e6187af95dfab7246adaf485e88049a8
|
|||||||
CVE-2018-9444,0,0,71c23de0a19dd0833cbf31bcd17198f1ee23b3012d3e983445d1d8427624bfea,2024-11-21T04:15:29.460000
|
CVE-2018-9444,0,0,71c23de0a19dd0833cbf31bcd17198f1ee23b3012d3e983445d1d8427624bfea,2024-11-21T04:15:29.460000
|
||||||
CVE-2018-9445,0,0,6f497d920b5dea1dff5b6fdf23b01b78b0db0eccdf0018e269ce9b214bfe106e,2024-11-21T04:15:29.570000
|
CVE-2018-9445,0,0,6f497d920b5dea1dff5b6fdf23b01b78b0db0eccdf0018e269ce9b214bfe106e,2024-11-21T04:15:29.570000
|
||||||
CVE-2018-9446,0,0,c234b9792d5f51536c0fd269b29b1abbbcfb1e948520636234fcd7501d794384,2024-11-21T04:15:29.697000
|
CVE-2018-9446,0,0,c234b9792d5f51536c0fd269b29b1abbbcfb1e948520636234fcd7501d794384,2024-11-21T04:15:29.697000
|
||||||
CVE-2018-9447,0,0,c76e06ec9a4508f07296cb0ca9614aa80994653f7590c5bed8eafda199c21832,2025-02-18T21:15:13.370000
|
CVE-2018-9447,0,1,db5297e04cb86cbd19de4ce1da388e9ae6978c5e078051658a3b64eb380d8cc8,2025-03-19T14:15:34.120000
|
||||||
CVE-2018-9448,0,0,69c64fe6ebbff0200617e0b85ea10efd9da70ed74749831ad78b183a3e956ce7,2024-11-21T04:15:29.810000
|
CVE-2018-9448,0,0,69c64fe6ebbff0200617e0b85ea10efd9da70ed74749831ad78b183a3e956ce7,2024-11-21T04:15:29.810000
|
||||||
CVE-2018-9449,0,0,40c2935e250f77217097c1d24f2eb94cea68528fe2bd69e2fca6dbdff2691446,2024-12-18T20:10:01.940000
|
CVE-2018-9449,0,0,40c2935e250f77217097c1d24f2eb94cea68528fe2bd69e2fca6dbdff2691446,2024-12-18T20:10:01.940000
|
||||||
CVE-2018-9450,0,0,71a6672dc17cc007950c7f48e044c7117901d3605e37bc8deb02b63ead4edb96,2024-11-21T04:15:29.930000
|
CVE-2018-9450,0,0,71a6672dc17cc007950c7f48e044c7117901d3605e37bc8deb02b63ead4edb96,2024-11-21T04:15:29.930000
|
||||||
@ -225714,7 +225714,7 @@ CVE-2023-32107,0,0,b5793e75f71371b8b6819f39eb03f5486732b0ba2bf9ce407a16cdea099c4
|
|||||||
CVE-2023-32108,0,0,a934ffc0869767d2ad20cbf489ed2b68feb2f8c481d9bfda763b1daaca8eb204,2024-11-21T08:02:43.510000
|
CVE-2023-32108,0,0,a934ffc0869767d2ad20cbf489ed2b68feb2f8c481d9bfda763b1daaca8eb204,2024-11-21T08:02:43.510000
|
||||||
CVE-2023-32109,0,0,3a4edfa6c3aa31ce79dc3464d8877bcae3fd1ddf0b4075d905032ec1aeed0b39,2024-11-21T08:02:43.630000
|
CVE-2023-32109,0,0,3a4edfa6c3aa31ce79dc3464d8877bcae3fd1ddf0b4075d905032ec1aeed0b39,2024-11-21T08:02:43.630000
|
||||||
CVE-2023-3211,0,0,5c79f5a4ab5a20ff2e0ea2542823beb167db99bcb267301c9da9f52382558d68,2024-11-21T08:16:42.377000
|
CVE-2023-3211,0,0,5c79f5a4ab5a20ff2e0ea2542823beb167db99bcb267301c9da9f52382558d68,2024-11-21T08:16:42.377000
|
||||||
CVE-2023-32110,0,0,9e53bc70ab5b02228129bce6dfaed418995d97678d4ac5a9c6c4e76a4638ba71,2024-11-21T08:02:43.730000
|
CVE-2023-32110,0,1,c56f591d1b9ebf82f565782ef9fcf1991f96a352778cbc1f827433756a699450,2025-03-19T13:37:32.060000
|
||||||
CVE-2023-32111,0,0,1a327c689519230b35e18a611794e24d3e69479285b03916de59f343d5f0344e,2024-11-21T08:02:43.860000
|
CVE-2023-32111,0,0,1a327c689519230b35e18a611794e24d3e69479285b03916de59f343d5f0344e,2024-11-21T08:02:43.860000
|
||||||
CVE-2023-32112,0,0,2d658551346032135fc4df8eadb527925bcf203d0c4b6a1317eaa815c5079e00,2024-11-21T08:02:43.980000
|
CVE-2023-32112,0,0,2d658551346032135fc4df8eadb527925bcf203d0c4b6a1317eaa815c5079e00,2024-11-21T08:02:43.980000
|
||||||
CVE-2023-32113,0,0,eeb889f962c9abb8e1fc15bbf3a79439dddc270b385947deb2b48db8cf398f03,2024-11-21T08:02:44.100000
|
CVE-2023-32113,0,0,eeb889f962c9abb8e1fc15bbf3a79439dddc270b385947deb2b48db8cf398f03,2024-11-21T08:02:44.100000
|
||||||
@ -230663,10 +230663,10 @@ CVE-2023-38381,0,0,131f40c03c1f7c264d58a993d2664cc9ca18c7dc79fcb5b324e793ba6bfc6
|
|||||||
CVE-2023-38382,0,0,46aabdbde1d21403733e25a801806deda3d759b7a59108f1e0327e2612369c97,2024-11-21T08:13:27.137000
|
CVE-2023-38382,0,0,46aabdbde1d21403733e25a801806deda3d759b7a59108f1e0327e2612369c97,2024-11-21T08:13:27.137000
|
||||||
CVE-2023-38383,0,0,8750a7ad87b6af9dbfb5f26ec581da61550af89d93e4c27561c0df9189eaadbe,2024-12-13T15:15:19.040000
|
CVE-2023-38383,0,0,8750a7ad87b6af9dbfb5f26ec581da61550af89d93e4c27561c0df9189eaadbe,2024-12-13T15:15:19.040000
|
||||||
CVE-2023-38384,0,0,432bc4918ca36135512b55018dda0e35c3b42e4dbc1a5c07f3fe37017ce25831,2024-11-21T08:13:27.263000
|
CVE-2023-38384,0,0,432bc4918ca36135512b55018dda0e35c3b42e4dbc1a5c07f3fe37017ce25831,2024-11-21T08:13:27.263000
|
||||||
CVE-2023-38385,0,0,669acb867d506d6026e6dd7115fdb47c6ff8d51138d21b934b1f3f835198d76e,2024-12-13T15:15:19.183000
|
CVE-2023-38385,0,1,5d3cab033bba45025423f86e1a0659404e7528890b35519c19d613144e5855b0,2025-03-19T13:57:05.610000
|
||||||
CVE-2023-38386,0,0,e07e32a1fe94194f1f4c10c32b9d3e83fd8d13afef2568102c653b4d924cba1b,2024-11-21T08:13:27.407000
|
CVE-2023-38386,0,0,e07e32a1fe94194f1f4c10c32b9d3e83fd8d13afef2568102c653b4d924cba1b,2024-11-21T08:13:27.407000
|
||||||
CVE-2023-38387,0,0,623d775bcaa266a5dc196962abc1582b099379588fb4d57e840c1c6cf4fa5e54,2024-11-21T08:13:27.520000
|
CVE-2023-38387,0,0,623d775bcaa266a5dc196962abc1582b099379588fb4d57e840c1c6cf4fa5e54,2024-11-21T08:13:27.520000
|
||||||
CVE-2023-38388,0,0,b7f9db4f6c00e03cf568aaa88d65f74e7aaf06894a52d739b3d18b76af545ea8,2024-11-21T08:13:27.650000
|
CVE-2023-38388,0,1,9cb26bf3fa9bc4d7936e19c52d6924d10bdd5aa64565af0e3fbf58a49b358a9d,2025-03-19T13:49:31.673000
|
||||||
CVE-2023-38389,0,0,53d2268dadb48f9591f9849be4d6f9352278d753ebf289d9c3421edfea35839e,2024-11-21T08:13:27.780000
|
CVE-2023-38389,0,0,53d2268dadb48f9591f9849be4d6f9352278d753ebf289d9c3421edfea35839e,2024-11-21T08:13:27.780000
|
||||||
CVE-2023-3839,0,0,99e4f38992390f0792bd1d9c3f9258e68ba21ad7fd20cf000ca333b339e9434a,2024-11-21T08:18:11.323000
|
CVE-2023-3839,0,0,99e4f38992390f0792bd1d9c3f9258e68ba21ad7fd20cf000ca333b339e9434a,2024-11-21T08:18:11.323000
|
||||||
CVE-2023-38390,0,0,04540ba10d5b9db941783df86eaf593c37aa0ff8ebfe2841b802123d5603c4f1,2024-11-21T08:13:27.913000
|
CVE-2023-38390,0,0,04540ba10d5b9db941783df86eaf593c37aa0ff8ebfe2841b802123d5603c4f1,2024-11-21T08:13:27.913000
|
||||||
@ -242305,7 +242305,7 @@ CVE-2023-6043,0,0,4d42ba0e4248fe66359ed05a1105448d1de43c6b28a8a42326e051bf553c2c
|
|||||||
CVE-2023-6044,0,0,8488b0c2d64eaa394ac1e3ea1a8d07bf823d734aa681fcc8f9f80375294cb645,2024-11-21T08:43:02.067000
|
CVE-2023-6044,0,0,8488b0c2d64eaa394ac1e3ea1a8d07bf823d734aa681fcc8f9f80375294cb645,2024-11-21T08:43:02.067000
|
||||||
CVE-2023-6045,0,0,76a475eac8826ed563f079c0db54754b4e53e106a6075c3fd8ea1a519b7171fd,2024-11-21T08:43:02.177000
|
CVE-2023-6045,0,0,76a475eac8826ed563f079c0db54754b4e53e106a6075c3fd8ea1a519b7171fd,2024-11-21T08:43:02.177000
|
||||||
CVE-2023-6046,0,0,83b94aa63a7eb00bfbac001e7c18dbf142feb1ad6b62ec50413f35175e462282,2024-11-21T08:43:02.283000
|
CVE-2023-6046,0,0,83b94aa63a7eb00bfbac001e7c18dbf142feb1ad6b62ec50413f35175e462282,2024-11-21T08:43:02.283000
|
||||||
CVE-2023-6047,0,0,cc9794086fc5bfcae68de9aaacc0f8fbc5d36bd80fb3a14c98b3ddc2bd4b2c4b,2024-11-21T08:43:02.383000
|
CVE-2023-6047,0,1,8346245556da8f8494199d0db060767ebd0e6231ec0b0ebb0a9924640c15eff5,2025-03-19T14:28:26.253000
|
||||||
CVE-2023-6048,0,0,067012cb654f53d5db93a1350dd348e4f2947ac9ac3b7fa72a8e5d0708989146,2024-11-21T08:43:02.490000
|
CVE-2023-6048,0,0,067012cb654f53d5db93a1350dd348e4f2947ac9ac3b7fa72a8e5d0708989146,2024-11-21T08:43:02.490000
|
||||||
CVE-2023-6049,0,0,481e4a5d6e72e8ce41e29e3b424a68dbe30b0171d92f9fc9f17ac971e6297e1e,2024-11-21T08:43:02.593000
|
CVE-2023-6049,0,0,481e4a5d6e72e8ce41e29e3b424a68dbe30b0171d92f9fc9f17ac971e6297e1e,2024-11-21T08:43:02.593000
|
||||||
CVE-2023-6050,0,0,60c3b462fc30a652d1716b02c3dad5506b3f869a4b27869644e1d4ff3ddb9858,2024-11-21T08:43:02.693000
|
CVE-2023-6050,0,0,60c3b462fc30a652d1716b02c3dad5506b3f869a4b27869644e1d4ff3ddb9858,2024-11-21T08:43:02.693000
|
||||||
@ -242438,7 +242438,7 @@ CVE-2023-6187,0,0,8fd9b319140e1592996939e0f05ce20e8fbb504e761af0771471c23ab164f9
|
|||||||
CVE-2023-6188,0,0,09daa23440d3cd568eaf0ecbfbc6bb5d7b90ca340bfb9250a0e00eccd46fe784,2024-11-21T08:43:19.057000
|
CVE-2023-6188,0,0,09daa23440d3cd568eaf0ecbfbc6bb5d7b90ca340bfb9250a0e00eccd46fe784,2024-11-21T08:43:19.057000
|
||||||
CVE-2023-6189,0,0,beafa23b6653271d960b0efe9b1c8f7edcdb0a8b75d12a9c0e5a9673ca00b8fe,2024-11-21T08:43:19.213000
|
CVE-2023-6189,0,0,beafa23b6653271d960b0efe9b1c8f7edcdb0a8b75d12a9c0e5a9673ca00b8fe,2024-11-21T08:43:19.213000
|
||||||
CVE-2023-6190,0,0,8ed78538c4041525960b803e88198605546a55c3cf47128d1e30e8cf0cec0d48,2024-11-27T13:15:16.383000
|
CVE-2023-6190,0,0,8ed78538c4041525960b803e88198605546a55c3cf47128d1e30e8cf0cec0d48,2024-11-27T13:15:16.383000
|
||||||
CVE-2023-6191,0,0,674a3b71d2e03d1cc751fb32a048486d4c88546b883dd69f41cb5965fd00e87e,2024-11-21T08:43:19.497000
|
CVE-2023-6191,0,1,9c5fe08c799b97bbfa6e0631b81cc5f350115f9c9817f807e3cb1531d73541d5,2025-03-19T14:45:55.020000
|
||||||
CVE-2023-6193,0,0,03fd5b3cb55751a3ff3471e4986ed4557dc70e8bb42417035f31e70fadacbbe5,2024-11-21T08:43:19.627000
|
CVE-2023-6193,0,0,03fd5b3cb55751a3ff3471e4986ed4557dc70e8bb42417035f31e70fadacbbe5,2024-11-21T08:43:19.627000
|
||||||
CVE-2023-6194,0,0,59f670df72e72c8f09561909ca051857ec403afebd9ce05e440183cf16436235,2024-11-21T08:43:19.773000
|
CVE-2023-6194,0,0,59f670df72e72c8f09561909ca051857ec403afebd9ce05e440183cf16436235,2024-11-21T08:43:19.773000
|
||||||
CVE-2023-6195,0,0,51a9f5b9008872aaff8589cee46ad94ee1bf658d97994daf14236f72e8e38faf,2025-02-18T19:15:11.923000
|
CVE-2023-6195,0,0,51a9f5b9008872aaff8589cee46ad94ee1bf658d97994daf14236f72e8e38faf,2025-02-18T19:15:11.923000
|
||||||
@ -243433,7 +243433,7 @@ CVE-2024-0016,0,0,fe6b8d0cdbee34b3261a95c211b84f84a8146c7eb2580e083114d9eb74442b
|
|||||||
CVE-2024-0017,0,0,c3ae32d0f7f4b3aee825adaba904bd8ea33c38296423e6c492125686085b5834,2024-12-16T14:32:15.203000
|
CVE-2024-0017,0,0,c3ae32d0f7f4b3aee825adaba904bd8ea33c38296423e6c492125686085b5834,2024-12-16T14:32:15.203000
|
||||||
CVE-2024-0018,0,0,dc97236025a554ca5d9fbcfefeab22ae1ca03e1bafa99ec450476dfed39ed381,2024-12-16T19:00:35.303000
|
CVE-2024-0018,0,0,dc97236025a554ca5d9fbcfefeab22ae1ca03e1bafa99ec450476dfed39ed381,2024-12-16T19:00:35.303000
|
||||||
CVE-2024-0019,0,0,1a2ededa1eb1dbcaa0bc1c1d84127480128e02c1cf238c266ddf5fd5d1d39ff4,2025-03-13T15:15:39.900000
|
CVE-2024-0019,0,0,1a2ededa1eb1dbcaa0bc1c1d84127480128e02c1cf238c266ddf5fd5d1d39ff4,2025-03-13T15:15:39.900000
|
||||||
CVE-2024-0020,0,0,84928478478ec6809853ed64e00fe038f952f115b30fa79973cc6031347ede5f,2024-12-16T18:59:20.550000
|
CVE-2024-0020,0,1,21a32907b1564d9154c7d4ff0db8ff8780ea7a747120fe57f3cbe387673b9075,2025-03-19T14:15:34.860000
|
||||||
CVE-2024-0021,0,0,2f55bcbb539911a384d09c17dc49f9cbee4d4635d4ce4c2c8eb44a4eddc9fffc,2024-12-16T18:55:59.723000
|
CVE-2024-0021,0,0,2f55bcbb539911a384d09c17dc49f9cbee4d4635d4ce4c2c8eb44a4eddc9fffc,2024-12-16T18:55:59.723000
|
||||||
CVE-2024-0022,0,0,402a489de6f1bd8f13060138ca2475aa4ffd848181598d1e0ce78b5176103ba0,2024-11-25T13:52:21.147000
|
CVE-2024-0022,0,0,402a489de6f1bd8f13060138ca2475aa4ffd848181598d1e0ce78b5176103ba0,2024-11-25T13:52:21.147000
|
||||||
CVE-2024-0023,0,0,5e7948fc0aa641b348227e3064c75dac9ed5853b9bbb4d73d03fc98001f44017,2024-12-16T18:52:54.037000
|
CVE-2024-0023,0,0,5e7948fc0aa641b348227e3064c75dac9ed5853b9bbb4d73d03fc98001f44017,2024-12-16T18:52:54.037000
|
||||||
@ -246791,7 +246791,7 @@ CVE-2024-12600,0,0,25cdf4243a182c8f825652731ae4cdb22588842da143c4d91d8fa5b7ce663
|
|||||||
CVE-2024-12601,0,0,f9b91f2d20d6914a3b5ca3c9af2a431f615ff9e20926a30171bf1c35967a6eba,2024-12-17T12:15:20.543000
|
CVE-2024-12601,0,0,f9b91f2d20d6914a3b5ca3c9af2a431f615ff9e20926a30171bf1c35967a6eba,2024-12-17T12:15:20.543000
|
||||||
CVE-2024-12602,0,0,83ff0b84c52513b06515c71947664c6af329bbac5217b6b55ffe20fc2f9da714,2025-03-17T14:19:31.137000
|
CVE-2024-12602,0,0,83ff0b84c52513b06515c71947664c6af329bbac5217b6b55ffe20fc2f9da714,2025-03-17T14:19:31.137000
|
||||||
CVE-2024-12603,0,0,1329ad6d4bb1404a279e066983b81ffbd19fd699c3731f10f6b510964794facc,2025-03-14T17:15:40.923000
|
CVE-2024-12603,0,0,1329ad6d4bb1404a279e066983b81ffbd19fd699c3731f10f6b510964794facc,2025-03-14T17:15:40.923000
|
||||||
CVE-2024-12604,0,0,a6f4270c625ae221b7f85c4bc776086e42b147f47e8fbeef861cbdbdca9ec761,2025-03-10T15:15:36.947000
|
CVE-2024-12604,0,1,d9d8da7a2652a20e74bc7819a8c68623b940ac46df22f67266e2f292fdb1975e,2025-03-19T14:55:40.523000
|
||||||
CVE-2024-12605,0,0,a0f2993b097a4c99b97e822aef9d508fcc987f27fa00acaa2c8fa4c5ee5e87b3,2025-01-09T15:15:14.150000
|
CVE-2024-12605,0,0,a0f2993b097a4c99b97e822aef9d508fcc987f27fa00acaa2c8fa4c5ee5e87b3,2025-01-09T15:15:14.150000
|
||||||
CVE-2024-12606,0,0,640593522db4b989e186e13bcaa1c8fc14a8675964d1b9990cbdc5261025156e,2025-01-10T04:15:19.667000
|
CVE-2024-12606,0,0,640593522db4b989e186e13bcaa1c8fc14a8675964d1b9990cbdc5261025156e,2025-01-10T04:15:19.667000
|
||||||
CVE-2024-12607,0,0,40c18637fc3558dc9dc09323eb99bf48f8a620096ef9648f41f49596324b9617,2025-03-07T09:15:14.700000
|
CVE-2024-12607,0,0,40c18637fc3558dc9dc09323eb99bf48f8a620096ef9648f41f49596324b9617,2025-03-07T09:15:14.700000
|
||||||
@ -247045,7 +247045,7 @@ CVE-2024-12917,0,0,d8b07f4bcfb7f08bc2f227c861fa1e6577e90bb6cc2a5373042cad71096d6
|
|||||||
CVE-2024-12918,0,0,1035e9b27a2101293cfa4dc6b919699346b5a15e701cb7622e7b4fe97d2a43ff,2025-02-24T15:15:12.537000
|
CVE-2024-12918,0,0,1035e9b27a2101293cfa4dc6b919699346b5a15e701cb7622e7b4fe97d2a43ff,2025-02-24T15:15:12.537000
|
||||||
CVE-2024-12919,0,0,267cd9cf604b008de2f506d778d176d8d6c4286f989194d3cfe533433123b414,2025-01-22T17:29:01.883000
|
CVE-2024-12919,0,0,267cd9cf604b008de2f506d778d176d8d6c4286f989194d3cfe533433123b414,2025-01-22T17:29:01.883000
|
||||||
CVE-2024-1292,0,0,38d9bc6a557167174bf37c6662c68d5de6a783380fb5a30941c923054e3f2f16,2024-11-21T08:50:14.983000
|
CVE-2024-1292,0,0,38d9bc6a557167174bf37c6662c68d5de6a783380fb5a30941c923054e3f2f16,2024-11-21T08:50:14.983000
|
||||||
CVE-2024-12920,1,1,d6f114f30dddb8026f9b48238182ca4b26050e33db17a50e2255eac2718edb6a,2025-03-19T12:15:12.797000
|
CVE-2024-12920,0,0,d6f114f30dddb8026f9b48238182ca4b26050e33db17a50e2255eac2718edb6a,2025-03-19T12:15:12.797000
|
||||||
CVE-2024-12921,0,0,66514a714672aa9f260463c855267bb42fb72ace141e13c7370829c4ab97853e,2025-01-30T06:15:29.653000
|
CVE-2024-12921,0,0,66514a714672aa9f260463c855267bb42fb72ace141e13c7370829c4ab97853e,2025-01-30T06:15:29.653000
|
||||||
CVE-2024-12922,0,0,3c37006850d140c98149834c97117e5d90bae2ea48a41001d4db464e7915c4fd,2025-03-19T06:15:15.120000
|
CVE-2024-12922,0,0,3c37006850d140c98149834c97117e5d90bae2ea48a41001d4db464e7915c4fd,2025-03-19T06:15:15.120000
|
||||||
CVE-2024-12926,0,0,34efd8bf14c03e0212df6da35930928f45cf16a2638f05d82d7eb2cf46388400,2024-12-27T15:15:10.360000
|
CVE-2024-12926,0,0,34efd8bf14c03e0212df6da35930928f45cf16a2638f05d82d7eb2cf46388400,2024-12-27T15:15:10.360000
|
||||||
@ -247339,10 +247339,10 @@ CVE-2024-13219,0,0,a03a53f4e8ee76aae1f68ea77b3d02d84a8b663ce18b5d410a5e09c6d7e9e
|
|||||||
CVE-2024-1322,0,0,6d01a44e4ccc96742bbde907457ae18a669aea26c3c00f3c945d2c4b2b833c47,2025-02-28T03:12:58.057000
|
CVE-2024-1322,0,0,6d01a44e4ccc96742bbde907457ae18a669aea26c3c00f3c945d2c4b2b833c47,2025-02-28T03:12:58.057000
|
||||||
CVE-2024-13220,0,0,2a29f93de8fe785956cee813d639f3b7bb31198e316ff621daafc5854ef7c753,2025-02-18T19:15:12.920000
|
CVE-2024-13220,0,0,2a29f93de8fe785956cee813d639f3b7bb31198e316ff621daafc5854ef7c753,2025-02-18T19:15:12.920000
|
||||||
CVE-2024-13221,0,0,cbd1a7d3e900c883178aa5ebf5e7730a05696e4d330353970b2ee62e177da934,2025-03-14T16:15:28.530000
|
CVE-2024-13221,0,0,cbd1a7d3e900c883178aa5ebf5e7730a05696e4d330353970b2ee62e177da934,2025-03-14T16:15:28.530000
|
||||||
CVE-2024-13222,0,0,3369cae0a43fcf974ee9682b40ff21b7fd6cb19d101c9348f9e995ea2e1296da,2025-02-18T19:15:13.130000
|
CVE-2024-13222,0,1,58f0085a1407de24c3cbe5e9312e8772fe787b4e9a861aa13f1a7dfd4a9c64f1,2025-03-19T14:15:35.370000
|
||||||
CVE-2024-13223,0,0,30235d227081c2fe7536cc919cc2f0b95ea40b13ff9e4c274ce474e2acc32f0c,2025-03-14T18:15:27.667000
|
CVE-2024-13223,0,0,30235d227081c2fe7536cc919cc2f0b95ea40b13ff9e4c274ce474e2acc32f0c,2025-03-14T18:15:27.667000
|
||||||
CVE-2024-13224,0,0,e5b7f02a42d65820fa96ecfbf1042671230975524d8d07a6555cf2ef2492a842,2025-02-18T19:15:13.330000
|
CVE-2024-13224,0,0,e5b7f02a42d65820fa96ecfbf1042671230975524d8d07a6555cf2ef2492a842,2025-02-18T19:15:13.330000
|
||||||
CVE-2024-13225,0,0,fd5bdb87f02a5554907e108887a0ec447c92e5005d465261f05bb066fe20b559,2025-02-18T19:15:13.430000
|
CVE-2024-13225,0,1,6b43d53a9f0c4910354c6a7419b4cc9a74975f7fd7ceed90095e0d3896c67dc0,2025-03-19T14:15:35.517000
|
||||||
CVE-2024-13226,0,0,0a148293be1e169e2bc3e7ec9c58bba636bd4d289f9d716d22106c8fd333fec0,2025-02-18T19:15:13.530000
|
CVE-2024-13226,0,0,0a148293be1e169e2bc3e7ec9c58bba636bd4d289f9d716d22106c8fd333fec0,2025-02-18T19:15:13.530000
|
||||||
CVE-2024-13227,0,0,c34ede3feb9dba7e466b356b6917ab16c078ee64224ad65ef9ea2ba00b4f2945,2025-02-24T16:44:13.157000
|
CVE-2024-13227,0,0,c34ede3feb9dba7e466b356b6917ab16c078ee64224ad65ef9ea2ba00b4f2945,2025-02-24T16:44:13.157000
|
||||||
CVE-2024-13228,0,0,40cdaa381c65554c70f52b52abe8e4f273527cf6f5176b112ffc2cc6f91fc27e,2025-03-11T07:15:32.670000
|
CVE-2024-13228,0,0,40cdaa381c65554c70f52b52abe8e4f273527cf6f5176b112ffc2cc6f91fc27e,2025-03-11T07:15:32.670000
|
||||||
@ -247561,7 +247561,7 @@ CVE-2024-13439,0,0,2f059501bc7533dd49b97287e80dce5e31332841fdcf6ed4dd7d300b721f1
|
|||||||
CVE-2024-1344,0,0,3c7e3680ada5d2af6c947ff7713f6316fa39154980892782020553f5d0042cd7,2024-11-21T08:50:22.543000
|
CVE-2024-1344,0,0,3c7e3680ada5d2af6c947ff7713f6316fa39154980892782020553f5d0042cd7,2024-11-21T08:50:22.543000
|
||||||
CVE-2024-13440,0,0,5766e7a438a8e4269354aacca2cf4360d814b2b0ba936161bc318042a1e4abc8,2025-02-13T17:17:19.413000
|
CVE-2024-13440,0,0,5766e7a438a8e4269354aacca2cf4360d814b2b0ba936161bc318042a1e4abc8,2025-02-13T17:17:19.413000
|
||||||
CVE-2024-13441,0,0,c4feb7fa45e58abcf7c01d5df380ea3f267be46791773adc8606a649a8a16fa9,2025-02-04T19:37:08.100000
|
CVE-2024-13441,0,0,c4feb7fa45e58abcf7c01d5df380ea3f267be46791773adc8606a649a8a16fa9,2025-02-04T19:37:08.100000
|
||||||
CVE-2024-13442,1,1,07100fbb2c07d587b77e0245f7176c7fe6e4992c54326ed9b3e9e185dd254356,2025-03-19T12:15:13.857000
|
CVE-2024-13442,0,0,07100fbb2c07d587b77e0245f7176c7fe6e4992c54326ed9b3e9e185dd254356,2025-03-19T12:15:13.857000
|
||||||
CVE-2024-13443,0,0,45895be01f051ac07538c729bc325487d84fe178af27003bb0a84004bc553820,2025-02-19T04:15:10.360000
|
CVE-2024-13443,0,0,45895be01f051ac07538c729bc325487d84fe178af27003bb0a84004bc553820,2025-02-19T04:15:10.360000
|
||||||
CVE-2024-13444,0,0,f559be4a09d3b0d4718253e232ed1d6b01b700beffd4896c1d6f62eac4116d3c,2025-01-21T11:15:09.450000
|
CVE-2024-13444,0,0,f559be4a09d3b0d4718253e232ed1d6b01b700beffd4896c1d6f62eac4116d3c,2025-01-21T11:15:09.450000
|
||||||
CVE-2024-13445,0,0,e320e7547c6eda6e85243dd50e1b8e91047011502ea9fdec246dbbf1d042f305,2025-02-25T20:22:07.157000
|
CVE-2024-13445,0,0,e320e7547c6eda6e85243dd50e1b8e91047011502ea9fdec246dbbf1d042f305,2025-02-25T20:22:07.157000
|
||||||
@ -247994,7 +247994,7 @@ CVE-2024-13919,0,0,7c5ab092a55439dc8c02bc97bab1d29d32b755887059a3b61b9ad224908cb
|
|||||||
CVE-2024-1392,0,0,7d376d426c7bde42291bb43e543815dd80a04cb004b570eb44a0e5840366c498,2025-01-17T19:53:57.010000
|
CVE-2024-1392,0,0,7d376d426c7bde42291bb43e543815dd80a04cb004b570eb44a0e5840366c498,2025-01-17T19:53:57.010000
|
||||||
CVE-2024-13924,0,0,e36e603c0c6b6f9989e25340b54970575d329cf8a84edf152fc0708bf80f6812,2025-03-12T16:23:39.567000
|
CVE-2024-13924,0,0,e36e603c0c6b6f9989e25340b54970575d329cf8a84edf152fc0708bf80f6812,2025-03-12T16:23:39.567000
|
||||||
CVE-2024-1393,0,0,807d9a3a72d3c227cf073d19ae4d043ce29012d9a81f19ad09766963a4531e84,2025-01-17T19:54:07.350000
|
CVE-2024-1393,0,0,807d9a3a72d3c227cf073d19ae4d043ce29012d9a81f19ad09766963a4531e84,2025-01-17T19:54:07.350000
|
||||||
CVE-2024-13933,1,1,5443dbf12b39bfc2acfe1adbc39c04300f987a9bcfb56ac22130681b41f5e2db,2025-03-19T12:15:14.003000
|
CVE-2024-13933,0,0,5443dbf12b39bfc2acfe1adbc39c04300f987a9bcfb56ac22130681b41f5e2db,2025-03-19T12:15:14.003000
|
||||||
CVE-2024-1394,0,0,3bfb4bdf7cbd2e83903d52b6ed8359606dbe1ee24d71dfdae11060be7f14efdb,2024-11-21T08:50:29.120000
|
CVE-2024-1394,0,0,3bfb4bdf7cbd2e83903d52b6ed8359606dbe1ee24d71dfdae11060be7f14efdb,2024-11-21T08:50:29.120000
|
||||||
CVE-2024-1395,0,0,aa14344d5f3c417e75370dfad240218276bccf85a1cff8add87ecef1ce7213df,2024-11-21T08:50:29.483000
|
CVE-2024-1395,0,0,aa14344d5f3c417e75370dfad240218276bccf85a1cff8add87ecef1ce7213df,2024-11-21T08:50:29.483000
|
||||||
CVE-2024-1396,0,0,99c867002ef97abbaaafea27abb6c91c61f510e73a2f0816bc88ba650d70c41c,2024-11-21T08:50:29.700000
|
CVE-2024-1396,0,0,99c867002ef97abbaaafea27abb6c91c61f510e73a2f0816bc88ba650d70c41c,2024-11-21T08:50:29.700000
|
||||||
@ -248630,7 +248630,7 @@ CVE-2024-20055,0,0,0cd1a1a1bc134a6a6fa4bf90d380bff04abbc6c81e19c2261236da7a278b9
|
|||||||
CVE-2024-20056,0,0,81d428e4d181e8312b32dda0cff6cfde75ef18609600caa3b7da7e981bb2a321,2025-03-13T18:15:36.880000
|
CVE-2024-20056,0,0,81d428e4d181e8312b32dda0cff6cfde75ef18609600caa3b7da7e981bb2a321,2025-03-13T18:15:36.880000
|
||||||
CVE-2024-20057,0,0,d41872e09ed050e0d60edcf8c8cb9f2f16a39b7414f40d966be0c0dadc633d3d,2024-11-21T08:51:55.623000
|
CVE-2024-20057,0,0,d41872e09ed050e0d60edcf8c8cb9f2f16a39b7414f40d966be0c0dadc633d3d,2024-11-21T08:51:55.623000
|
||||||
CVE-2024-20058,0,0,b1aea78d08cecbe8a6797a2eccae67b4216de9f124a4ec0b1bd505c4bb859c46,2024-11-21T08:51:55.767000
|
CVE-2024-20058,0,0,b1aea78d08cecbe8a6797a2eccae67b4216de9f124a4ec0b1bd505c4bb859c46,2024-11-21T08:51:55.767000
|
||||||
CVE-2024-20059,0,0,3f92e7624e6793baad95bf5c5fda85b21dadfac2599351333cf7d3804b909f8b,2024-11-21T08:51:55.990000
|
CVE-2024-20059,0,1,f43e5b062f45304be39bcb5dae92b6ee1c5b2ee5de21825d3ba6a3416a54bde3,2025-03-19T14:15:35.787000
|
||||||
CVE-2024-2006,0,0,8edf579119d048fb0addb069e3e97e116defb6c81523e84fb8ce83f7cf4b6a4b,2025-03-13T00:55:44.487000
|
CVE-2024-2006,0,0,8edf579119d048fb0addb069e3e97e116defb6c81523e84fb8ce83f7cf4b6a4b,2025-03-13T00:55:44.487000
|
||||||
CVE-2024-20060,0,0,1b6d1c96c2231d4d9ba37c21fcd6bc05cee0dac4de2ebf5068d932765cec69ca,2024-11-21T08:51:56.120000
|
CVE-2024-20060,0,0,1b6d1c96c2231d4d9ba37c21fcd6bc05cee0dac4de2ebf5068d932765cec69ca,2024-11-21T08:51:56.120000
|
||||||
CVE-2024-20064,0,0,f1797f19de889df3b42c4b5ef9ef75484488143de4782f4bd3126dc110b5671d,2025-02-03T19:35:24.340000
|
CVE-2024-20064,0,0,f1797f19de889df3b42c4b5ef9ef75484488143de4782f4bd3126dc110b5671d,2025-02-03T19:35:24.340000
|
||||||
@ -251705,7 +251705,7 @@ CVE-2024-23784,0,0,fbb08b4f0a06140ba3336bcd5ca10e9f46eba5802513fb502c644b9cd1ce9
|
|||||||
CVE-2024-23785,0,0,69098fe97dc1e2e17c091ef031f069829d6e9d34880e18423c024bf6d8297afb,2024-11-21T08:58:23.857000
|
CVE-2024-23785,0,0,69098fe97dc1e2e17c091ef031f069829d6e9d34880e18423c024bf6d8297afb,2024-11-21T08:58:23.857000
|
||||||
CVE-2024-23786,0,0,9b17729227428fd4f10a45c71207334db1786e3f72acd0de4b6b69c1fed63828,2025-03-18T14:15:38.450000
|
CVE-2024-23786,0,0,9b17729227428fd4f10a45c71207334db1786e3f72acd0de4b6b69c1fed63828,2025-03-18T14:15:38.450000
|
||||||
CVE-2024-23787,0,0,029004547be72f5abdeaa1081c2db892ce33ae9fa873b72d24ff48254b202124,2024-11-25T18:54:34.530000
|
CVE-2024-23787,0,0,029004547be72f5abdeaa1081c2db892ce33ae9fa873b72d24ff48254b202124,2024-11-25T18:54:34.530000
|
||||||
CVE-2024-23788,0,0,6560a1aa3a129015b4a3affeba177920091f2bc65e89a77b92a05faa90249853,2024-12-13T17:32:04.810000
|
CVE-2024-23788,0,1,3ed6bafda21901799a4dfbdf04ba8447f3ad68fc5855c91f97130a2370e8a954,2025-03-19T14:15:36.007000
|
||||||
CVE-2024-23789,0,0,bfb78a7de0bc7e7925bb84311505f5172d598e532ae0da2c006f3536a9f5dacf,2024-11-21T08:58:25.217000
|
CVE-2024-23789,0,0,bfb78a7de0bc7e7925bb84311505f5172d598e532ae0da2c006f3536a9f5dacf,2024-11-21T08:58:25.217000
|
||||||
CVE-2024-2379,0,0,cf840ac82667bfb1ae0d634974b612d7cc2367516dec6dcacc2bf89b9ebdc547,2024-11-21T09:09:37.570000
|
CVE-2024-2379,0,0,cf840ac82667bfb1ae0d634974b612d7cc2367516dec6dcacc2bf89b9ebdc547,2024-11-21T09:09:37.570000
|
||||||
CVE-2024-23790,0,0,7f508ff20070766ba08735fb62c77bc7a886506baf978895b0d3cf0b2340c928,2024-11-21T08:58:25.423000
|
CVE-2024-23790,0,0,7f508ff20070766ba08735fb62c77bc7a886506baf978895b0d3cf0b2340c928,2024-11-21T08:58:25.423000
|
||||||
@ -251865,7 +251865,7 @@ CVE-2024-23941,0,0,377e40ad54a332b818df016f5e6db38286f42aa52aa09ea13a642fb9c9a22
|
|||||||
CVE-2024-23942,0,0,b8b7a23af4a9c98af1108069667a31130c84842a8fcb9e546c0dc8f6de5a3e93,2025-03-18T11:15:38.777000
|
CVE-2024-23942,0,0,b8b7a23af4a9c98af1108069667a31130c84842a8fcb9e546c0dc8f6de5a3e93,2025-03-18T11:15:38.777000
|
||||||
CVE-2024-23943,0,0,602551addfaf9449d22eafb915e2f6ab0ff3b2123ab4dc6ea23f9b224b0664d7,2025-03-18T11:15:39.090000
|
CVE-2024-23943,0,0,602551addfaf9449d22eafb915e2f6ab0ff3b2123ab4dc6ea23f9b224b0664d7,2025-03-18T11:15:39.090000
|
||||||
CVE-2024-23944,0,0,d1f7d065765e5643c2171d654a3fe7a15ded2542e5ae0ba9d07c168a5a5837bf,2025-02-13T18:17:05.470000
|
CVE-2024-23944,0,0,d1f7d065765e5643c2171d654a3fe7a15ded2542e5ae0ba9d07c168a5a5837bf,2025-02-13T18:17:05.470000
|
||||||
CVE-2024-23945,0,0,0e48186ccb42f1ffb7728a08d36dafb5b233965e5e36ffdb7b0875fe5f7c17ad,2025-02-18T22:15:10.600000
|
CVE-2024-23945,0,1,bb56c069ffece046c263afd9a32b159f25c8a81747a129854e78ff3251c300b0,2025-03-19T14:15:36.173000
|
||||||
CVE-2024-23946,0,0,9c898cf09e521a2a31019dd3080db79ce9c32f7697e5321cb7301cafff4ddf89,2024-11-21T08:58:44.260000
|
CVE-2024-23946,0,0,9c898cf09e521a2a31019dd3080db79ce9c32f7697e5321cb7301cafff4ddf89,2024-11-21T08:58:44.260000
|
||||||
CVE-2024-23947,0,0,71278d4a159cc549aab5b7dbabd025fce93076b316a17d3e2ac8c5a91e551401,2025-02-12T18:43:20.107000
|
CVE-2024-23947,0,0,71278d4a159cc549aab5b7dbabd025fce93076b316a17d3e2ac8c5a91e551401,2025-02-12T18:43:20.107000
|
||||||
CVE-2024-23948,0,0,c4340c793641d823b9f3789f568fd96f3e2cea4b888e1ca28a5883e79c28a251,2025-02-12T18:43:24.687000
|
CVE-2024-23948,0,0,c4340c793641d823b9f3789f568fd96f3e2cea4b888e1ca28a5883e79c28a251,2025-02-12T18:43:24.687000
|
||||||
@ -252103,7 +252103,7 @@ CVE-2024-24419,0,0,6461e4afd495f91efaae96c55ee7f319576a8bc399f40f12fa7c06ee46c44
|
|||||||
CVE-2024-2442,0,0,253b87e62399d3a6af245d178e21fd710ca2545ac6e1dfd17779d2dcf3253a0c,2024-11-21T09:09:45.697000
|
CVE-2024-2442,0,0,253b87e62399d3a6af245d178e21fd710ca2545ac6e1dfd17779d2dcf3253a0c,2024-11-21T09:09:45.697000
|
||||||
CVE-2024-24420,0,0,a9427fa07db4986b0d9c0e963da0c4c6a915285d7c2c249b528b587f5ffa804d,2025-02-18T21:15:20.800000
|
CVE-2024-24420,0,0,a9427fa07db4986b0d9c0e963da0c4c6a915285d7c2c249b528b587f5ffa804d,2025-02-18T21:15:20.800000
|
||||||
CVE-2024-24421,0,0,97a85089fd7991d19460b26cfacbebab9e686820dc534e03e0b00953674d1be4,2025-02-18T21:15:20.973000
|
CVE-2024-24421,0,0,97a85089fd7991d19460b26cfacbebab9e686820dc534e03e0b00953674d1be4,2025-02-18T21:15:20.973000
|
||||||
CVE-2024-24422,0,0,880bfd6c9396281614ba81f8dd610f47d3689bbb0133e6a43850002af7027433,2025-02-18T21:15:21.150000
|
CVE-2024-24422,0,1,cc1fe911e5d9bb47992bcf93c1d25d6815fc8e41d6031807026099db7d254742,2025-03-19T14:15:36.380000
|
||||||
CVE-2024-24423,0,0,2121b9c97716cc2d66ab960276b0a7ffe452fd6d2561b1b2c197696cdf4f4830,2025-03-18T19:15:42.503000
|
CVE-2024-24423,0,0,2121b9c97716cc2d66ab960276b0a7ffe452fd6d2561b1b2c197696cdf4f4830,2025-03-18T19:15:42.503000
|
||||||
CVE-2024-24424,0,0,c7c1f65a8bf5b7819bfe95e7f58b682fa72633acefcfa8308066d9af4263deb3,2025-03-14T16:15:29.560000
|
CVE-2024-24424,0,0,c7c1f65a8bf5b7819bfe95e7f58b682fa72633acefcfa8308066d9af4263deb3,2025-03-14T16:15:29.560000
|
||||||
CVE-2024-24425,0,0,f020647313a266e9b26d920d7b3ff0c5a70298ceb4b38f72086ac27d496b3748,2024-11-19T17:35:09.450000
|
CVE-2024-24425,0,0,f020647313a266e9b26d920d7b3ff0c5a70298ceb4b38f72086ac27d496b3748,2024-11-19T17:35:09.450000
|
||||||
@ -253881,7 +253881,7 @@ CVE-2024-26791,0,0,c8ef10c6f04ed9c66fd762d6a0b3a45e0c79cbce1caed02d55dfa6a1faf6f
|
|||||||
CVE-2024-26792,0,0,785771b4bfd2e03416e2a07ada6b7ec1391a403eee900f868d4d1d8145ef2354,2024-12-20T16:15:54.653000
|
CVE-2024-26792,0,0,785771b4bfd2e03416e2a07ada6b7ec1391a403eee900f868d4d1d8145ef2354,2024-12-20T16:15:54.653000
|
||||||
CVE-2024-26793,0,0,aa90abb3d1121ccaaf349ab01239e4c0a4a16759efda564be699ec746faed484,2024-12-20T15:56:00.320000
|
CVE-2024-26793,0,0,aa90abb3d1121ccaaf349ab01239e4c0a4a16759efda564be699ec746faed484,2024-12-20T15:56:00.320000
|
||||||
CVE-2024-26794,0,0,23d739d3565f17af447122df5e00eeef05a8ec54d56457d32b6380cc23d7ee66,2024-11-21T09:03:05.240000
|
CVE-2024-26794,0,0,23d739d3565f17af447122df5e00eeef05a8ec54d56457d32b6380cc23d7ee66,2024-11-21T09:03:05.240000
|
||||||
CVE-2024-26795,0,1,d43373becd1a2a0dc874625192219b12b2ce199f209c7afab1c87714eb89d672,2025-03-19T11:42:41.993000
|
CVE-2024-26795,0,0,d43373becd1a2a0dc874625192219b12b2ce199f209c7afab1c87714eb89d672,2025-03-19T11:42:41.993000
|
||||||
CVE-2024-26796,0,0,740b63b874106b1735e661fa59a152bb86da8899659de0c6c2baad5e3560a4e5,2025-02-27T14:42:59.307000
|
CVE-2024-26796,0,0,740b63b874106b1735e661fa59a152bb86da8899659de0c6c2baad5e3560a4e5,2025-02-27T14:42:59.307000
|
||||||
CVE-2024-26797,0,0,d555849e5fdf34e0c546a7c8e0d877b819832c74438f586ca3128c8a5874d4a2,2024-11-21T09:03:05.660000
|
CVE-2024-26797,0,0,d555849e5fdf34e0c546a7c8e0d877b819832c74438f586ca3128c8a5874d4a2,2024-11-21T09:03:05.660000
|
||||||
CVE-2024-26798,0,0,0a31e852f2f7b601301225ce2a65456a90e397455c97cc5be42b040cfac0e775,2024-11-21T09:03:05.853000
|
CVE-2024-26798,0,0,0a31e852f2f7b601301225ce2a65456a90e397455c97cc5be42b040cfac0e775,2024-11-21T09:03:05.853000
|
||||||
@ -266270,7 +266270,7 @@ CVE-2024-42861,0,0,5ac4827af3e3142d1b282b5930c3cc4ee3777c4ff3aba0df8482c0899ef1a
|
|||||||
CVE-2024-4287,0,0,b8a2cf136b3083f6bb500806e5afada31dbc16efa97357879361c58428559568,2024-11-21T09:42:32.727000
|
CVE-2024-4287,0,0,b8a2cf136b3083f6bb500806e5afada31dbc16efa97357879361c58428559568,2024-11-21T09:42:32.727000
|
||||||
CVE-2024-4288,0,0,c3337da044993bbbc180fcf8a19f1690cecb1ffe7d7876ad254d73c7461b14d3,2025-01-28T16:28:47.287000
|
CVE-2024-4288,0,0,c3337da044993bbbc180fcf8a19f1690cecb1ffe7d7876ad254d73c7461b14d3,2025-01-28T16:28:47.287000
|
||||||
CVE-2024-42885,0,0,ee56590959e67a72b05a6cda20f46f0a9d3647870a63123321ef2d7e471b6b35,2024-09-05T18:35:07.060000
|
CVE-2024-42885,0,0,ee56590959e67a72b05a6cda20f46f0a9d3647870a63123321ef2d7e471b6b35,2024-09-05T18:35:07.060000
|
||||||
CVE-2024-4289,0,0,aeefeb9696ba85f6773564fa5c4f7cdcbdf5edbf7d32a7520045491e7a4d015f,2024-11-21T09:42:32.977000
|
CVE-2024-4289,0,1,6e68774b9b4cf6699540b01a235c3deca6971edc315dab7ec717a2422c223e69,2025-03-19T14:15:37.420000
|
||||||
CVE-2024-42898,0,0,f0a404c15dfbdd17bf8fc2fff1d0150e98b26ac04c520196b856ef45cfd1089a,2025-01-10T18:15:21.670000
|
CVE-2024-42898,0,0,f0a404c15dfbdd17bf8fc2fff1d0150e98b26ac04c520196b856ef45cfd1089a,2025-01-10T18:15:21.670000
|
||||||
CVE-2024-4290,0,0,6a2079683ecc1d5a391a845f1e72b85d31a18e6140a0ac8996a297bb31d2d7cf,2024-11-21T09:42:33.080000
|
CVE-2024-4290,0,0,6a2079683ecc1d5a391a845f1e72b85d31a18e6140a0ac8996a297bb31d2d7cf,2024-11-21T09:42:33.080000
|
||||||
CVE-2024-42900,0,0,b64f85d57002cf7240c8feee5b45ad026c6f41850d03e921da1c59ae967003ac,2024-08-29T13:25:27.537000
|
CVE-2024-42900,0,0,b64f85d57002cf7240c8feee5b45ad026c6f41850d03e921da1c59ae967003ac,2024-08-29T13:25:27.537000
|
||||||
@ -266394,7 +266394,7 @@ CVE-2024-43090,0,0,bfb455ba3b27b8e5f909736d7638aa4c244eafab69b7641e19b79e78332f1
|
|||||||
CVE-2024-43091,0,0,18a7813067907079929e1aa7a03c2ea14a6eb858fe26b9c9489160580668468c,2024-12-17T20:35:58.717000
|
CVE-2024-43091,0,0,18a7813067907079929e1aa7a03c2ea14a6eb858fe26b9c9489160580668468c,2024-12-17T20:35:58.717000
|
||||||
CVE-2024-43093,0,0,3f092629a0cce74f6f59bab52d6247e2ce3f3aaa2972aab5920268e0f2acfa91,2024-11-14T21:42:34.923000
|
CVE-2024-43093,0,0,3f092629a0cce74f6f59bab52d6247e2ce3f3aaa2972aab5920268e0f2acfa91,2024-11-14T21:42:34.923000
|
||||||
CVE-2024-43095,0,0,4f9b3e24c320d2860d2ce22850ffdfb7559aa75a9e29352b4ab30371d10a8710,2025-01-22T18:15:19.013000
|
CVE-2024-43095,0,0,4f9b3e24c320d2860d2ce22850ffdfb7559aa75a9e29352b4ab30371d10a8710,2025-01-22T18:15:19.013000
|
||||||
CVE-2024-43096,0,0,f0917337ccbf01aac70cf0fc4c11a03157db072c393a2498dc0158709302e31e,2025-02-18T21:15:21.990000
|
CVE-2024-43096,0,1,754ea5dc94f38edb500836a10edd3af13c0a9f6840364bf5983f93c9c05f47fd,2025-03-19T14:15:36.567000
|
||||||
CVE-2024-43097,0,0,004c4d6e0d21742822f66f64708df4b2724897f8929303b830f9e30aebcf9183,2025-01-03T22:15:07.503000
|
CVE-2024-43097,0,0,004c4d6e0d21742822f66f64708df4b2724897f8929303b830f9e30aebcf9183,2025-01-03T22:15:07.503000
|
||||||
CVE-2024-43098,0,0,e6cfab1a6a9535db9ca658414c0bc9df5fe4048cd784e47787ef38dd04ca751f,2025-02-03T15:15:19.603000
|
CVE-2024-43098,0,0,e6cfab1a6a9535db9ca658414c0bc9df5fe4048cd784e47787ef38dd04ca751f,2025-02-03T15:15:19.603000
|
||||||
CVE-2024-43099,0,0,7fb5b3a3641a114d0dbda5969491e20e79493c82b2229b8431c4fab73912a211,2024-09-14T11:47:14.677000
|
CVE-2024-43099,0,0,7fb5b3a3641a114d0dbda5969491e20e79493c82b2229b8431c4fab73912a211,2024-09-14T11:47:14.677000
|
||||||
@ -267426,7 +267426,7 @@ CVE-2024-44147,0,0,0010b4e6f55ac982db2f0d22f0bf5765f6a7a167f9f9e0d3c647be24e3c70
|
|||||||
CVE-2024-44148,0,0,335338cc9709ff206063b9ab9c7d9114b0044f4fd6d0a94bd7c6bf382ee12cf9,2025-03-14T17:15:46.850000
|
CVE-2024-44148,0,0,335338cc9709ff206063b9ab9c7d9114b0044f4fd6d0a94bd7c6bf382ee12cf9,2025-03-14T17:15:46.850000
|
||||||
CVE-2024-44149,0,0,6eeeb205f0113be4e2296a27ada921710ab4d7c81a3e95e9aa805acec5d12597,2024-09-24T15:58:38.770000
|
CVE-2024-44149,0,0,6eeeb205f0113be4e2296a27ada921710ab4d7c81a3e95e9aa805acec5d12597,2024-09-24T15:58:38.770000
|
||||||
CVE-2024-44151,0,0,3adb3cc493ef9fc3cca2cec3a09f77a8995ed8befc9b50d495377265c5c0fed5,2025-03-18T14:15:40.260000
|
CVE-2024-44151,0,0,3adb3cc493ef9fc3cca2cec3a09f77a8995ed8befc9b50d495377265c5c0fed5,2025-03-18T14:15:40.260000
|
||||||
CVE-2024-44152,0,0,7550f779a958464ffd932d586cb89d009c0ca7eab9087769b3575744cdc01796,2024-09-24T15:55:06.100000
|
CVE-2024-44152,0,1,7a7a0a7282d399fdff70a8c927df72e5141929745d24a60a917ba2999ca54cc8,2025-03-19T14:15:36.703000
|
||||||
CVE-2024-44153,0,0,82097411ba307b5977c3f59bb78c96925324f15ed043a95bad15fc0eb0059c7f,2024-09-24T16:19:32.593000
|
CVE-2024-44153,0,0,82097411ba307b5977c3f59bb78c96925324f15ed043a95bad15fc0eb0059c7f,2024-09-24T16:19:32.593000
|
||||||
CVE-2024-44154,0,0,89a24bfbf234a70641ab7749eab7b5da9037b819fafebdffc1a16e298ce587bb,2025-03-18T19:15:44.260000
|
CVE-2024-44154,0,0,89a24bfbf234a70641ab7749eab7b5da9037b819fafebdffc1a16e298ce587bb,2025-03-18T19:15:44.260000
|
||||||
CVE-2024-44155,0,0,dd8c2f2995ac2dd10c9ef39e8cc88034d185cb75998040610feb68362606bf0f,2025-03-18T19:15:44.467000
|
CVE-2024-44155,0,0,dd8c2f2995ac2dd10c9ef39e8cc88034d185cb75998040610feb68362606bf0f,2025-03-18T19:15:44.467000
|
||||||
@ -268081,7 +268081,7 @@ CVE-2024-45235,0,0,462ae6816185738fa34814bdc082285af9bb3670e44f64ad6e7c839ac8e78
|
|||||||
CVE-2024-45236,0,0,10a3f25b1ce0fad9bae9efcffb3b32f23962c65836cda92b85e58e7719d1f481,2024-08-27T15:48:05.687000
|
CVE-2024-45236,0,0,10a3f25b1ce0fad9bae9efcffb3b32f23962c65836cda92b85e58e7719d1f481,2024-08-27T15:48:05.687000
|
||||||
CVE-2024-45237,0,0,8d0848c5954ca709a4ae70b4b78d8928a8c3e70a6fc3cc7805b63f3324320128,2024-08-27T15:48:34.030000
|
CVE-2024-45237,0,0,8d0848c5954ca709a4ae70b4b78d8928a8c3e70a6fc3cc7805b63f3324320128,2024-08-27T15:48:34.030000
|
||||||
CVE-2024-45238,0,0,48fd855edea987481de083e60b583119b838c97c2f2219b92f30f3c9aed602d5,2024-08-26T16:35:13.637000
|
CVE-2024-45238,0,0,48fd855edea987481de083e60b583119b838c97c2f2219b92f30f3c9aed602d5,2024-08-26T16:35:13.637000
|
||||||
CVE-2024-45239,0,0,ce62a7c9f68fbc3e39168952ca22874ec7092ed70581d5bdc84358a9b5fe364a,2024-08-27T15:49:31.417000
|
CVE-2024-45239,0,1,308ad4017eec50af32375d82991c06ade20cb132c31cbe263f6c3c9bb55e3d3a,2025-03-19T14:15:36.867000
|
||||||
CVE-2024-4524,0,0,1a29c8363e54142cc04ff20a6c077338074ef9e68a92e0da5cb57a49d3b660ca,2025-02-19T18:02:32.757000
|
CVE-2024-4524,0,0,1a29c8363e54142cc04ff20a6c077338074ef9e68a92e0da5cb57a49d3b660ca,2025-02-19T18:02:32.757000
|
||||||
CVE-2024-45240,0,0,a153a5aa66216b02c77221395996978741fedbb71234eea04b7daf427a770991,2024-11-05T22:35:10.623000
|
CVE-2024-45240,0,0,a153a5aa66216b02c77221395996978741fedbb71234eea04b7daf427a770991,2024-11-05T22:35:10.623000
|
||||||
CVE-2024-45241,0,0,969a49dfd5da3343c207df3cb1b1cc1199ba4de4eb98ea86e16e4fe39d572348,2024-08-26T16:35:14.650000
|
CVE-2024-45241,0,0,969a49dfd5da3343c207df3cb1b1cc1199ba4de4eb98ea86e16e4fe39d572348,2024-08-26T16:35:14.650000
|
||||||
@ -268407,7 +268407,7 @@ CVE-2024-4564,0,0,ee8f47044242c05a630f54d8d399a7051500b8cbd4c8fa39ec50216846d2f2
|
|||||||
CVE-2024-45640,0,0,923abe7b70ac2297df80331720303a7ee55474d7dd4031afdf0c5f6c2b1c1e0c,2025-01-07T13:15:07.690000
|
CVE-2024-45640,0,0,923abe7b70ac2297df80331720303a7ee55474d7dd4031afdf0c5f6c2b1c1e0c,2025-01-07T13:15:07.690000
|
||||||
CVE-2024-45642,0,0,cfb188922d2de3d0a2e624109932e190c43782f5c9c1e7fb30a5b975a8a432ea,2024-11-16T00:13:06.017000
|
CVE-2024-45642,0,0,cfb188922d2de3d0a2e624109932e190c43782f5c9c1e7fb30a5b975a8a432ea,2024-11-16T00:13:06.017000
|
||||||
CVE-2024-45643,0,0,50fab40ddb7c4d5d733822515e92d29c9d1df8bc52244fdea80f3613919e43c1,2025-03-14T15:15:42.820000
|
CVE-2024-45643,0,0,50fab40ddb7c4d5d733822515e92d29c9d1df8bc52244fdea80f3613919e43c1,2025-03-14T15:15:42.820000
|
||||||
CVE-2024-45644,1,1,b89fec9e44b59ed56ea1614d3b241e14e3bc17ed2f6376deb1749ef91d55dd06,2025-03-19T12:15:14.153000
|
CVE-2024-45644,0,0,b89fec9e44b59ed56ea1614d3b241e14e3bc17ed2f6376deb1749ef91d55dd06,2025-03-19T12:15:14.153000
|
||||||
CVE-2024-45647,0,0,99690f8ec38bd0cb79a3ca6e5d0b11de3bd4c9f2564c73834cc738f80a3b4cff,2025-01-29T21:11:50.207000
|
CVE-2024-45647,0,0,99690f8ec38bd0cb79a3ca6e5d0b11de3bd4c9f2564c73834cc738f80a3b4cff,2025-01-29T21:11:50.207000
|
||||||
CVE-2024-4565,0,0,7eafc37f7621bbcecc9df42111f1503d84607d3815c6d13bfc741bedf44b3a75,2024-11-21T09:43:07.187000
|
CVE-2024-4565,0,0,7eafc37f7621bbcecc9df42111f1503d84607d3815c6d13bfc741bedf44b3a75,2024-11-21T09:43:07.187000
|
||||||
CVE-2024-45650,0,0,4e5537e03b2a804010ec65f14134e876717537795080f933ff3b04a2def30a14,2025-01-31T15:15:13.350000
|
CVE-2024-45650,0,0,4e5537e03b2a804010ec65f14134e876717537795080f933ff3b04a2def30a14,2025-01-31T15:15:13.350000
|
||||||
@ -268851,7 +268851,7 @@ CVE-2024-46559,0,0,574bb782de67d3ca843eb7dadf7886c850048a085dbeb205a59363fd8a35f
|
|||||||
CVE-2024-4656,0,0,6d241fc1cd2c4b7cf0efdf2dccdedfe28029ef7d9e8fd963203fc60e3122a942,2024-11-21T09:43:19.090000
|
CVE-2024-4656,0,0,6d241fc1cd2c4b7cf0efdf2dccdedfe28029ef7d9e8fd963203fc60e3122a942,2024-11-21T09:43:19.090000
|
||||||
CVE-2024-46560,0,0,a586c31a90480257b3b10d2df129325a006d5274100f26e7023a1ac0621f5b47,2025-03-14T16:15:35.920000
|
CVE-2024-46560,0,0,a586c31a90480257b3b10d2df129325a006d5274100f26e7023a1ac0621f5b47,2025-03-14T16:15:35.920000
|
||||||
CVE-2024-46561,0,0,c25954c2fd9d3ad9e3b0bbe0be5d2cc787aa6e3078e6f23b1b9e5e3ce54e8b97,2024-09-24T16:41:54.337000
|
CVE-2024-46561,0,0,c25954c2fd9d3ad9e3b0bbe0be5d2cc787aa6e3078e6f23b1b9e5e3ce54e8b97,2024-09-24T16:41:54.337000
|
||||||
CVE-2024-46564,0,0,e3650601e6103c25c0638469ece4f175000c7656b133c286eaafe2153db2c0e0,2024-09-24T16:41:55.907000
|
CVE-2024-46564,0,1,e60856fed0c5c52ec0575c0a0cf7d21f60315a4cf6ad706c961eaee2c7364f69,2025-03-19T14:15:37.093000
|
||||||
CVE-2024-46565,0,0,f5657924f5aa18ab256492c2fb84533af8b2d2b6dc20c817da65bf4bfa08a6a2,2025-03-13T16:15:23.200000
|
CVE-2024-46565,0,0,f5657924f5aa18ab256492c2fb84533af8b2d2b6dc20c817da65bf4bfa08a6a2,2025-03-13T16:15:23.200000
|
||||||
CVE-2024-46566,0,0,a645300cad5cbc9678845ef13387d0ff84f678de8f2f73f755a1a4420c48c73c,2025-03-18T21:15:30.230000
|
CVE-2024-46566,0,0,a645300cad5cbc9678845ef13387d0ff84f678de8f2f73f755a1a4420c48c73c,2025-03-18T21:15:30.230000
|
||||||
CVE-2024-46567,0,0,dc3cb195e900cad9c5ba8c571a707de430f78c6e79b59e5d2ca6aa377b09ee20,2025-03-18T16:15:24.277000
|
CVE-2024-46567,0,0,dc3cb195e900cad9c5ba8c571a707de430f78c6e79b59e5d2ca6aa377b09ee20,2025-03-18T16:15:24.277000
|
||||||
@ -270480,7 +270480,7 @@ CVE-2024-48784,0,0,0480c0cbca95176a3691abe719169608ed92e96fcba60ce2d516ea18e95c0
|
|||||||
CVE-2024-48786,0,0,bbe4462c021ce09fcf89f5b2a0dcd0f951296fd770a62d8b0d79a432dfee8ecc,2024-10-15T19:35:43.413000
|
CVE-2024-48786,0,0,bbe4462c021ce09fcf89f5b2a0dcd0f951296fd770a62d8b0d79a432dfee8ecc,2024-10-15T19:35:43.413000
|
||||||
CVE-2024-48787,0,0,6564c1e5dbdb27e3c0da30d8c57cbe4f0f15455d949b017d5245d35b4ceece19,2024-10-15T19:35:44.190000
|
CVE-2024-48787,0,0,6564c1e5dbdb27e3c0da30d8c57cbe4f0f15455d949b017d5245d35b4ceece19,2024-10-15T19:35:44.190000
|
||||||
CVE-2024-48788,0,0,8b8214a71f356be931cff2267f2702ed7740182cbb0eb5f3d3efd807a79c28bc,2024-10-15T19:35:44.980000
|
CVE-2024-48788,0,0,8b8214a71f356be931cff2267f2702ed7740182cbb0eb5f3d3efd807a79c28bc,2024-10-15T19:35:44.980000
|
||||||
CVE-2024-48789,0,0,f8ae2ce83f7bf2d0047756f47e3e493d33946c0823d005b7c7c693bbc20847e9,2024-10-15T15:35:19.560000
|
CVE-2024-48789,0,1,67cfce7daeaffa58ebeccb4737bd5b5552cbc794635a12c93461c29c61a25e83,2025-03-19T14:15:37.263000
|
||||||
CVE-2024-4879,0,0,7c395d6e4031631ba9ee91c0f43da9eb3fc030b6d50ab41e344463ed9baa2ff0,2024-11-27T19:07:32.497000
|
CVE-2024-4879,0,0,7c395d6e4031631ba9ee91c0f43da9eb3fc030b6d50ab41e344463ed9baa2ff0,2024-11-27T19:07:32.497000
|
||||||
CVE-2024-48790,0,0,927501c5af40d914a6b115eaf64ce905b5d2c59b8ad73c575fddb443d1f4656e,2024-10-16T19:35:13.893000
|
CVE-2024-48790,0,0,927501c5af40d914a6b115eaf64ce905b5d2c59b8ad73c575fddb443d1f4656e,2024-10-16T19:35:13.893000
|
||||||
CVE-2024-48791,0,0,9bb2b832e1e23b3a96788cb485be5297b76b1fc9e62778e7aade734bd9ca825d,2024-10-15T15:35:19.917000
|
CVE-2024-48791,0,0,9bb2b832e1e23b3a96788cb485be5297b76b1fc9e62778e7aade734bd9ca825d,2024-10-15T15:35:19.917000
|
||||||
@ -274864,7 +274864,7 @@ CVE-2024-54515,0,0,c445bd848e4bc13ffd78ff33c0ea49b95c8a73b35bda3dc25adccc76a7fc0
|
|||||||
CVE-2024-54516,0,0,e8ba1fcfdb5f47f03fbd36d5449c88d813bc63b8b64d5b9b4efdf797cf304aff,2025-01-31T22:15:09.917000
|
CVE-2024-54516,0,0,e8ba1fcfdb5f47f03fbd36d5449c88d813bc63b8b64d5b9b4efdf797cf304aff,2025-01-31T22:15:09.917000
|
||||||
CVE-2024-54517,0,0,0fd8179ccbd0365cba7e573ee71cbe811419d7ef1458fbfe931e08b20e6d2a7f,2025-01-31T21:15:10.470000
|
CVE-2024-54517,0,0,0fd8179ccbd0365cba7e573ee71cbe811419d7ef1458fbfe931e08b20e6d2a7f,2025-01-31T21:15:10.470000
|
||||||
CVE-2024-54518,0,0,d38c926bb772a5ff5d57f8a717fd3f35da4b9e51aa8e226408c9ace4c51813f4,2025-03-14T13:52:08.567000
|
CVE-2024-54518,0,0,d38c926bb772a5ff5d57f8a717fd3f35da4b9e51aa8e226408c9ace4c51813f4,2025-03-14T13:52:08.567000
|
||||||
CVE-2024-54519,0,0,53097084da19dd38b3872df86440f9d1c2398ee8c0c32a99274a20e3f8ad0a33,2025-03-04T16:02:20.193000
|
CVE-2024-54519,0,1,038d1614cfbdc4572202581f7fbe878fb47b32cab7391d269a22f5ea96706a76,2025-03-19T14:15:37.577000
|
||||||
CVE-2024-5452,0,0,b01b2e3bd56dc4d1c97364b861c6906ac1d43b69b37e06474f7fb830a26b907e,2024-11-21T09:47:42.793000
|
CVE-2024-5452,0,0,b01b2e3bd56dc4d1c97364b861c6906ac1d43b69b37e06474f7fb830a26b907e,2024-11-21T09:47:42.793000
|
||||||
CVE-2024-54520,0,0,18b891d1690a96408f82842735c71853309121502ff683d7104fb85f6fd3edce,2025-03-04T16:04:48.440000
|
CVE-2024-54520,0,0,18b891d1690a96408f82842735c71853309121502ff683d7104fb85f6fd3edce,2025-03-04T16:04:48.440000
|
||||||
CVE-2024-54522,0,0,80fb36ed2a4a59a992326abc248d0ec330053d9d33dbfa34981ed62e5e38966c,2025-02-06T16:15:38.563000
|
CVE-2024-54522,0,0,80fb36ed2a4a59a992326abc248d0ec330053d9d33dbfa34981ed62e5e38966c,2025-02-06T16:15:38.563000
|
||||||
@ -275193,6 +275193,7 @@ CVE-2024-55548,0,0,60ec3cfbffa02335f07d92ff09758467617c9784164eac84c7091a0b78c95
|
|||||||
CVE-2024-55549,0,0,e40a4c580768b58c769dfa4be1cd90fded892afed66fc33fbb18edf2d01cebbf,2025-03-14T02:15:15.333000
|
CVE-2024-55549,0,0,e40a4c580768b58c769dfa4be1cd90fded892afed66fc33fbb18edf2d01cebbf,2025-03-14T02:15:15.333000
|
||||||
CVE-2024-5555,0,0,742073dac4de00aad4cb6df58c8d366b01298901468c1f8f2b3d987b01395142,2024-11-21T09:47:55.300000
|
CVE-2024-5555,0,0,742073dac4de00aad4cb6df58c8d366b01298901468c1f8f2b3d987b01395142,2024-11-21T09:47:55.300000
|
||||||
CVE-2024-55550,0,0,9c9a30509bff8c2bca43bc78e6a45113dde5cc452b32a2969aee61b5f7aef23c,2025-01-08T20:46:01.203000
|
CVE-2024-55550,0,0,9c9a30509bff8c2bca43bc78e6a45113dde5cc452b32a2969aee61b5f7aef23c,2025-01-08T20:46:01.203000
|
||||||
|
CVE-2024-55551,1,1,d05413b76fecbece613f7fd256c99c60af75cf161dd1a411dbd915fd8153a063,2025-03-19T14:15:37.733000
|
||||||
CVE-2024-55553,0,0,7eeb75a14e5e1d77aed9e75af34c2f5c49991b3437b2609ee4ab7150515fb433,2025-01-23T18:15:31.327000
|
CVE-2024-55553,0,0,7eeb75a14e5e1d77aed9e75af34c2f5c49991b3437b2609ee4ab7150515fb433,2025-01-23T18:15:31.327000
|
||||||
CVE-2024-55554,0,0,09e3cdaa4a820daeb6598bb5a8faaf533e66285f3e6a4797b593c193d2a0933a,2024-12-17T17:15:09.843000
|
CVE-2024-55554,0,0,09e3cdaa4a820daeb6598bb5a8faaf533e66285f3e6a4797b593c193d2a0933a,2024-12-17T17:15:09.843000
|
||||||
CVE-2024-55555,0,0,23cb115ef4fe2561a6a7fcc2062f11f2cd9ea52ba2e0bb52e449ed37dbe2da95,2025-01-07T20:15:30.430000
|
CVE-2024-55555,0,0,23cb115ef4fe2561a6a7fcc2062f11f2cd9ea52ba2e0bb52e449ed37dbe2da95,2025-01-07T20:15:30.430000
|
||||||
@ -275626,7 +275627,7 @@ CVE-2024-56300,0,0,fd8f91c54d7b2d2f0c20bf657c6cc558d46dbec655d8d7ad2230066619d3c
|
|||||||
CVE-2024-56301,0,0,f46c9c676999b63d81039c9a073e3c1760c3de4da85396c862849172997d41f7,2025-01-13T14:15:09.887000
|
CVE-2024-56301,0,0,f46c9c676999b63d81039c9a073e3c1760c3de4da85396c862849172997d41f7,2025-01-13T14:15:09.887000
|
||||||
CVE-2024-56302,0,0,3cc2e63549a8e725e4b4c7af568502951e05c6a235ad3d0ca614770a8ee20a50,2025-01-02T12:15:28.753000
|
CVE-2024-56302,0,0,3cc2e63549a8e725e4b4c7af568502951e05c6a235ad3d0ca614770a8ee20a50,2025-01-02T12:15:28.753000
|
||||||
CVE-2024-5631,0,0,1180039d5b51b355c10882902757c5bad7937e7ec31e81b99a019ddedc795440,2024-11-21T09:48:03.210000
|
CVE-2024-5631,0,0,1180039d5b51b355c10882902757c5bad7937e7ec31e81b99a019ddedc795440,2024-11-21T09:48:03.210000
|
||||||
CVE-2024-56310,0,0,a3b0ecf50e8c7209a61a57095969ecfd6c116faafd65e192eb51abe661a5112b,2025-01-14T17:15:18.487000
|
CVE-2024-56310,0,1,81cb9cd8f363d6d459acd5f1bfeec92cede3b03d846b7830ab32877ba7e765a8,2025-03-19T14:15:37.850000
|
||||||
CVE-2024-56311,0,0,a5f3b806b958921d1fdd47ae934460856fc391070c28ff5582bd271a9abc04fa,2025-03-13T19:15:48.973000
|
CVE-2024-56311,0,0,a5f3b806b958921d1fdd47ae934460856fc391070c28ff5582bd271a9abc04fa,2025-03-13T19:15:48.973000
|
||||||
CVE-2024-56312,0,0,ec6ad9e3aff51a846de9bba86b7c3a52a17ae2fffb31510f4ca2dae81601a513,2025-03-18T15:15:57.893000
|
CVE-2024-56312,0,0,ec6ad9e3aff51a846de9bba86b7c3a52a17ae2fffb31510f4ca2dae81601a513,2025-03-18T15:15:57.893000
|
||||||
CVE-2024-56313,0,0,1b88794497f6eabc0004fec8ac6a8d185d6145923adb3ec2e2c9ede1c7b79c65,2025-03-18T14:15:40.837000
|
CVE-2024-56313,0,0,1b88794497f6eabc0004fec8ac6a8d185d6145923adb3ec2e2c9ede1c7b79c65,2025-03-18T14:15:40.837000
|
||||||
@ -276149,7 +276150,7 @@ CVE-2024-57019,0,0,51cc8b086b8447cea4ec896f4a4e59d09678a95b81b389fa4b6049d603cd1
|
|||||||
CVE-2024-5702,0,0,0475f3c0e898a1e0fb13fcae8449da95e6752ec9b4d015e07dac4bfa56be1ef3,2024-11-21T09:48:12.273000
|
CVE-2024-5702,0,0,0475f3c0e898a1e0fb13fcae8449da95e6752ec9b4d015e07dac4bfa56be1ef3,2024-11-21T09:48:12.273000
|
||||||
CVE-2024-57020,0,0,9454e1c3b56fc45c0cf376ca86b2277ead569dba13637690be836b10ddc0b8da,2025-03-18T19:15:46.330000
|
CVE-2024-57020,0,0,9454e1c3b56fc45c0cf376ca86b2277ead569dba13637690be836b10ddc0b8da,2025-03-18T19:15:46.330000
|
||||||
CVE-2024-57021,0,0,0783ac9280f5195c94c82d43c182876342e5cdb245119e654e821d65ed0809e6,2025-03-10T17:26:48.597000
|
CVE-2024-57021,0,0,0783ac9280f5195c94c82d43c182876342e5cdb245119e654e821d65ed0809e6,2025-03-10T17:26:48.597000
|
||||||
CVE-2024-57022,0,0,1356d2451b9537ddd5990de88e26abbbe2cccf3f2db031034069b49632d38abe,2025-03-10T17:27:02.037000
|
CVE-2024-57022,0,1,c99a0b15c70fa516c5e22b536ddcece1907ef44e69d46228494e189b49dab6e4,2025-03-19T14:15:38.007000
|
||||||
CVE-2024-57023,0,0,01de6489e57ac073c34548807079eb2db864fcfb3e5a1353732f75c9ed7380a6,2025-01-21T18:15:14.677000
|
CVE-2024-57023,0,0,01de6489e57ac073c34548807079eb2db864fcfb3e5a1353732f75c9ed7380a6,2025-01-21T18:15:14.677000
|
||||||
CVE-2024-57024,0,0,dd6768df4410fc37cc8c4e8a948bb715a9d72db959034294e4bc9c1d5752aa77,2025-01-21T17:15:14.723000
|
CVE-2024-57024,0,0,dd6768df4410fc37cc8c4e8a948bb715a9d72db959034294e4bc9c1d5752aa77,2025-01-21T17:15:14.723000
|
||||||
CVE-2024-57025,0,0,ba6eba255be4ec8bea25a2cdeb615de849af222ae85f044e2a8f32f3b1f8d1b7,2025-01-21T17:15:14.910000
|
CVE-2024-57025,0,0,ba6eba255be4ec8bea25a2cdeb615de849af222ae85f044e2a8f32f3b1f8d1b7,2025-01-21T17:15:14.910000
|
||||||
@ -276316,7 +276317,7 @@ CVE-2024-57439,0,0,6e64e016f192ab733e54f5a3035d1b158d0cb22bcd6abee8112395eba7b19
|
|||||||
CVE-2024-5744,0,0,f08529b05aa9992ca46f071419027f83a7c3d97cd6c27e854ef9ed714ed839f1,2024-11-21T09:48:16.267000
|
CVE-2024-5744,0,0,f08529b05aa9992ca46f071419027f83a7c3d97cd6c27e854ef9ed714ed839f1,2024-11-21T09:48:16.267000
|
||||||
CVE-2024-5745,0,0,7e65c88ad788c6b0931bb1e2e7e3abdcf09fad20076d859b2aa0fb4c2f137ddf,2024-11-21T09:48:16.423000
|
CVE-2024-5745,0,0,7e65c88ad788c6b0931bb1e2e7e3abdcf09fad20076d859b2aa0fb4c2f137ddf,2024-11-21T09:48:16.423000
|
||||||
CVE-2024-57450,0,0,d39c86b260ea84f1a2f257f30527cffe772404e6d44d8d70c9ac83512b1d5bb2,2025-03-15T16:15:13.963000
|
CVE-2024-57450,0,0,d39c86b260ea84f1a2f257f30527cffe772404e6d44d8d70c9ac83512b1d5bb2,2025-03-15T16:15:13.963000
|
||||||
CVE-2024-57451,0,0,457f8d0d04958505765bd5482d60461b04ad42fa6a9db7053da5d51c60da0d3a,2025-02-18T19:15:22.057000
|
CVE-2024-57451,0,1,2db3406871d80bd68bbad68d68fa327b18fbac1129e57466460b4f3ccd88e278,2025-03-19T14:15:38.187000
|
||||||
CVE-2024-57452,0,0,69b2caf34cf7071b96ea6471a5e6fc7e5be69ea985d031aa0ac8d466b99d25d7,2025-02-04T20:15:49.260000
|
CVE-2024-57452,0,0,69b2caf34cf7071b96ea6471a5e6fc7e5be69ea985d031aa0ac8d466b99d25d7,2025-02-04T20:15:49.260000
|
||||||
CVE-2024-5746,0,0,983f92b35d2851c40a6d833edd298ce544be182f3cbb073e4d5723a172283607,2024-11-21T09:48:16.580000
|
CVE-2024-5746,0,0,983f92b35d2851c40a6d833edd298ce544be182f3cbb073e4d5723a172283607,2024-11-21T09:48:16.580000
|
||||||
CVE-2024-5747,0,0,b0a73052a2b0fb8e91ca0186eb03a0a139ee155bf24624c988c4f85a0b80da72,2025-02-11T02:15:35.543000
|
CVE-2024-5747,0,0,b0a73052a2b0fb8e91ca0186eb03a0a139ee155bf24624c988c4f85a0b80da72,2025-02-11T02:15:35.543000
|
||||||
@ -276476,7 +276477,7 @@ CVE-2024-57720,0,0,c6ea7c04d1f31cae7cfb088d00930ccdd0afdbf506292dce573bf98c3a055
|
|||||||
CVE-2024-57721,0,0,c83b53b1f3da4e985aa3e8c6db4fa9cfaecd34c84a7a02eed4e5ae091c579b1b,2025-03-18T20:15:24.810000
|
CVE-2024-57721,0,0,c83b53b1f3da4e985aa3e8c6db4fa9cfaecd34c84a7a02eed4e5ae091c579b1b,2025-03-18T20:15:24.810000
|
||||||
CVE-2024-57722,0,0,fe5f4b3d273b2bf55fcc76e08e5390fbe140aa7e5c09f86912f960a4c7a9604f,2025-03-14T18:15:31.113000
|
CVE-2024-57722,0,0,fe5f4b3d273b2bf55fcc76e08e5390fbe140aa7e5c09f86912f960a4c7a9604f,2025-03-14T18:15:31.113000
|
||||||
CVE-2024-57723,0,0,c92af6f34b1e7a77bd52395245ab2a0062aa33af3c30b437ed91059e3220852d,2025-03-18T21:15:32.023000
|
CVE-2024-57723,0,0,c92af6f34b1e7a77bd52395245ab2a0062aa33af3c30b437ed91059e3220852d,2025-03-18T21:15:32.023000
|
||||||
CVE-2024-57724,0,0,43482da76e1d3664f5827ca7ff902585915c01a2cfee87e8119ace671edec575,2025-02-18T20:15:23.023000
|
CVE-2024-57724,0,1,487089e408f484b4e1d087661cae83e75947526a640613ebbcac96e43dd9db55,2025-03-19T14:15:38.337000
|
||||||
CVE-2024-57725,0,0,37c96803862b631e561de51a48e8624822d17dc31067e76ef4d04e27dbd1c96e,2025-02-18T15:15:17.067000
|
CVE-2024-57725,0,0,37c96803862b631e561de51a48e8624822d17dc31067e76ef4d04e27dbd1c96e,2025-02-18T15:15:17.067000
|
||||||
CVE-2024-57726,0,0,b06228a1f549336c575c9af51a5eec97f13915f9b87b92d879c22e35b9610a8c,2025-01-31T21:15:11.857000
|
CVE-2024-57726,0,0,b06228a1f549336c575c9af51a5eec97f13915f9b87b92d879c22e35b9610a8c,2025-01-31T21:15:11.857000
|
||||||
CVE-2024-57727,0,0,40a8243c73e2ffb483061a8498545f248d48c8fe22413e0fd73f6459bc3cda9b,2025-03-14T20:01:25.483000
|
CVE-2024-57727,0,0,40a8243c73e2ffb483061a8498545f248d48c8fe22413e0fd73f6459bc3cda9b,2025-03-14T20:01:25.483000
|
||||||
@ -283037,7 +283038,7 @@ CVE-2025-22795,0,0,6ef875d457c8e19bcf577814595be38d790143627f91775ea895c88416ac9
|
|||||||
CVE-2025-22797,0,0,bfb6494fa60ec5385c83095c381eb3d371c5ac04e9a0e3e98e9fb531b781c320,2025-01-15T16:15:42.200000
|
CVE-2025-22797,0,0,bfb6494fa60ec5385c83095c381eb3d371c5ac04e9a0e3e98e9fb531b781c320,2025-01-15T16:15:42.200000
|
||||||
CVE-2025-22798,0,0,4bb5a9aaf24c54efe5fc5f3912b846eb9cce5d1ee04c046662973251c02694d2,2025-01-15T16:15:42.343000
|
CVE-2025-22798,0,0,4bb5a9aaf24c54efe5fc5f3912b846eb9cce5d1ee04c046662973251c02694d2,2025-01-15T16:15:42.343000
|
||||||
CVE-2025-22799,0,0,6e8872882381d68d869db15147218f1df6746b9c043b33787660b5e87e5fc5e6,2025-01-15T16:15:42.490000
|
CVE-2025-22799,0,0,6e8872882381d68d869db15147218f1df6746b9c043b33787660b5e87e5fc5e6,2025-01-15T16:15:42.490000
|
||||||
CVE-2025-2280,0,0,c600ee299db6fbe4dea5dbc115e68093f4f6491d41513b4303a551f9be05f78f,2025-03-18T17:15:47.873000
|
CVE-2025-2280,0,1,f4a48035829663cfae86ea311e78db4fe353e4689096d30459dc2c2261cf7c40,2025-03-19T14:15:39.743000
|
||||||
CVE-2025-22800,0,0,997e3835a4655649ba94b8ddeb47fb1ff239e42030c36467b8eb9689698fed1a,2025-01-13T14:15:13.067000
|
CVE-2025-22800,0,0,997e3835a4655649ba94b8ddeb47fb1ff239e42030c36467b8eb9689698fed1a,2025-01-13T14:15:13.067000
|
||||||
CVE-2025-22801,0,0,c83deac6a5c5c2cba0bd79ad3064ebb1b72b5ce6e25705a33f2e1f95b55a8ff2,2025-01-09T16:16:29.323000
|
CVE-2025-22801,0,0,c83deac6a5c5c2cba0bd79ad3064ebb1b72b5ce6e25705a33f2e1f95b55a8ff2,2025-01-09T16:16:29.323000
|
||||||
CVE-2025-22802,0,0,4ee09a11670407cea09cb459dd4de4a2924f74334017dc53487f4f767d32ad7b,2025-01-09T16:16:29.470000
|
CVE-2025-22802,0,0,4ee09a11670407cea09cb459dd4de4a2924f74334017dc53487f4f767d32ad7b,2025-01-09T16:16:29.470000
|
||||||
@ -283955,7 +283956,7 @@ CVE-2025-24104,0,0,eaf2341118958cce67dbc21070a8e2f4a62ff3d770291a310ec877a84b56e
|
|||||||
CVE-2025-24106,0,0,7b1652442d8e4a2ef42869db0a96088570ce1bd80744fef4434e3c62e98b9210,2025-03-04T15:25:19.603000
|
CVE-2025-24106,0,0,7b1652442d8e4a2ef42869db0a96088570ce1bd80744fef4434e3c62e98b9210,2025-03-04T15:25:19.603000
|
||||||
CVE-2025-24107,0,0,96402cf84c64acffc4d1662c29f8a3c8a0f854a65ff188084b5ba4a1a1ec5a35,2025-02-05T16:15:42.013000
|
CVE-2025-24107,0,0,96402cf84c64acffc4d1662c29f8a3c8a0f854a65ff188084b5ba4a1a1ec5a35,2025-02-05T16:15:42.013000
|
||||||
CVE-2025-24108,0,0,9aaaaccaacf9017079892b606e6940de8d3cf8011d17b629bcde5009dfc6e215,2025-03-18T14:15:42.627000
|
CVE-2025-24108,0,0,9aaaaccaacf9017079892b606e6940de8d3cf8011d17b629bcde5009dfc6e215,2025-03-18T14:15:42.627000
|
||||||
CVE-2025-24109,0,0,3a06e33059ab25d8437d67978eebded22edd06fe8c09a21c862e225782f2c988,2025-03-04T15:26:30.650000
|
CVE-2025-24109,0,1,8eb130cf27592d50192927f1b19c4211e2d1fcf396c33ec739b688659623e038,2025-03-19T14:15:38.700000
|
||||||
CVE-2025-24112,0,0,00ac1ad70de7c95aa177469e4cbf1b6a59be3178c8668d42d9efaad7c292453f,2025-02-04T22:15:41.893000
|
CVE-2025-24112,0,0,00ac1ad70de7c95aa177469e4cbf1b6a59be3178c8668d42d9efaad7c292453f,2025-02-04T22:15:41.893000
|
||||||
CVE-2025-24113,0,0,dfb8fdeba08350f2d1ba047bdfca5272552cfc4b72a68de35cf8a6aa8ccbdc7b,2025-01-31T22:15:13.443000
|
CVE-2025-24113,0,0,dfb8fdeba08350f2d1ba047bdfca5272552cfc4b72a68de35cf8a6aa8ccbdc7b,2025-01-31T22:15:13.443000
|
||||||
CVE-2025-24114,0,0,060f1a53826cabb1840c2e97a20d5ed1dcd10135e4439b8b05507d5cf354517c,2025-02-04T22:15:42.030000
|
CVE-2025-24114,0,0,060f1a53826cabb1840c2e97a20d5ed1dcd10135e4439b8b05507d5cf354517c,2025-02-04T22:15:42.030000
|
||||||
@ -283993,7 +283994,7 @@ CVE-2025-24153,0,0,a962e00376d57b532ea670dc465405ba54e446d5423d2019e225758957981
|
|||||||
CVE-2025-24154,0,0,2133416aad04106ad04753c0c4ad3643abc6a261600e1250147cb0b1c5f17046,2025-03-18T20:15:25.680000
|
CVE-2025-24154,0,0,2133416aad04106ad04753c0c4ad3643abc6a261600e1250147cb0b1c5f17046,2025-03-18T20:15:25.680000
|
||||||
CVE-2025-24156,0,0,8fa4c1a03f09991e5c2bed2e07959c1558a8892a2864cd53dcb29d166373a914,2025-01-30T16:43:39.593000
|
CVE-2025-24156,0,0,8fa4c1a03f09991e5c2bed2e07959c1558a8892a2864cd53dcb29d166373a914,2025-01-30T16:43:39.593000
|
||||||
CVE-2025-24158,0,0,acc7809ab4701d1dee654bd85d3ea355491d3c160b1e018c6b17b635a2e8852d,2025-03-03T22:51:31.440000
|
CVE-2025-24158,0,0,acc7809ab4701d1dee654bd85d3ea355491d3c160b1e018c6b17b635a2e8852d,2025-03-03T22:51:31.440000
|
||||||
CVE-2025-24159,0,0,3b398e5ec735d86e63a66bb20838217a4d8bb188393327507b8a692d20b032c8,2025-03-04T14:57:16.473000
|
CVE-2025-24159,0,1,5049ee423dfbceaaa990b18ae981888a723164635f4aec7b443286d0a98a6096,2025-03-19T14:15:38.853000
|
||||||
CVE-2025-24160,0,0,ae6edae2205c08dd8b969920bf8cb3dc84d26eaf5297b5739349f27fb704a2f3,2025-01-28T16:15:44.003000
|
CVE-2025-24160,0,0,ae6edae2205c08dd8b969920bf8cb3dc84d26eaf5297b5739349f27fb704a2f3,2025-01-28T16:15:44.003000
|
||||||
CVE-2025-24161,0,0,6d02f0f01530cc9b917612d04abebc1e6d67d88a440e864a6d1a14a27e3f4034,2025-02-04T22:15:43.057000
|
CVE-2025-24161,0,0,6d02f0f01530cc9b917612d04abebc1e6d67d88a440e864a6d1a14a27e3f4034,2025-02-04T22:15:43.057000
|
||||||
CVE-2025-24162,0,0,e7182d7278474afcab3466a5bca917be81e38e822e2649153160baaeab126f37,2025-03-18T15:15:59.527000
|
CVE-2025-24162,0,0,e7182d7278474afcab3466a5bca917be81e38e822e2649153160baaeab126f37,2025-03-18T15:15:59.527000
|
||||||
@ -284516,7 +284517,7 @@ CVE-2025-25106,0,0,5adf6027f92cb35d0099585e7a65f3fb0596ff1c0a8b0759d2eee782d9073
|
|||||||
CVE-2025-25107,0,0,e2af2faa3c90d7cdee713a48892bd288f889534c19b4e3defad819e99fdaf327,2025-02-07T10:15:16.570000
|
CVE-2025-25107,0,0,e2af2faa3c90d7cdee713a48892bd288f889534c19b4e3defad819e99fdaf327,2025-02-07T10:15:16.570000
|
||||||
CVE-2025-25108,0,0,4216f31163792796c6d7a76b0dff1cbbb671cc5df74f5753efeaa4b4e5746e06,2025-03-03T14:15:50.767000
|
CVE-2025-25108,0,0,4216f31163792796c6d7a76b0dff1cbbb671cc5df74f5753efeaa4b4e5746e06,2025-03-03T14:15:50.767000
|
||||||
CVE-2025-25109,0,0,6d682a3d6df717c26d33e232bce785fcc26b0d6fbdfb125423df3b58afab6248,2025-03-03T14:15:50.907000
|
CVE-2025-25109,0,0,6d682a3d6df717c26d33e232bce785fcc26b0d6fbdfb125423df3b58afab6248,2025-03-03T14:15:50.907000
|
||||||
CVE-2025-2511,1,1,7ebf0f149ba9d30fea37aadf5b0642b4c17d468dddde4eb7642ff1405e2ac138,2025-03-19T12:15:14.313000
|
CVE-2025-2511,0,0,7ebf0f149ba9d30fea37aadf5b0642b4c17d468dddde4eb7642ff1405e2ac138,2025-03-19T12:15:14.313000
|
||||||
CVE-2025-25110,0,0,4041c70c5aea0a8415f9f6d363010815ba5afaf620d0b4cbccab698ef7bc642a,2025-02-07T10:15:16.747000
|
CVE-2025-25110,0,0,4041c70c5aea0a8415f9f6d363010815ba5afaf620d0b4cbccab698ef7bc642a,2025-02-07T10:15:16.747000
|
||||||
CVE-2025-25111,0,0,94fd198f7a55281e7e3f3a1093ff63f49472757f065ea1d6a6e9b48f0d5e39ef,2025-02-07T10:15:16.910000
|
CVE-2025-25111,0,0,94fd198f7a55281e7e3f3a1093ff63f49472757f065ea1d6a6e9b48f0d5e39ef,2025-02-07T10:15:16.910000
|
||||||
CVE-2025-25112,0,0,6606855c1cd27f20e8867aa9a0e41193608500ababbffad4e75be64d9d182194,2025-03-03T14:15:51.050000
|
CVE-2025-25112,0,0,6606855c1cd27f20e8867aa9a0e41193608500ababbffad4e75be64d9d182194,2025-03-03T14:15:51.050000
|
||||||
@ -284527,7 +284528,7 @@ CVE-2025-25116,0,0,bcf37afc318f5e9ac3f628960ea4fa413ee951eab0cc5618b798180318935
|
|||||||
CVE-2025-25117,0,0,315c56cbaf5ff1e3498f8b9cf6b2965e180d3e2a738da99a953fe4b2580fbd4a,2025-02-07T10:15:17.267000
|
CVE-2025-25117,0,0,315c56cbaf5ff1e3498f8b9cf6b2965e180d3e2a738da99a953fe4b2580fbd4a,2025-02-07T10:15:17.267000
|
||||||
CVE-2025-25118,0,0,367270eb5aa7e76ca009abbeed8d68dc0bd7338562d262954a33f7fa4cf2772a,2025-03-03T14:15:51.610000
|
CVE-2025-25118,0,0,367270eb5aa7e76ca009abbeed8d68dc0bd7338562d262954a33f7fa4cf2772a,2025-03-03T14:15:51.610000
|
||||||
CVE-2025-25119,0,0,f12a4fb304e58f7685a75296c77c9d95278051f76c1b47108438f8d261173f37,2025-03-03T14:15:51.750000
|
CVE-2025-25119,0,0,f12a4fb304e58f7685a75296c77c9d95278051f76c1b47108438f8d261173f37,2025-03-03T14:15:51.750000
|
||||||
CVE-2025-2512,1,1,04dc0e32b86bba275816258b77d4ca6c96e821bcde40da19d3d57e7407c1771f,2025-03-19T12:15:14.463000
|
CVE-2025-2512,0,0,04dc0e32b86bba275816258b77d4ca6c96e821bcde40da19d3d57e7407c1771f,2025-03-19T12:15:14.463000
|
||||||
CVE-2025-25120,0,0,37d7efddee9451cb8bdde13d5063d3355ce365b4be1738cfe09d05a928d650ba,2025-02-07T10:15:17.453000
|
CVE-2025-25120,0,0,37d7efddee9451cb8bdde13d5063d3355ce365b4be1738cfe09d05a928d650ba,2025-02-07T10:15:17.453000
|
||||||
CVE-2025-25121,0,0,affb830fba7b58ecca3c4dde16bde250272ea421c2c05bb933f1730e460c4449,2025-03-03T14:15:51.887000
|
CVE-2025-25121,0,0,affb830fba7b58ecca3c4dde16bde250272ea421c2c05bb933f1730e460c4449,2025-03-03T14:15:51.887000
|
||||||
CVE-2025-25122,0,0,c7933c3b08bb5046faca8cf2e06c3abb9ff38205e55e352fa2bc9dd4eb25abca,2025-03-03T14:15:52.033000
|
CVE-2025-25122,0,0,c7933c3b08bb5046faca8cf2e06c3abb9ff38205e55e352fa2bc9dd4eb25abca,2025-03-03T14:15:52.033000
|
||||||
@ -284695,7 +284696,7 @@ CVE-2025-25476,0,0,dcb05a63fbcff084bcf1c5df3723664abe2b9f2707596be8a1333f910233c
|
|||||||
CVE-2025-25477,0,0,186e1b1b42cd761794319ad88366f1783c2b185a5c4c7ba09f90886d766f572b,2025-02-28T16:15:39.550000
|
CVE-2025-25477,0,0,186e1b1b42cd761794319ad88366f1783c2b185a5c4c7ba09f90886d766f572b,2025-02-28T16:15:39.550000
|
||||||
CVE-2025-25478,0,0,5d678bf64fff284866af822721a081473e94720053a6940e94e8607a25812368,2025-03-05T16:15:39.297000
|
CVE-2025-25478,0,0,5d678bf64fff284866af822721a081473e94720053a6940e94e8607a25812368,2025-03-05T16:15:39.297000
|
||||||
CVE-2025-25497,0,0,342cc8c3073c7b4fb963ce6919474125872366956f79f35d55abc4517740c1dc,2025-03-07T20:15:38.013000
|
CVE-2025-25497,0,0,342cc8c3073c7b4fb963ce6919474125872366956f79f35d55abc4517740c1dc,2025-03-07T20:15:38.013000
|
||||||
CVE-2025-25500,0,0,111d4db0bc81dd7cc682206d7f44a5f888cd685ec97f9d39953e9264ebcd56f7,2025-03-18T14:15:43.493000
|
CVE-2025-25500,0,1,da1c898cfcbd810f078b7294d1eec0d9905e50224c954d32d8cd7908e965ddf3,2025-03-19T14:15:39.033000
|
||||||
CVE-2025-25505,0,0,11c4c75af440f82d715defaf6782907c0744a464a1a91c9d9aeef14ada87484d,2025-02-21T21:15:23.723000
|
CVE-2025-25505,0,0,11c4c75af440f82d715defaf6782907c0744a464a1a91c9d9aeef14ada87484d,2025-02-21T21:15:23.723000
|
||||||
CVE-2025-25507,0,0,aaa8b5a00bc14c6200ce4ada5e546d091bf3632fba77c66b3ac71c873b2a184e,2025-02-21T21:15:23.870000
|
CVE-2025-25507,0,0,aaa8b5a00bc14c6200ce4ada5e546d091bf3632fba77c66b3ac71c873b2a184e,2025-02-21T21:15:23.870000
|
||||||
CVE-2025-25510,0,0,80b49d96f8cfea96d2e40e1145bf347e93013db39579b2b941514912fbfd558e,2025-02-21T21:15:24.023000
|
CVE-2025-25510,0,0,80b49d96f8cfea96d2e40e1145bf347e93013db39579b2b941514912fbfd558e,2025-02-21T21:15:24.023000
|
||||||
@ -284728,7 +284729,7 @@ CVE-2025-25586,0,0,744a470f770a9515b6f7dfb52c66d60af37830e5dc13b1912db087fb3afac
|
|||||||
CVE-2025-25589,0,0,824725523e28132dad4cb2619d08cb50c773fd7753d8cafe5fb64b8961821ca3,2025-03-18T16:15:27.200000
|
CVE-2025-25589,0,0,824725523e28132dad4cb2619d08cb50c773fd7753d8cafe5fb64b8961821ca3,2025-03-18T16:15:27.200000
|
||||||
CVE-2025-25590,0,0,0ad36cf80c5032a80ad0bf8eb00193fecda94b0782be77115fea9b1209b274e1,2025-03-18T15:16:00.373000
|
CVE-2025-25590,0,0,0ad36cf80c5032a80ad0bf8eb00193fecda94b0782be77115fea9b1209b274e1,2025-03-18T15:16:00.373000
|
||||||
CVE-2025-25595,0,0,fcc81d79cad074e1bddfc729b95a0032a9eb1c3955175115764d73587af47da7,2025-03-18T17:15:46.203000
|
CVE-2025-25595,0,0,fcc81d79cad074e1bddfc729b95a0032a9eb1c3955175115764d73587af47da7,2025-03-18T17:15:46.203000
|
||||||
CVE-2025-25598,0,0,77f039cd06718093e1c276e16fe184c5d4efc61143dbb11eacdc3787cfa066aa,2025-03-13T18:15:50.857000
|
CVE-2025-25598,0,1,ea8ff451786059144f97b5402e36a3bbb5df978993f22c0b25b2578aad85418d,2025-03-19T14:15:39.140000
|
||||||
CVE-2025-25604,0,0,7a8cc3234dfcf2fd463e6a54d1695816511ffd986519d0bafcb53e4f83d303ac,2025-02-21T21:15:24.170000
|
CVE-2025-25604,0,0,7a8cc3234dfcf2fd463e6a54d1695816511ffd986519d0bafcb53e4f83d303ac,2025-02-21T21:15:24.170000
|
||||||
CVE-2025-25605,0,0,c0858a3094cad59e4cf6248dc23b2aa0633fe28bfdda9aca36970755a7dbfbce,2025-02-21T21:15:24.317000
|
CVE-2025-25605,0,0,c0858a3094cad59e4cf6248dc23b2aa0633fe28bfdda9aca36970755a7dbfbce,2025-02-21T21:15:24.317000
|
||||||
CVE-2025-25609,0,0,266dd94a110ece3c3e14be6241a6b4dfd9dca67d8afeac437f4e4e876c6d5556,2025-03-05T16:15:39.460000
|
CVE-2025-25609,0,0,266dd94a110ece3c3e14be6241a6b4dfd9dca67d8afeac437f4e4e876c6d5556,2025-03-05T16:15:39.460000
|
||||||
@ -284892,8 +284893,8 @@ CVE-2025-26206,0,0,bc67999dabe96502b241246d2665faf1f09178bdb9b72e5e7dd5401b748e2
|
|||||||
CVE-2025-26215,0,0,398e0534dde9630858e15022c6decb119d529efa2fc59efd24b3f1a57cdf3f89,2025-03-14T17:15:51.613000
|
CVE-2025-26215,0,0,398e0534dde9630858e15022c6decb119d529efa2fc59efd24b3f1a57cdf3f89,2025-03-14T17:15:51.613000
|
||||||
CVE-2025-26216,0,0,fa35563faa6505245c7f05bc4878e14310c206fdd07c5771663544280eaa71b8,2025-03-14T17:15:51.730000
|
CVE-2025-26216,0,0,fa35563faa6505245c7f05bc4878e14310c206fdd07c5771663544280eaa71b8,2025-03-14T17:15:51.730000
|
||||||
CVE-2025-26260,0,0,23c98183c981924ff624691f004f57ca0a3b3fc9df97cc744f6e86e7322bfeaf,2025-03-12T16:15:23.907000
|
CVE-2025-26260,0,0,23c98183c981924ff624691f004f57ca0a3b3fc9df97cc744f6e86e7322bfeaf,2025-03-12T16:15:23.907000
|
||||||
CVE-2025-26263,0,0,33c82bcdd68cdcef2d06780800c3ab6c6f6af78532f2208935cfab51d7c78d3f,2025-03-17T06:15:24.630000
|
CVE-2025-26263,0,1,87852969ca209a829a551b3d11cffebf3ca020061fd4d362c34f3d6a1719258e,2025-03-19T14:15:39.293000
|
||||||
CVE-2025-26264,0,0,78a1bd2e43e9b3b3479a5073d67ff29ef6c7b849522e2d6fc7c934784cc466cb,2025-03-17T06:15:25.070000
|
CVE-2025-26264,0,1,7eeeb1b8e87d7e06484f4d071bc6d32b977cfa79c395c4fbca1cefbdfdd35c84,2025-03-19T14:15:39.440000
|
||||||
CVE-2025-26304,0,0,70c8f37d4db2054dfe1099a4a2c4b06129c826d4de254465b9316b6b41e402d7,2025-02-21T21:15:24.653000
|
CVE-2025-26304,0,0,70c8f37d4db2054dfe1099a4a2c4b06129c826d4de254465b9316b6b41e402d7,2025-02-21T21:15:24.653000
|
||||||
CVE-2025-26305,0,0,1a1d603a79ab0dad9b04f449d78f3a3bb9f5de25113a59f9bb3a8e492946e3de,2025-02-21T21:15:24.803000
|
CVE-2025-26305,0,0,1a1d603a79ab0dad9b04f449d78f3a3bb9f5de25113a59f9bb3a8e492946e3de,2025-02-21T21:15:24.803000
|
||||||
CVE-2025-26306,0,0,f6318b29dc3c8fcf62d8d059c582dc4ed277312d31ede047e5262baa26bd01da,2025-02-24T18:15:21.357000
|
CVE-2025-26306,0,0,f6318b29dc3c8fcf62d8d059c582dc4ed277312d31ede047e5262baa26bd01da,2025-02-24T18:15:21.357000
|
||||||
@ -285068,11 +285069,11 @@ CVE-2025-26698,0,0,02e1c85350f9590f950db8be3fe5f72c9485333903c0f224a4be86e1fd66b
|
|||||||
CVE-2025-26699,0,0,e88af5cce40368f723e525bfe75ade49611d14fa54ea6a0ae28e1d64f24ae73d,2025-03-06T19:15:27.683000
|
CVE-2025-26699,0,0,e88af5cce40368f723e525bfe75ade49611d14fa54ea6a0ae28e1d64f24ae73d,2025-03-06T19:15:27.683000
|
||||||
CVE-2025-26700,0,0,6e3b394d53337ab4fe903b88ec563a5f9fa1519ac62684b203abb3bd4f953337,2025-02-17T03:15:09.750000
|
CVE-2025-26700,0,0,6e3b394d53337ab4fe903b88ec563a5f9fa1519ac62684b203abb3bd4f953337,2025-02-17T03:15:09.750000
|
||||||
CVE-2025-26701,0,0,89b8b735021c8ba1b57a31289c67376fd76e788ad77a06946ec19e6114a95335,2025-03-11T18:15:33.210000
|
CVE-2025-26701,0,0,89b8b735021c8ba1b57a31289c67376fd76e788ad77a06946ec19e6114a95335,2025-03-11T18:15:33.210000
|
||||||
CVE-2025-26702,0,0,52293558e0b7c22cf2e8f2ca3cd772feb4c403ac4e7748fff5fc7c1ca294fde9,2025-03-11T07:15:34.133000
|
CVE-2025-26702,0,1,1839f93bfb7ace4325903035b3bb74add19b6f08607cfe0196f58c5d53bcb05c,2025-03-19T14:08:01.357000
|
||||||
CVE-2025-26703,0,0,094c28df5cba22d3b953f9d7043ec8e7fd878498977b463b336b76b278bde734,2025-03-11T07:15:34.580000
|
CVE-2025-26703,0,1,5d0f4e93d2d8f53943eec95a19382fdc01adc6b71ca5902ffd41b3078a42a0fe,2025-03-19T14:09:38.080000
|
||||||
CVE-2025-26704,0,0,7df36e8590b1e0c4f22127c1f776f171e7128457eb7e10f2d3d1ede0719a6c5e,2025-03-11T07:15:34.967000
|
CVE-2025-26704,0,1,419ed24de70dea575c53e5d2943423e1ee68404dd42f3936f3e41631976d677a,2025-03-19T14:11:17.600000
|
||||||
CVE-2025-26705,0,0,6e647080e395211b558a87f67b0324083d4c877d83b69fccf1c9b798f8ff4d63,2025-03-11T07:15:35.330000
|
CVE-2025-26705,0,1,60ec52a3a37b8a1198549fd1a80bc727c4794d468b4358c4011967c60a257f05,2025-03-19T14:12:26.253000
|
||||||
CVE-2025-26706,0,0,c64ce4dfa97ebe74ab023bc4aec6b6c65436ef95ad63caeb02e265c0af10d6a2,2025-03-11T07:15:35.703000
|
CVE-2025-26706,0,1,b51b241e56d67a82d489bdb9e6cf7f91b77a7162f00bdf295468d48446e749e2,2025-03-19T14:15:36.417000
|
||||||
CVE-2025-26707,0,0,96aa33e65cf78737f84fce85389a49f91137e43bd9dc650590985bf2da9a0450,2025-03-11T04:15:25.093000
|
CVE-2025-26707,0,0,96aa33e65cf78737f84fce85389a49f91137e43bd9dc650590985bf2da9a0450,2025-03-11T04:15:25.093000
|
||||||
CVE-2025-26708,0,0,2f79eae1bf3a9e2cd078bee2e260f7de2077d1f5b314f379e5bf317e129bf549,2025-03-07T03:15:33.307000
|
CVE-2025-26708,0,0,2f79eae1bf3a9e2cd078bee2e260f7de2077d1f5b314f379e5bf317e129bf549,2025-03-07T03:15:33.307000
|
||||||
CVE-2025-26750,0,0,d88bdcd674193a8c592f1b97cbf3fbf882d139c99406f62e08a860c366f790c0,2025-02-22T16:15:31.210000
|
CVE-2025-26750,0,0,d88bdcd674193a8c592f1b97cbf3fbf882d139c99406f62e08a860c366f790c0,2025-02-22T16:15:31.210000
|
||||||
@ -285526,16 +285527,16 @@ CVE-2025-28010,0,0,0a11d87519d9b22f0f2ae9be8ae1be8db80c1ae4bdfd1cb8d0cf77b19c42d
|
|||||||
CVE-2025-28011,0,0,2a370ee125823dd49484207db37abe8d21873504d43764feea8f4c2dabc113d2,2025-03-13T17:15:37.530000
|
CVE-2025-28011,0,0,2a370ee125823dd49484207db37abe8d21873504d43764feea8f4c2dabc113d2,2025-03-13T17:15:37.530000
|
||||||
CVE-2025-28015,0,0,0603e9cbef2e5ee55344938ebfb39b43a9cec4a734d3544a5d237aff3bf7420a,2025-03-13T16:15:27.810000
|
CVE-2025-28015,0,0,0603e9cbef2e5ee55344938ebfb39b43a9cec4a734d3544a5d237aff3bf7420a,2025-03-13T16:15:27.810000
|
||||||
CVE-2025-28856,0,0,db2bbb32cf52cca2ced522652c0571cdcf66f2f5f62f3cd167e79253416a8f6a,2025-03-11T21:15:42.763000
|
CVE-2025-28856,0,0,db2bbb32cf52cca2ced522652c0571cdcf66f2f5f62f3cd167e79253416a8f6a,2025-03-11T21:15:42.763000
|
||||||
CVE-2025-28857,0,0,7639d5f3953225b459d1bad1ea0b4ccaa2504977cf138c727b6fb2178ec9f366,2025-03-11T21:15:42.903000
|
CVE-2025-28857,0,1,e1c738bc9844b1bfe2c67596adaf7c2a8564c2cc541068f87b173d55a262a1b8,2025-03-19T13:41:38.270000
|
||||||
CVE-2025-28859,0,0,6f1cc910637d00c9ac6a4de42a12398aecbc5ea7960b119921c942487abc24e7,2025-03-11T21:15:43.050000
|
CVE-2025-28859,0,1,1a821bc58dbd31b9f48e7a0ed4774a6a9b375dee8d99a0455626f76a2b5564f8,2025-03-19T14:01:43.707000
|
||||||
CVE-2025-28860,0,0,6a8a0b0b17c320bdd0b234f5d94b4edbc9f7bbc4a57c83549a224117fd3464a8,2025-03-11T21:15:43.193000
|
CVE-2025-28860,0,1,66dc2154f8e6a7d5fe774501386200cf25568fdb5590c8e79b061d6b8471f51a,2025-03-19T14:06:00.333000
|
||||||
CVE-2025-28861,0,0,8cd4229cbec76109810d5b343e5b05de1f3301639f651f97050ebe36e9bcd987,2025-03-11T21:15:43.337000
|
CVE-2025-28861,0,1,8f06dd797c877ac540417e774f13db9bcbfcb5efd0679398413b1a7d851d0a33,2025-03-19T14:08:16.920000
|
||||||
CVE-2025-28862,0,0,498e18a442d30fb8e225f96e842cc7c3a56b99221a7a581ac6944ff55b2dd6f4,2025-03-11T21:15:43.490000
|
CVE-2025-28862,0,1,262a0346545485f6d48b7aaaaae4bfd67403a534df363d75e6b444693b4d15c9,2025-03-19T14:13:16.610000
|
||||||
CVE-2025-28863,0,0,3800fe89a39973b6b1231d056a9a553d8b250263bbb47326e4368baee010353b,2025-03-11T21:15:43.647000
|
CVE-2025-28863,0,1,30697552adbf533d5aedc6bffbf20d0c5bb50d79e9020ff1669e6e6b9af3055d,2025-03-19T14:14:18.080000
|
||||||
CVE-2025-28864,0,0,476816835ccebd5f68ac74b6072001d700dfb9d6006755533c883c8ada0f5cce,2025-03-11T21:15:43.810000
|
CVE-2025-28864,0,1,fa24a3929b56ed50394276a64f3f8bff3c17a1ca074b88848c593735e282f43a,2025-03-19T14:16:41.287000
|
||||||
CVE-2025-28866,0,0,e6e8567798ae0e1def137ae8a79778279de6d299a623ad6b571a34e8fbecf55b,2025-03-11T21:15:43.970000
|
CVE-2025-28866,0,1,6216179861a4260f9ff8f846c033be3d21e175874bd3a83d400d670ba4d4e4a8,2025-03-19T14:17:39.090000
|
||||||
CVE-2025-28867,0,0,4ca8db1ab3b6a1f94a88ba6b89b60f18839f31c5ac8e654bb73f4f011fc98a3c,2025-03-18T20:43:40.300000
|
CVE-2025-28867,0,0,4ca8db1ab3b6a1f94a88ba6b89b60f18839f31c5ac8e654bb73f4f011fc98a3c,2025-03-18T20:43:40.300000
|
||||||
CVE-2025-28868,0,0,09db76947750674e0f3b002c373925c37261fe218f54cb6c55eebe5eeb4518c8,2025-03-11T21:15:44.283000
|
CVE-2025-28868,0,1,cb75dcce807bf86a4d7596310f6bed7a2a7832b4c4f7cc8be6554b5078689d39,2025-03-19T14:27:00.497000
|
||||||
CVE-2025-28870,0,0,e4153cd68c5e457e5fb1a3618dd0f3fc9e338446e1283f587e70001d5bee2ff3,2025-03-18T20:29:41.383000
|
CVE-2025-28870,0,0,e4153cd68c5e457e5fb1a3618dd0f3fc9e338446e1283f587e70001d5bee2ff3,2025-03-18T20:29:41.383000
|
||||||
CVE-2025-28871,0,0,96091a1c69b0d922d056c2a14a5d867c146a33cfc934a23b3119118821cf1523,2025-03-17T18:45:11.073000
|
CVE-2025-28871,0,0,96091a1c69b0d922d056c2a14a5d867c146a33cfc934a23b3119118821cf1523,2025-03-17T18:45:11.073000
|
||||||
CVE-2025-28872,0,0,f3b7d21384421d1eeb12498b153df5e281517aad4a4d3aff96a3e023ae3b23ad,2025-03-11T21:15:44.757000
|
CVE-2025-28872,0,0,f3b7d21384421d1eeb12498b153df5e281517aad4a4d3aff96a3e023ae3b23ad,2025-03-11T21:15:44.757000
|
||||||
@ -285622,7 +285623,7 @@ CVE-2025-29786,0,0,0c40fa5408515757638473e28641812347d31da5efea9c126f50ced0bd11d
|
|||||||
CVE-2025-29787,0,0,f2e861b6c4dbf868707fba7b3fb131d1b9814d3e4021455a52a8a2d5236bf0cb,2025-03-17T14:15:22.447000
|
CVE-2025-29787,0,0,f2e861b6c4dbf868707fba7b3fb131d1b9814d3e4021455a52a8a2d5236bf0cb,2025-03-17T14:15:22.447000
|
||||||
CVE-2025-29788,0,0,e1a88fbf2eb4e52db6d664e73916facba347fa2e80c6c15ea20d2760d435bf11,2025-03-17T14:15:22.653000
|
CVE-2025-29788,0,0,e1a88fbf2eb4e52db6d664e73916facba347fa2e80c6c15ea20d2760d435bf11,2025-03-17T14:15:22.653000
|
||||||
CVE-2025-29790,0,0,675222ea0eab8ae3f29f8b94428bcad2e1e1b41b05f6926d11004b88739188d2,2025-03-18T19:15:50.813000
|
CVE-2025-29790,0,0,675222ea0eab8ae3f29f8b94428bcad2e1e1b41b05f6926d11004b88739188d2,2025-03-18T19:15:50.813000
|
||||||
CVE-2025-29891,0,0,19957216c682a927ada7fbe8d799bf8aa1337ea00af552d450ee80a227a50322,2025-03-13T09:15:14.860000
|
CVE-2025-29891,0,1,6f656b5325e6e317e0701bf37e32b1fd845a6f162de74687e113855da8de633f,2025-03-19T14:15:39.573000
|
||||||
CVE-2025-29903,0,0,10c68e7ddaac62cfaf56fa2d0c36952343de94dcaf74d7de9700d239804e47d3,2025-03-12T13:15:37.823000
|
CVE-2025-29903,0,0,10c68e7ddaac62cfaf56fa2d0c36952343de94dcaf74d7de9700d239804e47d3,2025-03-12T13:15:37.823000
|
||||||
CVE-2025-29904,0,0,8151be9d68bba0e8c527ecea5490dd29fd8894724b2933080703a0ecee03e639,2025-03-12T13:15:38.050000
|
CVE-2025-29904,0,0,8151be9d68bba0e8c527ecea5490dd29fd8894724b2933080703a0ecee03e639,2025-03-12T13:15:38.050000
|
||||||
CVE-2025-29907,0,0,cfa2108f203bb2d21cc6fdede35a67ff448b143468e6b33a2073415a2c48ea4c,2025-03-18T19:15:51.197000
|
CVE-2025-29907,0,0,cfa2108f203bb2d21cc6fdede35a67ff448b143468e6b33a2073415a2c48ea4c,2025-03-18T19:15:51.197000
|
||||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user